@@ -81,7 +81,7 @@ discard block |
||
81 | 81 | $ext = 'gif'; |
82 | 82 | break; |
83 | 83 | } |
84 | - $file = $folder->newFile('photo.' . $ext); |
|
84 | + $file = $folder->newFile('photo.'.$ext); |
|
85 | 85 | $file->putContent($data['body']); |
86 | 86 | } |
87 | 87 | } |
@@ -94,9 +94,9 @@ discard block |
||
94 | 94 | $ext = $this->getExtension($folder); |
95 | 95 | |
96 | 96 | if ($size === -1) { |
97 | - $path = 'photo.' . $ext; |
|
97 | + $path = 'photo.'.$ext; |
|
98 | 98 | } else { |
99 | - $path = 'photo.' . $size . '.' . $ext; |
|
99 | + $path = 'photo.'.$size.'.'.$ext; |
|
100 | 100 | } |
101 | 101 | |
102 | 102 | try { |
@@ -108,14 +108,14 @@ discard block |
||
108 | 108 | |
109 | 109 | $photo = new \OC_Image(); |
110 | 110 | /** @var ISimpleFile $file */ |
111 | - $file = $folder->getFile('photo.' . $ext); |
|
111 | + $file = $folder->getFile('photo.'.$ext); |
|
112 | 112 | $photo->loadFromData($file->getContent()); |
113 | 113 | |
114 | 114 | $ratio = $photo->width() / $photo->height(); |
115 | 115 | if ($ratio < 1) { |
116 | - $ratio = 1/$ratio; |
|
116 | + $ratio = 1 / $ratio; |
|
117 | 117 | } |
118 | - $size = (int)($size * $ratio); |
|
118 | + $size = (int) ($size * $ratio); |
|
119 | 119 | |
120 | 120 | if ($size !== -1) { |
121 | 121 | $photo->resize($size); |
@@ -138,7 +138,7 @@ discard block |
||
138 | 138 | * @return ISimpleFolder |
139 | 139 | */ |
140 | 140 | private function getFolder($addressBookId, $cardUri) { |
141 | - $hash = md5($addressBookId . ' ' . $cardUri); |
|
141 | + $hash = md5($addressBookId.' '.$cardUri); |
|
142 | 142 | try { |
143 | 143 | return $this->appData->getFolder($hash); |
144 | 144 | } catch (NotFoundException $e) { |
@@ -193,7 +193,7 @@ discard block |
||
193 | 193 | 'image/gif', |
194 | 194 | ]; |
195 | 195 | |
196 | - if(!in_array($type, $allowedContentTypes, true)) { |
|
196 | + if (!in_array($type, $allowedContentTypes, true)) { |
|
197 | 197 | $type = 'application/octet-stream'; |
198 | 198 | } |
199 | 199 | |
@@ -201,7 +201,7 @@ discard block |
||
201 | 201 | 'Content-Type' => $type, |
202 | 202 | 'body' => $val |
203 | 203 | ]; |
204 | - } catch(\Exception $ex) { |
|
204 | + } catch (\Exception $ex) { |
|
205 | 205 | |
206 | 206 | } |
207 | 207 | return false; |
@@ -229,7 +229,7 @@ discard block |
||
229 | 229 | if (strpos($type, 'image/') === 0) { |
230 | 230 | return $type; |
231 | 231 | } else { |
232 | - return 'image/' . strtolower($type); |
|
232 | + return 'image/'.strtolower($type); |
|
233 | 233 | } |
234 | 234 | } |
235 | 235 | return ''; |
@@ -72,7 +72,7 @@ discard block |
||
72 | 72 | return true; |
73 | 73 | } |
74 | 74 | |
75 | - $size = isset($queryParams['size']) ? (int)$queryParams['size'] : -1; |
|
75 | + $size = isset($queryParams['size']) ? (int) $queryParams['size'] : -1; |
|
76 | 76 | |
77 | 77 | $path = $request->getPath(); |
78 | 78 | $node = $this->server->tree->getNodeForPath($path); |
@@ -97,7 +97,7 @@ discard block |
||
97 | 97 | $addressbook = $this->server->tree->getNodeForPath($addressbookpath); |
98 | 98 | |
99 | 99 | $response->setHeader('Cache-Control', 'private, max-age=3600, must-revalidate'); |
100 | - $response->setHeader('Etag', $node->getETag() ); |
|
100 | + $response->setHeader('Etag', $node->getETag()); |
|
101 | 101 | $response->setHeader('Pragma', 'public'); |
102 | 102 | |
103 | 103 | try { |
@@ -85,7 +85,7 @@ discard block |
||
85 | 85 | * @return mixed the value or $default |
86 | 86 | */ |
87 | 87 | public function getValue($key, $default = null) { |
88 | - $envValue = getenv(self::ENV_PREFIX . $key); |
|
88 | + $envValue = getenv(self::ENV_PREFIX.$key); |
|
89 | 89 | if ($envValue !== false) { |
90 | 90 | return $envValue; |
91 | 91 | } |
@@ -197,7 +197,7 @@ discard block |
||
197 | 197 | foreach ($configFiles as $file) { |
198 | 198 | $fileExistsAndIsReadable = file_exists($file) && is_readable($file); |
199 | 199 | $filePointer = $fileExistsAndIsReadable ? fopen($file, 'r') : false; |
200 | - if($file === $this->configFilePath && |
|
200 | + if ($file === $this->configFilePath && |
|
201 | 201 | $filePointer === false) { |
202 | 202 | // Opening the main config might not be possible, e.g. if the wrong |
203 | 203 | // permissions are set (likely on a new installation) |
@@ -205,13 +205,13 @@ discard block |
||
205 | 205 | } |
206 | 206 | |
207 | 207 | // Try to acquire a file lock |
208 | - if(!flock($filePointer, LOCK_SH)) { |
|
208 | + if (!flock($filePointer, LOCK_SH)) { |
|
209 | 209 | throw new \Exception(sprintf('Could not acquire a shared lock on the config file %s', $file)); |
210 | 210 | } |
211 | 211 | |
212 | 212 | unset($CONFIG); |
213 | 213 | include $file; |
214 | - if(isset($CONFIG) && is_array($CONFIG)) { |
|
214 | + if (isset($CONFIG) && is_array($CONFIG)) { |
|
215 | 215 | $this->cache = array_merge($this->cache, $CONFIG); |
216 | 216 | } |
217 | 217 | |
@@ -236,29 +236,29 @@ discard block |
||
236 | 236 | $content .= var_export($this->cache, true); |
237 | 237 | $content .= ";\n"; |
238 | 238 | |
239 | - touch ($this->configFilePath); |
|
239 | + touch($this->configFilePath); |
|
240 | 240 | $filePointer = fopen($this->configFilePath, 'r+'); |
241 | 241 | |
242 | 242 | // Prevent others not to read the config |
243 | 243 | chmod($this->configFilePath, 0640); |
244 | 244 | |
245 | 245 | // File does not exist, this can happen when doing a fresh install |
246 | - if(!is_resource ($filePointer)) { |
|
246 | + if (!is_resource($filePointer)) { |
|
247 | 247 | // TODO fix this via DI once it is very clear that this doesn't cause side effects due to initialization order |
248 | 248 | // currently this breaks app routes but also could have other side effects especially during setup and exception handling |
249 | 249 | $url = \OC::$server->getURLGenerator()->linkToDocs('admin-dir_permissions'); |
250 | 250 | throw new HintException( |
251 | 251 | "Can't write into config directory!", |
252 | - 'This can usually be fixed by giving the webserver write access to the config directory. See ' . $url); |
|
252 | + 'This can usually be fixed by giving the webserver write access to the config directory. See '.$url); |
|
253 | 253 | } |
254 | 254 | |
255 | 255 | // Try to acquire a file lock |
256 | - if(!flock($filePointer, LOCK_EX)) { |
|
256 | + if (!flock($filePointer, LOCK_EX)) { |
|
257 | 257 | throw new \Exception(sprintf('Could not acquire an exclusive lock on the config file %s', $this->configFilePath)); |
258 | 258 | } |
259 | 259 | |
260 | 260 | // Write the config and release the lock |
261 | - ftruncate ($filePointer, 0); |
|
261 | + ftruncate($filePointer, 0); |
|
262 | 262 | fwrite($filePointer, $content); |
263 | 263 | fflush($filePointer); |
264 | 264 | flock($filePointer, LOCK_UN); |
@@ -35,12 +35,12 @@ discard block |
||
35 | 35 | throw new \RuntimeException("No app with given id <$appId> known."); |
36 | 36 | } |
37 | 37 | |
38 | - if (!is_dir($appPath . '/l10n/')) { |
|
38 | + if (!is_dir($appPath.'/l10n/')) { |
|
39 | 39 | return []; |
40 | 40 | } |
41 | 41 | |
42 | 42 | $errors = []; |
43 | - $directory = new \DirectoryIterator($appPath . '/l10n/'); |
|
43 | + $directory = new \DirectoryIterator($appPath.'/l10n/'); |
|
44 | 44 | |
45 | 45 | foreach ($directory as $file) { |
46 | 46 | if ($file->getExtension() !== 'json') { |
@@ -51,7 +51,7 @@ discard block |
||
51 | 51 | json_decode($content, true); |
52 | 52 | |
53 | 53 | if (json_last_error() !== JSON_ERROR_NONE) { |
54 | - $errors[] = 'Invalid language file found: l10n/' . $file->getFilename() . ': ' . json_last_error_msg(); |
|
54 | + $errors[] = 'Invalid language file found: l10n/'.$file->getFilename().': '.json_last_error_msg(); |
|
55 | 55 | } |
56 | 56 | } |
57 | 57 |
@@ -52,7 +52,7 @@ discard block |
||
52 | 52 | /** |
53 | 53 | * @param array $urlParams |
54 | 54 | */ |
55 | - public function __construct(array $urlParams=[]){ |
|
55 | + public function __construct(array $urlParams = []) { |
|
56 | 56 | parent::__construct('settings', $urlParams); |
57 | 57 | |
58 | 58 | $container = $this->getContainer(); |
@@ -72,7 +72,7 @@ discard block |
||
72 | 72 | $container->registerService('isSubAdmin', function(IContainer $c) { |
73 | 73 | $userObject = \OC::$server->getUserSession()->getUser(); |
74 | 74 | $isSubAdmin = false; |
75 | - if($userObject !== null) { |
|
75 | + if ($userObject !== null) { |
|
76 | 76 | $isSubAdmin = \OC::$server->getGroupManager()->getSubAdmin()->isSubAdmin($userObject); |
77 | 77 | } |
78 | 78 | return $isSubAdmin; |
@@ -80,17 +80,17 @@ discard block |
||
80 | 80 | $container->registerService('userCertificateManager', function(IContainer $c) { |
81 | 81 | return $c->query('ServerContainer')->getCertificateManager(); |
82 | 82 | }, false); |
83 | - $container->registerService('systemCertificateManager', function (IContainer $c) { |
|
83 | + $container->registerService('systemCertificateManager', function(IContainer $c) { |
|
84 | 84 | return $c->query('ServerContainer')->getCertificateManager(null); |
85 | 85 | }, false); |
86 | - $container->registerService(IProvider::class, function (IContainer $c) { |
|
86 | + $container->registerService(IProvider::class, function(IContainer $c) { |
|
87 | 87 | return $c->query('ServerContainer')->query(IProvider::class); |
88 | 88 | }); |
89 | - $container->registerService(IManager::class, function (IContainer $c) { |
|
89 | + $container->registerService(IManager::class, function(IContainer $c) { |
|
90 | 90 | return $c->query('ServerContainer')->getSettingsManager(); |
91 | 91 | }); |
92 | 92 | |
93 | - $container->registerService(NewUserMailHelper::class, function (IContainer $c) { |
|
93 | + $container->registerService(NewUserMailHelper::class, function(IContainer $c) { |
|
94 | 94 | /** @var Server $server */ |
95 | 95 | $server = $c->query('ServerContainer'); |
96 | 96 | /** @var Defaults $defaults */ |
@@ -112,7 +112,7 @@ discard block |
||
112 | 112 | $json = file_get_contents('php://stdin'); |
113 | 113 | } else { |
114 | 114 | if (!file_exists($path)) { |
115 | - $output->writeln('<error>File not found: ' . $path . '</error>'); |
|
115 | + $output->writeln('<error>File not found: '.$path.'</error>'); |
|
116 | 116 | return 1; |
117 | 117 | } |
118 | 118 | $json = file_get_contents($path); |
@@ -164,7 +164,7 @@ discard block |
||
164 | 164 | $existingMount->getApplicableUsers() === $mount->getApplicableUsers() && |
165 | 165 | $existingMount->getBackendOptions() === $mount->getBackendOptions() |
166 | 166 | ) { |
167 | - $output->writeln("<error>Duplicate mount (" . $mount->getMountPoint() . ")</error>"); |
|
167 | + $output->writeln("<error>Duplicate mount (".$mount->getMountPoint().")</error>"); |
|
168 | 168 | return 1; |
169 | 169 | } |
170 | 170 | } |
@@ -31,8 +31,8 @@ discard block |
||
31 | 31 | OCP\User::checkLoggedIn(); |
32 | 32 | \OC::$server->getSession()->close(); |
33 | 33 | |
34 | -$files = isset($_GET['files']) ? (string)$_GET['files'] : ''; |
|
35 | -$dir = isset($_GET['dir']) ? (string)$_GET['dir'] : ''; |
|
34 | +$files = isset($_GET['files']) ? (string) $_GET['files'] : ''; |
|
35 | +$dir = isset($_GET['dir']) ? (string) $_GET['dir'] : ''; |
|
36 | 36 | |
37 | 37 | $files_list = json_decode($files); |
38 | 38 | // in case we get only a single file |
@@ -45,13 +45,13 @@ discard block |
||
45 | 45 | * the content must not be longer than 32 characters and must only contain |
46 | 46 | * alphanumeric characters |
47 | 47 | */ |
48 | -if(isset($_GET['downloadStartSecret']) |
|
48 | +if (isset($_GET['downloadStartSecret']) |
|
49 | 49 | && !isset($_GET['downloadStartSecret'][32]) |
50 | 50 | && preg_match('!^[a-zA-Z0-9]+$!', $_GET['downloadStartSecret']) === 1) { |
51 | 51 | setcookie('ocDownloadStarted', $_GET['downloadStartSecret'], time() + 20, '/'); |
52 | 52 | } |
53 | 53 | |
54 | -$server_params = array( 'head' => \OC::$server->getRequest()->getMethod() === 'HEAD' ); |
|
54 | +$server_params = array('head' => \OC::$server->getRequest()->getMethod() === 'HEAD'); |
|
55 | 55 | |
56 | 56 | /** |
57 | 57 | * Http range requests support |
@@ -68,7 +68,7 @@ |
||
68 | 68 | |
69 | 69 | $query = $this->connection->getQueryBuilder(); |
70 | 70 | $query->update('share') |
71 | - ->set('share_type', $query->createNamedParameter(Share::SHARE_TYPE_GUEST)) |
|
71 | + ->set('share_type', $query->createNamedParameter(Share::SHARE_TYPE_GUEST)) |
|
72 | 72 | ->where($query->expr()->eq('share_type', $query->createNamedParameter(Share::SHARE_TYPE_EMAIL))); |
73 | 73 | $query->execute(); |
74 | 74 | } |
@@ -67,7 +67,7 @@ discard block |
||
67 | 67 | * ubos-raspberry-pi.local and ubos-raspberry-pi-2.local |
68 | 68 | */ |
69 | 69 | 'trusted_domains' => |
70 | - array ( |
|
70 | + array( |
|
71 | 71 | 'demo.example.org', |
72 | 72 | 'otherdomain.example.org', |
73 | 73 | ), |
@@ -192,7 +192,7 @@ discard block |
||
192 | 192 | * |
193 | 193 | * Defaults to ``60*60*24*15`` seconds (15 days) |
194 | 194 | */ |
195 | -'remember_login_cookie_lifetime' => 60*60*24*15, |
|
195 | +'remember_login_cookie_lifetime' => 60 * 60 * 24 * 15, |
|
196 | 196 | |
197 | 197 | /** |
198 | 198 | * The lifetime of a session after inactivity. |
@@ -1074,7 +1074,7 @@ discard block |
||
1074 | 1074 | * See https://redis.io/topics/cluster-spec for details about the Redis cluster |
1075 | 1075 | */ |
1076 | 1076 | 'redis.cluster' => [ |
1077 | - 'seeds' => [ // provide some/all of the cluster servers to bootstrap discovery, port required |
|
1077 | + 'seeds' => [// provide some/all of the cluster servers to bootstrap discovery, port required |
|
1078 | 1078 | 'localhost:7000', |
1079 | 1079 | 'localhost:7001' |
1080 | 1080 | ], |
@@ -1138,7 +1138,7 @@ discard block |
||
1138 | 1138 | * |
1139 | 1139 | * Defaults to ``60*60*24`` (1 day) |
1140 | 1140 | */ |
1141 | -'cache_chunk_gc_ttl' => 60*60*24, |
|
1141 | +'cache_chunk_gc_ttl' => 60 * 60 * 24, |
|
1142 | 1142 | |
1143 | 1143 | /** |
1144 | 1144 | * Using Object Store with Nextcloud |
@@ -1462,7 +1462,7 @@ discard block |
||
1462 | 1462 | * Defaults to ``60*60`` seconds (1 hour) or the php |
1463 | 1463 | * max_execution_time, whichever is higher. |
1464 | 1464 | */ |
1465 | -'filelocking.ttl' => 60*60, |
|
1465 | +'filelocking.ttl' => 60 * 60, |
|
1466 | 1466 | |
1467 | 1467 | /** |
1468 | 1468 | * Memory caching backend for file locking |