9a9900a41379d1ae22dad65f354cebd239e01909

RE: flattr: Since we force https on the internet facing site, with the http link there was a warning from the browser about 'mixed mode content' . Using https://api.flattr.com/button/button-static-50x60.png caused the image to disappear if one only accepts strong ciphers in the browser (e.g. security.tls.version.min set to 2 in Firefox). It would look like we were doing something wrong even though it's not us, so that's not a viable option. Looking over https://flattr.com/terms it seems that there's no problem with our hosting it ourselves. It's also a tiny image besides. Now to email flattr to strengthen the crypto on their site...
To run locally (for testing purposes): - Install proxychains, configure it for Tor - Pull in the dependencies: $ proxychains ./setup_venv.sh (you can also pull them non-anon by leaving out proxychains) - Compile translations (if you want to see them): $ ./compile-messages.sh - Start the webserver: $ ./runserver.py - Open the site at http://localhost:5000/ # MIRROR OPERATORS # If you want to mirror the I2P website, thanks! Here is a checklist: - Do not edit any of the files in i2p2www/ - In particular, do not change the CANONICAL_DOMAIN variable in i2p2www/__init__.py, it needs to point to the official site for SEO. - The only variable you may need to edit is MTNURL in etc/update.vars (if your Monotone server tunnel is listening on a different port). - If you want to enable caching, copy i2p2www/settings.py.sample to i2p2www/settings.py and edit appropriately. - Add ./site-updater.sh to your crontab. This will keep the site updated, recompile the translations when necessary, and touch a file in /tmp/ (look in etc/update.vars for the filename, your webserver should restart WSGI when the timestamp of this file changes).
Description
Languages
HTML
81.1%
Python
8.2%
CSS
5.7%
TeX
4.1%
Shell
0.6%
Other
0.2%