<?php
if( basename(__FILE__) == basename($_SERVER['SCRIPT_FILENAME']) )
	die();

/**
 * CapInterceptor_RS PHP class for the WordPress plugin Role Scoper
 * cap-interceptor_rs.php
 * 
 * @author 		Kevin Behrens
 * @copyright 	Copyright 2011
 * 
 */
class CapInterceptor_RS
{	
	var $scoper;
	var $scoper_admin;
	var $query_interceptor;
	
	var $in_process = false;
	var $skip_id_generation = false;
	var $skip_any_term_check = false;
	var $skip_any_object_check = false;
	var $ignore_object_roles = false;
	
	function CapInterceptor_RS() {
		$this->scoper =& $GLOBALS['scoper'];
		$this->query_interceptor =& $GLOBALS['query_interceptor'];
		$this->scoper_admin =& $GLOBALS['scoper_admin'];
		
		// Since scoper installation implies that this plugin should take custody
		// of access control, set priority high so we have the final say on group-controlled caps.
		// This filter will not mess with any caps which are not scoper-defined.
		//
		// (note: custom caps from other plugins can be scoper-controlled if they are defined via a Role Scoper Extension plugin)
		add_filter('user_has_cap', array(&$this, 'flt_user_has_cap'), 99, 3);  // scoping will be defeated if our filter isn't applied last
	}

	// hook to wrapper function to avoid recursion
	function flt_user_has_cap($wp_blogcaps, $orig_reqd_caps, $args) {
		if ( $this->in_process )
			return $wp_blogcaps;
			
		$this->in_process = true;
		$return = $this->_flt_user_has_cap($wp_blogcaps, $orig_reqd_caps, $args);
		$this->in_process = false;
		return $return;
	}
	
	// CapInterceptor_RS::flt_user_has_cap
	//
	// Capability filter applied by WP_User->has_cap (usually via WP current_user_can function)
	// Pertains to logged user's capabilities blog-wide, or for a single item
	//
	// $wp_blogcaps = current user's blog-wide capabilities
	// $reqd_caps = primitive capabilities being tested / requested
	// $args = array with:
	// 		$args[0] = original capability requirement passed to current_user_can (possibly a meta cap)
	// 		$args[1] = user being tested
	// 		$args[2] = object id (could be a postID, linkID, catID or something else)
	//
	// The intent here is to add to (or take away from) $wp_blogcaps based on scoper role assignments
	// (only offer an opinion on scoper-defined caps, with others left in $allcaps array as blog-wide caps)
	//
	function _flt_user_has_cap($wp_blogcaps, $orig_reqd_caps, $args) {
		
		// =============================== STATIC VARIABLE DECLARATION AND INITIALIZATION (to memcache filtering results) =====
		static $cache_tested_ids;
		static $cache_okay_ids;
		static $cache_where_clause;
							
		if ( empty($cache_tested_ids) ) {
			$cache_where_clause = array();
			$cache_tested_ids = array();
			$cache_okay_ids = array();
		}
		// ====================================================================================================================
		

		// =============================================== TEMPORARY DEBUG CODE ================================================

		//dump($orig_reqd_caps);
		//dump($args);
		
		//if ( strpos( $_SERVER['REQUEST_URI'], 'ajax' ) ) {
			//if ( ! empty($_REQUEST) )
			//	rs_errlog( serialize($_REQUEST) );
			//rs_errlog( '' );

			//rs_errlog('flt_user_has_cap');
			//rs_errlog(serialize($orig_reqd_caps));
			//rs_errlog(serialize($args));
			//rs_errlog('');
		//}

		// ============================================= (end temporary debug code) ==============================================

		// convert 'rs_role_name' to corresponding caps (and also make a tinkerable copy of orig_reqd_caps)
		$orig_reqd_caps = $this->scoper->role_defs->role_handles_to_caps($orig_reqd_caps);
		
		
		// ================= EARLY EXIT CHECKS (if the provided reqd_caps do not need filtering or need special case filtering ==================
		global $pagenow;

		// Disregard caps which are not defined in Role Scoper config
		if ( ! $rs_reqd_caps = array_intersect( $orig_reqd_caps, $this->scoper->cap_defs->get_all_keys() ) ) {
			return $wp_blogcaps;		
		}
		
		// log initial set of RS-filtered caps (in case we swap in equivalent caps for intermediate processing)
		$orig_reqd_caps = $rs_reqd_caps;

		// permitting this filter to execute early in an attachment request resets the found_posts record, preventing display in the template
		if ( is_attachment() && ! is_admin() && ! did_action('template_redirect') ) {
			if ( empty( $GLOBALS['scoper_checking_attachment_access'] ) ) {
				return $wp_blogcaps;
			}
		}
		
		// work around bug in mw_EditPost method (requires publish_pages AND publish_posts cap)
		if ( defined('XMLRPC_REQUEST') && ( 'publish_posts' == $orig_reqd_caps[0] ) ) {
			if ( 'page' == $GLOBALS['xmlrpc_post_type_rs'] ) {
				return array( 'publish_posts' => true );
			}
		}
		
		// backdoor to deal with rare cases where one of the caps included in RS role defs cannot be filtered properly
		if ( defined('UNSCOPED_CAPS_RS') && ! array_diff( $orig_reqd_caps, explode( ',', UNSCOPED_CAPS_RS ) ) ) {
			return $wp_blogcaps;
		}
		
		// custom workaround to reveal all private / restricted content in all blogs if logged into main blog 
		if ( defined( 'SCOPER_MU_MAIN_BLOG_RULES' ) ) {
			include_once( dirname(__FILE__).'/mu-custom.php' );
			if ( ! array_diff( $orig_reqd_caps, array( 'read', 'read_private_pages', 'read_private_posts' ) ) )
				if ( $return_caps = ScoperMU_Custom::current_user_logged_into_main( $wp_blogcaps, $orig_reqd_caps ) ) {
					return $return_caps;
				}
		}

		//define( 'SCOPER_NO_COMMENT_FILTERING', true );
		if ( defined( 'SCOPER_NO_COMMENT_FILTERING' ) && ( 'moderate_comments' == $orig_reqd_caps[0] ) && empty( $GLOBALS['current_rs_user']->allcaps['moderate_comments'] ) ) {
			return $wp_blogcaps;			
		}
		
		if ( defined( 'SCOPER_ALL_UPLOADS_EDITABLE' ) && ( $pagenow == 'upload.php' ) && in_array( $orig_reqd_caps[0], array( 'upload_files', 'edit_others_posts', 'delete_others_posts' ) ) ) {
			return $wp_blogcaps;
		}		
		// =================================================== (end early exit checks) ======================================================

		
		// ============================ GLOBAL VARIABLE DECLARATIONS, ARGUMENT TRANSLATION AND STATUS DETECTION =============================
		global $current_rs_user;
		
		$user_id = ( isset($args[1]) ) ? $args[1] : 0;

		if ( $user_id && ($user_id != $current_rs_user->ID) )
			$user = rs_get_user($user_id);
		else
			$user = $current_rs_user;

		// currently needed for filtering async-upload.php
		if ( empty($user->blog_roles ) || empty($user->blog_roles[''] ) )
			$this->scoper->refresh_blogroles();
			
		$object_id = ( isset($args[2]) ) ? (int) $args[2] : 0;

		// WP passes comment ID with 'edit_comment' metacap
		if ( $object_id && ( 'edit_comment' == $args[0] ) ) {
			if ( $comment = get_comment( $object_id ) )
				$object_id = $comment->comment_post_ID;
			else
				$object_id = 0;
		}
		
		// note the data source and object type(s) which are associated with the required caps (based on inclusion in RS Role Definitions)
		$is_taxonomy_cap = false;
		$src_name = '';
		$cap_types = $this->scoper->cap_defs->src_otypes_from_caps( $rs_reqd_caps, $src_name );	  // note: currently only needed for src_name determination
		
		$doing_admin_menus = is_admin() && (
		( did_action( '_admin_menu' ) && ! did_action('admin_menu') ) 	 // menu construction
		|| ( did_action( 'admin_head' ) && ! did_action('adminmenu') )	 // menu display
		);

		// for scoped menu management roles, satisfy edit_theme_options cap requirement
		if ( ( 'edit_theme_options' == $orig_reqd_caps[0] ) && empty( $wp_blogcaps['edit_theme_options'] ) ) {
			if ( in_array( $GLOBALS['pagenow'], array( 'nav-menus.php', 'admin-ajax.php' ) ) || $doing_admin_menus ) {
				$key = array_search( 'edit_theme_options', $rs_reqd_caps );
				if ( false !== $key ) {
					$tx = get_taxonomy( 'nav_menu' );
					$rs_reqd_caps[$key] = $tx->cap->manage_terms;
					
					$src_name = 'nav_menu';
					
					// menu-specific manager assignment does not permit deletion of the menu
					if ( ! empty( $_REQUEST['action'] ) && ( 'delete' == $_REQUEST['action'] ) )
						$this->skip_any_term_check = true;
				}
			}
		}
		
		if ( ! $src_name ) {
			// required capabilities correspond to multiple data sources
			return $wp_blogcaps;		
		}

		// slight simplification: assume a single cap object type for a few cap substitution checks
		$is_taxonomy_cap = $this->scoper->cap_defs->member_property( reset($rs_reqd_caps), 'is_taxonomy_cap' );
		
		// Establish some context by detecting object type - based on object ID if provided, or otherwise based on http variables.
		if ( in_array( $pagenow, array( 'media-upload.php', 'async-upload.php' ) ) ) {
			if ( ! empty($GLOBALS['post']) ) 
				$object_type = $GLOBALS['post']->post_type;	
		
		} elseif ( is_admin() && ( 'edit-tags.php' == $GLOBALS['pagenow'] ) && ( 'link_category' == $_REQUEST['taxonomy'] ) ) {
			$src_name = 'link';
			$object_type = 'link_category';
		} elseif ( in_array( $orig_reqd_caps[0], array( 'manage_nav_menus', 'edit_theme_options' ) ) ) {
			$src_name = 'nav_menu';
		}

		if ( empty($object_type) )
			$object_type = cr_find_object_type( $src_name, $object_id );

		$object_type_obj = cr_get_type_object( $src_name, $object_type );
		
		if ( 'post' == $src_name ) {
			if ( in_array( $object_type, array( 'attachment', 'revision' ) ) ) {
				if ( $object_id ) {
					if ( $_post = get_post( $object_id ) ) {
						if ( $_parent = get_post($_post->post_parent) ) {
							$object_type = $_parent->post_type;
							$object_id = $_parent->ID;
							
							// deal with case of edit_posts cap check on attachments to revision (with Revisionary)
							if ( 'revision' == $object_type ) {
								if ( $_orig_post = get_post($_parent->post_parent) ) {
									$object_type = $_orig_post->post_type;
									$object_id = $orig_post->ID;
								}
							}
							
							$object_type_obj = get_post_type_object( $object_type );
						}
					}
				}
			} elseif ( ! $is_taxonomy_cap ) {
				$use_post_types = scoper_get_option( 'use_post_types' );
				if ( empty( $use_post_types[$object_type] ) )
					return $wp_blogcaps;
			}
		}
		
		// =====================================================================================================================================

		// ======================================== SUBVERT MISGUIDED CAPABILITY REQUIREMENTS ==================================================
		if ( 'post' == $src_name ) {	
			if ( ! $is_taxonomy_cap ) {
				$modified_caps = false;
				
				if ( 'post' != $object_type ) {
					$replace_post_caps = array( 'publish_posts', 'edit_others_posts', 'edit_published_posts' );
					
					// Replace edit_posts requirement with corresponding type-specific requirement, but only after admin menu is drawn, or on a submission before the menu is drawn
					if ( did_action( 'admin_init' ) ) {	// otherwise extra padding between menu items due to some items populated but unpermitted
						$replace_post_caps []= 'edit_posts';
					}
	
					if ( in_array( $pagenow, array( 'upload.php', 'media.php' ) ) ) {
						$replace_post_caps = array_merge( $replace_post_caps, array( 'delete_posts', 'delete_others_posts' ) );
					}

					foreach( $replace_post_caps as $post_cap_name ) {
						$key = array_search( $post_cap_name, $rs_reqd_caps );

						if ( ( false !== $key ) && ! $doing_admin_menus && in_array( $pagenow, array( 'edit.php', 'post.php', 'post-new.php', 'admin-ajax.php', 'upload.php', 'media.php' ) ) ) {				
							$rs_reqd_caps[$key] = $object_type_obj->cap->$post_cap_name;
							$modified_caps = true;
						}
					}
				}
				
				// WP core quirk workaround: edit_others_posts is required as preliminary check for populating authors dropdown for any post type.  Instead, we need to do our own validation based on scoped roles.
				// (but don't mess if this cap requirement is part of an edit_post metacap check for a specific post)
				if ( ! $object_id && ( count($rs_reqd_caps) == 1 ) ) {
					if( in_array( reset($rs_reqd_caps), array( 'edit_others_posts' ) ) ) {
						require_once( dirname(__FILE__).'/lib/agapetry_wp_admin_lib.php' ); // function awp_metaboxes_started()
		
						if ( ! awp_metaboxes_started( $object_type ) && ( 'revision.php' != $pagenow ) && ( 'revisions' != $GLOBALS['plugin_page_cr'] ) ) // don't enable contributors to view/restore revisions
							$rs_reqd_caps[0] = $object_type_obj->cap->edit_posts;   // don't enable contributors to view/restore revisions
						else
							$rs_reqd_caps[0] = $object_type_obj->cap->edit_published_posts;	// we will filter / suppress the author dropdown downstream from here
						
						$modified_caps = true;
					}
				}
				
				// as of WP 3.1, addition of new nav menu items requires edit_posts capability (otherwise nav menu item is orphaned with no menu relationship)
				if ( is_admin() && strpos( $_SERVER['SCRIPT_NAME'], 'nav-menus.php' ) ) {
					if ( 'edit_posts' == $orig_reqd_caps[0] ) {
						$type_obj = get_taxonomy( 'nav_menu' );
						$rs_reqd_caps[0] = $type_obj->cap->manage_terms;
						$modified_caps = true;
					}
				}
				
			} // endif not taxonomy cap
		} // endif caps correspond to 'post' data source
		//====================================== (end subvert misguided capability requirements) =============================================
		
		if ( defined( 'RVY_VERSION' ) ) {
			require_once( dirname(__FILE__).'/revisionary-helper_rs.php' );
			$rs_reqd_caps = Rvy_Helper::convert_post_edit_caps( $rs_reqd_caps, $object_type );
		}

		//rs_errlog( "matched context for $object_id : $matched_context" );
		
		// don't apply object-specific filtering for auto-drafts
		if ( 'post' == $src_name ) {
			if ( $object_id ) {
				if ( $_post = get_post($object_id) ) {
					if ( ( 'auto-draft' == $_post->post_status ) && ! empty($_POST['action']) ) { // && ( 'autosave' == $_POST['action'] ) ) {
						$object_id = 0;
						
						if ( ! $doing_admin_menus )
							$this->skip_id_generation = true;
					}
				}
			} elseif ( ! empty( $GLOBALS['post'] ) && ( 'auto-draft' == $GLOBALS['post']->post_status ) && ! $doing_admin_menus )
				$this->skip_id_generation = true;	
		}
		
		// If no object id was passed in...
		if ( ! $object_id ) { // || ! $matched_context ) {
		//if ( $missing_caps = array_diff($rs_reqd_caps, array_keys($wp_blogcaps) ) ) {
			if ( ! $object_id && ! $doing_admin_menus ) {
				// ============================================ OBJECT ID DETERMINATION ========================================
				if ( ! $this->skip_id_generation && ! defined('XMLRPC_REQUEST') && ! in_array( $pagenow, array( 'media-upload.php', 'async-upload.php' ) ) ) {  // lots of superfluous queries in media upload popup otherwise
					// Try to generate missing object_id argument for problematic current_user_can calls 
					static $generated_id;
					
					if ( ! isset( $generated_id ) )
						$generated_id = array();
	
					// if the id was not already detected and stored to the static variable...
					$caps_key = serialize($rs_reqd_caps);
					if ( ! isset( $generated_id[$object_type][$caps_key] ) ) {
						$gen_id = 0;
	
						foreach( $rs_reqd_caps as $cap_name ) {
							if ( $gen_id = (int) $this->_detect_object_id( $cap_name ) ) {
								break;	// means we are accepting the generated id
							}
						}
	
						$generated_id[$object_type][$caps_key] = $gen_id;
						$object_id = $gen_id;
					} else
						$object_id = $generated_id[$object_type][$caps_key];

					//rs_errlog( "detected ID: $object_id" );
				} else
					$this->skip_id_generation = false; // this is a one-time flag

				// ========================================= (end object id determination) =======================================
			} else {
				if ( $_post = get_post($object_id) ) {
					$object_type = $_post->post_type;
					$object_type_obj = cr_get_type_object( $src_name, $object_type );
				}
			}
			
			// If we still have no object id (detection was skipped or failed to identify it)...
			if ( ! $object_id ) { // || ! $matched_context ) {
				// ============================================ "CAN FOR ANY" CHECKS ===========================================
				if ( $missing_caps = array_diff($rs_reqd_caps, array_keys($wp_blogcaps) ) ) {
					// These checks are only relevant since no object_id was provided.  Otherwise (in the main body of this function), taxonomy and object caps will be credited via scoped query.
					
					// If we are about to fail the blogcap requirement, credit a missing cap if the user has it by term role for ANY term.
					// This prevents failing initial UI entrance exams that only consider blog-wide roles.
					if ( ! $this->skip_any_term_check ) {
						if ( $tax_caps = $this->user_can_for_any_term($missing_caps) )
							$wp_blogcaps = array_merge($wp_blogcaps, $tax_caps);

						//rs_errlog( "can for any term: " . serialize($tax_caps) );
					} else
						$this->skip_any_term_check = false;  // this is a one-time flag

					// If we are still missing required caps, credit a missing scoper-defined cap if the user has it by object role for ANY object.
					// (i.e. don't bar user from "Edit Pages" if they have edit_pages cap for at least one page)
					if ( $missing_caps = array_diff($rs_reqd_caps, array_keys($wp_blogcaps) ) ) {
						// prevent object-specific editing roles from allowing new object creation w/o sitewide capability
						$add_new_check = strpos( $_SERVER['SCRIPT_NAME'], 'post-new.php' ) && ( 'post' == $src_name ) && ( reset( $rs_reqd_caps ) == $object_type_obj->cap->edit_posts );

						if ( ( ! $this->skip_any_object_check ) && ! $add_new_check ) {
						//if ( ! $this->skip_any_object_check ) {
							if ( $object_caps = $this->user_can_for_any_object( $missing_caps ) )
								$wp_blogcaps = array_merge($wp_blogcaps, $object_caps);
								
							//rs_errlog( "can for any object: " . serialize($object_caps) );
						} else
							$this->skip_any_object_check = false;  // this is a one-time flag
					}
				}
				// ========================================== (end "can for any" checks ) =========================================
				
				//rs_errlog( serialize( $wp_blogcaps) );
				
				if ( $missing_caps = array_diff($rs_reqd_caps, array_keys($wp_blogcaps) ) )
					// normal exit point when no object ID is passed or detected, or when detected object type does not match required capabilities
					return $wp_blogcaps;
				else {
					if ( $restore_caps = array_diff( $orig_reqd_caps, $rs_reqd_caps ) )  // restore original reqd_caps which we substituted for the type-specific scoped query
						$wp_blogcaps = array_merge( $wp_blogcaps, array_fill_keys($restore_caps, true) );

					return $wp_blogcaps;
				}	
			}
		//} else
			//return $wp_blogcaps;
			
		} else { // endif no object_id passed in
			
			// if the top level page structure is locked, don't allow non-administrator to delete a top level page either
			if ( 'post' == $src_name ) {
				if ( ( 'page' == $object_type ) || defined( 'SCOPER_LOCK_OPTION_ALL_TYPES' ) && ! is_content_administrator_rs() ) {
					$delete_metacap = ( ! empty($object_type_obj->hierarchical) ) ? $object_type_obj->cap->delete_post : 'delete_page';

					// if the top level page structure is locked, don't allow non-administrator to delete a top level page either
					if ( $delete_metacap == $args[0] ) {
						if ( '1' === scoper_get_option( 'lock_top_pages' ) ) {	  // stored value of 1 means only Administrators are allowed to modify top-level page structure
							if ( $page = get_post( $args[2] ) ) {
								if ( empty( $page->post_parent ) ) {
									$in_process = false;
									return false;
								}
							}
						}
					}
				}
			}
		}
		
		// Note: At this point, we have a nonzero object_id...
		
		// if this is a term administration request, route to user_can_admin_terms()
		if ( $is_taxonomy_cap ) {
			if ( 'post' == $src_name )
				$cap_otype_obj = get_taxonomy( $object_type );

			if ( ( ( 'post' != $src_name ) || ( $cap_otype_obj && $rs_reqd_caps[0] == $cap_otype_obj->cap->manage_terms ) ) && ( count($rs_reqd_caps) == 1 ) ) {  // don't re-route if multiple caps are being required
				// always pass through any assigned blog caps which will not be involved in this filtering
				$rs_reqd_caps = array_fill_keys( $rs_reqd_caps, 1 );
				$undefined_reqd_caps = array_diff_key( $wp_blogcaps, $rs_reqd_caps);

				require_once( dirname(__FILE__).'/admin/permission_lib_rs.php' );
				if ( user_can_admin_terms_rs( $object_type, $object_id, $user) ) {
					return array_merge($undefined_reqd_caps, $rs_reqd_caps);
				} else {
					return $undefined_reqd_caps;	// required caps we scrutinized are excluded from this array
				}
			}
		}
		
		// Workaround to deal with WP core's checking of publish cap prior to storing categories
		// Store terms to DB in advance of any cap-checking query which may use those terms to qualify an operation		
		if ( ! empty($_POST['action']) && ( ('editpost' == $_POST['action']) || ('autosave' == $_POST['action']) ) ) {
			if ( array_intersect( array( 'publish_posts', 'edit_posts', $object_type_obj->cap->publish_posts,  $object_type_obj->cap->edit_posts ), $rs_reqd_caps) ) {
				$uses_taxonomies = scoper_get_taxonomy_usage( $src_name, $object_type );
				
				static $inserted_terms;
				if ( ! isset( $inserted_terms ) )
					$inserted_terms = array();
				
				foreach ( $uses_taxonomies as $taxonomy ) { 	// TODO: only if tx->requires_term is true?
					if ( isset( $inserted_terms[$taxonomy][$object_id] ) )
						continue;

					$inserted_terms[$taxonomy][$object_id] = true;

					//if ( $stored_terms = wp_get_object_terms( $object_id, $taxonomy ) ) // note: this will cause trouble if WP core ever auto-stores object terms on post creation
					//	continue;

					$stored_terms = $this->scoper->get_terms($taxonomy, UNFILTERED_RS, COL_ID_RS, $object_id);
					
					require_once( dirname(__FILE__).'/admin/filters-admin-save_rs.php' );
					$selected_terms = cr_get_posted_object_terms( $taxonomy );

					if ( $set_terms = $GLOBALS['scoper_admin_filters']->flt_pre_object_terms($selected_terms, $taxonomy) ) {
						$set_terms = array_unique( array_map('intval', $set_terms) );

						if ( $set_terms != $stored_terms ) {
							wp_set_object_terms( $object_id, $set_terms, $taxonomy );

							// delete any buffered cap check results which were queried prior to storage of these object terms
							unset( $cache_tested_ids );
							unset( $cache_where_clause );
							unset( $cache_okay_ids );
						}
					}
				}
				
				// also avoid chicken-egg situation when publish cap is granted by a propagating page role
				if ( $object_type_obj->hierarchical && isset( $_POST['parent_id'] ) ) {
					if ( $_POST['parent_id'] != get_post_field( 'post_parent', $object_id ) ) {
						$set_parent = $GLOBALS['scoper_admin_filters']->flt_page_parent( $_POST['parent_id'] );
						$GLOBALS['wpdb']->query( "UPDATE $wpdb->posts SET post_parent = '$set_parent' WHERE ID = '$object_id'" );
						
						require_once( dirname(__FILE__).'/admin/filters-admin-save_rs.php' );
						scoper_inherit_parent_roles($object_id, OBJECT_SCOPE_RS, $src_name, $set_parent, $object_type);
						scoper_inherit_parent_restrictions($object_id, OBJECT_SCOPE_RS, $src_name, $set_parent, $object_type);
					}
				}
			}
		}

		// generate a string key for this set of required caps, for use below in checking, caching the scoped results
		$arg_append = '';
		$arg_append .= ( ! empty( $this->require_full_object_role ) ) ? '-require_full_object_role-' : '';
		$arg_append .= ( ! empty( $GLOBALS['revisionary']->skip_revision_allowance ) ) ? '-skip_revision_allowance-' : '';

		sort($rs_reqd_caps);
		$capreqs_key = implode($rs_reqd_caps) . $arg_append;  // see ScoperAdmin::user_can_admin_object
		
	
		// ================================ SPECIAL HANDLING FOR ATTACHMENTS AND REVISIONS ==========================================
		$maybe_revision = ( 'post' == $src_name && ! isset($cache_tested_ids[$src_name][$object_type][$capreqs_key][$object_id]) );

		$maybe_attachment = in_array( $pagenow, array( 'upload.php', 'media.php' ) );

		if ( $maybe_revision || $maybe_attachment ) {
			global $wpdb;
	
			if ( $_post = get_post($object_id) ) {
				if ( 'revision' == $_post->post_type ) {
					require_once( dirname(__FILE__).'/lib/revisions_lib_rs.php' );					
					$revisions = rs_get_post_revisions($_post->post_parent, 'inherit', array( 'fields' => constant('COL_ID_RS'), 'return_flipped' => true ) );						
				}

				if ( ( 'revision' == $_post->post_type ) || ( 'attachment' == $_post->post_type ) ) {
					if ( $_post->post_parent ) {
						$object_id = $_post->post_parent;

						if ( $_parent = get_post($_post->post_parent) ) {
							$object_type = $_parent->post_type;
							$object_type_obj = get_post_type_object( $object_type );

							if ( 'post' != $_parent->post_type ) {
								// Compensate for WP's requirement of posts cap for attachment editing, regardless of whether it's attached to a post or page							
								if ( 'edit_others_posts' == $rs_reqd_caps[0] )
									$rs_reqd_caps[0] = $object_type_obj->cap->edit_others_posts;
									
								elseif ( 'delete_others_posts' == $rs_reqd_caps[0] )
									$rs_reqd_caps[0] = $object_type_obj->cap->delete_others_posts;
									
								elseif ( 'edit_posts' == $rs_reqd_caps[0] )
									$rs_reqd_caps[0] = $object_type_obj->cap->edit_posts;
									
								elseif ( 'delete_posts' == $rs_reqd_caps[0] )
									$rs_reqd_caps[0] = $object_type_obj->cap->delete_posts;
							}
						}
					} elseif ( 'attachment' == $_post->post_type ) {
						// special case for unattached uploads: uploading user should have their way with them
						if ( $_post->post_author == $current_rs_user->ID ) {
							$rs_reqd_caps[0] = 'read';

							if ( $restore_caps = array_diff($orig_reqd_caps, array_keys($rs_reqd_caps) ) )  // restore original reqd_caps which we substituted for the type-specific scoped query
								$wp_blogcaps = array_merge( $wp_blogcaps, array_fill_keys($restore_caps, true) );
						}

						return $wp_blogcaps;
					}
				} //endif retrieved post is a revision or attachment
			} // endif post retrieved
		} // endif specified id might be a revision or attachment
		// ============================== (end special handling for attachments and revisions) ==========================================
		
	
		// ============ SCOPED QUERY for required caps on object id (if other listed ids are known, query for them also).  Cache results to static var. ===============
		
		// $force_refresh = 'async-upload.php' == $pagenow;
		
		// Page refresh following publishing of new page by users who can edit by way of Term Role fails without this workaround
		if ( ! empty( $_POST ) && ( defined( 'SCOPER_CACHE_SAFE_MODE' ) || ( ( 'post.php' == $pagenow ) && ( $args[0] == $object_type_obj->cap->edit_post ) ) ) ) {
			$force_refresh = true;
			$cache_tested_ids = array();
			$cache_okay_ids = array();
			$cache_where_clause = array();
		} else
			$force_refresh = false;
			
		// Check whether this object id was already tested for the same reqd_caps in a previous execution of this function within the same http request
		if ( $force_refresh || ! isset($cache_tested_ids[$src_name][$object_type][$capreqs_key][$object_id]) ) {
		//if ( ! isset($cache_tested_ids[$src_name][$object_type][$capreqs_key][$object_id]) ) {
	
			// retrieve CR_Data_Source object, which contains database column names
			$src_table = $this->scoper->data_sources->member_property($src_name, 'table');
			$cols = $this->scoper->data_sources->member_property($src_name, 'cols');
			
			// Before querying for caps on this object, check whether we have a record of other posts listed alongside it.  
			// If so, run the scoped query for ALL listed objects in that buffer, and buffer the results to static variable hascap_object_ids. 
			//
			// (This is useful when front end code must check caps for each post 
			//  to determine whether to display 'edit' link, etc.)
			if ( is_admin() && ( 'index.php' == $pagenow ) ) {  // there's too much happening on the dashboard (and too much low-level query filtering) to buffer listed IDs reliably.
				$listed_ids = array();
			} else {
				if ( isset($this->scoper->listed_ids[$src_name]) )
					$listed_ids = array_keys($this->scoper->listed_ids[$src_name]);
				else // note: don't use wp_object_cache because it includes posts not present in currently displayed resultset listing page
					$listed_ids = array();
			}
			
			// make sure our current object_id is in the list
			$listed_ids[] = $object_id;

			// since the objects_where_role_clauses() output itself is not id-specific, also statically buffer it per reqd_caps
			if ( $force_refresh || ! isset( $cache_where_clause[$src_name][$object_type][$capreqs_key] ) ) {
				$check_otype = ( 'link_category' == $object_type ) ? 'link' : $object_type;
				$use_term_roles = scoper_get_otype_option( 'use_term_roles', $src_name, $check_otype );

				$no_object_roles = $this->scoper->data_sources->member_property($src_name, 'no_object_roles');
				$use_object_roles = ( $no_object_roles ) ? false : scoper_get_otype_option( 'use_object_roles', $src_name, $object_type );
	
				$this_args = array( 'object_type' => $object_type, 'user' => $user, 'otype_use_term_roles' => $use_term_roles, 'otype_use_object_roles' => $use_object_roles, 'skip_teaser' => true, 'require_full_object_role' => ! empty($this->require_full_object_role) );

				//rs_errlog( serialize($rs_reqd_caps) );
				//rs_errlog( serialize($this_args) );
				
				$where = $this->query_interceptor->objects_where_role_clauses($src_name, $rs_reqd_caps, $this_args );
				
				if ( $where )
					$where = "AND ( $where )";
					
				// update static variable
				$cache_where_clause[$src_name][$object_type][$capreqs_key] = $where;
			} else
				$where = $cache_where_clause[$src_name][$object_type][$capreqs_key];

			// run the query
			$query = "SELECT $src_table.{$cols->id} FROM $src_table WHERE 1=1 $where AND $src_table.{$cols->id} IN ('" . implode( "', '", array_unique($listed_ids) ) . "')";
			
			if ( isset( $cache_okay_ids[$query] ) )
				$okay_ids = $cache_okay_ids[$query];
			else {
				if ( $okay_ids = scoper_get_col($query) )
					$okay_ids = array_fill_keys($okay_ids, true);
			}

			//dump($rs_reqd_caps);
			//dump($query);
			//dump($okay_ids);

			//rs_errlog( $query );
			//rs_errlog( 'results: ' . serialize( $okay_ids ) );
				
			// update static cache_tested_ids to log scoped results for this object id, and possibly also for other listed IDs
			if ( empty($_GET['doaction']) || ( ('delete_post' != $args[0]) && ($object_type_obj->cap->delete_post != $args[0]) ) ) {		// bulk post/page deletion is broken by hascap buffering
				foreach ( $listed_ids as $_id )
					$cache_tested_ids[$src_name][$object_type][$capreqs_key][$_id] = isset( $okay_ids[$_id] );
					
				$cache_okay_ids[$query] = $okay_ids;
			}
			
			$this_id_okay = isset( $okay_ids[$object_id] );
		} else {
			 // results of this same has_cap inquiry are already stored (from another call within current http request)
			$this_id_okay = $cache_tested_ids[$src_name][$object_type][$capreqs_key][$object_id];
		}

		//rs_errlog( "okay ids: " . serialize( $okay_ids ) );
		
		// if we redirected the cap check to revision parent, also credit all the revisions for passing results
		if ( $this_id_okay && ! empty($revisions) ) {
			if ( empty($_GET['doaction']) || ( ('delete_post' != $args[0]) && ($object_type_obj->cap->delete_post != $args[0]) ) )	// bulk post/page deletion is broken by hascap buffering
				$cache_tested_ids[$src_name][$object_type][$capreqs_key] = $cache_tested_ids[$src_name][$object_type][$capreqs_key] + array_fill_keys( $revisions, true );
		}
		
		$rs_reqd_caps = array_fill_keys( $rs_reqd_caps, true );
		
		if ( ! $this_id_okay ) {
			if ( ( 'edit_posts' == $orig_reqd_caps[0] ) && strpos( $_SERVER['REQUEST_URI'], 'async-upload.php' ) ) {  // temp workaround for ACF with Revisionary
				return $wp_blogcaps;
			}

			// ================= TEMPORARY DEBUG CODE ===================
			//d_echo("object_id $object_id FAILED !!!!!!!!!!!!!!!!!" );

			//rs_errlog( "object_id $object_id FAILED !!!!!!!!!!!!!!!!!"  );
			//rs_errlog(serialize($orig_reqd_caps));
			//rs_errlog(serialize($rs_reqd_caps));
			//rs_errlog('');

			/*
			$log .= "checked caps: " . serialize($rs_reqd_caps) . "\r\n";
			$log .= "object_id $object_id FAILED !!!!!!!!!!!!!!!!!\r\n";
			$log .= $query;
			rs_errlog( "\r\n{$log}\r\n" );
			*/
			//d_echo( "FAILED for " . serialize($rs_reqd_caps) );
			// ============== (end temporary debug code ==================

			return array_diff_key( $wp_blogcaps, $rs_reqd_caps);	// required caps we scrutinized are excluded from this array
		} else {
			if ( $restore_caps = array_diff($orig_reqd_caps, array_keys($rs_reqd_caps) ) )  // restore original reqd_caps which we substituted for the type-specific scoped query
				$rs_reqd_caps = $rs_reqd_caps + array_fill_keys($restore_caps, true);
				
			//d_echo( 'OKAY:' );
			//dump($args);
			//dump($rs_reqd_caps);
			//d_echo( '<br />' );
			
			return array_merge($wp_blogcaps, $rs_reqd_caps);
		}
	}
	
	
	// Try to generate missing has_cap object_id arguments for problematic caps
	// Ideally, this would be rendered unnecessary by updated current_user_can calls in WP core or other offenders
	function _detect_object_id( $required_cap ) {
		if ( has_filter( 'detect_object_id_rs' ) ) { // currently not used internally 
			if ( $object_id = apply_filters( 'detect_object_id_rs', 0, $required_cap ) )
				return $object_id;
		}
		
		if ( $this->scoper->cap_defs->member_property( $required_cap, 'is_taxonomy_cap' ) ) {
			if ( ! empty($_REQUEST['tag_ID']) )
				return $_REQUEST['tag_ID'];
		}
		
		global $pagenow;
		if ( in_array( $pagenow, array( 'media-upload.php', 'async-upload.php' ) ) ) {
			if ( ! empty($_POST['post_ID']) )
				return $_POST['post_ID'];
			elseif ( ! empty($_REQUEST['post_id']) )
				return $_REQUEST['post_id'];
			elseif ( ! empty($_REQUEST['attachment_id']) ) {
				if ( $attachment = get_post( $_REQUEST['attachment_id'] ) )
					return $attachment->post_parent;
			}
		}
		
		if ( ! $src_name = $this->scoper->cap_defs->member_property( $required_cap, 'src_name' ) )
			return;
		
		if ( ! empty( $_POST ) ) {
			// special case for comment post ID
			if ( ! empty( $_POST['comment_post_ID'] ) )
				$_POST['post_ID'] = $_POST['comment_post_ID'];
				
			// WP core edit_post function requires edit_published_posts or edit_published_pages cap to save a post to "publish" status, but does not pass a post ID
			// Similar situation with edit_others_posts, publish_posts.
			// So... insert the object ID from POST vars
			if ( 'post' == $src_name ) {
				if ( ! $id = $this->scoper->data_sources->get_from_http_post('id', 'post') ) {
					
					if ( 'async-upload.php' != $GLOBALS['pagenow'] ) {
						if ( $attach_id = $this->scoper->data_sources->get_from_http_post('attachment_id', 'post') ) {
							if ( $attach_id ) {
								global $wpdb;
								$id = scoper_get_var( "SELECT post_parent FROM $wpdb->posts WHERE post_type = 'attachment' AND ID = '$attach_id'" );
								if ( $id > 0 )
									return $id;
							}
						}
					} elseif ( ! $id && ! empty($_POST['id']) ) // in case normal POST variable differs from ajax variable
						$id = $_POST['id'];
				}
			}

			/* on the moderation page, admin-ajax tests for moderate_comments without passing any ID */
			if ( 'moderate_comments' == $required_cap )
				if ( $comment = get_comment( $id ) )
					return $comment->comment_post_ID;
			
			if ( ! empty($id) )
				return $id;
				
			// special case for adding categories
			if ( 'manage_categories' == $required_cap ) {
				if ( ! empty($_POST['newcat_parent']) )
					return $_POST['newcat_parent'];
				elseif ( ! empty($_POST['category_parent']) )
					return $_POST['category_parent'];
			}
			
		} elseif ( defined('XMLRPC_REQUEST') ) {
			if ( ! empty($GLOBALS['xmlrpc_post_id_rs']) )
				return $GLOBALS['xmlrpc_post_id_rs'];
		} else {
			//rs_errlog("checking uri for source $src_name");
			return $this->scoper->data_sources->get_from_uri('id', $src_name);
		}
	}
	
	
	// Some users with term or object roles are now able to view and edit certain 
	// content, if only the unscoped core would let them in the door.  For example, you can't 
	// load edit-pages.php unless current_user_can('edit_pages') blog-wide.
	//
	// This policy is sensible for unscoped users, as it hides stuff they can't have.
	// But it is needlessly oppressive to those who walk according to the law of the scoping. 
	// Subvert the all-or-nothing paradigm by reporting a blog-wide cap if the user has 
	// the capability for any taxonomy.
	//
	// Due to subsequent query filtering, this does not unlock additional content blog-wide.  
	// It merely enables us to run all pertinent content through our gauntlet (rather than having 
	// some contestants disqualified before we arrive at the judging stand).
	//
	// A happy side effect is that, in a fully scoped blog, all non-administrator users can be set
	// to "Subscriber" blogrole so the failure state upon accidental Role Scoper disabling 
	// is overly narrow access, not overly open.
	function user_can_for_any_term($reqd_caps, $user = '') {
		if ( ! is_object($user) ) {
			$user = $GLOBALS['current_rs_user'];
		}
		
		// Instead of just intersecting the missing reqd_caps with termcaps from all term_roles,
		// require each subset of caps with matching src_name, object type and op_type to 
		// all be satisfied by the same role (any assigned term role).  This simulates flt_objects_where behavior (which does so to support role restrictions.
		
		$grant_caps = array();

		$caps_by_otype = $this->scoper->cap_defs->organize_caps_by_otype($reqd_caps);
		
		// temp workaround
		if ( 'manage_categories' == $reqd_caps[0] && isset( $caps_by_otype['post']['link'] ) ) {
			$caps_by_otype['link']['link_category'] = $caps_by_otype['post']['link'];
			unset( $caps_by_otype['post']['link'] );
		}
		
		foreach ( $caps_by_otype as $src_name => $otypes ) {
			$object_types = $this->scoper->data_sources->member_property($src_name, 'object_types');
		
			// deal with upload_files and other capabilities which have no specific object type
			if ( ! array_diff_key( $otypes, array( '' => true ) ) ) {
				foreach( array_keys( $object_types ) as $_object_type )
					$otypes[$_object_type] = $otypes[''];
				
				unset( $otypes[''] );
			}

			$uses_taxonomies = scoper_get_taxonomy_usage( $src_name, array_keys($otypes) );
			
			// this ensures we don't credit term roles on custom taxonomies which have been disabled
			if ( ! $uses_taxonomies = array_intersect( $uses_taxonomies, $this->scoper->taxonomies->get_all_keys() ) )
				continue;

			foreach ( $otypes as $this_otype_caps ) { // keyed by object_type
				$caps_by_op = $this->scoper->cap_defs->organize_caps_by_op( (array) $this_otype_caps);
				
				foreach ( $caps_by_op as $this_op_caps ) { // keyed by op_type
					$roles = $this->scoper->role_defs->qualify_roles($this_op_caps);
					
					foreach ( $uses_taxonomies as $taxonomy ) {
						if ( ! isset($user->term_roles[$taxonomy]) )
							$user->term_roles[$taxonomy] = $user->get_term_roles_daterange($taxonomy);				// call daterange function populate term_roles property - possible perf enhancement for subsequent code even though we don't conider content_date-limited roles here

						if ( array_intersect_key($roles, agp_array_flatten( $user->term_roles[$taxonomy], false ) ) ) {	// okay to include all content date ranges because can_for_any_term checks are only preliminary measures to keep the admin UI open
							$grant_caps = array_merge($grant_caps, $this_op_caps);
							break;
						}
					}
				}
			}
		}	
		
		if ( $grant_caps )
			return array_fill_keys( array_unique($grant_caps), true);
		else
			return array();
	}
	
	// used by flt_user_has_cap prior to failing blogcaps requirement
	// Note that this is not to be called if an object_id was provided to (or detected by) flt_user_has_cap
	// This is primarily a way to ram open a closed gate prior to selectively re-closing it ourself
	function user_can_for_any_object($reqd_caps, $user = '') {
		if ( ! empty( $this->ignore_object_roles ) ) {
			// use this to force cap via blog/term role for Write Menu item
			$this->ignore_object_roles = false;
			return array();
		}

		if ( ! is_object($user) ) {
			$user = $GLOBALS['current_rs_user'];
		}
	
		if ( $roles = $this->scoper->qualify_object_roles( $reqd_caps, '', $user, true ) )  // arg: convert 'edit_others', etc. to equivalent owner base cap
			return array_fill_keys($reqd_caps, true);

		return array();
	}
} // end class Cap_Interceptor_RS

// equivalent to current_user_can, 
// except it supports array of reqd_caps, supports non-current user, and does not support numeric reqd_caps
function _cr_user_can( $reqd_caps, $object_id = 0, $user_id = 0, $meta_flags = array() ) {	
	// $meta_flags currently used for 'skip_revision_allowance', 'skip_any_object_check', 'skip_any_term_check', 'skip_id_generation', 'require_full_object_role'
	// For now, skip array_merge with defaults, for perf
	if ( $user_id )
		$user = new WP_User($user_id);  // don't need Scoped_User because only using allcaps property (which contain WP blogcaps).  flt_user_has_cap will instantiate new WP_Scoped_User based on the user_id we pass
	else
		$user = wp_get_current_user();
	
	if ( empty($user) )
		return false;

	$reqd_caps = (array) $reqd_caps;
	$check_caps = $reqd_caps;
	foreach ( $check_caps as $cap_name ) {
		if ( $meta_caps = map_meta_cap($cap_name, $user->ID, $object_id) ) {
			$reqd_caps = array_diff( $reqd_caps, array($cap_name) );
			$reqd_caps = array_unique( array_merge( $reqd_caps, $meta_caps ) );
		}
	}

	if ( 'blog' === $object_id ) { // legacy API support
		$meta_flags['skip_any_object_check'] = true;
		$meta_flags['skip_any_term_check'] = true;
		$meta_flags['skip_id_generation'] = true;
	} elseif ( ! $object_id ) {
		$meta_flags['skip_id_generation'] = true;	
	}

	if ( $meta_flags ) {
		// handle special case revisionary flag
		if ( ! empty($meta_flags['skip_revision_allowance']) ) {
			if ( defined( 'RVY_VERSION' ) ) {
				global $revisionary;
				$revisionary->skip_revision_allowance = true;	// this will affect the behavior of Role Scoper's user_has_cap filter
			}
			
			unset( $meta_flags['skip_revision_allowance'] );	// no need to set this flag on cap_interceptor
		}
	
		// set temporary flags for use by our user_has_cap filter
		global $cap_interceptor;
		if ( isset($cap_interceptor) ) {
			foreach( $meta_flags as $flag => $value )
				$cap_interceptor->$flag = $value;
		} else
			$meta_flags = array();
	}
	
	$capabilities = apply_filters('user_has_cap', $user->allcaps, $reqd_caps, array( $reqd_caps, $user->ID, $object_id ) );

	if ( $meta_flags ) {
		// clear temporary flags
		foreach( $meta_flags as $flag => $value )
			$cap_interceptor->$flag = false;
	}
	
	if ( ! empty($revisionary) )
		$revisionary->skip_revision_allowance = false;

	foreach ( $reqd_caps as $cap_name ) {
		if( empty($capabilities[$cap_name]) || ! $capabilities[$cap_name] ) {
			// if we're about to fail due to a missing create_child_pages cap, honor edit_pages cap as equivalent
			// TODO: abstract this with cap_defs property
			if ( 'create_child_pages' == $cap_name ) {
				$alternate_cap_name = 'edit_pages';
				$_args = array( array($alternate_cap_name), $user->ID, $object_id );
				$capabilities = apply_filters('user_has_cap', $user->allcaps, array($alternate_cap_name), $_args);
				
				if ( empty($capabilities[$alternate_cap_name]) || ! $capabilities[$alternate_cap_name] )
					return false;
			} else
				return false;
		}
	}

	return true;
}


?>