Index: openacs-4/packages/acs-bootstrap-installer/installer/create-administrator-2-postgresql.xql =================================================================== RCS file: /usr/local/cvsroot/openacs-4/packages/acs-bootstrap-installer/installer/Attic/create-administrator-2-postgresql.xql,v diff -u -N --- openacs-4/packages/acs-bootstrap-installer/installer/create-administrator-2-postgresql.xql 17 Apr 2001 22:59:51 -0000 1.2 +++ /dev/null 1 Jan 1970 00:00:00 -0000 @@ -1,14 +0,0 @@ - - -postgresql7.1 - - - -select acs_permission__grant_permission( - acs__magic_object_id('security_context_root'), - :user_id, - 'admin') - - - - Index: openacs-4/packages/acs-bootstrap-installer/installer/create-administrator-2.tcl =================================================================== RCS file: /usr/local/cvsroot/openacs-4/packages/acs-bootstrap-installer/installer/Attic/create-administrator-2.tcl,v diff -u -N -r1.4 -r1.4.2.1 --- openacs-4/packages/acs-bootstrap-installer/installer/create-administrator-2.tcl 18 Sep 2002 11:56:48 -0000 1.4 +++ openacs-4/packages/acs-bootstrap-installer/installer/create-administrator-2.tcl 6 Oct 2002 05:54:17 -0000 1.4.2.1 @@ -44,18 +44,14 @@ return } - # Changed this from db_dml to db_exec_plsql (ben - OpenACS) - # why was this a DML? Thanks to Oracle-only, this didn't make a - # difference, but it broke our DB API. This new version is correct. - db_exec_plsql grant_admin { - begin - acs_permission.grant_permission ( - object_id => acs.magic_object_id('security_context_root'), - grantee_id => :user_id, - privilege => 'admin' - ); - end; - } + # stub util_memoize_flush... + rename util_memoize_flush util_memoize_flush_saved + proc util_memoize_flush {args} {} + permission::grant -party_id $user_id -object_id [acs_lookup_magic_object security_context_root] -privilege "admin" + # nuke stub + rename util_memoize_flush {} + rename util_memoize_flush_saved util_memoize_flush + } }