Index: openacs-4/packages/acs-subsite/tcl/rel-segments-procs.tcl =================================================================== RCS file: /usr/local/cvsroot/openacs-4/packages/acs-subsite/tcl/rel-segments-procs.tcl,v diff -u -r1.6 -r1.7 --- openacs-4/packages/acs-subsite/tcl/rel-segments-procs.tcl 7 Aug 2017 23:47:58 -0000 1.6 +++ openacs-4/packages/acs-subsite/tcl/rel-segments-procs.tcl 7 Jun 2018 16:52:40 -0000 1.7 @@ -7,7 +7,7 @@ @author mbryzek@arsdigita.com @creation-date Tue Dec 12 16:37:45 2000 @cvs-id $Id$ - + } ad_proc -public rel_segments_new { @@ -16,7 +16,7 @@ { -creation_ip "" } group_id rel_type - segment_name + segment_name } { Creates a new relational segment @@ -39,10 +39,10 @@ } ad_proc -public rel_segments_delete { - segment_id + segment_id } { Deletes the specified relational segment including all relational - constraints that depend on it. + constraints that depend on it. @author Michael Bryzek (mbryzek@arsdigita.com) @creation-date 1/12/2001 @@ -58,10 +58,10 @@ } db_exec_plsql rel_segment_delete {} - + } -ad_proc -public rel_segments_permission_p { +ad_proc -deprecated -public rel_segments_permission_p { { -user_id "" } { -privilege "read" } segment_id @@ -70,9 +70,13 @@ Wrapper for ad_permission to allow us to bypass having to specify the read privilege + Deprecated: just another wrapper for permission::permission_p + @author Michael Bryzek (mbryzek@arsdigita.com) @creation-date 12/2000 + @see permission::permission_p + } { return [permission::permission_p -party_id $user_id -object_id $segment_id -privilege $privilege] }