@@ -27,7 +27,7 @@ |
||
27 | 27 | public function initializeArguments() |
28 | 28 | { |
29 | 29 | parent::initializeArguments(); |
30 | - $this->registerArgument('inlineCode', 'string', 'Inline JavaScript', true); |
|
30 | + $this->registerArgument('inlineCode', 'string', 'Inline JavaScript', TRUE); |
|
31 | 31 | } |
32 | 32 | |
33 | 33 | /** |
@@ -70,7 +70,7 @@ discard block |
||
70 | 70 | // Load current document. |
71 | 71 | $this->loadDocument($this->requestData); |
72 | 72 | if ( |
73 | - $this->document === null |
|
73 | + $this->document === NULL |
|
74 | 74 | || $this->document->getDoc()->numPages < 1 |
75 | 75 | ) { |
76 | 76 | // Quit without doing anything if required variables are not set. |
@@ -133,7 +133,7 @@ discard block |
||
133 | 133 | // Configure @action URL for form. |
134 | 134 | $uri = $this->uriBuilder->reset() |
135 | 135 | ->setTargetPageUid($GLOBALS['TSFE']->id) |
136 | - ->setCreateAbsoluteUri(!empty($this->settings['forceAbsoluteUrl']) ? true : false) |
|
136 | + ->setCreateAbsoluteUri(!empty($this->settings['forceAbsoluteUrl']) ? TRUE : FALSE) |
|
137 | 137 | ->setArguments([ |
138 | 138 | 'eID' => 'tx_dlf_pageview_proxy', |
139 | 139 | 'url' => $fulltext['url'], |
@@ -197,7 +197,7 @@ discard block |
||
197 | 197 | if ($iiif instanceof ManifestInterface) { |
198 | 198 | $canvas = $iiif->getContainedResourceById($canvasId); |
199 | 199 | /* @var $canvas \Ubl\Iiif\Presentation\Common\Model\Resources\CanvasInterface */ |
200 | - if ($canvas != null && !empty($canvas->getPossibleTextAnnotationContainers(Motivation::PAINTING))) { |
|
200 | + if ($canvas != NULL && !empty($canvas->getPossibleTextAnnotationContainers(Motivation::PAINTING))) { |
|
201 | 201 | $annotationContainers = []; |
202 | 202 | /* |
203 | 203 | * TODO Analyzing the annotations on the server side requires loading the annotation lists / pages |
@@ -207,11 +207,11 @@ discard block |
||
207 | 207 | * On the other hand, server connections are potentially better than client connections. Downloading annotation lists |
208 | 208 | */ |
209 | 209 | foreach ($canvas->getPossibleTextAnnotationContainers(Motivation::PAINTING) as $annotationContainer) { |
210 | - if (($textAnnotations = $annotationContainer->getTextAnnotations(Motivation::PAINTING)) != null) { |
|
210 | + if (($textAnnotations = $annotationContainer->getTextAnnotations(Motivation::PAINTING)) != NULL) { |
|
211 | 211 | foreach ($textAnnotations as $annotation) { |
212 | 212 | if ( |
213 | 213 | $annotation->getBody()->getFormat() == 'text/plain' |
214 | - && $annotation->getBody()->getChars() != null |
|
214 | + && $annotation->getBody()->getChars() != NULL |
|
215 | 215 | ) { |
216 | 216 | $annotationListData = []; |
217 | 217 | $annotationListData['uri'] = $annotationContainer->getId(); |
@@ -259,7 +259,7 @@ discard block |
||
259 | 259 | // Configure @action URL for form. |
260 | 260 | $uri = $this->uriBuilder->reset() |
261 | 261 | ->setTargetPageUid($GLOBALS['TSFE']->id) |
262 | - ->setCreateAbsoluteUri(!empty($this->settings['forceAbsoluteUrl']) ? true : false) |
|
262 | + ->setCreateAbsoluteUri(!empty($this->settings['forceAbsoluteUrl']) ? TRUE : FALSE) |
|
263 | 263 | ->setArguments([ |
264 | 264 | 'eID' => 'tx_dlf_pageview_proxy', |
265 | 265 | 'url' => $image['url'], |
@@ -80,7 +80,7 @@ discard block |
||
80 | 80 | * |
81 | 81 | * @return \TYPO3\CMS\Core\Messaging\FlashMessageQueue The queue the message was added to |
82 | 82 | */ |
83 | - public static function addMessage($message, $title, $severity, $session = false, $queue = 'kitodo.default.flashMessages') |
|
83 | + public static function addMessage($message, $title, $severity, $session = FALSE, $queue = 'kitodo.default.flashMessages') |
|
84 | 84 | { |
85 | 85 | $flashMessageService = GeneralUtility::makeInstance(\TYPO3\CMS\Core\Messaging\FlashMessageService::class); |
86 | 86 | $flashMessageQueue = $flashMessageService->getMessageQueueByIdentifier($queue); |
@@ -122,9 +122,9 @@ discard block |
||
122 | 122 | $checksum = 'X'; |
123 | 123 | } |
124 | 124 | if (!preg_match('/[0-9]{8}[0-9X]{1}/i', $id)) { |
125 | - return false; |
|
125 | + return FALSE; |
|
126 | 126 | } elseif (strtoupper(substr($id, -1, 1)) != $checksum) { |
127 | - return false; |
|
127 | + return FALSE; |
|
128 | 128 | } |
129 | 129 | break; |
130 | 130 | case 'ZDB': |
@@ -132,19 +132,19 @@ discard block |
||
132 | 132 | $checksum = 'X'; |
133 | 133 | } |
134 | 134 | if (!preg_match('/[0-9]{8}-[0-9X]{1}/i', $id)) { |
135 | - return false; |
|
135 | + return FALSE; |
|
136 | 136 | } elseif (strtoupper(substr($id, -1, 1)) != $checksum) { |
137 | - return false; |
|
137 | + return FALSE; |
|
138 | 138 | } |
139 | 139 | break; |
140 | 140 | case 'SWD': |
141 | 141 | $checksum = 11 - $checksum; |
142 | 142 | if (!preg_match('/[0-9]{8}-[0-9]{1}/i', $id)) { |
143 | - return false; |
|
143 | + return FALSE; |
|
144 | 144 | } elseif ($checksum == 10) { |
145 | 145 | return self::checkIdentifier(($digits + 1) . substr($id, -2, 2), 'SWD'); |
146 | 146 | } elseif (substr($id, -1, 1) != $checksum) { |
147 | - return false; |
|
147 | + return FALSE; |
|
148 | 148 | } |
149 | 149 | break; |
150 | 150 | case 'GKD': |
@@ -153,13 +153,13 @@ discard block |
||
153 | 153 | $checksum = 'X'; |
154 | 154 | } |
155 | 155 | if (!preg_match('/[0-9]{8}-[0-9X]{1}/i', $id)) { |
156 | - return false; |
|
156 | + return FALSE; |
|
157 | 157 | } elseif (strtoupper(substr($id, -1, 1)) != $checksum) { |
158 | - return false; |
|
158 | + return FALSE; |
|
159 | 159 | } |
160 | 160 | break; |
161 | 161 | } |
162 | - return true; |
|
162 | + return TRUE; |
|
163 | 163 | } |
164 | 164 | |
165 | 165 | /** |
@@ -174,28 +174,28 @@ discard block |
||
174 | 174 | public static function decrypt($encrypted) |
175 | 175 | { |
176 | 176 | if ( |
177 | - !in_array(self::$cipherAlgorithm, openssl_get_cipher_methods(true)) |
|
178 | - || !in_array(self::$hashAlgorithm, openssl_get_md_methods(true)) |
|
177 | + !in_array(self::$cipherAlgorithm, openssl_get_cipher_methods(TRUE)) |
|
178 | + || !in_array(self::$hashAlgorithm, openssl_get_md_methods(TRUE)) |
|
179 | 179 | ) { |
180 | 180 | self::log('OpenSSL library doesn\'t support cipher and/or hash algorithm', LOG_SEVERITY_ERROR); |
181 | - return false; |
|
181 | + return FALSE; |
|
182 | 182 | } |
183 | 183 | if (empty($GLOBALS['TYPO3_CONF_VARS']['SYS']['encryptionKey'])) { |
184 | 184 | self::log('No encryption key set in TYPO3 configuration', LOG_SEVERITY_ERROR); |
185 | - return false; |
|
185 | + return FALSE; |
|
186 | 186 | } |
187 | 187 | if ( |
188 | 188 | empty($encrypted) |
189 | 189 | || strlen($encrypted) < openssl_cipher_iv_length(self::$cipherAlgorithm) |
190 | 190 | ) { |
191 | 191 | self::log('Invalid parameters given for decryption', LOG_SEVERITY_ERROR); |
192 | - return false; |
|
192 | + return FALSE; |
|
193 | 193 | } |
194 | 194 | // Split initialisation vector and encrypted data. |
195 | 195 | $binary = base64_decode($encrypted); |
196 | 196 | $iv = substr($binary, 0, openssl_cipher_iv_length(self::$cipherAlgorithm)); |
197 | 197 | $data = substr($binary, openssl_cipher_iv_length(self::$cipherAlgorithm)); |
198 | - $key = openssl_digest($GLOBALS['TYPO3_CONF_VARS']['SYS']['encryptionKey'], self::$hashAlgorithm, true); |
|
198 | + $key = openssl_digest($GLOBALS['TYPO3_CONF_VARS']['SYS']['encryptionKey'], self::$hashAlgorithm, TRUE); |
|
199 | 199 | // Decrypt data. |
200 | 200 | $decrypted = openssl_decrypt($data, self::$cipherAlgorithm, $key, OPENSSL_RAW_DATA, $iv); |
201 | 201 | return $decrypted; |
@@ -216,13 +216,13 @@ discard block |
||
216 | 216 | // Don't make simplexml_load_string throw (when $content is an array |
217 | 217 | // or object) |
218 | 218 | if (!is_string($content)) { |
219 | - return false; |
|
219 | + return FALSE; |
|
220 | 220 | } |
221 | 221 | |
222 | 222 | // Turn off libxml's error logging. |
223 | - $libxmlErrors = libxml_use_internal_errors(true); |
|
223 | + $libxmlErrors = libxml_use_internal_errors(TRUE); |
|
224 | 224 | // Disables the functionality to allow external entities to be loaded when parsing the XML, must be kept |
225 | - $previousValueOfEntityLoader = libxml_disable_entity_loader(true); |
|
225 | + $previousValueOfEntityLoader = libxml_disable_entity_loader(TRUE); |
|
226 | 226 | // Try to load XML from file. |
227 | 227 | $xml = simplexml_load_string($content); |
228 | 228 | // reset entity loader setting |
@@ -276,9 +276,9 @@ discard block |
||
276 | 276 | */ |
277 | 277 | public static function digest($string) |
278 | 278 | { |
279 | - if (!in_array(self::$hashAlgorithm, openssl_get_md_methods(true))) { |
|
279 | + if (!in_array(self::$hashAlgorithm, openssl_get_md_methods(TRUE))) { |
|
280 | 280 | self::log('OpenSSL library doesn\'t support hash algorithm', LOG_SEVERITY_ERROR); |
281 | - return false; |
|
281 | + return FALSE; |
|
282 | 282 | } |
283 | 283 | // Hash string. |
284 | 284 | $hashed = openssl_digest($string, self::$hashAlgorithm); |
@@ -297,23 +297,23 @@ discard block |
||
297 | 297 | public static function encrypt($string) |
298 | 298 | { |
299 | 299 | if ( |
300 | - !in_array(self::$cipherAlgorithm, openssl_get_cipher_methods(true)) |
|
301 | - || !in_array(self::$hashAlgorithm, openssl_get_md_methods(true)) |
|
300 | + !in_array(self::$cipherAlgorithm, openssl_get_cipher_methods(TRUE)) |
|
301 | + || !in_array(self::$hashAlgorithm, openssl_get_md_methods(TRUE)) |
|
302 | 302 | ) { |
303 | 303 | self::log('OpenSSL library doesn\'t support cipher and/or hash algorithm', LOG_SEVERITY_ERROR); |
304 | - return false; |
|
304 | + return FALSE; |
|
305 | 305 | } |
306 | 306 | if (empty($GLOBALS['TYPO3_CONF_VARS']['SYS']['encryptionKey'])) { |
307 | 307 | self::log('No encryption key set in TYPO3 configuration', LOG_SEVERITY_ERROR); |
308 | - return false; |
|
308 | + return FALSE; |
|
309 | 309 | } |
310 | 310 | // Generate random initialisation vector. |
311 | 311 | $iv = openssl_random_pseudo_bytes(openssl_cipher_iv_length(self::$cipherAlgorithm)); |
312 | - $key = openssl_digest($GLOBALS['TYPO3_CONF_VARS']['SYS']['encryptionKey'], self::$hashAlgorithm, true); |
|
312 | + $key = openssl_digest($GLOBALS['TYPO3_CONF_VARS']['SYS']['encryptionKey'], self::$hashAlgorithm, TRUE); |
|
313 | 313 | // Encrypt data. |
314 | 314 | $encrypted = openssl_encrypt($string, self::$cipherAlgorithm, $key, OPENSSL_RAW_DATA, $iv); |
315 | 315 | // Merge initialisation vector and encrypted data. |
316 | - if ($encrypted !== false) { |
|
316 | + if ($encrypted !== FALSE) { |
|
317 | 317 | $encrypted = base64_encode($iv . $encrypted); |
318 | 318 | } |
319 | 319 | return $encrypted; |
@@ -458,7 +458,7 @@ discard block |
||
458 | 458 | $lang = $languageService->getLLL($isoCode, $iso639); |
459 | 459 | } |
460 | 460 | } elseif (\TYPO3_MODE === 'BE') { |
461 | - $iso639 = $languageService->includeLLFile($file, false, true); |
|
461 | + $iso639 = $languageService->includeLLFile($file, FALSE, TRUE); |
|
462 | 462 | if (!empty($iso639['default'][$isoCode])) { |
463 | 463 | $lang = $languageService->getLLL($isoCode, $iso639); |
464 | 464 | } |
@@ -605,7 +605,7 @@ discard block |
||
605 | 605 | public static function isValidHttpUrl($url) |
606 | 606 | { |
607 | 607 | if (!GeneralUtility::isValidUrl($url)) { |
608 | - return false; |
|
608 | + return FALSE; |
|
609 | 609 | } |
610 | 610 | |
611 | 611 | $parsed = parse_url($url); |
@@ -629,7 +629,7 @@ discard block |
||
629 | 629 | * |
630 | 630 | * @return array Merged array |
631 | 631 | */ |
632 | - public static function mergeRecursiveWithOverrule(array $original, array $overrule, $addKeys = true, $includeEmptyValues = true, $enableUnsetFeature = true) |
|
632 | + public static function mergeRecursiveWithOverrule(array $original, array $overrule, $addKeys = TRUE, $includeEmptyValues = TRUE, $enableUnsetFeature = TRUE) |
|
633 | 633 | { |
634 | 634 | \TYPO3\CMS\Core\Utility\ArrayUtility::mergeRecursiveWithOverrule($original, $overrule, $addKeys, $includeEmptyValues, $enableUnsetFeature); |
635 | 635 | return $original; |
@@ -701,7 +701,7 @@ discard block |
||
701 | 701 | ->where( |
702 | 702 | $queryBuilder->expr()->eq($table . '.pid', $pid), |
703 | 703 | $queryBuilder->expr()->eq($table . '.index_name', $queryBuilder->expr()->literal($index_name)), |
704 | - self::whereExpression($table, true) |
|
704 | + self::whereExpression($table, TRUE) |
|
705 | 705 | ) |
706 | 706 | ->setMaxResults(1) |
707 | 707 | ->execute(); |
@@ -719,7 +719,7 @@ discard block |
||
719 | 719 | $queryBuilder->expr()->eq($table . '.pid', $pid), |
720 | 720 | $queryBuilder->expr()->eq($table . '.uid', $resArray['l18n_parent']), |
721 | 721 | $queryBuilder->expr()->eq($table . '.sys_language_uid', intval($languageAspect->getContentId())), |
722 | - self::whereExpression($table, true) |
|
722 | + self::whereExpression($table, TRUE) |
|
723 | 723 | ) |
724 | 724 | ->setMaxResults(1) |
725 | 725 | ->execute(); |
@@ -754,7 +754,7 @@ discard block |
||
754 | 754 | ->where( |
755 | 755 | $queryBuilder->expr()->eq($table . '.pid', $pid), |
756 | 756 | $additionalWhere, |
757 | - self::whereExpression($table, true) |
|
757 | + self::whereExpression($table, TRUE) |
|
758 | 758 | ) |
759 | 759 | ->setMaxResults(10000) |
760 | 760 | ->execute(); |
@@ -794,7 +794,7 @@ discard block |
||
794 | 794 | * |
795 | 795 | * @return string Additional WHERE expression |
796 | 796 | */ |
797 | - public static function whereExpression($table, $showHidden = false) |
|
797 | + public static function whereExpression($table, $showHidden = FALSE) |
|
798 | 798 | { |
799 | 799 | if (\TYPO3_MODE === 'FE') { |
800 | 800 | // Should we ignore the record's hidden flag? |
@@ -863,13 +863,13 @@ discard block |
||
863 | 863 | $frameworkConfiguration = $configurationManager->getConfiguration(\TYPO3\CMS\Extbase\Configuration\ConfigurationManagerInterface::CONFIGURATION_TYPE_FRAMEWORK); |
864 | 864 | |
865 | 865 | $extbaseClassmap = &$frameworkConfiguration['persistence']['classes']; |
866 | - if ($extbaseClassmap === null) { |
|
866 | + if ($extbaseClassmap === NULL) { |
|
867 | 867 | $extbaseClassmap = []; |
868 | 868 | } |
869 | 869 | |
870 | 870 | foreach ($classes as $className => $classConfig) { |
871 | 871 | $extbaseClass = &$extbaseClassmap[$className]; |
872 | - if ($extbaseClass === null) { |
|
872 | + if ($extbaseClass === NULL) { |
|
873 | 873 | $extbaseClass = []; |
874 | 874 | } |
875 | 875 | if (!isset($extbaseClass['mapping'])) { |
@@ -895,7 +895,7 @@ discard block |
||
895 | 895 | public static function getUrl(string $url) |
896 | 896 | { |
897 | 897 | if (!Helper::isValidHttpUrl($url)) { |
898 | - return false; |
|
898 | + return FALSE; |
|
899 | 899 | } |
900 | 900 | |
901 | 901 | // Get extension configuration. |
@@ -66,7 +66,7 @@ discard block |
||
66 | 66 | * @var bool |
67 | 67 | * @access protected |
68 | 68 | */ |
69 | - protected static $fieldsLoaded = false; |
|
69 | + protected static $fieldsLoaded = FALSE; |
|
70 | 70 | |
71 | 71 | /** |
72 | 72 | * List of already processed documents |
@@ -96,9 +96,9 @@ discard block |
||
96 | 96 | public static function add(Document $document) |
97 | 97 | { |
98 | 98 | if (in_array($document->getUid(), self::$processedDocs)) { |
99 | - return true; |
|
99 | + return TRUE; |
|
100 | 100 | } elseif (self::solrConnect($document->getSolrcore(), $document->getPid())) { |
101 | - $success = true; |
|
101 | + $success = TRUE; |
|
102 | 102 | Helper::getLanguageService()->includeLLFile('EXT:dlf/Resources/Private/Language/locallang_be.xlf'); |
103 | 103 | // Handle multi-volume documents. |
104 | 104 | if ($parentId = $document->getPartof()) { |
@@ -110,13 +110,13 @@ discard block |
||
110 | 110 | $parent = $documentRepository->findByUid($parentId); |
111 | 111 | if ($parent) { |
112 | 112 | // get XML document of parent |
113 | - $doc = Doc::getInstance($parent->getLocation(), ['storagePid' => $parent->getPid()], true); |
|
114 | - if ($doc !== null) { |
|
113 | + $doc = Doc::getInstance($parent->getLocation(), ['storagePid' => $parent->getPid()], TRUE); |
|
114 | + if ($doc !== NULL) { |
|
115 | 115 | $parent->setDoc($doc); |
116 | 116 | $success = self::add($parent); |
117 | 117 | } else { |
118 | 118 | Helper::log('Could not load parent document with UID ' . $document->getDoc()->parentId, LOG_SEVERITY_ERROR); |
119 | - return false; |
|
119 | + return FALSE; |
|
120 | 120 | } |
121 | 121 | } |
122 | 122 | } |
@@ -157,7 +157,7 @@ discard block |
||
157 | 157 | sprintf(Helper::getLanguageService()->getLL('flash.documentIndexed'), $document->getTitle(), $document->getUid()), |
158 | 158 | Helper::getLanguageService()->getLL('flash.done'), |
159 | 159 | FlashMessage::OK, |
160 | - true, |
|
160 | + TRUE, |
|
161 | 161 | 'core.template.flashMessages' |
162 | 162 | ); |
163 | 163 | } else { |
@@ -165,7 +165,7 @@ discard block |
||
165 | 165 | sprintf(Helper::getLanguageService()->getLL('flash.documentNotIndexed'), $document->getTitle(), $document->getUid()), |
166 | 166 | Helper::getLanguageService()->getLL('flash.error'), |
167 | 167 | FlashMessage::ERROR, |
168 | - true, |
|
168 | + TRUE, |
|
169 | 169 | 'core.template.flashMessages' |
170 | 170 | ); |
171 | 171 | } |
@@ -177,12 +177,12 @@ discard block |
||
177 | 177 | Helper::getLanguageService()->getLL('flash.solrException') . ' ' . htmlspecialchars($e->getMessage()), |
178 | 178 | Helper::getLanguageService()->getLL('flash.error'), |
179 | 179 | FlashMessage::ERROR, |
180 | - true, |
|
180 | + TRUE, |
|
181 | 181 | 'core.template.flashMessages' |
182 | 182 | ); |
183 | 183 | } |
184 | 184 | Helper::log('Apache Solr threw exception: "' . $e->getMessage() . '"', LOG_SEVERITY_ERROR); |
185 | - return false; |
|
185 | + return FALSE; |
|
186 | 186 | } |
187 | 187 | } else { |
188 | 188 | if (!(\TYPO3_REQUESTTYPE & \TYPO3_REQUESTTYPE_CLI)) { |
@@ -190,12 +190,12 @@ discard block |
||
190 | 190 | Helper::getLanguageService()->getLL('flash.solrNoConnection'), |
191 | 191 | Helper::getLanguageService()->getLL('flash.warning'), |
192 | 192 | FlashMessage::WARNING, |
193 | - true, |
|
193 | + TRUE, |
|
194 | 194 | 'core.template.flashMessages' |
195 | 195 | ); |
196 | 196 | } |
197 | 197 | Helper::log('Could not connect to Apache Solr server', LOG_SEVERITY_ERROR); |
198 | - return false; |
|
198 | + return FALSE; |
|
199 | 199 | } |
200 | 200 | } |
201 | 201 | |
@@ -290,10 +290,10 @@ discard block |
||
290 | 290 | if ($indexing['index_boost'] > 0.0) { |
291 | 291 | self::$fields['fieldboost'][$indexing['index_name']] = floatval($indexing['index_boost']); |
292 | 292 | } else { |
293 | - self::$fields['fieldboost'][$indexing['index_name']] = false; |
|
293 | + self::$fields['fieldboost'][$indexing['index_name']] = FALSE; |
|
294 | 294 | } |
295 | 295 | } |
296 | - self::$fieldsLoaded = true; |
|
296 | + self::$fieldsLoaded = TRUE; |
|
297 | 297 | } |
298 | 298 | } |
299 | 299 | |
@@ -309,7 +309,7 @@ discard block |
||
309 | 309 | */ |
310 | 310 | protected static function processLogical(Document $document, array $logicalUnit) |
311 | 311 | { |
312 | - $success = true; |
|
312 | + $success = TRUE; |
|
313 | 313 | $doc = $document->getDoc(); |
314 | 314 | $doc->cPid = $document->getPid(); |
315 | 315 | // Get metadata for logical unit. |
@@ -333,7 +333,7 @@ discard block |
||
333 | 333 | $solrDoc->setField('thumbnail', $doc->getFileLocation($logicalUnit['thumbnailId'])); |
334 | 334 | } |
335 | 335 | // There can be only one toplevel unit per UID, independently of backend configuration |
336 | - $solrDoc->setField('toplevel', $logicalUnit['id'] == $doc->toplevelId ? true : false); |
|
336 | + $solrDoc->setField('toplevel', $logicalUnit['id'] == $doc->toplevelId ? TRUE : FALSE); |
|
337 | 337 | $solrDoc->setField('title', $metadata['title'][0], self::$fields['fieldboost']['title']); |
338 | 338 | $solrDoc->setField('volume', $metadata['volume'][0], self::$fields['fieldboost']['volume']); |
339 | 339 | $solrDoc->setField('record_id', $metadata['record_id'][0]); |
@@ -388,12 +388,12 @@ discard block |
||
388 | 388 | Helper::getLanguageService()->getLL('flash.solrException') . '<br />' . htmlspecialchars($e->getMessage()), |
389 | 389 | Helper::getLanguageService()->getLL('flash.error'), |
390 | 390 | FlashMessage::ERROR, |
391 | - true, |
|
391 | + TRUE, |
|
392 | 392 | 'core.template.flashMessages' |
393 | 393 | ); |
394 | 394 | } |
395 | 395 | Helper::log('Apache Solr threw exception: "' . $e->getMessage() . '"', LOG_SEVERITY_ERROR); |
396 | - return false; |
|
396 | + return FALSE; |
|
397 | 397 | } |
398 | 398 | } |
399 | 399 | // Check for child elements... |
@@ -439,7 +439,7 @@ discard block |
||
439 | 439 | break; |
440 | 440 | } |
441 | 441 | } |
442 | - $solrDoc->setField('toplevel', false); |
|
442 | + $solrDoc->setField('toplevel', FALSE); |
|
443 | 443 | $solrDoc->setField('type', $physicalUnit['type'], self::$fields['fieldboost']['type']); |
444 | 444 | $solrDoc->setField('collection', $doc->metadataArray[$doc->toplevelId]['collection']); |
445 | 445 | |
@@ -479,15 +479,15 @@ discard block |
||
479 | 479 | Helper::getLanguageService()->getLL('flash.solrException') . '<br />' . htmlspecialchars($e->getMessage()), |
480 | 480 | Helper::getLanguageService()->getLL('flash.error'), |
481 | 481 | FlashMessage::ERROR, |
482 | - true, |
|
482 | + TRUE, |
|
483 | 483 | 'core.template.flashMessages' |
484 | 484 | ); |
485 | 485 | } |
486 | 486 | Helper::log('Apache Solr threw exception: "' . $e->getMessage() . '"', LOG_SEVERITY_ERROR); |
487 | - return false; |
|
487 | + return FALSE; |
|
488 | 488 | } |
489 | 489 | } |
490 | - return true; |
|
490 | + return TRUE; |
|
491 | 491 | } |
492 | 492 | |
493 | 493 | /** |
@@ -513,10 +513,10 @@ discard block |
||
513 | 513 | self::loadIndexConf($pid); |
514 | 514 | } |
515 | 515 | } else { |
516 | - return false; |
|
516 | + return FALSE; |
|
517 | 517 | } |
518 | 518 | } |
519 | - return true; |
|
519 | + return TRUE; |
|
520 | 520 | } |
521 | 521 | |
522 | 522 | /** |
@@ -10,7 +10,7 @@ discard block |
||
10 | 10 | public function assertInvalidXml($xml) |
11 | 11 | { |
12 | 12 | $result = Helper::getXmlFileAsString($xml); |
13 | - $this->assertEquals(false, $result); |
|
13 | + $this->assertEquals(FALSE, $result); |
|
14 | 14 | } |
15 | 15 | |
16 | 16 | /** |
@@ -19,8 +19,8 @@ discard block |
||
19 | 19 | */ |
20 | 20 | public function invalidXmlYieldsFalse(): void |
21 | 21 | { |
22 | - $this->assertInvalidXml(false); |
|
23 | - $this->assertInvalidXml(null); |
|
22 | + $this->assertInvalidXml(FALSE); |
|
23 | + $this->assertInvalidXml(NULL); |
|
24 | 24 | $this->assertInvalidXml(1); |
25 | 25 | $this->assertInvalidXml([]); |
26 | 26 | $this->assertInvalidXml(new \stdClass()); |
@@ -40,7 +40,7 @@ discard block |
||
40 | 40 | <root> |
41 | 41 | <single /> |
42 | 42 | </root> |
43 | -XML; |
|
43 | +xml; |
|
44 | 44 | $node = Helper::getXmlFileAsString($xml); |
45 | 45 | $this->assertIsObject($node); |
46 | 46 | $this->assertEquals('root', $node->getName()); |
@@ -16,10 +16,10 @@ |
||
16 | 16 | |
17 | 17 | if (!empty($matches)) { |
18 | 18 | $root = realpath($_SERVER['DOCUMENT_ROOT'] . $matches[0]); |
19 | - if ($root !== false) { |
|
19 | + if ($root !== FALSE) { |
|
20 | 20 | putenv('TYPO3_PATH_ROOT=' . $root); |
21 | 21 | putenv('TYPO3_PATH_APP=' . $root); |
22 | 22 | } |
23 | 23 | } |
24 | 24 | |
25 | -return false; |
|
25 | +return FALSE; |
@@ -48,7 +48,7 @@ discard block |
||
48 | 48 | * |
49 | 49 | * @var bool |
50 | 50 | */ |
51 | - protected $disableJsonWrappedResponse = false; |
|
51 | + protected $disableJsonWrappedResponse = FALSE; |
|
52 | 52 | |
53 | 53 | /** @var ObjectManager */ |
54 | 54 | protected $objectManager; |
@@ -85,7 +85,7 @@ discard block |
||
85 | 85 | $this->baseUrl = 'http://web:8000/public/typo3temp/var/tests/functional-' . $this->identifier . '/'; |
86 | 86 | $this->httpClient = new HttpClient([ |
87 | 87 | 'base_uri' => $this->baseUrl, |
88 | - 'http_errors' => false, |
|
88 | + 'http_errors' => FALSE, |
|
89 | 89 | ]); |
90 | 90 | |
91 | 91 | $this->addSiteConfig('dlf-testing', $this->baseUrl); |
@@ -131,7 +131,7 @@ discard block |
||
131 | 131 | $siteConfig['languages'][0]['base'] = $baseUrl; |
132 | 132 | |
133 | 133 | $siteConfigPath = $this->instancePath . '/typo3conf/sites/' . $identifier; |
134 | - @mkdir($siteConfigPath, 0775, true); |
|
134 | + @mkdir($siteConfigPath, 0775, TRUE); |
|
135 | 135 | file_put_contents($siteConfigPath . '/config.yaml', Yaml::dump($siteConfig)); |
136 | 136 | } |
137 | 137 |
@@ -8,12 +8,12 @@ |
||
8 | 8 | |
9 | 9 | class PageViewProxyTest extends FunctionalTestCase |
10 | 10 | { |
11 | - protected $disableJsonWrappedResponse = true; |
|
11 | + protected $disableJsonWrappedResponse = TRUE; |
|
12 | 12 | |
13 | 13 | protected function getDlfConfiguration() |
14 | 14 | { |
15 | 15 | return array_merge(parent::getDlfConfiguration(), [ |
16 | - 'enableInternalProxy' => true, |
|
16 | + 'enableInternalProxy' => TRUE, |
|
17 | 17 | ]); |
18 | 18 | } |
19 | 19 |
@@ -7,7 +7,7 @@ |
||
7 | 7 | |
8 | 8 | class PageViewProxyDisabledTest extends FunctionalTestCase |
9 | 9 | { |
10 | - protected $disableJsonWrappedResponse = true; |
|
10 | + protected $disableJsonWrappedResponse = TRUE; |
|
11 | 11 | |
12 | 12 | protected function queryProxy(array $query, string $method = 'GET') |
13 | 13 | { |