@@ -48,10 +48,10 @@ |
||
48 | 48 | * @param $type string |
49 | 49 | * @return array |
50 | 50 | */ |
51 | - public function add($subject,$subjectParams=array(), |
|
52 | - $message='',$messageParams=array(), |
|
53 | - $link='',$user=null,$type='') { |
|
54 | - if($user) { |
|
51 | + public function add($subject, $subjectParams = array(), |
|
52 | + $message = '', $messageParams = array(), |
|
53 | + $link = '', $user = null, $type = '') { |
|
54 | + if ($user) { |
|
55 | 55 | $activity = $this->manager->generateEvent(); |
56 | 56 | $activity->setType($type); |
57 | 57 | $activity->setApp('passman'); |
@@ -51,17 +51,17 @@ discard block |
||
51 | 51 | parent::__construct('passman'); |
52 | 52 | $container = $this->getContainer(); |
53 | 53 | // Allow automatic DI for the View, until we migrated to Nodes API |
54 | - $container->registerService(View::class, function () { |
|
54 | + $container->registerService(View::class, function() { |
|
55 | 55 | return new View(''); |
56 | 56 | }, false); |
57 | - $container->registerService('isCLI', function () { |
|
57 | + $container->registerService('isCLI', function() { |
|
58 | 58 | return \OC::$CLI; |
59 | 59 | }); |
60 | 60 | |
61 | 61 | /** |
62 | 62 | * Middleware |
63 | 63 | */ |
64 | - $container->registerService('ShareMiddleware', function ($c) { |
|
64 | + $container->registerService('ShareMiddleware', function($c) { |
|
65 | 65 | return new ShareMiddleware($c->query('SettingsService')); |
66 | 66 | }); |
67 | 67 | $container->registerMiddleware('ShareMiddleware'); |
@@ -69,7 +69,7 @@ discard block |
||
69 | 69 | /** |
70 | 70 | * Controllers |
71 | 71 | */ |
72 | - $container->registerService('ShareController', function ($c) { |
|
72 | + $container->registerService('ShareController', function($c) { |
|
73 | 73 | $container = $this->getContainer(); |
74 | 74 | $server = $container->getServer(); |
75 | 75 | return new ShareController( |
@@ -90,7 +90,7 @@ discard block |
||
90 | 90 | |
91 | 91 | |
92 | 92 | /** Cron **/ |
93 | - $container->registerService('CronService', function ($c) { |
|
93 | + $container->registerService('CronService', function($c) { |
|
94 | 94 | return new CronService( |
95 | 95 | $c->query('CredentialService'), |
96 | 96 | $c->query('Logger'), |
@@ -101,11 +101,11 @@ discard block |
||
101 | 101 | ); |
102 | 102 | }); |
103 | 103 | |
104 | - $container->registerService('Db', function () { |
|
104 | + $container->registerService('Db', function() { |
|
105 | 105 | return new Db(); |
106 | 106 | }); |
107 | 107 | |
108 | - $container->registerService('Logger', function ($c) { |
|
108 | + $container->registerService('Logger', function($c) { |
|
109 | 109 | return $c->query('ServerContainer')->getLogger(); |
110 | 110 | }); |
111 | 111 | |
@@ -133,7 +133,7 @@ discard block |
||
133 | 133 | $c = $this->getContainer(); |
134 | 134 | /** @var \OCP\IServerContainer $server */ |
135 | 135 | $server = $c->getServer(); |
136 | - $navigationEntry = function () use ($c, $server) { |
|
136 | + $navigationEntry = function() use ($c, $server) { |
|
137 | 137 | return [ |
138 | 138 | 'id' => $c->getAppName(), |
139 | 139 | 'order' => 10, |
@@ -38,7 +38,7 @@ |
||
38 | 38 | use OCA\Passman\Service\VaultService; |
39 | 39 | use OCA\Passman\Utility\Utils; |
40 | 40 | use OCA\Passman\Service\NotificationService; |
41 | -Use OCA\Passman\Service\SettingsService; |
|
41 | +use OCA\Passman\Service\SettingsService; |
|
42 | 42 | use OCP\IConfig; |
43 | 43 | use OCP\IDBConnection; |
44 | 44 |
@@ -213,6 +213,10 @@ discard block |
||
213 | 213 | return array($cipherKey, $macKey, $iv); |
214 | 214 | } |
215 | 215 | |
216 | + /** |
|
217 | + * @param string $a |
|
218 | + * @param string $b |
|
219 | + */ |
|
216 | 220 | function hash_equals($a, $b) { |
217 | 221 | $key = openssl_random_pseudo_bytes(128); |
218 | 222 | return hash_hmac('sha512', $a, $key) === hash_hmac('sha512', $b, $key); |
@@ -250,7 +254,7 @@ discard block |
||
250 | 254 | /** |
251 | 255 | * Pad the data with a random char chosen by the pad amount. |
252 | 256 | * |
253 | - * @param $data |
|
257 | + * @param string $data |
|
254 | 258 | * @return string |
255 | 259 | */ |
256 | 260 | protected function pad($data) { |
@@ -266,8 +270,8 @@ discard block |
||
266 | 270 | /** |
267 | 271 | * Unpad the the data |
268 | 272 | * |
269 | - * @param $data |
|
270 | - * @return bool|string |
|
273 | + * @param string $data |
|
274 | + * @return false|string |
|
271 | 275 | */ |
272 | 276 | protected function unpad($data) { |
273 | 277 | $length = $this->getKeySize(); |
@@ -284,7 +288,7 @@ discard block |
||
284 | 288 | * Encrypt a credential |
285 | 289 | * |
286 | 290 | * @param array|Credential $credential the credential to decrypt |
287 | - * @return Credential|array |
|
291 | + * @return string |
|
288 | 292 | */ |
289 | 293 | public function decryptCredential($credential) { |
290 | 294 | |
@@ -380,7 +384,7 @@ discard block |
||
380 | 384 | /** |
381 | 385 | * Decrypt a file |
382 | 386 | * |
383 | - * @param File|array $file |
|
387 | + * @param File $file |
|
384 | 388 | * @return File|array |
385 | 389 | */ |
386 | 390 |
@@ -272,7 +272,9 @@ |
||
272 | 272 | protected function unpad($data) { |
273 | 273 | $length = $this->getKeySize(); |
274 | 274 | $last = ord($data[strlen($data) - 1]); |
275 | - if ($last > $length) return false; |
|
275 | + if ($last > $length) { |
|
276 | + return false; |
|
277 | + } |
|
276 | 278 | if (substr($data, -1 * $last) !== str_repeat(chr($last), $last)) { |
277 | 279 | return false; |
278 | 280 | } |
@@ -83,7 +83,7 @@ |
||
83 | 83 | } |
84 | 84 | } |
85 | 85 | |
86 | - private function fetchAll($sql){ |
|
86 | + private function fetchAll($sql) { |
|
87 | 87 | return $this->db->executeQuery($sql)->fetchAll(); |
88 | 88 | } |
89 | 89 |
@@ -83,7 +83,7 @@ |
||
83 | 83 | } |
84 | 84 | } |
85 | 85 | |
86 | - private function fetchAll($sql){ |
|
86 | + private function fetchAll($sql) { |
|
87 | 87 | return $this->db->executeQuery($sql)->fetchAll(); |
88 | 88 | } |
89 | 89 |
@@ -26,7 +26,7 @@ |
||
26 | 26 | $setting = (in_array($methodName, $publicMethods)) ? 'link_sharing_enabled' : 'user_sharing_enabled'; |
27 | 27 | $sharing_enabled = ($this->settings->isEnabled($setting)); |
28 | 28 | |
29 | - if(in_array($methodName, $user_pub_methods)){ |
|
29 | + if (in_array($methodName, $user_pub_methods)) { |
|
30 | 30 | $sharing_enabled = ($this->settings->isEnabled('link_sharing_enabled') || $this->settings->isEnabled('user_sharing_enabled')); |
31 | 31 | } |
32 | 32 |
@@ -26,7 +26,7 @@ |
||
26 | 26 | $setting = (in_array($methodName, $publicMethods)) ? 'link_sharing_enabled' : 'user_sharing_enabled'; |
27 | 27 | $sharing_enabled = ($this->settings->isEnabled($setting)); |
28 | 28 | |
29 | - if(in_array($methodName, $user_pub_methods)){ |
|
29 | + if(in_array($methodName, $user_pub_methods)) { |
|
30 | 30 | $sharing_enabled = ($this->settings->isEnabled('link_sharing_enabled') || $this->settings->isEnabled('user_sharing_enabled')); |
31 | 31 | } |
32 | 32 |
@@ -30,66 +30,66 @@ |
||
30 | 30 | use OCA\Passman\Utility\Utils; |
31 | 31 | |
32 | 32 | class SharingACLMapper extends Mapper { |
33 | - const TABLE_NAME = '*PREFIX*passman_sharing_acl'; |
|
33 | + const TABLE_NAME = '*PREFIX*passman_sharing_acl'; |
|
34 | 34 | |
35 | - public function __construct(IDBConnection $db) { |
|
36 | - parent::__construct($db, 'passman_sharing_acl'); |
|
37 | - } |
|
35 | + public function __construct(IDBConnection $db) { |
|
36 | + parent::__construct($db, 'passman_sharing_acl'); |
|
37 | + } |
|
38 | 38 | |
39 | - public function createACLEntry(SharingACL $acl){ |
|
40 | - return $this->insert($acl); |
|
41 | - } |
|
39 | + public function createACLEntry(SharingACL $acl){ |
|
40 | + return $this->insert($acl); |
|
41 | + } |
|
42 | 42 | |
43 | - /** |
|
44 | - * Gets the currently accepted share requests from the given user for the given vault guid |
|
45 | - * @param $user_id |
|
46 | - * @param $vault_guid |
|
47 | - * @return SharingACL[] |
|
48 | - */ |
|
49 | - public function getVaultEntries($user_id, $vault_guid) { |
|
50 | - $q = "SELECT * FROM ". self::TABLE_NAME ." WHERE user_id = ? AND vault_guid = ?"; |
|
51 | - return $this->findEntities($q, [$user_id, $vault_guid]); |
|
52 | - } |
|
43 | + /** |
|
44 | + * Gets the currently accepted share requests from the given user for the given vault guid |
|
45 | + * @param $user_id |
|
46 | + * @param $vault_guid |
|
47 | + * @return SharingACL[] |
|
48 | + */ |
|
49 | + public function getVaultEntries($user_id, $vault_guid) { |
|
50 | + $q = "SELECT * FROM ". self::TABLE_NAME ." WHERE user_id = ? AND vault_guid = ?"; |
|
51 | + return $this->findEntities($q, [$user_id, $vault_guid]); |
|
52 | + } |
|
53 | 53 | |
54 | - /** |
|
55 | - * Gets the acl for a given item guid |
|
56 | - * @param $user_id |
|
57 | - * @param $item_guid |
|
58 | - * @return SharingACL |
|
59 | - */ |
|
60 | - public function getItemACL($user_id, $item_guid) { |
|
61 | - $q = "SELECT * FROM " . self::TABLE_NAME . " WHERE item_guid = ? AND "; |
|
62 | - $filter = [$item_guid]; |
|
63 | - $q .= ($user_id === null) ? 'user_id is null' : 'user_id = ? '; |
|
64 | - if ($user_id !== null){ |
|
54 | + /** |
|
55 | + * Gets the acl for a given item guid |
|
56 | + * @param $user_id |
|
57 | + * @param $item_guid |
|
58 | + * @return SharingACL |
|
59 | + */ |
|
60 | + public function getItemACL($user_id, $item_guid) { |
|
61 | + $q = "SELECT * FROM " . self::TABLE_NAME . " WHERE item_guid = ? AND "; |
|
62 | + $filter = [$item_guid]; |
|
63 | + $q .= ($user_id === null) ? 'user_id is null' : 'user_id = ? '; |
|
64 | + if ($user_id !== null){ |
|
65 | 65 | $filter[] = $user_id; |
66 | - } |
|
66 | + } |
|
67 | 67 | |
68 | - return $this->findEntity($q, $filter); |
|
69 | - } |
|
68 | + return $this->findEntity($q, $filter); |
|
69 | + } |
|
70 | 70 | |
71 | - /** |
|
72 | - * Update the acl for a given item guid |
|
73 | - * @param $user_id |
|
74 | - * @param $item_guid |
|
75 | - * @return SharingACL |
|
76 | - */ |
|
77 | - public function updateCredentialACL(SharingACL $sharingACL) { |
|
78 | - return $this->update($sharingACL); |
|
79 | - } |
|
71 | + /** |
|
72 | + * Update the acl for a given item guid |
|
73 | + * @param $user_id |
|
74 | + * @param $item_guid |
|
75 | + * @return SharingACL |
|
76 | + */ |
|
77 | + public function updateCredentialACL(SharingACL $sharingACL) { |
|
78 | + return $this->update($sharingACL); |
|
79 | + } |
|
80 | 80 | |
81 | - /** |
|
82 | - * Gets the currently accepted share requests from the given user for the given vault guid |
|
83 | - * @param $user_id |
|
84 | - * @param $vault_id |
|
85 | - * @return SharingACL[] |
|
86 | - */ |
|
87 | - public function getCredentialAclList($item_guid) { |
|
88 | - $q = "SELECT * FROM ". self::TABLE_NAME ." WHERE item_guid = ?"; |
|
89 | - return $this->findEntities($q, [$item_guid]); |
|
90 | - } |
|
81 | + /** |
|
82 | + * Gets the currently accepted share requests from the given user for the given vault guid |
|
83 | + * @param $user_id |
|
84 | + * @param $vault_id |
|
85 | + * @return SharingACL[] |
|
86 | + */ |
|
87 | + public function getCredentialAclList($item_guid) { |
|
88 | + $q = "SELECT * FROM ". self::TABLE_NAME ." WHERE item_guid = ?"; |
|
89 | + return $this->findEntities($q, [$item_guid]); |
|
90 | + } |
|
91 | 91 | |
92 | - public function deleteShareACL(SharingACL $ACL){ |
|
93 | - return $this->delete($ACL); |
|
92 | + public function deleteShareACL(SharingACL $ACL){ |
|
93 | + return $this->delete($ACL); |
|
94 | 94 | } |
95 | 95 | } |
96 | 96 | \ No newline at end of file |
@@ -36,7 +36,7 @@ discard block |
||
36 | 36 | parent::__construct($db, 'passman_sharing_acl'); |
37 | 37 | } |
38 | 38 | |
39 | - public function createACLEntry(SharingACL $acl){ |
|
39 | + public function createACLEntry(SharingACL $acl) { |
|
40 | 40 | return $this->insert($acl); |
41 | 41 | } |
42 | 42 | |
@@ -47,7 +47,7 @@ discard block |
||
47 | 47 | * @return SharingACL[] |
48 | 48 | */ |
49 | 49 | public function getVaultEntries($user_id, $vault_guid) { |
50 | - $q = "SELECT * FROM ". self::TABLE_NAME ." WHERE user_id = ? AND vault_guid = ?"; |
|
50 | + $q = "SELECT * FROM " . self::TABLE_NAME . " WHERE user_id = ? AND vault_guid = ?"; |
|
51 | 51 | return $this->findEntities($q, [$user_id, $vault_guid]); |
52 | 52 | } |
53 | 53 | |
@@ -61,7 +61,7 @@ discard block |
||
61 | 61 | $q = "SELECT * FROM " . self::TABLE_NAME . " WHERE item_guid = ? AND "; |
62 | 62 | $filter = [$item_guid]; |
63 | 63 | $q .= ($user_id === null) ? 'user_id is null' : 'user_id = ? '; |
64 | - if ($user_id !== null){ |
|
64 | + if ($user_id !== null) { |
|
65 | 65 | $filter[] = $user_id; |
66 | 66 | } |
67 | 67 | |
@@ -85,11 +85,11 @@ discard block |
||
85 | 85 | * @return SharingACL[] |
86 | 86 | */ |
87 | 87 | public function getCredentialAclList($item_guid) { |
88 | - $q = "SELECT * FROM ". self::TABLE_NAME ." WHERE item_guid = ?"; |
|
88 | + $q = "SELECT * FROM " . self::TABLE_NAME . " WHERE item_guid = ?"; |
|
89 | 89 | return $this->findEntities($q, [$item_guid]); |
90 | 90 | } |
91 | 91 | |
92 | - public function deleteShareACL(SharingACL $ACL){ |
|
92 | + public function deleteShareACL(SharingACL $ACL) { |
|
93 | 93 | return $this->delete($ACL); |
94 | 94 | } |
95 | 95 | } |
96 | 96 | \ No newline at end of file |
@@ -36,7 +36,7 @@ discard block |
||
36 | 36 | parent::__construct($db, 'passman_sharing_acl'); |
37 | 37 | } |
38 | 38 | |
39 | - public function createACLEntry(SharingACL $acl){ |
|
39 | + public function createACLEntry(SharingACL $acl) { |
|
40 | 40 | return $this->insert($acl); |
41 | 41 | } |
42 | 42 | |
@@ -61,7 +61,7 @@ discard block |
||
61 | 61 | $q = "SELECT * FROM " . self::TABLE_NAME . " WHERE item_guid = ? AND "; |
62 | 62 | $filter = [$item_guid]; |
63 | 63 | $q .= ($user_id === null) ? 'user_id is null' : 'user_id = ? '; |
64 | - if ($user_id !== null){ |
|
64 | + if ($user_id !== null) { |
|
65 | 65 | $filter[] = $user_id; |
66 | 66 | } |
67 | 67 | |
@@ -89,7 +89,7 @@ discard block |
||
89 | 89 | return $this->findEntities($q, [$item_guid]); |
90 | 90 | } |
91 | 91 | |
92 | - public function deleteShareACL(SharingACL $ACL){ |
|
92 | + public function deleteShareACL(SharingACL $ACL) { |
|
93 | 93 | return $this->delete($ACL); |
94 | 94 | } |
95 | 95 | } |
96 | 96 | \ No newline at end of file |
@@ -23,7 +23,7 @@ discard block |
||
23 | 23 | public function __construct($AppName, |
24 | 24 | IRequest $request, |
25 | 25 | $UserId, |
26 | - FileService $fileService){ |
|
26 | + FileService $fileService) { |
|
27 | 27 | parent::__construct($AppName, $request); |
28 | 28 | $this->userId = $UserId; |
29 | 29 | $this->fileService = $fileService; |
@@ -59,20 +59,20 @@ discard block |
||
59 | 59 | return new JSONResponse($this->fileService->deleteFile($file_id, $this->userId)); |
60 | 60 | } |
61 | 61 | |
62 | - public function updateFile($file_id, $file_data, $filename){ |
|
63 | - try{ |
|
62 | + public function updateFile($file_id, $file_data, $filename) { |
|
63 | + try { |
|
64 | 64 | $file = $this->fileService->getFile($file_id, $this->userId); |
65 | - } catch (\Exception $doesNotExistException){ |
|
65 | + } catch (\Exception $doesNotExistException) { |
|
66 | 66 | |
67 | 67 | } |
68 | - if($file){ |
|
69 | - if($file_data) { |
|
68 | + if ($file) { |
|
69 | + if ($file_data) { |
|
70 | 70 | $file->setFileData($file_data); |
71 | 71 | } |
72 | - if($filename) { |
|
72 | + if ($filename) { |
|
73 | 73 | $file->setFilename($filename); |
74 | 74 | } |
75 | - if($filename || $file_data){ |
|
75 | + if ($filename || $file_data) { |
|
76 | 76 | new JSONResponse($this->fileService->updateFile($file)); |
77 | 77 | } |
78 | 78 | } |
@@ -23,7 +23,7 @@ discard block |
||
23 | 23 | public function __construct($AppName, |
24 | 24 | IRequest $request, |
25 | 25 | $UserId, |
26 | - FileService $fileService){ |
|
26 | + FileService $fileService) { |
|
27 | 27 | parent::__construct($AppName, $request); |
28 | 28 | $this->userId = $UserId; |
29 | 29 | $this->fileService = $fileService; |
@@ -59,20 +59,20 @@ discard block |
||
59 | 59 | return new JSONResponse($this->fileService->deleteFile($file_id, $this->userId)); |
60 | 60 | } |
61 | 61 | |
62 | - public function updateFile($file_id, $file_data, $filename){ |
|
62 | + public function updateFile($file_id, $file_data, $filename) { |
|
63 | 63 | try{ |
64 | 64 | $file = $this->fileService->getFile($file_id, $this->userId); |
65 | 65 | } catch (\Exception $doesNotExistException){ |
66 | 66 | |
67 | 67 | } |
68 | - if($file){ |
|
68 | + if($file) { |
|
69 | 69 | if($file_data) { |
70 | 70 | $file->setFileData($file_data); |
71 | 71 | } |
72 | 72 | if($filename) { |
73 | 73 | $file->setFilename($filename); |
74 | 74 | } |
75 | - if($filename || $file_data){ |
|
75 | + if($filename || $file_data) { |
|
76 | 76 | new JSONResponse($this->fileService->updateFile($file)); |
77 | 77 | } |
78 | 78 | } |
@@ -40,7 +40,7 @@ discard block |
||
40 | 40 | */ |
41 | 41 | public function remind($credential_id) { |
42 | 42 | $credential = $this->credentialService->getCredentialById($credential_id, $this->userId); |
43 | - if($credential) { |
|
43 | + if ($credential) { |
|
44 | 44 | $credential->setExpireTime(time() + (24 * 60 * 60)); |
45 | 45 | $this->credentialService->upd($credential); |
46 | 46 | |
@@ -59,7 +59,7 @@ discard block |
||
59 | 59 | public function read($credential_id) { |
60 | 60 | |
61 | 61 | $credential = $this->credentialService->getCredentialById($credential_id, $this->userId); |
62 | - if($credential) { |
|
62 | + if ($credential) { |
|
63 | 63 | $credential->setExpireTime(0); |
64 | 64 | $this->credentialService->upd($credential); |
65 | 65 |
@@ -167,13 +167,13 @@ discard block |
||
167 | 167 | $activity . '_self', array($label, $this->userId, $revision_created), |
168 | 168 | '', array(), |
169 | 169 | $link, $this->userId, Activity::TYPE_ITEM_ACTION); |
170 | - } else if (($storedCredential->getDeleteTime() === 0) && (int)$delete_time > 0) { |
|
170 | + } else if (($storedCredential->getDeleteTime() === 0) && (int) $delete_time > 0) { |
|
171 | 171 | $activity = 'item_deleted'; |
172 | 172 | $this->activityService->add( |
173 | 173 | $activity . '_self', array($label, $this->userId), |
174 | 174 | '', array(), |
175 | 175 | $link, $this->userId, Activity::TYPE_ITEM_ACTION); |
176 | - } else if (($storedCredential->getDeleteTime() > 0) && (int)$delete_time === 0) { |
|
176 | + } else if (($storedCredential->getDeleteTime() > 0) && (int) $delete_time === 0) { |
|
177 | 177 | $activity = 'item_recovered'; |
178 | 178 | $this->activityService->add( |
179 | 179 | $activity . '_self', array($label, $this->userId), |
@@ -241,7 +241,7 @@ discard block |
||
241 | 241 | $credential['shared_key'] = ''; |
242 | 242 | } |
243 | 243 | |
244 | - if(!isset($credential['shared_key'])){ |
|
244 | + if (!isset($credential['shared_key'])) { |
|
245 | 245 | $credential['shared_key'] = $storedCredential->getSharedKey(); |
246 | 246 | } |
247 | 247 |
@@ -241,7 +241,7 @@ |
||
241 | 241 | $credential['shared_key'] = ''; |
242 | 242 | } |
243 | 243 | |
244 | - if(!isset($credential['shared_key'])){ |
|
244 | + if(!isset($credential['shared_key'])) { |
|
245 | 245 | $credential['shared_key'] = $storedCredential->getSharedKey(); |
246 | 246 | } |
247 | 247 |