| @@ -49,6 +49,7 @@ discard block | ||
| 49 | 49 | * @param $target_item_guid string The shared item GUID | 
| 50 | 50 | * @param $request_array array | 
| 51 | 51 | * @param $permissions integer Must be created with a bitmask from options on the ShareRequest class | 
| 52 | + * @param string $credential_owner | |
| 52 | 53 | * @return array Array of sharing requests | 
| 53 | 54 | */ | 
| 54 | 55 |  	public function createBulkRequests($target_item_id, $target_item_guid, $request_array, $permissions, $credential_owner) { | 
| @@ -253,7 +254,6 @@ discard block | ||
| 253 | 254 | /** | 
| 254 | 255 | * Delete ACL | 
| 255 | 256 | * | 
| 256 | - * @param ShareRequest $request | |
| 257 | 257 | * @return \OCA\Passman\Db\ShareRequest[] | 
| 258 | 258 | */ | 
| 259 | 259 |  	public function deleteShareACL(SharingACL $ACL) { | 
| @@ -277,7 +277,6 @@ discard block | ||
| 277 | 277 | /** | 
| 278 | 278 | * Get pending share requests by guid and uid | 
| 279 | 279 | * | 
| 280 | - * @param ShareRequest $request | |
| 281 | 280 | * @return \OCA\Passman\Db\ShareRequest[] | 
| 282 | 281 | */ | 
| 283 | 282 |  	public function getPendingShareRequestsForCredential($item_guid, $user_id) { | 
| @@ -176,31 +176,31 @@ discard block | ||
| 176 | 176 | } | 
| 177 | 177 | |
| 178 | 178 | |
| 179 | - /** | |
| 180 | - * Deletes a share request by the item ID | |
| 181 | - * @param ShareRequest $request | |
| 182 | - * @return \PDOStatement | |
| 183 | - */ | |
| 179 | + /** | |
| 180 | + * Deletes a share request by the item ID | |
| 181 | + * @param ShareRequest $request | |
| 182 | + * @return \PDOStatement | |
| 183 | + */ | |
| 184 | 184 |  	public function cleanItemRequestsForUser(ShareRequest $request) { | 
| 185 | 185 | return $this->shareRequest->cleanItemRequestsForUser($request->getItemId(), $request->getTargetUserId()); | 
| 186 | 186 | } | 
| 187 | 187 | |
| 188 | - /** | |
| 189 | - * Get an share request by id | |
| 190 | - * @param $id | |
| 191 | - * @return ShareRequest | |
| 192 | - */ | |
| 188 | + /** | |
| 189 | + * Get an share request by id | |
| 190 | + * @param $id | |
| 191 | + * @return ShareRequest | |
| 192 | + */ | |
| 193 | 193 |  	public function getShareRequestById($id) { | 
| 194 | 194 | return $this->shareRequest->getShareRequestById($id); | 
| 195 | 195 | } | 
| 196 | 196 | |
| 197 | - /** | |
| 198 | - * Get an share request by $item_guid and $target_vault_guid | |
| 199 | - * | |
| 200 | - * @param $item_guid | |
| 201 | - * @param $target_vault_guid | |
| 202 | - * @return ShareRequest | |
| 203 | - */ | |
| 197 | + /** | |
| 198 | + * Get an share request by $item_guid and $target_vault_guid | |
| 199 | + * | |
| 200 | + * @param $item_guid | |
| 201 | + * @param $target_vault_guid | |
| 202 | + * @return ShareRequest | |
| 203 | + */ | |
| 204 | 204 |  	public function getRequestByGuid($item_guid, $target_vault_guid) { | 
| 205 | 205 | return $this->shareRequest->getRequestByItemAndVaultGuid($item_guid, $target_vault_guid); | 
| 206 | 206 | } | 
| @@ -260,11 +260,11 @@ discard block | ||
| 260 | 260 | return $this->sharingACL->deleteShareACL($ACL); | 
| 261 | 261 | } | 
| 262 | 262 | |
| 263 | - /** | |
| 264 | - * Updates the given ACL entry | |
| 265 | - * @param SharingACL $sharingACL | |
| 266 | - * @return SharingACL | |
| 267 | - */ | |
| 263 | + /** | |
| 264 | + * Updates the given ACL entry | |
| 265 | + * @param SharingACL $sharingACL | |
| 266 | + * @return SharingACL | |
| 267 | + */ | |
| 268 | 268 |  	public function updateCredentialACL(SharingACL $sharingACL) { | 
| 269 | 269 | return $this->sharingACL->updateCredentialACL($sharingACL); | 
| 270 | 270 | } | 
| @@ -286,6 +286,6 @@ discard block | ||
| 286 | 286 | |
| 287 | 287 | |
| 288 | 288 |  	public function updatePendingShareRequestsForCredential($item_guid, $user_id, $permissions){ | 
| 289 | - return $this->shareRequest->updatePendinRequestPermissions($item_guid, $user_id, $permissions); | |
| 290 | - } | |
| 289 | + return $this->shareRequest->updatePendinRequestPermissions($item_guid, $user_id, $permissions); | |
| 290 | + } | |
| 291 | 291 | } | 
| 292 | 292 | \ No newline at end of file | 
| @@ -285,7 +285,7 @@ | ||
| 285 | 285 | } | 
| 286 | 286 | |
| 287 | 287 | |
| 288 | -	public function updatePendingShareRequestsForCredential($item_guid, $user_id, $permissions){ | |
| 288 | +	public function updatePendingShareRequestsForCredential($item_guid, $user_id, $permissions) { | |
| 289 | 289 | return $this->shareRequest->updatePendinRequestPermissions($item_guid, $user_id, $permissions); | 
| 290 | 290 | } | 
| 291 | 291 | } | 
| 292 | 292 | \ No newline at end of file | 
| @@ -71,7 +71,9 @@ discard block | ||
| 71 | 71 | } | 
| 72 | 72 | |
| 73 | 73 |  	public function createACLEntry(SharingACL $acl) { | 
| 74 | - if ($acl->getCreated() === null) $acl->setCreated((new \DateTime())->getTimestamp()); | |
| 74 | +		if ($acl->getCreated() === null) { | |
| 75 | + $acl->setCreated((new \DateTime())->getTimestamp()); | |
| 76 | + } | |
| 75 | 77 | return $this->sharingACL->createACLEntry($acl); | 
| 76 | 78 | } | 
| 77 | 79 | |
| @@ -124,12 +126,16 @@ discard block | ||
| 124 | 126 | $return = []; | 
| 125 | 127 |  		foreach ($entries as $entry) { | 
| 126 | 128 | // Check if the user can read the credential, probably unnecesary, but just to be sure | 
| 127 | - if (!$entry->hasPermission(SharingACL::READ)) continue; | |
| 129 | +			if (!$entry->hasPermission(SharingACL::READ)) { | |
| 130 | + continue; | |
| 131 | + } | |
| 128 | 132 | |
| 129 | 133 | $tmp = $entry->jsonSerialize(); | 
| 130 | 134 | $tmp['credential_data'] = $this->credential->getCredentialById($entry->getItemId())->jsonSerialize(); | 
| 131 | 135 | |
| 132 | - if (!$entry->hasPermission(SharingACL::FILES)) unset($tmp['credential_data']['files']); | |
| 136 | +			if (!$entry->hasPermission(SharingACL::FILES)) { | |
| 137 | + unset($tmp['credential_data']['files']); | |
| 138 | + } | |
| 133 | 139 | unset($tmp['credential_data']['shared_key']); | 
| 134 | 140 | $return[] = $tmp; | 
| 135 | 141 | } | 
| @@ -150,12 +156,16 @@ discard block | ||
| 150 | 156 | $acl = $this->sharingACL->getItemACL($user_id, $item_guid); | 
| 151 | 157 | |
| 152 | 158 | // Check if the user can read the credential, probably unnecesary, but just to be sure | 
| 153 | -		if (!$acl->hasPermission(SharingACL::READ)) throw new DoesNotExistException("Item not found or wrong access level"); | |
| 159 | +		if (!$acl->hasPermission(SharingACL::READ)) { | |
| 160 | +			throw new DoesNotExistException("Item not found or wrong access level"); | |
| 161 | + } | |
| 154 | 162 | |
| 155 | 163 | $tmp = $acl->jsonSerialize(); | 
| 156 | 164 | $tmp['credential_data'] = $this->credential->getCredentialById($acl->getItemId())->jsonSerialize(); | 
| 157 | 165 | |
| 158 | - if (!$acl->hasPermission(SharingACL::FILES)) unset($tmp['credential_data']['files']); | |
| 166 | +		if (!$acl->hasPermission(SharingACL::FILES)) { | |
| 167 | + unset($tmp['credential_data']['files']); | |
| 168 | + } | |
| 159 | 169 | unset($tmp['credential_data']['shared_key']); | 
| 160 | 170 | |
| 161 | 171 | return $tmp; | 
| @@ -170,7 +180,9 @@ discard block | ||
| 170 | 180 | */ | 
| 171 | 181 |  	public function getItemHistory($user_id, $item_guid) { | 
| 172 | 182 | $acl = $this->sharingACL->getItemACL($user_id, $item_guid); | 
| 173 | - if (!$acl->hasPermission(SharingACL::READ | SharingACL::HISTORY)) return []; | |
| 183 | +		if (!$acl->hasPermission(SharingACL::READ | SharingACL::HISTORY)) { | |
| 184 | + return []; | |
| 185 | + } | |
| 174 | 186 | |
| 175 | 187 | return $this->revisions->getRevisions($acl->getItemId()); | 
| 176 | 188 | } | 
| @@ -285,7 +297,7 @@ discard block | ||
| 285 | 297 | } | 
| 286 | 298 | |
| 287 | 299 | |
| 288 | -	public function updatePendingShareRequestsForCredential($item_guid, $user_id, $permissions){ | |
| 300 | +	public function updatePendingShareRequestsForCredential($item_guid, $user_id, $permissions) { | |
| 289 | 301 | return $this->shareRequest->updatePendinRequestPermissions($item_guid, $user_id, $permissions); | 
| 290 | 302 | } | 
| 291 | 303 | } | 
| 292 | 304 | \ No newline at end of file | 
| @@ -23,7 +23,7 @@ discard block | ||
| 23 | 23 | public function __construct($AppName, | 
| 24 | 24 | IRequest $request, | 
| 25 | 25 | $UserId, | 
| 26 | -								FileService $fileService){ | |
| 26 | +								FileService $fileService) { | |
| 27 | 27 | parent::__construct($AppName, $request); | 
| 28 | 28 | $this->userId = $UserId; | 
| 29 | 29 | $this->fileService = $fileService; | 
| @@ -56,20 +56,20 @@ discard block | ||
| 56 | 56 | return new JSONResponse($this->fileService->deleteFile($file_id, $this->userId)); | 
| 57 | 57 | } | 
| 58 | 58 | |
| 59 | -	public function updateFile($file_id, $file_data, $filename, $mimetype, $size){ | |
| 60 | -		try{ | |
| 59 | +	public function updateFile($file_id, $file_data, $filename, $mimetype, $size) { | |
| 60 | +		try { | |
| 61 | 61 | $file = $this->fileService->getFile($file_id, $this->userId); | 
| 62 | -		} catch (DoesNotExistException $doesNotExistException){ | |
| 62 | +		} catch (DoesNotExistException $doesNotExistException) { | |
| 63 | 63 | |
| 64 | 64 | } | 
| 65 | -		if($file){ | |
| 66 | -			if($file_data) { | |
| 65 | +		if ($file) { | |
| 66 | +			if ($file_data) { | |
| 67 | 67 | $file->setFileData($file_data); | 
| 68 | 68 | } | 
| 69 | -			if($filename) { | |
| 69 | +			if ($filename) { | |
| 70 | 70 | $file->setFilename($filename); | 
| 71 | 71 | } | 
| 72 | -			if($filename || $file_data){ | |
| 72 | +			if ($filename || $file_data) { | |
| 73 | 73 | new JSONResponse($this->fileService->updateFile($file)); | 
| 74 | 74 | } | 
| 75 | 75 | } | 
| @@ -23,7 +23,7 @@ discard block | ||
| 23 | 23 | public function __construct($AppName, | 
| 24 | 24 | IRequest $request, | 
| 25 | 25 | $UserId, | 
| 26 | -								FileService $fileService){ | |
| 26 | +								FileService $fileService) { | |
| 27 | 27 | parent::__construct($AppName, $request); | 
| 28 | 28 | $this->userId = $UserId; | 
| 29 | 29 | $this->fileService = $fileService; | 
| @@ -56,20 +56,20 @@ discard block | ||
| 56 | 56 | return new JSONResponse($this->fileService->deleteFile($file_id, $this->userId)); | 
| 57 | 57 | } | 
| 58 | 58 | |
| 59 | -	public function updateFile($file_id, $file_data, $filename, $mimetype, $size){ | |
| 59 | +	public function updateFile($file_id, $file_data, $filename, $mimetype, $size) { | |
| 60 | 60 |  		try{ | 
| 61 | 61 | $file = $this->fileService->getFile($file_id, $this->userId); | 
| 62 | 62 |  		} catch (DoesNotExistException $doesNotExistException){ | 
| 63 | 63 | |
| 64 | 64 | } | 
| 65 | -		if($file){ | |
| 65 | +		if($file) { | |
| 66 | 66 |  			if($file_data) { | 
| 67 | 67 | $file->setFileData($file_data); | 
| 68 | 68 | } | 
| 69 | 69 |  			if($filename) { | 
| 70 | 70 | $file->setFilename($filename); | 
| 71 | 71 | } | 
| 72 | -			if($filename || $file_data){ | |
| 72 | +			if($filename || $file_data) { | |
| 73 | 73 | new JSONResponse($this->fileService->updateFile($file)); | 
| 74 | 74 | } | 
| 75 | 75 | } | 
| @@ -79,7 +79,7 @@ | ||
| 79 | 79 |  		try { | 
| 80 | 80 | $vault = $this->vaultService->getByGuid($vault_guid, $this->userId); | 
| 81 | 81 |  		} catch (DoesNotExistException $e) { | 
| 82 | - return new NotFoundJSONResponse(); | |
| 82 | + return new NotFoundJSONResponse(); | |
| 83 | 83 | } | 
| 84 | 84 | $result = array(); | 
| 85 | 85 |  		if ($vault) { | 
| @@ -409,11 +409,11 @@ | ||
| 409 | 409 | //@TODO Check expire date | 
| 410 | 410 | $acl = $this->shareService->getACL(null, $credential_guid); | 
| 411 | 411 | |
| 412 | -        if ($acl->getExpire() > 0 && Utils::getTime() > $acl->getExpire()) { | |
| 412 | +		if ($acl->getExpire() > 0 && Utils::getTime() > $acl->getExpire()) { | |
| 413 | 413 | return new NotFoundJSONResponse(); | 
| 414 | 414 | } | 
| 415 | 415 | |
| 416 | - $views = $acl->getExpireViews(); | |
| 416 | + $views = $acl->getExpireViews(); | |
| 417 | 417 |  		if ($views === 0) { | 
| 418 | 418 | return new NotFoundJSONResponse(); | 
| 419 | 419 |  		} else if ($views != -1) { | 
| @@ -87,9 +87,9 @@ discard block | ||
| 87 | 87 | */ | 
| 88 | 88 |  	public function createPublicShare($item_id, $item_guid, $permissions, $expire_timestamp, $expire_views) { | 
| 89 | 89 | |
| 90 | -		try{ | |
| 90 | +		try { | |
| 91 | 91 | $credential = $this->credentialService->getCredentialByGUID($item_guid); | 
| 92 | -		} catch (DoesNotExistException $exception){ | |
| 92 | +		} catch (DoesNotExistException $exception) { | |
| 93 | 93 | return new NotFoundResponse(); | 
| 94 | 94 | } | 
| 95 | 95 | |
| @@ -230,21 +230,21 @@ discard block | ||
| 230 | 230 | } | 
| 231 | 231 | |
| 232 | 232 | |
| 233 | -	public function unshareCredentialFromUser($item_guid, $user_id){ | |
| 233 | +	public function unshareCredentialFromUser($item_guid, $user_id) { | |
| 234 | 234 | $acl = null; | 
| 235 | 235 | $sr = null; | 
| 236 | 236 |  		try { | 
| 237 | 237 | $acl = $this->shareService->getCredentialAclForUser($user_id, $item_guid); | 
| 238 | -		} catch (DoesNotExistException $e){ | |
| 238 | +		} catch (DoesNotExistException $e) { | |
| 239 | 239 | |
| 240 | 240 | } | 
| 241 | -		try{ | |
| 242 | - $sr = array_pop($this->shareService->getPendingShareRequestsForCredential($item_guid, $user_id)); | |
| 243 | -		} catch (DoesNotExistException $e){ | |
| 241 | +		try { | |
| 242 | + $sr = array_pop($this->shareService->getPendingShareRequestsForCredential($item_guid, $user_id)); | |
| 243 | +		} catch (DoesNotExistException $e) { | |
| 244 | 244 | |
| 245 | 245 | } | 
| 246 | 246 | |
| 247 | -		if($sr){ | |
| 247 | +		if ($sr) { | |
| 248 | 248 | $this->shareService->cleanItemRequestsForUser($sr); | 
| 249 | 249 | $manager = \OC::$server->getNotificationManager(); | 
| 250 | 250 | $notification = $manager->createNotification(); | 
| @@ -253,7 +253,7 @@ discard block | ||
| 253 | 253 | ->setUser($user_id); | 
| 254 | 254 | $manager->markProcessed($notification); | 
| 255 | 255 | } | 
| 256 | -		if($acl){ | |
| 256 | +		if ($acl) { | |
| 257 | 257 | $this->shareService->deleteShareACL($acl); | 
| 258 | 258 | } | 
| 259 | 259 |  		return new JSONResponse(array('result' => true)); | 
| @@ -462,15 +462,15 @@ discard block | ||
| 462 | 462 | * @return JSONResponse | 
| 463 | 463 | * @return NotFoundResponse | 
| 464 | 464 | */ | 
| 465 | -	public function getFile($item_guid, $file_guid){ | |
| 465 | +	public function getFile($item_guid, $file_guid) { | |
| 466 | 466 |  		try { | 
| 467 | 467 | $credential = $this->credentialService->getCredentialByGUID($item_guid); | 
| 468 | -		} catch (DoesNotExistException $e){ | |
| 468 | +		} catch (DoesNotExistException $e) { | |
| 469 | 469 | return new NotFoundJSONResponse(); | 
| 470 | 470 | } | 
| 471 | 471 | |
| 472 | 472 | $acl = $this->shareService->getACL($this->userId->getUID(), $credential->getGuid()); | 
| 473 | -		if (!$acl->hasPermission(SharingACL::FILES)){ | |
| 473 | +		if (!$acl->hasPermission(SharingACL::FILES)) { | |
| 474 | 474 | return new NotFoundJSONResponse(); | 
| 475 | 475 |  		} else { | 
| 476 | 476 | return $this->fileService->getFileByGuid($file_guid); | 
| @@ -230,7 +230,7 @@ discard block | ||
| 230 | 230 | } | 
| 231 | 231 | |
| 232 | 232 | |
| 233 | -	public function unshareCredentialFromUser($item_guid, $user_id){ | |
| 233 | +	public function unshareCredentialFromUser($item_guid, $user_id) { | |
| 234 | 234 | $acl = null; | 
| 235 | 235 | $sr = null; | 
| 236 | 236 |  		try { | 
| @@ -244,7 +244,7 @@ discard block | ||
| 244 | 244 | |
| 245 | 245 | } | 
| 246 | 246 | |
| 247 | -		if($sr){ | |
| 247 | +		if($sr) { | |
| 248 | 248 | $this->shareService->cleanItemRequestsForUser($sr); | 
| 249 | 249 | $manager = \OC::$server->getNotificationManager(); | 
| 250 | 250 | $notification = $manager->createNotification(); | 
| @@ -253,7 +253,7 @@ discard block | ||
| 253 | 253 | ->setUser($user_id); | 
| 254 | 254 | $manager->markProcessed($notification); | 
| 255 | 255 | } | 
| 256 | -		if($acl){ | |
| 256 | +		if($acl) { | |
| 257 | 257 | $this->shareService->deleteShareACL($acl); | 
| 258 | 258 | } | 
| 259 | 259 |  		return new JSONResponse(array('result' => true)); | 
| @@ -462,7 +462,7 @@ discard block | ||
| 462 | 462 | * @return JSONResponse | 
| 463 | 463 | * @return NotFoundResponse | 
| 464 | 464 | */ | 
| 465 | -	public function getFile($item_guid, $file_guid){ | |
| 465 | +	public function getFile($item_guid, $file_guid) { | |
| 466 | 466 |  		try { | 
| 467 | 467 | $credential = $this->credentialService->getCredentialByGUID($item_guid); | 
| 468 | 468 |  		} catch (DoesNotExistException $e){ | 
| @@ -470,7 +470,7 @@ discard block | ||
| 470 | 470 | } | 
| 471 | 471 | |
| 472 | 472 | $acl = $this->shareService->getACL($this->userId->getUID(), $credential->getGuid()); | 
| 473 | -		if (!$acl->hasPermission(SharingACL::FILES)){ | |
| 473 | +		if (!$acl->hasPermission(SharingACL::FILES)) { | |
| 474 | 474 | return new NotFoundJSONResponse(); | 
| 475 | 475 |  		} else { | 
| 476 | 476 | return $this->fileService->getFileByGuid($file_guid); | 
| @@ -21,7 +21,7 @@ discard block | ||
| 21 | 21 | |
| 22 | 22 | private $userId; | 
| 23 | 23 | |
| 24 | -	public function __construct($AppName, IRequest $request, $UserId){ | |
| 24 | +	public function __construct($AppName, IRequest $request, $UserId) { | |
| 25 | 25 | parent::__construct($AppName, $request); | 
| 26 | 26 | $this->userId = $UserId; | 
| 27 | 27 | } | 
| @@ -38,7 +38,7 @@ discard block | ||
| 38 | 38 | */ | 
| 39 | 39 |  	public function index() { | 
| 40 | 40 | $params = ['user' => $this->userId]; | 
| 41 | -		return new TemplateResponse('passman', 'main', $params);  // templates/main.php | |
| 41 | +		return new TemplateResponse('passman', 'main', $params); // templates/main.php | |
| 42 | 42 | } | 
| 43 | 43 | |
| 44 | 44 | |
| @@ -46,7 +46,7 @@ discard block | ||
| 46 | 46 | * @NoAdminRequired | 
| 47 | 47 | * @NoCSRFRequired | 
| 48 | 48 | */ | 
| 49 | -	public function bookmarklet($url='',$title='') { | |
| 49 | +	public function bookmarklet($url = '', $title = '') { | |
| 50 | 50 |  		$params = array('url' => $url, 'label' => $title); | 
| 51 | 51 |  		return new TemplateResponse('passman', 'bookmarklet', $params); | 
| 52 | 52 | } | 
| @@ -21,7 +21,7 @@ | ||
| 21 | 21 | |
| 22 | 22 | private $userId; | 
| 23 | 23 | |
| 24 | -	public function __construct($AppName, IRequest $request, $UserId){ | |
| 24 | +	public function __construct($AppName, IRequest $request, $UserId) { | |
| 25 | 25 | parent::__construct($AppName, $request); | 
| 26 | 26 | $this->userId = $UserId; | 
| 27 | 27 | } | 
| @@ -55,10 +55,10 @@ discard block | ||
| 55 | 55 | $server->getUserManager(), | 
| 56 | 56 |   				$c->query('ActivityService'), | 
| 57 | 57 |   				$c->query('VaultService'), | 
| 58 | -                $c->query('ShareService'), | |
| 59 | -                $c->query('CredentialService'), | |
| 60 | -                $c->query('NotificationService'), | |
| 61 | -                $c->query('FileService') | |
| 58 | +				$c->query('ShareService'), | |
| 59 | +				$c->query('CredentialService'), | |
| 60 | +				$c->query('NotificationService'), | |
| 61 | +				$c->query('FileService') | |
| 62 | 62 | ); | 
| 63 | 63 | }); | 
| 64 | 64 | |
| @@ -94,7 +94,7 @@ discard block | ||
| 94 | 94 |  		$container->registerAlias('ActivityService', ActivityService::class); | 
| 95 | 95 |  		$container->registerAlias('VaultService', VaultService::class); | 
| 96 | 96 |  		$container->registerAlias('FileService', FileService::class); | 
| 97 | -        $container->registerAlias('ShareService', ShareService::class); | |
| 97 | +		$container->registerAlias('ShareService', ShareService::class); | |
| 98 | 98 |  		$container->registerAlias('Utils', Utils::class); | 
| 99 | 99 | } | 
| 100 | 100 | |
| @@ -29,7 +29,7 @@ discard block | ||
| 29 | 29 | use OCP\IL10N; | 
| 30 | 30 | use OCP\Util; | 
| 31 | 31 |  class Application extends App { | 
| 32 | -	public function __construct () { | |
| 32 | +	public function __construct() { | |
| 33 | 33 |  		parent::__construct('passman'); | 
| 34 | 34 | $container = $this->getContainer(); | 
| 35 | 35 | $server = $container->getServer(); | 
| @@ -65,7 +65,7 @@ discard block | ||
| 65 | 65 | |
| 66 | 66 | |
| 67 | 67 | /** Cron **/ | 
| 68 | -		$container->registerService('CronService', function ($c) { | |
| 68 | +		$container->registerService('CronService', function($c) { | |
| 69 | 69 | return new CronService( | 
| 70 | 70 |  				$c->query('CredentialService'), | 
| 71 | 71 |  				$c->query('Logger'), | 
| @@ -76,7 +76,7 @@ discard block | ||
| 76 | 76 | ); | 
| 77 | 77 | }); | 
| 78 | 78 | |
| 79 | -		$container->registerService('Db', function () { | |
| 79 | +		$container->registerService('Db', function() { | |
| 80 | 80 | return new Db(); | 
| 81 | 81 | }); | 
| 82 | 82 | |
| @@ -105,7 +105,7 @@ discard block | ||
| 105 | 105 | $c = $this->getContainer(); | 
| 106 | 106 | /** @var \OCP\IServerContainer $server */ | 
| 107 | 107 | $server = $c->getServer(); | 
| 108 | -		$navigationEntry = function () use ($c, $server) { | |
| 108 | +		$navigationEntry = function() use ($c, $server) { | |
| 109 | 109 | return [ | 
| 110 | 110 | 'id' => $c->getAppName(), | 
| 111 | 111 | 'order' => 10, | 
| @@ -47,11 +47,11 @@ | ||
| 47 | 47 | return $this->vaultMapper->updateVault($vault); | 
| 48 | 48 | } | 
| 49 | 49 | |
| 50 | -	public function setLastAccess($vault_id, $user_id){ | |
| 50 | +	public function setLastAccess($vault_id, $user_id) { | |
| 51 | 51 | return $this->vaultMapper->setLastAccess($vault_id, $user_id); | 
| 52 | 52 | } | 
| 53 | 53 | |
| 54 | -	public function updateSharingKeys($vault_id, $privateKey, $publicKey){ | |
| 54 | +	public function updateSharingKeys($vault_id, $privateKey, $publicKey) { | |
| 55 | 55 | return $this->vaultMapper->updateSharingKeys($vault_id, $privateKey, $publicKey); | 
| 56 | 56 | } | 
| 57 | 57 | } | 
| 58 | 58 | \ No newline at end of file | 
| @@ -47,11 +47,11 @@ | ||
| 47 | 47 | return $this->vaultMapper->updateVault($vault); | 
| 48 | 48 | } | 
| 49 | 49 | |
| 50 | -	public function setLastAccess($vault_id, $user_id){ | |
| 50 | +	public function setLastAccess($vault_id, $user_id) { | |
| 51 | 51 | return $this->vaultMapper->setLastAccess($vault_id, $user_id); | 
| 52 | 52 | } | 
| 53 | 53 | |
| 54 | -	public function updateSharingKeys($vault_id, $privateKey, $publicKey){ | |
| 54 | +	public function updateSharingKeys($vault_id, $privateKey, $publicKey) { | |
| 55 | 55 | return $this->vaultMapper->updateSharingKeys($vault_id, $privateKey, $publicKey); | 
| 56 | 56 | } | 
| 57 | 57 | } | 
| 58 | 58 | \ No newline at end of file | 
| @@ -49,9 +49,9 @@ | ||
| 49 | 49 | * @type = Can be passman_password or passman_password_shared | 
| 50 | 50 | * @priority = Int -> [10,20,30,40,50] | 
| 51 | 51 | */ | 
| 52 | - public function add($subject,$subjectParams=array(), | |
| 53 | - $message='',$messageParams=array(), | |
| 54 | -						$link='',$user=null,$type='') { | |
| 52 | + public function add($subject, $subjectParams = array(), | |
| 53 | + $message = '', $messageParams = array(), | |
| 54 | +						$link = '', $user = null, $type = '') { | |
| 55 | 55 | $activity = $this->manager->generateEvent(); | 
| 56 | 56 | $activity->setType($type); | 
| 57 | 57 |  		$activity->setApp('passman'); | 
| @@ -30,19 +30,19 @@ | ||
| 30 | 30 | return $this->credentialRevisionMapper->create($credential, $userId, $credential_id, $edited_by); | 
| 31 | 31 | } | 
| 32 | 32 | |
| 33 | -	public function getRevisions($credential_id, $user_id = null){ | |
| 33 | +	public function getRevisions($credential_id, $user_id = null) { | |
| 34 | 34 | return $this->credentialRevisionMapper->getRevisions($credential_id, $user_id); | 
| 35 | 35 | } | 
| 36 | 36 | |
| 37 | -	public function getRevision($credential_id, $user_id = null){ | |
| 37 | +	public function getRevision($credential_id, $user_id = null) { | |
| 38 | 38 | return $this->credentialRevisionMapper->getRevision($credential_id, $user_id); | 
| 39 | 39 | } | 
| 40 | 40 | |
| 41 | -	public function deleteRevision($revision_id, $user_id){ | |
| 41 | +	public function deleteRevision($revision_id, $user_id) { | |
| 42 | 42 | return $this->credentialRevisionMapper->deleteRevision($revision_id, $user_id); | 
| 43 | 43 | } | 
| 44 | 44 | |
| 45 | -	public function updateRevision(CredentialRevision $credentialRevision){ | |
| 45 | +	public function updateRevision(CredentialRevision $credentialRevision) { | |
| 46 | 46 | return $this->credentialRevisionMapper->update($credentialRevision); | 
| 47 | 47 | } | 
| 48 | 48 | } | 
| 49 | 49 | \ No newline at end of file | 
| @@ -30,19 +30,19 @@ | ||
| 30 | 30 | return $this->credentialRevisionMapper->create($credential, $userId, $credential_id, $edited_by); | 
| 31 | 31 | } | 
| 32 | 32 | |
| 33 | -	public function getRevisions($credential_id, $user_id = null){ | |
| 33 | +	public function getRevisions($credential_id, $user_id = null) { | |
| 34 | 34 | return $this->credentialRevisionMapper->getRevisions($credential_id, $user_id); | 
| 35 | 35 | } | 
| 36 | 36 | |
| 37 | -	public function getRevision($credential_id, $user_id = null){ | |
| 37 | +	public function getRevision($credential_id, $user_id = null) { | |
| 38 | 38 | return $this->credentialRevisionMapper->getRevision($credential_id, $user_id); | 
| 39 | 39 | } | 
| 40 | 40 | |
| 41 | -	public function deleteRevision($revision_id, $user_id){ | |
| 41 | +	public function deleteRevision($revision_id, $user_id) { | |
| 42 | 42 | return $this->credentialRevisionMapper->deleteRevision($revision_id, $user_id); | 
| 43 | 43 | } | 
| 44 | 44 | |
| 45 | -	public function updateRevision(CredentialRevision $credentialRevision){ | |
| 45 | +	public function updateRevision(CredentialRevision $credentialRevision) { | |
| 46 | 46 | return $this->credentialRevisionMapper->update($credentialRevision); | 
| 47 | 47 | } | 
| 48 | 48 | } | 
| 49 | 49 | \ No newline at end of file |