Skip to content

Instantly share code, notes, and snippets.

Usage: jira [options] [command]
Commands:
ls [options] List my issues
start <issue> Start working on an issue.
stop <issue> Stop working on an issue.
running List issues in progress.
search <term> Find issues.
assign <issue> Assign a issue to me.
[
"redis-brain.coffee",
"tweet.coffee",
"shipit.coffee",
"heroku-status.coffee",
"cleverbot.coffee",
"thebattle.coffee",
"haters.coffee",
"ferengi_rules_of_acquisition.coffee",
"beeradvocate.coffee",
1 list item
2 another list item
3 yet another list item
3.1 here is a decimal list item
4 this is the fourth list itemm
5 and so on
diff --git a/chatroom.js b/chatroom.js
index df3d7c4..cdaccc6 100644
--- a/chatroom.js
+++ b/chatroom.js
@@ -16,7 +16,7 @@ Drupal.chatroom.initialiseChat = function(chat) {
var chat = Drupal.settings.chatroom.chats[this.id.replace(/^edit-chatroom-message-entry-box-/, '')];
var messageText = $('#edit-chatroom-message-entry-box-' + chat.cid).val().replace(/^\s+|\s+$/g, '');
var anonNameText = '';
- if (messageText && e.keyCode == 13 && !e.shiftKey && !e.ctrlKey) {
+ if (messageText && e.keyCode === 13 && !e.shiftKey && !e.ctrlKey) {
Drupal.chatroom.addPreviousMessageToBoard = function(message) {
// Check for multiple chat windows
if ($.isArray(Drupal.settings.chatroom.chats)) {
for (var key in Drupal.settings.chatroom.chats) {
if (Drupal.settings.chatroom.chats[key].cid === message.cid) {
var chat = Drupal.settings.chatroom.chats[key];
}
}
}
else {
/*global desc, task, jake, fail, complete */
(function() {
"use strict";
desc("Build");
task("default", ["lint"], function() {});
desc("Lint");
task("lint", [], function() {
var lint = require("./build/lint/lint_runner.js");
Severity minor
profiles/chat/modules/contrib/chatroom/chatroom.module:
+156: [minor] Use an indent of 2 spaces, with no tabs
+426: [normal] Use "elseif" in place of "else if"
+593: [minor] Potential problem: use the Form API to prevent against CSRF attacks. If you need to use $_POST variables, ensure they are fully sanitized if displayed by using check_plain(), !f
ilter_xss() or similar.
+603: [minor] Potential problem: use the Form API to prevent against CSRF attacks. If you need to use $_POST variables, ensure they are fully sanitized if displayed by using check_plain(), !f
ilter_xss() or similar.
+743: [normal] use stdClass caseCapitalization, it's the one exception to the mixed case style standard
@sprice
sprice / random.js
Created June 18, 2012 22:58
Create a random string. (node.js)
var crypto = require('crypto');
crypto.randomBytes(64, function(ex, buf) {
if (ex) throw ex;
console.log(buf.toString('hex'));
});
#!/bin/bash
fortune | say