Commit 21d5712f authored by Aaron Wells's avatar Aaron Wells

Removing end-of-line whitespace

As vetted in the May 2014 dev meeting
http://meetbot.mahara.org/mahara-dev/2014/mahara-dev.2014-05-01-08.01.log.html

Change-Id: I353ed74d69a5346fbe4e8e521e5c349dbe8dcbac
parent e46afb22
......@@ -69,7 +69,7 @@ function markread(form, action) {
var e = getElementsByTagAndClassName(null,'tocheck'+action,form);
var pd = {};
for (cb in e) {
if (e[cb].checked == true) {
pd[e[cb].name] = 1;
......@@ -92,7 +92,7 @@ function markread(form, action) {
pd[p] = paginatorData.params[p];
}
}
sendjsonrequest('index.json.php', pd, 'GET', function (data) {
paginator.updateResults(data);
updateUnreadCount(data);
......
......@@ -190,7 +190,7 @@ function accountprefs_submit(Pieform $form, $values) {
}
// use this as looping through values is not safe.
$expectedprefs = expected_account_preferences();
$expectedprefs = expected_account_preferences();
if ($values['maildisabled'] == 0 && get_account_preference($USER->get('id'), 'maildisabled') == 1) {
// Reset the sent and bounce counts otherwise mail will be disabled
// on the next send attempt
......
......@@ -73,7 +73,7 @@ function leaveinstitution_submit(Pieform $form, $values) {
// List all institutions the user has requested membership, with a
// cancel request button
$requested = get_column('usr_institution_request', 'institution',
$requested = get_column('usr_institution_request', 'institution',
'usr', $USER->id, 'confirmedusr', 1);
if (!empty($requested)) {
$elements = array();
......@@ -81,7 +81,7 @@ if (!empty($requested)) {
$elements[] = array(
'type' => 'submit',
'name' => '_cancelrequest_' . $i,
'title' => get_string('youhaverequestedmembershipof', 'mahara',
'title' => get_string('youhaverequestedmembershipof', 'mahara',
$institutions[$i]->displayname),
'value' => get_string('cancelrequest')
);
......@@ -124,7 +124,7 @@ if (!empty($invited)) {
$elements[] = array(
'type' => 'submit',
'name' => '_confirminvite_' . $i,
'title' => get_string('youhavebeeninvitedtojoin', 'mahara',
'title' => get_string('youhavebeeninvitedtojoin', 'mahara',
$institutions[$i]->displayname),
'value' => get_string('joininstitution')
);
......
......@@ -62,12 +62,12 @@ foreach (array_keys($plugins) as $plugin) {
$plugins[$plugin]['installed'][$key]['types'][$collapseto] = true;
}
else {
$plugins[$plugin]['installed'][$key]['types'][$t] =
$plugins[$plugin]['installed'][$key]['types'][$t] =
call_static_method($classname, 'has_config');
}
}
}
}
}
else {
$classname = generate_class_name($plugin, $i->name);
safe_require($plugin, $key);
......@@ -77,7 +77,7 @@ foreach (array_keys($plugins) as $plugin) {
}
}
}
$dirhandle = opendir(get_config('docroot') . $plugin);
while (false !== ($dir = readdir($dirhandle))) {
$installed = false; // reinitialise
......@@ -125,7 +125,7 @@ foreach (array_keys($plugins) as $plugin) {
if (!array_key_exists($dir, $plugins['artefact']['installed'])) {
throw new InstallationException(get_string('blocktypeprovidedbyartefactnotinstallable', 'error', $dir));
}
validate_plugin('blocktype', $dir . '/' . $btdir,
validate_plugin('blocktype', $dir . '/' . $btdir,
get_config('docroot') . 'artefact/' . $dir . '/blocktype/' . $btdir);
$plugins['blocktype']['notinstalled'][$dir . '/' . $btdir] = array();
}
......@@ -158,7 +158,7 @@ function installplugin(name) {
var message = {$successstring} + data.newversion;
$(name + '.message').innerHTML = '<img src="{$successicon}" alt=":)" /> ' + message;
$(name + '.install').innerHTML = '';
// move the whole thing into the list of installed plugins
// move the whole thing into the list of installed plugins
// new parent node
var bits = name.split('\.');
var newparent = $(bits[0] + '.installed');
......@@ -173,7 +173,7 @@ function installplugin(name) {
var message = '';
if (data.errormessage) {
message = data.errormessage;
}
}
else {
message = {$failurestring};
}
......
......@@ -37,8 +37,8 @@ if ($menuitems) {
$safeurl = sanitize_url($i->url);
if (empty($i->url) && !empty($i->file)) {
$r['type'] = 'sitefile';
$r['linkedto'] = get_config('wwwroot') . 'artefact/file/download.php?file=' . $i->file;
$r['linktext'] = $i->filename;
$r['linkedto'] = get_config('wwwroot') . 'artefact/file/download.php?file=' . $i->file;
$r['linktext'] = $i->filename;
$r['file'] = $i->file;
}
else if ($safeurl == '') {
......
......@@ -46,8 +46,8 @@ function getitems() {
}
// Get a list of the available admin files
function getadminfiles() {
sendjsonrequest('getadminfiles.json.php', {'public':selectedmenu == 'loggedoutmenu'},
'GET',
sendjsonrequest('getadminfiles.json.php', {'public':selectedmenu == 'loggedoutmenu'},
'GET',
function (data) {
if (!data.error) {
adminfiles = data.adminfiles;
......
......@@ -30,7 +30,7 @@ raise_time_limit(120);
raise_memory_limit('256M');
$data = array(
'key' => $name
);
);
if ($install) {
if (!get_config('installed')) {
if ($name == 'localpreinst' || $name == 'localpostinst') {
......@@ -75,7 +75,7 @@ if (!empty($upgrade)) {
$data['newversion'] = $upgrade->torelease . ' (' . $upgrade->to . ')' ;
if ($name == 'core') {
$funname = 'upgrade_core';
}
}
else if ($name == 'local') {
$funname = 'upgrade_local';
}
......@@ -99,7 +99,7 @@ if (!empty($upgrade)) {
}
json_reply(false, $data);
exit;
}
}
catch (Exception $e) {
list($texttrace, $htmltrace) = log_build_backtrace($e->getTrace());
$data['errormessage'] = $e->getMessage() . '<br>' . $htmltrace;
......
......@@ -128,7 +128,7 @@ if (!empty($upgrades['core']->install)) {
$upgrades['lastcoredata'] = true;
$upgrades['localpostinst'] = true;
$smarty->assign('install', true);
}
}
$js = <<< EOJS
function processNext() {
......@@ -183,13 +183,13 @@ $js = <<< EOJS
var message = '';
if (data.errormessage) {
message = data.errormessage;
}
}
else {
message = {$failurestring};
}
$(data.key).innerHTML = '<img src="{$failureicon}" alt=":(" /> ' + message;
}
},
},
function () {
$(element).innerHTML = '<img src="{$failureicon}" alt=":(" /> ' + {$failurestring};
},
......
......@@ -53,7 +53,7 @@ $form = pieform(array(
function adminusers_submit(Pieform $form, $values) {
global $SESSION;
db_begin();
execute_sql('UPDATE {usr}
SET admin = 0
......
......@@ -53,7 +53,7 @@ function export_iframe_die($message) {
}
/**
* Registered as the progress report handler for the export. Streams updates
* Registered as the progress report handler for the export. Streams updates
* back to the browser
*
* @param int $percent How far complete the export is
......@@ -204,8 +204,8 @@ if (!empty($exporterrors)) {
$SESSION->add_error_msg(get_string('couldnotexportusers', 'admin', implode(', ', $exporterrors)));
}
// Store the filename in the session, and redirect the iframe to it to trigger
// the download. Here it would be nice to trigger the download for everyone,
// Store the filename in the session, and redirect the iframe to it to trigger
// the download. Here it would be nice to trigger the download for everyone,
// but alas this is not possible for people without javascript.
$SESSION->set('exportfile', $zipfile);
$continueurljs = get_config('wwwroot');
......
......@@ -674,8 +674,8 @@ function institution_submit(Pieform $form, $values) {
$newinstitution->showonlineusers = !isset($values['showonlineusers']) ? 2 : $values['showonlineusers'];
if (get_config('usersuniquebyusername')) {
// Registering absolutely not allowed when this setting is on, it's a
// security risk. See the documentation for the usersuniquebyusername
// Registering absolutely not allowed when this setting is on, it's a
// security risk. See the documentation for the usersuniquebyusername
// setting for more information
$newinstitution->registerallowed = 0;
}
......@@ -899,8 +899,8 @@ function institution_submit(Pieform $form, $values) {
if ($add) {
if (!$newinstitution->registerallowed) {
// If registration is not allowed, then an authinstance will not
// have been created, and thus cause the institution page to add
// If registration is not allowed, then an authinstance will not
// have been created, and thus cause the institution page to add
// its own error message on the next page load
$SESSION->add_ok_msg(get_string('institutionaddedsuccessfully2', 'admin'));
}
......
......@@ -47,7 +47,7 @@ $form = array(
'defaultvalue' => $staffusers,
'lefttitle' => get_string('institutionmembers', 'admin'),
'righttitle' => get_string('institutionstaff', 'admin'),
'searchparams' => array('limit' => 100, 'query' => '', 'member' => 1,
'searchparams' => array('limit' => 100, 'query' => '', 'member' => 1,
'institution' => $institution),
'searchscript' => 'admin/users/userinstitutionsearch.json.php',
),
......
......@@ -23,10 +23,10 @@ $sql = '
SELECT
u.id, u.username, u.firstname, u.lastname, u.preferredname, u.admin, u.staff, u.profileicon, u.email,
a.activity, a.method
FROM {usr} u
FROM {usr} u
LEFT JOIN {usr_activity_preference} a ON a.usr = u.id
LEFT OUTER JOIN {usr_institution} ui
ON (ui.usr = u.id' . ($USER->get('admin') ? '' : ' AND ui.institution IN ('
LEFT OUTER JOIN {usr_institution} ui
ON (ui.usr = u.id' . ($USER->get('admin') ? '' : ' AND ui.institution IN ('
. join(',',array_map('db_quote', array_keys($USER->get('institutions')))) . ')') . ')
WHERE u.deleted = 0
GROUP BY
......
......@@ -49,7 +49,7 @@ $form = pieform(array(
function staffusers_submit(Pieform $form, $values) {
global $SESSION;
db_begin();
execute_sql('UPDATE {usr}
SET staff = 0
......
......@@ -21,7 +21,7 @@ $offset = param_integer('offset', 0);
$type = param_alpha('type', 'suspended');
// Filter for institutional admins:
$instsql = $USER->get('admin') ? '' : '
$instsql = $USER->get('admin') ? '' : '
AND ui.institution IN (' . join(',', array_map('db_quote', array_keys($USER->get('institutions')))) . ')';
$count = get_field_sql('
......@@ -36,7 +36,7 @@ $count = get_field_sql('
) AS a');
$data = get_records_sql_assoc('
SELECT
SELECT
u.id, u.firstname, u.lastname, u.studentid, u.suspendedctime, u.suspendedreason AS reason,
ua.firstname AS cusrfirstname, ua.lastname AS cusrlastname, ' . db_format_tsfield('u.expiry', 'expiry') . '
FROM {usr} u
......
......@@ -468,7 +468,7 @@ function uploadcsv_submit(Pieform $form, $values) {
$institution = new Institution($authobj->institution);
$maxusers = $institution->maxuseraccounts;
$maxusers = $institution->maxuseraccounts;
if (!empty($maxusers)) {
$members = count_records_sql('
SELECT COUNT(*) FROM {usr} u INNER JOIN {usr_institution} i ON u.id = i.usr
......@@ -555,7 +555,7 @@ function uploadcsv_submit(Pieform $form, $values) {
// Reenable email
set_config('sendemail', $cfgsendemail);
// Only send e-mail to users after we're sure they have been inserted
// Only send e-mail to users after we're sure they have been inserted
// successfully
$straccountcreatedtext = ($values['forcepasswordchange']) ? 'accountcreatedchangepasswordtext' : 'accountcreatedtext';
$straccountcreatedhtml = ($values['forcepasswordchange']) ? 'accountcreatedchangepasswordhtml' : 'accountcreatedhtml';
......
......@@ -59,7 +59,7 @@ class Client {
$response_code = $result->info['http_code'];
$response_code_prefix = substr($response_code, 0, 1);
if ('2' != $response_code_prefix) {
if ('4' == $response_code_prefix) {
throw new XmlrpcClientException('Client error code: '. $response_code);
......@@ -90,7 +90,7 @@ class Client {
if ($xml->getName() == 'encryptedMessage') {
$payload_encrypted = true;
$wwwroot = (string)$xml->wwwroot;
// Strip encryption, using an older code is OK, because we're the client.
// Strip encryption, using an older code is OK, because we're the client.
// The server is able to respond with the correct key, be we're not
$payload = xmlenc_envelope_strip($xml, true);
}
......@@ -126,7 +126,7 @@ class Client {
if (is_array($this->response) && array_key_exists('faultCode', $this->response)) {
if ($this->response['faultCode'] == 7025) {
log_info('Remote application has sent us a new public key');
// The remote application sent back a new public key, the
// The remote application sent back a new public key, the
// old one must have expired
if (array_key_exists('faultString', $this->response)) {
$details = openssl_x509_parse($this->response['faultString']);
......@@ -141,8 +141,8 @@ class Client {
update_record('host', $updateobj, $whereobj);
log_info('New key has been imported. Valid until ' . date('Y/m/d h:i:s', $details['validTo_time_t']));
// Send request again. But don't use the cached
// peer, look it up again now we've changed the
// Send request again. But don't use the cached
// peer, look it up again now we've changed the
// public key
$this->send($wwwroot, false);
}
......
......@@ -19,13 +19,13 @@ class Dispatcher {
private $system_methods = array('system.listMethods' => 'list_methods',
'system/listMethods' => 'list_methods',
'system.methodSignature' => 'method_signature',
'system/methodSignature' => 'method_signature',
'system.methodHelp' => 'method_help',
'system/methodHelp' => 'method_help',
'system.listServices' => 'list_services',
'system/listServices' => 'list_services',
'system.keyswap' => 'keyswap',
'system.methodSignature' => 'method_signature',
'system/methodSignature' => 'method_signature',
'system.methodHelp' => 'method_help',
'system/methodHelp' => 'method_help',
'system.listServices' => 'list_services',
'system/listServices' => 'list_services',
'system.keyswap' => 'keyswap',
'system/keyswap' => 'keyswap');
private $services = array(
......@@ -69,9 +69,9 @@ class Dispatcher {
private $methodsig = array(
'user_authorise' => array(
array(
array('type' => 'array',
array('type' => 'array',
'description' => '$userdata Array of user info for remote host'
),
),
array('type' => 'string',
'description' => 'token - The unique ID provided by remotehost.'
),
......@@ -83,9 +83,9 @@ class Dispatcher {
'fetch_user_image' => array(
array(
array('type' => 'string',
array('type' => 'string',
'description' => 'The encoded image.'
),
),
array('type' => 'string',
'description' => 'username - The id of the user.'
)
......
......@@ -65,7 +65,7 @@ function start_jump_session($peer, $instanceid, $wantsurl="") {
}
if (false == $approved) {
// This shouldn't happen: the user shouldn't have been presented with
// This shouldn't happen: the user shouldn't have been presented with
// the link
throw new AccessTotallyDeniedException('Host not approved for sso');
}
......@@ -486,10 +486,10 @@ function send_content_ready($token, $username, $format, $importdata, $fetchnow=f
}
/**
* If we're an IDP, kill_children will kill the session of the given user here,
* If we're an IDP, kill_children will kill the session of the given user here,
* as well as at any other children
*
* NOTE: well, currently it doesn't call kill_child on any other children, but
* NOTE: well, currently it doesn't call kill_child on any other children, but
* it will kill the local sessions for the user
*
* @param string $username Username for session to kill
......@@ -500,7 +500,7 @@ function kill_children($username, $useragent) {
global $REMOTEWWWROOT; // comes from server.php
//require_once(get_config('docroot') .'api/xmlrpc/client.php');
// We've received a logout request for user X. In Mahara, usernames are unique. So we check that user X
// We've received a logout request for user X. In Mahara, usernames are unique. So we check that user X
// has an authinstance that would have been able to SSO to the remote site.
$userid = get_field('usr', 'id', 'username', $username);
$providers = get_service_providers(get_field('usr', 'authinstance', 'username', $username));
......@@ -826,7 +826,7 @@ function get_public_key($uri, $application=null) {
$xmlrpcserverurl = get_field('application', 'xmlrpcserverurl', 'name', $application);
if (empty($xmlrpcserverurl)) {
throw new XmlrpcClientException('Unknown application');
}
}
$wwwroot = dropslash(get_config('wwwroot'));
$rq = xmlrpc_encode_request('system/keyswap', array($wwwroot, $openssl->certificate), array("encoding" => "utf-8"));
......@@ -1008,11 +1008,11 @@ function xmldsig_envelope_strip(&$xml) {
* Encrypt a message and return it in an XML-Encrypted document
*
* This function can encrypt any content, but it was written to provide a system
* of encrypting XML-RPC request and response messages. The message does not
* of encrypting XML-RPC request and response messages. The message does not
* need to be text - binary data should work.
*
* Asymmetric keys can encrypt only small chunks of data. Usually 1023 or 2047
* characters, depending on the key size. So - we generate a symmetric key and
*
* Asymmetric keys can encrypt only small chunks of data. Usually 1023 or 2047
* characters, depending on the key size. So - we generate a symmetric key and
* use the asymmetric key to secure it for transport with the data.
*
* We generate a symmetric key
......@@ -1166,16 +1166,16 @@ class OpenSslRepo {
}
/**
* Decrypt some data using our private key and an auxiliary symmetric key.
* Decrypt some data using our private key and an auxiliary symmetric key.
* The symmetric key encrypted the data, and then was itself encrypted with
* our public key.
* This is because asymmetric keys can only safely be used to encrypt
* This is because asymmetric keys can only safely be used to encrypt
* relatively short messages.
*
* @param string $data
* @param string $key
* @param bool $oldkeyok If true, we will simply return the data rather
* than complaining about the key being old (if
* @param bool $oldkeyok If true, we will simply return the data rather
* than complaining about the key being old (if
* we could decrypt it with an older key)
* @return string
* @access public
......@@ -1230,7 +1230,7 @@ class OpenSslRepo {
* $openssl = new OpenSslRepo();
* Instead, use:
* $openssl = OpenSslRepo::singleton();
*
*
*/
private function __construct() {
if (empty($this->keypair)) {
......@@ -1243,7 +1243,7 @@ class OpenSslRepo {
}
/**
* Utility function to get old SSL keys from the config table, or create a
* Utility function to get old SSL keys from the config table, or create a
* blank record if none exists.
*
* @return array Array of keypair hashes
......@@ -1288,7 +1288,7 @@ class OpenSslRepo {
* values
*
* @param string Name of the value you want
* @return mixed The value of the thing you asked for or null (if it
* @return mixed The value of the thing you asked for or null (if it
* doesn't exist or is private)
* @access public
*/
......@@ -1301,17 +1301,17 @@ class OpenSslRepo {
}
/**
* Get the keypair. If it doesn't exist, create it. If it's out of date,
* Get the keypair. If it doesn't exist, create it. If it's out of date,
* archive it and create a fresh pair.
*
* @param bool True if you want to force fresh keys to be generated
* @return bool
* @return bool
* @access private
*/
public function get_keypair($regenerate = null) {
$this->keypair = array();
$records = null;
if ($records = get_records_select_menu('config', "field IN ('openssl_keypair', 'openssl_keypair_expires')", 'field', 'field, value')) {
list($this->keypair['certificate'], $this->keypair['keypair_PEM']) = explode('@@@@@@@@', $records['openssl_keypair']);
$this->keypair['expires'] = $records['openssl_keypair_expires'];
......@@ -1382,7 +1382,7 @@ class OpenSslRepo {
$province = get_config('province');
$locality = get_config('locality');
//TODO: Create additional fields on site setup and read those from
//TODO: Create additional fields on site setup and read those from
// config. Then remove the next 3 linez
if (empty($country)) $country = 'NZ';
if (empty($province)) $province = 'Wellington';
......@@ -1414,8 +1414,8 @@ class OpenSslRepo {
}
if (!$csr_rsc = openssl_csr_new($dn, $new_key, $config)) {
// This behaviour has been observed once before, on an ubuntu hardy box.
// The php5-openssl package was installed but somehow openssl
// This behaviour has been observed once before, on an ubuntu hardy box.
// The php5-openssl package was installed but somehow openssl
// wasn't.
throw new ConfigException(get_string('errorcouldnotgeneratenewsslkey', 'auth'));
}
......
......@@ -107,7 +107,7 @@ catch (CryptException $e) {
$response = ob_get_contents();
ob_end_clean();
// Sign and encrypt our response, even though we don't know if the
// Sign and encrypt our response, even though we don't know if the
// request was signed and encrypted
$response = xmldsig_envelope($response);
$peer = get_peer($REMOTEWWWROOT);
......
......@@ -18,7 +18,7 @@ class PluginBlocktypeBlog extends PluginBlocktype {
}
/**
* Optional method. If exists, allows this class to decide the title for
* Optional method. If exists, allows this class to decide the title for
* all blockinstances of this type
*/
public static function get_instance_title(BlockInstance $bi) {
......@@ -118,13 +118,13 @@ class PluginBlocktypeBlog extends PluginBlocktype {
$elements = array();
// If the blog in this block is owned by the owner of the View, then
// the block can be configured. Otherwise, the blog was copied in from
// another View. We won't confuse users by asking them to choose a blog
// to put in this block, when the one that is currently in it isn't
// If the blog in this block is owned by the owner of the View, then
// the block can be configured. Otherwise, the blog was copied in from
// another View. We won't confuse users by asking them to choose a blog
// to put in this block, when the one that is currently in it isn't
// choosable.
//
// Note: the owner check will have to change when we do group/site
// Note: the owner check will have to change when we do group/site
// blogs
if (empty($configdata['artefactid']) || $blog->get('owner') == $USER->get('id')) {
$elements[] = self::artefactchooser_element((isset($configdata['artefactid'])) ? $configdata['artefactid'] : null);
......@@ -150,13 +150,13 @@ class PluginBlocktypeBlog extends PluginBlocktype {
* Returns a list of artefact IDs that are in this blockinstance.
*
* {@internal{Because links to artefacts within blogposts don't count
* as making those artefacts 'children' of the blog post, we have to add
* as making those artefacts 'children' of the blog post, we have to add
* them directly to the blog.}}
*
* @return array List of artefact IDs that are 'in' this blog - all
* blogposts in it plus all links to other artefacts that are
* part of the blogpost text. Note that proper artefact
* children, such as blog post attachments, aren't included -
* @return array List of artefact IDs that are 'in' this blog - all
* blogposts in it plus all links to other artefacts that are
* part of the blogpost text. Note that proper artefact
* children, such as blog post attachments, aren't included -
* the artefact parent cache is used for them
* @see PluginBlocktypeBlogPost::get_artefacts()
*/
......@@ -166,10 +166,10 @@ class PluginBlocktypeBlog extends PluginBlocktype {
if (isset($configdata['artefactid'])) {
$artefacts[] = $configdata['artefactid'];
// Artefacts that are linked to directly in blog post text aren't
// strictly children of blog posts, which means that
// artefact_in_view won't understand that they are "within the
// blog". We have to help it here directly by working out what
// Artefacts that are linked to directly in blog post text aren't
// strictly children of blog posts, which means that
// artefact_in_view won't understand that they are "within the
// blog". We have to help it here directly by working out what
// artefacts are linked to in all of this blog's blog posts.
$blog = $instance->get_artefact_instance($configdata['artefactid']);
if ($blogposts = $blog->get_children_instances()) {
......@@ -197,7 +197,7 @@ class PluginBlocktypeBlog extends PluginBlocktype {
}
/**
* Optional method. If specified, allows the blocktype class to munge the
* Optional method. If specified, allows the blocktype class to munge the
* artefactchooser element data before it's templated
*/
//public static function artefactchooser_get_element_data($artefact) {
......@@ -223,7 +223,7 @@ class PluginBlocktypeBlog extends PluginBlocktype {
}
/**
* Blog blocktype is only allowed in personal views, because currently
* Blog blocktype is only allowed in personal views, because currently
* there's no such thing as group/site blogs
*/
public static function allowed_in_view(View $view) {
......
......@@ -18,7 +18,7 @@ class PluginBlocktypeBlogpost extends PluginBlocktype {
}
/**
* Optional method. If exists, allows this class to decide the title for
* Optional method. If exists, allows this class to decide the title for
* all blockinstances of this type
*/
public static function get_instance_title(BlockInstance $bi) {
......@@ -58,17 +58,17 @@ class PluginBlocktypeBlogpost extends PluginBlocktype {
/**
* Returns a list of artefact IDs that are in this blockinstance.
*
* Normally this would just include the blogpost ID itself (children such
* as attachments don't need to be included here, they're handled by the
* artefact parent cache). But people might just link to artefacts without
* using the attachment facility. There's nothing wrong with them doing
* that, so if they do we should scrape the post looking for such links and
* Normally this would just include the blogpost ID itself (children such
* as attachments don't need to be included here, they're handled by the
* artefact parent cache). But people might just link to artefacts without
* using the attachment facility. There's nothing wrong with them doing
* that, so if they do we should scrape the post looking for such links and
* include those artefacts as being part of this blockinstance.
*
* @return array List of artefact IDs that are 'in' this blogpost - all
* the blogpost ID plus links to other artefacts that are
* part of the blogpost text. Note that proper artefact
* children, such as blog post attachments, aren't included -
* @return array List of artefact IDs that are 'in' this blogpost - all
* the blogpost ID plus links to other artefacts that are
* part of the blogpost text. Note that proper artefact
* children, such as blog post attachments, aren't included -
* the artefact parent cache is used for them