Uname:Linux Sandbox-A 4.4.0-210-generic #242-Ubuntu SMP Fri Apr 16 09:57:56 UTC 2021 x86_64

Base Dir : /var/www/html

User : gavin


403WebShell
403Webshell
Server IP : 68.183.124.220  /  Your IP : 216.73.217.137
Web Server : Apache/2.4.18 (Ubuntu)
System : Linux Sandbox-A 4.4.0-210-generic #242-Ubuntu SMP Fri Apr 16 09:57:56 UTC 2021 x86_64
User : gavin ( 1000)
PHP Version : 7.0.33-0ubuntu0.16.04.16
Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,
MySQL : OFF  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : ON  |  Sudo : ON  |  Pkexec : ON
Directory :  /var/www/html/wp-content/plugins/google-analytics-for-wordpress/includes/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ Back ]     

Current File : /var/www/html/wp-content/plugins/google-analytics-for-wordpress/includes/capabilities.php
<?php
/**
 * Capabilities class.
 *
 * @access public
 * @since 6.0.0
 *
 * @package MonsterInsights
 * @subpackage Capabilities
 * @author  Chris Christoff
 */

// Exit if accessed directly
if ( ! defined( 'ABSPATH' ) ) {
    exit;
}

/**
 * Map MonsterInsights Capabilities.
 *
 * Using meta caps, we're creating virtual capabilities that are
 * for backwards compatibility reasons given to users with manage_options, and to
 * users who have at least of the roles selected in the options on the permissions
 * tab of the MonsterInsights settings.
 *
 * @access public
 * @since 6.0.0
 *
 * @param array  $caps Array of capabilities the user has.
 * @param string $cap The current cap being filtered.
 * @param int    $user_id User to check permissions for.
 * @param array  $args Extra parameters. Unused.
 * @return array Array of caps needed to have this meta cap. If returned array is empty, user has the capability.
 */
function monsterinsights_add_capabilities( $caps, $cap, $user_id, $args ) {
 
    switch( $cap ) {
        case 'monsterinsights_view_dashboard' :
            $roles = monsterinsights_get_option( 'view_reports', array() );

            $user_can_via_settings = false;
            if ( ! empty( $roles ) && is_array( $roles ) ) {
                foreach ( $roles as $role ) {
                    if ( is_string( $role ) ) {
                        if ( user_can( $user_id, $role ) ) {
                            $user_can_via_settings = true;
                            break;
                        }
                    }
                }
            } else if ( ! empty( $roles ) && is_string( $roles ) ) {
                if ( user_can( $user_id, $roles ) ) {
                    $user_can_via_settings = true;
                }
            }

            if ( user_can( $user_id, 'manage_options' ) || $user_can_via_settings ) {
                $caps = array();
            }
            
            break;
         case 'monsterinsights_save_settings' :
            $roles = monsterinsights_get_option( 'save_settings', array() );

            $user_can_via_settings = false;
            if ( ! empty( $roles ) && is_array( $roles ) ) {
                foreach ( $roles as $role ) {
                    if ( is_string( $role ) ) {
                        if ( user_can( $user_id, $role ) ) {
                            $user_can_via_settings = true;
                            break;
                        }
                    }
                }
            } else if ( ! empty( $roles ) && is_string( $roles ) ) {
                 if ( user_can( $user_id, $roles ) ) {
                    $user_can_via_settings = true;
                }
            }

            if ( user_can( $user_id, 'manage_options' ) || $user_can_via_settings ) {
                $caps = array();
            }

            break;
    }
    return $caps;
}
add_filter( 'map_meta_cap','monsterinsights_add_capabilities', 10, 4 );

Youez - 2016 - github.com/yon3zu
LinuXploit