@@ -316,7 +316,7 @@ discard block |
||
316 | 316 | */ |
317 | 317 | public function getBitValue(string $permission_name, int $bit_n): int |
318 | 318 | { |
319 | - if (! $this->isValidPermissionName($permission_name)) { |
|
319 | + if (!$this->isValidPermissionName($permission_name)) { |
|
320 | 320 | throw new InvalidArgumentException(sprintf('No permission with the name "%s" is existing!', $permission_name)); |
321 | 321 | } |
322 | 322 | |
@@ -386,7 +386,7 @@ discard block |
||
386 | 386 | */ |
387 | 387 | public function setBitValue(string $permission_name, int $bit_n, int $new_value): self |
388 | 388 | { |
389 | - if (! $this->isValidPermissionName($permission_name)) { |
|
389 | + if (!$this->isValidPermissionName($permission_name)) { |
|
390 | 390 | throw new InvalidArgumentException('No permission with the given name is existing!'); |
391 | 391 | } |
392 | 392 | |
@@ -405,7 +405,7 @@ discard block |
||
405 | 405 | */ |
406 | 406 | public function getRawPermissionValue(string $permission_name): int |
407 | 407 | { |
408 | - if (! $this->isValidPermissionName($permission_name)) { |
|
408 | + if (!$this->isValidPermissionName($permission_name)) { |
|
409 | 409 | throw new InvalidArgumentException('No permission with the given name is existing!'); |
410 | 410 | } |
411 | 411 | |
@@ -422,7 +422,7 @@ discard block |
||
422 | 422 | */ |
423 | 423 | public function setRawPermissionValue(string $permission_name, int $value): self |
424 | 424 | { |
425 | - if (! $this->isValidPermissionName($permission_name)) { |
|
425 | + if (!$this->isValidPermissionName($permission_name)) { |
|
426 | 426 | throw new InvalidArgumentException(sprintf('No permission with the given name %s is existing!', $permission_name)); |
427 | 427 | } |
428 | 428 | |
@@ -442,7 +442,7 @@ discard block |
||
442 | 442 | */ |
443 | 443 | public function setRawPermissionValues(array $values, ?array $values2 = null): self |
444 | 444 | { |
445 | - if (! empty($values2)) { |
|
445 | + if (!empty($values2)) { |
|
446 | 446 | $values = array_combine($values, $values2); |
447 | 447 | } |
448 | 448 |
@@ -175,7 +175,7 @@ discard block |
||
175 | 175 | return true; |
176 | 176 | } |
177 | 177 | |
178 | - return ! in_array($tmp[0], array_merge(static::INTERNAL_PLACEHOLDER, static::BUILTIN_PLACEHOLDER), false); |
|
178 | + return !in_array($tmp[0], array_merge(static::INTERNAL_PLACEHOLDER, static::BUILTIN_PLACEHOLDER), false); |
|
179 | 179 | } |
180 | 180 | |
181 | 181 | /** |
@@ -226,7 +226,7 @@ discard block |
||
226 | 226 | return null; |
227 | 227 | } |
228 | 228 | |
229 | - if (! empty($this->original_filename)) { |
|
229 | + if (!empty($this->original_filename)) { |
|
230 | 230 | return strtolower(pathinfo($this->original_filename, PATHINFO_EXTENSION)); |
231 | 231 | } |
232 | 232 | |
@@ -249,7 +249,7 @@ discard block |
||
249 | 249 | */ |
250 | 250 | public function getURL(): ?string |
251 | 251 | { |
252 | - if (! $this->isExternal() && ! $this->isBuiltIn()) { |
|
252 | + if (!$this->isExternal() && !$this->isBuiltIn()) { |
|
253 | 253 | return null; |
254 | 254 | } |
255 | 255 | |
@@ -262,7 +262,7 @@ discard block |
||
262 | 262 | */ |
263 | 263 | public function getHost(): ?string |
264 | 264 | { |
265 | - if (! $this->isExternal()) { |
|
265 | + if (!$this->isExternal()) { |
|
266 | 266 | return null; |
267 | 267 | } |
268 | 268 | |
@@ -292,7 +292,7 @@ discard block |
||
292 | 292 | } |
293 | 293 | |
294 | 294 | //If we have a stored original filename, then use it |
295 | - if (! empty($this->original_filename)) { |
|
295 | + if (!empty($this->original_filename)) { |
|
296 | 296 | return $this->original_filename; |
297 | 297 | } |
298 | 298 | |
@@ -367,7 +367,7 @@ discard block |
||
367 | 367 | */ |
368 | 368 | public function setElement(AttachmentContainingDBElement $element): self |
369 | 369 | { |
370 | - if (! is_a($element, static::ALLOWED_ELEMENT_CLASS)) { |
|
370 | + if (!is_a($element, static::ALLOWED_ELEMENT_CLASS)) { |
|
371 | 371 | throw new InvalidArgumentException(sprintf('The element associated with a %s must be a %s!', static::class, static::ALLOWED_ELEMENT_CLASS)); |
372 | 372 | } |
373 | 373 | |
@@ -409,7 +409,7 @@ discard block |
||
409 | 409 | public function setURL(?string $url): self |
410 | 410 | { |
411 | 411 | //Only set if the URL is not empty |
412 | - if (! empty($url)) { |
|
412 | + if (!empty($url)) { |
|
413 | 413 | if (false !== strpos($url, '%BASE%') || false !== strpos($url, '%MEDIA%')) { |
414 | 414 | throw new InvalidArgumentException('You can not reference internal files via the url field! But nice try!'); |
415 | 415 | } |
@@ -460,7 +460,7 @@ discard block |
||
460 | 460 | if ($only_http) { //Check if scheme is HTTPS or HTTP |
461 | 461 | $scheme = parse_url($string, PHP_URL_SCHEME); |
462 | 462 | if ('http' !== $scheme && 'https' !== $scheme) { |
463 | - return false; //All other schemes are not valid. |
|
463 | + return false; //All other schemes are not valid. |
|
464 | 464 | } |
465 | 465 | } |
466 | 466 | if ($path_required) { |
@@ -124,7 +124,7 @@ discard block |
||
124 | 124 | |
125 | 125 | //Check if both elements compared, are from the same type |
126 | 126 | // (we have to check inheritance, or we get exceptions when using doctrine entities (they have a proxy type): |
127 | - if (! is_a($another_element, $class_name) && ! is_a($this, get_class($another_element))) { |
|
127 | + if (!is_a($another_element, $class_name) && !is_a($this, get_class($another_element))) { |
|
128 | 128 | throw new InvalidArgumentException('isChildOf() only works for objects of the same type!'); |
129 | 129 | } |
130 | 130 | |
@@ -240,7 +240,7 @@ discard block |
||
240 | 240 | $tmp[] = $this; |
241 | 241 | |
242 | 242 | //We only allow 20 levels depth |
243 | - while (! end($tmp)->isRoot() && count($tmp) < 20) { |
|
243 | + while (!end($tmp)->isRoot() && count($tmp) < 20) { |
|
244 | 244 | $tmp[] = end($tmp)->parent; |
245 | 245 | } |
246 | 246 |
@@ -105,7 +105,7 @@ |
||
105 | 105 | |
106 | 106 | $continue = $io->confirm(sprintf('Found %d abandoned files. Do you want to delete them? This can not be undone!', count($file_list)), false); |
107 | 107 | |
108 | - if (! $continue) { |
|
108 | + if (!$continue) { |
|
109 | 109 | //We are finished here, when no files should be deleted |
110 | 110 | return; |
111 | 111 | } |
@@ -41,7 +41,7 @@ |
||
41 | 41 | { |
42 | 42 | if (null === $value) { |
43 | 43 | return $this->options['nullValue']; |
44 | - } elseif (! $value instanceof DateTimeInterface) { |
|
44 | + } elseif (!$value instanceof DateTimeInterface) { |
|
45 | 45 | $value = new DateTime((string) $value); |
46 | 46 | } |
47 | 47 |
@@ -60,11 +60,11 @@ |
||
60 | 60 | |
61 | 61 | public function render($value, $context) |
62 | 62 | { |
63 | - if (! $context instanceof Part) { |
|
63 | + if (!$context instanceof Part) { |
|
64 | 64 | throw new RuntimeException('$context must be a Part object!'); |
65 | 65 | } |
66 | 66 | $tmp = ''; |
67 | - $attachments = $context->getAttachments()->filter(function (Attachment $attachment) { |
|
67 | + $attachments = $context->getAttachments()->filter(function(Attachment $attachment) { |
|
68 | 68 | return $attachment->getShowInTable() && $this->attachmentManager->isFileExisting($attachment); |
69 | 69 | }); |
70 | 70 |
@@ -71,7 +71,7 @@ |
||
71 | 71 | */ |
72 | 72 | public function createNodesForClass(string $class, ObjectManager $manager): void |
73 | 73 | { |
74 | - if (! new $class() instanceof StructuralDBElement) { |
|
74 | + if (!new $class() instanceof StructuralDBElement) { |
|
75 | 75 | throw new InvalidArgumentException('$class must be a StructuralDBElement!'); |
76 | 76 | } |
77 | 77 |
@@ -66,7 +66,7 @@ discard block |
||
66 | 66 | //When user change its settings, he should be logged in fully. |
67 | 67 | $this->denyAccessUnlessGranted('IS_AUTHENTICATED_FULLY'); |
68 | 68 | |
69 | - if (! $user instanceof User) { |
|
69 | + if (!$user instanceof User) { |
|
70 | 70 | return new RuntimeException('This controller only works only for Part-DB User objects!'); |
71 | 71 | } |
72 | 72 | |
@@ -97,7 +97,7 @@ discard block |
||
97 | 97 | //When user change its settings, he should be logged in fully. |
98 | 98 | $this->denyAccessUnlessGranted('IS_AUTHENTICATED_FULLY'); |
99 | 99 | |
100 | - if (! $user instanceof User) { |
|
100 | + if (!$user instanceof User) { |
|
101 | 101 | throw new RuntimeException('This controller only works only for Part-DB User objects!'); |
102 | 102 | } |
103 | 103 | |
@@ -146,7 +146,7 @@ discard block |
||
146 | 146 | //When user change its settings, he should be logged in fully. |
147 | 147 | $this->denyAccessUnlessGranted('IS_AUTHENTICATED_FULLY'); |
148 | 148 | |
149 | - if (! $user instanceof User) { |
|
149 | + if (!$user instanceof User) { |
|
150 | 150 | return new RuntimeException('This controller only works only for Part-DB User objects!'); |
151 | 151 | } |
152 | 152 | |
@@ -174,7 +174,7 @@ discard block |
||
174 | 174 | //When user change its settings, he should be logged in fully. |
175 | 175 | $this->denyAccessUnlessGranted('IS_AUTHENTICATED_FULLY'); |
176 | 176 | |
177 | - if (! $user instanceof User) { |
|
177 | + if (!$user instanceof User) { |
|
178 | 178 | throw new RuntimeException('This controller only works only for Part-DB User objects!'); |
179 | 179 | } |
180 | 180 | |
@@ -186,7 +186,7 @@ discard block |
||
186 | 186 | |
187 | 187 | $form->handleRequest($request); |
188 | 188 | |
189 | - if ($form->isSubmitted() && $form->isValid() && ! $this->demo_mode) { |
|
189 | + if ($form->isSubmitted() && $form->isValid() && !$this->demo_mode) { |
|
190 | 190 | //Check if user theme setting has changed |
191 | 191 | if ($user->getTheme() !== $em->getUnitOfWork()->getOriginalEntityData($user)['theme']) { |
192 | 192 | $page_need_reload = true; |
@@ -246,7 +246,7 @@ discard block |
||
246 | 246 | $pw_form->handleRequest($request); |
247 | 247 | |
248 | 248 | //Check if password if everything was correct, then save it to User and DB |
249 | - if ($pw_form->isSubmitted() && $pw_form->isValid() && ! $this->demo_mode) { |
|
249 | + if ($pw_form->isSubmitted() && $pw_form->isValid() && !$this->demo_mode) { |
|
250 | 250 | $password = $passwordEncoder->encodePassword($user, $pw_form['new_password']->getData()); |
251 | 251 | $user->setPassword($password); |
252 | 252 | |
@@ -261,14 +261,14 @@ discard block |
||
261 | 261 | //Handle 2FA things |
262 | 262 | $google_form = $this->createForm(TFAGoogleSettingsType::class, $user); |
263 | 263 | $google_enabled = $user->isGoogleAuthenticatorEnabled(); |
264 | - if (! $form->isSubmitted() && ! $google_enabled) { |
|
264 | + if (!$form->isSubmitted() && !$google_enabled) { |
|
265 | 265 | $user->setGoogleAuthenticatorSecret($googleAuthenticator->generateSecret()); |
266 | 266 | $google_form->get('googleAuthenticatorSecret')->setData($user->getGoogleAuthenticatorSecret()); |
267 | 267 | } |
268 | 268 | $google_form->handleRequest($request); |
269 | 269 | |
270 | - if ($google_form->isSubmitted() && $google_form->isValid() && ! $this->demo_mode) { |
|
271 | - if (! $google_enabled) { |
|
270 | + if ($google_form->isSubmitted() && $google_form->isValid() && !$this->demo_mode) { |
|
271 | + if (!$google_enabled) { |
|
272 | 272 | //Save 2FA settings (save secrets) |
273 | 273 | $user->setGoogleAuthenticatorSecret($google_form->get('googleAuthenticatorSecret')->getData()); |
274 | 274 | $backupCodeManager->enableBackupCodes($user); |
@@ -298,7 +298,7 @@ discard block |
||
298 | 298 | ])->getForm(); |
299 | 299 | |
300 | 300 | $backup_form->handleRequest($request); |
301 | - if ($backup_form->isSubmitted() && $backup_form->isValid() && ! $this->demo_mode) { |
|
301 | + if ($backup_form->isSubmitted() && $backup_form->isValid() && !$this->demo_mode) { |
|
302 | 302 | $backupCodeManager->regenerateBackupCodes($user); |
303 | 303 | $em->flush(); |
304 | 304 | $this->addFlash('success', 'user.settings.2fa.backup_codes.regenerated'); |
@@ -56,7 +56,7 @@ discard block |
||
56 | 56 | throw new RuntimeException('You can not download external attachments!'); |
57 | 57 | } |
58 | 58 | |
59 | - if (! $helper->isFileExisting($attachment)) { |
|
59 | + if (!$helper->isFileExisting($attachment)) { |
|
60 | 60 | throw new RuntimeException('The file associated with the attachment is not existing!'); |
61 | 61 | } |
62 | 62 | |
@@ -86,7 +86,7 @@ discard block |
||
86 | 86 | throw new RuntimeException('You can not download external attachments!'); |
87 | 87 | } |
88 | 88 | |
89 | - if (! $helper->isFileExisting($attachment)) { |
|
89 | + if (!$helper->isFileExisting($attachment)) { |
|
90 | 90 | throw new RuntimeException('The file associated with the attachment is not existing!'); |
91 | 91 | } |
92 | 92 |