@@ -11,7 +11,6 @@ discard block |
||
11 | 11 | |
12 | 12 | namespace OCA\Passman\Controller; |
13 | 13 | |
14 | -use OCA\Files_External\NotFoundException; |
|
15 | 14 | use OCA\Passman\Db\SharingACL; |
16 | 15 | use OCA\Passman\Utility\NotFoundJSONResponse; |
17 | 16 | use OCP\AppFramework\Db\DoesNotExistException; |
@@ -25,7 +24,6 @@ discard block |
||
25 | 24 | use OCA\Passman\Service\ActivityService; |
26 | 25 | use OCA\Passman\Service\CredentialRevisionService; |
27 | 26 | use OCA\Passman\Service\ShareService; |
28 | -use OCP\IUser; |
|
29 | 27 | |
30 | 28 | class CredentialController extends ApiController { |
31 | 29 | private $userId; |
@@ -255,26 +255,26 @@ |
||
255 | 255 | * @NoAdminRequired |
256 | 256 | */ |
257 | 257 | public function getRevision($credential_guid) { |
258 | - try { |
|
259 | - $credential = $this->credentialService->getCredentialByGUID($credential_guid); |
|
260 | - } |
|
261 | - catch (DoesNotExistException $ex){ |
|
262 | - return new NotFoundJSONResponse(); |
|
263 | - } |
|
258 | + try { |
|
259 | + $credential = $this->credentialService->getCredentialByGUID($credential_guid); |
|
260 | + } |
|
261 | + catch (DoesNotExistException $ex){ |
|
262 | + return new NotFoundJSONResponse(); |
|
263 | + } |
|
264 | 264 | |
265 | - // If the request was made by the owner of the credential |
|
266 | - if ($this->userId === $credential->getUserId()) { |
|
267 | - $result = $this->credentialRevisionService->getRevisions($credential->getId(), $this->userId); |
|
268 | - } |
|
269 | - else { |
|
270 | - $acl = $this->sharingService->getACL($this->userId, $credential_guid); |
|
271 | - if ($acl->hasPermission(SharingACL::HISTORY)){ |
|
272 | - $result = $this->credentialRevisionService->getRevisions($credential->getId()); |
|
273 | - } |
|
274 | - else { |
|
275 | - return new NotFoundJSONResponse(); |
|
276 | - } |
|
277 | - } |
|
265 | + // If the request was made by the owner of the credential |
|
266 | + if ($this->userId === $credential->getUserId()) { |
|
267 | + $result = $this->credentialRevisionService->getRevisions($credential->getId(), $this->userId); |
|
268 | + } |
|
269 | + else { |
|
270 | + $acl = $this->sharingService->getACL($this->userId, $credential_guid); |
|
271 | + if ($acl->hasPermission(SharingACL::HISTORY)){ |
|
272 | + $result = $this->credentialRevisionService->getRevisions($credential->getId()); |
|
273 | + } |
|
274 | + else { |
|
275 | + return new NotFoundJSONResponse(); |
|
276 | + } |
|
277 | + } |
|
278 | 278 | |
279 | 279 | return new JSONResponse($result); |
280 | 280 | } |
@@ -84,7 +84,7 @@ discard block |
||
84 | 84 | ); |
85 | 85 | $credential = $this->credentialService->createCredential($credential); |
86 | 86 | $link = ''; // @TODO create direct link to credential |
87 | - if(!$credential->getHidden()) { |
|
87 | + if (!$credential->getHidden()) { |
|
88 | 88 | $this->activityService->add( |
89 | 89 | Activity::SUBJECT_ITEM_CREATED_SELF, array($label, $this->userId), |
90 | 90 | '', array(), |
@@ -202,7 +202,7 @@ discard block |
||
202 | 202 | |
203 | 203 | foreach ($acl_list as $sharingACL) { |
204 | 204 | $target_user = $sharingACL->getUserId(); |
205 | - if($target_user === $this->userId){ |
|
205 | + if ($target_user === $this->userId) { |
|
206 | 206 | continue; |
207 | 207 | } |
208 | 208 | $this->activityService->add( |
@@ -217,15 +217,15 @@ discard block |
||
217 | 217 | $link, $storedCredential->getUserId(), Activity::TYPE_ITEM_ACTION); |
218 | 218 | } |
219 | 219 | } |
220 | - if($set_share_key === true){ |
|
220 | + if ($set_share_key === true) { |
|
221 | 221 | $storedCredential->setSharedKey($shared_key); |
222 | 222 | $credential['shared_key'] = $shared_key; |
223 | 223 | } |
224 | - if($unshare_action === true){ |
|
224 | + if ($unshare_action === true) { |
|
225 | 225 | $storedCredential->setSharedKey(''); |
226 | 226 | $credential['shared_key'] = ''; |
227 | 227 | } |
228 | - if(!$skip_revision) { |
|
228 | + if (!$skip_revision) { |
|
229 | 229 | $this->credentialRevisionService->createRevision($storedCredential, $storedCredential->getUserId(), $credential_id, $this->userId); |
230 | 230 | } |
231 | 231 | $credential = $this->credentialService->updateCredential($credential); |
@@ -258,7 +258,7 @@ discard block |
||
258 | 258 | try { |
259 | 259 | $credential = $this->credentialService->getCredentialByGUID($credential_guid); |
260 | 260 | } |
261 | - catch (DoesNotExistException $ex){ |
|
261 | + catch (DoesNotExistException $ex) { |
|
262 | 262 | return new NotFoundJSONResponse(); |
263 | 263 | } |
264 | 264 | |
@@ -268,7 +268,7 @@ discard block |
||
268 | 268 | } |
269 | 269 | else { |
270 | 270 | $acl = $this->sharingService->getACL($this->userId, $credential_guid); |
271 | - if ($acl->hasPermission(SharingACL::HISTORY)){ |
|
271 | + if ($acl->hasPermission(SharingACL::HISTORY)) { |
|
272 | 272 | $result = $this->credentialRevisionService->getRevisions($credential->getId()); |
273 | 273 | } |
274 | 274 | else { |
@@ -290,7 +290,7 @@ discard block |
||
290 | 290 | /** |
291 | 291 | * @NoAdminRequired |
292 | 292 | */ |
293 | - public function updateRevision($credential_guid, $revision_id, $credential_data){ |
|
293 | + public function updateRevision($credential_guid, $revision_id, $credential_data) { |
|
294 | 294 | $revision = null; |
295 | 295 | try { |
296 | 296 | $credential = $this->credentialService->getCredentialByGUID($credential_guid, $this->userId); |
@@ -298,9 +298,9 @@ discard block |
||
298 | 298 | return new NotFoundJSONResponse(); |
299 | 299 | } |
300 | 300 | |
301 | - try{ |
|
301 | + try { |
|
302 | 302 | $revision = $this->credentialRevisionService->getRevision($revision_id); |
303 | - } catch(DoesNotExistException $exception){ |
|
303 | + } catch (DoesNotExistException $exception) { |
|
304 | 304 | return new NotFoundJSONResponse(); |
305 | 305 | } |
306 | 306 |
@@ -202,7 +202,7 @@ discard block |
||
202 | 202 | |
203 | 203 | foreach ($acl_list as $sharingACL) { |
204 | 204 | $target_user = $sharingACL->getUserId(); |
205 | - if($target_user === $this->userId){ |
|
205 | + if($target_user === $this->userId) { |
|
206 | 206 | continue; |
207 | 207 | } |
208 | 208 | $this->activityService->add( |
@@ -217,11 +217,11 @@ discard block |
||
217 | 217 | $link, $storedCredential->getUserId(), Activity::TYPE_ITEM_ACTION); |
218 | 218 | } |
219 | 219 | } |
220 | - if($set_share_key === true){ |
|
220 | + if($set_share_key === true) { |
|
221 | 221 | $storedCredential->setSharedKey($shared_key); |
222 | 222 | $credential['shared_key'] = $shared_key; |
223 | 223 | } |
224 | - if($unshare_action === true){ |
|
224 | + if($unshare_action === true) { |
|
225 | 225 | $storedCredential->setSharedKey(''); |
226 | 226 | $credential['shared_key'] = ''; |
227 | 227 | } |
@@ -257,21 +257,18 @@ discard block |
||
257 | 257 | public function getRevision($credential_guid) { |
258 | 258 | try { |
259 | 259 | $credential = $this->credentialService->getCredentialByGUID($credential_guid); |
260 | - } |
|
261 | - catch (DoesNotExistException $ex){ |
|
260 | + } catch (DoesNotExistException $ex){ |
|
262 | 261 | return new NotFoundJSONResponse(); |
263 | 262 | } |
264 | 263 | |
265 | 264 | // If the request was made by the owner of the credential |
266 | 265 | if ($this->userId === $credential->getUserId()) { |
267 | 266 | $result = $this->credentialRevisionService->getRevisions($credential->getId(), $this->userId); |
268 | - } |
|
269 | - else { |
|
267 | + } else { |
|
270 | 268 | $acl = $this->sharingService->getACL($this->userId, $credential_guid); |
271 | - if ($acl->hasPermission(SharingACL::HISTORY)){ |
|
269 | + if ($acl->hasPermission(SharingACL::HISTORY)) { |
|
272 | 270 | $result = $this->credentialRevisionService->getRevisions($credential->getId()); |
273 | - } |
|
274 | - else { |
|
271 | + } else { |
|
275 | 272 | return new NotFoundJSONResponse(); |
276 | 273 | } |
277 | 274 | } |
@@ -290,7 +287,7 @@ discard block |
||
290 | 287 | /** |
291 | 288 | * @NoAdminRequired |
292 | 289 | */ |
293 | - public function updateRevision($credential_guid, $revision_id, $credential_data){ |
|
290 | + public function updateRevision($credential_guid, $revision_id, $credential_data) { |
|
294 | 291 | $revision = null; |
295 | 292 | try { |
296 | 293 | $credential = $this->credentialService->getCredentialByGUID($credential_guid, $this->userId); |
@@ -11,10 +11,7 @@ discard block |
||
11 | 11 | |
12 | 12 | namespace OCA\Passman\Controller; |
13 | 13 | |
14 | -use OCA\Files_External\NotFoundException; |
|
15 | -use OCA\Passman\Db\ShareRequest; |
|
16 | 14 | use OCA\Passman\Db\SharingACL; |
17 | -use OCA\Passman\Db\Vault; |
|
18 | 15 | use OCA\Passman\Service\CredentialService; |
19 | 16 | use OCA\Passman\Service\FileService; |
20 | 17 | use OCA\Passman\Service\NotificationService; |
@@ -26,14 +23,9 @@ discard block |
||
26 | 23 | use OCP\IRequest; |
27 | 24 | use OCP\AppFramework\Http\JSONResponse; |
28 | 25 | use OCP\AppFramework\ApiController; |
29 | -use OCP\AppFramework\Http; |
|
30 | -use OCP\AppFramework\Http\DataResponse; |
|
31 | - |
|
32 | -use OCP\IGroup; |
|
33 | 26 | use OCP\IGroupManager; |
34 | 27 | use OCP\IUserManager; |
35 | 28 | use OCP\IUser; |
36 | - |
|
37 | 29 | use OCA\Passman\Service\VaultService; |
38 | 30 | use OCA\Passman\Service\ActivityService; |
39 | 31 | use OCA\Passman\Activity; |
@@ -409,11 +409,11 @@ |
||
409 | 409 | //@TODO Check expire date |
410 | 410 | $acl = $this->shareService->getACL(null, $credential_guid); |
411 | 411 | |
412 | - if ($acl->getExpire() > 0 && Utils::getTime() > $acl->getExpire()) { |
|
412 | + if ($acl->getExpire() > 0 && Utils::getTime() > $acl->getExpire()) { |
|
413 | 413 | return new NotFoundJSONResponse(); |
414 | 414 | } |
415 | 415 | |
416 | - $views = $acl->getExpireViews(); |
|
416 | + $views = $acl->getExpireViews(); |
|
417 | 417 | if ($views === 0) { |
418 | 418 | return new NotFoundJSONResponse(); |
419 | 419 | } else if ($views != -1) { |
@@ -87,9 +87,9 @@ discard block |
||
87 | 87 | */ |
88 | 88 | public function createPublicShare($item_id, $item_guid, $permissions, $expire_timestamp, $expire_views) { |
89 | 89 | |
90 | - try{ |
|
90 | + try { |
|
91 | 91 | $credential = $this->credentialService->getCredentialByGUID($item_guid); |
92 | - } catch (DoesNotExistException $exception){ |
|
92 | + } catch (DoesNotExistException $exception) { |
|
93 | 93 | return new NotFoundResponse(); |
94 | 94 | } |
95 | 95 | |
@@ -230,21 +230,21 @@ discard block |
||
230 | 230 | } |
231 | 231 | |
232 | 232 | |
233 | - public function unshareCredentialFromUser($item_guid, $user_id){ |
|
233 | + public function unshareCredentialFromUser($item_guid, $user_id) { |
|
234 | 234 | $acl = null; |
235 | 235 | $sr = null; |
236 | 236 | try { |
237 | 237 | $acl = $this->shareService->getCredentialAclForUser($user_id, $item_guid); |
238 | - } catch (DoesNotExistException $e){ |
|
238 | + } catch (DoesNotExistException $e) { |
|
239 | 239 | |
240 | 240 | } |
241 | - try{ |
|
242 | - $sr = array_pop($this->shareService->getPendingShareRequestsForCredential($item_guid, $user_id)); |
|
243 | - } catch (DoesNotExistException $e){ |
|
241 | + try { |
|
242 | + $sr = array_pop($this->shareService->getPendingShareRequestsForCredential($item_guid, $user_id)); |
|
243 | + } catch (DoesNotExistException $e) { |
|
244 | 244 | |
245 | 245 | } |
246 | 246 | |
247 | - if($sr){ |
|
247 | + if ($sr) { |
|
248 | 248 | $this->shareService->cleanItemRequestsForUser($sr); |
249 | 249 | $manager = \OC::$server->getNotificationManager(); |
250 | 250 | $notification = $manager->createNotification(); |
@@ -253,7 +253,7 @@ discard block |
||
253 | 253 | ->setUser($user_id); |
254 | 254 | $manager->markProcessed($notification); |
255 | 255 | } |
256 | - if($acl){ |
|
256 | + if ($acl) { |
|
257 | 257 | $this->shareService->deleteShareACL($acl); |
258 | 258 | } |
259 | 259 | return new JSONResponse(array('result' => true)); |
@@ -462,15 +462,15 @@ discard block |
||
462 | 462 | * @return JSONResponse |
463 | 463 | * @return NotFoundResponse |
464 | 464 | */ |
465 | - public function getFile($item_guid, $file_guid){ |
|
465 | + public function getFile($item_guid, $file_guid) { |
|
466 | 466 | try { |
467 | 467 | $credential = $this->credentialService->getCredentialByGUID($item_guid); |
468 | - } catch (DoesNotExistException $e){ |
|
468 | + } catch (DoesNotExistException $e) { |
|
469 | 469 | return new NotFoundJSONResponse(); |
470 | 470 | } |
471 | 471 | |
472 | 472 | $acl = $this->shareService->getACL($this->userId->getUID(), $credential->getGuid()); |
473 | - if (!$acl->hasPermission(SharingACL::FILES)){ |
|
473 | + if (!$acl->hasPermission(SharingACL::FILES)) { |
|
474 | 474 | return new NotFoundJSONResponse(); |
475 | 475 | } else { |
476 | 476 | return $this->fileService->getFileByGuid($file_guid); |
@@ -230,7 +230,7 @@ discard block |
||
230 | 230 | } |
231 | 231 | |
232 | 232 | |
233 | - public function unshareCredentialFromUser($item_guid, $user_id){ |
|
233 | + public function unshareCredentialFromUser($item_guid, $user_id) { |
|
234 | 234 | $acl = null; |
235 | 235 | $sr = null; |
236 | 236 | try { |
@@ -244,7 +244,7 @@ discard block |
||
244 | 244 | |
245 | 245 | } |
246 | 246 | |
247 | - if($sr){ |
|
247 | + if($sr) { |
|
248 | 248 | $this->shareService->cleanItemRequestsForUser($sr); |
249 | 249 | $manager = \OC::$server->getNotificationManager(); |
250 | 250 | $notification = $manager->createNotification(); |
@@ -253,7 +253,7 @@ discard block |
||
253 | 253 | ->setUser($user_id); |
254 | 254 | $manager->markProcessed($notification); |
255 | 255 | } |
256 | - if($acl){ |
|
256 | + if($acl) { |
|
257 | 257 | $this->shareService->deleteShareACL($acl); |
258 | 258 | } |
259 | 259 | return new JSONResponse(array('result' => true)); |
@@ -462,7 +462,7 @@ discard block |
||
462 | 462 | * @return JSONResponse |
463 | 463 | * @return NotFoundResponse |
464 | 464 | */ |
465 | - public function getFile($item_guid, $file_guid){ |
|
465 | + public function getFile($item_guid, $file_guid) { |
|
466 | 466 | try { |
467 | 467 | $credential = $this->credentialService->getCredentialByGUID($item_guid); |
468 | 468 | } catch (DoesNotExistException $e){ |
@@ -470,7 +470,7 @@ discard block |
||
470 | 470 | } |
471 | 471 | |
472 | 472 | $acl = $this->shareService->getACL($this->userId->getUID(), $credential->getGuid()); |
473 | - if (!$acl->hasPermission(SharingACL::FILES)){ |
|
473 | + if (!$acl->hasPermission(SharingACL::FILES)) { |
|
474 | 474 | return new NotFoundJSONResponse(); |
475 | 475 | } else { |
476 | 476 | return $this->fileService->getFileByGuid($file_guid); |
@@ -11,7 +11,6 @@ discard block |
||
11 | 11 | |
12 | 12 | namespace OCA\Passman\AppInfo; |
13 | 13 | use OC\Files\View; |
14 | - |
|
15 | 14 | use OCA\Passman\Controller\CredentialController; |
16 | 15 | use OCA\Passman\Controller\PageController; |
17 | 16 | use OCA\Passman\Controller\ShareController; |
@@ -24,10 +23,8 @@ discard block |
||
24 | 23 | use OCA\Passman\Service\VaultService; |
25 | 24 | use OCA\Passman\Utility\Utils; |
26 | 25 | use OCA\Passman\Service\NotificationService; |
27 | - |
|
28 | 26 | use OCP\AppFramework\App; |
29 | 27 | use OCP\IL10N; |
30 | -use OCP\Util; |
|
31 | 28 | class Application extends App { |
32 | 29 | public function __construct () { |
33 | 30 | parent::__construct('passman'); |
@@ -55,10 +55,10 @@ discard block |
||
55 | 55 | $server->getUserManager(), |
56 | 56 | $c->query('ActivityService'), |
57 | 57 | $c->query('VaultService'), |
58 | - $c->query('ShareService'), |
|
59 | - $c->query('CredentialService'), |
|
60 | - $c->query('NotificationService'), |
|
61 | - $c->query('FileService') |
|
58 | + $c->query('ShareService'), |
|
59 | + $c->query('CredentialService'), |
|
60 | + $c->query('NotificationService'), |
|
61 | + $c->query('FileService') |
|
62 | 62 | ); |
63 | 63 | }); |
64 | 64 | |
@@ -94,7 +94,7 @@ discard block |
||
94 | 94 | $container->registerAlias('ActivityService', ActivityService::class); |
95 | 95 | $container->registerAlias('VaultService', VaultService::class); |
96 | 96 | $container->registerAlias('FileService', FileService::class); |
97 | - $container->registerAlias('ShareService', ShareService::class); |
|
97 | + $container->registerAlias('ShareService', ShareService::class); |
|
98 | 98 | $container->registerAlias('Utils', Utils::class); |
99 | 99 | } |
100 | 100 |
@@ -29,7 +29,7 @@ discard block |
||
29 | 29 | use OCP\IL10N; |
30 | 30 | use OCP\Util; |
31 | 31 | class Application extends App { |
32 | - public function __construct () { |
|
32 | + public function __construct() { |
|
33 | 33 | parent::__construct('passman'); |
34 | 34 | $container = $this->getContainer(); |
35 | 35 | $server = $container->getServer(); |
@@ -65,7 +65,7 @@ discard block |
||
65 | 65 | |
66 | 66 | |
67 | 67 | /** Cron **/ |
68 | - $container->registerService('CronService', function ($c) { |
|
68 | + $container->registerService('CronService', function($c) { |
|
69 | 69 | return new CronService( |
70 | 70 | $c->query('CredentialService'), |
71 | 71 | $c->query('Logger'), |
@@ -76,7 +76,7 @@ discard block |
||
76 | 76 | ); |
77 | 77 | }); |
78 | 78 | |
79 | - $container->registerService('Db', function () { |
|
79 | + $container->registerService('Db', function() { |
|
80 | 80 | return new Db(); |
81 | 81 | }); |
82 | 82 | |
@@ -105,7 +105,7 @@ discard block |
||
105 | 105 | $c = $this->getContainer(); |
106 | 106 | /** @var \OCP\IServerContainer $server */ |
107 | 107 | $server = $c->getServer(); |
108 | - $navigationEntry = function () use ($c, $server) { |
|
108 | + $navigationEntry = function() use ($c, $server) { |
|
109 | 109 | return [ |
110 | 110 | 'id' => $c->getAppName(), |
111 | 111 | 'order' => 10, |
@@ -8,7 +8,6 @@ |
||
8 | 8 | namespace OCA\Passman\Db; |
9 | 9 | |
10 | 10 | use OCA\Passman\Utility\PermissionEntity; |
11 | -use OCP\AppFramework\Db\Entity; |
|
12 | 11 | |
13 | 12 | /** |
14 | 13 | * @method void setId(integer $value) |
@@ -38,50 +38,50 @@ |
||
38 | 38 | class SharingACL extends PermissionEntity implements \JsonSerializable |
39 | 39 | { |
40 | 40 | |
41 | - protected |
|
42 | - $itemId, |
|
43 | - $itemGuid, |
|
44 | - $userId, |
|
45 | - $created, |
|
46 | - $expire, |
|
41 | + protected |
|
42 | + $itemId, |
|
43 | + $itemGuid, |
|
44 | + $userId, |
|
45 | + $created, |
|
46 | + $expire, |
|
47 | 47 | $expireViews, |
48 | - $permissions, |
|
49 | - $vaultId, |
|
50 | - $vaultGuid, |
|
51 | - $sharedKey; |
|
48 | + $permissions, |
|
49 | + $vaultId, |
|
50 | + $vaultGuid, |
|
51 | + $sharedKey; |
|
52 | 52 | |
53 | 53 | |
54 | - public function __construct() { |
|
55 | - // add types in constructor |
|
56 | - $this->addType('itemId', 'integer'); |
|
57 | - $this->addType('created', 'integer'); |
|
58 | - $this->addType('expire', 'integer'); |
|
59 | - $this->addType('expireViews', 'integer'); |
|
60 | - $this->addType('permissions', 'integer'); |
|
61 | - } |
|
54 | + public function __construct() { |
|
55 | + // add types in constructor |
|
56 | + $this->addType('itemId', 'integer'); |
|
57 | + $this->addType('created', 'integer'); |
|
58 | + $this->addType('expire', 'integer'); |
|
59 | + $this->addType('expireViews', 'integer'); |
|
60 | + $this->addType('permissions', 'integer'); |
|
61 | + } |
|
62 | 62 | |
63 | - /** |
|
64 | - * Specify data which should be serialized to JSON |
|
65 | - * @link http://php.net/manual/en/jsonserializable.jsonserialize.php |
|
66 | - * @return mixed data which can be serialized by <b>json_encode</b>, |
|
67 | - * which is a value of any type other than a resource. |
|
68 | - * @since 5.4.0 |
|
69 | - */ |
|
70 | - function jsonSerialize() |
|
71 | - { |
|
72 | - return [ |
|
73 | - 'acl_id' => $this->getId(), |
|
74 | - 'item_id' => $this->getItemId(), |
|
75 | - 'item_guid' => $this->getItemGuid(), |
|
76 | - 'user_id' => $this->getUserId(), |
|
77 | - 'created' => $this->getCreated(), |
|
78 | - 'expire' => $this->getExpire(), |
|
79 | - 'expire_views' => $this->getExpireViews(), |
|
80 | - 'permissions' => $this->getPermissions(), |
|
81 | - 'vault_id' => $this->getVaultId(), |
|
82 | - 'vault_guid' => $this->getVaultGuid(), |
|
83 | - 'shared_key' => $this->getSharedKey(), |
|
84 | - 'pending' => false, |
|
85 | - ]; |
|
86 | - } |
|
63 | + /** |
|
64 | + * Specify data which should be serialized to JSON |
|
65 | + * @link http://php.net/manual/en/jsonserializable.jsonserialize.php |
|
66 | + * @return mixed data which can be serialized by <b>json_encode</b>, |
|
67 | + * which is a value of any type other than a resource. |
|
68 | + * @since 5.4.0 |
|
69 | + */ |
|
70 | + function jsonSerialize() |
|
71 | + { |
|
72 | + return [ |
|
73 | + 'acl_id' => $this->getId(), |
|
74 | + 'item_id' => $this->getItemId(), |
|
75 | + 'item_guid' => $this->getItemGuid(), |
|
76 | + 'user_id' => $this->getUserId(), |
|
77 | + 'created' => $this->getCreated(), |
|
78 | + 'expire' => $this->getExpire(), |
|
79 | + 'expire_views' => $this->getExpireViews(), |
|
80 | + 'permissions' => $this->getPermissions(), |
|
81 | + 'vault_id' => $this->getVaultId(), |
|
82 | + 'vault_guid' => $this->getVaultGuid(), |
|
83 | + 'shared_key' => $this->getSharedKey(), |
|
84 | + 'pending' => false, |
|
85 | + ]; |
|
86 | + } |
|
87 | 87 | } |
88 | 88 | \ No newline at end of file |
@@ -35,8 +35,7 @@ discard block |
||
35 | 35 | * @method string getSharedKey() |
36 | 36 | */ |
37 | 37 | |
38 | -class SharingACL extends PermissionEntity implements \JsonSerializable |
|
39 | -{ |
|
38 | +class SharingACL extends PermissionEntity implements \JsonSerializable { |
|
40 | 39 | |
41 | 40 | protected |
42 | 41 | $itemId, |
@@ -67,8 +66,7 @@ discard block |
||
67 | 66 | * which is a value of any type other than a resource. |
68 | 67 | * @since 5.4.0 |
69 | 68 | */ |
70 | - function jsonSerialize() |
|
71 | - { |
|
69 | + function jsonSerialize() { |
|
72 | 70 | return [ |
73 | 71 | 'acl_id' => $this->getId(), |
74 | 72 | 'item_id' => $this->getItemId(), |
@@ -14,9 +14,7 @@ |
||
14 | 14 | use OCA\Passman\Db\Credential; |
15 | 15 | use OCA\Passman\Db\SharingACL; |
16 | 16 | use OCA\Passman\Db\SharingACLMapper; |
17 | -use OCP\IConfig; |
|
18 | 17 | use OCP\AppFramework\Db\DoesNotExistException; |
19 | - |
|
20 | 18 | use OCA\Passman\Db\CredentialMapper; |
21 | 19 | |
22 | 20 |
@@ -43,23 +43,39 @@ discard block |
||
43 | 43 | public function updateCredential($credential) { |
44 | 44 | return $this->credentialMapper->updateCredential($credential); |
45 | 45 | } |
46 | + |
|
47 | + /** |
|
48 | + * @param Credential $credential |
|
49 | + */ |
|
46 | 50 | public function upd($credential) { |
47 | 51 | return $this->credentialMapper->upd($credential); |
48 | 52 | } |
49 | 53 | |
54 | + /** |
|
55 | + * @param Credential $credential |
|
56 | + */ |
|
50 | 57 | public function deleteCredential($credential){ |
51 | 58 | return $this->credentialMapper->deleteCredential($credential); |
52 | 59 | } |
53 | 60 | |
61 | + /** |
|
62 | + * @param integer $vault_id |
|
63 | + */ |
|
54 | 64 | public function getCredentialsByVaultId($vault_id, $user_id) { |
55 | 65 | return $this->credentialMapper->getCredentialsByVaultId($vault_id, $user_id); |
56 | 66 | } |
57 | 67 | |
68 | + /** |
|
69 | + * @param integer $vault_id |
|
70 | + */ |
|
58 | 71 | public function getRandomCredentialByVaultId($vault_id, $user_id) { |
59 | 72 | $credentials = $this->credentialMapper->getRandomCredentialByVaultId($vault_id, $user_id); |
60 | 73 | return array_pop($credentials); |
61 | 74 | } |
62 | 75 | |
76 | + /** |
|
77 | + * @param integer $timestamp |
|
78 | + */ |
|
63 | 79 | public function getExpiredCredentials($timestamp) { |
64 | 80 | return $this->credentialMapper->getExpiredCredentials($timestamp); |
65 | 81 | } |
@@ -77,6 +93,10 @@ discard block |
||
77 | 93 | |
78 | 94 | throw new DoesNotExistException("Did expect one result but found none when executing"); |
79 | 95 | } |
96 | + |
|
97 | + /** |
|
98 | + * @param integer $credential_id |
|
99 | + */ |
|
80 | 100 | public function getCredentialLabelById($credential_id){ |
81 | 101 | return $this->credentialMapper->getCredentialLabelById($credential_id); |
82 | 102 | } |
@@ -23,11 +23,11 @@ discard block |
||
23 | 23 | class CredentialService { |
24 | 24 | |
25 | 25 | private $credentialMapper; |
26 | - private $sharingACL; |
|
26 | + private $sharingACL; |
|
27 | 27 | |
28 | 28 | public function __construct(CredentialMapper $credentialMapper, SharingACLMapper $sharingACL) { |
29 | 29 | $this->credentialMapper = $credentialMapper; |
30 | - $this->sharingACL = $sharingACL; |
|
30 | + $this->sharingACL = $sharingACL; |
|
31 | 31 | } |
32 | 32 | |
33 | 33 | /** |
@@ -65,23 +65,23 @@ discard block |
||
65 | 65 | } |
66 | 66 | |
67 | 67 | public function getCredentialById($credential_id, $user_id){ |
68 | - $credential = $this->credentialMapper->getCredentialById($credential_id); |
|
69 | - if ($credential->getUserId() === $user_id){ |
|
70 | - return $credential; |
|
71 | - } |
|
72 | - else { |
|
73 | - $acl = $this->sharingACL->getItemACL($user_id, $credential->getGuid()); |
|
74 | - if ($acl->hasPermission(SharingACL::READ)); |
|
75 | - return $credential; |
|
76 | - } |
|
77 | - |
|
78 | - throw new DoesNotExistException("Did expect one result but found none when executing"); |
|
68 | + $credential = $this->credentialMapper->getCredentialById($credential_id); |
|
69 | + if ($credential->getUserId() === $user_id){ |
|
70 | + return $credential; |
|
71 | + } |
|
72 | + else { |
|
73 | + $acl = $this->sharingACL->getItemACL($user_id, $credential->getGuid()); |
|
74 | + if ($acl->hasPermission(SharingACL::READ)); |
|
75 | + return $credential; |
|
76 | + } |
|
77 | + |
|
78 | + throw new DoesNotExistException("Did expect one result but found none when executing"); |
|
79 | 79 | } |
80 | 80 | public function getCredentialLabelById($credential_id){ |
81 | 81 | return $this->credentialMapper->getCredentialLabelById($credential_id); |
82 | 82 | } |
83 | 83 | |
84 | 84 | public function getCredentialByGUID($credential_guid, $user_id = null){ |
85 | - return $this->credentialMapper->getCredentialByGUID($credential_guid, $user_id); |
|
86 | - } |
|
85 | + return $this->credentialMapper->getCredentialByGUID($credential_guid, $user_id); |
|
86 | + } |
|
87 | 87 | } |
88 | 88 | \ No newline at end of file |
@@ -47,7 +47,7 @@ discard block |
||
47 | 47 | return $this->credentialMapper->upd($credential); |
48 | 48 | } |
49 | 49 | |
50 | - public function deleteCredential($credential){ |
|
50 | + public function deleteCredential($credential) { |
|
51 | 51 | return $this->credentialMapper->deleteCredential($credential); |
52 | 52 | } |
53 | 53 | |
@@ -64,9 +64,9 @@ discard block |
||
64 | 64 | return $this->credentialMapper->getExpiredCredentials($timestamp); |
65 | 65 | } |
66 | 66 | |
67 | - public function getCredentialById($credential_id, $user_id){ |
|
67 | + public function getCredentialById($credential_id, $user_id) { |
|
68 | 68 | $credential = $this->credentialMapper->getCredentialById($credential_id); |
69 | - if ($credential->getUserId() === $user_id){ |
|
69 | + if ($credential->getUserId() === $user_id) { |
|
70 | 70 | return $credential; |
71 | 71 | } |
72 | 72 | else { |
@@ -77,11 +77,11 @@ discard block |
||
77 | 77 | |
78 | 78 | throw new DoesNotExistException("Did expect one result but found none when executing"); |
79 | 79 | } |
80 | - public function getCredentialLabelById($credential_id){ |
|
80 | + public function getCredentialLabelById($credential_id) { |
|
81 | 81 | return $this->credentialMapper->getCredentialLabelById($credential_id); |
82 | 82 | } |
83 | 83 | |
84 | - public function getCredentialByGUID($credential_guid, $user_id = null){ |
|
84 | + public function getCredentialByGUID($credential_guid, $user_id = null) { |
|
85 | 85 | return $this->credentialMapper->getCredentialByGUID($credential_guid, $user_id); |
86 | 86 | } |
87 | 87 | } |
88 | 88 | \ No newline at end of file |
@@ -47,7 +47,7 @@ discard block |
||
47 | 47 | return $this->credentialMapper->upd($credential); |
48 | 48 | } |
49 | 49 | |
50 | - public function deleteCredential($credential){ |
|
50 | + public function deleteCredential($credential) { |
|
51 | 51 | return $this->credentialMapper->deleteCredential($credential); |
52 | 52 | } |
53 | 53 | |
@@ -64,12 +64,11 @@ discard block |
||
64 | 64 | return $this->credentialMapper->getExpiredCredentials($timestamp); |
65 | 65 | } |
66 | 66 | |
67 | - public function getCredentialById($credential_id, $user_id){ |
|
67 | + public function getCredentialById($credential_id, $user_id) { |
|
68 | 68 | $credential = $this->credentialMapper->getCredentialById($credential_id); |
69 | - if ($credential->getUserId() === $user_id){ |
|
69 | + if ($credential->getUserId() === $user_id) { |
|
70 | 70 | return $credential; |
71 | - } |
|
72 | - else { |
|
71 | + } else { |
|
73 | 72 | $acl = $this->sharingACL->getItemACL($user_id, $credential->getGuid()); |
74 | 73 | if ($acl->hasPermission(SharingACL::READ)); |
75 | 74 | return $credential; |
@@ -77,11 +76,11 @@ discard block |
||
77 | 76 | |
78 | 77 | throw new DoesNotExistException("Did expect one result but found none when executing"); |
79 | 78 | } |
80 | - public function getCredentialLabelById($credential_id){ |
|
79 | + public function getCredentialLabelById($credential_id) { |
|
81 | 80 | return $this->credentialMapper->getCredentialLabelById($credential_id); |
82 | 81 | } |
83 | 82 | |
84 | - public function getCredentialByGUID($credential_guid, $user_id = null){ |
|
83 | + public function getCredentialByGUID($credential_guid, $user_id = null) { |
|
85 | 84 | return $this->credentialMapper->getCredentialByGUID($credential_guid, $user_id); |
86 | 85 | } |
87 | 86 | } |
88 | 87 | \ No newline at end of file |
@@ -11,9 +11,6 @@ |
||
11 | 11 | |
12 | 12 | namespace OCA\Passman\Service; |
13 | 13 | |
14 | -use OCP\IConfig; |
|
15 | -use OCP\AppFramework\Db\DoesNotExistException; |
|
16 | - |
|
17 | 14 | use OCA\Passman\Db\FileMapper; |
18 | 15 | |
19 | 16 |
@@ -25,18 +25,18 @@ discard block |
||
25 | 25 | $this->manager = \OC::$server->getNotificationManager(); |
26 | 26 | } |
27 | 27 | |
28 | - function credentialExpiredNotification($credential){ |
|
28 | + function credentialExpiredNotification($credential) { |
|
29 | 29 | $urlGenerator = \OC::$server->getURLGenerator(); |
30 | - $link = $urlGenerator->getAbsoluteURL($urlGenerator->linkTo('','index.php/apps/passman/#/vault/'. $credential->getVaultId() .'/edit/'. $credential->getId())); |
|
30 | + $link = $urlGenerator->getAbsoluteURL($urlGenerator->linkTo('', 'index.php/apps/passman/#/vault/' . $credential->getVaultId() . '/edit/' . $credential->getId())); |
|
31 | 31 | $api = $urlGenerator->getAbsoluteURL($urlGenerator->linkTo('', 'index.php/apps/passman')); |
32 | 32 | $notification = $this->manager->createNotification(); |
33 | 33 | $remindAction = $notification->createAction(); |
34 | 34 | $remindAction->setLabel('remind') |
35 | - ->setLink($api. '/api/internal/notifications/remind/'. $credential->getId() , 'POST'); |
|
35 | + ->setLink($api . '/api/internal/notifications/remind/' . $credential->getId(), 'POST'); |
|
36 | 36 | |
37 | 37 | $declineAction = $notification->createAction(); |
38 | 38 | $declineAction->setLabel('ignore') |
39 | - ->setLink($api . '/api/internal/notifications/read/'. $credential->getId(), 'DELETE'); |
|
39 | + ->setLink($api . '/api/internal/notifications/read/' . $credential->getId(), 'DELETE'); |
|
40 | 40 | |
41 | 41 | $notification->setApp('passman') |
42 | 42 | ->setUser($credential->getUserId()) |
@@ -51,15 +51,15 @@ discard block |
||
51 | 51 | } |
52 | 52 | |
53 | 53 | |
54 | - function credentialSharedNotification($data){ |
|
54 | + function credentialSharedNotification($data) { |
|
55 | 55 | $urlGenerator = \OC::$server->getURLGenerator(); |
56 | - $link = $urlGenerator->getAbsoluteURL($urlGenerator->linkTo('','index.php/apps/passman/#/')); |
|
56 | + $link = $urlGenerator->getAbsoluteURL($urlGenerator->linkTo('', 'index.php/apps/passman/#/')); |
|
57 | 57 | $api = $urlGenerator->getAbsoluteURL($urlGenerator->linkTo('', 'index.php/apps/passman')); |
58 | 58 | $notification = $this->manager->createNotification(); |
59 | 59 | |
60 | 60 | $declineAction = $notification->createAction(); |
61 | 61 | $declineAction->setLabel('decline') |
62 | - ->setLink($api . '/api/v2/sharing/decline/'. $data['req_id'], 'DELETE'); |
|
62 | + ->setLink($api . '/api/v2/sharing/decline/' . $data['req_id'], 'DELETE'); |
|
63 | 63 | |
64 | 64 | $notification->setApp('passman') |
65 | 65 | ->setUser($data['target_user']) |
@@ -73,7 +73,7 @@ discard block |
||
73 | 73 | } |
74 | 74 | |
75 | 75 | |
76 | - function credentialDeclinedSharedNotification($data){ |
|
76 | + function credentialDeclinedSharedNotification($data) { |
|
77 | 77 | $notification = $this->manager->createNotification(); |
78 | 78 | $notification->setApp('passman') |
79 | 79 | ->setUser($data['target_user']) |
@@ -84,7 +84,7 @@ discard block |
||
84 | 84 | } |
85 | 85 | |
86 | 86 | |
87 | - function credentialAcceptedSharedNotification($data){ |
|
87 | + function credentialAcceptedSharedNotification($data) { |
|
88 | 88 | $notification = $this->manager->createNotification(); |
89 | 89 | $notification->setApp('passman') |
90 | 90 | ->setUser($data['target_user']) |
@@ -25,7 +25,7 @@ discard block |
||
25 | 25 | $this->manager = \OC::$server->getNotificationManager(); |
26 | 26 | } |
27 | 27 | |
28 | - function credentialExpiredNotification($credential){ |
|
28 | + function credentialExpiredNotification($credential) { |
|
29 | 29 | $urlGenerator = \OC::$server->getURLGenerator(); |
30 | 30 | $link = $urlGenerator->getAbsoluteURL($urlGenerator->linkTo('','index.php/apps/passman/#/vault/'. $credential->getVaultId() .'/edit/'. $credential->getId())); |
31 | 31 | $api = $urlGenerator->getAbsoluteURL($urlGenerator->linkTo('', 'index.php/apps/passman')); |
@@ -51,7 +51,7 @@ discard block |
||
51 | 51 | } |
52 | 52 | |
53 | 53 | |
54 | - function credentialSharedNotification($data){ |
|
54 | + function credentialSharedNotification($data) { |
|
55 | 55 | $urlGenerator = \OC::$server->getURLGenerator(); |
56 | 56 | $link = $urlGenerator->getAbsoluteURL($urlGenerator->linkTo('','index.php/apps/passman/#/')); |
57 | 57 | $api = $urlGenerator->getAbsoluteURL($urlGenerator->linkTo('', 'index.php/apps/passman')); |
@@ -73,7 +73,7 @@ discard block |
||
73 | 73 | } |
74 | 74 | |
75 | 75 | |
76 | - function credentialDeclinedSharedNotification($data){ |
|
76 | + function credentialDeclinedSharedNotification($data) { |
|
77 | 77 | $notification = $this->manager->createNotification(); |
78 | 78 | $notification->setApp('passman') |
79 | 79 | ->setUser($data['target_user']) |
@@ -84,7 +84,7 @@ discard block |
||
84 | 84 | } |
85 | 85 | |
86 | 86 | |
87 | - function credentialAcceptedSharedNotification($data){ |
|
87 | + function credentialAcceptedSharedNotification($data) { |
|
88 | 88 | $notification = $this->manager->createNotification(); |
89 | 89 | $notification->setApp('passman') |
90 | 90 | ->setUser($data['target_user']) |
@@ -49,6 +49,7 @@ discard block |
||
49 | 49 | * @param $target_item_guid string The shared item GUID |
50 | 50 | * @param $request_array array |
51 | 51 | * @param $permissions integer Must be created with a bitmask from options on the ShareRequest class |
52 | + * @param string $credential_owner |
|
52 | 53 | * @return array Array of sharing requests |
53 | 54 | */ |
54 | 55 | public function createBulkRequests($target_item_id, $target_item_guid, $request_array, $permissions, $credential_owner) { |
@@ -253,7 +254,6 @@ discard block |
||
253 | 254 | /** |
254 | 255 | * Delete ACL |
255 | 256 | * |
256 | - * @param ShareRequest $request |
|
257 | 257 | * @return \OCA\Passman\Db\ShareRequest[] |
258 | 258 | */ |
259 | 259 | public function deleteShareACL(SharingACL $ACL) { |
@@ -277,7 +277,6 @@ discard block |
||
277 | 277 | /** |
278 | 278 | * Get pending share requests by guid and uid |
279 | 279 | * |
280 | - * @param ShareRequest $request |
|
281 | 280 | * @return \OCA\Passman\Db\ShareRequest[] |
282 | 281 | */ |
283 | 282 | public function getPendingShareRequestsForCredential($item_guid, $user_id) { |
@@ -9,7 +9,6 @@ |
||
9 | 9 | namespace OCA\Passman\Service; |
10 | 10 | |
11 | 11 | |
12 | -use Icewind\SMB\Share; |
|
13 | 12 | use OCA\Passman\Db\CredentialMapper; |
14 | 13 | use OCA\Passman\Db\CredentialRevision; |
15 | 14 | use OCA\Passman\Db\ShareRequest; |
@@ -176,31 +176,31 @@ discard block |
||
176 | 176 | } |
177 | 177 | |
178 | 178 | |
179 | - /** |
|
180 | - * Deletes a share request by the item ID |
|
181 | - * @param ShareRequest $request |
|
182 | - * @return \PDOStatement |
|
183 | - */ |
|
179 | + /** |
|
180 | + * Deletes a share request by the item ID |
|
181 | + * @param ShareRequest $request |
|
182 | + * @return \PDOStatement |
|
183 | + */ |
|
184 | 184 | public function cleanItemRequestsForUser(ShareRequest $request) { |
185 | 185 | return $this->shareRequest->cleanItemRequestsForUser($request->getItemId(), $request->getTargetUserId()); |
186 | 186 | } |
187 | 187 | |
188 | - /** |
|
189 | - * Get an share request by id |
|
190 | - * @param $id |
|
191 | - * @return ShareRequest |
|
192 | - */ |
|
188 | + /** |
|
189 | + * Get an share request by id |
|
190 | + * @param $id |
|
191 | + * @return ShareRequest |
|
192 | + */ |
|
193 | 193 | public function getShareRequestById($id) { |
194 | 194 | return $this->shareRequest->getShareRequestById($id); |
195 | 195 | } |
196 | 196 | |
197 | - /** |
|
198 | - * Get an share request by $item_guid and $target_vault_guid |
|
199 | - * |
|
200 | - * @param $item_guid |
|
201 | - * @param $target_vault_guid |
|
202 | - * @return ShareRequest |
|
203 | - */ |
|
197 | + /** |
|
198 | + * Get an share request by $item_guid and $target_vault_guid |
|
199 | + * |
|
200 | + * @param $item_guid |
|
201 | + * @param $target_vault_guid |
|
202 | + * @return ShareRequest |
|
203 | + */ |
|
204 | 204 | public function getRequestByGuid($item_guid, $target_vault_guid) { |
205 | 205 | return $this->shareRequest->getRequestByItemAndVaultGuid($item_guid, $target_vault_guid); |
206 | 206 | } |
@@ -260,11 +260,11 @@ discard block |
||
260 | 260 | return $this->sharingACL->deleteShareACL($ACL); |
261 | 261 | } |
262 | 262 | |
263 | - /** |
|
264 | - * Updates the given ACL entry |
|
265 | - * @param SharingACL $sharingACL |
|
266 | - * @return SharingACL |
|
267 | - */ |
|
263 | + /** |
|
264 | + * Updates the given ACL entry |
|
265 | + * @param SharingACL $sharingACL |
|
266 | + * @return SharingACL |
|
267 | + */ |
|
268 | 268 | public function updateCredentialACL(SharingACL $sharingACL) { |
269 | 269 | return $this->sharingACL->updateCredentialACL($sharingACL); |
270 | 270 | } |
@@ -286,6 +286,6 @@ discard block |
||
286 | 286 | |
287 | 287 | |
288 | 288 | public function updatePendingShareRequestsForCredential($item_guid, $user_id, $permissions){ |
289 | - return $this->shareRequest->updatePendinRequestPermissions($item_guid, $user_id, $permissions); |
|
290 | - } |
|
289 | + return $this->shareRequest->updatePendinRequestPermissions($item_guid, $user_id, $permissions); |
|
290 | + } |
|
291 | 291 | } |
292 | 292 | \ No newline at end of file |
@@ -285,7 +285,7 @@ |
||
285 | 285 | } |
286 | 286 | |
287 | 287 | |
288 | - public function updatePendingShareRequestsForCredential($item_guid, $user_id, $permissions){ |
|
288 | + public function updatePendingShareRequestsForCredential($item_guid, $user_id, $permissions) { |
|
289 | 289 | return $this->shareRequest->updatePendinRequestPermissions($item_guid, $user_id, $permissions); |
290 | 290 | } |
291 | 291 | } |
292 | 292 | \ No newline at end of file |
@@ -71,7 +71,9 @@ discard block |
||
71 | 71 | } |
72 | 72 | |
73 | 73 | public function createACLEntry(SharingACL $acl) { |
74 | - if ($acl->getCreated() === null) $acl->setCreated((new \DateTime())->getTimestamp()); |
|
74 | + if ($acl->getCreated() === null) { |
|
75 | + $acl->setCreated((new \DateTime())->getTimestamp()); |
|
76 | + } |
|
75 | 77 | return $this->sharingACL->createACLEntry($acl); |
76 | 78 | } |
77 | 79 | |
@@ -124,12 +126,16 @@ discard block |
||
124 | 126 | $return = []; |
125 | 127 | foreach ($entries as $entry) { |
126 | 128 | // Check if the user can read the credential, probably unnecesary, but just to be sure |
127 | - if (!$entry->hasPermission(SharingACL::READ)) continue; |
|
129 | + if (!$entry->hasPermission(SharingACL::READ)) { |
|
130 | + continue; |
|
131 | + } |
|
128 | 132 | |
129 | 133 | $tmp = $entry->jsonSerialize(); |
130 | 134 | $tmp['credential_data'] = $this->credential->getCredentialById($entry->getItemId())->jsonSerialize(); |
131 | 135 | |
132 | - if (!$entry->hasPermission(SharingACL::FILES)) unset($tmp['credential_data']['files']); |
|
136 | + if (!$entry->hasPermission(SharingACL::FILES)) { |
|
137 | + unset($tmp['credential_data']['files']); |
|
138 | + } |
|
133 | 139 | unset($tmp['credential_data']['shared_key']); |
134 | 140 | $return[] = $tmp; |
135 | 141 | } |
@@ -150,12 +156,16 @@ discard block |
||
150 | 156 | $acl = $this->sharingACL->getItemACL($user_id, $item_guid); |
151 | 157 | |
152 | 158 | // Check if the user can read the credential, probably unnecesary, but just to be sure |
153 | - if (!$acl->hasPermission(SharingACL::READ)) throw new DoesNotExistException("Item not found or wrong access level"); |
|
159 | + if (!$acl->hasPermission(SharingACL::READ)) { |
|
160 | + throw new DoesNotExistException("Item not found or wrong access level"); |
|
161 | + } |
|
154 | 162 | |
155 | 163 | $tmp = $acl->jsonSerialize(); |
156 | 164 | $tmp['credential_data'] = $this->credential->getCredentialById($acl->getItemId())->jsonSerialize(); |
157 | 165 | |
158 | - if (!$acl->hasPermission(SharingACL::FILES)) unset($tmp['credential_data']['files']); |
|
166 | + if (!$acl->hasPermission(SharingACL::FILES)) { |
|
167 | + unset($tmp['credential_data']['files']); |
|
168 | + } |
|
159 | 169 | unset($tmp['credential_data']['shared_key']); |
160 | 170 | |
161 | 171 | return $tmp; |
@@ -170,7 +180,9 @@ discard block |
||
170 | 180 | */ |
171 | 181 | public function getItemHistory($user_id, $item_guid) { |
172 | 182 | $acl = $this->sharingACL->getItemACL($user_id, $item_guid); |
173 | - if (!$acl->hasPermission(SharingACL::READ | SharingACL::HISTORY)) return []; |
|
183 | + if (!$acl->hasPermission(SharingACL::READ | SharingACL::HISTORY)) { |
|
184 | + return []; |
|
185 | + } |
|
174 | 186 | |
175 | 187 | return $this->revisions->getRevisions($acl->getItemId()); |
176 | 188 | } |
@@ -285,7 +297,7 @@ discard block |
||
285 | 297 | } |
286 | 298 | |
287 | 299 | |
288 | - public function updatePendingShareRequestsForCredential($item_guid, $user_id, $permissions){ |
|
300 | + public function updatePendingShareRequestsForCredential($item_guid, $user_id, $permissions) { |
|
289 | 301 | return $this->shareRequest->updatePendinRequestPermissions($item_guid, $user_id, $permissions); |
290 | 302 | } |
291 | 303 | } |
292 | 304 | \ No newline at end of file |
@@ -23,7 +23,7 @@ discard block |
||
23 | 23 | public function __construct($AppName, |
24 | 24 | IRequest $request, |
25 | 25 | $UserId, |
26 | - FileService $fileService){ |
|
26 | + FileService $fileService) { |
|
27 | 27 | parent::__construct($AppName, $request); |
28 | 28 | $this->userId = $UserId; |
29 | 29 | $this->fileService = $fileService; |
@@ -56,20 +56,20 @@ discard block |
||
56 | 56 | return new JSONResponse($this->fileService->deleteFile($file_id, $this->userId)); |
57 | 57 | } |
58 | 58 | |
59 | - public function updateFile($file_id, $file_data, $filename, $mimetype, $size){ |
|
60 | - try{ |
|
59 | + public function updateFile($file_id, $file_data, $filename, $mimetype, $size) { |
|
60 | + try { |
|
61 | 61 | $file = $this->fileService->getFile($file_id, $this->userId); |
62 | - } catch (DoesNotExistException $doesNotExistException){ |
|
62 | + } catch (DoesNotExistException $doesNotExistException) { |
|
63 | 63 | |
64 | 64 | } |
65 | - if($file){ |
|
66 | - if($file_data) { |
|
65 | + if ($file) { |
|
66 | + if ($file_data) { |
|
67 | 67 | $file->setFileData($file_data); |
68 | 68 | } |
69 | - if($filename) { |
|
69 | + if ($filename) { |
|
70 | 70 | $file->setFilename($filename); |
71 | 71 | } |
72 | - if($filename || $file_data){ |
|
72 | + if ($filename || $file_data) { |
|
73 | 73 | new JSONResponse($this->fileService->updateFile($file)); |
74 | 74 | } |
75 | 75 | } |
@@ -23,7 +23,7 @@ discard block |
||
23 | 23 | public function __construct($AppName, |
24 | 24 | IRequest $request, |
25 | 25 | $UserId, |
26 | - FileService $fileService){ |
|
26 | + FileService $fileService) { |
|
27 | 27 | parent::__construct($AppName, $request); |
28 | 28 | $this->userId = $UserId; |
29 | 29 | $this->fileService = $fileService; |
@@ -56,20 +56,20 @@ discard block |
||
56 | 56 | return new JSONResponse($this->fileService->deleteFile($file_id, $this->userId)); |
57 | 57 | } |
58 | 58 | |
59 | - public function updateFile($file_id, $file_data, $filename, $mimetype, $size){ |
|
59 | + public function updateFile($file_id, $file_data, $filename, $mimetype, $size) { |
|
60 | 60 | try{ |
61 | 61 | $file = $this->fileService->getFile($file_id, $this->userId); |
62 | 62 | } catch (DoesNotExistException $doesNotExistException){ |
63 | 63 | |
64 | 64 | } |
65 | - if($file){ |
|
65 | + if($file) { |
|
66 | 66 | if($file_data) { |
67 | 67 | $file->setFileData($file_data); |
68 | 68 | } |
69 | 69 | if($filename) { |
70 | 70 | $file->setFilename($filename); |
71 | 71 | } |
72 | - if($filename || $file_data){ |
|
72 | + if($filename || $file_data) { |
|
73 | 73 | new JSONResponse($this->fileService->updateFile($file)); |
74 | 74 | } |
75 | 75 | } |
@@ -79,7 +79,7 @@ |
||
79 | 79 | try { |
80 | 80 | $vault = $this->vaultService->getByGuid($vault_guid, $this->userId); |
81 | 81 | } catch (DoesNotExistException $e) { |
82 | - return new NotFoundJSONResponse(); |
|
82 | + return new NotFoundJSONResponse(); |
|
83 | 83 | } |
84 | 84 | $result = array(); |
85 | 85 | if ($vault) { |