@@ -48,10 +48,10 @@ |
||
| 48 | 48 | * @param $type string |
| 49 | 49 | * @return array |
| 50 | 50 | */ |
| 51 | - public function add($subject,$subjectParams=array(), |
|
| 52 | - $message='',$messageParams=array(), |
|
| 53 | - $link='',$user=null,$type='') { |
|
| 54 | - if($user) { |
|
| 51 | + public function add($subject, $subjectParams = array(), |
|
| 52 | + $message = '', $messageParams = array(), |
|
| 53 | + $link = '', $user = null, $type = '') { |
|
| 54 | + if ($user) { |
|
| 55 | 55 | $activity = $this->manager->generateEvent(); |
| 56 | 56 | $activity->setType($type); |
| 57 | 57 | $activity->setApp('passman'); |
@@ -163,13 +163,13 @@ |
||
| 163 | 163 | $activity . '_self', array($label, $this->userId, $revision_created), |
| 164 | 164 | '', array(), |
| 165 | 165 | $link, $this->userId, Activity::TYPE_ITEM_ACTION); |
| 166 | - } else if (($storedCredential->getDeleteTime() === 0) && (int)$delete_time > 0) { |
|
| 166 | + } else if (($storedCredential->getDeleteTime() === 0) && (int) $delete_time > 0) { |
|
| 167 | 167 | $activity = 'item_deleted'; |
| 168 | 168 | $this->activityService->add( |
| 169 | 169 | $activity . '_self', array($label, $this->userId), |
| 170 | 170 | '', array(), |
| 171 | 171 | $link, $this->userId, Activity::TYPE_ITEM_ACTION); |
| 172 | - } else if (($storedCredential->getDeleteTime() > 0) && (int)$delete_time === 0) { |
|
| 172 | + } else if (($storedCredential->getDeleteTime() > 0) && (int) $delete_time === 0) { |
|
| 173 | 173 | $activity = 'item_recovered'; |
| 174 | 174 | $this->activityService->add( |
| 175 | 175 | $activity . '_self', array($label, $this->userId), |
@@ -51,17 +51,17 @@ discard block |
||
| 51 | 51 | parent::__construct('passman'); |
| 52 | 52 | $container = $this->getContainer(); |
| 53 | 53 | // Allow automatic DI for the View, until we migrated to Nodes API |
| 54 | - $container->registerService(View::class, function () { |
|
| 54 | + $container->registerService(View::class, function() { |
|
| 55 | 55 | return new View(''); |
| 56 | 56 | }, false); |
| 57 | - $container->registerService('isCLI', function () { |
|
| 57 | + $container->registerService('isCLI', function() { |
|
| 58 | 58 | return \OC::$CLI; |
| 59 | 59 | }); |
| 60 | 60 | |
| 61 | 61 | /** |
| 62 | 62 | * Middleware |
| 63 | 63 | */ |
| 64 | - $container->registerService('ShareMiddleware', function ($c) { |
|
| 64 | + $container->registerService('ShareMiddleware', function($c) { |
|
| 65 | 65 | return new ShareMiddleware($c->query('SettingsService')); |
| 66 | 66 | }); |
| 67 | 67 | $container->registerMiddleware('ShareMiddleware'); |
@@ -69,7 +69,7 @@ discard block |
||
| 69 | 69 | /** |
| 70 | 70 | * Controllers |
| 71 | 71 | */ |
| 72 | - $container->registerService('ShareController', function ($c) { |
|
| 72 | + $container->registerService('ShareController', function($c) { |
|
| 73 | 73 | $container = $this->getContainer(); |
| 74 | 74 | $server = $container->getServer(); |
| 75 | 75 | return new ShareController( |
@@ -90,7 +90,7 @@ discard block |
||
| 90 | 90 | |
| 91 | 91 | |
| 92 | 92 | /** Cron **/ |
| 93 | - $container->registerService('CronService', function ($c) { |
|
| 93 | + $container->registerService('CronService', function($c) { |
|
| 94 | 94 | return new CronService( |
| 95 | 95 | $c->query('CredentialService'), |
| 96 | 96 | $c->query('Logger'), |
@@ -101,11 +101,11 @@ discard block |
||
| 101 | 101 | ); |
| 102 | 102 | }); |
| 103 | 103 | |
| 104 | - $container->registerService('Db', function () { |
|
| 104 | + $container->registerService('Db', function() { |
|
| 105 | 105 | return new Db(); |
| 106 | 106 | }); |
| 107 | 107 | |
| 108 | - $container->registerService('Logger', function ($c) { |
|
| 108 | + $container->registerService('Logger', function($c) { |
|
| 109 | 109 | return $c->query('ServerContainer')->getLogger(); |
| 110 | 110 | }); |
| 111 | 111 | |
@@ -133,7 +133,7 @@ discard block |
||
| 133 | 133 | $c = $this->getContainer(); |
| 134 | 134 | /** @var \OCP\IServerContainer $server */ |
| 135 | 135 | $server = $c->getServer(); |
| 136 | - $navigationEntry = function () use ($c, $server) { |
|
| 136 | + $navigationEntry = function() use ($c, $server) { |
|
| 137 | 137 | return [ |
| 138 | 138 | 'id' => $c->getAppName(), |
| 139 | 139 | 'order' => 10, |
@@ -38,7 +38,7 @@ |
||
| 38 | 38 | use OCA\Passman\Service\VaultService; |
| 39 | 39 | use OCA\Passman\Utility\Utils; |
| 40 | 40 | use OCA\Passman\Service\NotificationService; |
| 41 | -Use OCA\Passman\Service\SettingsService; |
|
| 41 | +use OCA\Passman\Service\SettingsService; |
|
| 42 | 42 | use OCP\IConfig; |
| 43 | 43 | use OCP\IDBConnection; |
| 44 | 44 | |
@@ -70,7 +70,7 @@ discard block |
||
| 70 | 70 | * Get a app setting |
| 71 | 71 | * |
| 72 | 72 | * @param $key string |
| 73 | - * @param null $default_value The default value if key does not exist |
|
| 73 | + * @param boolean $default_value The default value if key does not exist |
|
| 74 | 74 | * @return mixed |
| 75 | 75 | */ |
| 76 | 76 | public function getAppSetting($key, $default_value = null) { |
@@ -110,7 +110,7 @@ discard block |
||
| 110 | 110 | /** |
| 111 | 111 | * Check if an setting is enabled (value of 1) |
| 112 | 112 | * |
| 113 | - * @param $setting |
|
| 113 | + * @param string $setting |
|
| 114 | 114 | * @return bool |
| 115 | 115 | */ |
| 116 | 116 | public function isEnabled($setting) { |
@@ -83,7 +83,7 @@ |
||
| 83 | 83 | } |
| 84 | 84 | } |
| 85 | 85 | |
| 86 | - private function fetchAll($sql){ |
|
| 86 | + private function fetchAll($sql) { |
|
| 87 | 87 | return $this->db->executeQuery($sql)->fetchAll(); |
| 88 | 88 | } |
| 89 | 89 | |
@@ -83,7 +83,7 @@ |
||
| 83 | 83 | } |
| 84 | 84 | } |
| 85 | 85 | |
| 86 | - private function fetchAll($sql){ |
|
| 86 | + private function fetchAll($sql) { |
|
| 87 | 87 | return $this->db->executeQuery($sql)->fetchAll(); |
| 88 | 88 | } |
| 89 | 89 | |
@@ -96,7 +96,7 @@ discard block |
||
| 96 | 96 | */ |
| 97 | 97 | public function __construct(SettingsService $settings) { |
| 98 | 98 | $this->cipher = $settings->getAppSetting('server_side_encryption'); |
| 99 | - $this->rounds = (int)100; |
|
| 99 | + $this->rounds = (int) 100; |
|
| 100 | 100 | $this->server_key = \OC::$server->getConfig()->getSystemValue('passwordsalt', ''); |
| 101 | 101 | } |
| 102 | 102 | |
@@ -295,7 +295,7 @@ discard block |
||
| 295 | 295 | |
| 296 | 296 | |
| 297 | 297 | |
| 298 | - private function extractKeysFromCredential($credential){ |
|
| 298 | + private function extractKeysFromCredential($credential) { |
|
| 299 | 299 | $userKey = ''; |
| 300 | 300 | $userSuppliedKey = ''; |
| 301 | 301 | if ($credential instanceof Credential) { |
@@ -264,7 +264,9 @@ discard block |
||
| 264 | 264 | protected function unpad($data) { |
| 265 | 265 | $length = $this->getKeySize(); |
| 266 | 266 | $last = ord($data[strlen($data) - 1]); |
| 267 | - if ($last > $length) return false; |
|
| 267 | + if ($last > $length) { |
|
| 268 | + return false; |
|
| 269 | + } |
|
| 268 | 270 | if (substr($data, -1 * $last) !== str_repeat(chr($last), $last)) { |
| 269 | 271 | return false; |
| 270 | 272 | } |
@@ -295,7 +297,7 @@ discard block |
||
| 295 | 297 | |
| 296 | 298 | |
| 297 | 299 | |
| 298 | - private function extractKeysFromCredential($credential){ |
|
| 300 | + private function extractKeysFromCredential($credential) { |
|
| 299 | 301 | $userKey = ''; |
| 300 | 302 | $userSuppliedKey = ''; |
| 301 | 303 | if ($credential instanceof Credential) { |
@@ -26,7 +26,7 @@ |
||
| 26 | 26 | $setting = (in_array($methodName, $publicMethods)) ? 'link_sharing_enabled' : 'user_sharing_enabled'; |
| 27 | 27 | $sharing_enabled = ($this->settings->isEnabled($setting)); |
| 28 | 28 | |
| 29 | - if(in_array($methodName, $user_pub_methods)){ |
|
| 29 | + if (in_array($methodName, $user_pub_methods)) { |
|
| 30 | 30 | $sharing_enabled = ($this->settings->isEnabled('link_sharing_enabled') || $this->settings->isEnabled('user_sharing_enabled')); |
| 31 | 31 | } |
| 32 | 32 | |
@@ -26,7 +26,7 @@ |
||
| 26 | 26 | $setting = (in_array($methodName, $publicMethods)) ? 'link_sharing_enabled' : 'user_sharing_enabled'; |
| 27 | 27 | $sharing_enabled = ($this->settings->isEnabled($setting)); |
| 28 | 28 | |
| 29 | - if(in_array($methodName, $user_pub_methods)){ |
|
| 29 | + if(in_array($methodName, $user_pub_methods)) { |
|
| 30 | 30 | $sharing_enabled = ($this->settings->isEnabled('link_sharing_enabled') || $this->settings->isEnabled('user_sharing_enabled')); |
| 31 | 31 | } |
| 32 | 32 | |
@@ -30,66 +30,66 @@ |
||
| 30 | 30 | use OCA\Passman\Utility\Utils; |
| 31 | 31 | |
| 32 | 32 | class SharingACLMapper extends Mapper { |
| 33 | - const TABLE_NAME = '*PREFIX*passman_sharing_acl'; |
|
| 33 | + const TABLE_NAME = '*PREFIX*passman_sharing_acl'; |
|
| 34 | 34 | |
| 35 | - public function __construct(IDBConnection $db) { |
|
| 36 | - parent::__construct($db, 'passman_sharing_acl'); |
|
| 37 | - } |
|
| 35 | + public function __construct(IDBConnection $db) { |
|
| 36 | + parent::__construct($db, 'passman_sharing_acl'); |
|
| 37 | + } |
|
| 38 | 38 | |
| 39 | - public function createACLEntry(SharingACL $acl){ |
|
| 40 | - return $this->insert($acl); |
|
| 41 | - } |
|
| 39 | + public function createACLEntry(SharingACL $acl){ |
|
| 40 | + return $this->insert($acl); |
|
| 41 | + } |
|
| 42 | 42 | |
| 43 | - /** |
|
| 44 | - * Gets the currently accepted share requests from the given user for the given vault guid |
|
| 45 | - * @param $user_id |
|
| 46 | - * @param $vault_guid |
|
| 47 | - * @return SharingACL[] |
|
| 48 | - */ |
|
| 49 | - public function getVaultEntries($user_id, $vault_guid) { |
|
| 50 | - $q = "SELECT * FROM ". self::TABLE_NAME ." WHERE user_id = ? AND vault_guid = ?"; |
|
| 51 | - return $this->findEntities($q, [$user_id, $vault_guid]); |
|
| 52 | - } |
|
| 43 | + /** |
|
| 44 | + * Gets the currently accepted share requests from the given user for the given vault guid |
|
| 45 | + * @param $user_id |
|
| 46 | + * @param $vault_guid |
|
| 47 | + * @return SharingACL[] |
|
| 48 | + */ |
|
| 49 | + public function getVaultEntries($user_id, $vault_guid) { |
|
| 50 | + $q = "SELECT * FROM ". self::TABLE_NAME ." WHERE user_id = ? AND vault_guid = ?"; |
|
| 51 | + return $this->findEntities($q, [$user_id, $vault_guid]); |
|
| 52 | + } |
|
| 53 | 53 | |
| 54 | - /** |
|
| 55 | - * Gets the acl for a given item guid |
|
| 56 | - * @param $user_id |
|
| 57 | - * @param $item_guid |
|
| 58 | - * @return SharingACL |
|
| 59 | - */ |
|
| 60 | - public function getItemACL($user_id, $item_guid) { |
|
| 61 | - $q = "SELECT * FROM " . self::TABLE_NAME . " WHERE item_guid = ? AND "; |
|
| 62 | - $filter = [$item_guid]; |
|
| 63 | - $q .= ($user_id === null) ? 'user_id is null' : 'user_id = ? '; |
|
| 64 | - if ($user_id !== null){ |
|
| 54 | + /** |
|
| 55 | + * Gets the acl for a given item guid |
|
| 56 | + * @param $user_id |
|
| 57 | + * @param $item_guid |
|
| 58 | + * @return SharingACL |
|
| 59 | + */ |
|
| 60 | + public function getItemACL($user_id, $item_guid) { |
|
| 61 | + $q = "SELECT * FROM " . self::TABLE_NAME . " WHERE item_guid = ? AND "; |
|
| 62 | + $filter = [$item_guid]; |
|
| 63 | + $q .= ($user_id === null) ? 'user_id is null' : 'user_id = ? '; |
|
| 64 | + if ($user_id !== null){ |
|
| 65 | 65 | $filter[] = $user_id; |
| 66 | - } |
|
| 66 | + } |
|
| 67 | 67 | |
| 68 | - return $this->findEntity($q, $filter); |
|
| 69 | - } |
|
| 68 | + return $this->findEntity($q, $filter); |
|
| 69 | + } |
|
| 70 | 70 | |
| 71 | - /** |
|
| 72 | - * Update the acl for a given item guid |
|
| 73 | - * @param $user_id |
|
| 74 | - * @param $item_guid |
|
| 75 | - * @return SharingACL |
|
| 76 | - */ |
|
| 77 | - public function updateCredentialACL(SharingACL $sharingACL) { |
|
| 78 | - return $this->update($sharingACL); |
|
| 79 | - } |
|
| 71 | + /** |
|
| 72 | + * Update the acl for a given item guid |
|
| 73 | + * @param $user_id |
|
| 74 | + * @param $item_guid |
|
| 75 | + * @return SharingACL |
|
| 76 | + */ |
|
| 77 | + public function updateCredentialACL(SharingACL $sharingACL) { |
|
| 78 | + return $this->update($sharingACL); |
|
| 79 | + } |
|
| 80 | 80 | |
| 81 | - /** |
|
| 82 | - * Gets the currently accepted share requests from the given user for the given vault guid |
|
| 83 | - * @param $user_id |
|
| 84 | - * @param $vault_id |
|
| 85 | - * @return SharingACL[] |
|
| 86 | - */ |
|
| 87 | - public function getCredentialAclList($item_guid) { |
|
| 88 | - $q = "SELECT * FROM ". self::TABLE_NAME ." WHERE item_guid = ?"; |
|
| 89 | - return $this->findEntities($q, [$item_guid]); |
|
| 90 | - } |
|
| 81 | + /** |
|
| 82 | + * Gets the currently accepted share requests from the given user for the given vault guid |
|
| 83 | + * @param $user_id |
|
| 84 | + * @param $vault_id |
|
| 85 | + * @return SharingACL[] |
|
| 86 | + */ |
|
| 87 | + public function getCredentialAclList($item_guid) { |
|
| 88 | + $q = "SELECT * FROM ". self::TABLE_NAME ." WHERE item_guid = ?"; |
|
| 89 | + return $this->findEntities($q, [$item_guid]); |
|
| 90 | + } |
|
| 91 | 91 | |
| 92 | - public function deleteShareACL(SharingACL $ACL){ |
|
| 93 | - return $this->delete($ACL); |
|
| 92 | + public function deleteShareACL(SharingACL $ACL){ |
|
| 93 | + return $this->delete($ACL); |
|
| 94 | 94 | } |
| 95 | 95 | } |
| 96 | 96 | \ No newline at end of file |
@@ -36,7 +36,7 @@ discard block |
||
| 36 | 36 | parent::__construct($db, 'passman_sharing_acl'); |
| 37 | 37 | } |
| 38 | 38 | |
| 39 | - public function createACLEntry(SharingACL $acl){ |
|
| 39 | + public function createACLEntry(SharingACL $acl) { |
|
| 40 | 40 | return $this->insert($acl); |
| 41 | 41 | } |
| 42 | 42 | |
@@ -47,7 +47,7 @@ discard block |
||
| 47 | 47 | * @return SharingACL[] |
| 48 | 48 | */ |
| 49 | 49 | public function getVaultEntries($user_id, $vault_guid) { |
| 50 | - $q = "SELECT * FROM ". self::TABLE_NAME ." WHERE user_id = ? AND vault_guid = ?"; |
|
| 50 | + $q = "SELECT * FROM " . self::TABLE_NAME . " WHERE user_id = ? AND vault_guid = ?"; |
|
| 51 | 51 | return $this->findEntities($q, [$user_id, $vault_guid]); |
| 52 | 52 | } |
| 53 | 53 | |
@@ -61,7 +61,7 @@ discard block |
||
| 61 | 61 | $q = "SELECT * FROM " . self::TABLE_NAME . " WHERE item_guid = ? AND "; |
| 62 | 62 | $filter = [$item_guid]; |
| 63 | 63 | $q .= ($user_id === null) ? 'user_id is null' : 'user_id = ? '; |
| 64 | - if ($user_id !== null){ |
|
| 64 | + if ($user_id !== null) { |
|
| 65 | 65 | $filter[] = $user_id; |
| 66 | 66 | } |
| 67 | 67 | |
@@ -85,11 +85,11 @@ discard block |
||
| 85 | 85 | * @return SharingACL[] |
| 86 | 86 | */ |
| 87 | 87 | public function getCredentialAclList($item_guid) { |
| 88 | - $q = "SELECT * FROM ". self::TABLE_NAME ." WHERE item_guid = ?"; |
|
| 88 | + $q = "SELECT * FROM " . self::TABLE_NAME . " WHERE item_guid = ?"; |
|
| 89 | 89 | return $this->findEntities($q, [$item_guid]); |
| 90 | 90 | } |
| 91 | 91 | |
| 92 | - public function deleteShareACL(SharingACL $ACL){ |
|
| 92 | + public function deleteShareACL(SharingACL $ACL) { |
|
| 93 | 93 | return $this->delete($ACL); |
| 94 | 94 | } |
| 95 | 95 | } |
| 96 | 96 | \ No newline at end of file |
@@ -36,7 +36,7 @@ discard block |
||
| 36 | 36 | parent::__construct($db, 'passman_sharing_acl'); |
| 37 | 37 | } |
| 38 | 38 | |
| 39 | - public function createACLEntry(SharingACL $acl){ |
|
| 39 | + public function createACLEntry(SharingACL $acl) { |
|
| 40 | 40 | return $this->insert($acl); |
| 41 | 41 | } |
| 42 | 42 | |
@@ -61,7 +61,7 @@ discard block |
||
| 61 | 61 | $q = "SELECT * FROM " . self::TABLE_NAME . " WHERE item_guid = ? AND "; |
| 62 | 62 | $filter = [$item_guid]; |
| 63 | 63 | $q .= ($user_id === null) ? 'user_id is null' : 'user_id = ? '; |
| 64 | - if ($user_id !== null){ |
|
| 64 | + if ($user_id !== null) { |
|
| 65 | 65 | $filter[] = $user_id; |
| 66 | 66 | } |
| 67 | 67 | |
@@ -89,7 +89,7 @@ discard block |
||
| 89 | 89 | return $this->findEntities($q, [$item_guid]); |
| 90 | 90 | } |
| 91 | 91 | |
| 92 | - public function deleteShareACL(SharingACL $ACL){ |
|
| 92 | + public function deleteShareACL(SharingACL $ACL) { |
|
| 93 | 93 | return $this->delete($ACL); |
| 94 | 94 | } |
| 95 | 95 | } |
| 96 | 96 | \ No newline at end of file |
@@ -23,7 +23,7 @@ discard block |
||
| 23 | 23 | public function __construct($AppName, |
| 24 | 24 | IRequest $request, |
| 25 | 25 | $UserId, |
| 26 | - FileService $fileService){ |
|
| 26 | + FileService $fileService) { |
|
| 27 | 27 | parent::__construct($AppName, $request); |
| 28 | 28 | $this->userId = $UserId; |
| 29 | 29 | $this->fileService = $fileService; |
@@ -59,20 +59,20 @@ discard block |
||
| 59 | 59 | return new JSONResponse($this->fileService->deleteFile($file_id, $this->userId)); |
| 60 | 60 | } |
| 61 | 61 | |
| 62 | - public function updateFile($file_id, $file_data, $filename){ |
|
| 63 | - try{ |
|
| 62 | + public function updateFile($file_id, $file_data, $filename) { |
|
| 63 | + try { |
|
| 64 | 64 | $file = $this->fileService->getFile($file_id, $this->userId); |
| 65 | - } catch (\Exception $doesNotExistException){ |
|
| 65 | + } catch (\Exception $doesNotExistException) { |
|
| 66 | 66 | |
| 67 | 67 | } |
| 68 | - if($file){ |
|
| 69 | - if($file_data) { |
|
| 68 | + if ($file) { |
|
| 69 | + if ($file_data) { |
|
| 70 | 70 | $file->setFileData($file_data); |
| 71 | 71 | } |
| 72 | - if($filename) { |
|
| 72 | + if ($filename) { |
|
| 73 | 73 | $file->setFilename($filename); |
| 74 | 74 | } |
| 75 | - if($filename || $file_data){ |
|
| 75 | + if ($filename || $file_data) { |
|
| 76 | 76 | new JSONResponse($this->fileService->updateFile($file)); |
| 77 | 77 | } |
| 78 | 78 | } |
@@ -23,7 +23,7 @@ discard block |
||
| 23 | 23 | public function __construct($AppName, |
| 24 | 24 | IRequest $request, |
| 25 | 25 | $UserId, |
| 26 | - FileService $fileService){ |
|
| 26 | + FileService $fileService) { |
|
| 27 | 27 | parent::__construct($AppName, $request); |
| 28 | 28 | $this->userId = $UserId; |
| 29 | 29 | $this->fileService = $fileService; |
@@ -59,20 +59,20 @@ discard block |
||
| 59 | 59 | return new JSONResponse($this->fileService->deleteFile($file_id, $this->userId)); |
| 60 | 60 | } |
| 61 | 61 | |
| 62 | - public function updateFile($file_id, $file_data, $filename){ |
|
| 62 | + public function updateFile($file_id, $file_data, $filename) { |
|
| 63 | 63 | try{ |
| 64 | 64 | $file = $this->fileService->getFile($file_id, $this->userId); |
| 65 | 65 | } catch (\Exception $doesNotExistException){ |
| 66 | 66 | |
| 67 | 67 | } |
| 68 | - if($file){ |
|
| 68 | + if($file) { |
|
| 69 | 69 | if($file_data) { |
| 70 | 70 | $file->setFileData($file_data); |
| 71 | 71 | } |
| 72 | 72 | if($filename) { |
| 73 | 73 | $file->setFilename($filename); |
| 74 | 74 | } |
| 75 | - if($filename || $file_data){ |
|
| 75 | + if($filename || $file_data) { |
|
| 76 | 76 | new JSONResponse($this->fileService->updateFile($file)); |
| 77 | 77 | } |
| 78 | 78 | } |