diff options
author | jeroenpraat <jeroenpraat@xs4all.nl> | 2016-12-19 16:52:17 +0100 |
---|---|---|
committer | jeroenpraat <jeroenpraat@xs4all.nl> | 2016-12-19 16:52:17 +0100 |
commit | 468fb3c77a60fe38a021502bce5ca6a4e4c211a4 (patch) | |
tree | 0a6c99558d6815157a41d46ae8e50ecb0899e527 /Zotlabs | |
parent | 3a4bd27333a90191868393f747fad662a51753f0 (diff) | |
parent | 3ad3d3037f8ba9643952bbf64e70c5edf302a73b (diff) | |
download | volse-hubzilla-468fb3c77a60fe38a021502bce5ca6a4e4c211a4.tar.gz volse-hubzilla-468fb3c77a60fe38a021502bce5ca6a4e4c211a4.tar.bz2 volse-hubzilla-468fb3c77a60fe38a021502bce5ca6a4e4c211a4.zip |
Merge branch 'dev' of https://github.com/redmatrix/hubzilla into dev
Diffstat (limited to 'Zotlabs')
-rw-r--r-- | Zotlabs/Lib/ThreadItem.php | 2 | ||||
-rw-r--r-- | Zotlabs/Module/Sslify.php | 19 |
2 files changed, 9 insertions, 12 deletions
diff --git a/Zotlabs/Lib/ThreadItem.php b/Zotlabs/Lib/ThreadItem.php index a1666e148..e636e5614 100644 --- a/Zotlabs/Lib/ThreadItem.php +++ b/Zotlabs/Lib/ThreadItem.php @@ -335,6 +335,8 @@ class ThreadItem { 'wall' => t('Wall-to-Wall'), 'vwall' => t('via Wall-To-Wall:'), 'profile_url' => $profile_link, + 'thread_action_menu' => thread_action_menu($item,$conv->get_mode()), + 'thread_author_menu' => thread_author_menu($item,$conv->get_mode()), 'item_photo_menu' => item_photo_menu($item), 'dreport' => $dreport, 'name' => $profile_name, diff --git a/Zotlabs/Module/Sslify.php b/Zotlabs/Module/Sslify.php index db73f85e0..2891f3691 100644 --- a/Zotlabs/Module/Sslify.php +++ b/Zotlabs/Module/Sslify.php @@ -10,21 +10,16 @@ class Sslify extends \Zotlabs\Web\Controller { $h = explode("\n",$x['header']); foreach ($h as $l) { list($k,$v) = array_map("trim", explode(":", trim($l), 2)); - $hdrs[$k] = $v; + $hdrs[strtolower($k)] = $v; } - if (array_key_exists('Content-Type', $hdrs)) - $type = $hdrs['Content-Type']; - - header('Content-Type: ' . $type); + if (array_key_exists('content-type', $hdrs)) { + $type = $hdrs['content-type']; + header('Content-Type: ' . $type); + } + echo $x['body']; killme(); } killme(); - // for some reason when this fallback is in place - it gets triggered - // often, (creating mixed content exceptions) even though there is - // nothing obvious missing on the page when we bypass it. - goaway($_REQUEST['url']); - } - - + } } |