@@ -16,44 +16,44 @@ |
||
| 16 | 16 | */ |
| 17 | 17 | |
| 18 | 18 | function boincwork_rules_event_info() { |
| 19 | - return array( |
|
| 19 | + return array( |
|
| 20 | 20 | 'boincwork_circular_merge_error' => array( |
| 21 | - 'label' => bts('A circular merge of hosts was attempted with error.', array(), NULL, 'boinc:rule-event'), |
|
| 22 | - 'module' => 'BOINCwork', |
|
| 23 | - 'arguments' => rules_events_hook_boincwork_arguments(), |
|
| 21 | + 'label' => bts('A circular merge of hosts was attempted with error.', array(), NULL, 'boinc:rule-event'), |
|
| 22 | + 'module' => 'BOINCwork', |
|
| 23 | + 'arguments' => rules_events_hook_boincwork_arguments(), |
|
| 24 | 24 | ), |
| 25 | 25 | 'boincwork_zombie_merge_error' => array( |
| 26 | - 'label' => bts('A host merge into a zombie host was attempted with error.', array(), NULL, 'boinc:rule-event'), |
|
| 27 | - 'module' => 'BOINCwork', |
|
| 28 | - 'arguments' => rules_events_hook_boincwork_arguments(), |
|
| 26 | + 'label' => bts('A host merge into a zombie host was attempted with error.', array(), NULL, 'boinc:rule-event'), |
|
| 27 | + 'module' => 'BOINCwork', |
|
| 28 | + 'arguments' => rules_events_hook_boincwork_arguments(), |
|
| 29 | 29 | ), |
| 30 | - ); |
|
| 30 | + ); |
|
| 31 | 31 | } |
| 32 | 32 | |
| 33 | 33 | /** |
| 34 | 34 | * Arguments suitable for boincwork |
| 35 | 35 | **/ |
| 36 | 36 | function rules_events_hook_boincwork_arguments() { |
| 37 | - return array( |
|
| 37 | + return array( |
|
| 38 | 38 | 'oldhost_id' => array( |
| 39 | - 'type' => 'number', |
|
| 40 | - 'label' => 'old host id', |
|
| 41 | - 'required' => TRUE, |
|
| 39 | + 'type' => 'number', |
|
| 40 | + 'label' => 'old host id', |
|
| 41 | + 'required' => TRUE, |
|
| 42 | 42 | ), |
| 43 | 43 | 'targethost_id' => array( |
| 44 | - 'type' => 'number', |
|
| 45 | - 'label' => 'target host id', |
|
| 46 | - 'required' => TRUE, |
|
| 44 | + 'type' => 'number', |
|
| 45 | + 'label' => 'target host id', |
|
| 46 | + 'required' => TRUE, |
|
| 47 | 47 | ), |
| 48 | - ) + rules_events_hook_boincwork_adminnotify_argument(); |
|
| 48 | + ) + rules_events_hook_boincwork_adminnotify_argument(); |
|
| 49 | 49 | } |
| 50 | 50 | |
| 51 | 51 | function rules_events_hook_boincwork_adminnotify_argument() { |
| 52 | - return array( |
|
| 52 | + return array( |
|
| 53 | 53 | 'subject_tag' => array( |
| 54 | - 'type' => 'string', |
|
| 55 | - 'label' => 'Subject tag for email filtering', |
|
| 56 | - 'required' => TRUE, |
|
| 54 | + 'type' => 'string', |
|
| 55 | + 'label' => 'Subject tag for email filtering', |
|
| 56 | + 'required' => TRUE, |
|
| 57 | 57 | ), |
| 58 | - ) + rules_events_global_user_argument(); |
|
| 58 | + ) + rules_events_global_user_argument(); |
|
| 59 | 59 | } |
| 60 | 60 | \ No newline at end of file |
@@ -286,11 +286,11 @@ |
||
| 286 | 286 | |
| 287 | 287 | require_once("../inc/account_ownership.inc"); |
| 288 | 288 | if (file_exists($account_ownership_private_key_file_path)) { |
| 289 | - // If the server has keys configured show the account ownership form |
|
| 290 | - row2( |
|
| 291 | - tra("Account Ownership"), |
|
| 292 | - "<a href=\"account_ownership.php?$url_tokens\">Generate ownership proof</a>" |
|
| 293 | - ); |
|
| 289 | + // If the server has keys configured show the account ownership form |
|
| 290 | + row2( |
|
| 291 | + tra("Account Ownership"), |
|
| 292 | + "<a href=\"account_ownership.php?$url_tokens\">Generate ownership proof</a>" |
|
| 293 | + ); |
|
| 294 | 294 | } |
| 295 | 295 | |
| 296 | 296 | } |
@@ -28,140 +28,140 @@ |
||
| 28 | 28 | check_tokens($user->authenticator); |
| 29 | 29 | |
| 30 | 30 | function account_ownership_action($user) { |
| 31 | - // POST request - the user has submitted the form. |
|
| 32 | - page_head(tra("Proof of account ownership results"), null, null, null, boinc_recaptcha_get_head_extra()); |
|
| 33 | - |
|
| 34 | - global $recaptcha_private_key; |
|
| 35 | - if ($recaptcha_private_key) { |
|
| 36 | - // Recaptcha is enabled on the BOINC server |
|
| 37 | - if (!boinc_recaptcha_isValidated($recaptcha_private_key)) { |
|
| 38 | - // The user failed to solve the recaptcha prompt - redirect them to an error message! |
|
| 39 | - error_page( |
|
| 40 | - tra("Your reCAPTCHA response was not correct. Please try again.") |
|
| 41 | - ); |
|
| 42 | - } |
|
| 43 | - } |
|
| 44 | - |
|
| 45 | - // Input is passed in from the openssl_sign_form |
|
| 46 | - $user_data = htmlentities(post_str("user_data", true), ENT_QUOTES, "UTF-8"); // Convert special characters to html equivelant |
|
| 47 | - |
|
| 48 | - if ((strlen($user_data) > 0) && (strlen($user_data) <= 4096)) { |
|
| 49 | - require_once("../inc/account_ownership.inc"); |
|
| 50 | - // Check that the private key file exists where specified. If not, redirect to error page. |
|
| 51 | - if (!file_exists($account_ownership_private_key_file_path)) { |
|
| 52 | - error_page(tra("The proof of account ownership feature is not set up properly. Contact the project administrator to resolve the issue.")); |
|
| 53 | - } |
|
| 54 | - |
|
| 55 | - // Check that the public key file exists where specified. If not, redirect to error page. |
|
| 56 | - if (!file_exists($account_ownership_public_key_file_path)) { |
|
| 57 | - error_page(tra("The proof of account ownership feature is not set up properly. Contact the project administrator to resolve the issue.")); |
|
| 58 | - } |
|
| 59 | - |
|
| 60 | - $privkey = fopen($account_ownership_private_key_file_path, "r"); // Opening private key file |
|
| 61 | - if (!isset($privkey) || empty($privkey)) { |
|
| 31 | + // POST request - the user has submitted the form. |
|
| 32 | + page_head(tra("Proof of account ownership results"), null, null, null, boinc_recaptcha_get_head_extra()); |
|
| 33 | + |
|
| 34 | + global $recaptcha_private_key; |
|
| 35 | + if ($recaptcha_private_key) { |
|
| 36 | + // Recaptcha is enabled on the BOINC server |
|
| 37 | + if (!boinc_recaptcha_isValidated($recaptcha_private_key)) { |
|
| 38 | + // The user failed to solve the recaptcha prompt - redirect them to an error message! |
|
| 39 | + error_page( |
|
| 40 | + tra("Your reCAPTCHA response was not correct. Please try again.") |
|
| 41 | + ); |
|
| 42 | + } |
|
| 43 | + } |
|
| 44 | + |
|
| 45 | + // Input is passed in from the openssl_sign_form |
|
| 46 | + $user_data = htmlentities(post_str("user_data", true), ENT_QUOTES, "UTF-8"); // Convert special characters to html equivelant |
|
| 47 | + |
|
| 48 | + if ((strlen($user_data) > 0) && (strlen($user_data) <= 4096)) { |
|
| 49 | + require_once("../inc/account_ownership.inc"); |
|
| 50 | + // Check that the private key file exists where specified. If not, redirect to error page. |
|
| 51 | + if (!file_exists($account_ownership_private_key_file_path)) { |
|
| 52 | + error_page(tra("The proof of account ownership feature is not set up properly. Contact the project administrator to resolve the issue.")); |
|
| 53 | + } |
|
| 54 | + |
|
| 55 | + // Check that the public key file exists where specified. If not, redirect to error page. |
|
| 56 | + if (!file_exists($account_ownership_public_key_file_path)) { |
|
| 57 | + error_page(tra("The proof of account ownership feature is not set up properly. Contact the project administrator to resolve the issue.")); |
|
| 58 | + } |
|
| 59 | + |
|
| 60 | + $privkey = fopen($account_ownership_private_key_file_path, "r"); // Opening private key file |
|
| 61 | + if (!isset($privkey) || empty($privkey)) { |
|
| 62 | 62 | error_page(tra("The proof of account ownership feature is not set up properly. Contact the project administrator to resolve the issue.")); |
| 63 | - } |
|
| 64 | - $privkey_contents = fread($privkey, 8192); // Reading contents of private key into var |
|
| 65 | - fclose($privkey); // Closing private key file |
|
| 63 | + } |
|
| 64 | + $privkey_contents = fread($privkey, 8192); // Reading contents of private key into var |
|
| 65 | + fclose($privkey); // Closing private key file |
|
| 66 | 66 | |
| 67 | - $userid = $user->id; // Retrieving the user's UserId |
|
| 68 | - $message_data = "$userid $user_data"; // Create the message which will be signed. |
|
| 67 | + $userid = $user->id; // Retrieving the user's UserId |
|
| 68 | + $message_data = "$userid $user_data"; // Create the message which will be signed. |
|
| 69 | 69 | |
| 70 | - $private_key_pem = openssl_pkey_get_private($privkey_contents); // Loading the private key into memory |
|
| 71 | - openssl_sign($message_data, $signature, $private_key_pem, OPENSSL_ALGO_SHA512); // Compute signature using SHA512 |
|
| 72 | - openssl_free_key($private_key_pem); // Free the private key from memory for additional security |
|
| 70 | + $private_key_pem = openssl_pkey_get_private($privkey_contents); // Loading the private key into memory |
|
| 71 | + openssl_sign($message_data, $signature, $private_key_pem, OPENSSL_ALGO_SHA512); // Compute signature using SHA512 |
|
| 72 | + openssl_free_key($private_key_pem); // Free the private key from memory for additional security |
|
| 73 | 73 | |
| 74 | - $pubkey = fopen($account_ownership_public_key_file_path, "r"); // Open public key file |
|
| 75 | - if ((!isset($pubkey)) || empty($pubkey)) { |
|
| 74 | + $pubkey = fopen($account_ownership_public_key_file_path, "r"); // Open public key file |
|
| 75 | + if ((!isset($pubkey)) || empty($pubkey)) { |
|
| 76 | 76 | error_page(tra("The proof of account ownership feature is not set up properly. Contact the project administrator to resolve the issue.")); |
| 77 | - } |
|
| 78 | - $pubkey_contents = fread($pubkey, 8192); // Read contents to var |
|
| 79 | - fclose($pubkey); // Close pub key file |
|
| 80 | - |
|
| 81 | - $base64_sig = base64_encode($signature); // Base64 encode the generated signature to enable safe output to text file. |
|
| 82 | - $decoded_sig = base64_decode($base64_sig); // Decode base64 sig for use in sig_verification |
|
| 83 | - $pubkeyid = openssl_pkey_get_public($pubkey_contents); // fetch public key into memory |
|
| 84 | - $sig_verification = openssl_verify($message_data, $decoded_sig, $pubkeyid, OPENSSL_ALGO_SHA512); // Verify that the generated signature against the original data, using the public key. |
|
| 85 | - openssl_free_key($pubkeyid); // Free the public key from memory |
|
| 86 | - |
|
| 87 | - // Check if signature was successfully validated |
|
| 88 | - if ($sig_verification == 1) { |
|
| 89 | - $url_tokens = url_tokens($user->authenticator); |
|
| 90 | - // The generated signature has been successfully verified using the public key. |
|
| 91 | - global $master_url; // Define global master_url variable for use in output |
|
| 92 | - echo "<p>Do not share this information with anyone other than the external system which has requested this proof of account ownership.</p>"; |
|
| 93 | - echo "<textarea rows='13' cols='50' id='result_textbox'><account_ownership_verification>\n<master_url>$master_url</master_url>\n<msg>$message_data</msg>\n<signature>$base64_sig</signature>\n</account_ownership_verification></textarea>"; |
|
| 94 | - echo "<br/><br/><button class='btn btn-success' onclick='copy_result_textbox()'>Copy text</button>"; |
|
| 95 | - echo "<a href='account_ownership.php?$url_tokens'><button class='btn btn-default'>Go back</button></a>"; |
|
| 96 | - echo '<script type="text/javascript">'; |
|
| 97 | - echo 'function copy_result_textbox() { |
|
| 77 | + } |
|
| 78 | + $pubkey_contents = fread($pubkey, 8192); // Read contents to var |
|
| 79 | + fclose($pubkey); // Close pub key file |
|
| 80 | + |
|
| 81 | + $base64_sig = base64_encode($signature); // Base64 encode the generated signature to enable safe output to text file. |
|
| 82 | + $decoded_sig = base64_decode($base64_sig); // Decode base64 sig for use in sig_verification |
|
| 83 | + $pubkeyid = openssl_pkey_get_public($pubkey_contents); // fetch public key into memory |
|
| 84 | + $sig_verification = openssl_verify($message_data, $decoded_sig, $pubkeyid, OPENSSL_ALGO_SHA512); // Verify that the generated signature against the original data, using the public key. |
|
| 85 | + openssl_free_key($pubkeyid); // Free the public key from memory |
|
| 86 | + |
|
| 87 | + // Check if signature was successfully validated |
|
| 88 | + if ($sig_verification == 1) { |
|
| 89 | + $url_tokens = url_tokens($user->authenticator); |
|
| 90 | + // The generated signature has been successfully verified using the public key. |
|
| 91 | + global $master_url; // Define global master_url variable for use in output |
|
| 92 | + echo "<p>Do not share this information with anyone other than the external system which has requested this proof of account ownership.</p>"; |
|
| 93 | + echo "<textarea rows='13' cols='50' id='result_textbox'><account_ownership_verification>\n<master_url>$master_url</master_url>\n<msg>$message_data</msg>\n<signature>$base64_sig</signature>\n</account_ownership_verification></textarea>"; |
|
| 94 | + echo "<br/><br/><button class='btn btn-success' onclick='copy_result_textbox()'>Copy text</button>"; |
|
| 95 | + echo "<a href='account_ownership.php?$url_tokens'><button class='btn btn-default'>Go back</button></a>"; |
|
| 96 | + echo '<script type="text/javascript">'; |
|
| 97 | + echo 'function copy_result_textbox() { |
|
| 98 | 98 | var target_textbox = document.getElementById("result_textbox"); |
| 99 | 99 | target_textbox.select(); |
| 100 | 100 | document.execCommand("copy"); |
| 101 | 101 | alert("Copied to clipboard"); |
| 102 | 102 | }'; |
| 103 | - echo '</script>'; |
|
| 104 | - page_tail(); |
|
| 105 | - |
|
| 106 | - } elseif ($sig_verification == 0) { |
|
| 107 | - // The generated signature has not been verified. The private/public keys do not match. |
|
| 108 | - error_page(tra("Signature verification failed. Contact the project administrator to resolve the issue.")); |
|
| 109 | - } else { |
|
| 110 | - // Something has gone wrong & an error has occurred. |
|
| 111 | - error_page(tra("An error occurred during the signature verification. Contact the project administrator to resolve the issue.")); |
|
| 112 | - } |
|
| 113 | - } else { |
|
| 114 | - // User data input invalid |
|
| 115 | - error_page(tra("Invalid input. User input must have a length > 0 and < 4096. <form><input type='button' value='Go back!'' onclick='history.back()'></form>")); |
|
| 116 | - } |
|
| 103 | + echo '</script>'; |
|
| 104 | + page_tail(); |
|
| 105 | + |
|
| 106 | + } elseif ($sig_verification == 0) { |
|
| 107 | + // The generated signature has not been verified. The private/public keys do not match. |
|
| 108 | + error_page(tra("Signature verification failed. Contact the project administrator to resolve the issue.")); |
|
| 109 | + } else { |
|
| 110 | + // Something has gone wrong & an error has occurred. |
|
| 111 | + error_page(tra("An error occurred during the signature verification. Contact the project administrator to resolve the issue.")); |
|
| 112 | + } |
|
| 113 | + } else { |
|
| 114 | + // User data input invalid |
|
| 115 | + error_page(tra("Invalid input. User input must have a length > 0 and < 4096. <form><input type='button' value='Go back!'' onclick='history.back()'></form>")); |
|
| 116 | + } |
|
| 117 | 117 | } |
| 118 | 118 | |
| 119 | 119 | function account_ownership_form($user) { |
| 120 | - // GET request - the user has navigated to the page. |
|
| 121 | - page_head(tra("Generate proof of account ownership"), null, null, null, boinc_recaptcha_get_head_extra()); |
|
| 122 | - |
|
| 123 | - if ($user) { // Verify the user is logged in |
|
| 124 | - require_once("../inc/account_ownership.inc"); |
|
| 125 | - |
|
| 126 | - if (!file_exists($account_ownership_private_key_file_path)) { |
|
| 127 | - // Check that the private key file exists where specified. If not, redirect to error page. |
|
| 128 | - error_page(tra("The proof of account ownership feature is not set up properly. Contact the project administrator to resolve the issue.")); |
|
| 129 | - } |
|
| 130 | - |
|
| 131 | - if (!file_exists($account_ownership_public_key_file_path)) { |
|
| 132 | - // Check that the public key file exists where specified. If not, redirect to error page. |
|
| 133 | - error_page(tra("The proof of account ownership feature is not set up properly. Contact the project administrator to resolve the issue.")); |
|
| 134 | - } |
|
| 135 | - |
|
| 136 | - echo "<p>This tool is designed to create a proof of account ownership for external systems.</p>"; |
|
| 137 | - |
|
| 138 | - global $recaptcha_public_key; |
|
| 139 | - if ($recaptcha_public_key) { |
|
| 140 | - // Recaptcha configured |
|
| 141 | - echo "<p>Enter a message with length less than 4096 characters into the input textbox below, solve the captcha then click the 'Generate' button.</p>"; |
|
| 142 | - } else { |
|
| 143 | - // Recaptcha not configured |
|
| 144 | - echo "<p>Enter a message with length less than 4096 characters into the input textbox below then click the 'Generate' button.</p>"; |
|
| 145 | - } |
|
| 146 | - echo "<p>A textbox will then appear which contains your proof of account ownership."; |
|
| 147 | - echo "<form method=post action=account_ownership.php>"; |
|
| 148 | - |
|
| 149 | - echo form_tokens($user->authenticator); |
|
| 150 | - echo "<textarea rows='4' cols='50' name=user_data type=text size=20 placeholder='Enter text'></textarea><br/><br/>"; |
|
| 151 | - |
|
| 152 | - if ($recaptcha_public_key) { |
|
| 153 | - // Trigger recaptcha! |
|
| 154 | - form_general("", boinc_recaptcha_get_html($recaptcha_public_key)); |
|
| 155 | - } |
|
| 156 | - |
|
| 157 | - echo "<input class=\"btn btn-success\" type=submit value='".tra("Generate")."'>"; |
|
| 158 | - echo "</form><br/><hr/>"; |
|
| 159 | - } else { |
|
| 160 | - // The user is not logged in! |
|
| 161 | - echo "<p>You need to be logged in to use this functionality.</p>"; |
|
| 162 | - } |
|
| 163 | - |
|
| 164 | - page_tail(); |
|
| 120 | + // GET request - the user has navigated to the page. |
|
| 121 | + page_head(tra("Generate proof of account ownership"), null, null, null, boinc_recaptcha_get_head_extra()); |
|
| 122 | + |
|
| 123 | + if ($user) { // Verify the user is logged in |
|
| 124 | + require_once("../inc/account_ownership.inc"); |
|
| 125 | + |
|
| 126 | + if (!file_exists($account_ownership_private_key_file_path)) { |
|
| 127 | + // Check that the private key file exists where specified. If not, redirect to error page. |
|
| 128 | + error_page(tra("The proof of account ownership feature is not set up properly. Contact the project administrator to resolve the issue.")); |
|
| 129 | + } |
|
| 130 | + |
|
| 131 | + if (!file_exists($account_ownership_public_key_file_path)) { |
|
| 132 | + // Check that the public key file exists where specified. If not, redirect to error page. |
|
| 133 | + error_page(tra("The proof of account ownership feature is not set up properly. Contact the project administrator to resolve the issue.")); |
|
| 134 | + } |
|
| 135 | + |
|
| 136 | + echo "<p>This tool is designed to create a proof of account ownership for external systems.</p>"; |
|
| 137 | + |
|
| 138 | + global $recaptcha_public_key; |
|
| 139 | + if ($recaptcha_public_key) { |
|
| 140 | + // Recaptcha configured |
|
| 141 | + echo "<p>Enter a message with length less than 4096 characters into the input textbox below, solve the captcha then click the 'Generate' button.</p>"; |
|
| 142 | + } else { |
|
| 143 | + // Recaptcha not configured |
|
| 144 | + echo "<p>Enter a message with length less than 4096 characters into the input textbox below then click the 'Generate' button.</p>"; |
|
| 145 | + } |
|
| 146 | + echo "<p>A textbox will then appear which contains your proof of account ownership."; |
|
| 147 | + echo "<form method=post action=account_ownership.php>"; |
|
| 148 | + |
|
| 149 | + echo form_tokens($user->authenticator); |
|
| 150 | + echo "<textarea rows='4' cols='50' name=user_data type=text size=20 placeholder='Enter text'></textarea><br/><br/>"; |
|
| 151 | + |
|
| 152 | + if ($recaptcha_public_key) { |
|
| 153 | + // Trigger recaptcha! |
|
| 154 | + form_general("", boinc_recaptcha_get_html($recaptcha_public_key)); |
|
| 155 | + } |
|
| 156 | + |
|
| 157 | + echo "<input class=\"btn btn-success\" type=submit value='".tra("Generate")."'>"; |
|
| 158 | + echo "</form><br/><hr/>"; |
|
| 159 | + } else { |
|
| 160 | + // The user is not logged in! |
|
| 161 | + echo "<p>You need to be logged in to use this functionality.</p>"; |
|
| 162 | + } |
|
| 163 | + |
|
| 164 | + page_tail(); |
|
| 165 | 165 | } |
| 166 | 166 | |
| 167 | 167 | if ($_SERVER['REQUEST_METHOD'] === 'POST') { |
@@ -16,29 +16,29 @@ discard block |
||
| 16 | 16 | */ |
| 17 | 17 | |
| 18 | 18 | function flag_abuse_reason_flag_default_flags() { |
| 19 | - $flags = array(); |
|
| 20 | - module_load_include('inc', 'flag_abuse_reason', 'includes/flag_abuse_reason.flag_default'); |
|
| 21 | - _flag_abuse_reason_abuse_node_flags($flags); |
|
| 22 | - _flag_abuse_reason_abuse_comment_flags($flags); |
|
| 23 | - _flag_abuse_reason_abuse_user_flags($flags); |
|
| 24 | - return $flags; |
|
| 19 | + $flags = array(); |
|
| 20 | + module_load_include('inc', 'flag_abuse_reason', 'includes/flag_abuse_reason.flag_default'); |
|
| 21 | + _flag_abuse_reason_abuse_node_flags($flags); |
|
| 22 | + _flag_abuse_reason_abuse_comment_flags($flags); |
|
| 23 | + _flag_abuse_reason_abuse_user_flags($flags); |
|
| 24 | + return $flags; |
|
| 25 | 25 | } |
| 26 | 26 | |
| 27 | 27 | /** |
| 28 | 28 | * Implementation of hook_views_api(). |
| 29 | 29 | */ |
| 30 | 30 | function flag_abuse_reason_views_api() { |
| 31 | - return array( |
|
| 31 | + return array( |
|
| 32 | 32 | 'api' => 2.0, |
| 33 | 33 | 'path' => drupal_get_path('module', 'flag_abuse_reason') . '/includes', |
| 34 | - ); |
|
| 34 | + ); |
|
| 35 | 35 | } |
| 36 | 36 | |
| 37 | 37 | /** |
| 38 | 38 | * Implementation of hook_perm(). |
| 39 | 39 | */ |
| 40 | 40 | function flag_abuse_reason_perm() { |
| 41 | - return array('reset abuse flags'); |
|
| 41 | + return array('reset abuse flags'); |
|
| 42 | 42 | } |
| 43 | 43 | |
| 44 | 44 | /** |
@@ -47,14 +47,14 @@ discard block |
||
| 47 | 47 | * Here we change our flag event/action to 'reset'. |
| 48 | 48 | */ |
| 49 | 49 | function flag_abuse_reason_preprocess_flag(&$vars) { |
| 50 | - drupal_add_js(drupal_get_path('module', 'flag_abuse_reason') . "/includes/flag_abuse_reason.js"); |
|
| 51 | - drupal_add_css(drupal_get_path('module', 'flag_abuse_reason') . "/css/flag_abuse_reason.css"); |
|
| 52 | - $myuser = $vars['user']; |
|
| 53 | - $metaflags = array('abuse_node_meta', 'abuse_comment_meta', 'abuse_user_meta'); |
|
| 50 | + drupal_add_js(drupal_get_path('module', 'flag_abuse_reason') . "/includes/flag_abuse_reason.js"); |
|
| 51 | + drupal_add_css(drupal_get_path('module', 'flag_abuse_reason') . "/css/flag_abuse_reason.css"); |
|
| 52 | + $myuser = $vars['user']; |
|
| 53 | + $metaflags = array('abuse_node_meta', 'abuse_comment_meta', 'abuse_user_meta'); |
|
| 54 | 54 | |
| 55 | - // permmission check instead of a role |
|
| 56 | - // Is this one of our abuse flags? |
|
| 57 | - if (in_array($vars['flag']->name, $metaflags)) { |
|
| 55 | + // permmission check instead of a role |
|
| 56 | + // Is this one of our abuse flags? |
|
| 57 | + if (in_array($vars['flag']->name, $metaflags)) { |
|
| 58 | 58 | |
| 59 | 59 | // count the number of flags on this content |
| 60 | 60 | $count = db_result(db_query("SELECT COUNT(*) FROM {flag_content} WHERE content_id=%d AND fid=%d", $vars['content_id'], $vars['flag']->fid)); |
@@ -62,41 +62,41 @@ discard block |
||
| 62 | 62 | // If the variable <flagname>-<contentid> is set, then Reset |
| 63 | 63 | // completely. |
| 64 | 64 | if (variable_get($vars['flag']->name.'-'.$vars['content_id'], FALSE)) { |
| 65 | - if (user_access('reset abuse flags', $myuser)) { |
|
| 65 | + if (user_access('reset abuse flags', $myuser)) { |
|
| 66 | 66 | $vars['action'] = 'none'; |
| 67 | 67 | $vars['link_text'] = t('Reset Completely'); |
| 68 | 68 | $vars['link_title'] = t('Reset everying, allows users to re-flag content.'); |
| 69 | - } |
|
| 70 | - else { |
|
| 69 | + } |
|
| 70 | + else { |
|
| 71 | 71 | $vars['action'] = 'none'; |
| 72 | 72 | $vars['link_text'] = t('Locked'); |
| 73 | 73 | $vars['link_title'] = t('Reporting locked by moderator.'); |
| 74 | 74 | $vars['link'] = array(); |
| 75 | 75 | $vars['link_href'] = ''; |
| 76 | 76 | $vars['flag_classes'] = 'flag style-like-link'; |
| 77 | - } |
|
| 77 | + } |
|
| 78 | 78 | } |
| 79 | 79 | else { |
| 80 | - // If there are flags on this content, clear the flags and |
|
| 81 | - // lock the content. |
|
| 82 | - if (user_access('reset abuse flags', $myuser)) { |
|
| 80 | + // If there are flags on this content, clear the flags and |
|
| 81 | + // lock the content. |
|
| 82 | + if (user_access('reset abuse flags', $myuser)) { |
|
| 83 | 83 | if ($count>0) { |
| 84 | - $vars['action'] = 'reset'; |
|
| 85 | - $vars['link_text'] = t('Clear Reports and Lock'); |
|
| 86 | - $vars['link_title'] = t('Remove all flags on this content and prevent any new flagging.'); |
|
| 84 | + $vars['action'] = 'reset'; |
|
| 85 | + $vars['link_text'] = t('Clear Reports and Lock'); |
|
| 86 | + $vars['link_title'] = t('Remove all flags on this content and prevent any new flagging.'); |
|
| 87 | 87 | } |
| 88 | 88 | // Otherwise the link is shown but has no effect. |
| 89 | 89 | else { |
| 90 | - $vars['action'] = 'none'; |
|
| 91 | - $vars['link_text'] = t('No abuse reports'); |
|
| 92 | - $vars['link_title'] = t('This content has no abuse reports. Link does nothing.'); |
|
| 90 | + $vars['action'] = 'none'; |
|
| 91 | + $vars['link_text'] = t('No abuse reports'); |
|
| 92 | + $vars['link_title'] = t('This content has no abuse reports. Link does nothing.'); |
|
| 93 | 93 | $vars['link'] = array(); |
| 94 | 94 | $vars['link_href'] = ''; |
| 95 | 95 | $vars['flag_classes'] = 'flag style-like-link'; |
| 96 | 96 | } |
| 97 | - } |
|
| 97 | + } |
|
| 98 | + } |
|
| 98 | 99 | } |
| 99 | - } |
|
| 100 | 100 | } |
| 101 | 101 | |
| 102 | 102 | /** |
@@ -106,72 +106,72 @@ discard block |
||
| 106 | 106 | * we want to remove all flags. http://drupal.org/node/327901#comment-1085685 |
| 107 | 107 | */ |
| 108 | 108 | function flag_abuse_reason_flag($event, $flag, $content_id, $account) { |
| 109 | - $metaflags = array('abuse_node_meta', 'abuse_comment_meta', 'abuse_user_meta'); |
|
| 109 | + $metaflags = array('abuse_node_meta', 'abuse_comment_meta', 'abuse_user_meta'); |
|
| 110 | 110 | |
| 111 | - // For privileged users, check permissions and reset flags |
|
| 112 | - // permission check instead of a role. |
|
| 113 | - if (user_access('reset abuse flags', $account)) { |
|
| 111 | + // For privileged users, check permissions and reset flags |
|
| 112 | + // permission check instead of a role. |
|
| 113 | + if (user_access('reset abuse flags', $account)) { |
|
| 114 | 114 | // Is this one of our abuse flags? |
| 115 | 115 | if (in_array($flag->name, $metaflags)) { |
| 116 | 116 | |
| 117 | - // Reset the flags completely. |
|
| 118 | - if (variable_get($flag->name.'-'.$content_id, FALSE)) { |
|
| 117 | + // Reset the flags completely. |
|
| 118 | + if (variable_get($flag->name.'-'.$content_id, FALSE)) { |
|
| 119 | 119 | // Since the user flags the content again, we need to unflag it. |
| 120 | 120 | flag_reset_flag($flag, $content_id); |
| 121 | 121 | drupal_set_message(bts('INFO: Reset everything. Users may reflag this content.', array(), NULL, 'boinc:flag-abuse-reset'), 'info'); |
| 122 | 122 | // unlock flag; effectively resets flags for this content |
| 123 | 123 | variable_del($flag->name.'-'.$content_id); |
| 124 | - } |
|
| 125 | - else { |
|
| 124 | + } |
|
| 125 | + else { |
|
| 126 | 126 | // Clear and Lock all flags on this content. |
| 127 | 127 | $dbresult = db_query("SELECT DISTINCT fid FROM {flag_content} WHERE content_id = %d", $content_id); |
| 128 | 128 | $rows = 0; |
| 129 | 129 | while ($myfid = db_fetch_array($dbresult)) { |
| 130 | - $myflag = flag_get_flag(NULL, array_pop($myfid)); |
|
| 131 | - $rows += flag_reset_flag($myflag, $content_id); |
|
| 130 | + $myflag = flag_get_flag(NULL, array_pop($myfid)); |
|
| 131 | + $rows += flag_reset_flag($myflag, $content_id); |
|
| 132 | 132 | } |
| 133 | 133 | if ($rows) { |
| 134 | - // This user actually flags the content as well, so it may |
|
| 135 | - // confuse the user if they reset what they thought was one |
|
| 136 | - // flag and we report two. |
|
| 137 | - $rows--; |
|
| 138 | - drupal_set_message(bts('INFO: Cleared !rows flags. Content is now locked and may not be reflagged.', array('!rows' => $rows), NULL, 'boinc:flag-abuse-reset'), 'info'); |
|
| 139 | - |
|
| 140 | - // This is the line which sets a Drupal variable which |
|
| 141 | - // prevents the flag link from showing again for all |
|
| 142 | - // users. Effectively preventing the content from being |
|
| 143 | - // flagged again. |
|
| 144 | - variable_set($flag->name.'-'.$content_id, TRUE); |
|
| 134 | + // This user actually flags the content as well, so it may |
|
| 135 | + // confuse the user if they reset what they thought was one |
|
| 136 | + // flag and we report two. |
|
| 137 | + $rows--; |
|
| 138 | + drupal_set_message(bts('INFO: Cleared !rows flags. Content is now locked and may not be reflagged.', array('!rows' => $rows), NULL, 'boinc:flag-abuse-reset'), 'info'); |
|
| 139 | + |
|
| 140 | + // This is the line which sets a Drupal variable which |
|
| 141 | + // prevents the flag link from showing again for all |
|
| 142 | + // users. Effectively preventing the content from being |
|
| 143 | + // flagged again. |
|
| 144 | + variable_set($flag->name.'-'.$content_id, TRUE); |
|
| 145 | + } |
|
| 145 | 146 | } |
| 146 | - } |
|
| 147 | 147 | |
| 148 | 148 | } |
| 149 | - } |
|
| 150 | - // Normal users may cancel their all their reported flags on this |
|
| 151 | - // content. |
|
| 152 | - else { |
|
| 149 | + } |
|
| 150 | + // Normal users may cancel their all their reported flags on this |
|
| 151 | + // content. |
|
| 152 | + else { |
|
| 153 | 153 | if ( ($event=='unflag') && (in_array($flag->name, $metaflags)) ) { |
| 154 | - $allflags = flag_get_user_flags($flag->content_type, $content_id, $account->uid); |
|
| 155 | - foreach ($allflags as $subflag) { |
|
| 154 | + $allflags = flag_get_user_flags($flag->content_type, $content_id, $account->uid); |
|
| 155 | + foreach ($allflags as $subflag) { |
|
| 156 | 156 | $myflag = flag_get_flag(NULL, $subflag->fid); |
| 157 | 157 | $rc = $myflag->flag('unflag', $content_id, $account); |
| 158 | - } |
|
| 158 | + } |
|
| 159 | + } |
|
| 159 | 160 | } |
| 160 | - } |
|
| 161 | 161 | } |
| 162 | 162 | |
| 163 | 163 | /** |
| 164 | 164 | * Implementation of hook_form_FORM_ID_alter(). |
| 165 | 165 | */ |
| 166 | 166 | function flag_abuse_reason_form_flag_confirm_alter(&$form, &$form_state) { |
| 167 | - // Permmission check instead of a role. |
|
| 168 | - if (user_access('reset abuse flags', $account)) { |
|
| 167 | + // Permmission check instead of a role. |
|
| 168 | + if (user_access('reset abuse flags', $account)) { |
|
| 169 | 169 | $flag_name = $form['flag_name']['#value']; |
| 170 | 170 | // Is this one of our abuse flags? |
| 171 | 171 | if (in_array($flag_name, array('abuse_node_meta', 'abuse_comment_meta', 'abuse_user_meta'))) { |
| 172 | - drupal_set_title(t('Flag reset')); |
|
| 173 | - $form['description']['#value'] = t('Are you sure you want to reset all offensive flag on this content? Once doing so, users will not be able to flag this content again.'); |
|
| 174 | - $form['actions']['submit']['#value'] = t('Reset flags'); |
|
| 172 | + drupal_set_title(t('Flag reset')); |
|
| 173 | + $form['description']['#value'] = t('Are you sure you want to reset all offensive flag on this content? Once doing so, users will not be able to flag this content again.'); |
|
| 174 | + $form['actions']['submit']['#value'] = t('Reset flags'); |
|
| 175 | + } |
|
| 175 | 176 | } |
| 176 | - } |
|
| 177 | 177 | } |
@@ -23,15 +23,15 @@ discard block |
||
| 23 | 23 | * Node Flags |
| 24 | 24 | * * * * * * * * * * * * * * * * * * * * * * * * * * * */ |
| 25 | 25 | function _flag_abuse_reason_abuse_node_flags(&$flags) { |
| 26 | - // Exported flag: "Node Abuse 1 SPAM". |
|
| 27 | - $flags['abuse_node_1'] = array( |
|
| 26 | + // Exported flag: "Node Abuse 1 SPAM". |
|
| 27 | + $flags['abuse_node_1'] = array( |
|
| 28 | 28 | 'content_type' => 'node', |
| 29 | 29 | 'title' => 'Node Abuse 1 SPAM', |
| 30 | 30 | 'global' => FALSE, |
| 31 | 31 | 'types' => array( |
| 32 | - '0' => 'forum', |
|
| 33 | - '1' => 'news', |
|
| 34 | - '2' => 'team_forum', |
|
| 32 | + '0' => 'forum', |
|
| 33 | + '1' => 'news', |
|
| 34 | + '2' => 'team_forum', |
|
| 35 | 35 | ), |
| 36 | 36 | 'flag_short' => 'Flag as SPAM', |
| 37 | 37 | 'flag_long' => 'Flag this content SPAM.', |
@@ -42,12 +42,12 @@ discard block |
||
| 42 | 42 | 'unflag_denied_text' => '', |
| 43 | 43 | 'link_type' => 'toggle', |
| 44 | 44 | 'roles' => array( |
| 45 | - 'flag' => array( |
|
| 45 | + 'flag' => array( |
|
| 46 | 46 | '0' => 2, |
| 47 | - ), |
|
| 48 | - 'unflag' => array( |
|
| 47 | + ), |
|
| 48 | + 'unflag' => array( |
|
| 49 | 49 | '0' => 2, |
| 50 | - ), |
|
| 50 | + ), |
|
| 51 | 51 | ), |
| 52 | 52 | 'weight' => 0, |
| 53 | 53 | 'show_on_page' => 0, |
@@ -57,19 +57,19 @@ discard block |
||
| 57 | 57 | 'i18n' => '0', |
| 58 | 58 | 'module' => 'boinc_standard', |
| 59 | 59 | 'locked' => array( |
| 60 | - '0' => 'name', |
|
| 60 | + '0' => 'name', |
|
| 61 | 61 | ), |
| 62 | 62 | 'api_version' => 2, |
| 63 | - ); |
|
| 64 | - // Exported flag: "Node Abuse 2 Link". |
|
| 65 | - $flags['abuse_node_2'] = array( |
|
| 63 | + ); |
|
| 64 | + // Exported flag: "Node Abuse 2 Link". |
|
| 65 | + $flags['abuse_node_2'] = array( |
|
| 66 | 66 | 'content_type' => 'node', |
| 67 | 67 | 'title' => 'Node Abuse 2 Link', |
| 68 | 68 | 'global' => FALSE, |
| 69 | 69 | 'types' => array( |
| 70 | - '0' => 'forum', |
|
| 71 | - '1' => 'news', |
|
| 72 | - '2' => 'team_forum', |
|
| 70 | + '0' => 'forum', |
|
| 71 | + '1' => 'news', |
|
| 72 | + '2' => 'team_forum', |
|
| 73 | 73 | ), |
| 74 | 74 | 'flag_short' => 'Report as abusive link', |
| 75 | 75 | 'flag_long' => 'Flag this content as abusive link.', |
@@ -80,12 +80,12 @@ discard block |
||
| 80 | 80 | 'unflag_denied_text' => '', |
| 81 | 81 | 'link_type' => 'toggle', |
| 82 | 82 | 'roles' => array( |
| 83 | - 'flag' => array( |
|
| 83 | + 'flag' => array( |
|
| 84 | 84 | '0' => 2, |
| 85 | - ), |
|
| 86 | - 'unflag' => array( |
|
| 85 | + ), |
|
| 86 | + 'unflag' => array( |
|
| 87 | 87 | '0' => 2, |
| 88 | - ), |
|
| 88 | + ), |
|
| 89 | 89 | ), |
| 90 | 90 | 'weight' => 0, |
| 91 | 91 | 'show_on_page' => 0, |
@@ -95,19 +95,19 @@ discard block |
||
| 95 | 95 | 'i18n' => '0', |
| 96 | 96 | 'module' => 'boinc_standard', |
| 97 | 97 | 'locked' => array( |
| 98 | - '0' => 'name', |
|
| 98 | + '0' => 'name', |
|
| 99 | 99 | ), |
| 100 | 100 | 'api_version' => 2, |
| 101 | - ); |
|
| 102 | - // Exported flag: "Node Abuse 3 Hostile". |
|
| 103 | - $flags['abuse_node_3'] = array( |
|
| 101 | + ); |
|
| 102 | + // Exported flag: "Node Abuse 3 Hostile". |
|
| 103 | + $flags['abuse_node_3'] = array( |
|
| 104 | 104 | 'content_type' => 'node', |
| 105 | 105 | 'title' => 'Node Abuse 3 Hostile', |
| 106 | 106 | 'global' => FALSE, |
| 107 | 107 | 'types' => array( |
| 108 | - '0' => 'forum', |
|
| 109 | - '1' => 'news', |
|
| 110 | - '2' => 'team_forum', |
|
| 108 | + '0' => 'forum', |
|
| 109 | + '1' => 'news', |
|
| 110 | + '2' => 'team_forum', |
|
| 111 | 111 | ), |
| 112 | 112 | 'flag_short' => 'Flag as hostile', |
| 113 | 113 | 'flag_long' => 'Flag this content as hostile.', |
@@ -118,12 +118,12 @@ discard block |
||
| 118 | 118 | 'unflag_denied_text' => '', |
| 119 | 119 | 'link_type' => 'toggle', |
| 120 | 120 | 'roles' => array( |
| 121 | - 'flag' => array( |
|
| 121 | + 'flag' => array( |
|
| 122 | 122 | '0' => 2, |
| 123 | - ), |
|
| 124 | - 'unflag' => array( |
|
| 123 | + ), |
|
| 124 | + 'unflag' => array( |
|
| 125 | 125 | '0' => 2, |
| 126 | - ), |
|
| 126 | + ), |
|
| 127 | 127 | ), |
| 128 | 128 | 'weight' => 0, |
| 129 | 129 | 'show_on_page' => 0, |
@@ -133,19 +133,19 @@ discard block |
||
| 133 | 133 | 'i18n' => '0', |
| 134 | 134 | 'module' => 'boinc_standard', |
| 135 | 135 | 'locked' => array( |
| 136 | - '0' => 'name', |
|
| 136 | + '0' => 'name', |
|
| 137 | 137 | ), |
| 138 | 138 | 'api_version' => 2, |
| 139 | - ); |
|
| 140 | - // Exported flag: "Node Abuse 4 Not Kid Friendly". |
|
| 141 | - $flags['abuse_node_4'] = array( |
|
| 139 | + ); |
|
| 140 | + // Exported flag: "Node Abuse 4 Not Kid Friendly". |
|
| 141 | + $flags['abuse_node_4'] = array( |
|
| 142 | 142 | 'content_type' => 'node', |
| 143 | 143 | 'title' => 'Node Abuse 4 Not Kid Friendly', |
| 144 | 144 | 'global' => FALSE, |
| 145 | 145 | 'types' => array( |
| 146 | - '0' => 'forum', |
|
| 147 | - '1' => 'news', |
|
| 148 | - '2' => 'team_forum', |
|
| 146 | + '0' => 'forum', |
|
| 147 | + '1' => 'news', |
|
| 148 | + '2' => 'team_forum', |
|
| 149 | 149 | ), |
| 150 | 150 | 'flag_short' => 'Flag as not kid-friendly', |
| 151 | 151 | 'flag_long' => 'Flag this content as not kid-friendly.', |
@@ -156,12 +156,12 @@ discard block |
||
| 156 | 156 | 'unflag_denied_text' => '', |
| 157 | 157 | 'link_type' => 'toggle', |
| 158 | 158 | 'roles' => array( |
| 159 | - 'flag' => array( |
|
| 159 | + 'flag' => array( |
|
| 160 | 160 | '0' => 2, |
| 161 | - ), |
|
| 162 | - 'unflag' => array( |
|
| 161 | + ), |
|
| 162 | + 'unflag' => array( |
|
| 163 | 163 | '0' => 2, |
| 164 | - ), |
|
| 164 | + ), |
|
| 165 | 165 | ), |
| 166 | 166 | 'weight' => 0, |
| 167 | 167 | 'show_on_page' => 0, |
@@ -171,19 +171,19 @@ discard block |
||
| 171 | 171 | 'i18n' => '0', |
| 172 | 172 | 'module' => 'boinc_standard', |
| 173 | 173 | 'locked' => array( |
| 174 | - '0' => 'name', |
|
| 174 | + '0' => 'name', |
|
| 175 | 175 | ), |
| 176 | 176 | 'api_version' => 2, |
| 177 | - ); |
|
| 178 | - // Exported flag: "Node Abuse 5 Other". |
|
| 179 | - $flags['abuse_node_5'] = array( |
|
| 177 | + ); |
|
| 178 | + // Exported flag: "Node Abuse 5 Other". |
|
| 179 | + $flags['abuse_node_5'] = array( |
|
| 180 | 180 | 'content_type' => 'node', |
| 181 | 181 | 'title' => 'Node Abuse 5 Other', |
| 182 | 182 | 'global' => FALSE, |
| 183 | 183 | 'types' => array( |
| 184 | - '0' => 'forum', |
|
| 185 | - '1' => 'news', |
|
| 186 | - '2' => 'team_forum', |
|
| 184 | + '0' => 'forum', |
|
| 185 | + '1' => 'news', |
|
| 186 | + '2' => 'team_forum', |
|
| 187 | 187 | ), |
| 188 | 188 | 'flag_short' => 'Flag as other', |
| 189 | 189 | 'flag_long' => 'Flag this content - other reason.', |
@@ -194,12 +194,12 @@ discard block |
||
| 194 | 194 | 'unflag_denied_text' => '', |
| 195 | 195 | 'link_type' => 'toggle', |
| 196 | 196 | 'roles' => array( |
| 197 | - 'flag' => array( |
|
| 197 | + 'flag' => array( |
|
| 198 | 198 | '0' => 2, |
| 199 | - ), |
|
| 200 | - 'unflag' => array( |
|
| 199 | + ), |
|
| 200 | + 'unflag' => array( |
|
| 201 | 201 | '0' => 2, |
| 202 | - ), |
|
| 202 | + ), |
|
| 203 | 203 | ), |
| 204 | 204 | 'weight' => 0, |
| 205 | 205 | 'show_on_page' => 0, |
@@ -209,19 +209,19 @@ discard block |
||
| 209 | 209 | 'i18n' => '0', |
| 210 | 210 | 'module' => 'boinc_standard', |
| 211 | 211 | 'locked' => array( |
| 212 | - '0' => 'name', |
|
| 212 | + '0' => 'name', |
|
| 213 | 213 | ), |
| 214 | 214 | 'api_version' => 2, |
| 215 | - ); |
|
| 216 | - // Exported flag: "Node Abuse meta". |
|
| 217 | - $flags['abuse_node_meta'] = array( |
|
| 215 | + ); |
|
| 216 | + // Exported flag: "Node Abuse meta". |
|
| 217 | + $flags['abuse_node_meta'] = array( |
|
| 218 | 218 | 'content_type' => 'node', |
| 219 | 219 | 'title' => 'Node Abuse meta', |
| 220 | 220 | 'global' => FALSE, |
| 221 | 221 | 'types' => array( |
| 222 | - '0' => 'forum', |
|
| 223 | - '1' => 'news', |
|
| 224 | - '2' => 'team_forum', |
|
| 222 | + '0' => 'forum', |
|
| 223 | + '1' => 'news', |
|
| 224 | + '2' => 'team_forum', |
|
| 225 | 225 | ), |
| 226 | 226 | 'flag_short' => 'Report', |
| 227 | 227 | 'flag_long' => 'Report content', |
@@ -232,12 +232,12 @@ discard block |
||
| 232 | 232 | 'unflag_denied_text' => '', |
| 233 | 233 | 'link_type' => 'toggle', |
| 234 | 234 | 'roles' => array( |
| 235 | - 'flag' => array( |
|
| 235 | + 'flag' => array( |
|
| 236 | 236 | '0' => 2, |
| 237 | - ), |
|
| 238 | - 'unflag' => array( |
|
| 237 | + ), |
|
| 238 | + 'unflag' => array( |
|
| 239 | 239 | '0' => 2, |
| 240 | - ), |
|
| 240 | + ), |
|
| 241 | 241 | ), |
| 242 | 242 | 'weight' => 0, |
| 243 | 243 | 'show_on_page' => 1, |
@@ -247,27 +247,27 @@ discard block |
||
| 247 | 247 | 'i18n' => '0', |
| 248 | 248 | 'module' => 'boinc_standard', |
| 249 | 249 | 'locked' => array( |
| 250 | - '0' => 'name', |
|
| 250 | + '0' => 'name', |
|
| 251 | 251 | ), |
| 252 | 252 | 'api_version' => 2, |
| 253 | - ); |
|
| 253 | + ); |
|
| 254 | 254 | |
| 255 | - return $flags; |
|
| 255 | + return $flags; |
|
| 256 | 256 | } |
| 257 | 257 | |
| 258 | 258 | /* * * * * * * * * * * * * * * * * * * * * * * * * * * * * |
| 259 | 259 | * Comment Flags |
| 260 | 260 | * * * * * * * * * * * * * * * * * * * * * * * * * * * */ |
| 261 | 261 | function _flag_abuse_reason_abuse_comment_flags(&$flags) { |
| 262 | - // Exported flag: "Comment Abuse 1 SPAM". |
|
| 263 | - $flags['abuse_comment_1'] = array( |
|
| 262 | + // Exported flag: "Comment Abuse 1 SPAM". |
|
| 263 | + $flags['abuse_comment_1'] = array( |
|
| 264 | 264 | 'content_type' => 'comment', |
| 265 | 265 | 'title' => 'Comment Abuse 1 SPAM', |
| 266 | 266 | 'global' => FALSE, |
| 267 | 267 | 'types' => array( |
| 268 | - '0' => 'forum', |
|
| 269 | - '1' => 'news', |
|
| 270 | - '2' => 'team_forum', |
|
| 268 | + '0' => 'forum', |
|
| 269 | + '1' => 'news', |
|
| 270 | + '2' => 'team_forum', |
|
| 271 | 271 | ), |
| 272 | 272 | 'flag_short' => 'Flag as SPAM', |
| 273 | 273 | 'flag_long' => 'Flag this comment as SPAM.', |
@@ -278,31 +278,31 @@ discard block |
||
| 278 | 278 | 'unflag_denied_text' => '', |
| 279 | 279 | 'link_type' => 'toggle', |
| 280 | 280 | 'roles' => array( |
| 281 | - 'flag' => array( |
|
| 281 | + 'flag' => array( |
|
| 282 | 282 | '0' => 2, |
| 283 | - ), |
|
| 284 | - 'unflag' => array( |
|
| 283 | + ), |
|
| 284 | + 'unflag' => array( |
|
| 285 | 285 | '0' => 2, |
| 286 | - ), |
|
| 286 | + ), |
|
| 287 | 287 | ), |
| 288 | 288 | 'weight' => 0, |
| 289 | 289 | 'access_author' => '', |
| 290 | 290 | 'show_on_comment' => 0, |
| 291 | 291 | 'module' => 'boinc_standard', |
| 292 | 292 | 'locked' => array( |
| 293 | - '0' => 'name', |
|
| 293 | + '0' => 'name', |
|
| 294 | 294 | ), |
| 295 | 295 | 'api_version' => 2, |
| 296 | - ); |
|
| 297 | - // Exported flag: "Comment Abuse 2 LINK". |
|
| 298 | - $flags['abuse_comment_2'] = array( |
|
| 296 | + ); |
|
| 297 | + // Exported flag: "Comment Abuse 2 LINK". |
|
| 298 | + $flags['abuse_comment_2'] = array( |
|
| 299 | 299 | 'content_type' => 'comment', |
| 300 | 300 | 'title' => 'Comment Abuse 2 LINK', |
| 301 | 301 | 'global' => FALSE, |
| 302 | 302 | 'types' => array( |
| 303 | - '0' => 'forum', |
|
| 304 | - '1' => 'news', |
|
| 305 | - '2' => 'team_forum', |
|
| 303 | + '0' => 'forum', |
|
| 304 | + '1' => 'news', |
|
| 305 | + '2' => 'team_forum', |
|
| 306 | 306 | ), |
| 307 | 307 | 'flag_short' => 'Flag as abusive link', |
| 308 | 308 | 'flag_long' => 'Flag this comment with abusive link.', |
@@ -313,31 +313,31 @@ discard block |
||
| 313 | 313 | 'unflag_denied_text' => '', |
| 314 | 314 | 'link_type' => 'toggle', |
| 315 | 315 | 'roles' => array( |
| 316 | - 'flag' => array( |
|
| 316 | + 'flag' => array( |
|
| 317 | 317 | '0' => 2, |
| 318 | - ), |
|
| 319 | - 'unflag' => array( |
|
| 318 | + ), |
|
| 319 | + 'unflag' => array( |
|
| 320 | 320 | '0' => 2, |
| 321 | - ), |
|
| 321 | + ), |
|
| 322 | 322 | ), |
| 323 | 323 | 'weight' => 0, |
| 324 | 324 | 'access_author' => '', |
| 325 | 325 | 'show_on_comment' => 0, |
| 326 | 326 | 'module' => 'boinc_standard', |
| 327 | 327 | 'locked' => array( |
| 328 | - '0' => 'name', |
|
| 328 | + '0' => 'name', |
|
| 329 | 329 | ), |
| 330 | 330 | 'api_version' => 2, |
| 331 | - ); |
|
| 332 | - // Exported flag: "Comment Abuse 3 Hostile". |
|
| 333 | - $flags['abuse_comment_3'] = array( |
|
| 331 | + ); |
|
| 332 | + // Exported flag: "Comment Abuse 3 Hostile". |
|
| 333 | + $flags['abuse_comment_3'] = array( |
|
| 334 | 334 | 'content_type' => 'comment', |
| 335 | 335 | 'title' => 'Comment Abuse 3 Hostile', |
| 336 | 336 | 'global' => FALSE, |
| 337 | 337 | 'types' => array( |
| 338 | - '0' => 'forum', |
|
| 339 | - '1' => 'news', |
|
| 340 | - '2' => 'team_forum', |
|
| 338 | + '0' => 'forum', |
|
| 339 | + '1' => 'news', |
|
| 340 | + '2' => 'team_forum', |
|
| 341 | 341 | ), |
| 342 | 342 | 'flag_short' => 'Flag as hostile', |
| 343 | 343 | 'flag_long' => 'Flag this comment as hostile.', |
@@ -348,31 +348,31 @@ discard block |
||
| 348 | 348 | 'unflag_denied_text' => '', |
| 349 | 349 | 'link_type' => 'toggle', |
| 350 | 350 | 'roles' => array( |
| 351 | - 'flag' => array( |
|
| 351 | + 'flag' => array( |
|
| 352 | 352 | '0' => 2, |
| 353 | - ), |
|
| 354 | - 'unflag' => array( |
|
| 353 | + ), |
|
| 354 | + 'unflag' => array( |
|
| 355 | 355 | '0' => 2, |
| 356 | - ), |
|
| 356 | + ), |
|
| 357 | 357 | ), |
| 358 | 358 | 'weight' => 0, |
| 359 | 359 | 'access_author' => '', |
| 360 | 360 | 'show_on_comment' => 0, |
| 361 | 361 | 'module' => 'boinc_standard', |
| 362 | 362 | 'locked' => array( |
| 363 | - '0' => 'name', |
|
| 363 | + '0' => 'name', |
|
| 364 | 364 | ), |
| 365 | 365 | 'api_version' => 2, |
| 366 | - ); |
|
| 367 | - // Exported flag: "Comment Abuse 4 Not Kid Friendly". |
|
| 368 | - $flags['abuse_comment_4'] = array( |
|
| 366 | + ); |
|
| 367 | + // Exported flag: "Comment Abuse 4 Not Kid Friendly". |
|
| 368 | + $flags['abuse_comment_4'] = array( |
|
| 369 | 369 | 'content_type' => 'comment', |
| 370 | 370 | 'title' => 'Comment Abuse 4 Not Kid Friendly', |
| 371 | 371 | 'global' => FALSE, |
| 372 | 372 | 'types' => array( |
| 373 | - '0' => 'forum', |
|
| 374 | - '1' => 'news', |
|
| 375 | - '2' => 'team_forum', |
|
| 373 | + '0' => 'forum', |
|
| 374 | + '1' => 'news', |
|
| 375 | + '2' => 'team_forum', |
|
| 376 | 376 | ), |
| 377 | 377 | 'flag_short' => 'Flag as not kid-friendly', |
| 378 | 378 | 'flag_long' => 'Flag this comment as not kid-friendly.', |
@@ -383,31 +383,31 @@ discard block |
||
| 383 | 383 | 'unflag_denied_text' => '', |
| 384 | 384 | 'link_type' => 'toggle', |
| 385 | 385 | 'roles' => array( |
| 386 | - 'flag' => array( |
|
| 386 | + 'flag' => array( |
|
| 387 | 387 | '0' => 2, |
| 388 | - ), |
|
| 389 | - 'unflag' => array( |
|
| 388 | + ), |
|
| 389 | + 'unflag' => array( |
|
| 390 | 390 | '0' => 2, |
| 391 | - ), |
|
| 391 | + ), |
|
| 392 | 392 | ), |
| 393 | 393 | 'weight' => 0, |
| 394 | 394 | 'access_author' => '', |
| 395 | 395 | 'show_on_comment' => 0, |
| 396 | 396 | 'module' => 'boinc_standard', |
| 397 | 397 | 'locked' => array( |
| 398 | - '0' => 'name', |
|
| 398 | + '0' => 'name', |
|
| 399 | 399 | ), |
| 400 | 400 | 'api_version' => 2, |
| 401 | - ); |
|
| 402 | - // Exported flag: "Comment Abuse 5 Other". |
|
| 403 | - $flags['abuse_comment_5'] = array( |
|
| 401 | + ); |
|
| 402 | + // Exported flag: "Comment Abuse 5 Other". |
|
| 403 | + $flags['abuse_comment_5'] = array( |
|
| 404 | 404 | 'content_type' => 'comment', |
| 405 | 405 | 'title' => 'Comment Abuse 5 Other', |
| 406 | 406 | 'global' => FALSE, |
| 407 | 407 | 'types' => array( |
| 408 | - '0' => 'forum', |
|
| 409 | - '1' => 'news', |
|
| 410 | - '2' => 'team_forum', |
|
| 408 | + '0' => 'forum', |
|
| 409 | + '1' => 'news', |
|
| 410 | + '2' => 'team_forum', |
|
| 411 | 411 | ), |
| 412 | 412 | 'flag_short' => 'Flag as other', |
| 413 | 413 | 'flag_long' => 'Flag this comment - other reason', |
@@ -418,31 +418,31 @@ discard block |
||
| 418 | 418 | 'unflag_denied_text' => '', |
| 419 | 419 | 'link_type' => 'toggle', |
| 420 | 420 | 'roles' => array( |
| 421 | - 'flag' => array( |
|
| 421 | + 'flag' => array( |
|
| 422 | 422 | '0' => 2, |
| 423 | - ), |
|
| 424 | - 'unflag' => array( |
|
| 423 | + ), |
|
| 424 | + 'unflag' => array( |
|
| 425 | 425 | '0' => 2, |
| 426 | - ), |
|
| 426 | + ), |
|
| 427 | 427 | ), |
| 428 | 428 | 'weight' => 0, |
| 429 | 429 | 'access_author' => '', |
| 430 | 430 | 'show_on_comment' => 0, |
| 431 | 431 | 'module' => 'boinc_standard', |
| 432 | 432 | 'locked' => array( |
| 433 | - '0' => 'name', |
|
| 433 | + '0' => 'name', |
|
| 434 | 434 | ), |
| 435 | 435 | 'api_version' => 2, |
| 436 | - ); |
|
| 437 | - // Exported flag: "Comment Abuse meta". |
|
| 438 | - $flags['abuse_comment_meta'] = array( |
|
| 436 | + ); |
|
| 437 | + // Exported flag: "Comment Abuse meta". |
|
| 438 | + $flags['abuse_comment_meta'] = array( |
|
| 439 | 439 | 'content_type' => 'comment', |
| 440 | 440 | 'title' => 'Comment Abuse meta', |
| 441 | 441 | 'global' => '0', |
| 442 | 442 | 'types' => array( |
| 443 | - '0' => 'forum', |
|
| 444 | - '1' => 'news', |
|
| 445 | - '2' => 'team_forum', |
|
| 443 | + '0' => 'forum', |
|
| 444 | + '1' => 'news', |
|
| 445 | + '2' => 'team_forum', |
|
| 446 | 446 | ), |
| 447 | 447 | 'flag_short' => 'Report', |
| 448 | 448 | 'flag_long' => 'Report comment.', |
@@ -453,32 +453,32 @@ discard block |
||
| 453 | 453 | 'unflag_denied_text' => '', |
| 454 | 454 | 'link_type' => 'toggle', |
| 455 | 455 | 'roles' => array( |
| 456 | - 'flag' => array( |
|
| 456 | + 'flag' => array( |
|
| 457 | 457 | '0' => 2, |
| 458 | - ), |
|
| 459 | - 'unflag' => array( |
|
| 458 | + ), |
|
| 459 | + 'unflag' => array( |
|
| 460 | 460 | '0' => 2, |
| 461 | - ), |
|
| 461 | + ), |
|
| 462 | 462 | ), |
| 463 | 463 | 'weight' => 0, |
| 464 | 464 | 'access_author' => '', |
| 465 | 465 | 'show_on_comment' => 1, |
| 466 | 466 | 'module' => 'boinc_standard', |
| 467 | 467 | 'locked' => array( |
| 468 | - '0' => 'name', |
|
| 468 | + '0' => 'name', |
|
| 469 | 469 | ), |
| 470 | 470 | 'api_version' => 2, |
| 471 | - ); |
|
| 471 | + ); |
|
| 472 | 472 | |
| 473 | - return $flags; |
|
| 473 | + return $flags; |
|
| 474 | 474 | } |
| 475 | 475 | |
| 476 | 476 | /* * * * * * * * * * * * * * * * * * * * * * * * * * * * * |
| 477 | 477 | * User Flags |
| 478 | 478 | * * * * * * * * * * * * * * * * * * * * * * * * * * * */ |
| 479 | 479 | function _flag_abuse_reason_abuse_user_flags(&$flags) { |
| 480 | - // Exported flag: "User Abuse 1 SPAM". |
|
| 481 | - $flags['abuse_user_1'] = array( |
|
| 480 | + // Exported flag: "User Abuse 1 SPAM". |
|
| 481 | + $flags['abuse_user_1'] = array( |
|
| 482 | 482 | 'content_type' => 'user', |
| 483 | 483 | 'title' => 'User Abuse 1 SPAM', |
| 484 | 484 | 'global' => FALSE, |
@@ -492,24 +492,24 @@ discard block |
||
| 492 | 492 | 'unflag_denied_text' => '', |
| 493 | 493 | 'link_type' => 'toggle', |
| 494 | 494 | 'roles' => array( |
| 495 | - 'flag' => array( |
|
| 495 | + 'flag' => array( |
|
| 496 | 496 | '0' => 2, |
| 497 | - ), |
|
| 498 | - 'unflag' => array( |
|
| 497 | + ), |
|
| 498 | + 'unflag' => array( |
|
| 499 | 499 | '0' => 2, |
| 500 | - ), |
|
| 500 | + ), |
|
| 501 | 501 | ), |
| 502 | 502 | 'weight' => 0, |
| 503 | 503 | 'show_on_profile' => 0, |
| 504 | 504 | 'access_uid' => '', |
| 505 | 505 | 'module' => 'boinc_standard', |
| 506 | 506 | 'locked' => array( |
| 507 | - '0' => 'name', |
|
| 507 | + '0' => 'name', |
|
| 508 | 508 | ), |
| 509 | 509 | 'api_version' => 2, |
| 510 | - ); |
|
| 511 | - // Exported flag: "User Abuse 2 Link". |
|
| 512 | - $flags['abuse_user_2'] = array( |
|
| 510 | + ); |
|
| 511 | + // Exported flag: "User Abuse 2 Link". |
|
| 512 | + $flags['abuse_user_2'] = array( |
|
| 513 | 513 | 'content_type' => 'user', |
| 514 | 514 | 'title' => 'User Abuse 2 Link', |
| 515 | 515 | 'global' => FALSE, |
@@ -523,24 +523,24 @@ discard block |
||
| 523 | 523 | 'unflag_denied_text' => '', |
| 524 | 524 | 'link_type' => 'toggle', |
| 525 | 525 | 'roles' => array( |
| 526 | - 'flag' => array( |
|
| 526 | + 'flag' => array( |
|
| 527 | 527 | '0' => 2, |
| 528 | - ), |
|
| 529 | - 'unflag' => array( |
|
| 528 | + ), |
|
| 529 | + 'unflag' => array( |
|
| 530 | 530 | '0' => 2, |
| 531 | - ), |
|
| 531 | + ), |
|
| 532 | 532 | ), |
| 533 | 533 | 'weight' => 0, |
| 534 | 534 | 'show_on_profile' => 0, |
| 535 | 535 | 'access_uid' => '', |
| 536 | 536 | 'module' => 'boinc_standard', |
| 537 | 537 | 'locked' => array( |
| 538 | - '0' => 'name', |
|
| 538 | + '0' => 'name', |
|
| 539 | 539 | ), |
| 540 | 540 | 'api_version' => 2, |
| 541 | - ); |
|
| 542 | - // Exported flag: "User Abuse 3 Not Kid Friendly". |
|
| 543 | - $flags['abuse_user_3'] = array( |
|
| 541 | + ); |
|
| 542 | + // Exported flag: "User Abuse 3 Not Kid Friendly". |
|
| 543 | + $flags['abuse_user_3'] = array( |
|
| 544 | 544 | 'content_type' => 'user', |
| 545 | 545 | 'title' => 'User Abuse 3 Not Kid Friendly', |
| 546 | 546 | 'global' => FALSE, |
@@ -554,24 +554,24 @@ discard block |
||
| 554 | 554 | 'unflag_denied_text' => '', |
| 555 | 555 | 'link_type' => 'toggle', |
| 556 | 556 | 'roles' => array( |
| 557 | - 'flag' => array( |
|
| 557 | + 'flag' => array( |
|
| 558 | 558 | '0' => 2, |
| 559 | - ), |
|
| 560 | - 'unflag' => array( |
|
| 559 | + ), |
|
| 560 | + 'unflag' => array( |
|
| 561 | 561 | '0' => 2, |
| 562 | - ), |
|
| 562 | + ), |
|
| 563 | 563 | ), |
| 564 | 564 | 'weight' => 0, |
| 565 | 565 | 'show_on_profile' => 0, |
| 566 | 566 | 'access_uid' => '', |
| 567 | 567 | 'module' => 'boinc_standard', |
| 568 | 568 | 'locked' => array( |
| 569 | - '0' => 'name', |
|
| 569 | + '0' => 'name', |
|
| 570 | 570 | ), |
| 571 | 571 | 'api_version' => 2, |
| 572 | - ); |
|
| 573 | - // Exported flag: "User Abuse 4 Other". |
|
| 574 | - $flags['abuse_user_4'] = array( |
|
| 572 | + ); |
|
| 573 | + // Exported flag: "User Abuse 4 Other". |
|
| 574 | + $flags['abuse_user_4'] = array( |
|
| 575 | 575 | 'content_type' => 'user', |
| 576 | 576 | 'title' => 'User Abuse 4 Other', |
| 577 | 577 | 'global' => FALSE, |
@@ -585,24 +585,24 @@ discard block |
||
| 585 | 585 | 'unflag_denied_text' => '', |
| 586 | 586 | 'link_type' => 'toggle', |
| 587 | 587 | 'roles' => array( |
| 588 | - 'flag' => array( |
|
| 588 | + 'flag' => array( |
|
| 589 | 589 | '0' => 2, |
| 590 | - ), |
|
| 591 | - 'unflag' => array( |
|
| 590 | + ), |
|
| 591 | + 'unflag' => array( |
|
| 592 | 592 | '0' => 2, |
| 593 | - ), |
|
| 593 | + ), |
|
| 594 | 594 | ), |
| 595 | 595 | 'weight' => 0, |
| 596 | 596 | 'show_on_profile' => 0, |
| 597 | 597 | 'access_uid' => '', |
| 598 | 598 | 'module' => 'boinc_standard', |
| 599 | 599 | 'locked' => array( |
| 600 | - '0' => 'name', |
|
| 600 | + '0' => 'name', |
|
| 601 | 601 | ), |
| 602 | 602 | 'api_version' => 2, |
| 603 | - ); |
|
| 604 | - // Exported flag: "User Abuse Meta". |
|
| 605 | - $flags['abuse_user_meta'] = array( |
|
| 603 | + ); |
|
| 604 | + // Exported flag: "User Abuse Meta". |
|
| 605 | + $flags['abuse_user_meta'] = array( |
|
| 606 | 606 | 'content_type' => 'user', |
| 607 | 607 | 'title' => 'User Abuse Meta', |
| 608 | 608 | 'global' => FALSE, |
@@ -616,22 +616,22 @@ discard block |
||
| 616 | 616 | 'unflag_denied_text' => '', |
| 617 | 617 | 'link_type' => 'toggle', |
| 618 | 618 | 'roles' => array( |
| 619 | - 'flag' => array( |
|
| 619 | + 'flag' => array( |
|
| 620 | 620 | '0' => 2, |
| 621 | - ), |
|
| 622 | - 'unflag' => array( |
|
| 621 | + ), |
|
| 622 | + 'unflag' => array( |
|
| 623 | 623 | '0' => 2, |
| 624 | - ), |
|
| 624 | + ), |
|
| 625 | 625 | ), |
| 626 | 626 | 'weight' => 0, |
| 627 | 627 | 'show_on_profile' => 1, |
| 628 | 628 | 'access_uid' => '', |
| 629 | 629 | 'module' => 'boinc_standard', |
| 630 | 630 | 'locked' => array( |
| 631 | - '0' => 'name', |
|
| 631 | + '0' => 'name', |
|
| 632 | 632 | ), |
| 633 | 633 | 'api_version' => 2, |
| 634 | - ); |
|
| 634 | + ); |
|
| 635 | 635 | |
| 636 | - return $flags; |
|
| 636 | + return $flags; |
|
| 637 | 637 | } |
@@ -106,7 +106,7 @@ |
||
| 106 | 106 | } |
| 107 | 107 | if (!$checkct) { |
| 108 | 108 | error_log("Project configuration error! " . |
| 109 | - "'CONSENT_TYPE_ENROLL' disabled while 'account_creation_rpc_require_consent' enabled!" |
|
| 109 | + "'CONSENT_TYPE_ENROLL' disabled while 'account_creation_rpc_require_consent' enabled!" |
|
| 110 | 110 | ); |
| 111 | 111 | } |
| 112 | 112 | |
@@ -4,621 +4,621 @@ |
||
| 4 | 4 | * Implementation of hook_user_default_permissions(). |
| 5 | 5 | */ |
| 6 | 6 | function boinc_standard_user_default_permissions() { |
| 7 | - $permissions = array(); |
|
| 7 | + $permissions = array(); |
|
| 8 | 8 | |
| 9 | - // Exported permission: Use PHP input for field settings (dangerous - grant with care) |
|
| 10 | - $permissions['Use PHP input for field settings (dangerous - grant with care)'] = array( |
|
| 9 | + // Exported permission: Use PHP input for field settings (dangerous - grant with care) |
|
| 10 | + $permissions['Use PHP input for field settings (dangerous - grant with care)'] = array( |
|
| 11 | 11 | 'name' => 'Use PHP input for field settings (dangerous - grant with care)', |
| 12 | 12 | 'roles' => array( |
| 13 | - '0' => 'administrator', |
|
| 13 | + '0' => 'administrator', |
|
| 14 | 14 | ), |
| 15 | - ); |
|
| 15 | + ); |
|
| 16 | 16 | |
| 17 | - // Exported permission: access administration pages |
|
| 18 | - $permissions['access administration pages'] = array( |
|
| 17 | + // Exported permission: access administration pages |
|
| 18 | + $permissions['access administration pages'] = array( |
|
| 19 | 19 | 'name' => 'access administration pages', |
| 20 | 20 | 'roles' => array( |
| 21 | - '0' => 'administrator', |
|
| 21 | + '0' => 'administrator', |
|
| 22 | 22 | ), |
| 23 | - ); |
|
| 23 | + ); |
|
| 24 | 24 | |
| 25 | - // Exported permission: access all views |
|
| 26 | - $permissions['access all views'] = array( |
|
| 25 | + // Exported permission: access all views |
|
| 26 | + $permissions['access all views'] = array( |
|
| 27 | 27 | 'name' => 'access all views', |
| 28 | 28 | 'roles' => array( |
| 29 | - '0' => 'administrator', |
|
| 29 | + '0' => 'administrator', |
|
| 30 | 30 | ), |
| 31 | - ); |
|
| 31 | + ); |
|
| 32 | 32 | |
| 33 | - // Exported permission: access ckeditor |
|
| 34 | - $permissions['access ckeditor'] = array( |
|
| 33 | + // Exported permission: access ckeditor |
|
| 34 | + $permissions['access ckeditor'] = array( |
|
| 35 | 35 | 'name' => 'access ckeditor', |
| 36 | 36 | 'roles' => array( |
| 37 | - '0' => 'administrator', |
|
| 38 | - '1' => 'anonymous user', |
|
| 39 | - '2' => 'authenticated user', |
|
| 40 | - '3' => 'community member', |
|
| 41 | - '4' => 'content editor', |
|
| 42 | - '5' => 'moderator', |
|
| 43 | - '6' => 'verified contributor', |
|
| 37 | + '0' => 'administrator', |
|
| 38 | + '1' => 'anonymous user', |
|
| 39 | + '2' => 'authenticated user', |
|
| 40 | + '3' => 'community member', |
|
| 41 | + '4' => 'content editor', |
|
| 42 | + '5' => 'moderator', |
|
| 43 | + '6' => 'verified contributor', |
|
| 44 | 44 | ), |
| 45 | - ); |
|
| 45 | + ); |
|
| 46 | 46 | |
| 47 | - // Exported permission: access content |
|
| 48 | - $permissions['access content'] = array( |
|
| 47 | + // Exported permission: access content |
|
| 48 | + $permissions['access content'] = array( |
|
| 49 | 49 | 'name' => 'access content', |
| 50 | 50 | 'roles' => array( |
| 51 | - '0' => 'administrator', |
|
| 52 | - '1' => 'anonymous user', |
|
| 53 | - '2' => 'authenticated user', |
|
| 51 | + '0' => 'administrator', |
|
| 52 | + '1' => 'anonymous user', |
|
| 53 | + '2' => 'authenticated user', |
|
| 54 | 54 | ), |
| 55 | - ); |
|
| 55 | + ); |
|
| 56 | 56 | |
| 57 | - // Exported permission: access site reports |
|
| 58 | - $permissions['access site reports'] = array( |
|
| 57 | + // Exported permission: access site reports |
|
| 58 | + $permissions['access site reports'] = array( |
|
| 59 | 59 | 'name' => 'access site reports', |
| 60 | 60 | 'roles' => array( |
| 61 | - '0' => 'administrator', |
|
| 61 | + '0' => 'administrator', |
|
| 62 | 62 | ), |
| 63 | - ); |
|
| 63 | + ); |
|
| 64 | 64 | |
| 65 | - // Exported permission: administer actions |
|
| 66 | - $permissions['administer actions'] = array( |
|
| 65 | + // Exported permission: administer actions |
|
| 66 | + $permissions['administer actions'] = array( |
|
| 67 | 67 | 'name' => 'administer actions', |
| 68 | 68 | 'roles' => array( |
| 69 | - '0' => 'administrator', |
|
| 69 | + '0' => 'administrator', |
|
| 70 | 70 | ), |
| 71 | - ); |
|
| 71 | + ); |
|
| 72 | 72 | |
| 73 | - // Exported permission: administer advanced pane settings |
|
| 74 | - $permissions['administer advanced pane settings'] = array( |
|
| 73 | + // Exported permission: administer advanced pane settings |
|
| 74 | + $permissions['administer advanced pane settings'] = array( |
|
| 75 | 75 | 'name' => 'administer advanced pane settings', |
| 76 | 76 | 'roles' => array( |
| 77 | - '0' => 'administrator', |
|
| 77 | + '0' => 'administrator', |
|
| 78 | 78 | ), |
| 79 | - ); |
|
| 79 | + ); |
|
| 80 | 80 | |
| 81 | - // Exported permission: administer blocks |
|
| 82 | - $permissions['administer blocks'] = array( |
|
| 81 | + // Exported permission: administer blocks |
|
| 82 | + $permissions['administer blocks'] = array( |
|
| 83 | 83 | 'name' => 'administer blocks', |
| 84 | 84 | 'roles' => array( |
| 85 | - '0' => 'administrator', |
|
| 85 | + '0' => 'administrator', |
|
| 86 | 86 | ), |
| 87 | - ); |
|
| 87 | + ); |
|
| 88 | 88 | |
| 89 | - // Exported permission: administer ckeditor |
|
| 90 | - $permissions['administer ckeditor'] = array( |
|
| 89 | + // Exported permission: administer ckeditor |
|
| 90 | + $permissions['administer ckeditor'] = array( |
|
| 91 | 91 | 'name' => 'administer ckeditor', |
| 92 | 92 | 'roles' => array( |
| 93 | - '0' => 'administrator', |
|
| 93 | + '0' => 'administrator', |
|
| 94 | 94 | ), |
| 95 | - ); |
|
| 95 | + ); |
|
| 96 | 96 | |
| 97 | - // Exported permission: administer content types |
|
| 98 | - $permissions['administer content types'] = array( |
|
| 97 | + // Exported permission: administer content types |
|
| 98 | + $permissions['administer content types'] = array( |
|
| 99 | 99 | 'name' => 'administer content types', |
| 100 | 100 | 'roles' => array( |
| 101 | - '0' => 'administrator', |
|
| 101 | + '0' => 'administrator', |
|
| 102 | 102 | ), |
| 103 | - ); |
|
| 103 | + ); |
|
| 104 | 104 | |
| 105 | - // Exported permission: administer elysia_cron |
|
| 106 | - $permissions['administer elysia_cron'] = array( |
|
| 105 | + // Exported permission: administer elysia_cron |
|
| 106 | + $permissions['administer elysia_cron'] = array( |
|
| 107 | 107 | 'name' => 'administer elysia_cron', |
| 108 | 108 | 'roles' => array( |
| 109 | - '0' => 'administrator', |
|
| 109 | + '0' => 'administrator', |
|
| 110 | 110 | ), |
| 111 | - ); |
|
| 111 | + ); |
|
| 112 | 112 | |
| 113 | - // Exported permission: administer features |
|
| 114 | - $permissions['administer features'] = array( |
|
| 113 | + // Exported permission: administer features |
|
| 114 | + $permissions['administer features'] = array( |
|
| 115 | 115 | 'name' => 'administer features', |
| 116 | 116 | 'roles' => array( |
| 117 | - '0' => 'administrator', |
|
| 117 | + '0' => 'administrator', |
|
| 118 | 118 | ), |
| 119 | - ); |
|
| 119 | + ); |
|
| 120 | 120 | |
| 121 | - // Exported permission: administer files |
|
| 122 | - $permissions['administer files'] = array( |
|
| 121 | + // Exported permission: administer files |
|
| 122 | + $permissions['administer files'] = array( |
|
| 123 | 123 | 'name' => 'administer files', |
| 124 | 124 | 'roles' => array( |
| 125 | - '0' => 'administrator', |
|
| 125 | + '0' => 'administrator', |
|
| 126 | 126 | ), |
| 127 | - ); |
|
| 127 | + ); |
|
| 128 | 128 | |
| 129 | - // Exported permission: administer filters |
|
| 130 | - $permissions['administer filters'] = array( |
|
| 129 | + // Exported permission: administer filters |
|
| 130 | + $permissions['administer filters'] = array( |
|
| 131 | 131 | 'name' => 'administer filters', |
| 132 | 132 | 'roles' => array( |
| 133 | - '0' => 'administrator', |
|
| 133 | + '0' => 'administrator', |
|
| 134 | 134 | ), |
| 135 | - ); |
|
| 135 | + ); |
|
| 136 | 136 | |
| 137 | - // Exported permission: administer flags |
|
| 138 | - $permissions['administer flags'] = array( |
|
| 137 | + // Exported permission: administer flags |
|
| 138 | + $permissions['administer flags'] = array( |
|
| 139 | 139 | 'name' => 'administer flags', |
| 140 | 140 | 'roles' => array( |
| 141 | - '0' => 'administrator', |
|
| 141 | + '0' => 'administrator', |
|
| 142 | 142 | ), |
| 143 | - ); |
|
| 143 | + ); |
|
| 144 | 144 | |
| 145 | - // Exported permission: administer imce(execute PHP) |
|
| 146 | - $permissions['administer imce(execute PHP)'] = array( |
|
| 145 | + // Exported permission: administer imce(execute PHP) |
|
| 146 | + $permissions['administer imce(execute PHP)'] = array( |
|
| 147 | 147 | 'name' => 'administer imce(execute PHP)', |
| 148 | 148 | 'roles' => array( |
| 149 | - '0' => 'administrator', |
|
| 149 | + '0' => 'administrator', |
|
| 150 | 150 | ), |
| 151 | - ); |
|
| 151 | + ); |
|
| 152 | 152 | |
| 153 | - // Exported permission: administer menu |
|
| 154 | - $permissions['administer menu'] = array( |
|
| 153 | + // Exported permission: administer menu |
|
| 154 | + $permissions['administer menu'] = array( |
|
| 155 | 155 | 'name' => 'administer menu', |
| 156 | 156 | 'roles' => array( |
| 157 | - '0' => 'administrator', |
|
| 158 | - '1' => 'content editor', |
|
| 157 | + '0' => 'administrator', |
|
| 158 | + '1' => 'content editor', |
|
| 159 | 159 | ), |
| 160 | - ); |
|
| 160 | + ); |
|
| 161 | 161 | |
| 162 | - // Exported permission: administer mini panels |
|
| 163 | - $permissions['administer mini panels'] = array( |
|
| 162 | + // Exported permission: administer mini panels |
|
| 163 | + $permissions['administer mini panels'] = array( |
|
| 164 | 164 | 'name' => 'administer mini panels', |
| 165 | 165 | 'roles' => array( |
| 166 | - '0' => 'administrator', |
|
| 166 | + '0' => 'administrator', |
|
| 167 | 167 | ), |
| 168 | - ); |
|
| 168 | + ); |
|
| 169 | 169 | |
| 170 | - // Exported permission: administer nodes |
|
| 171 | - $permissions['administer nodes'] = array( |
|
| 170 | + // Exported permission: administer nodes |
|
| 171 | + $permissions['administer nodes'] = array( |
|
| 172 | 172 | 'name' => 'administer nodes', |
| 173 | 173 | 'roles' => array( |
| 174 | - '0' => 'administrator', |
|
| 174 | + '0' => 'administrator', |
|
| 175 | 175 | ), |
| 176 | - ); |
|
| 176 | + ); |
|
| 177 | 177 | |
| 178 | - // Exported permission: administer page manager |
|
| 179 | - $permissions['administer page manager'] = array( |
|
| 178 | + // Exported permission: administer page manager |
|
| 179 | + $permissions['administer page manager'] = array( |
|
| 180 | 180 | 'name' => 'administer page manager', |
| 181 | 181 | 'roles' => array( |
| 182 | - '0' => 'administrator', |
|
| 182 | + '0' => 'administrator', |
|
| 183 | 183 | ), |
| 184 | - ); |
|
| 184 | + ); |
|
| 185 | 185 | |
| 186 | - // Exported permission: administer pane access |
|
| 187 | - $permissions['administer pane access'] = array( |
|
| 186 | + // Exported permission: administer pane access |
|
| 187 | + $permissions['administer pane access'] = array( |
|
| 188 | 188 | 'name' => 'administer pane access', |
| 189 | 189 | 'roles' => array( |
| 190 | - '0' => 'administrator', |
|
| 190 | + '0' => 'administrator', |
|
| 191 | 191 | ), |
| 192 | - ); |
|
| 192 | + ); |
|
| 193 | 193 | |
| 194 | - // Exported permission: administer pane visibility |
|
| 195 | - $permissions['administer pane visibility'] = array( |
|
| 194 | + // Exported permission: administer pane visibility |
|
| 195 | + $permissions['administer pane visibility'] = array( |
|
| 196 | 196 | 'name' => 'administer pane visibility', |
| 197 | 197 | 'roles' => array( |
| 198 | - '0' => 'administrator', |
|
| 198 | + '0' => 'administrator', |
|
| 199 | 199 | ), |
| 200 | - ); |
|
| 200 | + ); |
|
| 201 | 201 | |
| 202 | - // Exported permission: administer panel-nodes |
|
| 203 | - $permissions['administer panel-nodes'] = array( |
|
| 202 | + // Exported permission: administer panel-nodes |
|
| 203 | + $permissions['administer panel-nodes'] = array( |
|
| 204 | 204 | 'name' => 'administer panel-nodes', |
| 205 | 205 | 'roles' => array( |
| 206 | - '0' => 'administrator', |
|
| 206 | + '0' => 'administrator', |
|
| 207 | 207 | ), |
| 208 | - ); |
|
| 208 | + ); |
|
| 209 | 209 | |
| 210 | - // Exported permission: administer panels layouts |
|
| 211 | - $permissions['administer panels layouts'] = array( |
|
| 210 | + // Exported permission: administer panels layouts |
|
| 211 | + $permissions['administer panels layouts'] = array( |
|
| 212 | 212 | 'name' => 'administer panels layouts', |
| 213 | 213 | 'roles' => array( |
| 214 | - '0' => 'administrator', |
|
| 214 | + '0' => 'administrator', |
|
| 215 | 215 | ), |
| 216 | - ); |
|
| 216 | + ); |
|
| 217 | 217 | |
| 218 | - // Exported permission: administer pathauto |
|
| 219 | - $permissions['administer pathauto'] = array( |
|
| 218 | + // Exported permission: administer pathauto |
|
| 219 | + $permissions['administer pathauto'] = array( |
|
| 220 | 220 | 'name' => 'administer pathauto', |
| 221 | 221 | 'roles' => array( |
| 222 | - '0' => 'administrator', |
|
| 222 | + '0' => 'administrator', |
|
| 223 | 223 | ), |
| 224 | - ); |
|
| 224 | + ); |
|
| 225 | 225 | |
| 226 | - // Exported permission: administer permissions |
|
| 227 | - $permissions['administer permissions'] = array( |
|
| 226 | + // Exported permission: administer permissions |
|
| 227 | + $permissions['administer permissions'] = array( |
|
| 228 | 228 | 'name' => 'administer permissions', |
| 229 | 229 | 'roles' => array( |
| 230 | - '0' => 'administrator', |
|
| 230 | + '0' => 'administrator', |
|
| 231 | 231 | ), |
| 232 | - ); |
|
| 232 | + ); |
|
| 233 | 233 | |
| 234 | - // Exported permission: administer rules |
|
| 235 | - $permissions['administer rules'] = array( |
|
| 234 | + // Exported permission: administer rules |
|
| 235 | + $permissions['administer rules'] = array( |
|
| 236 | 236 | 'name' => 'administer rules', |
| 237 | 237 | 'roles' => array( |
| 238 | - '0' => 'administrator', |
|
| 238 | + '0' => 'administrator', |
|
| 239 | 239 | ), |
| 240 | - ); |
|
| 240 | + ); |
|
| 241 | 241 | |
| 242 | - // Exported permission: administer site configuration |
|
| 243 | - $permissions['administer site configuration'] = array( |
|
| 242 | + // Exported permission: administer site configuration |
|
| 243 | + $permissions['administer site configuration'] = array( |
|
| 244 | 244 | 'name' => 'administer site configuration', |
| 245 | 245 | 'roles' => array( |
| 246 | - '0' => 'administrator', |
|
| 246 | + '0' => 'administrator', |
|
| 247 | 247 | ), |
| 248 | - ); |
|
| 248 | + ); |
|
| 249 | 249 | |
| 250 | - // Exported permission: administer smtp module |
|
| 251 | - $permissions['administer smtp module'] = array( |
|
| 250 | + // Exported permission: administer smtp module |
|
| 251 | + $permissions['administer smtp module'] = array( |
|
| 252 | 252 | 'name' => 'administer smtp module', |
| 253 | 253 | 'roles' => array( |
| 254 | - '0' => 'administrator', |
|
| 254 | + '0' => 'administrator', |
|
| 255 | 255 | ), |
| 256 | - ); |
|
| 256 | + ); |
|
| 257 | 257 | |
| 258 | - // Exported permission: administer tabtamer |
|
| 259 | - $permissions['administer tabtamer'] = array( |
|
| 258 | + // Exported permission: administer tabtamer |
|
| 259 | + $permissions['administer tabtamer'] = array( |
|
| 260 | 260 | 'name' => 'administer tabtamer', |
| 261 | 261 | 'roles' => array( |
| 262 | - '0' => 'administrator', |
|
| 262 | + '0' => 'administrator', |
|
| 263 | 263 | ), |
| 264 | - ); |
|
| 264 | + ); |
|
| 265 | 265 | |
| 266 | - // Exported permission: administer taxonomy |
|
| 267 | - $permissions['administer taxonomy'] = array( |
|
| 266 | + // Exported permission: administer taxonomy |
|
| 267 | + $permissions['administer taxonomy'] = array( |
|
| 268 | 268 | 'name' => 'administer taxonomy', |
| 269 | 269 | 'roles' => array( |
| 270 | - '0' => 'administrator', |
|
| 270 | + '0' => 'administrator', |
|
| 271 | 271 | ), |
| 272 | - ); |
|
| 272 | + ); |
|
| 273 | 273 | |
| 274 | - // Exported permission: administer url aliases |
|
| 275 | - $permissions['administer url aliases'] = array( |
|
| 274 | + // Exported permission: administer url aliases |
|
| 275 | + $permissions['administer url aliases'] = array( |
|
| 276 | 276 | 'name' => 'administer url aliases', |
| 277 | 277 | 'roles' => array( |
| 278 | - '0' => 'administrator', |
|
| 278 | + '0' => 'administrator', |
|
| 279 | 279 | ), |
| 280 | - ); |
|
| 280 | + ); |
|
| 281 | 281 | |
| 282 | - // Exported permission: administer users |
|
| 283 | - $permissions['administer users'] = array( |
|
| 282 | + // Exported permission: administer users |
|
| 283 | + $permissions['administer users'] = array( |
|
| 284 | 284 | 'name' => 'administer users', |
| 285 | 285 | 'roles' => array( |
| 286 | - '0' => 'administrator', |
|
| 286 | + '0' => 'administrator', |
|
| 287 | 287 | ), |
| 288 | - ); |
|
| 288 | + ); |
|
| 289 | 289 | |
| 290 | - // Exported permission: administer views |
|
| 291 | - $permissions['administer views'] = array( |
|
| 290 | + // Exported permission: administer views |
|
| 291 | + $permissions['administer views'] = array( |
|
| 292 | 292 | 'name' => 'administer views', |
| 293 | 293 | 'roles' => array( |
| 294 | - '0' => 'administrator', |
|
| 294 | + '0' => 'administrator', |
|
| 295 | 295 | ), |
| 296 | - ); |
|
| 296 | + ); |
|
| 297 | 297 | |
| 298 | - // Exported permission: assign all roles |
|
| 299 | - $permissions['assign all roles'] = array( |
|
| 298 | + // Exported permission: assign all roles |
|
| 299 | + $permissions['assign all roles'] = array( |
|
| 300 | 300 | 'name' => 'assign all roles', |
| 301 | 301 | 'roles' => array( |
| 302 | - '0' => 'administrator', |
|
| 302 | + '0' => 'administrator', |
|
| 303 | 303 | ), |
| 304 | - ); |
|
| 304 | + ); |
|
| 305 | 305 | |
| 306 | - // Exported permission: change own username |
|
| 307 | - $permissions['change own username'] = array( |
|
| 306 | + // Exported permission: change own username |
|
| 307 | + $permissions['change own username'] = array( |
|
| 308 | 308 | 'name' => 'change own username', |
| 309 | 309 | 'roles' => array( |
| 310 | - '0' => 'administrator', |
|
| 310 | + '0' => 'administrator', |
|
| 311 | 311 | ), |
| 312 | - ); |
|
| 312 | + ); |
|
| 313 | 313 | |
| 314 | - // Exported permission: create mini panels |
|
| 315 | - $permissions['create mini panels'] = array( |
|
| 314 | + // Exported permission: create mini panels |
|
| 315 | + $permissions['create mini panels'] = array( |
|
| 316 | 316 | 'name' => 'create mini panels', |
| 317 | 317 | 'roles' => array( |
| 318 | - '0' => 'administrator', |
|
| 318 | + '0' => 'administrator', |
|
| 319 | 319 | ), |
| 320 | - ); |
|
| 320 | + ); |
|
| 321 | 321 | |
| 322 | - // Exported permission: create page content |
|
| 323 | - $permissions['create page content'] = array( |
|
| 322 | + // Exported permission: create page content |
|
| 323 | + $permissions['create page content'] = array( |
|
| 324 | 324 | 'name' => 'create page content', |
| 325 | 325 | 'roles' => array( |
| 326 | - '0' => 'administrator', |
|
| 327 | - '1' => 'content editor', |
|
| 326 | + '0' => 'administrator', |
|
| 327 | + '1' => 'content editor', |
|
| 328 | 328 | ), |
| 329 | - ); |
|
| 329 | + ); |
|
| 330 | 330 | |
| 331 | - // Exported permission: create panel-nodes |
|
| 332 | - $permissions['create panel-nodes'] = array( |
|
| 331 | + // Exported permission: create panel-nodes |
|
| 332 | + $permissions['create panel-nodes'] = array( |
|
| 333 | 333 | 'name' => 'create panel-nodes', |
| 334 | 334 | 'roles' => array( |
| 335 | - '0' => 'administrator', |
|
| 335 | + '0' => 'administrator', |
|
| 336 | 336 | ), |
| 337 | - ); |
|
| 337 | + ); |
|
| 338 | 338 | |
| 339 | - // Exported permission: create story content |
|
| 340 | - $permissions['create story content'] = array( |
|
| 339 | + // Exported permission: create story content |
|
| 340 | + $permissions['create story content'] = array( |
|
| 341 | 341 | 'name' => 'create story content', |
| 342 | 342 | 'roles' => array( |
| 343 | - '0' => 'administrator', |
|
| 343 | + '0' => 'administrator', |
|
| 344 | 344 | ), |
| 345 | - ); |
|
| 345 | + ); |
|
| 346 | 346 | |
| 347 | - // Exported permission: create url aliases |
|
| 348 | - $permissions['create url aliases'] = array( |
|
| 347 | + // Exported permission: create url aliases |
|
| 348 | + $permissions['create url aliases'] = array( |
|
| 349 | 349 | 'name' => 'create url aliases', |
| 350 | 350 | 'roles' => array( |
| 351 | - '0' => 'administrator', |
|
| 351 | + '0' => 'administrator', |
|
| 352 | 352 | ), |
| 353 | - ); |
|
| 353 | + ); |
|
| 354 | 354 | |
| 355 | - // Exported permission: delete any page content |
|
| 356 | - $permissions['delete any page content'] = array( |
|
| 355 | + // Exported permission: delete any page content |
|
| 356 | + $permissions['delete any page content'] = array( |
|
| 357 | 357 | 'name' => 'delete any page content', |
| 358 | 358 | 'roles' => array( |
| 359 | - '0' => 'administrator', |
|
| 360 | - '1' => 'content editor', |
|
| 359 | + '0' => 'administrator', |
|
| 360 | + '1' => 'content editor', |
|
| 361 | 361 | ), |
| 362 | - ); |
|
| 362 | + ); |
|
| 363 | 363 | |
| 364 | - // Exported permission: delete any panel-nodes |
|
| 365 | - $permissions['delete any panel-nodes'] = array( |
|
| 364 | + // Exported permission: delete any panel-nodes |
|
| 365 | + $permissions['delete any panel-nodes'] = array( |
|
| 366 | 366 | 'name' => 'delete any panel-nodes', |
| 367 | 367 | 'roles' => array( |
| 368 | - '0' => 'administrator', |
|
| 368 | + '0' => 'administrator', |
|
| 369 | 369 | ), |
| 370 | - ); |
|
| 370 | + ); |
|
| 371 | 371 | |
| 372 | - // Exported permission: delete any story content |
|
| 373 | - $permissions['delete any story content'] = array( |
|
| 372 | + // Exported permission: delete any story content |
|
| 373 | + $permissions['delete any story content'] = array( |
|
| 374 | 374 | 'name' => 'delete any story content', |
| 375 | 375 | 'roles' => array( |
| 376 | - '0' => 'administrator', |
|
| 376 | + '0' => 'administrator', |
|
| 377 | 377 | ), |
| 378 | - ); |
|
| 378 | + ); |
|
| 379 | 379 | |
| 380 | - // Exported permission: delete own account |
|
| 381 | - $permissions['delete own account'] = array( |
|
| 380 | + // Exported permission: delete own account |
|
| 381 | + $permissions['delete own account'] = array( |
|
| 382 | 382 | 'name' => 'delete own account', |
| 383 | 383 | 'roles' => array( |
| 384 | - '0' => 'administrator', |
|
| 385 | - '1' => 'authenticated user', |
|
| 384 | + '0' => 'administrator', |
|
| 385 | + '1' => 'authenticated user', |
|
| 386 | 386 | ), |
| 387 | - ); |
|
| 387 | + ); |
|
| 388 | 388 | |
| 389 | - // Exported permission: delete own page content |
|
| 390 | - $permissions['delete own page content'] = array( |
|
| 389 | + // Exported permission: delete own page content |
|
| 390 | + $permissions['delete own page content'] = array( |
|
| 391 | 391 | 'name' => 'delete own page content', |
| 392 | 392 | 'roles' => array( |
| 393 | - '0' => 'administrator', |
|
| 393 | + '0' => 'administrator', |
|
| 394 | 394 | ), |
| 395 | - ); |
|
| 395 | + ); |
|
| 396 | 396 | |
| 397 | - // Exported permission: delete own panel-nodes |
|
| 398 | - $permissions['delete own panel-nodes'] = array( |
|
| 397 | + // Exported permission: delete own panel-nodes |
|
| 398 | + $permissions['delete own panel-nodes'] = array( |
|
| 399 | 399 | 'name' => 'delete own panel-nodes', |
| 400 | 400 | 'roles' => array( |
| 401 | - '0' => 'administrator', |
|
| 401 | + '0' => 'administrator', |
|
| 402 | 402 | ), |
| 403 | - ); |
|
| 403 | + ); |
|
| 404 | 404 | |
| 405 | - // Exported permission: delete own story content |
|
| 406 | - $permissions['delete own story content'] = array( |
|
| 405 | + // Exported permission: delete own story content |
|
| 406 | + $permissions['delete own story content'] = array( |
|
| 407 | 407 | 'name' => 'delete own story content', |
| 408 | 408 | 'roles' => array( |
| 409 | - '0' => 'administrator', |
|
| 409 | + '0' => 'administrator', |
|
| 410 | 410 | ), |
| 411 | - ); |
|
| 411 | + ); |
|
| 412 | 412 | |
| 413 | - // Exported permission: delete revisions |
|
| 414 | - $permissions['delete revisions'] = array( |
|
| 413 | + // Exported permission: delete revisions |
|
| 414 | + $permissions['delete revisions'] = array( |
|
| 415 | 415 | 'name' => 'delete revisions', |
| 416 | 416 | 'roles' => array( |
| 417 | - '0' => 'administrator', |
|
| 418 | - '1' => 'content editor', |
|
| 417 | + '0' => 'administrator', |
|
| 418 | + '1' => 'content editor', |
|
| 419 | 419 | ), |
| 420 | - ); |
|
| 420 | + ); |
|
| 421 | 421 | |
| 422 | - // Exported permission: edit any page content |
|
| 423 | - $permissions['edit any page content'] = array( |
|
| 422 | + // Exported permission: edit any page content |
|
| 423 | + $permissions['edit any page content'] = array( |
|
| 424 | 424 | 'name' => 'edit any page content', |
| 425 | 425 | 'roles' => array( |
| 426 | - '0' => 'administrator', |
|
| 427 | - '1' => 'content editor', |
|
| 426 | + '0' => 'administrator', |
|
| 427 | + '1' => 'content editor', |
|
| 428 | 428 | ), |
| 429 | - ); |
|
| 429 | + ); |
|
| 430 | 430 | |
| 431 | - // Exported permission: edit any panel-nodes |
|
| 432 | - $permissions['edit any panel-nodes'] = array( |
|
| 431 | + // Exported permission: edit any panel-nodes |
|
| 432 | + $permissions['edit any panel-nodes'] = array( |
|
| 433 | 433 | 'name' => 'edit any panel-nodes', |
| 434 | 434 | 'roles' => array( |
| 435 | - '0' => 'administrator', |
|
| 435 | + '0' => 'administrator', |
|
| 436 | 436 | ), |
| 437 | - ); |
|
| 437 | + ); |
|
| 438 | 438 | |
| 439 | - // Exported permission: edit any story content |
|
| 440 | - $permissions['edit any story content'] = array( |
|
| 439 | + // Exported permission: edit any story content |
|
| 440 | + $permissions['edit any story content'] = array( |
|
| 441 | 441 | 'name' => 'edit any story content', |
| 442 | 442 | 'roles' => array( |
| 443 | - '0' => 'administrator', |
|
| 443 | + '0' => 'administrator', |
|
| 444 | 444 | ), |
| 445 | - ); |
|
| 445 | + ); |
|
| 446 | 446 | |
| 447 | - // Exported permission: edit own page content |
|
| 448 | - $permissions['edit own page content'] = array( |
|
| 447 | + // Exported permission: edit own page content |
|
| 448 | + $permissions['edit own page content'] = array( |
|
| 449 | 449 | 'name' => 'edit own page content', |
| 450 | 450 | 'roles' => array( |
| 451 | - '0' => 'administrator', |
|
| 451 | + '0' => 'administrator', |
|
| 452 | 452 | ), |
| 453 | - ); |
|
| 453 | + ); |
|
| 454 | 454 | |
| 455 | - // Exported permission: edit own panel-nodes |
|
| 456 | - $permissions['edit own panel-nodes'] = array( |
|
| 455 | + // Exported permission: edit own panel-nodes |
|
| 456 | + $permissions['edit own panel-nodes'] = array( |
|
| 457 | 457 | 'name' => 'edit own panel-nodes', |
| 458 | 458 | 'roles' => array( |
| 459 | - '0' => 'administrator', |
|
| 459 | + '0' => 'administrator', |
|
| 460 | 460 | ), |
| 461 | - ); |
|
| 461 | + ); |
|
| 462 | 462 | |
| 463 | - // Exported permission: edit own story content |
|
| 464 | - $permissions['edit own story content'] = array( |
|
| 463 | + // Exported permission: edit own story content |
|
| 464 | + $permissions['edit own story content'] = array( |
|
| 465 | 465 | 'name' => 'edit own story content', |
| 466 | 466 | 'roles' => array( |
| 467 | - '0' => 'administrator', |
|
| 467 | + '0' => 'administrator', |
|
| 468 | 468 | ), |
| 469 | - ); |
|
| 469 | + ); |
|
| 470 | 470 | |
| 471 | - // Exported permission: ignore user |
|
| 472 | - $permissions['ignore user'] = array( |
|
| 471 | + // Exported permission: ignore user |
|
| 472 | + $permissions['ignore user'] = array( |
|
| 473 | 473 | 'name' => 'ignore user', |
| 474 | 474 | 'roles' => array( |
| 475 | - '0' => 'authenticated user', |
|
| 475 | + '0' => 'authenticated user', |
|
| 476 | 476 | ), |
| 477 | - ); |
|
| 477 | + ); |
|
| 478 | 478 | |
| 479 | - // Exported permission: import input formats |
|
| 480 | - $permissions['import input formats'] = array( |
|
| 479 | + // Exported permission: import input formats |
|
| 480 | + $permissions['import input formats'] = array( |
|
| 481 | 481 | 'name' => 'import input formats', |
| 482 | 482 | 'roles' => array(), |
| 483 | - ); |
|
| 483 | + ); |
|
| 484 | 484 | |
| 485 | - // Exported permission: manage features |
|
| 486 | - $permissions['manage features'] = array( |
|
| 485 | + // Exported permission: manage features |
|
| 486 | + $permissions['manage features'] = array( |
|
| 487 | 487 | 'name' => 'manage features', |
| 488 | 488 | 'roles' => array( |
| 489 | - '0' => 'administrator', |
|
| 489 | + '0' => 'administrator', |
|
| 490 | 490 | ), |
| 491 | - ); |
|
| 491 | + ); |
|
| 492 | 492 | |
| 493 | - // Exported permission: notify of path changes |
|
| 494 | - $permissions['notify of path changes'] = array( |
|
| 493 | + // Exported permission: notify of path changes |
|
| 494 | + $permissions['notify of path changes'] = array( |
|
| 495 | 495 | 'name' => 'notify of path changes', |
| 496 | 496 | 'roles' => array( |
| 497 | - '0' => 'administrator', |
|
| 497 | + '0' => 'administrator', |
|
| 498 | 498 | ), |
| 499 | - ); |
|
| 499 | + ); |
|
| 500 | 500 | |
| 501 | - // Exported permission: reset abuse flags |
|
| 502 | - $permissions['reset abuse flags'] = array( |
|
| 501 | + // Exported permission: reset abuse flags |
|
| 502 | + $permissions['reset abuse flags'] = array( |
|
| 503 | 503 | 'name' => 'reset abuse flags', |
| 504 | 504 | 'roles' => array( |
| 505 | - '0' => 'administrator', |
|
| 506 | - '1' => 'moderator', |
|
| 505 | + '0' => 'administrator', |
|
| 506 | + '1' => 'moderator', |
|
| 507 | 507 | ), |
| 508 | - ); |
|
| 508 | + ); |
|
| 509 | 509 | |
| 510 | - // Exported permission: revert revisions |
|
| 511 | - $permissions['revert revisions'] = array( |
|
| 510 | + // Exported permission: revert revisions |
|
| 511 | + $permissions['revert revisions'] = array( |
|
| 512 | 512 | 'name' => 'revert revisions', |
| 513 | 513 | 'roles' => array( |
| 514 | - '0' => 'administrator', |
|
| 515 | - '1' => 'content editor', |
|
| 514 | + '0' => 'administrator', |
|
| 515 | + '1' => 'content editor', |
|
| 516 | 516 | ), |
| 517 | - ); |
|
| 517 | + ); |
|
| 518 | 518 | |
| 519 | - // Exported permission: select different theme |
|
| 520 | - $permissions['select different theme'] = array( |
|
| 519 | + // Exported permission: select different theme |
|
| 520 | + $permissions['select different theme'] = array( |
|
| 521 | 521 | 'name' => 'select different theme', |
| 522 | 522 | 'roles' => array( |
| 523 | - '0' => 'administrator', |
|
| 523 | + '0' => 'administrator', |
|
| 524 | 524 | ), |
| 525 | - ); |
|
| 525 | + ); |
|
| 526 | 526 | |
| 527 | - // Exported permission: upload files |
|
| 528 | - $permissions['upload files'] = array( |
|
| 527 | + // Exported permission: upload files |
|
| 528 | + $permissions['upload files'] = array( |
|
| 529 | 529 | 'name' => 'upload files', |
| 530 | 530 | 'roles' => array( |
| 531 | - '0' => 'administrator', |
|
| 532 | - '1' => 'content editor', |
|
| 531 | + '0' => 'administrator', |
|
| 532 | + '1' => 'content editor', |
|
| 533 | 533 | ), |
| 534 | - ); |
|
| 534 | + ); |
|
| 535 | 535 | |
| 536 | - // Exported permission: view uploaded files |
|
| 537 | - $permissions['view uploaded files'] = array( |
|
| 536 | + // Exported permission: view uploaded files |
|
| 537 | + $permissions['view uploaded files'] = array( |
|
| 538 | 538 | 'name' => 'view uploaded files', |
| 539 | 539 | 'roles' => array(), |
| 540 | - ); |
|
| 540 | + ); |
|
| 541 | 541 | |
| 542 | - // Exported permission: use PHP for block visibility |
|
| 543 | - $permissions['use PHP for block visibility'] = array( |
|
| 542 | + // Exported permission: use PHP for block visibility |
|
| 543 | + $permissions['use PHP for block visibility'] = array( |
|
| 544 | 544 | 'name' => 'use PHP for block visibility', |
| 545 | 545 | 'roles' => array( |
| 546 | - '0' => 'administrator', |
|
| 546 | + '0' => 'administrator', |
|
| 547 | 547 | ), |
| 548 | - ); |
|
| 548 | + ); |
|
| 549 | 549 | |
| 550 | - // Exported permission: use PHP for me alias paths |
|
| 551 | - $permissions['use PHP for me alias paths'] = array( |
|
| 550 | + // Exported permission: use PHP for me alias paths |
|
| 551 | + $permissions['use PHP for me alias paths'] = array( |
|
| 552 | 552 | 'name' => 'use PHP for me alias paths', |
| 553 | 553 | 'roles' => array( |
| 554 | - '0' => 'administrator', |
|
| 554 | + '0' => 'administrator', |
|
| 555 | 555 | ), |
| 556 | - ); |
|
| 556 | + ); |
|
| 557 | 557 | |
| 558 | - // Exported permission: use flag import |
|
| 559 | - $permissions['use flag import'] = array( |
|
| 558 | + // Exported permission: use flag import |
|
| 559 | + $permissions['use flag import'] = array( |
|
| 560 | 560 | 'name' => 'use flag import', |
| 561 | 561 | 'roles' => array( |
| 562 | - '0' => 'administrator', |
|
| 562 | + '0' => 'administrator', |
|
| 563 | 563 | ), |
| 564 | - ); |
|
| 564 | + ); |
|
| 565 | 565 | |
| 566 | - // Exported permission: use page manager |
|
| 567 | - $permissions['use page manager'] = array( |
|
| 566 | + // Exported permission: use page manager |
|
| 567 | + $permissions['use page manager'] = array( |
|
| 568 | 568 | 'name' => 'use page manager', |
| 569 | 569 | 'roles' => array( |
| 570 | - '0' => 'administrator', |
|
| 570 | + '0' => 'administrator', |
|
| 571 | 571 | ), |
| 572 | - ); |
|
| 572 | + ); |
|
| 573 | 573 | |
| 574 | - // Exported permission: use panels caching features |
|
| 575 | - $permissions['use panels caching features'] = array( |
|
| 574 | + // Exported permission: use panels caching features |
|
| 575 | + $permissions['use panels caching features'] = array( |
|
| 576 | 576 | 'name' => 'use panels caching features', |
| 577 | 577 | 'roles' => array( |
| 578 | - '0' => 'administrator', |
|
| 578 | + '0' => 'administrator', |
|
| 579 | 579 | ), |
| 580 | - ); |
|
| 580 | + ); |
|
| 581 | 581 | |
| 582 | - // Exported permission: use panels dashboard |
|
| 583 | - $permissions['use panels dashboard'] = array( |
|
| 582 | + // Exported permission: use panels dashboard |
|
| 583 | + $permissions['use panels dashboard'] = array( |
|
| 584 | 584 | 'name' => 'use panels dashboard', |
| 585 | 585 | 'roles' => array( |
| 586 | - '0' => 'administrator', |
|
| 586 | + '0' => 'administrator', |
|
| 587 | 587 | ), |
| 588 | - ); |
|
| 588 | + ); |
|
| 589 | 589 | |
| 590 | - // Exported permission: use panels in place editing |
|
| 591 | - $permissions['use panels in place editing'] = array( |
|
| 590 | + // Exported permission: use panels in place editing |
|
| 591 | + $permissions['use panels in place editing'] = array( |
|
| 592 | 592 | 'name' => 'use panels in place editing', |
| 593 | 593 | 'roles' => array( |
| 594 | - '0' => 'administrator', |
|
| 594 | + '0' => 'administrator', |
|
| 595 | 595 | ), |
| 596 | - ); |
|
| 596 | + ); |
|
| 597 | 597 | |
| 598 | - // Exported permission: view all panes |
|
| 599 | - $permissions['view all panes'] = array( |
|
| 598 | + // Exported permission: view all panes |
|
| 599 | + $permissions['view all panes'] = array( |
|
| 600 | 600 | 'name' => 'view all panes', |
| 601 | 601 | 'roles' => array( |
| 602 | - '0' => 'administrator', |
|
| 602 | + '0' => 'administrator', |
|
| 603 | 603 | ), |
| 604 | - ); |
|
| 604 | + ); |
|
| 605 | 605 | |
| 606 | - // Exported permission: view pane admin links |
|
| 607 | - $permissions['view pane admin links'] = array( |
|
| 606 | + // Exported permission: view pane admin links |
|
| 607 | + $permissions['view pane admin links'] = array( |
|
| 608 | 608 | 'name' => 'view pane admin links', |
| 609 | 609 | 'roles' => array( |
| 610 | - '0' => 'administrator', |
|
| 610 | + '0' => 'administrator', |
|
| 611 | 611 | ), |
| 612 | - ); |
|
| 612 | + ); |
|
| 613 | 613 | |
| 614 | - // Exported permission: view revisions |
|
| 615 | - $permissions['view revisions'] = array( |
|
| 614 | + // Exported permission: view revisions |
|
| 615 | + $permissions['view revisions'] = array( |
|
| 616 | 616 | 'name' => 'view revisions', |
| 617 | 617 | 'roles' => array( |
| 618 | - '0' => 'administrator', |
|
| 619 | - '1' => 'content editor', |
|
| 618 | + '0' => 'administrator', |
|
| 619 | + '1' => 'content editor', |
|
| 620 | 620 | ), |
| 621 | - ); |
|
| 621 | + ); |
|
| 622 | 622 | |
| 623 | - return $permissions; |
|
| 623 | + return $permissions; |
|
| 624 | 624 | } |
@@ -4,42 +4,42 @@ |
||
| 4 | 4 | * Implementation of hook_user_default_roles(). |
| 5 | 5 | */ |
| 6 | 6 | function boinc_standard_user_default_roles() { |
| 7 | - $roles = array(); |
|
| 7 | + $roles = array(); |
|
| 8 | 8 | |
| 9 | - // Exported role: administrator |
|
| 10 | - $roles['administrator'] = array( |
|
| 9 | + // Exported role: administrator |
|
| 10 | + $roles['administrator'] = array( |
|
| 11 | 11 | 'name' => 'administrator', |
| 12 | - ); |
|
| 12 | + ); |
|
| 13 | 13 | |
| 14 | - // Exported role: anonymous user |
|
| 15 | - $roles['anonymous user'] = array( |
|
| 14 | + // Exported role: anonymous user |
|
| 15 | + $roles['anonymous user'] = array( |
|
| 16 | 16 | 'name' => 'anonymous user', |
| 17 | - ); |
|
| 17 | + ); |
|
| 18 | 18 | |
| 19 | - // Exported role: authenticated user |
|
| 20 | - $roles['authenticated user'] = array( |
|
| 19 | + // Exported role: authenticated user |
|
| 20 | + $roles['authenticated user'] = array( |
|
| 21 | 21 | 'name' => 'authenticated user', |
| 22 | - ); |
|
| 22 | + ); |
|
| 23 | 23 | |
| 24 | - // Exported role: community member |
|
| 25 | - $roles['community member'] = array( |
|
| 24 | + // Exported role: community member |
|
| 25 | + $roles['community member'] = array( |
|
| 26 | 26 | 'name' => 'community member', |
| 27 | - ); |
|
| 27 | + ); |
|
| 28 | 28 | |
| 29 | - // Exported role: content editor |
|
| 30 | - $roles['content editor'] = array( |
|
| 29 | + // Exported role: content editor |
|
| 30 | + $roles['content editor'] = array( |
|
| 31 | 31 | 'name' => 'content editor', |
| 32 | - ); |
|
| 32 | + ); |
|
| 33 | 33 | |
| 34 | - // Exported role: moderator |
|
| 35 | - $roles['moderator'] = array( |
|
| 34 | + // Exported role: moderator |
|
| 35 | + $roles['moderator'] = array( |
|
| 36 | 36 | 'name' => 'moderator', |
| 37 | - ); |
|
| 37 | + ); |
|
| 38 | 38 | |
| 39 | - // Exported role: verified contributor |
|
| 40 | - $roles['verified contributor'] = array( |
|
| 39 | + // Exported role: verified contributor |
|
| 40 | + $roles['verified contributor'] = array( |
|
| 41 | 41 | 'name' => 'verified contributor', |
| 42 | - ); |
|
| 42 | + ); |
|
| 43 | 43 | |
| 44 | - return $roles; |
|
| 44 | + return $roles; |
|
| 45 | 45 | } |
@@ -4,20 +4,20 @@ discard block |
||
| 4 | 4 | * Implementation of hook_ckeditor_profile_defaults(). |
| 5 | 5 | */ |
| 6 | 6 | function boinc_standard_ckeditor_profile_defaults() { |
| 7 | - $data = array( |
|
| 7 | + $data = array( |
|
| 8 | 8 | 'Advanced' => array( |
| 9 | - 'name' => 'Advanced', |
|
| 10 | - 'settings' => array( |
|
| 9 | + 'name' => 'Advanced', |
|
| 10 | + 'settings' => array( |
|
| 11 | 11 | 'allow_user_conf' => 'f', |
| 12 | 12 | 'filters' => array( |
| 13 | - 'boinctranslate/0' => 0, |
|
| 14 | - 'htmlpurifier/0' => 0, |
|
| 15 | - 'htmlpurifier/1' => 0, |
|
| 16 | - 'filter/3' => 0, |
|
| 17 | - 'filter/0' => 1, |
|
| 18 | - 'image_caption_filter/0' => 0, |
|
| 19 | - 'input_formats/0' => 0, |
|
| 20 | - 'pathologic/0' => 0, |
|
| 13 | + 'boinctranslate/0' => 0, |
|
| 14 | + 'htmlpurifier/0' => 0, |
|
| 15 | + 'htmlpurifier/1' => 0, |
|
| 16 | + 'filter/3' => 0, |
|
| 17 | + 'filter/0' => 1, |
|
| 18 | + 'image_caption_filter/0' => 0, |
|
| 19 | + 'input_formats/0' => 0, |
|
| 20 | + 'pathologic/0' => 0, |
|
| 21 | 21 | ), |
| 22 | 22 | 'ss' => '2', |
| 23 | 23 | 'min_rows' => '1', |
@@ -56,14 +56,14 @@ discard block |
||
| 56 | 56 | 'font_format' => 'p;div;pre;address;h1;h2;h3;h4;h5;h6', |
| 57 | 57 | 'custom_formatting' => 'f', |
| 58 | 58 | 'formatting' => array( |
| 59 | - 'custom_formatting_options' => array( |
|
| 59 | + 'custom_formatting_options' => array( |
|
| 60 | 60 | 'indent' => 'indent', |
| 61 | 61 | 'breakBeforeOpen' => 'breakBeforeOpen', |
| 62 | 62 | 'breakAfterOpen' => 'breakAfterOpen', |
| 63 | 63 | 'breakAfterClose' => 'breakAfterClose', |
| 64 | 64 | 'breakBeforeClose' => 0, |
| 65 | 65 | 'pre_indent' => 0, |
| 66 | - ), |
|
| 66 | + ), |
|
| 67 | 67 | ), |
| 68 | 68 | 'css_mode' => 'theme', |
| 69 | 69 | 'css_path' => '', |
@@ -80,35 +80,35 @@ discard block |
||
| 80 | 80 | 'theme_config_js' => 'f', |
| 81 | 81 | 'js_conf' => '', |
| 82 | 82 | 'loadPlugins' => array( |
| 83 | - 'drupalbreaks' => array( |
|
| 83 | + 'drupalbreaks' => array( |
|
| 84 | 84 | 'name' => 'drupalbreaks', |
| 85 | 85 | 'desc' => 'Plugin for inserting Drupal teaser and page breaks.', |
| 86 | 86 | 'path' => '%base_path%%plugin_dir%drupalbreaks/', |
| 87 | 87 | 'buttons' => array( |
| 88 | - 'DrupalBreak' => array( |
|
| 88 | + 'DrupalBreak' => array( |
|
| 89 | 89 | 'label' => 'DrupalBreak', |
| 90 | 90 | 'icon' => 'images/drupalbreak.png', |
| 91 | - ), |
|
| 91 | + ), |
|
| 92 | 92 | ), |
| 93 | 93 | 'default' => 't', |
| 94 | - ), |
|
| 94 | + ), |
|
| 95 | 95 | ), |
| 96 | 96 | 'excl_regex' => '', |
| 97 | 97 | 'simple_incl_regex' => '', |
| 98 | - ), |
|
| 99 | - 'roles' => array(), |
|
| 98 | + ), |
|
| 99 | + 'roles' => array(), |
|
| 100 | 100 | ), |
| 101 | 101 | 'CKEditor Global Profile' => array( |
| 102 | - 'name' => 'CKEditor Global Profile', |
|
| 103 | - 'settings' => array( |
|
| 102 | + 'name' => 'CKEditor Global Profile', |
|
| 103 | + 'settings' => array( |
|
| 104 | 104 | 'rank' => array( |
| 105 | - '0' => '3519698132', |
|
| 106 | - '1' => '2938987599', |
|
| 107 | - '2' => '1271379760', |
|
| 108 | - '3' => '1110965548', |
|
| 109 | - '4' => '933038561', |
|
| 110 | - '5' => '2', |
|
| 111 | - '6' => '1', |
|
| 105 | + '0' => '3519698132', |
|
| 106 | + '1' => '2938987599', |
|
| 107 | + '2' => '1271379760', |
|
| 108 | + '3' => '1110965548', |
|
| 109 | + '4' => '933038561', |
|
| 110 | + '5' => '2', |
|
| 111 | + '6' => '1', |
|
| 112 | 112 | ), |
| 113 | 113 | 'excl_mode' => '0', |
| 114 | 114 | 'excl' => 'admin/user/settings.edit-user-mail-* |
@@ -159,22 +159,22 @@ discard block |
||
| 159 | 159 | 'loadPlugins' => array(), |
| 160 | 160 | 'excl_regex' => '#(?:^.*:.*@admin/user/settings\\.edit\\-user\\-mail\\-.*$)|(?:^.*:.*@.*\\.edit\\-pages$)|(?:^.*:.*@.*\\.edit\\-pathauto\\-ignore\\-words$)|(?:^.*:.*@.*\\.edit\\-recipients$)|(?:^.*:.*@.*\\.edit\\-reply$)|(?:^.*:.*@.*\\.edit\\-description$)|(?:^.*:.*@.*\\.edit\\-synonyms$)|(?:^.*:.*@.*\\.edit\\-img\\-assist\\-textareas$)|(?:^.*:.*@.*\\.edit\\-img\\-assist\\-paths$)|(?:^.*:.*@.*\\.edit\\-nodewords\\-description$)|(?:^.*:.*@.*\\.edit\\-nodewords\\-description\\-value$)|(?:^.*:.*@admin/content/nodewords/global.*\\..*$)|(?:^.*:.*@.*\\.edit\\-relatedlinks\\-fieldset\\-relatedlinks$)|(?:^.*:.*@.*\\.edit\\-allowed\\-values\\-php$)|(?:^.*:.*@.*\\.edit\\-allowed\\-values$)|(?:^.*:.*@.*\\.edit\\-update\\-notify\\-emails$)|(?:^.*:.*@.*\\.edit\\-googleanalytics\\-.*$)|(?:^.*:.*@.*\\.edit\\-piwik\\-.*$)|(?:^.*:.*@.*\\.edit\\-feedburner\\-useragents$)|(?:^.*:.*@.*\\.edit\\-webform\\-.*$)|(?:^.*:webform@.*\\.edit\\-extra\\-items$)|(?:^.*:.*@admin/.*/logintoboggan\\..*$)|(?:^.*:.*@admin/settings/actions/configure/.*\\..*$)|(?:^.*:.*@.*\\.edit\\-target$)|(?:^.*:.*@.*\\.edit\\-wysiwyg\\-filter\\-.*$)|(?:^.*:.*@admin/build/views.*\\..*$)#', |
| 161 | 161 | 'simple_incl_regex' => '#(?:^.*:.*@.*\\.edit\\-signature$)|(?:^.*:.*@admin/settings/site\\-information\\..*$)|(?:^.*:.*@admin/settings/site\\-maintenance\\..*$)|(?:^.*:.*@.*\\.edit\\-page\\-help$)|(?:^.*:.*@.*\\.edit\\-user\\-registration\\-help$)|(?:^.*:.*@.*\\.edit\\-user\\-picture\\-guidelines$)#', |
| 162 | - ), |
|
| 163 | - 'roles' => array(), |
|
| 162 | + ), |
|
| 163 | + 'roles' => array(), |
|
| 164 | 164 | ), |
| 165 | 165 | 'Default' => array( |
| 166 | - 'name' => 'Default', |
|
| 167 | - 'settings' => array( |
|
| 166 | + 'name' => 'Default', |
|
| 167 | + 'settings' => array( |
|
| 168 | 168 | 'allow_user_conf' => 'f', |
| 169 | 169 | 'filters' => array( |
| 170 | - 'boinctranslate/0' => 0, |
|
| 171 | - 'htmlpurifier/0' => 1, |
|
| 172 | - 'htmlpurifier/1' => 0, |
|
| 173 | - 'filter/3' => 0, |
|
| 174 | - 'filter/0' => 0, |
|
| 175 | - 'image_caption_filter/0' => 1, |
|
| 176 | - 'input_formats/0' => 0, |
|
| 177 | - 'pathologic/0' => 1, |
|
| 170 | + 'boinctranslate/0' => 0, |
|
| 171 | + 'htmlpurifier/0' => 1, |
|
| 172 | + 'htmlpurifier/1' => 0, |
|
| 173 | + 'filter/3' => 0, |
|
| 174 | + 'filter/0' => 0, |
|
| 175 | + 'image_caption_filter/0' => 1, |
|
| 176 | + 'input_formats/0' => 0, |
|
| 177 | + 'pathologic/0' => 1, |
|
| 178 | 178 | ), |
| 179 | 179 | 'ss' => '2', |
| 180 | 180 | 'min_rows' => '1', |
@@ -213,14 +213,14 @@ discard block |
||
| 213 | 213 | 'font_format' => 'p;div;pre;address;h1;h2;h3;h4;h5;h6', |
| 214 | 214 | 'custom_formatting' => 'f', |
| 215 | 215 | 'formatting' => array( |
| 216 | - 'custom_formatting_options' => array( |
|
| 216 | + 'custom_formatting_options' => array( |
|
| 217 | 217 | 'indent' => 'indent', |
| 218 | 218 | 'breakBeforeOpen' => 'breakBeforeOpen', |
| 219 | 219 | 'breakAfterOpen' => 'breakAfterOpen', |
| 220 | 220 | 'breakAfterClose' => 'breakAfterClose', |
| 221 | 221 | 'breakBeforeClose' => 0, |
| 222 | 222 | 'pre_indent' => 0, |
| 223 | - ), |
|
| 223 | + ), |
|
| 224 | 224 | ), |
| 225 | 225 | 'css_mode' => 'theme', |
| 226 | 226 | 'css_path' => '', |
@@ -237,30 +237,30 @@ discard block |
||
| 237 | 237 | 'theme_config_js' => 'f', |
| 238 | 238 | 'js_conf' => '', |
| 239 | 239 | 'loadPlugins' => array( |
| 240 | - 'drupalbreaks' => array( |
|
| 240 | + 'drupalbreaks' => array( |
|
| 241 | 241 | 'name' => 'drupalbreaks', |
| 242 | 242 | 'desc' => 'Plugin for inserting Drupal teaser and page breaks.', |
| 243 | 243 | 'path' => '%base_path%%plugin_dir%drupalbreaks/', |
| 244 | 244 | 'buttons' => array( |
| 245 | - 'DrupalBreak' => array( |
|
| 245 | + 'DrupalBreak' => array( |
|
| 246 | 246 | 'label' => 'DrupalBreak', |
| 247 | 247 | 'icon' => 'images/drupalbreak.png', |
| 248 | - ), |
|
| 248 | + ), |
|
| 249 | 249 | ), |
| 250 | 250 | 'default' => 't', |
| 251 | - ), |
|
| 251 | + ), |
|
| 252 | 252 | ), |
| 253 | 253 | 'excl_regex' => '', |
| 254 | 254 | 'simple_incl_regex' => '', |
| 255 | - ), |
|
| 256 | - 'roles' => array( |
|
| 255 | + ), |
|
| 256 | + 'roles' => array( |
|
| 257 | 257 | 'anonymous user' => 'anonymous user', |
| 258 | 258 | 'authenticated user' => 'authenticated user', |
| 259 | 259 | 'verified contributor' => 'verified contributor', |
| 260 | 260 | 'community member' => 'community member', |
| 261 | 261 | 'moderator' => 'moderator', |
| 262 | - ), |
|
| 262 | + ), |
|
| 263 | 263 | ), |
| 264 | - ); |
|
| 265 | - return $data; |
|
| 264 | + ); |
|
| 265 | + return $data; |
|
| 266 | 266 | } |