| @@ -11,7 +11,6 @@ discard block | ||
| 11 | 11 | |
| 12 | 12 | namespace OCA\Passman\Controller; | 
| 13 | 13 | |
| 14 | -use OCA\Files_External\NotFoundException; | |
| 15 | 14 | use OCA\Passman\Db\SharingACL; | 
| 16 | 15 | use OCA\Passman\Utility\NotFoundJSONResponse; | 
| 17 | 16 | use OCP\AppFramework\Db\DoesNotExistException; | 
| @@ -25,7 +24,6 @@ discard block | ||
| 25 | 24 | use OCA\Passman\Service\ActivityService; | 
| 26 | 25 | use OCA\Passman\Service\CredentialRevisionService; | 
| 27 | 26 | use OCA\Passman\Service\ShareService; | 
| 28 | -use OCP\IUser; | |
| 29 | 27 | |
| 30 | 28 |  class CredentialController extends ApiController { | 
| 31 | 29 | private $userId; | 
| @@ -202,7 +202,7 @@ discard block | ||
| 202 | 202 | |
| 203 | 203 |  			foreach ($acl_list as $sharingACL) { | 
| 204 | 204 | $target_user = $sharingACL->getUserId(); | 
| 205 | -				if($target_user === $this->userId){ | |
| 205 | +				if($target_user === $this->userId) { | |
| 206 | 206 | continue; | 
| 207 | 207 | } | 
| 208 | 208 | $this->activityService->add( | 
| @@ -217,11 +217,11 @@ discard block | ||
| 217 | 217 | $link, $storedCredential->getUserId(), Activity::TYPE_ITEM_ACTION); | 
| 218 | 218 | } | 
| 219 | 219 | } | 
| 220 | -		if($set_share_key === true){ | |
| 220 | +		if($set_share_key === true) { | |
| 221 | 221 | $storedCredential->setSharedKey($shared_key); | 
| 222 | 222 | $credential['shared_key'] = $shared_key; | 
| 223 | 223 | } | 
| 224 | -		if($unshare_action === true){ | |
| 224 | +		if($unshare_action === true) { | |
| 225 | 225 |  			$storedCredential->setSharedKey(''); | 
| 226 | 226 | $credential['shared_key'] = ''; | 
| 227 | 227 | } | 
| @@ -257,21 +257,18 @@ discard block | ||
| 257 | 257 |  	public function getRevision($credential_guid) { | 
| 258 | 258 |  	    try { | 
| 259 | 259 | $credential = $this->credentialService->getCredentialByGUID($credential_guid); | 
| 260 | - } | |
| 261 | -        catch (DoesNotExistException $ex){ | |
| 260 | +        } catch (DoesNotExistException $ex){ | |
| 262 | 261 | return new NotFoundJSONResponse(); | 
| 263 | 262 | } | 
| 264 | 263 | |
| 265 | 264 | // If the request was made by the owner of the credential | 
| 266 | 265 |          if ($this->userId === $credential->getUserId()) { | 
| 267 | 266 | $result = $this->credentialRevisionService->getRevisions($credential->getId(), $this->userId); | 
| 268 | - } | |
| 269 | -        else { | |
| 267 | +        } else { | |
| 270 | 268 | $acl = $this->sharingService->getACL($this->userId, $credential_guid); | 
| 271 | -            if ($acl->hasPermission(SharingACL::HISTORY)){ | |
| 269 | +            if ($acl->hasPermission(SharingACL::HISTORY)) { | |
| 272 | 270 | $result = $this->credentialRevisionService->getRevisions($credential->getId()); | 
| 273 | - } | |
| 274 | -            else { | |
| 271 | +            } else { | |
| 275 | 272 | return new NotFoundJSONResponse(); | 
| 276 | 273 | } | 
| 277 | 274 | } | 
| @@ -290,7 +287,7 @@ discard block | ||
| 290 | 287 | /** | 
| 291 | 288 | * @NoAdminRequired | 
| 292 | 289 | */ | 
| 293 | -	public function updateRevision($credential_guid, $revision_id, $credential_data){ | |
| 290 | +	public function updateRevision($credential_guid, $revision_id, $credential_data) { | |
| 294 | 291 | $revision = null; | 
| 295 | 292 |  		try { | 
| 296 | 293 | $credential = $this->credentialService->getCredentialByGUID($credential_guid, $this->userId); | 
| @@ -11,10 +11,7 @@ discard block | ||
| 11 | 11 | |
| 12 | 12 | namespace OCA\Passman\Controller; | 
| 13 | 13 | |
| 14 | -use OCA\Files_External\NotFoundException; | |
| 15 | -use OCA\Passman\Db\ShareRequest; | |
| 16 | 14 | use OCA\Passman\Db\SharingACL; | 
| 17 | -use OCA\Passman\Db\Vault; | |
| 18 | 15 | use OCA\Passman\Service\CredentialService; | 
| 19 | 16 | use OCA\Passman\Service\FileService; | 
| 20 | 17 | use OCA\Passman\Service\NotificationService; | 
| @@ -26,14 +23,9 @@ discard block | ||
| 26 | 23 | use OCP\IRequest; | 
| 27 | 24 | use OCP\AppFramework\Http\JSONResponse; | 
| 28 | 25 | use OCP\AppFramework\ApiController; | 
| 29 | -use OCP\AppFramework\Http; | |
| 30 | -use OCP\AppFramework\Http\DataResponse; | |
| 31 | - | |
| 32 | -use OCP\IGroup; | |
| 33 | 26 | use OCP\IGroupManager; | 
| 34 | 27 | use OCP\IUserManager; | 
| 35 | 28 | use OCP\IUser; | 
| 36 | - | |
| 37 | 29 | use OCA\Passman\Service\VaultService; | 
| 38 | 30 | use OCA\Passman\Service\ActivityService; | 
| 39 | 31 | use OCA\Passman\Activity; | 
| @@ -230,7 +230,7 @@ discard block | ||
| 230 | 230 | } | 
| 231 | 231 | |
| 232 | 232 | |
| 233 | -	public function unshareCredentialFromUser($item_guid, $user_id){ | |
| 233 | +	public function unshareCredentialFromUser($item_guid, $user_id) { | |
| 234 | 234 | $acl = null; | 
| 235 | 235 | $sr = null; | 
| 236 | 236 |  		try { | 
| @@ -244,7 +244,7 @@ discard block | ||
| 244 | 244 | |
| 245 | 245 | } | 
| 246 | 246 | |
| 247 | -		if($sr){ | |
| 247 | +		if($sr) { | |
| 248 | 248 | $this->shareService->cleanItemRequestsForUser($sr); | 
| 249 | 249 | $manager = \OC::$server->getNotificationManager(); | 
| 250 | 250 | $notification = $manager->createNotification(); | 
| @@ -253,7 +253,7 @@ discard block | ||
| 253 | 253 | ->setUser($user_id); | 
| 254 | 254 | $manager->markProcessed($notification); | 
| 255 | 255 | } | 
| 256 | -		if($acl){ | |
| 256 | +		if($acl) { | |
| 257 | 257 | $this->shareService->deleteShareACL($acl); | 
| 258 | 258 | } | 
| 259 | 259 |  		return new JSONResponse(array('result' => true)); | 
| @@ -462,7 +462,7 @@ discard block | ||
| 462 | 462 | * @return JSONResponse | 
| 463 | 463 | * @return NotFoundResponse | 
| 464 | 464 | */ | 
| 465 | -	public function getFile($item_guid, $file_guid){ | |
| 465 | +	public function getFile($item_guid, $file_guid) { | |
| 466 | 466 |  		try { | 
| 467 | 467 | $credential = $this->credentialService->getCredentialByGUID($item_guid); | 
| 468 | 468 |  		} catch (DoesNotExistException $e){ | 
| @@ -470,7 +470,7 @@ discard block | ||
| 470 | 470 | } | 
| 471 | 471 | |
| 472 | 472 | $acl = $this->shareService->getACL($this->userId->getUID(), $credential->getGuid()); | 
| 473 | -		if (!$acl->hasPermission(SharingACL::FILES)){ | |
| 473 | +		if (!$acl->hasPermission(SharingACL::FILES)) { | |
| 474 | 474 | return new NotFoundJSONResponse(); | 
| 475 | 475 |  		} else { | 
| 476 | 476 | return $this->fileService->getFileByGuid($file_guid); | 
| @@ -11,7 +11,6 @@ discard block | ||
| 11 | 11 | |
| 12 | 12 | namespace OCA\Passman\AppInfo; | 
| 13 | 13 | use OC\Files\View; | 
| 14 | - | |
| 15 | 14 | use OCA\Passman\Controller\CredentialController; | 
| 16 | 15 | use OCA\Passman\Controller\PageController; | 
| 17 | 16 | use OCA\Passman\Controller\ShareController; | 
| @@ -24,10 +23,8 @@ discard block | ||
| 24 | 23 | use OCA\Passman\Service\VaultService; | 
| 25 | 24 | use OCA\Passman\Utility\Utils; | 
| 26 | 25 | use OCA\Passman\Service\NotificationService; | 
| 27 | - | |
| 28 | 26 | use OCP\AppFramework\App; | 
| 29 | 27 | use OCP\IL10N; | 
| 30 | -use OCP\Util; | |
| 31 | 28 |  class Application extends App { | 
| 32 | 29 |  	public function __construct () { | 
| 33 | 30 |  		parent::__construct('passman'); | 
| @@ -8,7 +8,6 @@ | ||
| 8 | 8 | namespace OCA\Passman\Db; | 
| 9 | 9 | |
| 10 | 10 | use OCA\Passman\Utility\PermissionEntity; | 
| 11 | -use OCP\AppFramework\Db\Entity; | |
| 12 | 11 | |
| 13 | 12 | /** | 
| 14 | 13 | * @method void setId(integer $value) | 
| @@ -35,8 +35,7 @@ discard block | ||
| 35 | 35 | * @method string getSharedKey() | 
| 36 | 36 | */ | 
| 37 | 37 | |
| 38 | -class SharingACL extends PermissionEntity implements \JsonSerializable | |
| 39 | -{ | |
| 38 | +class SharingACL extends PermissionEntity implements \JsonSerializable { | |
| 40 | 39 | |
| 41 | 40 | protected | 
| 42 | 41 | $itemId, | 
| @@ -67,8 +66,7 @@ discard block | ||
| 67 | 66 | * which is a value of any type other than a resource. | 
| 68 | 67 | * @since 5.4.0 | 
| 69 | 68 | */ | 
| 70 | - function jsonSerialize() | |
| 71 | -    { | |
| 69 | +    function jsonSerialize() { | |
| 72 | 70 | return [ | 
| 73 | 71 | 'acl_id' => $this->getId(), | 
| 74 | 72 | 'item_id' => $this->getItemId(), | 
| @@ -14,9 +14,7 @@ | ||
| 14 | 14 | use OCA\Passman\Db\Credential; | 
| 15 | 15 | use OCA\Passman\Db\SharingACL; | 
| 16 | 16 | use OCA\Passman\Db\SharingACLMapper; | 
| 17 | -use OCP\IConfig; | |
| 18 | 17 | use OCP\AppFramework\Db\DoesNotExistException; | 
| 19 | - | |
| 20 | 18 | use OCA\Passman\Db\CredentialMapper; | 
| 21 | 19 | |
| 22 | 20 | |
| @@ -47,7 +47,7 @@ discard block | ||
| 47 | 47 | return $this->credentialMapper->upd($credential); | 
| 48 | 48 | } | 
| 49 | 49 | |
| 50 | -	public function deleteCredential($credential){ | |
| 50 | +	public function deleteCredential($credential) { | |
| 51 | 51 | return $this->credentialMapper->deleteCredential($credential); | 
| 52 | 52 | } | 
| 53 | 53 | |
| @@ -64,12 +64,11 @@ discard block | ||
| 64 | 64 | return $this->credentialMapper->getExpiredCredentials($timestamp); | 
| 65 | 65 | } | 
| 66 | 66 | |
| 67 | -	public function getCredentialById($credential_id, $user_id){ | |
| 67 | +	public function getCredentialById($credential_id, $user_id) { | |
| 68 | 68 | $credential = $this->credentialMapper->getCredentialById($credential_id); | 
| 69 | -        if ($credential->getUserId() === $user_id){ | |
| 69 | +        if ($credential->getUserId() === $user_id) { | |
| 70 | 70 | return $credential; | 
| 71 | - } | |
| 72 | -        else { | |
| 71 | +        } else { | |
| 73 | 72 | $acl = $this->sharingACL->getItemACL($user_id, $credential->getGuid()); | 
| 74 | 73 | if ($acl->hasPermission(SharingACL::READ)); | 
| 75 | 74 | return $credential; | 
| @@ -77,11 +76,11 @@ discard block | ||
| 77 | 76 | |
| 78 | 77 |          throw new DoesNotExistException("Did expect one result but found none when executing"); | 
| 79 | 78 | } | 
| 80 | -	public function getCredentialLabelById($credential_id){ | |
| 79 | +	public function getCredentialLabelById($credential_id) { | |
| 81 | 80 | return $this->credentialMapper->getCredentialLabelById($credential_id); | 
| 82 | 81 | } | 
| 83 | 82 | |
| 84 | -	public function getCredentialByGUID($credential_guid, $user_id = null){ | |
| 83 | +	public function getCredentialByGUID($credential_guid, $user_id = null) { | |
| 85 | 84 | return $this->credentialMapper->getCredentialByGUID($credential_guid, $user_id); | 
| 86 | 85 | } | 
| 87 | 86 | } | 
| 88 | 87 | \ No newline at end of file | 
| @@ -11,9 +11,6 @@ | ||
| 11 | 11 | |
| 12 | 12 | namespace OCA\Passman\Service; | 
| 13 | 13 | |
| 14 | -use OCP\IConfig; | |
| 15 | -use OCP\AppFramework\Db\DoesNotExistException; | |
| 16 | - | |
| 17 | 14 | use OCA\Passman\Db\FileMapper; | 
| 18 | 15 | |
| 19 | 16 | |
| @@ -25,7 +25,7 @@ discard block | ||
| 25 | 25 | $this->manager = \OC::$server->getNotificationManager(); | 
| 26 | 26 | } | 
| 27 | 27 | |
| 28 | -	function credentialExpiredNotification($credential){ | |
| 28 | +	function credentialExpiredNotification($credential) { | |
| 29 | 29 | $urlGenerator = \OC::$server->getURLGenerator(); | 
| 30 | 30 |  		$link = $urlGenerator->getAbsoluteURL($urlGenerator->linkTo('','index.php/apps/passman/#/vault/'. $credential->getVaultId() .'/edit/'. $credential->getId())); | 
| 31 | 31 |  		$api = $urlGenerator->getAbsoluteURL($urlGenerator->linkTo('', 'index.php/apps/passman')); | 
| @@ -51,7 +51,7 @@ discard block | ||
| 51 | 51 | } | 
| 52 | 52 | |
| 53 | 53 | |
| 54 | -	function credentialSharedNotification($data){ | |
| 54 | +	function credentialSharedNotification($data) { | |
| 55 | 55 | $urlGenerator = \OC::$server->getURLGenerator(); | 
| 56 | 56 |  		$link = $urlGenerator->getAbsoluteURL($urlGenerator->linkTo('','index.php/apps/passman/#/')); | 
| 57 | 57 |  		$api = $urlGenerator->getAbsoluteURL($urlGenerator->linkTo('', 'index.php/apps/passman')); | 
| @@ -73,7 +73,7 @@ discard block | ||
| 73 | 73 | } | 
| 74 | 74 | |
| 75 | 75 | |
| 76 | -	function credentialDeclinedSharedNotification($data){ | |
| 76 | +	function credentialDeclinedSharedNotification($data) { | |
| 77 | 77 | $notification = $this->manager->createNotification(); | 
| 78 | 78 |  		$notification->setApp('passman') | 
| 79 | 79 | ->setUser($data['target_user']) | 
| @@ -84,7 +84,7 @@ discard block | ||
| 84 | 84 | } | 
| 85 | 85 | |
| 86 | 86 | |
| 87 | -	function credentialAcceptedSharedNotification($data){ | |
| 87 | +	function credentialAcceptedSharedNotification($data) { | |
| 88 | 88 | $notification = $this->manager->createNotification(); | 
| 89 | 89 |  		$notification->setApp('passman') | 
| 90 | 90 | ->setUser($data['target_user']) | 
| @@ -9,7 +9,6 @@ | ||
| 9 | 9 | namespace OCA\Passman\Service; | 
| 10 | 10 | |
| 11 | 11 | |
| 12 | -use Icewind\SMB\Share; | |
| 13 | 12 | use OCA\Passman\Db\CredentialMapper; | 
| 14 | 13 | use OCA\Passman\Db\CredentialRevision; | 
| 15 | 14 | use OCA\Passman\Db\ShareRequest; | 
| @@ -71,7 +71,9 @@ discard block | ||
| 71 | 71 | } | 
| 72 | 72 | |
| 73 | 73 |  	public function createACLEntry(SharingACL $acl) { | 
| 74 | - if ($acl->getCreated() === null) $acl->setCreated((new \DateTime())->getTimestamp()); | |
| 74 | +		if ($acl->getCreated() === null) { | |
| 75 | + $acl->setCreated((new \DateTime())->getTimestamp()); | |
| 76 | + } | |
| 75 | 77 | return $this->sharingACL->createACLEntry($acl); | 
| 76 | 78 | } | 
| 77 | 79 | |
| @@ -124,12 +126,16 @@ discard block | ||
| 124 | 126 | $return = []; | 
| 125 | 127 |  		foreach ($entries as $entry) { | 
| 126 | 128 | // Check if the user can read the credential, probably unnecesary, but just to be sure | 
| 127 | - if (!$entry->hasPermission(SharingACL::READ)) continue; | |
| 129 | +			if (!$entry->hasPermission(SharingACL::READ)) { | |
| 130 | + continue; | |
| 131 | + } | |
| 128 | 132 | |
| 129 | 133 | $tmp = $entry->jsonSerialize(); | 
| 130 | 134 | $tmp['credential_data'] = $this->credential->getCredentialById($entry->getItemId())->jsonSerialize(); | 
| 131 | 135 | |
| 132 | - if (!$entry->hasPermission(SharingACL::FILES)) unset($tmp['credential_data']['files']); | |
| 136 | +			if (!$entry->hasPermission(SharingACL::FILES)) { | |
| 137 | + unset($tmp['credential_data']['files']); | |
| 138 | + } | |
| 133 | 139 | unset($tmp['credential_data']['shared_key']); | 
| 134 | 140 | $return[] = $tmp; | 
| 135 | 141 | } | 
| @@ -150,12 +156,16 @@ discard block | ||
| 150 | 156 | $acl = $this->sharingACL->getItemACL($user_id, $item_guid); | 
| 151 | 157 | |
| 152 | 158 | // Check if the user can read the credential, probably unnecesary, but just to be sure | 
| 153 | -		if (!$acl->hasPermission(SharingACL::READ)) throw new DoesNotExistException("Item not found or wrong access level"); | |
| 159 | +		if (!$acl->hasPermission(SharingACL::READ)) { | |
| 160 | +			throw new DoesNotExistException("Item not found or wrong access level"); | |
| 161 | + } | |
| 154 | 162 | |
| 155 | 163 | $tmp = $acl->jsonSerialize(); | 
| 156 | 164 | $tmp['credential_data'] = $this->credential->getCredentialById($acl->getItemId())->jsonSerialize(); | 
| 157 | 165 | |
| 158 | - if (!$acl->hasPermission(SharingACL::FILES)) unset($tmp['credential_data']['files']); | |
| 166 | +		if (!$acl->hasPermission(SharingACL::FILES)) { | |
| 167 | + unset($tmp['credential_data']['files']); | |
| 168 | + } | |
| 159 | 169 | unset($tmp['credential_data']['shared_key']); | 
| 160 | 170 | |
| 161 | 171 | return $tmp; | 
| @@ -170,7 +180,9 @@ discard block | ||
| 170 | 180 | */ | 
| 171 | 181 |  	public function getItemHistory($user_id, $item_guid) { | 
| 172 | 182 | $acl = $this->sharingACL->getItemACL($user_id, $item_guid); | 
| 173 | - if (!$acl->hasPermission(SharingACL::READ | SharingACL::HISTORY)) return []; | |
| 183 | +		if (!$acl->hasPermission(SharingACL::READ | SharingACL::HISTORY)) { | |
| 184 | + return []; | |
| 185 | + } | |
| 174 | 186 | |
| 175 | 187 | return $this->revisions->getRevisions($acl->getItemId()); | 
| 176 | 188 | } | 
| @@ -285,7 +297,7 @@ discard block | ||
| 285 | 297 | } | 
| 286 | 298 | |
| 287 | 299 | |
| 288 | -	public function updatePendingShareRequestsForCredential($item_guid, $user_id, $permissions){ | |
| 300 | +	public function updatePendingShareRequestsForCredential($item_guid, $user_id, $permissions) { | |
| 289 | 301 | return $this->shareRequest->updatePendinRequestPermissions($item_guid, $user_id, $permissions); | 
| 290 | 302 | } | 
| 291 | 303 | } | 
| 292 | 304 | \ No newline at end of file | 
| @@ -8,7 +8,6 @@ | ||
| 8 | 8 | namespace OCA\Passman\Db; | 
| 9 | 9 | |
| 10 | 10 | use OCA\Passman\Utility\PermissionEntity; | 
| 11 | -use OCP\AppFramework\Db\Entity; | |
| 12 | 11 | |
| 13 | 12 | /** | 
| 14 | 13 | * @method void setId(integer $value) | 
| @@ -62,8 +62,7 @@ discard block | ||
| 62 | 62 | * which is a value of any type other than a resource. | 
| 63 | 63 | * @since 5.4.0 | 
| 64 | 64 | */ | 
| 65 | - function jsonSerialize() | |
| 66 | -    { | |
| 65 | +    function jsonSerialize() { | |
| 67 | 66 | return [ | 
| 68 | 67 | 'req_id' => $this->getId(), | 
| 69 | 68 | 'item_id' => $this->getItemId(), | 
| @@ -78,7 +77,7 @@ discard block | ||
| 78 | 77 | ]; | 
| 79 | 78 | } | 
| 80 | 79 | |
| 81 | -    function asACLJson(){ | |
| 80 | +    function asACLJson() { | |
| 82 | 81 | return [ | 
| 83 | 82 | 'item_id' => $this->getItemId(), | 
| 84 | 83 | 'item_guid' => $this->getItemGuid(), | 
| @@ -32,8 +32,7 @@ | ||
| 32 | 32 | * @return string | 
| 33 | 33 | */ | 
| 34 | 34 |  	public static function GUID() { | 
| 35 | -		if (function_exists('com_create_guid') === true) | |
| 36 | -		{ | |
| 35 | +		if (function_exists('com_create_guid') === true) { | |
| 37 | 36 |  			return trim(com_create_guid(), '{}'); | 
| 38 | 37 | } | 
| 39 | 38 | |