@@ -28,7 +28,7 @@ |
||
28 | 28 | |
29 | 29 | public function is_readable_by(string $user_id) : bool |
30 | 30 | { |
31 | - return ( !$user_id |
|
31 | + return (!$user_id |
|
32 | 32 | || !$this->guid |
33 | 33 | || midcom::get()->auth->acl->can_do_byguid('midgard:read', $this->guid, midcom_db_topic::class, $user_id)); |
34 | 34 | } |
@@ -351,11 +351,11 @@ discard block |
||
351 | 351 | |
352 | 352 | $item = array_replace($defaults, $item); |
353 | 353 | |
354 | - if ( !empty($item[MIDCOM_TOOLBAR_ACCESSKEY]) |
|
354 | + if (!empty($item[MIDCOM_TOOLBAR_ACCESSKEY]) |
|
355 | 355 | && !array_key_exists($item[MIDCOM_TOOLBAR_ACCESSKEY], $used_access_keys)) { |
356 | 356 | // We have valid access key, add it to help text |
357 | 357 | $prefix = 'Alt-'; |
358 | - if ( isset($_SERVER['HTTP_USER_AGENT']) |
|
358 | + if (isset($_SERVER['HTTP_USER_AGENT']) |
|
359 | 359 | && strstr($_SERVER['HTTP_USER_AGENT'], 'Macintosh')) { |
360 | 360 | // Mac users |
361 | 361 | $prefix = 'Ctrl-Alt-'; |
@@ -377,7 +377,7 @@ discard block |
||
377 | 377 | private function set_url(array &$item, string $url) |
378 | 378 | { |
379 | 379 | $item[MIDCOM_TOOLBAR__ORIGINAL_URL] = $url; |
380 | - if ( ( empty($item[MIDCOM_TOOLBAR_OPTIONS]["rel"]) |
|
380 | + if ((empty($item[MIDCOM_TOOLBAR_OPTIONS]["rel"]) |
|
381 | 381 | // Some items may want to keep their links unmutilated |
382 | 382 | || $item[MIDCOM_TOOLBAR_OPTIONS]["rel"] != "directlink") |
383 | 383 | && !str_starts_with($url, '/') |
@@ -402,7 +402,7 @@ discard block |
||
402 | 402 | |
403 | 403 | if ($index == 0) { |
404 | 404 | array_shift($this->items); |
405 | - } elseif ($index == count($this->items) -1) { |
|
405 | + } elseif ($index == count($this->items) - 1) { |
|
406 | 406 | array_pop($this->items); |
407 | 407 | } else { |
408 | 408 | $this->items = array_merge(array_slice($this->items, 0, $index - 1), |
@@ -525,7 +525,7 @@ discard block |
||
525 | 525 | */ |
526 | 526 | public function render() : string |
527 | 527 | { |
528 | - $visible_items = array_filter($this->items, function ($item) { |
|
528 | + $visible_items = array_filter($this->items, function($item) { |
|
529 | 529 | return !$item[MIDCOM_TOOLBAR_HIDDEN]; |
530 | 530 | }); |
531 | 531 | $this->rendered = true; |
@@ -588,7 +588,7 @@ discard block |
||
588 | 588 | // Try finding uppercase version of the accesskey first |
589 | 589 | $accesskey = strtoupper($item[MIDCOM_TOOLBAR_ACCESSKEY]); |
590 | 590 | $position = strpos($label, $accesskey); |
591 | - if ( $position === false |
|
591 | + if ($position === false |
|
592 | 592 | && midcom::get()->i18n->get_current_language() == 'en') { |
593 | 593 | // Try lowercase, too |
594 | 594 | $accesskey = strtolower($accesskey); |
@@ -649,7 +649,7 @@ discard block |
||
649 | 649 | $attributes['title'] = $item[MIDCOM_TOOLBAR_HELPTEXT]; |
650 | 650 | } |
651 | 651 | |
652 | - if ( $item[MIDCOM_TOOLBAR_ENABLED] |
|
652 | + if ($item[MIDCOM_TOOLBAR_ENABLED] |
|
653 | 653 | && $item[MIDCOM_TOOLBAR_ACCESSKEY] !== null) { |
654 | 654 | $attributes['class'] = 'accesskey'; |
655 | 655 | $attributes['accesskey'] = $item[MIDCOM_TOOLBAR_ACCESSKEY]; |
@@ -712,7 +712,7 @@ discard block |
||
712 | 712 | public function get_index_from_url(string $url) : ?int |
713 | 713 | { |
714 | 714 | foreach ($this->items as $i => $item) { |
715 | - if ( $item[MIDCOM_TOOLBAR_URL] == $url |
|
715 | + if ($item[MIDCOM_TOOLBAR_URL] == $url |
|
716 | 716 | || $item[MIDCOM_TOOLBAR__ORIGINAL_URL] == $url) { |
717 | 717 | return $i; |
718 | 718 | } |
@@ -730,7 +730,7 @@ discard block |
||
730 | 730 | * |
731 | 731 | * @param mixed $index The integer index or URL to check |
732 | 732 | */ |
733 | - protected function _check_index($index, bool $raise_error = true) :?int |
|
733 | + protected function _check_index($index, bool $raise_error = true) : ?int |
|
734 | 734 | { |
735 | 735 | if (is_string($index)) { |
736 | 736 | $url = $index; |
@@ -154,7 +154,7 @@ discard block |
||
154 | 154 | $account = $this->get_account(); |
155 | 155 | if (!empty($new_password)) { |
156 | 156 | //check if the new encrypted password was already used |
157 | - if ( !$this->check_password_reuse($new_password, true) |
|
157 | + if (!$this->check_password_reuse($new_password, true) |
|
158 | 158 | || !$this->check_password_strength($new_password, true)) { |
159 | 159 | $this->errstr = "password strength too low"; |
160 | 160 | return false; |
@@ -293,7 +293,7 @@ discard block |
||
293 | 293 | $password_length = mb_strlen($password); |
294 | 294 | |
295 | 295 | if ($password_length < $this->_config->get('min_password_length')) { |
296 | - if ($show_ui_message){ |
|
296 | + if ($show_ui_message) { |
|
297 | 297 | midcom::get()->uimessages->add($this->_l10n->get('org.openpsa.user'), $this->_l10n->get('password too short'), 'error'); |
298 | 298 | } |
299 | 299 | return false; |
@@ -311,7 +311,7 @@ discard block |
||
311 | 311 | } |
312 | 312 | |
313 | 313 | if ($score < $this->_config->get('min_password_score')) { |
314 | - if ($show_ui_message){ |
|
314 | + if ($show_ui_message) { |
|
315 | 315 | midcom::get()->uimessages->add($this->_l10n->get('org.openpsa.user'), $this->_l10n->get('password weak'), 'error'); |
316 | 316 | } |
317 | 317 | return false; |
@@ -439,7 +439,7 @@ discard block |
||
439 | 439 | |
440 | 440 | public static function get_person_by_formdata(array $data) |
441 | 441 | { |
442 | - if ( empty($data['username']) |
|
442 | + if (empty($data['username']) |
|
443 | 443 | || empty($data['password'])) { |
444 | 444 | return false; |
445 | 445 | } |
@@ -471,7 +471,7 @@ discard block |
||
471 | 471 | $max_attempts = midcom_baseclasses_components_configuration::get($component, 'config')->get('max_password_attempts'); |
472 | 472 | $timeframe = midcom_baseclasses_components_configuration::get($component, 'config')->get('password_block_timeframe_min'); |
473 | 473 | |
474 | - if ( $max_attempts == 0 |
|
474 | + if ($max_attempts == 0 |
|
475 | 475 | || $timeframe == 0) { |
476 | 476 | return $stat; |
477 | 477 | } |
@@ -493,7 +493,7 @@ discard block |
||
493 | 493 | * If the maximum number of attempts is reached and the oldest attempt |
494 | 494 | * on the stack is within our defined timeframe, we block the account |
495 | 495 | */ |
496 | - if ( count($attempts) >= $max_attempts |
|
496 | + if (count($attempts) >= $max_attempts |
|
497 | 497 | && $attempts[$max_attempts - 1] >= (time() - ($timeframe * 60))) { |
498 | 498 | $this->disable_account(); |
499 | 499 | $stat = false; |
@@ -137,7 +137,7 @@ discard block |
||
137 | 137 | { |
138 | 138 | debug_add("task->start() called with user #" . midcom_connection::get_user()); |
139 | 139 | //PONDER: Check actual status objects for more accurate logic ? |
140 | - if ( $task->status >= org_openpsa_projects_task_status_dba::STARTED |
|
140 | + if ($task->status >= org_openpsa_projects_task_status_dba::STARTED |
|
141 | 141 | && $task->status <= org_openpsa_projects_task_status_dba::APPROVED) { |
142 | 142 | //We already have started status |
143 | 143 | debug_add('Task has already been started'); |
@@ -318,7 +318,7 @@ discard block |
||
318 | 318 | |
319 | 319 | private static function is_manager(org_openpsa_projects_task_dba $task) : bool |
320 | 320 | { |
321 | - return ( $task->manager == 0 |
|
321 | + return ($task->manager == 0 |
|
322 | 322 | || midcom_connection::get_user() == $task->manager); |
323 | 323 | } |
324 | 324 | } |
@@ -73,7 +73,7 @@ discard block |
||
73 | 73 | |
74 | 74 | public function set_storage(midcom_core_dbaobject $storage = null, string $schemaname = null) : self |
75 | 75 | { |
76 | - if ( $schemaname === null |
|
76 | + if ($schemaname === null |
|
77 | 77 | && !empty($storage->id)) { |
78 | 78 | $schemaname = $storage->get_parameter('midcom.helper.datamanager2', 'schema_name'); |
79 | 79 | } |
@@ -164,7 +164,7 @@ discard block |
||
164 | 164 | } |
165 | 165 | $name = $this->get_name($name); |
166 | 166 | |
167 | - if ( $this->form === null |
|
167 | + if ($this->form === null |
|
168 | 168 | || $this->form->getName() != $name) { |
169 | 169 | $this->build_form($this->get_builder($name)); |
170 | 170 | } |
@@ -261,7 +261,7 @@ discard block |
||
261 | 261 | { |
262 | 262 | $ret = true; |
263 | 263 | foreach ($this->storage as $field) { |
264 | - if ( $field instanceof recreateable |
|
264 | + if ($field instanceof recreateable |
|
265 | 265 | && !$field->recreate()) { |
266 | 266 | $ret = false; |
267 | 267 | } |
@@ -64,7 +64,7 @@ discard block |
||
64 | 64 | */ |
65 | 65 | public function set_privilege($privilege, $assignee = null, int $value = MIDCOM_PRIVILEGE_ALLOW, string $classname = '') : bool |
66 | 66 | { |
67 | - if ( !$this->can_do('midgard:update') |
|
67 | + if (!$this->can_do('midgard:update') |
|
68 | 68 | || !$this->can_do('midgard:privileges')) { |
69 | 69 | debug_add("Failed to set a privilege, midgard:update or midgard:privileges on the " . get_class($this) . " {$this->guid} not granted for the current user.", |
70 | 70 | MIDCOM_LOG_ERROR); |
@@ -94,7 +94,7 @@ discard block |
||
94 | 94 | */ |
95 | 95 | public function unset_privilege($privilege, $assignee = null, string $classname = '') : bool |
96 | 96 | { |
97 | - if ( !$this->can_do('midgard:update') |
|
97 | + if (!$this->can_do('midgard:update') |
|
98 | 98 | || !$this->can_do('midgard:privileges')) { |
99 | 99 | debug_add("Failed to unset a privilege, midgard:update or midgard:privileges on the " . get_class($this) . " {$this->guid} not granted for the current user.", |
100 | 100 | MIDCOM_LOG_ERROR); |
@@ -15,7 +15,7 @@ discard block |
||
15 | 15 | { |
16 | 16 | public function write_acls(midcom_core_dbaobject $object, $owner_id, int $accesstype) : bool |
17 | 17 | { |
18 | - if ( empty($owner_id) |
|
18 | + if (empty($owner_id) |
|
19 | 19 | || empty($accesstype)) { |
20 | 20 | return false; |
21 | 21 | } |
@@ -63,14 +63,14 @@ discard block |
||
63 | 63 | |
64 | 64 | if ($privileges) { |
65 | 65 | foreach ($privileges as $privilege) { |
66 | - if ( !empty($needed_privileges[$privilege->privilegename]) |
|
66 | + if (!empty($needed_privileges[$privilege->privilegename]) |
|
67 | 67 | && $needed_privileges[$privilege->privilegename]['assignee'] == $privilege->assignee |
68 | 68 | && $needed_privileges[$privilege->privilegename]['value'] == $privilege->value) { |
69 | 69 | unset($needed_privileges[$privilege->privilegename]); |
70 | 70 | continue; |
71 | 71 | } |
72 | 72 | // Clear old ACLs applying to others than current user or selected owner group |
73 | - if ( $privilege->assignee != midcom::get()->auth->user->id |
|
73 | + if ($privilege->assignee != midcom::get()->auth->user->id |
|
74 | 74 | && $privilege->assignee != $owner_id) { |
75 | 75 | debug_add("Removing privilege {$privilege->privilegename} from {$privilege->assignee}"); |
76 | 76 | $object->unset_privilege($privilege->privilegename, $privilege->assignee); |
@@ -318,7 +318,7 @@ |
||
318 | 318 | public function update_cache() |
319 | 319 | { |
320 | 320 | // Check if the attachment can be read anonymously |
321 | - if ( midcom::get()->config->get('attachment_cache_enabled') |
|
321 | + if (midcom::get()->config->get('attachment_cache_enabled') |
|
322 | 322 | && !$this->can_do('midgard:read', 'EVERYONE')) { |
323 | 323 | // Not public file, ensure it is removed |
324 | 324 | $this->remove_from_cache(); |
@@ -246,7 +246,7 @@ |
||
246 | 246 | */ |
247 | 247 | public function prepare_handler(array &$parameters) |
248 | 248 | { |
249 | - $this->parameters =& $parameters; |
|
249 | + $this->parameters = & $parameters; |
|
250 | 250 | |
251 | 251 | $parameters['handler'] = explode('::', $parameters['_controller'], 2); |
252 | 252 |