Voting starts in March for the Drupal Association Board election.
Set role-based permission settings for blog, taxonomy, aggregator, and main site's RSS feeds. This module does not disable RSS feeds altogether: RSS feeds created through the Views module and others not listed here do not have associated permissions.
RSS permissions module lets you disable some or all RSS feeds based on different user roles, and was created as a stopgap solution for.
This module adds role-based permission settings to blog, taxonomy, aggregator, and main site's RSS feeds. To request other feeds be disabled through permissions (as long as they are not through Views), open an issue.
Permission settings currently available are:
access site RSS feed
Main site RSS feed, which can be found at rss.xml
access taxonomy RSS feeds
Taxonomy RSS feeds, which can be found at taxonomy/term/%/%/feed, if Taxonomy module is enabled. This applies to all taxonomy feeds. You cannot set permissions for individual category feeds.
access user blog RSS feeds
Individual user RSS feeds, which can be found at blog/%/feed, if Blog module is enabled. This applies to all user blogs. You cannot set permissions for individual blog feeds.
access main blog RSS feed
Main blog RSS feed, which can be found at blog/feed, if Blog module is enabled.
access aggregator RSS feeds
All aggregator feeds, if Aggregator module is enabled. These can be found at aggregator/rss, aggregator/opml, and aggregator/rss/%.
There will be no Drupal 8 version of this module since all RSS feeds are taken care of Views (which is in Drupal 8 core) and all views have permissions associated with them.
See the comment at.
- Maintenance status: Actively maintained
- Development status: Under active development
- Module categories: Syndication, User Access & Authentication
- Reported installs: 3,049 sites currently report using this module. View usage statistics.
- Downloads: 14,407
- Last modified: February 6, 2015
- This project is not covered by the security advisory policy.
It may have publicly disclosed vulnerabilities. Use at your own risk!