Index: openacs-4/packages/acs-kernel/acs-kernel.info
===================================================================
RCS file: /usr/local/cvsroot/openacs-4/packages/acs-kernel/acs-kernel.info,v
diff -u -N -r1.150.2.50 -r1.150.2.51
--- openacs-4/packages/acs-kernel/acs-kernel.info 1 Dec 2022 16:39:48 -0000 1.150.2.50
+++ openacs-4/packages/acs-kernel/acs-kernel.info 7 Feb 2023 11:47:40 -0000 1.150.2.51
@@ -9,15 +9,15 @@
f
t
-
+
OpenACS Core Team
Routines and data models providing the foundation for OpenACS-based Web services.
2021-09-15
OpenACS
The OpenACS kernel contains the core datamodel create and drop scripts for such things as objects, groups, parties and the supporting PL/SQL and PL/pgSQL procedures.
3
-
+
@@ -61,7 +61,7 @@
-
+
Index: openacs-4/packages/acs-tcl/acs-tcl.info
===================================================================
RCS file: /usr/local/cvsroot/openacs-4/packages/acs-tcl/acs-tcl.info,v
diff -u -N -r1.95.2.55 -r1.95.2.56
--- openacs-4/packages/acs-tcl/acs-tcl.info 28 Nov 2022 17:49:22 -0000 1.95.2.55
+++ openacs-4/packages/acs-tcl/acs-tcl.info 7 Feb 2023 11:47:40 -0000 1.95.2.56
@@ -9,7 +9,7 @@
f
t
-
+
OpenACS
The Kernel Tcl API library.
2021-09-15
@@ -18,9 +18,9 @@
GPL version 2
3
-
+
-
+
Index: openacs-4/packages/acs-tcl/tcl/acs-private-data-procs.tcl
===================================================================
RCS file: /usr/local/cvsroot/openacs-4/packages/acs-tcl/tcl/acs-private-data-procs.tcl,v
diff -u -N -r1.9.2.1 -r1.9.2.2
--- openacs-4/packages/acs-tcl/tcl/acs-private-data-procs.tcl 29 Aug 2022 14:17:24 -0000 1.9.2.1
+++ openacs-4/packages/acs-tcl/tcl/acs-private-data-procs.tcl 7 Feb 2023 11:47:40 -0000 1.9.2.2
@@ -9,27 +9,45 @@
namespace eval acs_privacy {
- ad_proc -public privacy_control_enabled_p {} {
+ ad_proc -deprecated privacy_control_enabled_p {} {
Returns whether privacy control is turned on or not.
This is provided in order to have complete backwards
compatibility with past behaviors, where private information
was in no way regulated.
+
+ DEPRECATED: this privacy feature was only used in the context
+ of dotlrn, which also has an own set of apis fot a similar
+ purpose.
+
+ @see dotlrn
} {
# If no parameter set, then we assume privacy control is DISABLED
return [parameter::get -package_id [ad_acs_kernel_id] -parameter PrivacyControlEnabledP -default 0]
}
- ad_proc -public privacy_control_set {val} {
+ ad_proc -deprecated privacy_control_set {val} {
set the privacy control
+
+ DEPRECATED: this privacy feature was only used in the context
+ of dotlrn, which also has an own set of apis fot a similar
+ purpose.
+
+ @see dotlrn
} {
return [parameter::set_value -value $val -package_id [ad_acs_kernel_id] -parameter PrivacyControlEnabledP]
}
- ad_proc -public user_can_read_private_data_p {
+ ad_proc -deprecated user_can_read_private_data_p {
{-user_id ""}
{-object_id:required}
} {
check if a user can access an object's private data
+
+ DEPRECATED: this privacy feature was only used in the context
+ of dotlrn, which also has an own set of apis fot a similar
+ purpose.
+
+ @see dotlrn
} {
if {[privacy_control_enabled_p]} {
return [permission::permission_p -party_id $user_id -object_id $object_id -privilege read_private_data]
@@ -39,12 +57,18 @@
}
}
- ad_proc -public set_user_read_private_data {
+ ad_proc -deprecated set_user_read_private_data {
{-user_id:required}
{-object_id:required}
{-value:required}
} {
grant permission to access private data
+
+ DEPRECATED: this privacy feature was only used in the context
+ of dotlrn, which also has an own set of apis fot a similar
+ purpose.
+
+ @see dotlrn
} {
if { [string is true -strict $value] } {
permission::grant -party_id $user_id -object_id $object_id -privilege read_private_data
Index: openacs-4/packages/dotlrn/dotlrn.info
===================================================================
RCS file: /usr/local/cvsroot/openacs-4/packages/dotlrn/dotlrn.info,v
diff -u -N -r1.148.2.11 -r1.148.2.12
--- openacs-4/packages/dotlrn/dotlrn.info 24 Apr 2022 12:12:15 -0000 1.148.2.11
+++ openacs-4/packages/dotlrn/dotlrn.info 7 Feb 2023 11:47:40 -0000 1.148.2.12
@@ -7,17 +7,16 @@
f
f
-
+
OpenACS
A Course Management System
2021-09-15
DotLRN Consortium
2
Course Management
-
-
-
+
+
@@ -113,7 +112,7 @@
-
+
Index: openacs-4/packages/dotlrn/tcl/dotlrn-security-procs.tcl
===================================================================
RCS file: /usr/local/cvsroot/openacs-4/packages/dotlrn/tcl/dotlrn-security-procs.tcl,v
diff -u -N -r1.64.2.3 -r1.64.2.4
--- openacs-4/packages/dotlrn/tcl/dotlrn-security-procs.tcl 1 Sep 2020 17:16:11 -0000 1.64.2.3
+++ openacs-4/packages/dotlrn/tcl/dotlrn-security-procs.tcl 7 Feb 2023 11:47:40 -0000 1.64.2.4
@@ -292,10 +292,10 @@
Check if a user can read sensitive data in dotLRN
} {
if { [parameter::get -parameter protect_private_data_p -default 1] } {
- return [acs_privacy::user_can_read_private_data_p \
- -user_id $user_id \
- -object_id $object_id
- ]
+ return [permission::permission_p \
+ -party_id $user_id \
+ -object_id $object_id \
+ -privilege read_private_data]
} else {
return 1
}
Index: openacs-4/packages/forums-portlet/www/forums-portlet.tcl
===================================================================
RCS file: /usr/local/cvsroot/openacs-4/packages/forums-portlet/www/forums-portlet.tcl,v
diff -u -N -r1.22.2.6 -r1.22.2.7
--- openacs-4/packages/forums-portlet/www/forums-portlet.tcl 3 May 2020 17:31:07 -0000 1.22.2.6
+++ openacs-4/packages/forums-portlet/www/forums-portlet.tcl 7 Feb 2023 11:47:40 -0000 1.22.2.7
@@ -34,11 +34,7 @@
# Question is, if we want to enforce such policy there, or we can just remove
# this permission check altogether.
#
-if { [acs_privacy::privacy_control_enabled_p] } {
- set private_data_restriction {and acs_permission.permission_p(forums_forums.package_id, :user_id, 'read_private_data')}
-} else {
- set private_data_restriction ""
-}
+set private_data_restriction {and acs_permission.permission_p(forums_forums.package_id, :user_id, 'read_private_data')}
set user_id [ad_conn user_id]