The Arcive of Official vBulletin Modifications Site.It is not a VB3 engine, just a parsed copy! |
|
vBSSO - vBulletin Single Sign-On Details »» | |||||||||||||||||||||||||||||||||
vBSSO is a vBulletin plugin that helps you connect to different software platforms like content management systems, blogs, and online stores using a secure Single Sign-On
The system has two components. First, there?s a vBulletin plugin that creates an interface for authenticating, controlling access, and managing user profile data. The second component is plugins for other platforms (like WordPress) that teach it to talk to vBulletin and exchange data. Here?s a list of support platforms. Supported Platforms (https://www.vbsso.com)
SSO Key Features
Single Sign-On
License
Safety
Setup & Configuration
Avatars
User Groups
Miscellaneous
= 1.6.4 =
= 1.6.1 =
= 1.6.0 =
= 1.5.1 =
= 1.4.16 =
We strongly recommend you to upgrade vBSSO to the latest version (1.4.15) = 1.4.15 =
= 1.4.14 =
= 1.4.13 =
= 1.4.12 =
= 1.4.11 =
= 1.4.10 =
= 1.4.9 =
= 1.4.8 =
= 1.4.7 =
= 1.4.6 =
= 1.4.5 =
= 1.4.4 =
= 1.4.3 =
= 1.4.2 =
= 1.4.1 =
= 1.4 =
= 1.3 =
= 1.2 =
Project Supported by Diabetes Daily "We are in dept to those who have donated their code and advice to us over the last six years. Without that support, we would never have built one of the most successful diabetes communities. This is our way of 'paying it forward' so others can do more better and faster." - David Edelman, Co-Founder of Diabetes Daily Download Now Download Now
Screenshots
Show Your Support
|
22 благодарности(ей) от: | ||
aminp30, andro140, Brandon Sheley, dartho, davide101, Da^MsT, Flightbase, Fulla, geekay, ia7, m7sen, Maghrebia, Master Of Unive, nacaruncr, puertoblack2003, RichieBoy67, rwoscott, Sage Knight, Teascu Dorin, Toorak Times, ugorur |
Comments |
#492
|
|||
|
|||
The reason of improperly installed plugin. Support team has solved that issue for you.
|
#493
|
|||
|
|||
Haha kinda, more like I helped solve a future problem for you guys!
|
#494
|
|||
|
|||
I am having an issue installing this on the vBulletin side of things. I uploaded the contents of the upload folder into the respective locations and then went to install the vbsso xml product file via the admin of vBulletin. I get the following error when trying to install the xml file:
Code:
Warning: fopen([path]/vbsso/logs/vbsso_2013-02-21.log) [function.fopen]: failed to open stream: Permission denied in [path]/vbsso/vendor/log4php/appenders/LoggerAppenderDailyFile.php on line 93 vBulletin Message The following PHP extensions are required to be installed zip before installing or upgrading this product! |
#495
|
|||
|
|||
Help I have 2 issues.
1. Sometimes when a user signed up they get the Administrator group added as an additional usergroup to their account 2. Glowhost is showing errors when enabled. This is sorta bad since this is one of the most important and most used plugin for the VB community. Here is the glow host error: Code:
Hook name Hook code inlinemod_action_switch require_once('includes/functions_ghsom.php'); SOM_cleanupProcess(); postdata_presave if(defined('VBSEO_ENABLED')) vbseo_complete_sec('postdata_presave'); $skip_post = false; if (!empty($this->info['is_automated'])) if ($this->info['is_automated'] == 'rss') { $skip_post = true; } if (!$skip_post) { //Let's create new group for newbies members $is_noob_user = false; $noob_group_id = $this->registry->options['glowhostspamomatic_noob_group_id']; $checkuser = $this->dbobject->query_first("SELECT * FROM " . TABLE_PREFIX . "user WHERE userid=".$this->registry->userinfo['userid']); if (is_member_of($checkuser, $noob_group_id)) $is_noob_user = true; require_once('includes/functions_ghsom.php'); $is_protected_user = false; foreach (array('glowhostspamomatic_bsc_protect_group', 'glowhostspamomatic_bsc_protect_user') as $option) { $this->registry->options[$option] = clean_options_list($this->registry->options[$option]); } if ((is_member_of($checkuser, explode(",", $this->registry->options['glowhostspamomatic_bsc_protect_group']))) || (in_array($this->registry->userinfo['userid'], explode(",", $this->registry->options['glowhostspamomatic_bsc_protect_user'])))) { $is_protected_user = true; } if ($this->registry->userinfo['userid'] == 0) { $is_protected_user = false; } if ($this->registry->options['glowhostspamomatic_automodenabled'] == 1) { //automod enabled $automod_apply = false; if ($this->registry->options['glowhostspamomatic_noob_enabled'] == 1) { if ($this->registry->options['glowhostspamomatic_noob_restrict_automod'] == 1) { // noob enabled and automod restricted.... check the group if ($is_noob_user) $automod_apply = true; // he-he, let's apply auto-mod } else if (!$is_protected_user) $automod_apply = true; // no restriction.... only automod settings matter } else if (!$is_protected_user) $automod_apply = true; // noob disabled.... only automod settings matter if ($automod_apply) { if (($this->registry->userinfo['posts'] < $this->registry->options['glowhostspamomatic_automodpostcount']) || ($this->registry->options['glowhostspamomatic_automodpostcount'] == 0)) { // check for postcount is lower than specified in settings $keywords = explode("\n", $this->registry->options['glowhostspamomatic_automodkeywords']); $keywords = array_map('trim', $keywords); if (str_replace($keywords, '', strtolower($this->fetch_field('pagetext', 'post'))) != strtolower($this->fetch_field('pagetext', 'post')) AND !can_moderate()) { if ($this->registry->options['glowhostspamomatic_automodpostaction'] == 1) standard_error(fetch_error('glowhostspamomatic_reject_post', $query)); else { $this->set('visible', 0); $sql = 'INSERT INTO '.TABLE_PREFIX.'glowhostspamomatic_log(`date`, `ip`, `email`, `username`, `message`, `is_blocked`, `user_hash`) VALUES (now(), "'.addslashes($_SERVER['REMOTE_ADDR']).'", "'.addslashes($this->registry->userinfo['email']).'", "'.addslashes($this->registry->userinfo['username']).'", "registry->config['Misc']['modcpdir'].'/moderate.php?do=posts\">Post put under moderation based on Auto-Moderation Keywords", "0", ""); '; $this->dbobject->query($sql); $sql = 'UPDATE '.TABLE_PREFIX.'glowhostspamomatic_stats SET moderated = moderated + 1; '; $this->dbobject->query($sql); } } else { $link_count = substr_count(strtolower($this->fetch_field('pagetext', 'post')), 'http:'); $link_count += substr_count($this->fetch_field('pagetext', 'post'), '@'); if (($link_count > $this->registry->options['glowhostspamomatic_automodurls']) && !can_moderate()) { if ($this->registry->options['glowhostspamomatic_automodpostaction'] == 1) standard_error(fetch_error('glowhostspamomatic_reject_post', $query)); else { $this->set('visible', 0); $sql = 'INSERT INTO '.TABLE_PREFIX.'glowhostspamomatic_log(`date`, `ip`, `email`, `username`, `message`, `is_blocked`, `user_hash`) VALUES (now(), "'.addslashes($_SERVER['REMOTE_ADDR']).'", "'.addslashes($this->registry->userinfo['email']).'", "'.addslashes($this->registry->userinfo['username']).'", "registry->config['Misc']['modcpdir'].'/moderate.php?do=posts\">Post put under moderation based on Auto-Moderation URL count", "0", ""); '; $this->dbobject->query($sql); $sql = 'UPDATE '.TABLE_PREFIX.'glowhostspamomatic_stats SET moderated = moderated + 1; '; $this->dbobject->query($sql); } } } } } } if ($this->registry->options['glowhostspamomatic_noob_enabled'] == 1) { if ($this->registry->options['glowhostspamomatic_noob_autopromote'] == 1) { if ($is_noob_user) { // he-he, let's apply auto-mod if ($this->registry->userinfo['posts'] >= $this->registry->options['glowhostspamomatic_noob_promotepostcount']) { $sql = 'UPDATE `'.TABLE_PREFIX.'user` SET `usergroupid` = '.$this->registry->options['glowhostspamomatic_noob_reg_ugroup'].' WHERE `userid` = '.$this->registry->userinfo['userid'].'; '; $this->dbobject->query($sql); } } } } } newpost_process if(defined('VBSEO_ENABLED')) vbseo_complete_sec('newpost_process'); if ($vbulletin->options['glowhostspamomatic_akismet_enabled'] == 1) { require_once('includes/functions_ghsom.php'); foreach (array('glowhostspamomatic_bsc_protect_group', 'glowhostspamomatic_bsc_protect_user') as $option) { $vbulletin->options[$option] = clean_options_list($vbulletin->options[$option]); } $checkuser = $vbulletin->db->query_first("SELECT * FROM " . TABLE_PREFIX . "user WHERE userid=".$vbulletin->userinfo['userid']); if ((!is_member_of($checkuser, explode(",", $vbulletin->options['glowhostspamomatic_bsc_protect_group']))) && (!in_array($vbulletin->userinfo['userid'], explode(",", $vbulletin->options['glowhostspamomatic_bsc_protect_user'])))) { if (($vbulletin->userinfo['posts'] < $vbulletin->options['glowhostspamomatic_akismet_postcount']) || ($vbulletin->options['glowhostspamomatic_akismet_postcount'] == 0)) { // check for postcount is lower than specified in settings $key = $vbulletin->options['glowhostspamomatic_akismet_key']; $vbghsfs_host = $key.'.rest.akismet.com'; $comment['user_ip'] = $_SERVER['REMOTE_ADDR']; $comment['user_agent'] = $_SERVER['HTTP_USER_AGENT']; $comment['referrer'] = $_SERVER['HTTP_REFERER']; $comment['blog'] = $vbulletin->options['bburl']; $comment['comment_author'] = $vbulletin->userinfo['username']; $comment['comment_content'] = $post['message']; if (SOM_AkismetCheckComment($comment, $vbghsfs_host)) { $dataman->set('visible', 0); $post['visible'] = 0; $sql = 'INSERT INTO '.TABLE_PREFIX.'glowhostspamomatic_log(`date`, `ip`, `email`, `username`, `message`, `is_blocked`, `user_hash`) VALUES (now(), "'.addslashes($_SERVER['REMOTE_ADDR']).'", "'.addslashes($vbulletin->userinfo['email']).'", "'.addslashes($vbulletin->userinfo['username']).'", "config[Misc][modcpdir].'/moderate.php?do=posts\">Post put under moderation based on Akismet result", "0", ""); '; $vbulletin->db->query($sql); $sql = 'UPDATE '.TABLE_PREFIX.'glowhostspamomatic_stats SET moderated = moderated + 1; '; $vbulletin->db->query($sql); } } } } threadfpdata_presave $skip_post = false; if (!empty($this->info['is_automated'])) if ($this->info['is_automated'] == 'rss') { $skip_post = true; } if (!$skip_post) { //Let's create new group for newbies members $is_noob_user = false; $noob_group_id = $this->registry->options['glowhostspamomatic_noob_group_id']; $checkuser = $this->dbobject->query_first("SELECT * FROM " . TABLE_PREFIX . "user WHERE userid=".$this->registry->userinfo['userid']); if (is_member_of($checkuser, $noob_group_id)) $is_noob_user = true; require_once('includes/functions_ghsom.php'); $is_protected_user = false; foreach (array('glowhostspamomatic_bsc_protect_group', 'glowhostspamomatic_bsc_protect_user') as $option) { $this->registry->options[$option] = clean_options_list($this->registry->options[$option]); } if ((is_member_of($checkuser, explode(",", $this->registry->options['glowhostspamomatic_bsc_protect_group']))) || (in_array($this->registry->userinfo['userid'], explode(",", $this->registry->options['glowhostspamomatic_bsc_protect_user'])))) { $is_protected_user = true; } if ($this->registry->userinfo['userid'] == 0) { $is_protected_user = false; } if ($this->registry->options['glowhostspamomatic_automodenabled'] == 1) { //automod enabled $automod_apply = false; if ($this->registry->options['glowhostspamomatic_noob_enabled'] == 1) { if ($this->registry->options['glowhostspamomatic_noob_restrict_automod'] == 1) { // noob enabled and automod restricted.... check the group if ($is_noob_user) $automod_apply = true; // he-he, let's apply auto-mod } else if (!$is_protected_user) $automod_apply = true; // no restriction.... only automod settings matter } else if (!$is_protected_user) $automod_apply = true; // noob disabled.... only automod settings matter if ($automod_apply) { if (($this->registry->userinfo['posts'] < $this->registry->options['glowhostspamomatic_automodpostcount']) || ($this->registry->options['glowhostspamomatic_automodpostcount'] == 0)) { // check for postcount is lower than specified in settings $keywords = explode("\n", $this->registry->options['glowhostspamomatic_automodkeywords']); $keywords = array_map('trim', $keywords); if (str_replace($keywords, '', strtolower($this->fetch_field('pagetext', 'post'))) != strtolower($this->fetch_field('pagetext', 'post')) && !can_moderate()) { if ($this->registry->options['glowhostspamomatic_automodpostaction'] == 1) standard_error(fetch_error('glowhostspamomatic_reject_post', $query)); else { $this->set('visible', 0); $sql = 'INSERT INTO '.TABLE_PREFIX.'glowhostspamomatic_log(`date`, `ip`, `email`, `username`, `message`, `is_blocked`, `user_hash`) VALUES (now(), "'.addslashes($_SERVER['REMOTE_ADDR']).'", "'.addslashes($this->registry->userinfo['email']).'", "'.addslashes($this->registry->userinfo['username']).'", "registry->config['Misc']['modcpdir'].'/moderate.php?do=posts\">Post put under moderation based on Auto-Moderation Keywords", "0", ""); '; $this->dbobject->query($sql); $sql = 'UPDATE '.TABLE_PREFIX.'glowhostspamomatic_stats SET moderated = moderated + 1; '; $this->dbobject->query($sql); } } else { $link_count = substr_count(strtolower($this->fetch_field('pagetext', 'post')), 'http:'); $link_count += substr_count($this->fetch_field('pagetext', 'post'), '@'); if (($link_count > $this->registry->options['glowhostspamomatic_automodurls']) && !can_moderate()) { if ($this->registry->options['glowhostspamomatic_automodpostaction'] == 1) standard_error(fetch_error('glowhostspamomatic_reject_post', $query)); else { $this->set('visible', 0); $sql = 'INSERT INTO '.TABLE_PREFIX.'glowhostspamomatic_log(`date`, `ip`, `email`, `username`, `message`, `is_blocked`, `user_hash`) VALUES (now(), "'.addslashes($_SERVER['REMOTE_ADDR']).'", "'.addslashes($this->registry->userinfo['email']).'", "'.addslashes($this->registry->userinfo['username']).'", "registry->config['Misc']['modcpdir'].'/moderate.php?do=posts\">Post put under moderation based on Auto-Moderation URL count", "0", ""); '; $this->dbobject->query($sql); $sql = 'UPDATE '.TABLE_PREFIX.'glowhostspamomatic_stats SET moderated = moderated + 1; '; $this->dbobject->query($sql); } } } } } } if ($this->registry->options['glowhostspamomatic_noob_enabled'] == 1) { if ($this->registry->options['glowhostspamomatic_noob_autopromote'] == 1) { if ($is_noob_user) { // he-he, let's apply auto-mod if ($this->registry->userinfo['posts'] >= $this->registry->options['glowhostspamomatic_noob_promotepostcount']) { $sql = 'UPDATE `'.TABLE_PREFIX.'user` SET `usergroupid` = '.$this->registry->options['glowhostspamomatic_noob_reg_ugroup'].' WHERE `userid` = '.$this->registry->userinfo['userid'].'; '; $this->dbobject->query($sql); } } } } } register_addmember_complete require_once(DIR . '/vbsso/vbsso.php'); vbsso_register_addmember_complete_hook($userid); require_once('includes/functions_ghsom.php'); SOM_UpdateLog(); register_addmember_process $vbghsfs_Purged = false; $vbghsfs_userHash = ''; if (empty($userdata->errors)) { require_once('includes/functions_ghsom.php'); SOM_Process(); if ($vbulletin->options['glowhostspamomatic_noob_enabled'] == 1) { //move users.... if ($vbulletin->options['verifyemail'] == 0) { //move only if verification disabled $noob_group_id = $vbulletin->options['glowhostspamomatic_noob_group_id']; if ($noob_group_id != '') $userdata->set('usergroupid', $noob_group_id); } } } |
#496
|
||||
|
||||
xeagle,
I'm thinking about trying this out. Does the WP database and the vB database have to be combined? I have a separate database for each. I read through most of the comments but I did not see anything about database in your description or in the comments posted. Thanks! |
#497
|
|||
|
|||
Quote:
|
#498
|
|||
|
|||
Quote:
2) There should be instructions while vBSSO pops the error how to fix Glowhost plugins and make this working. |
#499
|
||||
|
||||
Quote:
Just to test it out I uploaded everything one more time and installed the xml file again. I still had the same issue. I'm going to remove it from the system. Give me an update if you are able to correct this. I know most use Linux servers, and I've had to deal with issues from a lot of modifications. Thanks for the effort you put forth. |
#500
|
|||
|
|||
Quote:
|
#501
|
|||
|
|||
where's the version for 3.8x?
|
|
|
X vBulletin 3.8.12 by vBS Debug Information | |
---|---|
|
|
More Information | |
Template Usage:
Phrase Groups Available:
|
Included Files:
Hooks Called:
|