Use the BSTemplate::$preParseHook for global templates
[bugdar.git] / includes / functions.php
1 <?php
2 /*=====================================================================*\
3 || ###################################################################
4 || # Bugdar
5 || # Copyright ©2002-2007 Blue Static
6 || #
7 || # This program is free software; you can redistribute it and/or modify
8 || # it under the terms of the GNU General Public License as published by
9 || # the Free Software Foundation; version 2 of the License.
10 || #
11 || # This program is distributed in the hope that it will be useful, but
12 || # WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
13 || # or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
14 || # more details.
15 || #
16 || # You should have received a copy of the GNU General Public License along
17 || # with this program; if not, write to the Free Software Foundation, Inc.,
18 || # 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA
19 || ###################################################################
20 \*=====================================================================*/
21
22 // ###################################################################
23 /**
24 * Constructs HTML code <select>s from an array. You use they keys when
25 * you need to access a multi-dimensional array of data.
26 *
27 * @access public
28 *
29 * @param string HTML name of the select
30 * @param array Array of <option>s
31 * @param integer ID of the selected item, 0 for none
32 * @param string Name of the index where values are stored in the $array
33 * @param string Name of the iddex where the labels are stored in $array
34 * @param bool Value of the blank option, FALSE turns it off
35 * @param bool Construct a multiple-selection <select> menu and append "[]" to the end of the name
36 *
37 * @return string Constructed HTML output
38 */
39 function construct_option_select($name, $array, $selected = 0, $valuekey = '', $labelkey = '', $includenil = false, $multiple = false)
40 {
41 global $bugsys;
42
43 if ($multiple)
44 {
45 $selected = explode(',', $selected);
46 }
47
48 // if we're not working on a boolean false, we use it for the value (allows -1 and 0)
49 if ($includenil !== false)
50 {
51 $opts[] = '<option value="' . $includenil . '"' . ((!$selected OR (is_array($selected) AND in_array($includenil, $selected))) ? ' selected="selected"' : '') . '> ---------</option>';
52 }
53 foreach ($array AS $value => $label)
54 {
55 $newval = ($valuekey ? $label["$valuekey"] : $value);
56 $newlab = ($labelkey ? $label["$labelkey"] : $label);
57 $opts[] = '<option value="' . $newval . '"' . (($selected == $newval OR (is_array($selected) AND in_array($newval, $selected))) ? ' selected="selected"' : '') . '>' . $newlab . '</option>';
58 }
59 return '<select class="input" name="' . $name . ($multiple ? '[]' : '') . '"' . ($multiple ? ' multiple="multiple" size="' . (sizeof($array) < 8 ? sizeof($array) + 1 : 8) . '"' : '') . '>' . implode("\n\t", $opts) . "\r</select>";
60 }
61
62 // ################### Start construct_user_display ##################
63 // $userinfo needs userid, email, displayname, and showemail
64 function construct_user_display($userinfo, $html = true)
65 {
66 global $bugsys;
67
68 if (!$userinfo['userid'])
69 {
70 $userinfo['displayname'] = T('Guest');
71 $userinfo['showemail'] = false;
72 }
73
74 if ($html)
75 {
76 eval('$username = "' . $bugsys->template->fetch('username_display') . '";');
77 }
78 else
79 {
80 if ($userinfo['showemail'])
81 {
82 $username = sprintf(T('%1$s &lt;%2$s&gt;'), $userinfo['displayname'], $userinfo['email']);
83 }
84 else
85 {
86 $username = $userinfo['displayname'];
87 }
88 }
89
90 return $username;
91 }
92
93 // ######################## Start can_perform ########################
94 // short-hand for bitwise &
95 function can_perform($bitmask, $productid = 0, $userinfo = null)
96 {
97 global $bugsys;
98
99 // masks that aren't product-specific
100 static $inspecific = array(
101 'cansearch',
102 'canbeassignedto',
103 'canadminpanel',
104 'canadminbugs',
105 'canadminfields',
106 'canadminversions',
107 'canadminusers',
108 'canadmingroups',
109 'canadmintools'
110 );
111
112 if ($userinfo == null)
113 {
114 $userinfo =& bugdar::$userinfo;
115 }
116
117 $permissions =& bugdar::$datastore['permission'];
118
119 if (!isset($bugsys->permissions["$bitmask"]))
120 {
121 trigger_error('Invalid bitmask "' . $bitmask . '" specified for can_perform() [includes/functions.php]', E_USER_WARNING);
122 }
123
124 if (!$userinfo['permissions'])
125 {
126 $userinfo['permissions'] = FetchUserPermissions($userinfo);
127 }
128
129 if ($productid AND !in_array($bitmask, $inspecific))
130 {
131 $verdict = (isset($permissions["$userinfo[usergroupid]"]["$productid"]) ? ($permissions["$userinfo[usergroupid]"]["$productid"] & $bugsys->permissions["$bitmask"]) : ($userinfo['permissions'] & $bugsys->permissions["$bitmask"]));
132
133 foreach ($userinfo['groupids'] AS $group)
134 {
135 if (isset($permissions["$group"]["$productid"]))
136 {
137 $verdict |= ($permissions["$group"]["$productid"] & $bugsys->permissions["$bitmask"]);
138 }
139 }
140 $bugsys->debug("verdict* on can_perform($bitmask, $productid, $userinfo[userid]) = $verdict");
141 return $verdict;
142 }
143
144 BSApp::debug("verdict on can_perform($bitmask, $productid, $userinfo[userid]) = " . ($userinfo['permissions'] & $bugsys->permissions["$bitmask"]));
145 return ($userinfo['permissions'] & $bugsys->permissions["$bitmask"]);
146 }
147
148 // ###################################################################
149 /**
150 * Runs through a given datastore item and creates a series of <select>
151 * options.
152 *
153 * @access public
154 *
155 * @param string Datastore name
156 * @param string Array index for the label
157 * @param string Array index for the value
158 * @param mixed The selected value(s)
159 * @param bool Include a blank option? TRUE will set a null value, FALSE turns it off, anything else is used as the value for the blank option
160 * @param bool Generate it using admin printers?
161 *
162 * @return string Unelss in admin mode, returns the constructed options
163 */
164 function construct_datastore_select($datastore, $labelname, $valuename, $selectedvalue = 0, $includeblank = false, $adminmode = false)
165 {
166 global $bugsys;
167
168 if ($adminmode)
169 {
170 global $admin;
171 }
172
173 $select = '';
174
175 if ($includeblank === true OR $includeblank !== false)
176 {
177 $newval = ($inclueblank === true ? '' : $includeblank);
178 if ($adminmode)
179 {
180 $admin->list_item('', '', ((!$selectedvalue OR (is_array($selectedvalue) AND in_array($newval, $selectedvalue))) ? true : false));
181 }
182 else
183 {
184 $label = '';
185 $value = $newval;
186 $selected = ((!$selectedvalue OR (is_array($selectedvalue) AND in_array($newval, $selectedvalue))) ? true : false);
187 eval('$select .= "' . $bugsys->template->fetch('selectoption') . '";');
188 }
189 }
190
191 foreach (bugdar::$datastore["$datastore"] AS $item)
192 {
193 $label = $item["$labelname"];
194 $value = $item["$valuename"];
195 $selected = (($value == $selectedvalue OR (is_array($selectedvalue) AND in_array($value, $selectedvalue))) ? true : false);
196
197 if ($adminmode)
198 {
199 $admin->list_item($label, $value, $selected);
200 }
201 else
202 {
203 eval('$select .= "' . $bugsys->template->fetch('selectoption') . '";');
204 }
205 }
206
207 if (!$adminmode)
208 {
209 return $select;
210 }
211 }
212
213 // ################## Start construct_custom_fields ##################
214 function construct_custom_fields($bug = array(), $ignore21mask = false, $nodefault = false, $searchMode = false)
215 {
216 global $bugsys;
217 static $fields;
218
219 if (!is_array($fields))
220 {
221 $fields = array();
222 $fields_fetch = $bugsys->db->query("
223 SELECT bugfield.*, MAX(permission.mask) AS mask
224 FROM " . TABLE_PREFIX . "bugfield AS bugfield
225 LEFT JOIN " . TABLE_PREFIX . "bugfieldpermission AS permission
226 ON (bugfield.fieldid = permission.fieldid)
227 WHERE (permission.mask = 2 OR permission.mask = 1)
228 AND permission.usergroupid IN (" . bugdar::$userinfo['usergroupid'] . (sizeof(bugdar::$userinfo['groupids']) != 0 ? ',' . implode(',', bugdar::$userinfo['groupids']) : '') . ")
229 GROUP BY (bugfield.fieldid)
230 ");
231 foreach ($fields_fetch as $field)
232 {
233 $fields["$field[fieldid]"] = $field;
234 }
235 }
236
237 $fieldbits = array();
238
239 foreach ($fields AS $field)
240 {
241 if ($nodefault)
242 {
243 $field['defaultvalue'] = '';
244 }
245
246 if (!is_null($bug["custom$field[fieldid]"]))
247 {
248 $bugsys->debug("not null: $field[fieldid]");
249 $value = $bug["custom$field[fieldid]"];
250 }
251 else
252 {
253 $value = $field['defaultvalue'];
254 }
255
256 if ($ignore21mask AND $field['mask'] != 0)
257 {
258 $field['mask'] = 2;
259 }
260
261 if ($field['mask'] == 2)
262 {
263 switch ($field['type'])
264 {
265 case 'input_text':
266 eval('$tempfield = "' . $bugsys->template->fetch('bugfield_input_text') . '";');
267 break;
268
269 case 'input_checkbox':
270 $selected = ($value ? ' checked="checked"' : '');
271 eval('$tempfield = "' . $bugsys->template->fetch('bugfield_input_checkbox') . '";');
272 break;
273
274 case 'select_single':
275 $selects = unserialize($field['selects']);
276 $value = trim($value);
277
278 $options = '';
279
280 $id = -1;
281 $select = '';
282 if (!$field['usedefault'] AND !trim($value))
283 {
284 $selected = ' selected="selected"';
285 }
286 else
287 {
288 $selected = '';
289 }
290 eval('$options .= "' . $bugsys->template->fetch('bugfield_select_single_option') . '";');
291
292 foreach ($selects AS $id => $select)
293 {
294 $selected = '';
295 $select = stripslashes(trim($select));
296 if ($select == $value)
297 {
298 $selected = ' selected="selected"';
299 }
300 else if ($field['usedefault'] AND $id == 0)
301 {
302 $selected = ' selected="selected"';
303 }
304 eval('$options .= "' . $bugsys->template->fetch('bugfield_select_single_option') . '";');
305 }
306 eval('$tempfield = "' . $bugsys->template->fetch('bugfield_select_single') . '";');
307 break;
308 }
309 }
310 else
311 {
312 $bugsys->debug('mask 1 processing');
313 if (is_null($bug["custom$field[fieldid]"]))
314 {
315 $bugsys->debug("is null: $field[fieldid]");
316 if ($field['type'] == 'select_single')
317 {
318 if ($field['usedefault'])
319 {
320 $temp = unserialize($field['selects']);
321 $value = trim($temp[0]);
322 }
323 else
324 {
325 $value = $bug["custom$field[fieldid]"];
326 }
327 }
328 else
329 {
330 $value = $field['defaultvalue'];
331 }
332 }
333 else
334 {
335 $value = $bug["custom$field[fieldid]"];
336 }
337
338 if ($field['type'] == 'input_checkbox')
339 {
340 $value = ($value ? 'True' : 'False');
341 }
342 $field['value'] = $value;
343 eval('$tempfield = "' . $bugsys->template->fetch('bugfield_static_text') . '";');
344 }
345 $fieldbits[] = $tempfield;
346 }
347
348 return $fieldbits;
349 }
350
351 // ###################################################################
352 /**
353 * This takes the bug API object and input data and then sanitizes, verifies,
354 * and processes the data for custom fields. If there are any errors,
355 * they are passed to the message reporter.
356 *
357 * @param object A BugAPI object
358 * @param object MessageReporter object
359 * @param bool If there are errors, add them to an errorbox format? If not, then display-on-encounter
360 * @param bool Search mode: don't change certain fields when they're 0 or empty
361 *
362 * @return mixed NULL if an ID is passed, string if bugid is NULL
363 */
364 function process_custom_fields(&$bugapi, &$msg, $errorbox = false, $searchMode = false)
365 {
366 global $bugsys;
367
368 if (!$inputdata)
369 {
370 $inputdata =& $bugsys->in;
371 }
372
373 $fields = $bugsys->db->query("
374 SELECT bugfield.*, MAX(permission.mask) AS mask
375 FROM " . TABLE_PREFIX . "bugfield AS bugfield
376 LEFT JOIN " . TABLE_PREFIX . "bugfieldpermission AS permission
377 ON (bugfield.fieldid = permission.fieldid)
378 WHERE permission.mask = 2
379 AND permission.usergroupid IN (" . bugdar::$userinfo['usergroupid'] . (sizeof(bugdar::$userinfo['groupids']) != 0 ? ',' . implode(',', bugdar::$userinfo['groupids']) : '') . ")
380 GROUP BY (bugfield.fieldid)
381 ");
382 foreach ($fields as $field)
383 {
384 $fieldname = "custom$field[fieldid]";
385
386 if ($field['type'] == 'input_checkbox')
387 {
388 if ($searchMode AND intval($inputdata["$fieldname"]) == 0)
389 {
390 continue;
391 }
392 $bugapi->set($fieldname, intval($inputdata["$fieldname"]));
393 continue;
394 }
395 else if ($field['type'] == 'select_single')
396 {
397 $temp = unserialize($field['selects']);
398 $inputdata[$fieldname] = $temp[intval($inputdata["$fieldname"])] . ''; // make it a string so isset() doesn't catch
399 }
400
401 // field data wasn't passed, so skip it
402 if (!isset($inputdata["$fieldname"]))
403 {
404 continue;
405 }
406
407 if ($field['required'] AND empty($inputdata["$fieldname"]) AND !$searchMode)
408 {
409 $errorlist[] = sprintf(T('The field "%1$s" is a required.'), $field['name']);
410 continue;
411 }
412
413 if (!empty($field['regexmatch']))
414 {
415 if (!preg_match('#' . str_replace('#', '\#', $field['regexmatch']) . '#si', $inputdata["$fieldname"]))
416 {
417 $errorlist[] = sprintf(T('%1$s does not match the specified format'), $field['name']);
418 continue;
419 }
420 }
421
422 if (isset($inputdata["$fieldname"]))
423 {
424 if ($field['type'] == 'input_text')
425 {
426 if (empty($inputdata["$fieldname"]) AND $searchMode)
427 {
428 continue;
429 }
430 $bugapi->set($fieldname, $inputdata["$fieldname"]);
431 }
432 else
433 {
434 if (empty($inputdata["$fieldname"]))
435 {
436 if (!$searchMode)
437 {
438 $bugapi->set($fieldname, '');
439 }
440 continue;
441 }
442
443 $bugapi->set($fieldname, trim($inputdata["$fieldname"]));
444 }
445 }
446 }
447
448 if ($errorlist)
449 {
450 if ($errorbox)
451 {
452 foreach ($errorlist AS $err)
453 {
454 $msg->addError($err);
455 }
456 }
457 else
458 {
459 $msg->error($errorlist[0]);
460 }
461 }
462 }
463
464 // ####################### Start fetch_on_bits #######################
465 function fetch_on_bits($mask, $userinfo = null)
466 {
467 global $bugsys;
468
469 if ($userinfo == null)
470 {
471 $userinfo =& bugdar::$userinfo;
472 }
473
474 $onbits = array();
475
476 $usergroupid = $userinfo['usergroupid'];
477 FetchUserPermissions($userinfo); // get the groups
478 $groups = $userinfo['groupids'];
479 $groups[] = $usergroupid;
480
481 // product-inspecific work
482 if (is_array(bugdar::$datastore['product']))
483 {
484 foreach ($groups AS $groupid)
485 {
486 // we only need to do this so long as there's no onbits array because this isn't product specific
487 if (sizeof($onbits) == 0 AND bugdar::$datastore['usergroup']["$groupid"]['permissions'] & $bugsys->permissions["$mask"])
488 {
489 foreach (bugdar::$datastore['product'] AS $id => $product)
490 {
491 $onbits["$id"] = $id;
492 }
493 }
494 }
495 }
496
497 // bits set explicitly by products
498 $explicit = array();
499
500 // product specific work
501 foreach ($groups AS $groupid)
502 {
503 if (is_array(bugdar::$datastore['permission']["$groupid"]))
504 {
505 foreach (bugdar::$datastore['permission']["$groupid"] AS $productid => $bit)
506 {
507 if ($bit & $bugsys->permissions["$mask"])
508 {
509 $explicit["$productid"] = $productid;
510 $onbits["$productid"] = $productid;
511 }
512 else
513 {
514 // only unset if the bit was set in the first place by blanket and not product-specific permissions
515 // if it was set by product permissions then the highest level takes precedence
516 if ($onbits["$productid"] AND !isset($explicit["$productid"]))
517 {
518 unset($onbits["$productid"]);
519 }
520 }
521 }
522 }
523 }
524
525 // SQL queries would become very unhappy if we didn't do this
526 if (sizeof($onbits) < 1)
527 {
528 $onbits = array(0);
529 }
530
531 return implode(',', $onbits);
532 }
533
534 // #################### Start isso_pre_parse_hook ####################
535 // the pre-parse hook for ISSO's template engine
536 function isso_pre_parse_hook($template, $obj)
537 {
538 $globals = array(
539 'header' => BSTemplate::fetch('header')->evaluate(),
540 'doctype' => BSTemplate::fetch('doctype')->evaluate(),
541 'headinclude' => BSTemplate::fetch('headinclude')->evaluate(),
542 'footer' => BSTemplate::fetch('footer')->evaluate()
543 );
544
545 print_r($globals);
546
547 $obj->vars = array_merge($globals, $obj->vars);
548
549 $template = preg_replace('#\$help\[(.*)\]#', '" . fetch_help_link("\1") . "', $template);
550 return $template;
551 }
552
553 // ###################### Start fetch_help_link ######################
554 // returns a prepared link to insert into templates that opens up a
555 // help popup in the user-end
556 function fetch_help_link($topic)
557 {
558 global $bugsys;
559
560 if (isset(bugdar::$datastore['help']["$topic"]))
561 {
562 eval('$temp = "' . $bugsys->template->fetch('help_link') . '";');
563 return $temp;
564 }
565 else
566 {
567 if ($bugsys->debug)
568 {
569 return "[[INVALID TOPIC: $topic]]";
570 }
571 // do we want this?
572 else if (null == 1)
573 {
574 return eval('$temp = "' . $bugsys->template->fetch('help_link') . '";');
575 }
576 }
577 }
578
579 // ###################################################################
580 /**
581 * Returns a user array of information that is specific to all visiting
582 * users (guests). This can then be passed to any function that requires
583 * user information.
584 *
585 * @access public
586 *
587 * @return array User information array
588 */
589 function fetch_guest_user()
590 {
591 global $bugsys;
592
593 return array(
594 'usergroupid' => 1,
595 'groupids' => array(),
596 'userid' => 0,
597 'email' => '',
598 'displayname' => '',
599 'showcolors' => 1,
600 'permissions' => bugdar::$datastore['usergroup'][1]['permissions'],
601 'displaytitle' => bugdar::$datastore['usergroup'][1]['displaytitle'],
602 'timezone' => bugdar::$options['defaulttimezone']
603 );
604 }
605
606 // ###################################################################
607 /**
608 * Does an exhaustive permissions check on the bug. It checks for hidden
609 * bug status and ability to view hidden bugs. This normally was done
610 * at the top of each page, but it got so big, it was moved to a function.
611 *
612 * @access public
613 *
614 * @param array Bug array
615 * @param array Alternate user array
616 *
617 * @return bool Does the user have permission
618 */
619 function check_bug_permissions($bug, $userinfo = null)
620 {
621 global $bugsys;
622 if ($userinfo == null)
623 {
624 $userinfo = bugdar::$userinfo;
625 }
626
627 $bugsys->debug("checking permissions for $userinfo[userid] on bug $bug[bugid]");
628
629 $bugsys->debug('*** START VERBOSE CHECK ***');
630
631 $bugsys->debug('* !can_perform(canviewbugs, $bug[product], $userinfo) = ' . (int)(!can_perform('canviewbugs', $bug['product'], $userinfo)));
632 $bugsys->debug('* $bug[hidden] = ' . (int)$bug['hidden']);
633 $bugsys->debug('* $userinfo[userid] (' . $userinfo['userid'] . ') == $bug[userid] (' . $bug['userid'] . ') = ' . (int)($userinfo['userid'] == $bug['userid']));
634 $bugsys->debug('* can_perform(canviewownhidden, $bug[product], $userinfo) = ' . (int)(!!can_perform('canviewownhidden', $bug['product'], $userinfo)));
635 $bugsys->debug('* can_perform(canviewhidden, $bug[product], $userinfo) = ' . (int)(!!can_perform('canviewhidden', $bug['product'], $userinfo)));
636 $bugsys->debug('* !$bug[hidden] = ' . (int)(!$bug['hidden']));
637
638 $bugsys->debug('*** END PERMISSIONS CHECK ***');
639
640 if
641 (
642 !can_perform('canviewbugs', $bug['product'], $userinfo)
643 OR
644 !(
645 (
646 $bug['hidden']
647 AND
648 (
649 ($userinfo['userid'] == $bug['userid'] AND can_perform('canviewownhidden', $bug['product'], $userinfo))
650 OR
651 can_perform('canviewhidden', $bug['product'], $userinfo)
652 )
653 )
654 OR
655 !$bug['hidden']
656 )
657 )
658 {
659 $bugsys->debug('*** DONE WITH REAL CALLS ***');
660 return false;
661 }
662
663 $bugsys->debug('*** DONE WITH REAL CALLS ***');
664
665 return true;
666 }
667
668 // ###################################################################
669 /**
670 * Takes an array of bug information and returns another array with
671 * information that is suitable for display as all the IDs have been
672 * replaced by their string equivalents
673 *
674 * @param array Unprocessed bug data
675 * @param string Color to display if the user has opted to not show status colours
676 *
677 * @param array Bug array with data fit for display
678 */
679 function ProcessBugDataForDisplay($bug, $color = '')
680 {
681 global $bugsys;
682
683 $bug['hiddendisplay'] = ($bug['hidden'] AND (can_perform('canviewhidden', $bug['product']) OR (can_perform('canviewownhidden') AND $bug['userid'] == bugdar::$userinfo['userid'])));
684
685 $bug['bgcolor'] = (bugdar::$userinfo['showcolors'] ? bugdar::$datastore['status']["$bug[status]"]['color'] : $color);
686 $bug['product'] = bugdar::$datastore['product']["$bug[product]"]['title'];
687 $bug['version'] = bugdar::$datastore['version']["$bug[version]"]['version'];
688 $bug['component'] = bugdar::$datastore['component']["$bug[component]"]['title'];
689 $bug['status'] = bugdar::$datastore['status']["$bug[status]"]['status'];
690 $bug['resolution'] = bugdar::$datastore['resolution']["$bug[resolution]"]['resolution'];
691 $bug['priority'] = bugdar::$datastore['priority']["$bug[priority]"]['priority'];
692 $bug['severity'] = bugdar::$datastore['severity']["$bug[severity]"]['severity'];
693 $bug['assignedto'] = ((empty($bug['assignedto']) OR !isset(bugdar::$datastore['assignto']["$bug[assignedto]"])) ? '' : construct_user_display(bugdar::$datastore['assignto']["$bug[assignedto]"]));
694
695 $bug['lastposttime'] = ($bug['hiddendisplay'] ? $bug['hiddenlastposttime'] : $bug['lastposttime']);
696 $bug['lastpost'] = ($bug['hiddendisplay'] ? $bug['hiddenlastpostbyname'] : $bug['lastpostbyname']);
697
698 $bug['lastposttime'] = BSApp::$date->format(bugdar::$options['dateformat'], $bug['lastposttime']);
699
700 return $bug;
701 }
702
703 // ###################################################################
704 /**
705 * Determines the correct permissions of the user. This is especially
706 * important for working with multiple-usergroup permission schemes.
707 * If a user is assigned to more than one usergroup, the highest level
708 * will always override (so a YES will always override a NO); this is
709 * because permissions are calculated with bitwise OR.
710 *
711 * @param array The user array with usergroups already exploded
712 *
713 * @return integer Permissions value
714 */
715 function FetchUserPermissions(&$user)
716 {
717 global $bugsys;
718
719 $perms = (int)bugdar::$datastore['usergroup']["$user[usergroupid]"]['permissions'];
720 if (!is_array($user['groupids']))
721 {
722 $user['groupids'] = explode(',', bugdar::$userinfo['groupids']);
723 }
724 $user['groupids'] = BSFunctions::array_strip_empty($user['groupids']);
725
726 foreach ($user['groupids'] AS $group)
727 {
728 $perms |= (int)bugdar::$datastore['usergroup']["$group"]['permissions'];
729 }
730
731 return $perms;
732 }
733
734 // ###################################################################
735 /**
736 * Fetches the path for an email template, given the name of the
737 * template and the locale to use
738 *
739 * @param string The template name
740 * @param string Language locale code
741 *
742 * @return string Template path
743 */
744 function FetchEmailPath($name, $locale)
745 {
746 return '../locale/' . $locale . '/emails/' . $name;
747 }
748
749 /*=====================================================================*\
750 || ###################################################################
751 || # $HeadURL$
752 || # $Id$
753 || ###################################################################
754 \*=====================================================================*/
755 ?>