芝麻web文件管理V1.00
编辑当前文件:/home2/sdektunc/.trash/cepali/admin/roles/classes/override_permissions_table_advanced.php
. /** * override permissions table. * * @package core_role * @copyright 1999 onwards Martin Dougiamas (http://dougiamas.com) * @license http://www.gnu.org/copyleft/gpl.html GNU GPL v3 or later */ defined('MOODLE_INTERNAL') || die(); class core_role_override_permissions_table_advanced extends core_role_capability_table_with_risks { protected $strnotset; protected $haslockedcapabilities = false; /** * Constructor. * * This method loads loads all the information about the current state of * the overrides, then updates that based on any submitted data. It also * works out which capabilities should be locked for this user. * * @param object $context the context this table relates to. * @param integer $roleid the role being overridden. * @param boolean $safeoverridesonly If true, the user is only allowed to override * capabilities with no risks. */ public function __construct($context, $roleid, $safeoverridesonly) { parent::__construct($context, 'overriderolestable', $roleid); $this->displaypermissions = $this->allpermissions; $this->strnotset = get_string('notset', 'core_role'); // Determine which capabilities should be locked. if ($safeoverridesonly) { foreach ($this->capabilities as $capid => $cap) { if (!is_safe_capability($cap)) { $this->capabilities[$capid]->locked = true; $this->haslockedcapabilities = true; } } } } /** * This method adds an additional class to a row if capability is other than inherited. * * @param stdClass $capability * @return array */ protected function get_row_attributes($capability) { $rowattributes = parent::get_row_attributes($capability); if ($this->permissions[$capability->name] !== 0) { if (empty($rowattributes['class'])) { $rowattributes['class'] = "overriddenpermission"; } else { $rowattributes['class'] .= " overriddenpermission"; } } return $rowattributes; } protected function load_parent_permissions() { // Get the capabilities from the parent context, so that can be shown in the interface. $parentcontext = $this->context->get_parent_context(); $this->parentpermissions = role_context_capabilities($this->roleid, $parentcontext); } public function has_locked_capabilities() { return $this->haslockedcapabilities; } protected function add_permission_cells($capability) { $disabled = ''; if ($capability->locked || $this->parentpermissions[$capability->name] == CAP_PROHIBIT) { $disabled = ' disabled="disabled"'; } // One cell for each possible permission. $content = ''; foreach ($this->displaypermissions as $perm => $permname) { $strperm = $this->strperms[$permname]; $extraclass = ''; if ($perm != CAP_INHERIT && $perm == $this->parentpermissions[$capability->name]) { $extraclass = ' capcurrent'; } $checked = ''; if ($this->permissions[$capability->name] == $perm) { $checked = 'checked="checked" '; } $content .= '
'; $content .= '
'; if ($perm == CAP_INHERIT) { $inherited = $this->parentpermissions[$capability->name]; if ($inherited == CAP_INHERIT) { $inherited = $this->strnotset; } else { $inherited = $this->strperms[$this->allpermissions[$inherited]]; } $strperm .= ' (' . $inherited . ')'; } $content .= '
' . $strperm . '
'; $content .= '
'; } return $content; } }