@@ -88,7 +88,7 @@ discard block |
||
88 | 88 | $dup = $this->check_duplicate($results, $result, $conf['duplicate_check']); |
89 | 89 | |
90 | 90 | if ($dup !== true) { |
91 | - if ( !is_object($dup) |
|
91 | + if (!is_object($dup) |
|
92 | 92 | || !array_key_exists($dup->id, $todelete)) { |
93 | 93 | $todelete[$result->id] = $result; |
94 | 94 | } |
@@ -97,7 +97,7 @@ discard block |
||
97 | 97 | } |
98 | 98 | } |
99 | 99 | } |
100 | - if ( $needs_update |
|
100 | + if ($needs_update |
|
101 | 101 | && !$result->update()) { |
102 | 102 | throw new midcom_error("Failed to update {$classname} #{$result->id}, errstr: " . midcom_connection::get_error_string()); |
103 | 103 | } |
@@ -145,7 +145,7 @@ discard block |
||
145 | 145 | } |
146 | 146 | |
147 | 147 | foreach ($results as $result) { |
148 | - if ( $result->$field === $object->$field |
|
148 | + if ($result->$field === $object->$field |
|
149 | 149 | && $result->id !== $object->id) { |
150 | 150 | return $result; |
151 | 151 | } |
@@ -163,7 +163,7 @@ discard block |
||
163 | 163 | $changed = false; |
164 | 164 | foreach ($person2 as $property => $value) { |
165 | 165 | // Copy only simple properties not marked to be skipped missing from person1 |
166 | - if ( !empty($person2->$property) |
|
166 | + if (!empty($person2->$property) |
|
167 | 167 | && empty($person1->$property) |
168 | 168 | && !isset($skip_properties[$property]) |
169 | 169 | && is_scalar($value)) { |
@@ -28,7 +28,7 @@ |
||
28 | 28 | |
29 | 29 | public function is_readable_by(string $user_id) : bool |
30 | 30 | { |
31 | - return ( empty($this->object) |
|
31 | + return (empty($this->object) |
|
32 | 32 | || !$this->guid |
33 | 33 | || !$user_id |
34 | 34 | || midcom::get()->auth->acl->can_do_byguid('midgard:read', $this->guid, $this->object->__midcom_class_name__, $user_id)); |
@@ -28,7 +28,7 @@ |
||
28 | 28 | |
29 | 29 | public function is_readable_by(string $user_id) : bool |
30 | 30 | { |
31 | - return ( !$user_id |
|
31 | + return (!$user_id |
|
32 | 32 | || !$this->guid |
33 | 33 | || midcom::get()->auth->acl->can_do_byguid('midgard:read', $this->guid, midcom_db_topic::class, $user_id)); |
34 | 34 | } |
@@ -154,7 +154,7 @@ discard block |
||
154 | 154 | $account = $this->get_account(); |
155 | 155 | if (!empty($new_password)) { |
156 | 156 | //check if the new encrypted password was already used |
157 | - if ( !$this->check_password_reuse($new_password, true) |
|
157 | + if (!$this->check_password_reuse($new_password, true) |
|
158 | 158 | || !$this->check_password_strength($new_password, true)) { |
159 | 159 | $this->errstr = "password strength too low"; |
160 | 160 | return false; |
@@ -293,7 +293,7 @@ discard block |
||
293 | 293 | $password_length = mb_strlen($password); |
294 | 294 | |
295 | 295 | if ($password_length < $this->_config->get('min_password_length')) { |
296 | - if ($show_ui_message){ |
|
296 | + if ($show_ui_message) { |
|
297 | 297 | midcom::get()->uimessages->add($this->_l10n->get('org.openpsa.user'), $this->_l10n->get('password too short'), 'error'); |
298 | 298 | } |
299 | 299 | return false; |
@@ -311,7 +311,7 @@ discard block |
||
311 | 311 | } |
312 | 312 | |
313 | 313 | if ($score < $this->_config->get('min_password_score')) { |
314 | - if ($show_ui_message){ |
|
314 | + if ($show_ui_message) { |
|
315 | 315 | midcom::get()->uimessages->add($this->_l10n->get('org.openpsa.user'), $this->_l10n->get('password weak'), 'error'); |
316 | 316 | } |
317 | 317 | return false; |
@@ -439,7 +439,7 @@ discard block |
||
439 | 439 | |
440 | 440 | public static function get_person_by_formdata(array $data) |
441 | 441 | { |
442 | - if ( empty($data['username']) |
|
442 | + if (empty($data['username']) |
|
443 | 443 | || empty($data['password'])) { |
444 | 444 | return false; |
445 | 445 | } |
@@ -471,7 +471,7 @@ discard block |
||
471 | 471 | $max_attempts = midcom_baseclasses_components_configuration::get($component, 'config')->get('max_password_attempts'); |
472 | 472 | $timeframe = midcom_baseclasses_components_configuration::get($component, 'config')->get('password_block_timeframe_min'); |
473 | 473 | |
474 | - if ( $max_attempts == 0 |
|
474 | + if ($max_attempts == 0 |
|
475 | 475 | || $timeframe == 0) { |
476 | 476 | return $stat; |
477 | 477 | } |
@@ -493,7 +493,7 @@ discard block |
||
493 | 493 | * If the maximum number of attempts is reached and the oldest attempt |
494 | 494 | * on the stack is within our defined timeframe, we block the account |
495 | 495 | */ |
496 | - if ( count($attempts) >= $max_attempts |
|
496 | + if (count($attempts) >= $max_attempts |
|
497 | 497 | && $attempts[$max_attempts - 1] >= (time() - ($timeframe * 60))) { |
498 | 498 | $this->disable_account(); |
499 | 499 | $stat = false; |
@@ -137,7 +137,7 @@ discard block |
||
137 | 137 | { |
138 | 138 | debug_add("task->start() called with user #" . midcom_connection::get_user()); |
139 | 139 | //PONDER: Check actual status objects for more accurate logic ? |
140 | - if ( $task->status >= org_openpsa_projects_task_status_dba::STARTED |
|
140 | + if ($task->status >= org_openpsa_projects_task_status_dba::STARTED |
|
141 | 141 | && $task->status <= org_openpsa_projects_task_status_dba::APPROVED) { |
142 | 142 | //We already have started status |
143 | 143 | debug_add('Task has already been started'); |
@@ -318,7 +318,7 @@ discard block |
||
318 | 318 | |
319 | 319 | private static function is_manager(org_openpsa_projects_task_dba $task) : bool |
320 | 320 | { |
321 | - return ( $task->manager == 0 |
|
321 | + return ($task->manager == 0 |
|
322 | 322 | || midcom_connection::get_user() == $task->manager); |
323 | 323 | } |
324 | 324 | } |
@@ -73,7 +73,7 @@ discard block |
||
73 | 73 | |
74 | 74 | public function set_storage(midcom_core_dbaobject $storage = null, string $schemaname = null) : self |
75 | 75 | { |
76 | - if ( $schemaname === null |
|
76 | + if ($schemaname === null |
|
77 | 77 | && !empty($storage->id)) { |
78 | 78 | $schemaname = $storage->get_parameter('midcom.helper.datamanager2', 'schema_name'); |
79 | 79 | } |
@@ -164,7 +164,7 @@ discard block |
||
164 | 164 | } |
165 | 165 | $name = $this->get_name($name); |
166 | 166 | |
167 | - if ( $this->form === null |
|
167 | + if ($this->form === null |
|
168 | 168 | || $this->form->getName() != $name) { |
169 | 169 | $this->build_form($this->get_builder($name)); |
170 | 170 | } |
@@ -261,7 +261,7 @@ discard block |
||
261 | 261 | { |
262 | 262 | $ret = true; |
263 | 263 | foreach ($this->storage as $field) { |
264 | - if ( $field instanceof recreateable |
|
264 | + if ($field instanceof recreateable |
|
265 | 265 | && !$field->recreate()) { |
266 | 266 | $ret = false; |
267 | 267 | } |
@@ -64,7 +64,7 @@ discard block |
||
64 | 64 | */ |
65 | 65 | public function set_privilege($privilege, $assignee = null, int $value = MIDCOM_PRIVILEGE_ALLOW, string $classname = '') : bool |
66 | 66 | { |
67 | - if ( !$this->can_do('midgard:update') |
|
67 | + if (!$this->can_do('midgard:update') |
|
68 | 68 | || !$this->can_do('midgard:privileges')) { |
69 | 69 | debug_add("Failed to set a privilege, midgard:update or midgard:privileges on the " . get_class($this) . " {$this->guid} not granted for the current user.", |
70 | 70 | MIDCOM_LOG_ERROR); |
@@ -94,7 +94,7 @@ discard block |
||
94 | 94 | */ |
95 | 95 | public function unset_privilege($privilege, $assignee = null, string $classname = '') : bool |
96 | 96 | { |
97 | - if ( !$this->can_do('midgard:update') |
|
97 | + if (!$this->can_do('midgard:update') |
|
98 | 98 | || !$this->can_do('midgard:privileges')) { |
99 | 99 | debug_add("Failed to unset a privilege, midgard:update or midgard:privileges on the " . get_class($this) . " {$this->guid} not granted for the current user.", |
100 | 100 | MIDCOM_LOG_ERROR); |
@@ -15,7 +15,7 @@ discard block |
||
15 | 15 | { |
16 | 16 | public function write_acls(midcom_core_dbaobject $object, $owner_id, int $accesstype) : bool |
17 | 17 | { |
18 | - if ( empty($owner_id) |
|
18 | + if (empty($owner_id) |
|
19 | 19 | || empty($accesstype)) { |
20 | 20 | return false; |
21 | 21 | } |
@@ -63,14 +63,14 @@ discard block |
||
63 | 63 | |
64 | 64 | if ($privileges) { |
65 | 65 | foreach ($privileges as $privilege) { |
66 | - if ( !empty($needed_privileges[$privilege->privilegename]) |
|
66 | + if (!empty($needed_privileges[$privilege->privilegename]) |
|
67 | 67 | && $needed_privileges[$privilege->privilegename]['assignee'] == $privilege->assignee |
68 | 68 | && $needed_privileges[$privilege->privilegename]['value'] == $privilege->value) { |
69 | 69 | unset($needed_privileges[$privilege->privilegename]); |
70 | 70 | continue; |
71 | 71 | } |
72 | 72 | // Clear old ACLs applying to others than current user or selected owner group |
73 | - if ( $privilege->assignee != midcom::get()->auth->user->id |
|
73 | + if ($privilege->assignee != midcom::get()->auth->user->id |
|
74 | 74 | && $privilege->assignee != $owner_id) { |
75 | 75 | debug_add("Removing privilege {$privilege->privilegename} from {$privilege->assignee}"); |
76 | 76 | $object->unset_privilege($privilege->privilegename, $privilege->assignee); |
@@ -318,7 +318,7 @@ |
||
318 | 318 | public function update_cache() |
319 | 319 | { |
320 | 320 | // Check if the attachment can be read anonymously |
321 | - if ( midcom::get()->config->get('attachment_cache_enabled') |
|
321 | + if (midcom::get()->config->get('attachment_cache_enabled') |
|
322 | 322 | && !$this->can_do('midgard:read', 'EVERYONE')) { |
323 | 323 | // Not public file, ensure it is removed |
324 | 324 | $this->remove_from_cache(); |