name)) { continue; } // prints a breaker if component or name or context level //if ($capability->component != $component or $capability->contextlevel != $contextlevel) { if (component_level_changed($capability, $component, $contextlevel)) { echo (''); } // these 2 are used to see to group same mod/core capabilities together $contextlevel = $capability->contextlevel; $component = $capability->component; // check the capability override for this cap, this role in this context if (isset($localoverrides[$capability->name])) { $localpermission = $localoverrides[$capability->name]->permission; } else { $localpermission = 0; // Just inherit } if (isset($r_caps[$capability->name])) { $isallow = $r_caps[$capability->name] > 0; $isprevent = $r_caps[$capability->name] < 0 && $r_caps[$capability->name] > -500; $isprohibit = $r_caps[$capability->name] <= -500; } else { $isallow = 0; $isprevent = 0; $isprohibit = 0; } $isdisabled = $isprohibit || $capability->locked; $riskinfo = ''; ?>
'.get_component_string($capability->component, $capability->contextlevel).'
'; $rowclasses = ''; if (RISK_MANAGETRUST & (int)$capability->riskbitmask) { $riskinfo .= ''; $riskinfo .= ''.get_string('riskmanagetrustshort', 'admin').''; $rowclasses .= ' riskmanagetrust'; } $riskinfo .= ''; if (RISK_CONFIG & (int)$capability->riskbitmask) { $riskinfo .= ''; $riskinfo .= ''.get_string('riskconfigshort', 'admin').''; $rowclasses .= ' riskconfig'; } $riskinfo .= ''; if (RISK_XSS & (int)$capability->riskbitmask) { $riskinfo .= ''; $riskinfo .= ''.get_string('riskxssshort', 'admin').''; $rowclasses .= ' riskxss'; } $riskinfo .= ''; if (RISK_PERSONAL & (int)$capability->riskbitmask) { $riskinfo .= ''; $riskinfo .= ''.get_string('riskpersonalshort', 'admin').''; $rowclasses .= ' riskpersonal'; } $riskinfo .= ''; if (RISK_SPAM & (int)$capability->riskbitmask) { $riskinfo .= ''; $riskinfo .= ''.get_string('riskspamshort', 'admin').''; $rowclasses .= ' riskspam'; } $riskinfo .= '
name); ?>name ?> /> /> /> />
'.$strsafewarning.''; } ?>