Voting starts in March for the Drupal Association Board election.
The userlink module allows users to save and share links (bookmarks, URLs).
To access the full potential of the userlink module, we recommend using the functionality offered by freetagging, and the contributed module tagadelic.
Userlinks are fully themeable, and the module comes with a css file that defines the necessary values to theme your links. To use the css file, paste it into your existing theme, and modify it as needed.
Userlink comes with a series of userlink-related blocks: view all links, view all link categories, view popular link categories, recent links, my links, my link categories, and the link menu. There is some overlap here, but it provides the end user with more choices. Enable the ones you want, and ignore the rest.
To install the userlink module:
- navigate to administer --> modules, and enable the userlink module. The database table will be created for you.
- navigate to administer --> access control, and assign rights to userlinks.
- navigate to administer --> categories, and add a vocabulary with the following recommended settings:
- For name, description, and help text, put in the values that work best for you -- these settings aren't particularly critical
- For type, check "userlink"
- For hierarchy, select "single"
- Select "free tagging", "multiple select", and "required"
There's a comparison of links page modules that may help you decide which one to use for your project. Please feel free to contribute to one or more of the projects and brainstorm ways to bring these things together to decrease duplication of effort.
The userlink module was developed by FunnyMonkey.
- Maintenance status: Minimally maintained
- Development status: Maintenance fixes only
- Module categories: Community, Utility
- Reported installs: 4 sites currently report using this module. View usage statistics.
- Downloads: 3,598
- Last modified: December 2, 2014
- This project is not covered by the security advisory policy.
It may have publicly disclosed vulnerabilities. Use at your own risk!