corrade-lsl-templates – Diff between revs 10 and 11
?pathlinks?
Rev 10 | Rev 11 | |||
---|---|---|---|---|
Line 271... | Line 271... | |||
271 | wasKeyValueGet( |
271 | wasKeyValueGet( |
|
272 | "password", |
272 | "password", |
|
273 | configuration |
273 | configuration |
|
274 | ) |
274 | ) |
|
275 | ), |
275 | ), |
|
- | 276 | "SQL", wasURLEscape("CREATE TABLE IF NOT EXISTS \"" + |
||
- | 277 | wasKeyValueGet("wiki table", configuration) + |
||
276 | "SQL", wasURLEscape("CREATE TABLE IF NOT EXISTS corradeeggdrop (path text unique collate nocase, data text)"), |
278 | "\" (path text unique collate nocase, data text)"), |
|
277 | "callback", wasURLEscape(URL) |
279 | "callback", wasURLEscape(URL) |
|
278 | ] |
280 | ] |
|
279 | ) |
281 | ) |
|
280 | ); |
282 | ); |
|
281 | llSetTimerEvent(60); |
283 | llSetTimerEvent(60); |
|
Line 335... | Line 337... | |||
335 | "message", |
337 | "message", |
|
336 | message |
338 | message |
|
337 | ) |
339 | ) |
|
338 | ); |
340 | ); |
|
Line -... | Line 341... | |||
- | 341 | |
||
339 | |
342 | // Check if this is an eggdrop command. |
|
340 | if(llGetSubString(data, 0, 0) != |
343 | if(llGetSubString(data, 0, 0) != |
|
341 | wasKeyValueGet("command", configuration)) |
344 | wasKeyValueGet("command", configuration)) |
|
342 | return; |
345 | return; |
|
- | 346 | |
||
343 | |
347 | // Check if the command matches the current module. |
|
344 | list command = llParseString2List(data, |
348 | list command = llParseString2List(data, |
|
345 | [wasKeyValueGet("command", configuration), " "], []); |
349 | [wasKeyValueGet("command", configuration), " "], ["@"]); |
|
346 | if(llList2String(command, 0) != "wiki") |
350 | if(llList2String(command, 0) != "wiki") |
|
Line 347... | Line 351... | |||
347 | return; |
351 | return; |
|
348 | |
352 | |
|
Line 434... | Line 438... | |||
434 | wasKeyValueGet( |
438 | wasKeyValueGet( |
|
435 | "password", |
439 | "password", |
|
436 | configuration |
440 | configuration |
|
437 | ) |
441 | ) |
|
438 | ), |
442 | ), |
|
439 | "SQL", wasURLEscape("DELETE FROM corradeeggdrop WHERE path=:path"), |
443 | "SQL", wasURLEscape("DELETE FROM \"" + |
|
- | 444 | wasKeyValueGet("wiki table", configuration) + |
||
- | 445 | "\" WHERE path=:path"), |
||
- | 446 | "data", wasURLEscape( |
||
440 | "data", wasListToCSV( |
447 | wasListToCSV( |
|
441 | [ |
448 | [ |
|
442 | "path", |
449 | "path", |
|
443 | wasURLEscape("path") |
450 | wasURLEscape("path") |
|
- | 451 | ] |
||
444 | ] |
452 | ) |
|
445 | ), |
453 | ), |
|
446 | "callback", wasURLEscape(URL) |
454 | "callback", wasURLEscape(URL) |
|
447 | ] |
455 | ] |
|
448 | ) |
456 | ) |
|
449 | ); |
457 | ); |
|
Line 470... | Line 478... | |||
470 | wasKeyValueGet( |
478 | wasKeyValueGet( |
|
471 | "password", |
479 | "password", |
|
472 | configuration |
480 | configuration |
|
473 | ) |
481 | ) |
|
474 | ), |
482 | ), |
|
- | 483 | "SQL", wasURLEscape("REPLACE INTO \"" + |
||
- | 484 | wasKeyValueGet("wiki table", configuration) + |
||
475 | "SQL", wasURLEscape("REPLACE INTO corradeeggdrop (path, data) VALUES (:path, :data)"), |
485 | "\" (path, data) VALUES (:path, :data)"), |
|
- | 486 | "data", wasURLEscape( |
||
476 | "data", wasListToCSV( |
487 | wasListToCSV( |
|
477 | [ |
488 | [ |
|
478 | "path", |
489 | "path", |
|
479 | wasURLEscape("path"), |
490 | wasURLEscape(path), |
|
480 | "data", |
491 | "data", |
|
481 | wasURLEscape("data") |
492 | wasURLEscape(data) |
|
- | 493 | ] |
||
482 | ] |
494 | ) |
|
483 | ), |
495 | ), |
|
484 | "callback", wasURLEscape(URL) |
496 | "callback", wasURLEscape(URL) |
|
485 | ] |
497 | ] |
|
486 | ) |
498 | ) |
|
487 | ); |
499 | ); |
|
Line 548... | Line 560... | |||
548 | wasKeyValueGet( |
560 | wasKeyValueGet( |
|
549 | "password", |
561 | "password", |
|
550 | configuration |
562 | configuration |
|
551 | ) |
563 | ) |
|
552 | ), |
564 | ), |
|
553 | "SQL", wasURLEscape("SELECT data FROM corradeeggdrop WHERE path=:path"), |
565 | "SQL", wasURLEscape("SELECT data FROM \"" + |
|
- | 566 | wasKeyValueGet("wiki table", configuration) + |
||
- | 567 | "\" WHERE path=:path"), |
||
- | 568 | "data", wasURLEscape( |
||
554 | "data", wasListToCSV( |
569 | wasListToCSV( |
|
555 | [ |
570 | [ |
|
556 | "path", |
571 | "path", |
|
557 | wasURLEscape(path) |
572 | wasURLEscape(path) |
|
- | 573 | ] |
||
558 | ] |
574 | ) |
|
559 | ), |
575 | ), |
|
560 | "callback", wasURLEscape(URL) |
576 | "callback", wasURLEscape(URL) |
|
561 | ] |
577 | ] |
|
562 | ) |
578 | ) |
|
563 | ); |
579 | ); |
|
Line 639... | Line 655... | |||
639 | wasKeyValueGet( |
655 | wasKeyValueGet( |
|
640 | "password", |
656 | "password", |
|
641 | configuration |
657 | configuration |
|
642 | ) |
658 | ) |
|
643 | ), |
659 | ), |
|
644 | "SQL", wasURLEscape("SELECT path FROM corradeeggdrop WHERE path like :path"), |
660 | "SQL", wasURLEscape("SELECT path FROM \"" + |
|
- | 661 | wasKeyValueGet("wiki table", configuration) + |
||
- | 662 | "\" WHERE path like :path"), |
||
- | 663 | "data", wasURLEscape( |
||
645 | "data", wasListToCSV( |
664 | wasListToCSV( |
|
646 | [ |
665 | [ |
|
647 | "path", |
666 | "path", |
|
648 | wasURLEscape(path + "%") |
667 | wasURLEscape(path + "%") |
|
- | 668 | ] |
||
649 | ] |
669 | ) |
|
650 | ), |
670 | ), |
|
651 | "callback", wasURLEscape(URL) |
671 | "callback", wasURLEscape(URL) |
|
652 | ] |
672 | ] |
|
653 | ) |
673 | ) |
|
654 | ); |
674 | ); |