diff options
author | donncha <donncha@7be80a69-a1ef-0310-a953-fb0f7c49ff36> | 2007-10-26 11:09:56 +0000 |
---|---|---|
committer | donncha <donncha@7be80a69-a1ef-0310-a953-fb0f7c49ff36> | 2007-10-26 11:09:56 +0000 |
commit | 5c276aac16e4d4c7ba2d711dfa20c15f83d8f331 (patch) | |
tree | 299fa70f1fa272d58a846fcc6e54dfc0ef48ac25 /wp-admin/wpmu-options.php | |
parent | ec1ca88f24a92d2a4e3c70f3abc28d0b919f7a06 (diff) | |
download | wordpress-mu-5c276aac16e4d4c7ba2d711dfa20c15f83d8f331.tar.gz wordpress-mu-5c276aac16e4d4c7ba2d711dfa20c15f83d8f331.tar.xz wordpress-mu-5c276aac16e4d4c7ba2d711dfa20c15f83d8f331.zip |
Remove "disable xml-rpc" feature, it's going in a plugin.
Added wpmu_options and update_wpmu_options hooks to add options to wpmu-options.php
git-svn-id: http://svn.automattic.com/wordpress-mu/trunk@1132 7be80a69-a1ef-0310-a953-fb0f7c49ff36
Diffstat (limited to 'wp-admin/wpmu-options.php')
-rw-r--r-- | wp-admin/wpmu-options.php | 18 |
1 files changed, 5 insertions, 13 deletions
diff --git a/wp-admin/wpmu-options.php b/wp-admin/wpmu-options.php index ab63754..7bfe2bc 100644 --- a/wp-admin/wpmu-options.php +++ b/wp-admin/wpmu-options.php @@ -70,19 +70,6 @@ if (isset($_GET['updated'])) { </td> </tr> - <tr valign="top"> - <th scope="row"><?php _e('Enable posting by XMLRPC') ?></th> - <?php - if( !get_site_option('xmlrpc_active') ) - update_site_option( 'xmlrpc_active', 'yes' ); - ?> - <td> - <input name="xmlrpc_active" type="radio" id="xmlrpc_active1" value='yes' <?php echo get_site_option('xmlrpc_active') == 'yes' ? 'checked="checked"' : ''; ?> /> <?php _e('Yes'); ?><br /> - <input name="xmlrpc_active" type="radio" id="xmlrpc_active2" value='no' <?php echo get_site_option('xmlrpc_active') == 'no' ? 'checked="checked"' : ''; ?> /> <?php _e('No'); ?><br /> - <?php _e('This is an advanced technique for making posts to blogs. It is used by <a href="http://codex.wordpress.org/Weblog_Client">blog clients</a> like Ecto, Flock and Microsoft Live Writer and by Flickr to post pictures to blogs. Unfortunately it is also extensively used by spammers. <em>Disabled by Default</em>') ?> - </td> - </tr> - <tr valign="top"> <th scope="row"><?php _e('Welcome Email:') ?></th> <td> @@ -204,6 +191,11 @@ if (isset($_GET['updated'])) { ?> </table> </fieldset> + + <?php + // Add more options here + do_action( 'wpmu_options' ); + ?> <p class="submit"> <input type="submit" name="Submit" value="<?php _e('Update Options') ?>" /></p> |