summaryrefslogtreecommitdiffstats
path: root/wp-admin/wpmu-options.php
diff options
context:
space:
mode:
authordonncha <donncha@7be80a69-a1ef-0310-a953-fb0f7c49ff36>2007-10-26 11:09:56 +0000
committerdonncha <donncha@7be80a69-a1ef-0310-a953-fb0f7c49ff36>2007-10-26 11:09:56 +0000
commit5c276aac16e4d4c7ba2d711dfa20c15f83d8f331 (patch)
tree299fa70f1fa272d58a846fcc6e54dfc0ef48ac25 /wp-admin/wpmu-options.php
parentec1ca88f24a92d2a4e3c70f3abc28d0b919f7a06 (diff)
downloadwordpress-mu-5c276aac16e4d4c7ba2d711dfa20c15f83d8f331.tar.gz
wordpress-mu-5c276aac16e4d4c7ba2d711dfa20c15f83d8f331.tar.xz
wordpress-mu-5c276aac16e4d4c7ba2d711dfa20c15f83d8f331.zip
Remove "disable xml-rpc" feature, it's going in a plugin.
Added wpmu_options and update_wpmu_options hooks to add options to wpmu-options.php git-svn-id: http://svn.automattic.com/wordpress-mu/trunk@1132 7be80a69-a1ef-0310-a953-fb0f7c49ff36
Diffstat (limited to 'wp-admin/wpmu-options.php')
-rw-r--r--wp-admin/wpmu-options.php18
1 files changed, 5 insertions, 13 deletions
diff --git a/wp-admin/wpmu-options.php b/wp-admin/wpmu-options.php
index ab63754..7bfe2bc 100644
--- a/wp-admin/wpmu-options.php
+++ b/wp-admin/wpmu-options.php
@@ -70,19 +70,6 @@ if (isset($_GET['updated'])) {
</td>
</tr>
- <tr valign="top">
- <th scope="row"><?php _e('Enable posting by XMLRPC') ?></th>
- <?php
- if( !get_site_option('xmlrpc_active') )
- update_site_option( 'xmlrpc_active', 'yes' );
- ?>
- <td>
- <input name="xmlrpc_active" type="radio" id="xmlrpc_active1" value='yes' <?php echo get_site_option('xmlrpc_active') == 'yes' ? 'checked="checked"' : ''; ?> /> <?php _e('Yes'); ?><br />
- <input name="xmlrpc_active" type="radio" id="xmlrpc_active2" value='no' <?php echo get_site_option('xmlrpc_active') == 'no' ? 'checked="checked"' : ''; ?> /> <?php _e('No'); ?><br />
- <?php _e('This is an advanced technique for making posts to blogs. It is used by <a href="http://codex.wordpress.org/Weblog_Client">blog clients</a> like Ecto, Flock and Microsoft Live Writer and by Flickr to post pictures to blogs. Unfortunately it is also extensively used by spammers. <em>Disabled by Default</em>') ?>
- </td>
- </tr>
-
<tr valign="top">
<th scope="row"><?php _e('Welcome Email:') ?></th>
<td>
@@ -204,6 +191,11 @@ if (isset($_GET['updated'])) {
?>
</table>
</fieldset>
+
+ <?php
+ // Add more options here
+ do_action( 'wpmu_options' );
+ ?>
<p class="submit">
<input type="submit" name="Submit" value="<?php _e('Update Options') ?>" /></p>