Passed
Branch feature/2.1-geodispersion-dev (1d61a8)
by Jonathan
61:21
created
src/Webtrees/Module/Certificates/Http/RequestHandlers/CertificatePage.php 1 patch
Indentation   +76 added lines, -76 removed lines patch added patch discarded remove patch
@@ -34,80 +34,80 @@
 block discarded – undo
34 34
  */
35 35
 class CertificatePage implements RequestHandlerInterface
36 36
 {
37
-    use ViewResponseTrait;
38
-
39
-    /**
40
-     * @var CertificatesModule|null $module
41
-     */
42
-    private $module;
43
-
44
-    /**
45
-     * @var CertificateFilesystemService $certif_filesystem
46
-     */
47
-    private $certif_filesystem;
48
-
49
-    /**
50
-     * @var CertificateDataService $certif_data_service
51
-     */
52
-    private $certif_data_service;
53
-
54
-    /**
55
-     * @var UrlObfuscatorService $url_obfuscator_service
56
-     */
57
-    private $url_obfuscator_service;
58
-
59
-
60
-    /**
61
-     * Constructor for CertificatePage Request Handler
62
-     *
63
-     * @param ModuleService $module_service
64
-     * @param CertificateFilesystemService $certif_filesystem
65
-     * @param CertificateDataService $certif_data_service
66
-     * @param UrlObfuscatorService $url_obfuscator_service
67
-     */
68
-    public function __construct(
69
-        ModuleService $module_service,
70
-        CertificateFilesystemService $certif_filesystem,
71
-        CertificateDataService $certif_data_service,
72
-        UrlObfuscatorService $url_obfuscator_service
73
-    ) {
74
-        $this->module = $module_service->findByInterface(CertificatesModule::class)->first();
75
-        $this->certif_filesystem = $certif_filesystem;
76
-        $this->certif_data_service = $certif_data_service;
77
-        $this->url_obfuscator_service = $url_obfuscator_service;
78
-    }
79
-
80
-    /**
81
-     * {@inheritDoc}
82
-     * @see \Psr\Http\Server\RequestHandlerInterface::handle()
83
-     */
84
-    public function handle(ServerRequestInterface $request): ResponseInterface
85
-    {
86
-        if ($this->module === null) {
87
-            throw new HttpNotFoundException(I18N::translate('The attached module could not be found.'));
88
-        }
89
-
90
-        $tree = $request->getAttribute('tree');
91
-        assert($tree instanceof Tree);
92
-
93
-        $certif_path = $request->getAttribute('cid');
94
-        if ($certif_path !== '' && $this->url_obfuscator_service->tryDeobfuscate($certif_path)) {
95
-            $certificate = $this->certif_filesystem->certificate($tree, $certif_path);
96
-        }
97
-
98
-        if (!isset($certificate)) {
99
-            FlashMessages::addMessage('The requested certificate is not valid.');
100
-            return redirect(route(TreePage::class, ['tree' => $tree->name()]));
101
-        }
102
-
103
-        return $this->viewResponse($this->module->name() . '::certificate-page', [
104
-            'title'                     =>  I18N::translate('Certificate - %s', $certificate->name()),
105
-            'tree'                      =>  $tree,
106
-            'module_name'               =>  $this->module->name(),
107
-            'certificate'               =>  $certificate,
108
-            'url_obfuscator_service'    =>  $this->url_obfuscator_service,
109
-            'linked_individuals'        =>  $this->certif_data_service->linkedIndividuals($certificate),
110
-            'linked_families'           =>  $this->certif_data_service->linkedFamilies($certificate)
111
-        ]);
112
-    }
37
+	use ViewResponseTrait;
38
+
39
+	/**
40
+	 * @var CertificatesModule|null $module
41
+	 */
42
+	private $module;
43
+
44
+	/**
45
+	 * @var CertificateFilesystemService $certif_filesystem
46
+	 */
47
+	private $certif_filesystem;
48
+
49
+	/**
50
+	 * @var CertificateDataService $certif_data_service
51
+	 */
52
+	private $certif_data_service;
53
+
54
+	/**
55
+	 * @var UrlObfuscatorService $url_obfuscator_service
56
+	 */
57
+	private $url_obfuscator_service;
58
+
59
+
60
+	/**
61
+	 * Constructor for CertificatePage Request Handler
62
+	 *
63
+	 * @param ModuleService $module_service
64
+	 * @param CertificateFilesystemService $certif_filesystem
65
+	 * @param CertificateDataService $certif_data_service
66
+	 * @param UrlObfuscatorService $url_obfuscator_service
67
+	 */
68
+	public function __construct(
69
+		ModuleService $module_service,
70
+		CertificateFilesystemService $certif_filesystem,
71
+		CertificateDataService $certif_data_service,
72
+		UrlObfuscatorService $url_obfuscator_service
73
+	) {
74
+		$this->module = $module_service->findByInterface(CertificatesModule::class)->first();
75
+		$this->certif_filesystem = $certif_filesystem;
76
+		$this->certif_data_service = $certif_data_service;
77
+		$this->url_obfuscator_service = $url_obfuscator_service;
78
+	}
79
+
80
+	/**
81
+	 * {@inheritDoc}
82
+	 * @see \Psr\Http\Server\RequestHandlerInterface::handle()
83
+	 */
84
+	public function handle(ServerRequestInterface $request): ResponseInterface
85
+	{
86
+		if ($this->module === null) {
87
+			throw new HttpNotFoundException(I18N::translate('The attached module could not be found.'));
88
+		}
89
+
90
+		$tree = $request->getAttribute('tree');
91
+		assert($tree instanceof Tree);
92
+
93
+		$certif_path = $request->getAttribute('cid');
94
+		if ($certif_path !== '' && $this->url_obfuscator_service->tryDeobfuscate($certif_path)) {
95
+			$certificate = $this->certif_filesystem->certificate($tree, $certif_path);
96
+		}
97
+
98
+		if (!isset($certificate)) {
99
+			FlashMessages::addMessage('The requested certificate is not valid.');
100
+			return redirect(route(TreePage::class, ['tree' => $tree->name()]));
101
+		}
102
+
103
+		return $this->viewResponse($this->module->name() . '::certificate-page', [
104
+			'title'                     =>  I18N::translate('Certificate - %s', $certificate->name()),
105
+			'tree'                      =>  $tree,
106
+			'module_name'               =>  $this->module->name(),
107
+			'certificate'               =>  $certificate,
108
+			'url_obfuscator_service'    =>  $this->url_obfuscator_service,
109
+			'linked_individuals'        =>  $this->certif_data_service->linkedIndividuals($certificate),
110
+			'linked_families'           =>  $this->certif_data_service->linkedFamilies($certificate)
111
+		]);
112
+	}
113 113
 }
Please login to merge, or discard this patch.
src/Webtrees/Module/Certificates/Http/RequestHandlers/AdminConfigAction.php 1 patch
Indentation   +67 added lines, -67 removed lines patch added patch discarded remove patch
@@ -29,71 +29,71 @@
 block discarded – undo
29 29
  */
30 30
 class AdminConfigAction implements RequestHandlerInterface
31 31
 {
32
-    /**
33
-     * @var CertificatesModule|null $module
34
-     */
35
-    private $module;
36
-
37
-    /**
38
-     * Constructor for Admin Config Action request handler
39
-     *
40
-     * @param ModuleService $module_service
41
-     */
42
-    public function __construct(ModuleService $module_service)
43
-    {
44
-        $this->module = $module_service->findByInterface(CertificatesModule::class)->first();
45
-    }
46
-
47
-    /**
48
-     * {@inheritDoc}
49
-     * @see \Psr\Http\Server\RequestHandlerInterface::handle()
50
-     */
51
-    public function handle(ServerRequestInterface $request): ResponseInterface
52
-    {
53
-        $tree = $request->getAttribute('tree');
54
-        assert($tree instanceof Tree);
55
-
56
-        $admin_config_route = route(AdminConfigPage::class, ['tree' => $tree->name()]);
57
-
58
-        if ($this->module === null) {
59
-            FlashMessages::addMessage(
60
-                I18N::translate('The attached module could not be found.'),
61
-                'danger'
62
-            );
63
-            return redirect($admin_config_route);
64
-        }
65
-
66
-        $params = (array) $request->getParsedBody();
67
-
68
-        $tree->setPreference('MAJ_CERTIF_SHOW_CERT', $params['MAJ_CERTIF_SHOW_CERT'] ?? (string) Auth::PRIV_HIDE);
69
-        $tree->setPreference(
70
-            'MAJ_CERTIF_SHOW_NO_WATERMARK',
71
-            $params['MAJ_CERTIF_SHOW_NO_WATERMARK'] ?? (string) Auth::PRIV_HIDE
72
-        );
73
-        $tree->setPreference('MAJ_CERTIF_WM_DEFAULT', $params['MAJ_CERTIF_WM_DEFAULT'] ?? '');
74
-
75
-        $watermark_font_size = $params['MAJ_CERTIF_WM_FONT_MAXSIZE'] ?? '';
76
-        if (is_numeric($watermark_font_size) && $watermark_font_size > 0) {
77
-            $tree->setPreference('MAJ_CERTIF_WM_FONT_MAXSIZE', $params['MAJ_CERTIF_WM_FONT_MAXSIZE']);
78
-        }
79
-
80
-        // Only accept valid color for MAJ_WM_FONT_COLOR
81
-        $watermark_color = $params['MAJ_CERTIF_WM_FONT_COLOR'] ?? '';
82
-        if (preg_match('/#([a-fA-F0-9]{3}){1,2}/', $watermark_color) === 1) {
83
-            $tree->setPreference('MAJ_CERTIF_WM_FONT_COLOR', $watermark_color);
84
-        }
85
-
86
-        // Only accept valid folders for MAJ_CERT_ROOTDIR
87
-        $cert_root_dir = $params['MAJ_CERTIF_ROOTDIR'] ?? '';
88
-        $cert_root_dir = preg_replace('/[:\/\\\\]+/', '/', $cert_root_dir);
89
-        $cert_root_dir = trim($cert_root_dir, '/') . '/';
90
-        $tree->setPreference('MAJ_CERTIF_ROOTDIR', $cert_root_dir);
91
-
92
-        FlashMessages::addMessage(
93
-            I18N::translate('The preferences for the module “%s” have been updated.', $this->module->title()),
94
-            'success'
95
-        );
96
-
97
-        return redirect($admin_config_route);
98
-    }
32
+	/**
33
+	 * @var CertificatesModule|null $module
34
+	 */
35
+	private $module;
36
+
37
+	/**
38
+	 * Constructor for Admin Config Action request handler
39
+	 *
40
+	 * @param ModuleService $module_service
41
+	 */
42
+	public function __construct(ModuleService $module_service)
43
+	{
44
+		$this->module = $module_service->findByInterface(CertificatesModule::class)->first();
45
+	}
46
+
47
+	/**
48
+	 * {@inheritDoc}
49
+	 * @see \Psr\Http\Server\RequestHandlerInterface::handle()
50
+	 */
51
+	public function handle(ServerRequestInterface $request): ResponseInterface
52
+	{
53
+		$tree = $request->getAttribute('tree');
54
+		assert($tree instanceof Tree);
55
+
56
+		$admin_config_route = route(AdminConfigPage::class, ['tree' => $tree->name()]);
57
+
58
+		if ($this->module === null) {
59
+			FlashMessages::addMessage(
60
+				I18N::translate('The attached module could not be found.'),
61
+				'danger'
62
+			);
63
+			return redirect($admin_config_route);
64
+		}
65
+
66
+		$params = (array) $request->getParsedBody();
67
+
68
+		$tree->setPreference('MAJ_CERTIF_SHOW_CERT', $params['MAJ_CERTIF_SHOW_CERT'] ?? (string) Auth::PRIV_HIDE);
69
+		$tree->setPreference(
70
+			'MAJ_CERTIF_SHOW_NO_WATERMARK',
71
+			$params['MAJ_CERTIF_SHOW_NO_WATERMARK'] ?? (string) Auth::PRIV_HIDE
72
+		);
73
+		$tree->setPreference('MAJ_CERTIF_WM_DEFAULT', $params['MAJ_CERTIF_WM_DEFAULT'] ?? '');
74
+
75
+		$watermark_font_size = $params['MAJ_CERTIF_WM_FONT_MAXSIZE'] ?? '';
76
+		if (is_numeric($watermark_font_size) && $watermark_font_size > 0) {
77
+			$tree->setPreference('MAJ_CERTIF_WM_FONT_MAXSIZE', $params['MAJ_CERTIF_WM_FONT_MAXSIZE']);
78
+		}
79
+
80
+		// Only accept valid color for MAJ_WM_FONT_COLOR
81
+		$watermark_color = $params['MAJ_CERTIF_WM_FONT_COLOR'] ?? '';
82
+		if (preg_match('/#([a-fA-F0-9]{3}){1,2}/', $watermark_color) === 1) {
83
+			$tree->setPreference('MAJ_CERTIF_WM_FONT_COLOR', $watermark_color);
84
+		}
85
+
86
+		// Only accept valid folders for MAJ_CERT_ROOTDIR
87
+		$cert_root_dir = $params['MAJ_CERTIF_ROOTDIR'] ?? '';
88
+		$cert_root_dir = preg_replace('/[:\/\\\\]+/', '/', $cert_root_dir);
89
+		$cert_root_dir = trim($cert_root_dir, '/') . '/';
90
+		$tree->setPreference('MAJ_CERTIF_ROOTDIR', $cert_root_dir);
91
+
92
+		FlashMessages::addMessage(
93
+			I18N::translate('The preferences for the module “%s” have been updated.', $this->module->title()),
94
+			'success'
95
+		);
96
+
97
+		return redirect($admin_config_route);
98
+	}
99 99
 }
Please login to merge, or discard this patch.
src/Webtrees/Module/Certificates/Http/RequestHandlers/AdminConfigPage.php 1 patch
Indentation   +33 added lines, -33 removed lines patch added patch discarded remove patch
@@ -30,44 +30,44 @@
 block discarded – undo
30 30
  */
31 31
 class AdminConfigPage implements RequestHandlerInterface
32 32
 {
33
-    use ViewResponseTrait;
33
+	use ViewResponseTrait;
34 34
 
35
-    /**
36
-     * @var CertificatesModule|null $module
37
-     */
38
-    private $module;
35
+	/**
36
+	 * @var CertificatesModule|null $module
37
+	 */
38
+	private $module;
39 39
 
40
-    /**
41
-     * Constructor for Admin Config page request handler
42
-     *
43
-     * @param ModuleService $module_service
44
-     */
45
-    public function __construct(ModuleService $module_service)
46
-    {
47
-        $this->module = $module_service->findByInterface(CertificatesModule::class)->first();
48
-    }
40
+	/**
41
+	 * Constructor for Admin Config page request handler
42
+	 *
43
+	 * @param ModuleService $module_service
44
+	 */
45
+	public function __construct(ModuleService $module_service)
46
+	{
47
+		$this->module = $module_service->findByInterface(CertificatesModule::class)->first();
48
+	}
49 49
 
50
-    /**
51
-     * {@inheritDoc}
52
-     * @see \Psr\Http\Server\RequestHandlerInterface::handle()
53
-     */
54
-    public function handle(ServerRequestInterface $request): ResponseInterface
55
-    {
56
-        $this->layout = 'layouts/administration';
50
+	/**
51
+	 * {@inheritDoc}
52
+	 * @see \Psr\Http\Server\RequestHandlerInterface::handle()
53
+	 */
54
+	public function handle(ServerRequestInterface $request): ResponseInterface
55
+	{
56
+		$this->layout = 'layouts/administration';
57 57
 
58
-        if ($this->module === null) {
59
-            throw new HttpNotFoundException(I18N::translate('The attached module could not be found.'));
60
-        }
58
+		if ($this->module === null) {
59
+			throw new HttpNotFoundException(I18N::translate('The attached module could not be found.'));
60
+		}
61 61
 
62
-        $tree = $request->getAttribute('tree');
63
-        assert($tree instanceof Tree);
62
+		$tree = $request->getAttribute('tree');
63
+		assert($tree instanceof Tree);
64 64
 
65
-        $data_folder = Registry::filesystem()->dataName();
65
+		$data_folder = Registry::filesystem()->dataName();
66 66
 
67
-        return $this->viewResponse($this->module->name() . '::admin/config', [
68
-            'title'             =>  $this->module->title(),
69
-            'tree'              =>  $tree,
70
-            'data_folder'       =>  $data_folder
71
-        ]);
72
-    }
67
+		return $this->viewResponse($this->module->name() . '::admin/config', [
68
+			'title'             =>  $this->module->title(),
69
+			'tree'              =>  $tree,
70
+			'data_folder'       =>  $data_folder
71
+		]);
72
+	}
73 73
 }
Please login to merge, or discard this patch.
src/Webtrees/Module/Certificates/Elements/SourceCertificate.php 1 patch
Indentation   +8 added lines, -8 removed lines patch added patch discarded remove patch
@@ -24,12 +24,12 @@
 block discarded – undo
24 24
  */
25 25
 class SourceCertificate extends AbstractElement
26 26
 {
27
-    /**
28
-     * {@inheritDoc}
29
-     * @see \Fisharebest\Webtrees\Elements\AbstractElement::canonical()
30
-     */
31
-    public function canonical($value): string
32
-    {
33
-        return strtr($value, '\\', '/');
34
-    }
27
+	/**
28
+	 * {@inheritDoc}
29
+	 * @see \Fisharebest\Webtrees\Elements\AbstractElement::canonical()
30
+	 */
31
+	public function canonical($value): string
32
+	{
33
+		return strtr($value, '\\', '/');
34
+	}
35 35
 }
Please login to merge, or discard this patch.
src/Webtrees/Module/Certificates/Services/CertificateFilesystemService.php 1 patch
Indentation   +125 added lines, -125 removed lines patch added patch discarded remove patch
@@ -31,139 +31,139 @@
 block discarded – undo
31 31
  */
32 32
 class CertificateFilesystemService
33 33
 {
34
-    /**
35
-     * @var array<int,FilesystemOperator> $filesystem
36
-     */
37
-    private $filesystem = [];
34
+	/**
35
+	 * @var array<int,FilesystemOperator> $filesystem
36
+	 */
37
+	private $filesystem = [];
38 38
 
39
-    /**
40
-     * Get the filesystem containing certificates for a tree.
41
-     *
42
-     * @param Tree $tree
43
-     * @return FilesystemOperator
44
-     */
45
-    public function filesystem(Tree $tree): FilesystemOperator
46
-    {
47
-        if (!isset($this->filesystem[$tree->id()])) {
48
-            $cert_dir = $tree->getPreference('MAJ_CERTIF_ROOTDIR', 'certificates/');
49
-            $adapter   = new ChrootAdapter(Registry::filesystem()->data(), $cert_dir);
39
+	/**
40
+	 * Get the filesystem containing certificates for a tree.
41
+	 *
42
+	 * @param Tree $tree
43
+	 * @return FilesystemOperator
44
+	 */
45
+	public function filesystem(Tree $tree): FilesystemOperator
46
+	{
47
+		if (!isset($this->filesystem[$tree->id()])) {
48
+			$cert_dir = $tree->getPreference('MAJ_CERTIF_ROOTDIR', 'certificates/');
49
+			$adapter   = new ChrootAdapter(Registry::filesystem()->data(), $cert_dir);
50 50
 
51
-            $this->filesystem[$tree->id()] = new FileSystem($adapter);
52
-        }
53
-        return $this->filesystem[$tree->id()];
54
-    }
51
+			$this->filesystem[$tree->id()] = new FileSystem($adapter);
52
+		}
53
+		return $this->filesystem[$tree->id()];
54
+	}
55 55
 
56
-    /**
57
-     * Set the filesystem containing certificates for a tree.
58
-     *
59
-     * @param Tree $tree
60
-     * @param FilesystemOperator $filesystem
61
-     */
62
-    public function setFilesystem(Tree $tree, FilesystemOperator $filesystem): void
63
-    {
64
-        $this->filesystem[$tree->id()] = $filesystem;
65
-    }
56
+	/**
57
+	 * Set the filesystem containing certificates for a tree.
58
+	 *
59
+	 * @param Tree $tree
60
+	 * @param FilesystemOperator $filesystem
61
+	 */
62
+	public function setFilesystem(Tree $tree, FilesystemOperator $filesystem): void
63
+	{
64
+		$this->filesystem[$tree->id()] = $filesystem;
65
+	}
66 66
 
67
-    /**
68
-     * Create the Certificate object defined by a path on the filesystem.
69
-     *
70
-     * @param Tree $tree
71
-     * @param string $path
72
-     * @return Certificate|NULL
73
-     */
74
-    public function certificate(Tree $tree, string $path): ?Certificate
75
-    {
76
-        $filesystem = $this->filesystem($tree);
77
-        if ($filesystem->fileExists($path) && $this->isFileSupported($filesystem, $path)) {
78
-            return new Certificate($tree, $path);
79
-        }
80
-        return null;
81
-    }
67
+	/**
68
+	 * Create the Certificate object defined by a path on the filesystem.
69
+	 *
70
+	 * @param Tree $tree
71
+	 * @param string $path
72
+	 * @return Certificate|NULL
73
+	 */
74
+	public function certificate(Tree $tree, string $path): ?Certificate
75
+	{
76
+		$filesystem = $this->filesystem($tree);
77
+		if ($filesystem->fileExists($path) && $this->isFileSupported($filesystem, $path)) {
78
+			return new Certificate($tree, $path);
79
+		}
80
+		return null;
81
+	}
82 82
 
83
-    /**
84
-     * Get the cities (first-level folder) available in a the filesystem.
85
-     *
86
-     * @param Tree $tree
87
-     * @return string[]
88
-     */
89
-    public function cities(Tree $tree): array
90
-    {
91
-        return $this->filesystem($tree)
92
-            ->listContents('')
93
-            ->filter(function (StorageAttributes $attributes): bool {
94
-                return $attributes->isDir();
95
-            })->map(function (StorageAttributes $attributes): string {
96
-                return $attributes->path();
97
-            })->toArray();
98
-    }
83
+	/**
84
+	 * Get the cities (first-level folder) available in a the filesystem.
85
+	 *
86
+	 * @param Tree $tree
87
+	 * @return string[]
88
+	 */
89
+	public function cities(Tree $tree): array
90
+	{
91
+		return $this->filesystem($tree)
92
+			->listContents('')
93
+			->filter(function (StorageAttributes $attributes): bool {
94
+				return $attributes->isDir();
95
+			})->map(function (StorageAttributes $attributes): string {
96
+				return $attributes->path();
97
+			})->toArray();
98
+	}
99 99
 
100
-    /**
101
-     * Get the certificates available for a city (first-level folder).
102
-     *
103
-     * @param Tree $tree
104
-     * @param string $city
105
-     * @return Collection<Certificate>
106
-     */
107
-    public function certificatesForCity(Tree $tree, string $city): Collection
108
-    {
109
-        $filesystem = $this->filesystem($tree);
110
-        $certificate_paths = collect($filesystem
111
-            ->listContents($city)
112
-            ->filter(function (StorageAttributes $attributes) use ($filesystem): bool {
113
-                return $attributes->isFile() && $this->isFileSupported($filesystem, $attributes->path());
114
-            })->map(function (StorageAttributes $attributes): string {
115
-                return $attributes->path();
116
-            })->toArray());
100
+	/**
101
+	 * Get the certificates available for a city (first-level folder).
102
+	 *
103
+	 * @param Tree $tree
104
+	 * @param string $city
105
+	 * @return Collection<Certificate>
106
+	 */
107
+	public function certificatesForCity(Tree $tree, string $city): Collection
108
+	{
109
+		$filesystem = $this->filesystem($tree);
110
+		$certificate_paths = collect($filesystem
111
+			->listContents($city)
112
+			->filter(function (StorageAttributes $attributes) use ($filesystem): bool {
113
+				return $attributes->isFile() && $this->isFileSupported($filesystem, $attributes->path());
114
+			})->map(function (StorageAttributes $attributes): string {
115
+				return $attributes->path();
116
+			})->toArray());
117 117
 
118
-        return $certificate_paths->map(function (string $path) use ($tree): Certificate {
119
-            return new Certificate($tree, $path);
120
-        });
121
-    }
118
+		return $certificate_paths->map(function (string $path) use ($tree): Certificate {
119
+			return new Certificate($tree, $path);
120
+		});
121
+	}
122 122
 
123
-    /**
124
-     * Get the certificates available for a city (first-level folder), containing a specified text.
125
-     *
126
-     * @param Tree $tree
127
-     * @param string $city
128
-     * @param string $contains
129
-     * @return Collection<Certificate>
130
-     */
131
-    public function certificatesForCityContaining(Tree $tree, string $city, string $contains): Collection
132
-    {
133
-        $filesystem = $this->filesystem($tree);
134
-        $certificate_paths = collect($filesystem
135
-            ->listContents($city)
136
-            ->filter(function (StorageAttributes $attributes) use ($filesystem, $contains): bool {
137
-                return $attributes->isFile() && $this->isFileSupported($filesystem, $attributes->path())
138
-                    && mb_stripos($attributes->path(), $contains) !== false;
139
-            })->map(function (StorageAttributes $attributes): string {
140
-                return $attributes->path();
141
-            })->toArray());
123
+	/**
124
+	 * Get the certificates available for a city (first-level folder), containing a specified text.
125
+	 *
126
+	 * @param Tree $tree
127
+	 * @param string $city
128
+	 * @param string $contains
129
+	 * @return Collection<Certificate>
130
+	 */
131
+	public function certificatesForCityContaining(Tree $tree, string $city, string $contains): Collection
132
+	{
133
+		$filesystem = $this->filesystem($tree);
134
+		$certificate_paths = collect($filesystem
135
+			->listContents($city)
136
+			->filter(function (StorageAttributes $attributes) use ($filesystem, $contains): bool {
137
+				return $attributes->isFile() && $this->isFileSupported($filesystem, $attributes->path())
138
+					&& mb_stripos($attributes->path(), $contains) !== false;
139
+			})->map(function (StorageAttributes $attributes): string {
140
+				return $attributes->path();
141
+			})->toArray());
142 142
 
143
-        return $certificate_paths->map(function (string $path) use ($tree): Certificate {
144
-            return new Certificate($tree, $path);
145
-        });
146
-    }
143
+		return $certificate_paths->map(function (string $path) use ($tree): Certificate {
144
+			return new Certificate($tree, $path);
145
+		});
146
+	}
147 147
 
148
-    /**
149
-     * Check if a file on the filesystem is supported by the certificate module.
150
-     *
151
-     * @param FilesystemOperator $filesystem
152
-     * @param string $path
153
-     * @return bool
154
-     */
155
-    protected function isFileSupported(FilesystemOperator $filesystem, string $path): bool
156
-    {
157
-        try {
158
-            $mime = $filesystem->mimeType($path);
159
-            return Registry::cache()->array()->remember(
160
-                'maj-certif-supportedfiles-' . $mime,
161
-                function () use ($mime): bool {
162
-                    return app(CertificateImageFactory::class)->isMimeTypeSupported($mime);
163
-                }
164
-            );
165
-        } catch (UnableToRetrieveMetadata | FilesystemException $ex) {
166
-        }
167
-        return false;
168
-    }
148
+	/**
149
+	 * Check if a file on the filesystem is supported by the certificate module.
150
+	 *
151
+	 * @param FilesystemOperator $filesystem
152
+	 * @param string $path
153
+	 * @return bool
154
+	 */
155
+	protected function isFileSupported(FilesystemOperator $filesystem, string $path): bool
156
+	{
157
+		try {
158
+			$mime = $filesystem->mimeType($path);
159
+			return Registry::cache()->array()->remember(
160
+				'maj-certif-supportedfiles-' . $mime,
161
+				function () use ($mime): bool {
162
+					return app(CertificateImageFactory::class)->isMimeTypeSupported($mime);
163
+				}
164
+			);
165
+		} catch (UnableToRetrieveMetadata | FilesystemException $ex) {
166
+		}
167
+		return false;
168
+	}
169 169
 }
Please login to merge, or discard this patch.
src/Webtrees/Module/Certificates/Services/UrlObfuscatorService.php 1 patch
Indentation   +117 added lines, -117 removed lines patch added patch discarded remove patch
@@ -23,121 +23,121 @@
 block discarded – undo
23 23
  */
24 24
 class UrlObfuscatorService
25 25
 {
26
-    /**
27
-     * @var string|null $encryption_key
28
-     */
29
-    private $encryption_key;
30
-
31
-
32
-    /**
33
-     * Return (and generate) the key to be used for the encryption step
34
-     *
35
-     * @return string Encryption key
36
-     */
37
-    protected function encryptionKey(): string
38
-    {
39
-        if ($this->encryption_key === null) {
40
-            /** @var ServerRequestInterface $request **/
41
-            $request = app(ServerRequestInterface::class);
42
-            $server_name = $request->getServerParams()['SERVER_NAME'] ?? '';
43
-            $server_software = $request->getServerParams()['SERVER_SOFTWARE'] ?? '';
44
-            $this->encryption_key = str_pad(md5(
45
-                $server_name !== '' && $server_software !== '' ?
46
-                $server_name . $server_software :
47
-                'STANDARDKEYIFNOSERVER'
48
-            ), SODIUM_CRYPTO_SECRETBOX_KEYBYTES, "1234567890ABCDEF");
49
-        }
50
-        return $this->encryption_key;
51
-    }
52
-
53
-    /**
54
-     * Obfuscate a clear text, with a combination of encryption and base64 encoding.
55
-     * The return string is URL-safe.
56
-     *
57
-     * @param string $cleartext Text to obfuscate
58
-     * @param string $key
59
-     * @param string $nonce
60
-     * @return string
61
-     */
62
-    public function obfuscate(string $cleartext, string $key = '', string $nonce = ''): string
63
-    {
64
-        if ($nonce === '') {
65
-            $nonce = random_bytes(SODIUM_CRYPTO_SECRETBOX_NONCEBYTES);
66
-        }
67
-        if ($key === '') {
68
-            $key = $this->encryptionKey();
69
-        }
70
-
71
-        if (strlen($nonce) !== SODIUM_CRYPTO_SECRETBOX_NONCEBYTES) {
72
-            throw new InvalidArgumentException('The nonce needs to be SODIUM_CRYPTO_SECRETBOX_NONCEBYTES long');
73
-        }
74
-
75
-        if (strlen($key) !== SODIUM_CRYPTO_SECRETBOX_KEYBYTES) {
76
-            throw new InvalidArgumentException('The key needs to be SODIUM_CRYPTO_SECRETBOX_KEYBYTES long');
77
-        }
78
-
79
-        \Fisharebest\Webtrees\DebugBar::addMessage($key);
80
-        $encryted = sodium_crypto_secretbox($cleartext, $nonce, $key);
81
-        return strtr(base64_encode($nonce . $encryted), '+/=', '._-');
82
-    }
83
-
84
-    /**
85
-     * Deobfuscate a string from an URL to a clear text.
86
-     *
87
-     * @param string $obfuscated Text to deobfuscate
88
-     * @param string $key
89
-     * @throws InvalidArgumentException
90
-     * @return string
91
-     */
92
-    public function deobfuscate(string $obfuscated, string $key = ''): string
93
-    {
94
-        $obfuscated = strtr($obfuscated, '._-', '+/=');
95
-        if ($key === '') {
96
-            $key = $this->encryptionKey();
97
-        }
98
-
99
-        if (strlen($key) !== SODIUM_CRYPTO_SECRETBOX_KEYBYTES) {
100
-            throw new InvalidArgumentException('The key needs to be SODIUM_CRYPTO_SECRETBOX_KEYBYTES long');
101
-        }
102
-
103
-        $encrypted = base64_decode($obfuscated, true);
104
-        if ($encrypted === false) {
105
-            throw new InvalidArgumentException('The encrypted value is not in correct base64 format.');
106
-        }
107
-
108
-        if (mb_strlen($encrypted, '8bit') < (SODIUM_CRYPTO_SECRETBOX_NONCEBYTES + SODIUM_CRYPTO_SECRETBOX_MACBYTES)) {
109
-            throw new InvalidArgumentException('The encrypted value does not contain enough characters for the key.');
110
-        }
111
-
112
-        $nonce = mb_substr($encrypted, 0, SODIUM_CRYPTO_SECRETBOX_NONCEBYTES, '8bit');
113
-        $ciphertext = mb_substr($encrypted, SODIUM_CRYPTO_SECRETBOX_NONCEBYTES, null, '8bit');
114
-
115
-        $decrypted = sodium_crypto_secretbox_open($ciphertext, $nonce, $key);
116
-
117
-        if ($decrypted === false) {
118
-            throw new InvalidArgumentException('The message has been tampered with in transit.');
119
-        }
120
-
121
-        //sodium_memzero($ciphertext);    // sodium_compat cannot handle it, only through libsodium
122
-
123
-        /** @var string $decrypted - Psalm detect as string|true otherwise */
124
-        return $decrypted;
125
-    }
126
-
127
-    /**
128
-     * Try to deobfuscate a string from an URL to a clear text, returning whether the operation is a success.
129
-     *
130
-     * @param string $obfuscated Text to deobfuscate
131
-     * @param string $key
132
-     * @return bool
133
-     */
134
-    public function tryDeobfuscate(string &$obfuscated, string $key = ''): bool
135
-    {
136
-        try {
137
-            $obfuscated = $this->deobfuscate($obfuscated, $key);
138
-            return true;
139
-        } catch (InvalidArgumentException $ex) {
140
-        }
141
-        return false;
142
-    }
26
+	/**
27
+	 * @var string|null $encryption_key
28
+	 */
29
+	private $encryption_key;
30
+
31
+
32
+	/**
33
+	 * Return (and generate) the key to be used for the encryption step
34
+	 *
35
+	 * @return string Encryption key
36
+	 */
37
+	protected function encryptionKey(): string
38
+	{
39
+		if ($this->encryption_key === null) {
40
+			/** @var ServerRequestInterface $request **/
41
+			$request = app(ServerRequestInterface::class);
42
+			$server_name = $request->getServerParams()['SERVER_NAME'] ?? '';
43
+			$server_software = $request->getServerParams()['SERVER_SOFTWARE'] ?? '';
44
+			$this->encryption_key = str_pad(md5(
45
+				$server_name !== '' && $server_software !== '' ?
46
+				$server_name . $server_software :
47
+				'STANDARDKEYIFNOSERVER'
48
+			), SODIUM_CRYPTO_SECRETBOX_KEYBYTES, "1234567890ABCDEF");
49
+		}
50
+		return $this->encryption_key;
51
+	}
52
+
53
+	/**
54
+	 * Obfuscate a clear text, with a combination of encryption and base64 encoding.
55
+	 * The return string is URL-safe.
56
+	 *
57
+	 * @param string $cleartext Text to obfuscate
58
+	 * @param string $key
59
+	 * @param string $nonce
60
+	 * @return string
61
+	 */
62
+	public function obfuscate(string $cleartext, string $key = '', string $nonce = ''): string
63
+	{
64
+		if ($nonce === '') {
65
+			$nonce = random_bytes(SODIUM_CRYPTO_SECRETBOX_NONCEBYTES);
66
+		}
67
+		if ($key === '') {
68
+			$key = $this->encryptionKey();
69
+		}
70
+
71
+		if (strlen($nonce) !== SODIUM_CRYPTO_SECRETBOX_NONCEBYTES) {
72
+			throw new InvalidArgumentException('The nonce needs to be SODIUM_CRYPTO_SECRETBOX_NONCEBYTES long');
73
+		}
74
+
75
+		if (strlen($key) !== SODIUM_CRYPTO_SECRETBOX_KEYBYTES) {
76
+			throw new InvalidArgumentException('The key needs to be SODIUM_CRYPTO_SECRETBOX_KEYBYTES long');
77
+		}
78
+
79
+		\Fisharebest\Webtrees\DebugBar::addMessage($key);
80
+		$encryted = sodium_crypto_secretbox($cleartext, $nonce, $key);
81
+		return strtr(base64_encode($nonce . $encryted), '+/=', '._-');
82
+	}
83
+
84
+	/**
85
+	 * Deobfuscate a string from an URL to a clear text.
86
+	 *
87
+	 * @param string $obfuscated Text to deobfuscate
88
+	 * @param string $key
89
+	 * @throws InvalidArgumentException
90
+	 * @return string
91
+	 */
92
+	public function deobfuscate(string $obfuscated, string $key = ''): string
93
+	{
94
+		$obfuscated = strtr($obfuscated, '._-', '+/=');
95
+		if ($key === '') {
96
+			$key = $this->encryptionKey();
97
+		}
98
+
99
+		if (strlen($key) !== SODIUM_CRYPTO_SECRETBOX_KEYBYTES) {
100
+			throw new InvalidArgumentException('The key needs to be SODIUM_CRYPTO_SECRETBOX_KEYBYTES long');
101
+		}
102
+
103
+		$encrypted = base64_decode($obfuscated, true);
104
+		if ($encrypted === false) {
105
+			throw new InvalidArgumentException('The encrypted value is not in correct base64 format.');
106
+		}
107
+
108
+		if (mb_strlen($encrypted, '8bit') < (SODIUM_CRYPTO_SECRETBOX_NONCEBYTES + SODIUM_CRYPTO_SECRETBOX_MACBYTES)) {
109
+			throw new InvalidArgumentException('The encrypted value does not contain enough characters for the key.');
110
+		}
111
+
112
+		$nonce = mb_substr($encrypted, 0, SODIUM_CRYPTO_SECRETBOX_NONCEBYTES, '8bit');
113
+		$ciphertext = mb_substr($encrypted, SODIUM_CRYPTO_SECRETBOX_NONCEBYTES, null, '8bit');
114
+
115
+		$decrypted = sodium_crypto_secretbox_open($ciphertext, $nonce, $key);
116
+
117
+		if ($decrypted === false) {
118
+			throw new InvalidArgumentException('The message has been tampered with in transit.');
119
+		}
120
+
121
+		//sodium_memzero($ciphertext);    // sodium_compat cannot handle it, only through libsodium
122
+
123
+		/** @var string $decrypted - Psalm detect as string|true otherwise */
124
+		return $decrypted;
125
+	}
126
+
127
+	/**
128
+	 * Try to deobfuscate a string from an URL to a clear text, returning whether the operation is a success.
129
+	 *
130
+	 * @param string $obfuscated Text to deobfuscate
131
+	 * @param string $key
132
+	 * @return bool
133
+	 */
134
+	public function tryDeobfuscate(string &$obfuscated, string $key = ''): bool
135
+	{
136
+		try {
137
+			$obfuscated = $this->deobfuscate($obfuscated, $key);
138
+			return true;
139
+		} catch (InvalidArgumentException $ex) {
140
+		}
141
+		return false;
142
+	}
143 143
 }
Please login to merge, or discard this patch.
src/Webtrees/Module/Certificates/Services/CertificateDataService.php 1 patch
Indentation   +131 added lines, -131 removed lines patch added patch discarded remove patch
@@ -29,143 +29,143 @@
 block discarded – undo
29 29
 class CertificateDataService
30 30
 {
31 31
 
32
-    /**
33
-     * Find individuals linked to a certificate.
34
-     *
35
-     * {@internal Ideally, the underscore should be escaped in the WHERE clause,
36
-     * but does not work with Sqlite if no default escape has been defined}
37
-     *
38
-     * @param Certificate $certificate
39
-     * @return Collection
40
-     */
41
-    public function linkedIndividuals(Certificate $certificate): Collection
42
-    {
43
-        $tree = $certificate->tree();
44
-        return DB::table('individuals')
45
-            ->where('i_file', '=', $tree->id())
46
-            ->where('i_gedcom', 'like', '% _ACT ' . $this->escapedSqlPath($certificate) . '%')
47
-            ->select(['individuals.*'])
48
-            ->get()
49
-            ->map(Registry::individualFactory()->mapper($tree))
50
-            ->filter(GedcomRecord::accessFilter());
51
-    }
32
+	/**
33
+	 * Find individuals linked to a certificate.
34
+	 *
35
+	 * {@internal Ideally, the underscore should be escaped in the WHERE clause,
36
+	 * but does not work with Sqlite if no default escape has been defined}
37
+	 *
38
+	 * @param Certificate $certificate
39
+	 * @return Collection
40
+	 */
41
+	public function linkedIndividuals(Certificate $certificate): Collection
42
+	{
43
+		$tree = $certificate->tree();
44
+		return DB::table('individuals')
45
+			->where('i_file', '=', $tree->id())
46
+			->where('i_gedcom', 'like', '% _ACT ' . $this->escapedSqlPath($certificate) . '%')
47
+			->select(['individuals.*'])
48
+			->get()
49
+			->map(Registry::individualFactory()->mapper($tree))
50
+			->filter(GedcomRecord::accessFilter());
51
+	}
52 52
 
53
-    /**
54
-     * Find families linked to a certificate.
55
-     *
56
-     * {@internal Ideally, the underscore should be escaped in the WHERE clause,
57
-     * but does not work with Sqlite if no default escape has been defined}
58
-     *
59
-     * @param Certificate $certificate
60
-     * @return Collection
61
-     */
62
-    public function linkedFamilies(Certificate $certificate): Collection
63
-    {
64
-        $tree = $certificate->tree();
65
-        return DB::table('families')
66
-            ->where('f_file', '=', $tree->id())
67
-            ->where('f_gedcom', 'like', '% _ACT ' . $this->escapedSqlPath($certificate) . '%')
68
-            ->select(['families.*'])
69
-            ->get()
70
-            ->map(Registry::familyFactory()->mapper($tree))
71
-            ->filter(GedcomRecord::accessFilter());
72
-    }
53
+	/**
54
+	 * Find families linked to a certificate.
55
+	 *
56
+	 * {@internal Ideally, the underscore should be escaped in the WHERE clause,
57
+	 * but does not work with Sqlite if no default escape has been defined}
58
+	 *
59
+	 * @param Certificate $certificate
60
+	 * @return Collection
61
+	 */
62
+	public function linkedFamilies(Certificate $certificate): Collection
63
+	{
64
+		$tree = $certificate->tree();
65
+		return DB::table('families')
66
+			->where('f_file', '=', $tree->id())
67
+			->where('f_gedcom', 'like', '% _ACT ' . $this->escapedSqlPath($certificate) . '%')
68
+			->select(['families.*'])
69
+			->get()
70
+			->map(Registry::familyFactory()->mapper($tree))
71
+			->filter(GedcomRecord::accessFilter());
72
+	}
73 73
 
74
-    /**
75
-     * Find media objects linked to a certificate.
76
-     *
77
-     * {@internal Ideally, the underscore should be escaped in the WHERE clause,
78
-     * but does not work with Sqlite if no default escape has been defined}
79
-     *
80
-     * @param Certificate $certificate
81
-     * @return Collection
82
-     */
83
-    public function linkedMedias(Certificate $certificate): Collection
84
-    {
85
-        $tree = $certificate->tree();
86
-        return DB::table('media')
87
-            ->where('m_file', '=', $tree->id())
88
-            ->where('m_gedcom', 'like', '% _ACT ' . $this->escapedSqlPath($certificate) . '%')
89
-            ->select(['media.*'])
90
-            ->get()
91
-            ->map(Registry::mediaFactory()->mapper($tree))
92
-            ->filter(GedcomRecord::accessFilter());
93
-    }
74
+	/**
75
+	 * Find media objects linked to a certificate.
76
+	 *
77
+	 * {@internal Ideally, the underscore should be escaped in the WHERE clause,
78
+	 * but does not work with Sqlite if no default escape has been defined}
79
+	 *
80
+	 * @param Certificate $certificate
81
+	 * @return Collection
82
+	 */
83
+	public function linkedMedias(Certificate $certificate): Collection
84
+	{
85
+		$tree = $certificate->tree();
86
+		return DB::table('media')
87
+			->where('m_file', '=', $tree->id())
88
+			->where('m_gedcom', 'like', '% _ACT ' . $this->escapedSqlPath($certificate) . '%')
89
+			->select(['media.*'])
90
+			->get()
91
+			->map(Registry::mediaFactory()->mapper($tree))
92
+			->filter(GedcomRecord::accessFilter());
93
+	}
94 94
 
95
-    /**
96
-     * Find notes linked to a certificate.
97
-     *
98
-     * {@internal Ideally, the underscore should be escaped in the WHERE clause,
99
-     * but does not work with Sqlite if no default escape has been defined}
100
-     *
101
-     * @param Certificate $certificate
102
-     * @return Collection
103
-     */
104
-    public function linkedNotes(Certificate $certificate): Collection
105
-    {
106
-        $tree = $certificate->tree();
107
-        return DB::table('other')
108
-            ->where('o_file', '=', $tree->id())
109
-            ->where('o_type', '=', 'NOTE')
110
-            ->where('o_gedcom', 'like', '% _ACT ' . $this->escapedSqlPath($certificate) . '%')
111
-            ->select(['other.*'])
112
-            ->get()
113
-            ->map(Registry::noteFactory()->mapper($tree))
114
-            ->filter(GedcomRecord::accessFilter());
115
-    }
95
+	/**
96
+	 * Find notes linked to a certificate.
97
+	 *
98
+	 * {@internal Ideally, the underscore should be escaped in the WHERE clause,
99
+	 * but does not work with Sqlite if no default escape has been defined}
100
+	 *
101
+	 * @param Certificate $certificate
102
+	 * @return Collection
103
+	 */
104
+	public function linkedNotes(Certificate $certificate): Collection
105
+	{
106
+		$tree = $certificate->tree();
107
+		return DB::table('other')
108
+			->where('o_file', '=', $tree->id())
109
+			->where('o_type', '=', 'NOTE')
110
+			->where('o_gedcom', 'like', '% _ACT ' . $this->escapedSqlPath($certificate) . '%')
111
+			->select(['other.*'])
112
+			->get()
113
+			->map(Registry::noteFactory()->mapper($tree))
114
+			->filter(GedcomRecord::accessFilter());
115
+	}
116 116
 
117
-    /**
118
-     * Return an escaped string to be used in SQL LIKE comparisons.
119
-     * This would not work well for Sqlite, if the escape character is not defined.
120
-     *
121
-     * @param Certificate $certificate
122
-     * @return string
123
-     */
124
-    protected function escapedSqlPath(Certificate $certificate): string
125
-    {
126
-        return str_replace(array('\\', '%', '_'), array('\\\\', '\\%', '\\_'), $certificate->gedcomPath());
127
-    }
117
+	/**
118
+	 * Return an escaped string to be used in SQL LIKE comparisons.
119
+	 * This would not work well for Sqlite, if the escape character is not defined.
120
+	 *
121
+	 * @param Certificate $certificate
122
+	 * @return string
123
+	 */
124
+	protected function escapedSqlPath(Certificate $certificate): string
125
+	{
126
+		return str_replace(array('\\', '%', '_'), array('\\\\', '\\%', '\\_'), $certificate->gedcomPath());
127
+	}
128 128
 
129
-    /**
130
-     * Find a source linked to a citation where a certificate file is referenced.
131
-     *
132
-     * @param Certificate $certificate
133
-     * @return Source|NULL
134
-     */
135
-    public function oneLinkedSource(Certificate $certificate): ?Source
136
-    {
137
-        $regex_query = preg_quote($certificate->gedcomPath(), '/');
138
-        $regex_pattern = '/[1-9] SOUR @(' . Gedcom::REGEX_XREF . ')@(?:\n[2-9]\s(?:(?!SOUR)\w+)\s.*)*\n[2-9] _ACT ' . $regex_query . '/i'; //phpcs:ignore Generic.Files.LineLength.TooLong
129
+	/**
130
+	 * Find a source linked to a citation where a certificate file is referenced.
131
+	 *
132
+	 * @param Certificate $certificate
133
+	 * @return Source|NULL
134
+	 */
135
+	public function oneLinkedSource(Certificate $certificate): ?Source
136
+	{
137
+		$regex_query = preg_quote($certificate->gedcomPath(), '/');
138
+		$regex_pattern = '/[1-9] SOUR @(' . Gedcom::REGEX_XREF . ')@(?:\n[2-9]\s(?:(?!SOUR)\w+)\s.*)*\n[2-9] _ACT ' . $regex_query . '/i'; //phpcs:ignore Generic.Files.LineLength.TooLong
139 139
 
140
-        foreach ($this->linkedRecordsLists($certificate) as $linked_records) {
141
-            foreach ($linked_records as $gedcom_record) {
142
-                foreach ($gedcom_record->facts() as $fact) {
143
-                    if (preg_match_all($regex_pattern, $fact->gedcom(), $matches, PREG_SET_ORDER) >= 1) {
144
-                        foreach ($matches as $match) {
145
-                            $source = Registry::sourceFactory()->make($match[1], $certificate->tree());
146
-                            if ($source !== null && $source->canShowName()) {
147
-                                return $source;
148
-                            }
149
-                        }
150
-                    }
151
-                }
152
-            }
153
-        }
140
+		foreach ($this->linkedRecordsLists($certificate) as $linked_records) {
141
+			foreach ($linked_records as $gedcom_record) {
142
+				foreach ($gedcom_record->facts() as $fact) {
143
+					if (preg_match_all($regex_pattern, $fact->gedcom(), $matches, PREG_SET_ORDER) >= 1) {
144
+						foreach ($matches as $match) {
145
+							$source = Registry::sourceFactory()->make($match[1], $certificate->tree());
146
+							if ($source !== null && $source->canShowName()) {
147
+								return $source;
148
+							}
149
+						}
150
+					}
151
+				}
152
+			}
153
+		}
154 154
 
155
-        return null;
156
-    }
155
+		return null;
156
+	}
157 157
 
158
-    /**
159
-     * Yield lists of gedcom records linked to a certificate.
160
-     *
161
-     * @param Certificate $certificate
162
-     * @return Generator
163
-     */
164
-    protected function linkedRecordsLists(Certificate $certificate): Generator
165
-    {
166
-        yield $this->linkedIndividuals($certificate);
167
-        yield $this->linkedFamilies($certificate);
168
-        yield $this->linkedMedias($certificate);
169
-        yield $this->linkedNotes($certificate);
170
-    }
158
+	/**
159
+	 * Yield lists of gedcom records linked to a certificate.
160
+	 *
161
+	 * @param Certificate $certificate
162
+	 * @return Generator
163
+	 */
164
+	protected function linkedRecordsLists(Certificate $certificate): Generator
165
+	{
166
+		yield $this->linkedIndividuals($certificate);
167
+		yield $this->linkedFamilies($certificate);
168
+		yield $this->linkedMedias($certificate);
169
+		yield $this->linkedNotes($certificate);
170
+	}
171 171
 }
Please login to merge, or discard this patch.
src/Webtrees/Module/Certificates/Factories/CertificateImageFactory.php 1 patch
Indentation   +159 added lines, -159 removed lines patch added patch discarded remove patch
@@ -39,163 +39,163 @@
 block discarded – undo
39 39
  */
40 40
 class CertificateImageFactory extends ImageFactory implements ImageFactoryInterface
41 41
 {
42
-    /**
43
-     * @var CertificateFilesystemService $filesystem_service
44
-     */
45
-    private $filesystem_service;
46
-
47
-    /**
48
-     * Constructor for the Certificate Image Factory
49
-     *
50
-     * @param CertificateFilesystemService $filesystem_service
51
-     */
52
-    public function __construct(CertificateFilesystemService $filesystem_service)
53
-    {
54
-        $this->filesystem_service = $filesystem_service;
55
-    }
56
-
57
-    /**
58
-     * Check is a file MIME type is supported by the system.
59
-     *
60
-     * @param string $mime
61
-     * @return bool
62
-     */
63
-    public function isMimeTypeSupported(string $mime): bool
64
-    {
65
-        return array_key_exists($mime, self::INTERVENTION_FORMATS);
66
-    }
67
-
68
-    /**
69
-     * Create a full-size version of a certificate.
70
-     *
71
-     * @param Certificate $certificate
72
-     * @param bool $add_watermark
73
-     * @param Watermark $watermark
74
-     * @throws InvalidArgumentException
75
-     * @return ResponseInterface
76
-     */
77
-    public function certificateFileResponse(
78
-        Certificate $certificate,
79
-        bool $add_watermark = false,
80
-        Watermark $watermark = null
81
-    ): ResponseInterface {
82
-        $filesystem =  $this->filesystem_service->filesystem($certificate->tree());
83
-        $filename   = $certificate->path();
84
-
85
-        if (!$add_watermark) {
86
-            return $this->fileResponse($filesystem, $filename, false);
87
-        }
88
-
89
-        try {
90
-            $image = $this->imageManager()->make($filesystem->readStream($filename));
91
-            $image = $this->autorotateImage($image);
92
-
93
-            if ($watermark == null) {
94
-                throw new InvalidArgumentException('Watermark data not defined');
95
-            }
96
-
97
-            $width = $image->width();
98
-            $height = $image->height();
99
-
100
-            $watermark->adjustSize($width);
101
-            $watermark_x = (int) ceil($watermark->textLengthEstimate() * 1.5);
102
-            $watermark_y = $watermark->size() * 12 + 1;
103
-
104
-            $font_definition = function (AbstractFont $font) use ($watermark): void {
105
-                $font->file(Webtrees::ROOT_DIR . 'resources/fonts/DejaVuSans.ttf');
106
-                $font->color($watermark->color());
107
-                $font->size($watermark->size());
108
-                $font->valign('top');
109
-            };
110
-
111
-            for ($i = min((int) ceil($width * 0.1), $watermark_x); $i < $width; $i += $watermark_x) {
112
-                for ($j = min((int) ceil($height * 0.1), $watermark_y); $j < $height; $j += $watermark_y) {
113
-                    $image = $image->text($watermark->text(), $i, $j, $font_definition);
114
-                }
115
-            }
116
-
117
-            $format  = static::INTERVENTION_FORMATS[$image->mime()] ?? 'jpg';
118
-            $quality = $this->extractImageQuality($image, static::GD_DEFAULT_IMAGE_QUALITY);
119
-            $data    = (string) $image->encode($format, $quality);
120
-
121
-            return $this->imageResponse($data, $image->mime(), '');
122
-        } catch (NotReadableException $ex) {
123
-            return $this->replacementImageResponse(pathinfo($filename, PATHINFO_EXTENSION))
124
-            ->withHeader('X-Image-Exception', $ex->getMessage());
125
-        } catch (FilesystemException | UnableToReadFile $ex) {
126
-            return $this->replacementImageResponse((string) StatusCodeInterface::STATUS_NOT_FOUND);
127
-        } catch (Throwable $ex) {
128
-            return $this->replacementImageResponse((string) StatusCodeInterface::STATUS_INTERNAL_SERVER_ERROR)
129
-            ->withHeader('X-Image-Exception', $ex->getMessage());
130
-        }
131
-    }
132
-
133
-    /**
134
-     * Does a full-sized certificate need a watermark?
135
-     *
136
-     * @param Certificate $certificate
137
-     * @param UserInterface $user
138
-     * @return bool
139
-     */
140
-    public function certificateNeedsWatermark(Certificate $certificate, UserInterface $user): bool
141
-    {
142
-        $tree = $certificate->tree();
143
-
144
-        return Auth::accessLevel($tree, $user) > $tree->getPreference('MAJ_CERTIF_SHOW_NO_WATERMARK');
145
-    }
146
-
147
-    /**
148
-     * Neutralise the methods associated with MediaFile.
149
-     */
150
-
151
-    /**
152
-     * {@inheritDoc}
153
-     * @see \Fisharebest\Webtrees\Factories\ImageFactory::mediaFileResponse()
154
-     */
155
-    public function mediaFileResponse(MediaFile $media_file, bool $add_watermark, bool $download): ResponseInterface
156
-    {
157
-        throw new BadMethodCallException("Invalid method for Certificates");
158
-    }
159
-
160
-    /**
161
-     * {@inheritDoc}
162
-     * @see \Fisharebest\Webtrees\Factories\ImageFactory::mediaFileThumbnailResponse()
163
-     */
164
-    public function mediaFileThumbnailResponse(
165
-        MediaFile $media_file,
166
-        int $width,
167
-        int $height,
168
-        string $fit,
169
-        bool $add_watermark
170
-    ): ResponseInterface {
171
-        throw new BadMethodCallException("Invalid method for Certificates");
172
-    }
173
-
174
-    /**
175
-     * {@inheritDoc}
176
-     * @see \Fisharebest\Webtrees\Factories\ImageFactory::createWatermark()
177
-     */
178
-    public function createWatermark(int $width, int $height, MediaFile $media_file): Image
179
-    {
180
-
181
-        throw new BadMethodCallException("Invalid method for Certificates");
182
-    }
183
-
184
-    /**
185
-     * {@inheritDoc}
186
-     * @see \Fisharebest\Webtrees\Factories\ImageFactory::fileNeedsWatermark()
187
-     */
188
-    public function fileNeedsWatermark(MediaFile $media_file, UserInterface $user): bool
189
-    {
190
-        throw new BadMethodCallException("Invalid method for Certificates");
191
-    }
192
-
193
-    /**
194
-     * {@inheritDoc}
195
-     * @see \Fisharebest\Webtrees\Factories\ImageFactory::thumbnailNeedsWatermark()
196
-     */
197
-    public function thumbnailNeedsWatermark(MediaFile $media_file, UserInterface $user): bool
198
-    {
199
-        throw new BadMethodCallException("Invalid method for Certificates");
200
-    }
42
+	/**
43
+	 * @var CertificateFilesystemService $filesystem_service
44
+	 */
45
+	private $filesystem_service;
46
+
47
+	/**
48
+	 * Constructor for the Certificate Image Factory
49
+	 *
50
+	 * @param CertificateFilesystemService $filesystem_service
51
+	 */
52
+	public function __construct(CertificateFilesystemService $filesystem_service)
53
+	{
54
+		$this->filesystem_service = $filesystem_service;
55
+	}
56
+
57
+	/**
58
+	 * Check is a file MIME type is supported by the system.
59
+	 *
60
+	 * @param string $mime
61
+	 * @return bool
62
+	 */
63
+	public function isMimeTypeSupported(string $mime): bool
64
+	{
65
+		return array_key_exists($mime, self::INTERVENTION_FORMATS);
66
+	}
67
+
68
+	/**
69
+	 * Create a full-size version of a certificate.
70
+	 *
71
+	 * @param Certificate $certificate
72
+	 * @param bool $add_watermark
73
+	 * @param Watermark $watermark
74
+	 * @throws InvalidArgumentException
75
+	 * @return ResponseInterface
76
+	 */
77
+	public function certificateFileResponse(
78
+		Certificate $certificate,
79
+		bool $add_watermark = false,
80
+		Watermark $watermark = null
81
+	): ResponseInterface {
82
+		$filesystem =  $this->filesystem_service->filesystem($certificate->tree());
83
+		$filename   = $certificate->path();
84
+
85
+		if (!$add_watermark) {
86
+			return $this->fileResponse($filesystem, $filename, false);
87
+		}
88
+
89
+		try {
90
+			$image = $this->imageManager()->make($filesystem->readStream($filename));
91
+			$image = $this->autorotateImage($image);
92
+
93
+			if ($watermark == null) {
94
+				throw new InvalidArgumentException('Watermark data not defined');
95
+			}
96
+
97
+			$width = $image->width();
98
+			$height = $image->height();
99
+
100
+			$watermark->adjustSize($width);
101
+			$watermark_x = (int) ceil($watermark->textLengthEstimate() * 1.5);
102
+			$watermark_y = $watermark->size() * 12 + 1;
103
+
104
+			$font_definition = function (AbstractFont $font) use ($watermark): void {
105
+				$font->file(Webtrees::ROOT_DIR . 'resources/fonts/DejaVuSans.ttf');
106
+				$font->color($watermark->color());
107
+				$font->size($watermark->size());
108
+				$font->valign('top');
109
+			};
110
+
111
+			for ($i = min((int) ceil($width * 0.1), $watermark_x); $i < $width; $i += $watermark_x) {
112
+				for ($j = min((int) ceil($height * 0.1), $watermark_y); $j < $height; $j += $watermark_y) {
113
+					$image = $image->text($watermark->text(), $i, $j, $font_definition);
114
+				}
115
+			}
116
+
117
+			$format  = static::INTERVENTION_FORMATS[$image->mime()] ?? 'jpg';
118
+			$quality = $this->extractImageQuality($image, static::GD_DEFAULT_IMAGE_QUALITY);
119
+			$data    = (string) $image->encode($format, $quality);
120
+
121
+			return $this->imageResponse($data, $image->mime(), '');
122
+		} catch (NotReadableException $ex) {
123
+			return $this->replacementImageResponse(pathinfo($filename, PATHINFO_EXTENSION))
124
+			->withHeader('X-Image-Exception', $ex->getMessage());
125
+		} catch (FilesystemException | UnableToReadFile $ex) {
126
+			return $this->replacementImageResponse((string) StatusCodeInterface::STATUS_NOT_FOUND);
127
+		} catch (Throwable $ex) {
128
+			return $this->replacementImageResponse((string) StatusCodeInterface::STATUS_INTERNAL_SERVER_ERROR)
129
+			->withHeader('X-Image-Exception', $ex->getMessage());
130
+		}
131
+	}
132
+
133
+	/**
134
+	 * Does a full-sized certificate need a watermark?
135
+	 *
136
+	 * @param Certificate $certificate
137
+	 * @param UserInterface $user
138
+	 * @return bool
139
+	 */
140
+	public function certificateNeedsWatermark(Certificate $certificate, UserInterface $user): bool
141
+	{
142
+		$tree = $certificate->tree();
143
+
144
+		return Auth::accessLevel($tree, $user) > $tree->getPreference('MAJ_CERTIF_SHOW_NO_WATERMARK');
145
+	}
146
+
147
+	/**
148
+	 * Neutralise the methods associated with MediaFile.
149
+	 */
150
+
151
+	/**
152
+	 * {@inheritDoc}
153
+	 * @see \Fisharebest\Webtrees\Factories\ImageFactory::mediaFileResponse()
154
+	 */
155
+	public function mediaFileResponse(MediaFile $media_file, bool $add_watermark, bool $download): ResponseInterface
156
+	{
157
+		throw new BadMethodCallException("Invalid method for Certificates");
158
+	}
159
+
160
+	/**
161
+	 * {@inheritDoc}
162
+	 * @see \Fisharebest\Webtrees\Factories\ImageFactory::mediaFileThumbnailResponse()
163
+	 */
164
+	public function mediaFileThumbnailResponse(
165
+		MediaFile $media_file,
166
+		int $width,
167
+		int $height,
168
+		string $fit,
169
+		bool $add_watermark
170
+	): ResponseInterface {
171
+		throw new BadMethodCallException("Invalid method for Certificates");
172
+	}
173
+
174
+	/**
175
+	 * {@inheritDoc}
176
+	 * @see \Fisharebest\Webtrees\Factories\ImageFactory::createWatermark()
177
+	 */
178
+	public function createWatermark(int $width, int $height, MediaFile $media_file): Image
179
+	{
180
+
181
+		throw new BadMethodCallException("Invalid method for Certificates");
182
+	}
183
+
184
+	/**
185
+	 * {@inheritDoc}
186
+	 * @see \Fisharebest\Webtrees\Factories\ImageFactory::fileNeedsWatermark()
187
+	 */
188
+	public function fileNeedsWatermark(MediaFile $media_file, UserInterface $user): bool
189
+	{
190
+		throw new BadMethodCallException("Invalid method for Certificates");
191
+	}
192
+
193
+	/**
194
+	 * {@inheritDoc}
195
+	 * @see \Fisharebest\Webtrees\Factories\ImageFactory::thumbnailNeedsWatermark()
196
+	 */
197
+	public function thumbnailNeedsWatermark(MediaFile $media_file, UserInterface $user): bool
198
+	{
199
+		throw new BadMethodCallException("Invalid method for Certificates");
200
+	}
201 201
 }
Please login to merge, or discard this patch.
src/Webtrees/Module/GeoDispersion/Model/MapAdapterResult.php 1 patch
Indentation   +48 added lines, -48 removed lines patch added patch discarded remove patch
@@ -24,57 +24,57 @@
 block discarded – undo
24 24
  */
25 25
 class MapAdapterResult
26 26
 {
27
-    private GeoAnalysisResult $result;
27
+	private GeoAnalysisResult $result;
28 28
 
29
-    /**
30
-     * @var \Brick\Geo\IO\GeoJSON\Feature[] $features
31
-     */
32
-    private array $features;
29
+	/**
30
+	 * @var \Brick\Geo\IO\GeoJSON\Feature[] $features
31
+	 */
32
+	private array $features;
33 33
 
34
-    /**
35
-     * Constructor for MapAdapterResult
36
-     *
37
-     * @param GeoAnalysisResult $result
38
-     * @param \Brick\Geo\IO\GeoJSON\Feature[] $features
39
-     */
40
-    final public function __construct(GeoAnalysisResult $result, array $features)
41
-    {
42
-        $this->result = $result;
43
-        $this->features = $features;
44
-    }
34
+	/**
35
+	 * Constructor for MapAdapterResult
36
+	 *
37
+	 * @param GeoAnalysisResult $result
38
+	 * @param \Brick\Geo\IO\GeoJSON\Feature[] $features
39
+	 */
40
+	final public function __construct(GeoAnalysisResult $result, array $features)
41
+	{
42
+		$this->result = $result;
43
+		$this->features = $features;
44
+	}
45 45
 
46
-    /**
47
-     * Get the GeoAnalysisResult after mapping of the places
48
-     *
49
-     * @return GeoAnalysisResult
50
-     */
51
-    public function geoAnalysisResult(): GeoAnalysisResult
52
-    {
53
-        return $this->result;
54
-    }
46
+	/**
47
+	 * Get the GeoAnalysisResult after mapping of the places
48
+	 *
49
+	 * @return GeoAnalysisResult
50
+	 */
51
+	public function geoAnalysisResult(): GeoAnalysisResult
52
+	{
53
+		return $this->result;
54
+	}
55 55
 
56
-    /**
57
-     * Get the list of features to display on the map
58
-     *
59
-     * @return \Brick\Geo\IO\GeoJSON\Feature[]
60
-     */
61
-    public function features(): array
62
-    {
63
-        return $this->features;
64
-    }
56
+	/**
57
+	 * Get the list of features to display on the map
58
+	 *
59
+	 * @return \Brick\Geo\IO\GeoJSON\Feature[]
60
+	 */
61
+	public function features(): array
62
+	{
63
+		return $this->features;
64
+	}
65 65
 
66
-    /**
67
-     * Merge the current MapAdapter with another.
68
-     * The current object is modified, not the second one.
69
-     *
70
-     * @param MapAdapterResult $other
71
-     * @return self
72
-     */
73
-    public function merge(MapAdapterResult $other): self
74
-    {
75
-        return new static(
76
-            $this->result->merge($other->result),
77
-            array_merge($this->features, $other->features)
78
-        );
79
-    }
66
+	/**
67
+	 * Merge the current MapAdapter with another.
68
+	 * The current object is modified, not the second one.
69
+	 *
70
+	 * @param MapAdapterResult $other
71
+	 * @return self
72
+	 */
73
+	public function merge(MapAdapterResult $other): self
74
+	{
75
+		return new static(
76
+			$this->result->merge($other->result),
77
+			array_merge($this->features, $other->features)
78
+		);
79
+	}
80 80
 }
Please login to merge, or discard this patch.