Age | Commit message (Collapse) | Author |
|
git-svn-id: https://code.elgg.org/elgg/trunk@2173 36083f99-b078-4883-b0ff-0f9b5a30f544
|
|
git-svn-id: https://code.elgg.org/elgg/trunk@2170 36083f99-b078-4883-b0ff-0f9b5a30f544
|
|
git-svn-id: https://code.elgg.org/elgg/trunk@2167 36083f99-b078-4883-b0ff-0f9b5a30f544
|
|
git-svn-id: https://code.elgg.org/elgg/trunk@2166 36083f99-b078-4883-b0ff-0f9b5a30f544
|
|
git-svn-id: https://code.elgg.org/elgg/trunk@2165 36083f99-b078-4883-b0ff-0f9b5a30f544
|
|
instanceof. Nice spot, thanks.
git-svn-id: https://code.elgg.org/elgg/trunk@2151 36083f99-b078-4883-b0ff-0f9b5a30f544
|
|
git-svn-id: https://code.elgg.org/elgg/trunk@2144 36083f99-b078-4883-b0ff-0f9b5a30f544
|
|
patch you sent, it still uses get but the generated token should make a CSRF attack much harder.
git-svn-id: https://code.elgg.org/elgg/trunk@2057 36083f99-b078-4883-b0ff-0f9b5a30f544
|
|
git-svn-id: https://code.elgg.org/elgg/trunk@2056 36083f99-b078-4883-b0ff-0f9b5a30f544
|
|
git-svn-id: https://code.elgg.org/elgg/trunk@2050 36083f99-b078-4883-b0ff-0f9b5a30f544
|
|
git-svn-id: https://code.elgg.org/elgg/trunk@2038 36083f99-b078-4883-b0ff-0f9b5a30f544
|
|
git-svn-id: https://code.elgg.org/elgg/trunk@2036 36083f99-b078-4883-b0ff-0f9b5a30f544
|
|
git-svn-id: https://code.elgg.org/elgg/trunk@2035 36083f99-b078-4883-b0ff-0f9b5a30f544
|
|
git-svn-id: https://code.elgg.org/elgg/trunk@2027 36083f99-b078-4883-b0ff-0f9b5a30f544
|
|
git-svn-id: https://code.elgg.org/elgg/trunk@2025 36083f99-b078-4883-b0ff-0f9b5a30f544
|
|
git-svn-id: https://code.elgg.org/elgg/trunk@2000 36083f99-b078-4883-b0ff-0f9b5a30f544
|
|
git-svn-id: https://code.elgg.org/elgg/trunk@1998 36083f99-b078-4883-b0ff-0f9b5a30f544
|
|
Please report any problems, especially is they relate to access permissions (granted when you shouldn't or denied when you should)
git-svn-id: https://code.elgg.org/elgg/trunk@1912 36083f99-b078-4883-b0ff-0f9b5a30f544
|
|
There are critical issues with enable/disable.
Primarily:
1) A number of functions do not use the access controls, these throw an exception when accessing a disabled entity.
2) #243 does not seem possible.
git-svn-id: https://code.elgg.org/elgg/trunk@1909 36083f99-b078-4883-b0ff-0f9b5a30f544
|
|
Depends #243
git-svn-id: https://code.elgg.org/elgg/trunk@1904 36083f99-b078-4883-b0ff-0f9b5a30f544
|
|
git-svn-id: https://code.elgg.org/elgg/trunk@1903 36083f99-b078-4883-b0ff-0f9b5a30f544
|
|
git-svn-id: https://code.elgg.org/elgg/trunk@1892 36083f99-b078-4883-b0ff-0f9b5a30f544
|
|
than the low level function
git-svn-id: https://code.elgg.org/elgg/trunk@1887 36083f99-b078-4883-b0ff-0f9b5a30f544
|
|
validated flag set.
Introduced new flag ->admin_created to distinguish between the two types.
git-svn-id: https://code.elgg.org/elgg/trunk@1883 36083f99-b078-4883-b0ff-0f9b5a30f544
|
|
git-svn-id: https://code.elgg.org/elgg/trunk@1864 36083f99-b078-4883-b0ff-0f9b5a30f544
|
|
for admin signup
git-svn-id: https://code.elgg.org/elgg/trunk@1856 36083f99-b078-4883-b0ff-0f9b5a30f544
|
|
sanitisation + fill in the blanks failure mode! (yay)
git-svn-id: https://code.elgg.org/elgg/trunk@1855 36083f99-b078-4883-b0ff-0f9b5a30f544
|
|
git-svn-id: https://code.elgg.org/elgg/trunk@1850 36083f99-b078-4883-b0ff-0f9b5a30f544
|
|
git-svn-id: https://code.elgg.org/elgg/trunk@1845 36083f99-b078-4883-b0ff-0f9b5a30f544
|
|
git-svn-id: https://code.elgg.org/elgg/trunk@1839 36083f99-b078-4883-b0ff-0f9b5a30f544
|
|
git-svn-id: https://code.elgg.org/elgg/trunk@1828 36083f99-b078-4883-b0ff-0f9b5a30f544
|
|
git-svn-id: https://code.elgg.org/elgg/trunk@1827 36083f99-b078-4883-b0ff-0f9b5a30f544
|
|
admin_gatekeeper. Install script action now also refuses to be run if the site has already been installed.
git-svn-id: https://code.elgg.org/elgg/trunk@1824 36083f99-b078-4883-b0ff-0f9b5a30f544
|
|
git-svn-id: https://code.elgg.org/elgg/trunk@1823 36083f99-b078-4883-b0ff-0f9b5a30f544
|
|
git-svn-id: https://code.elgg.org/elgg/trunk@1820 36083f99-b078-4883-b0ff-0f9b5a30f544
|
|
git-svn-id: https://code.elgg.org/elgg/trunk@1818 36083f99-b078-4883-b0ff-0f9b5a30f544
|
|
git-svn-id: https://code.elgg.org/elgg/trunk@1806 36083f99-b078-4883-b0ff-0f9b5a30f544
|
|
git-svn-id: https://code.elgg.org/elgg/trunk@1802 36083f99-b078-4883-b0ff-0f9b5a30f544
|
|
git-svn-id: https://code.elgg.org/elgg/trunk@1733 36083f99-b078-4883-b0ff-0f9b5a30f544
|
|
forward page to correct location.
Also fixed current_page_url() which was introducing a superfluous "/" before $_SERVER['REQUEST_URI']
git-svn-id: https://code.elgg.org/elgg/trunk@1712 36083f99-b078-4883-b0ff-0f9b5a30f544
|
|
git-svn-id: https://code.elgg.org/elgg/trunk@1682 36083f99-b078-4883-b0ff-0f9b5a30f544
|
|
git-svn-id: https://code.elgg.org/elgg/trunk@1674 36083f99-b078-4883-b0ff-0f9b5a30f544
|
|
git-svn-id: https://code.elgg.org/elgg/trunk@1658 36083f99-b078-4883-b0ff-0f9b5a30f544
|
|
To request a password reset access http://..../actions/user/requestnewpassword/?username=username
git-svn-id: https://code.elgg.org/elgg/trunk@1656 36083f99-b078-4883-b0ff-0f9b5a30f544
|
|
git-svn-id: https://code.elgg.org/elgg/trunk@1653 36083f99-b078-4883-b0ff-0f9b5a30f544
|
|
git-svn-id: https://code.elgg.org/elgg/trunk@1646 36083f99-b078-4883-b0ff-0f9b5a30f544
|
|
git-svn-id: https://code.elgg.org/elgg/trunk@1645 36083f99-b078-4883-b0ff-0f9b5a30f544
|
|
git-svn-id: https://code.elgg.org/elgg/trunk@1641 36083f99-b078-4883-b0ff-0f9b5a30f544
|
|
git-svn-id: https://code.elgg.org/elgg/trunk@1639 36083f99-b078-4883-b0ff-0f9b5a30f544
|
|
git-svn-id: https://code.elgg.org/elgg/trunk@1636 36083f99-b078-4883-b0ff-0f9b5a30f544
|