aboutsummaryrefslogtreecommitdiffstats
path: root/Zotlabs/Daemon
diff options
context:
space:
mode:
authorredmatrix <git@macgirvin.com>2016-08-01 20:12:52 -0700
committerredmatrix <git@macgirvin.com>2016-08-01 20:12:52 -0700
commit3a7d3e3a542ef9297a8a20e3548f01f43fb37f0e (patch)
tree6407606ded7a75412ed888a80693f3774e63c875 /Zotlabs/Daemon
parent4c76b31684342259a43c036373f3757a916b1d3a (diff)
downloadvolse-hubzilla-3a7d3e3a542ef9297a8a20e3548f01f43fb37f0e.tar.gz
volse-hubzilla-3a7d3e3a542ef9297a8a20e3548f01f43fb37f0e.tar.bz2
volse-hubzilla-3a7d3e3a542ef9297a8a20e3548f01f43fb37f0e.zip
This checkin should make all permission modes work correctly with atokens (they should be able to post content if allowed to). It also removes the strict linkage between permissions and connections so any individual permission can be set for any xchan; even those for which you have no connections.
Diffstat (limited to 'Zotlabs/Daemon')
-rw-r--r--Zotlabs/Daemon/Cron.php10
1 files changed, 7 insertions, 3 deletions
diff --git a/Zotlabs/Daemon/Cron.php b/Zotlabs/Daemon/Cron.php
index c6e82b13a..c66b62f55 100644
--- a/Zotlabs/Daemon/Cron.php
+++ b/Zotlabs/Daemon/Cron.php
@@ -64,12 +64,16 @@ class Cron {
// delete expired access tokens
- q("delete from atoken where atoken_expires != '%s' && atoken_expires < %s",
+ $r = q("select atoken_id from atoken where atoken_expires != '%s' && atoken_expires < %s",
dbesc(NULL_DATE),
db_utcnow()
);
-
-
+ if($r) {
+ require_once('include/security.php');
+ foreach($r as $rr) {
+ atoken_delete($rr['atoken_id']);
+ }
+ }
// Ensure that every channel pings a directory server once a month. This way we can discover
// channels and sites that quietly vanished and prevent the directory from accumulating stale