@@ -39,7 +39,7 @@ |
||
39 | 39 | |
40 | 40 | $schema_name = $args[0]; |
41 | 41 | $schemadb = $data['schemadb']; |
42 | - if ( $this->_config->get('simple_name_handling') |
|
42 | + if ($this->_config->get('simple_name_handling') |
|
43 | 43 | && !midcom::get()->auth->can_user_do('midcom:urlname')) { |
44 | 44 | foreach ($schemadb->all() as $schema) { |
45 | 45 | $schema->get_field('name')['readonly'] = true; |
@@ -51,7 +51,7 @@ |
||
51 | 51 | $this->article->require_do('midgard:update'); |
52 | 52 | |
53 | 53 | $schemadb = $data['schemadb']; |
54 | - if ( $this->_config->get('simple_name_handling') |
|
54 | + if ($this->_config->get('simple_name_handling') |
|
55 | 55 | && !midcom::get()->auth->can_user_do('midcom:urlname')) { |
56 | 56 | foreach ($schemadb->all() as $schema) { |
57 | 57 | $schema->get_field('name')['readonly'] = true; |
@@ -107,7 +107,7 @@ |
||
107 | 107 | |
108 | 108 | // sending per email enabled in billing data? |
109 | 109 | $billing_data = org_openpsa_invoices_billing_data_dba::get_by_object($this->invoice); |
110 | - if ( !$this->invoice->sent |
|
110 | + if (!$this->invoice->sent |
|
111 | 111 | && intval($billing_data->sendingoption) == 2) { |
112 | 112 | $buttons[] = $this->build_button('send_by_mail', 'paper-plane'); |
113 | 113 | } |
@@ -46,7 +46,7 @@ discard block |
||
46 | 46 | ] |
47 | 47 | ]); |
48 | 48 | |
49 | - $resolver->setNormalizer('constraints', function (Options $options, $value) { |
|
49 | + $resolver->setNormalizer('constraints', function(Options $options, $value) { |
|
50 | 50 | if ($options['required']) { |
51 | 51 | return [new constraint(['config' => $options['type_config']])]; |
52 | 52 | } |
@@ -78,7 +78,7 @@ discard block |
||
78 | 78 | |
79 | 79 | $builder->add('delete', CheckboxType::class, ['attr' => [ |
80 | 80 | "class" => "midcom_datamanager_photo_checkbox" |
81 | - ], "required" => false ]); |
|
81 | + ], "required" => false]); |
|
82 | 82 | $builder->add('identifier', HiddenType::class); |
83 | 83 | } |
84 | 84 |
@@ -82,7 +82,7 @@ discard block |
||
82 | 82 | { |
83 | 83 | $entries = array_merge($this->get_status_entries(), $this->get_journal_entries()); |
84 | 84 | |
85 | - usort($entries, function ($a, $b) { |
|
85 | + usort($entries, function($a, $b) { |
|
86 | 86 | if ($a['timestamp'] == $b['timestamp']) { |
87 | 87 | return $b['order'] <=> $a['order']; |
88 | 88 | } |
@@ -116,8 +116,8 @@ discard block |
||
116 | 116 | 'order' => 3 |
117 | 117 | ]; |
118 | 118 | } |
119 | - if ( $this->invoice->due |
|
120 | - && ( ( $this->invoice->due < time() |
|
119 | + if ($this->invoice->due |
|
120 | + && (($this->invoice->due < time() |
|
121 | 121 | && $this->invoice->paid == 0) |
122 | 122 | || $this->invoice->due < $this->invoice->paid)) { |
123 | 123 | $entries[] = [ |
@@ -90,7 +90,7 @@ |
||
90 | 90 | $data['query'] = new org_openpsa_reports_query_dba($args[0]); |
91 | 91 | $data['query']->require_do('midgard:update'); |
92 | 92 | } else { |
93 | - $data['query']= new org_openpsa_reports_query_dba(); |
|
93 | + $data['query'] = new org_openpsa_reports_query_dba(); |
|
94 | 94 | $data['query']->component = $this->_component; |
95 | 95 | } |
96 | 96 |
@@ -59,7 +59,7 @@ |
||
59 | 59 | |
60 | 60 | public function __set($name, $value) |
61 | 61 | { |
62 | - if ( $name == 'homepage' |
|
62 | + if ($name == 'homepage' |
|
63 | 63 | && !empty($value) |
64 | 64 | && $value != $this->homepage) { |
65 | 65 | $this->_register_prober = true; |
@@ -98,7 +98,7 @@ |
||
98 | 98 | |
99 | 99 | public function reverseTransform($array) |
100 | 100 | { |
101 | - if (!is_array($array) ) { |
|
101 | + if (!is_array($array)) { |
|
102 | 102 | throw new TransformationFailedException('Expected an array.'); |
103 | 103 | } |
104 | 104 |
@@ -319,7 +319,7 @@ discard block |
||
319 | 319 | $password_length = mb_strlen($password); |
320 | 320 | |
321 | 321 | if ($password_length < $this->_config->get('min_password_length')) { |
322 | - if ($show_ui_message){ |
|
322 | + if ($show_ui_message) { |
|
323 | 323 | midcom::get()->uimessages->add($this->_l10n->get('org.openpsa.user'), $this->_l10n->get('password too short'), 'error'); |
324 | 324 | } |
325 | 325 | return false; |
@@ -337,7 +337,7 @@ discard block |
||
337 | 337 | } |
338 | 338 | |
339 | 339 | if ($score < $this->_config->get('min_password_score')) { |
340 | - if ($show_ui_message){ |
|
340 | + if ($show_ui_message) { |
|
341 | 341 | midcom::get()->uimessages->add($this->_l10n->get('org.openpsa.user'), $this->_l10n->get('password weak'), 'error'); |
342 | 342 | } |
343 | 343 | return false; |
@@ -154,7 +154,7 @@ discard block |
||
154 | 154 | $account = $this->get_account(); |
155 | 155 | if (!empty($new_password)) { |
156 | 156 | //check if the new encrypted password was already used |
157 | - if ( !$this->check_password_reuse($new_password, true) |
|
157 | + if (!$this->check_password_reuse($new_password, true) |
|
158 | 158 | || !$this->check_password_strength($new_password, true)) { |
159 | 159 | $this->errstr = "password strength too low"; |
160 | 160 | return false; |
@@ -293,7 +293,7 @@ discard block |
||
293 | 293 | $password_length = mb_strlen($password); |
294 | 294 | |
295 | 295 | if ($password_length < $this->_config->get('min_password_length')) { |
296 | - if ($show_ui_message){ |
|
296 | + if ($show_ui_message) { |
|
297 | 297 | midcom::get()->uimessages->add($this->_l10n->get('org.openpsa.user'), $this->_l10n->get('password too short'), 'error'); |
298 | 298 | } |
299 | 299 | return false; |
@@ -311,7 +311,7 @@ discard block |
||
311 | 311 | } |
312 | 312 | |
313 | 313 | if ($score < $this->_config->get('min_password_score')) { |
314 | - if ($show_ui_message){ |
|
314 | + if ($show_ui_message) { |
|
315 | 315 | midcom::get()->uimessages->add($this->_l10n->get('org.openpsa.user'), $this->_l10n->get('password weak'), 'error'); |
316 | 316 | } |
317 | 317 | return false; |
@@ -439,7 +439,7 @@ discard block |
||
439 | 439 | |
440 | 440 | public static function get_person_by_formdata(array $data) |
441 | 441 | { |
442 | - if ( empty($data['username']) |
|
442 | + if (empty($data['username']) |
|
443 | 443 | || empty($data['password'])) { |
444 | 444 | return false; |
445 | 445 | } |
@@ -471,7 +471,7 @@ discard block |
||
471 | 471 | $max_attempts = midcom_baseclasses_components_configuration::get($component, 'config')->get('max_password_attempts'); |
472 | 472 | $timeframe = midcom_baseclasses_components_configuration::get($component, 'config')->get('password_block_timeframe_min'); |
473 | 473 | |
474 | - if ( $max_attempts == 0 |
|
474 | + if ($max_attempts == 0 |
|
475 | 475 | || $timeframe == 0) { |
476 | 476 | return $stat; |
477 | 477 | } |
@@ -493,7 +493,7 @@ discard block |
||
493 | 493 | * If the maximum number of attempts is reached and the oldest attempt |
494 | 494 | * on the stack is within our defined timeframe, we block the account |
495 | 495 | */ |
496 | - if ( count($attempts) >= $max_attempts |
|
496 | + if (count($attempts) >= $max_attempts |
|
497 | 497 | && $attempts[$max_attempts - 1] >= (time() - ($timeframe * 60))) { |
498 | 498 | $this->disable_account(); |
499 | 499 | $stat = false; |