Index: openacs-4/packages/acs-kernel/acs-kernel.info =================================================================== RCS file: /usr/local/cvsroot/openacs-4/packages/acs-kernel/acs-kernel.info,v diff -u -N -r1.150.2.50 -r1.150.2.51 --- openacs-4/packages/acs-kernel/acs-kernel.info 1 Dec 2022 16:39:48 -0000 1.150.2.50 +++ openacs-4/packages/acs-kernel/acs-kernel.info 7 Feb 2023 11:47:40 -0000 1.150.2.51 @@ -9,15 +9,15 @@ f t - + OpenACS Core Team Routines and data models providing the foundation for OpenACS-based Web services. 2021-09-15 OpenACS The OpenACS kernel contains the core datamodel create and drop scripts for such things as objects, groups, parties and the supporting PL/SQL and PL/pgSQL procedures. 3 - + @@ -61,7 +61,7 @@ - + Index: openacs-4/packages/acs-tcl/acs-tcl.info =================================================================== RCS file: /usr/local/cvsroot/openacs-4/packages/acs-tcl/acs-tcl.info,v diff -u -N -r1.95.2.55 -r1.95.2.56 --- openacs-4/packages/acs-tcl/acs-tcl.info 28 Nov 2022 17:49:22 -0000 1.95.2.55 +++ openacs-4/packages/acs-tcl/acs-tcl.info 7 Feb 2023 11:47:40 -0000 1.95.2.56 @@ -9,7 +9,7 @@ f t - + OpenACS The Kernel Tcl API library. 2021-09-15 @@ -18,9 +18,9 @@ GPL version 2 3 - + - + Index: openacs-4/packages/acs-tcl/tcl/acs-private-data-procs.tcl =================================================================== RCS file: /usr/local/cvsroot/openacs-4/packages/acs-tcl/tcl/acs-private-data-procs.tcl,v diff -u -N -r1.9.2.1 -r1.9.2.2 --- openacs-4/packages/acs-tcl/tcl/acs-private-data-procs.tcl 29 Aug 2022 14:17:24 -0000 1.9.2.1 +++ openacs-4/packages/acs-tcl/tcl/acs-private-data-procs.tcl 7 Feb 2023 11:47:40 -0000 1.9.2.2 @@ -9,27 +9,45 @@ namespace eval acs_privacy { - ad_proc -public privacy_control_enabled_p {} { + ad_proc -deprecated privacy_control_enabled_p {} { Returns whether privacy control is turned on or not. This is provided in order to have complete backwards compatibility with past behaviors, where private information was in no way regulated. + + DEPRECATED: this privacy feature was only used in the context + of dotlrn, which also has an own set of apis fot a similar + purpose. + + @see dotlrn } { # If no parameter set, then we assume privacy control is DISABLED return [parameter::get -package_id [ad_acs_kernel_id] -parameter PrivacyControlEnabledP -default 0] } - ad_proc -public privacy_control_set {val} { + ad_proc -deprecated privacy_control_set {val} { set the privacy control + + DEPRECATED: this privacy feature was only used in the context + of dotlrn, which also has an own set of apis fot a similar + purpose. + + @see dotlrn } { return [parameter::set_value -value $val -package_id [ad_acs_kernel_id] -parameter PrivacyControlEnabledP] } - ad_proc -public user_can_read_private_data_p { + ad_proc -deprecated user_can_read_private_data_p { {-user_id ""} {-object_id:required} } { check if a user can access an object's private data + + DEPRECATED: this privacy feature was only used in the context + of dotlrn, which also has an own set of apis fot a similar + purpose. + + @see dotlrn } { if {[privacy_control_enabled_p]} { return [permission::permission_p -party_id $user_id -object_id $object_id -privilege read_private_data] @@ -39,12 +57,18 @@ } } - ad_proc -public set_user_read_private_data { + ad_proc -deprecated set_user_read_private_data { {-user_id:required} {-object_id:required} {-value:required} } { grant permission to access private data + + DEPRECATED: this privacy feature was only used in the context + of dotlrn, which also has an own set of apis fot a similar + purpose. + + @see dotlrn } { if { [string is true -strict $value] } { permission::grant -party_id $user_id -object_id $object_id -privilege read_private_data Index: openacs-4/packages/dotlrn/dotlrn.info =================================================================== RCS file: /usr/local/cvsroot/openacs-4/packages/dotlrn/dotlrn.info,v diff -u -N -r1.148.2.11 -r1.148.2.12 --- openacs-4/packages/dotlrn/dotlrn.info 24 Apr 2022 12:12:15 -0000 1.148.2.11 +++ openacs-4/packages/dotlrn/dotlrn.info 7 Feb 2023 11:47:40 -0000 1.148.2.12 @@ -7,17 +7,16 @@ f f - + OpenACS A Course Management System 2021-09-15 DotLRN Consortium 2 Course Management - - - + + @@ -113,7 +112,7 @@ - + Index: openacs-4/packages/dotlrn/tcl/dotlrn-security-procs.tcl =================================================================== RCS file: /usr/local/cvsroot/openacs-4/packages/dotlrn/tcl/dotlrn-security-procs.tcl,v diff -u -N -r1.64.2.3 -r1.64.2.4 --- openacs-4/packages/dotlrn/tcl/dotlrn-security-procs.tcl 1 Sep 2020 17:16:11 -0000 1.64.2.3 +++ openacs-4/packages/dotlrn/tcl/dotlrn-security-procs.tcl 7 Feb 2023 11:47:40 -0000 1.64.2.4 @@ -292,10 +292,10 @@ Check if a user can read sensitive data in dotLRN } { if { [parameter::get -parameter protect_private_data_p -default 1] } { - return [acs_privacy::user_can_read_private_data_p \ - -user_id $user_id \ - -object_id $object_id - ] + return [permission::permission_p \ + -party_id $user_id \ + -object_id $object_id \ + -privilege read_private_data] } else { return 1 } Index: openacs-4/packages/forums-portlet/www/forums-portlet.tcl =================================================================== RCS file: /usr/local/cvsroot/openacs-4/packages/forums-portlet/www/forums-portlet.tcl,v diff -u -N -r1.22.2.6 -r1.22.2.7 --- openacs-4/packages/forums-portlet/www/forums-portlet.tcl 3 May 2020 17:31:07 -0000 1.22.2.6 +++ openacs-4/packages/forums-portlet/www/forums-portlet.tcl 7 Feb 2023 11:47:40 -0000 1.22.2.7 @@ -34,11 +34,7 @@ # Question is, if we want to enforce such policy there, or we can just remove # this permission check altogether. # -if { [acs_privacy::privacy_control_enabled_p] } { - set private_data_restriction {and acs_permission.permission_p(forums_forums.package_id, :user_id, 'read_private_data')} -} else { - set private_data_restriction "" -} +set private_data_restriction {and acs_permission.permission_p(forums_forums.package_id, :user_id, 'read_private_data')} set user_id [ad_conn user_id]