aboutsummaryrefslogtreecommitdiffstats
path: root/doc/database
diff options
context:
space:
mode:
authorzotlabs <mike@macgirvin.com>2017-03-13 16:19:47 -0700
committerzotlabs <mike@macgirvin.com>2017-03-13 16:19:47 -0700
commit58aa0f3e1a52a0c20016a4330100231ad505e6e4 (patch)
treea599768b88ac95a8c8bc395371b249dd5ab518d4 /doc/database
parent02b390d7b867750aa466f912a8e1024d35ebf4e8 (diff)
downloadvolse-hubzilla-58aa0f3e1a52a0c20016a4330100231ad505e6e4.tar.gz
volse-hubzilla-58aa0f3e1a52a0c20016a4330100231ad505e6e4.tar.bz2
volse-hubzilla-58aa0f3e1a52a0c20016a4330100231ad505e6e4.zip
code_allowed is a real mess. Start the cleanup by remving the account level code allow and limiting to specific channels only. This reduces the possibility of cross channel security issues coming into play. Then provide a single function for checking the code permission. This is only partially done as we often need to check against the observer or logged in channel as well as the resource owner to ensure that this only returns true for local channels which also own the requested resource.
Diffstat (limited to 'doc/database')
-rw-r--r--doc/database/db_account.bb1
1 files changed, 0 insertions, 1 deletions
diff --git a/doc/database/db_account.bb b/doc/database/db_account.bb
index 354f2d3a8..35d7a9eb3 100644
--- a/doc/database/db_account.bb
+++ b/doc/database/db_account.bb
@@ -58,7 +58,6 @@ define ( 'ACCOUNT_PENDING', 0x0010 );
* Account roles
*/
-define ( 'ACCOUNT_ROLE_ALLOWCODE', 0x0001 ); // 1 - this account can create content with PHP/Javascript
define ( 'ACCOUNT_ROLE_SYSTEM', 0x0002 ); // 2 - this is the special system account
define ( 'ACCOUNT_ROLE_DEVELOPER', 0x0004 );
define ( 'ACCOUNT_ROLE_ADMIN', 0x1000 ); // 4096 - this account is an administrator