@@ -88,7 +88,7 @@ discard block |
||
| 88 | 88 | $dup = $this->check_duplicate($results, $result, $conf['duplicate_check']); |
| 89 | 89 | |
| 90 | 90 | if ($dup !== true) { |
| 91 | - if ( !is_object($dup) |
|
| 91 | + if (!is_object($dup) |
|
| 92 | 92 | || !array_key_exists($dup->id, $todelete)) { |
| 93 | 93 | $todelete[$result->id] = $result; |
| 94 | 94 | } |
@@ -97,7 +97,7 @@ discard block |
||
| 97 | 97 | } |
| 98 | 98 | } |
| 99 | 99 | } |
| 100 | - if ( $needs_update |
|
| 100 | + if ($needs_update |
|
| 101 | 101 | && !$result->update()) { |
| 102 | 102 | throw new midcom_error("Failed to update {$classname} #{$result->id}, errstr: " . midcom_connection::get_error_string()); |
| 103 | 103 | } |
@@ -145,7 +145,7 @@ discard block |
||
| 145 | 145 | } |
| 146 | 146 | |
| 147 | 147 | foreach ($results as $result) { |
| 148 | - if ( $result->$field === $object->$field |
|
| 148 | + if ($result->$field === $object->$field |
|
| 149 | 149 | && $result->id !== $object->id) { |
| 150 | 150 | return $result; |
| 151 | 151 | } |
@@ -163,7 +163,7 @@ discard block |
||
| 163 | 163 | $changed = false; |
| 164 | 164 | foreach ($person2 as $property => $value) { |
| 165 | 165 | // Copy only simple properties not marked to be skipped missing from person1 |
| 166 | - if ( !empty($person2->$property) |
|
| 166 | + if (!empty($person2->$property) |
|
| 167 | 167 | && empty($person1->$property) |
| 168 | 168 | && !isset($skip_properties[$property]) |
| 169 | 169 | && is_scalar($value)) { |
@@ -28,7 +28,7 @@ |
||
| 28 | 28 | |
| 29 | 29 | public function is_readable_by(string $user_id) : bool |
| 30 | 30 | { |
| 31 | - return ( empty($this->object) |
|
| 31 | + return (empty($this->object) |
|
| 32 | 32 | || !$this->guid |
| 33 | 33 | || !$user_id |
| 34 | 34 | || midcom::get()->auth->acl->can_do_byguid('midgard:read', $this->guid, $this->object->__midcom_class_name__, $user_id)); |
@@ -28,7 +28,7 @@ |
||
| 28 | 28 | |
| 29 | 29 | public function is_readable_by(string $user_id) : bool |
| 30 | 30 | { |
| 31 | - return ( !$user_id |
|
| 31 | + return (!$user_id |
|
| 32 | 32 | || !$this->guid |
| 33 | 33 | || midcom::get()->auth->acl->can_do_byguid('midgard:read', $this->guid, midcom_db_topic::class, $user_id)); |
| 34 | 34 | } |
@@ -154,7 +154,7 @@ discard block |
||
| 154 | 154 | $account = $this->get_account(); |
| 155 | 155 | if (!empty($new_password)) { |
| 156 | 156 | //check if the new encrypted password was already used |
| 157 | - if ( !$this->check_password_reuse($new_password, true) |
|
| 157 | + if (!$this->check_password_reuse($new_password, true) |
|
| 158 | 158 | || !$this->check_password_strength($new_password, true)) { |
| 159 | 159 | $this->errstr = "password strength too low"; |
| 160 | 160 | return false; |
@@ -293,7 +293,7 @@ discard block |
||
| 293 | 293 | $password_length = mb_strlen($password); |
| 294 | 294 | |
| 295 | 295 | if ($password_length < $this->_config->get('min_password_length')) { |
| 296 | - if ($show_ui_message){ |
|
| 296 | + if ($show_ui_message) { |
|
| 297 | 297 | midcom::get()->uimessages->add($this->_l10n->get('org.openpsa.user'), $this->_l10n->get('password too short'), 'error'); |
| 298 | 298 | } |
| 299 | 299 | return false; |
@@ -311,7 +311,7 @@ discard block |
||
| 311 | 311 | } |
| 312 | 312 | |
| 313 | 313 | if ($score < $this->_config->get('min_password_score')) { |
| 314 | - if ($show_ui_message){ |
|
| 314 | + if ($show_ui_message) { |
|
| 315 | 315 | midcom::get()->uimessages->add($this->_l10n->get('org.openpsa.user'), $this->_l10n->get('password weak'), 'error'); |
| 316 | 316 | } |
| 317 | 317 | return false; |
@@ -439,7 +439,7 @@ discard block |
||
| 439 | 439 | |
| 440 | 440 | public static function get_person_by_formdata(array $data) |
| 441 | 441 | { |
| 442 | - if ( empty($data['username']) |
|
| 442 | + if (empty($data['username']) |
|
| 443 | 443 | || empty($data['password'])) { |
| 444 | 444 | return false; |
| 445 | 445 | } |
@@ -471,7 +471,7 @@ discard block |
||
| 471 | 471 | $max_attempts = midcom_baseclasses_components_configuration::get($component, 'config')->get('max_password_attempts'); |
| 472 | 472 | $timeframe = midcom_baseclasses_components_configuration::get($component, 'config')->get('password_block_timeframe_min'); |
| 473 | 473 | |
| 474 | - if ( $max_attempts == 0 |
|
| 474 | + if ($max_attempts == 0 |
|
| 475 | 475 | || $timeframe == 0) { |
| 476 | 476 | return $stat; |
| 477 | 477 | } |
@@ -493,7 +493,7 @@ discard block |
||
| 493 | 493 | * If the maximum number of attempts is reached and the oldest attempt |
| 494 | 494 | * on the stack is within our defined timeframe, we block the account |
| 495 | 495 | */ |
| 496 | - if ( count($attempts) >= $max_attempts |
|
| 496 | + if (count($attempts) >= $max_attempts |
|
| 497 | 497 | && $attempts[$max_attempts - 1] >= (time() - ($timeframe * 60))) { |
| 498 | 498 | $this->disable_account(); |
| 499 | 499 | $stat = false; |
@@ -137,7 +137,7 @@ discard block |
||
| 137 | 137 | { |
| 138 | 138 | debug_add("task->start() called with user #" . midcom_connection::get_user()); |
| 139 | 139 | //PONDER: Check actual status objects for more accurate logic ? |
| 140 | - if ( $task->status >= org_openpsa_projects_task_status_dba::STARTED |
|
| 140 | + if ($task->status >= org_openpsa_projects_task_status_dba::STARTED |
|
| 141 | 141 | && $task->status <= org_openpsa_projects_task_status_dba::APPROVED) { |
| 142 | 142 | //We already have started status |
| 143 | 143 | debug_add('Task has already been started'); |
@@ -318,7 +318,7 @@ discard block |
||
| 318 | 318 | |
| 319 | 319 | private static function is_manager(org_openpsa_projects_task_dba $task) : bool |
| 320 | 320 | { |
| 321 | - return ( $task->manager == 0 |
|
| 321 | + return ($task->manager == 0 |
|
| 322 | 322 | || midcom_connection::get_user() == $task->manager); |
| 323 | 323 | } |
| 324 | 324 | } |
@@ -73,7 +73,7 @@ discard block |
||
| 73 | 73 | |
| 74 | 74 | public function set_storage(midcom_core_dbaobject $storage = null, string $schemaname = null) : self |
| 75 | 75 | { |
| 76 | - if ( $schemaname === null |
|
| 76 | + if ($schemaname === null |
|
| 77 | 77 | && !empty($storage->id)) { |
| 78 | 78 | $schemaname = $storage->get_parameter('midcom.helper.datamanager2', 'schema_name'); |
| 79 | 79 | } |
@@ -164,7 +164,7 @@ discard block |
||
| 164 | 164 | } |
| 165 | 165 | $name = $this->get_name($name); |
| 166 | 166 | |
| 167 | - if ( $this->form === null |
|
| 167 | + if ($this->form === null |
|
| 168 | 168 | || $this->form->getName() != $name) { |
| 169 | 169 | $this->build_form($this->get_builder($name)); |
| 170 | 170 | } |
@@ -261,7 +261,7 @@ discard block |
||
| 261 | 261 | { |
| 262 | 262 | $ret = true; |
| 263 | 263 | foreach ($this->storage as $field) { |
| 264 | - if ( $field instanceof recreateable |
|
| 264 | + if ($field instanceof recreateable |
|
| 265 | 265 | && !$field->recreate()) { |
| 266 | 266 | $ret = false; |
| 267 | 267 | } |
@@ -15,7 +15,7 @@ discard block |
||
| 15 | 15 | { |
| 16 | 16 | public function write_acls(midcom_core_dbaobject $object, $owner_id, int $accesstype) : bool |
| 17 | 17 | { |
| 18 | - if ( empty($owner_id) |
|
| 18 | + if (empty($owner_id) |
|
| 19 | 19 | || empty($accesstype)) { |
| 20 | 20 | return false; |
| 21 | 21 | } |
@@ -63,14 +63,14 @@ discard block |
||
| 63 | 63 | |
| 64 | 64 | if ($privileges) { |
| 65 | 65 | foreach ($privileges as $privilege) { |
| 66 | - if ( !empty($needed_privileges[$privilege->privilegename]) |
|
| 66 | + if (!empty($needed_privileges[$privilege->privilegename]) |
|
| 67 | 67 | && $needed_privileges[$privilege->privilegename]['assignee'] == $privilege->assignee |
| 68 | 68 | && $needed_privileges[$privilege->privilegename]['value'] == $privilege->value) { |
| 69 | 69 | unset($needed_privileges[$privilege->privilegename]); |
| 70 | 70 | continue; |
| 71 | 71 | } |
| 72 | 72 | // Clear old ACLs applying to others than current user or selected owner group |
| 73 | - if ( $privilege->assignee != midcom::get()->auth->user->id |
|
| 73 | + if ($privilege->assignee != midcom::get()->auth->user->id |
|
| 74 | 74 | && $privilege->assignee != $owner_id) { |
| 75 | 75 | debug_add("Removing privilege {$privilege->privilegename} from {$privilege->assignee}"); |
| 76 | 76 | $object->unset_privilege($privilege->privilegename, $privilege->assignee); |
@@ -318,7 +318,7 @@ |
||
| 318 | 318 | public function update_cache() |
| 319 | 319 | { |
| 320 | 320 | // Check if the attachment can be read anonymously |
| 321 | - if ( midcom::get()->config->get('attachment_cache_enabled') |
|
| 321 | + if (midcom::get()->config->get('attachment_cache_enabled') |
|
| 322 | 322 | && !$this->can_do('midgard:read', 'EVERYONE')) { |
| 323 | 323 | // Not public file, ensure it is removed |
| 324 | 324 | $this->remove_from_cache(); |
@@ -109,7 +109,7 @@ discard block |
||
| 109 | 109 | if (file_exists(MIDCOM_STATIC_ROOT . $jqgrid_path . 'i18n/grid.locale-' . $language . '.js')) { |
| 110 | 110 | $lang = $language; |
| 111 | 111 | } |
| 112 | - $head->add_jsfile(MIDCOM_STATIC_URL . $jqgrid_path . 'i18n/grid.locale-'. $lang . '.js'); |
|
| 112 | + $head->add_jsfile(MIDCOM_STATIC_URL . $jqgrid_path . 'i18n/grid.locale-' . $lang . '.js'); |
|
| 113 | 113 | $head->add_jsfile(MIDCOM_STATIC_URL . $jqgrid_path . 'jquery.jqgrid.min.js'); |
| 114 | 114 | |
| 115 | 115 | $head->add_jsfile(MIDCOM_STATIC_URL . '/midcom.grid/jqGrid.custom.js'); |
@@ -155,7 +155,7 @@ discard block |
||
| 155 | 155 | public function set_option(string $key, $value, bool $autoquote_string = true) : self |
| 156 | 156 | { |
| 157 | 157 | $this->_raw_options[$key] = $value; |
| 158 | - if ( $autoquote_string |
|
| 158 | + if ($autoquote_string |
|
| 159 | 159 | && is_string($value)) { |
| 160 | 160 | $value = '"' . str_replace('"', '\\"', $value) . '"'; |
| 161 | 161 | } elseif ($value === true) { |
@@ -185,7 +185,7 @@ discard block |
||
| 185 | 185 | public function set_select_column(string $name, string $label, string $options, array $selectdata) : self |
| 186 | 186 | { |
| 187 | 187 | $selectstring = implode(';', array_map( |
| 188 | - function ($key, $value) { |
|
| 188 | + function($key, $value) { |
|
| 189 | 189 | return $key . ':' . $value; |
| 190 | 190 | }, |
| 191 | 191 | array_keys($selectdata), |
@@ -231,7 +231,7 @@ discard block |
||
| 231 | 231 | */ |
| 232 | 232 | public function remove_column(string $name) |
| 233 | 233 | { |
| 234 | - if ( empty($name) |
|
| 234 | + if (empty($name) |
|
| 235 | 235 | || !array_key_exists($name, $this->_columns)) { |
| 236 | 236 | throw new midcom_error('Invalid column name ' . $name); |
| 237 | 237 | } |