Completed
Pull Request — master (#3590)
by Individual IT
11:38
created
apps/user_ldap/lib/User_LDAP.php 2 patches
Indentation   +485 added lines, -485 removed lines patch added patch discarded remove patch
@@ -44,492 +44,492 @@
 block discarded – undo
44 44
 use OCP\Util;
45 45
 
46 46
 class User_LDAP extends BackendUtility implements \OCP\IUserBackend, \OCP\UserInterface, IUserLDAP {
47
-	/** @var string[] $homesToKill */
48
-	protected $homesToKill = array();
49
-
50
-	/** @var \OCP\IConfig */
51
-	protected $ocConfig;
52
-
53
-	/**
54
-	 * @param Access $access
55
-	 * @param \OCP\IConfig $ocConfig
56
-	 */
57
-	public function __construct(Access $access, IConfig $ocConfig) {
58
-		parent::__construct($access);
59
-		$this->ocConfig = $ocConfig;
60
-	}
61
-
62
-	/**
63
-	 * checks whether the user is allowed to change his avatar in ownCloud
64
-	 * @param string $uid the ownCloud user name
65
-	 * @return boolean either the user can or cannot
66
-	 */
67
-	public function canChangeAvatar($uid) {
68
-		$user = $this->access->userManager->get($uid);
69
-		if(!$user instanceof User) {
70
-			return false;
71
-		}
72
-		if($user->getAvatarImage() === false) {
73
-			return true;
74
-		}
75
-
76
-		return false;
77
-	}
78
-
79
-	/**
80
-	 * returns the username for the given login name, if available
81
-	 *
82
-	 * @param string $loginName
83
-	 * @return string|false
84
-	 */
85
-	public function loginName2UserName($loginName) {
86
-		$cacheKey = 'loginName2UserName-'.$loginName;
87
-		$username = $this->access->connection->getFromCache($cacheKey);
88
-		if(!is_null($username)) {
89
-			return $username;
90
-		}
91
-
92
-		try {
93
-			$ldapRecord = $this->getLDAPUserByLoginName($loginName);
94
-			$user = $this->access->userManager->get($ldapRecord['dn'][0]);
95
-			if($user instanceof OfflineUser) {
96
-				// this path is not really possible, however get() is documented
97
-				// to return User or OfflineUser so we are very defensive here.
98
-				$this->access->connection->writeToCache($cacheKey, false);
99
-				return false;
100
-			}
101
-			$username = $user->getUsername();
102
-			$this->access->connection->writeToCache($cacheKey, $username);
103
-			return $username;
104
-		} catch (NotOnLDAP $e) {
105
-			$this->access->connection->writeToCache($cacheKey, false);
106
-			return false;
107
-		}
108
-	}
47
+    /** @var string[] $homesToKill */
48
+    protected $homesToKill = array();
49
+
50
+    /** @var \OCP\IConfig */
51
+    protected $ocConfig;
52
+
53
+    /**
54
+     * @param Access $access
55
+     * @param \OCP\IConfig $ocConfig
56
+     */
57
+    public function __construct(Access $access, IConfig $ocConfig) {
58
+        parent::__construct($access);
59
+        $this->ocConfig = $ocConfig;
60
+    }
61
+
62
+    /**
63
+     * checks whether the user is allowed to change his avatar in ownCloud
64
+     * @param string $uid the ownCloud user name
65
+     * @return boolean either the user can or cannot
66
+     */
67
+    public function canChangeAvatar($uid) {
68
+        $user = $this->access->userManager->get($uid);
69
+        if(!$user instanceof User) {
70
+            return false;
71
+        }
72
+        if($user->getAvatarImage() === false) {
73
+            return true;
74
+        }
75
+
76
+        return false;
77
+    }
78
+
79
+    /**
80
+     * returns the username for the given login name, if available
81
+     *
82
+     * @param string $loginName
83
+     * @return string|false
84
+     */
85
+    public function loginName2UserName($loginName) {
86
+        $cacheKey = 'loginName2UserName-'.$loginName;
87
+        $username = $this->access->connection->getFromCache($cacheKey);
88
+        if(!is_null($username)) {
89
+            return $username;
90
+        }
91
+
92
+        try {
93
+            $ldapRecord = $this->getLDAPUserByLoginName($loginName);
94
+            $user = $this->access->userManager->get($ldapRecord['dn'][0]);
95
+            if($user instanceof OfflineUser) {
96
+                // this path is not really possible, however get() is documented
97
+                // to return User or OfflineUser so we are very defensive here.
98
+                $this->access->connection->writeToCache($cacheKey, false);
99
+                return false;
100
+            }
101
+            $username = $user->getUsername();
102
+            $this->access->connection->writeToCache($cacheKey, $username);
103
+            return $username;
104
+        } catch (NotOnLDAP $e) {
105
+            $this->access->connection->writeToCache($cacheKey, false);
106
+            return false;
107
+        }
108
+    }
109 109
 	
110
-	/**
111
-	 * returns the username for the given LDAP DN, if available
112
-	 *
113
-	 * @param string $dn
114
-	 * @return string|false with the username
115
-	 */
116
-	public function dn2UserName($dn) {
117
-		return $this->access->dn2username($dn);
118
-	}
119
-
120
-	/**
121
-	 * returns an LDAP record based on a given login name
122
-	 *
123
-	 * @param string $loginName
124
-	 * @return array
125
-	 * @throws NotOnLDAP
126
-	 */
127
-	public function getLDAPUserByLoginName($loginName) {
128
-		//find out dn of the user name
129
-		$attrs = $this->access->userManager->getAttributes();
130
-		$users = $this->access->fetchUsersByLoginName($loginName, $attrs);
131
-		if(count($users) < 1) {
132
-			throw new NotOnLDAP('No user available for the given login name on ' .
133
-				$this->access->connection->ldapHost . ':' . $this->access->connection->ldapPort);
134
-		}
135
-		return $users[0];
136
-	}
137
-
138
-	/**
139
-	 * Check if the password is correct without logging in the user
140
-	 *
141
-	 * @param string $uid The username
142
-	 * @param string $password The password
143
-	 * @return false|string
144
-	 */
145
-	public function checkPassword($uid, $password) {
146
-		try {
147
-			$ldapRecord = $this->getLDAPUserByLoginName($uid);
148
-		} catch(NotOnLDAP $e) {
149
-			if($this->ocConfig->getSystemValue('loglevel', Util::WARN) === Util::DEBUG) {
150
-				\OC::$server->getLogger()->logException($e, ['app' => 'user_ldap']);
151
-			}
152
-			return false;
153
-		}
154
-		$dn = $ldapRecord['dn'][0];
155
-		$user = $this->access->userManager->get($dn);
156
-
157
-		if(!$user instanceof User) {
158
-			Util::writeLog('user_ldap',
159
-				'LDAP Login: Could not get user object for DN ' . $dn .
160
-				'. Maybe the LDAP entry has no set display name attribute?',
161
-				Util::WARN);
162
-			return false;
163
-		}
164
-		if($user->getUsername() !== false) {
165
-			//are the credentials OK?
166
-			if(!$this->access->areCredentialsValid($dn, $password)) {
167
-				return false;
168
-			}
169
-
170
-			$this->access->cacheUserExists($user->getUsername());
171
-			$user->processAttributes($ldapRecord);
172
-			$user->markLogin();
173
-
174
-			return $user->getUsername();
175
-		}
176
-
177
-		return false;
178
-	}
179
-
180
-	/**
181
-	 * Set password
182
-	 * @param string $uid The username
183
-	 * @param string $password The new password
184
-	 * @return bool
185
-	 */
186
-	public function setPassword($uid, $password) {
187
-		$user = $this->access->userManager->get($uid);
188
-
189
-		if(!$user instanceof User) {
190
-			throw new \Exception('LDAP setPassword: Could not get user object for uid ' . $uid .
191
-				'. Maybe the LDAP entry has no set display name attribute?');
192
-		}
193
-		if($user->getUsername() !== false) {
194
-			return $this->access->setPassword($user->getDN(), $password);
195
-		}
196
-
197
-		return false;
198
-	}
199
-
200
-	/**
201
-	 * Get a list of all users
202
-	 *
203
-	 * @param string $search
204
-	 * @param integer $limit
205
-	 * @param integer $offset
206
-	 * @return string[] an array of all uids
207
-	 */
208
-	public function getUsers($search = '', $limit = 10, $offset = 0) {
209
-		$search = $this->access->escapeFilterPart($search, true);
210
-		$cachekey = 'getUsers-'.$search.'-'.$limit.'-'.$offset;
211
-
212
-		//check if users are cached, if so return
213
-		$ldap_users = $this->access->connection->getFromCache($cachekey);
214
-		if(!is_null($ldap_users)) {
215
-			return $ldap_users;
216
-		}
217
-
218
-		// if we'd pass -1 to LDAP search, we'd end up in a Protocol
219
-		// error. With a limit of 0, we get 0 results. So we pass null.
220
-		if($limit <= 0) {
221
-			$limit = null;
222
-		}
223
-		$filter = $this->access->combineFilterWithAnd(array(
224
-			$this->access->connection->ldapUserFilter,
225
-			$this->access->connection->ldapUserDisplayName . '=*',
226
-			$this->access->getFilterPartForUserSearch($search)
227
-		));
228
-
229
-		Util::writeLog('user_ldap',
230
-			'getUsers: Options: search '.$search.' limit '.$limit.' offset '.$offset.' Filter: '.$filter,
231
-			Util::DEBUG);
232
-		//do the search and translate results to owncloud names
233
-		$ldap_users = $this->access->fetchListOfUsers(
234
-			$filter,
235
-			$this->access->userManager->getAttributes(true),
236
-			$limit, $offset);
237
-		$ldap_users = $this->access->ownCloudUserNames($ldap_users);
238
-		Util::writeLog('user_ldap', 'getUsers: '.count($ldap_users). ' Users found', Util::DEBUG);
239
-
240
-		$this->access->connection->writeToCache($cachekey, $ldap_users);
241
-		return $ldap_users;
242
-	}
243
-
244
-	/**
245
-	 * checks whether a user is still available on LDAP
246
-	 *
247
-	 * @param string|\OCA\User_LDAP\User\User $user either the ownCloud user
248
-	 * name or an instance of that user
249
-	 * @return bool
250
-	 * @throws \Exception
251
-	 * @throws \OC\ServerNotAvailableException
252
-	 */
253
-	public function userExistsOnLDAP($user) {
254
-		if(is_string($user)) {
255
-			$user = $this->access->userManager->get($user);
256
-		}
257
-		if(is_null($user)) {
258
-			return false;
259
-		}
260
-
261
-		$dn = $user->getDN();
262
-		//check if user really still exists by reading its entry
263
-		if(!is_array($this->access->readAttribute($dn, '', $this->access->connection->ldapUserFilter))) {
264
-			$lcr = $this->access->connection->getConnectionResource();
265
-			if(is_null($lcr)) {
266
-				throw new \Exception('No LDAP Connection to server ' . $this->access->connection->ldapHost);
267
-			}
268
-
269
-			try {
270
-				$uuid = $this->access->getUserMapper()->getUUIDByDN($dn);
271
-				if(!$uuid) {
272
-					return false;
273
-				}
274
-				$newDn = $this->access->getUserDnByUuid($uuid);
275
-				//check if renamed user is still valid by reapplying the ldap filter
276
-				if(!is_array($this->access->readAttribute($newDn, '', $this->access->connection->ldapUserFilter))) {
277
-					return false;
278
-				}
279
-				$this->access->getUserMapper()->setDNbyUUID($newDn, $uuid);
280
-				return true;
281
-			} catch (\Exception $e) {
282
-				return false;
283
-			}
284
-		}
285
-
286
-		if($user instanceof OfflineUser) {
287
-			$user->unmark();
288
-		}
289
-
290
-		return true;
291
-	}
292
-
293
-	/**
294
-	 * check if a user exists
295
-	 * @param string $uid the username
296
-	 * @return boolean
297
-	 * @throws \Exception when connection could not be established
298
-	 */
299
-	public function userExists($uid) {
300
-		$userExists = $this->access->connection->getFromCache('userExists'.$uid);
301
-		if(!is_null($userExists)) {
302
-			return (bool)$userExists;
303
-		}
304
-		//getting dn, if false the user does not exist. If dn, he may be mapped only, requires more checking.
305
-		$user = $this->access->userManager->get($uid);
306
-
307
-		if(is_null($user)) {
308
-			Util::writeLog('user_ldap', 'No DN found for '.$uid.' on '.
309
-				$this->access->connection->ldapHost, Util::DEBUG);
310
-			$this->access->connection->writeToCache('userExists'.$uid, false);
311
-			return false;
312
-		} else if($user instanceof OfflineUser) {
313
-			//express check for users marked as deleted. Returning true is
314
-			//necessary for cleanup
315
-			return true;
316
-		}
317
-
318
-		$result = $this->userExistsOnLDAP($user);
319
-		$this->access->connection->writeToCache('userExists'.$uid, $result);
320
-		if($result === true) {
321
-			$user->update();
322
-		}
323
-		return $result;
324
-	}
325
-
326
-	/**
327
-	* returns whether a user was deleted in LDAP
328
-	*
329
-	* @param string $uid The username of the user to delete
330
-	* @return bool
331
-	*/
332
-	public function deleteUser($uid) {
333
-		$marked = $this->ocConfig->getUserValue($uid, 'user_ldap', 'isDeleted', 0);
334
-		if(intval($marked) === 0) {
335
-			\OC::$server->getLogger()->notice(
336
-				'User '.$uid . ' is not marked as deleted, not cleaning up.',
337
-				array('app' => 'user_ldap'));
338
-			return false;
339
-		}
340
-		\OC::$server->getLogger()->info('Cleaning up after user ' . $uid,
341
-			array('app' => 'user_ldap'));
342
-
343
-		//Get Home Directory out of user preferences so we can return it later,
344
-		//necessary for removing directories as done by OC_User.
345
-		$home = $this->ocConfig->getUserValue($uid, 'user_ldap', 'homePath', '');
346
-		$this->homesToKill[$uid] = $home;
347
-		$this->access->getUserMapper()->unmap($uid);
348
-
349
-		return true;
350
-	}
351
-
352
-	/**
353
-	 * get the user's home directory
354
-	 *
355
-	 * @param string $uid the username
356
-	 * @return bool|string
357
-	 * @throws NoUserException
358
-	 * @throws \Exception
359
-	 */
360
-	public function getHome($uid) {
361
-		if(isset($this->homesToKill[$uid]) && !empty($this->homesToKill[$uid])) {
362
-			//a deleted user who needs some clean up
363
-			return $this->homesToKill[$uid];
364
-		}
365
-
366
-		// user Exists check required as it is not done in user proxy!
367
-		if(!$this->userExists($uid)) {
368
-			return false;
369
-		}
370
-
371
-		$cacheKey = 'getHome'.$uid;
372
-		$path = $this->access->connection->getFromCache($cacheKey);
373
-		if(!is_null($path)) {
374
-			return $path;
375
-		}
376
-
377
-		$user = $this->access->userManager->get($uid);
378
-		if(is_null($user) || ($user instanceof OfflineUser && !$this->userExistsOnLDAP($user->getOCName()))) {
379
-			throw new NoUserException($uid . ' is not a valid user anymore');
380
-		}
381
-		if($user instanceof OfflineUser) {
382
-			// apparently this user survived the userExistsOnLDAP check,
383
-			// we request the user instance again in order to retrieve a User
384
-			// instance instead
385
-			$user = $this->access->userManager->get($uid);
386
-		}
387
-		$path = $user->getHomePath();
388
-		$this->access->cacheUserHome($uid, $path);
389
-
390
-		return $path;
391
-	}
392
-
393
-	/**
394
-	 * get display name of the user
395
-	 * @param string $uid user ID of the user
396
-	 * @return string|false display name
397
-	 */
398
-	public function getDisplayName($uid) {
399
-		if(!$this->userExists($uid)) {
400
-			return false;
401
-		}
402
-
403
-		$cacheKey = 'getDisplayName'.$uid;
404
-		if(!is_null($displayName = $this->access->connection->getFromCache($cacheKey))) {
405
-			return $displayName;
406
-		}
407
-
408
-		//Check whether the display name is configured to have a 2nd feature
409
-		$additionalAttribute = $this->access->connection->ldapUserDisplayName2;
410
-		$displayName2 = '';
411
-		if ($additionalAttribute !== '') {
412
-			$displayName2 = $this->access->readAttribute(
413
-				$this->access->username2dn($uid),
414
-				$additionalAttribute);
415
-		}
416
-
417
-		$displayName = $this->access->readAttribute(
418
-			$this->access->username2dn($uid),
419
-			$this->access->connection->ldapUserDisplayName);
420
-
421
-		if($displayName && (count($displayName) > 0)) {
422
-			$displayName = $displayName[0];
423
-
424
-			if (is_array($displayName2)){
425
-				$displayName2 = count($displayName2) > 0 ? $displayName2[0] : '';
426
-			}
427
-
428
-			$user = $this->access->userManager->get($uid);
429
-			if ($user instanceof User) {
430
-				$displayName = $user->composeAndStoreDisplayName($displayName, $displayName2);
431
-				$this->access->connection->writeToCache($cacheKey, $displayName);
432
-			}
433
-			if ($user instanceof OfflineUser) {
434
-				/** @var OfflineUser $user*/
435
-				$displayName = $user->getDisplayName();
436
-			}
437
-			return $displayName;
438
-		}
439
-
440
-		return null;
441
-	}
442
-
443
-	/**
444
-	 * Get a list of all display names
445
-	 *
446
-	 * @param string $search
447
-	 * @param string|null $limit
448
-	 * @param string|null $offset
449
-	 * @return array an array of all displayNames (value) and the corresponding uids (key)
450
-	 */
451
-	public function getDisplayNames($search = '', $limit = null, $offset = null) {
452
-		$cacheKey = 'getDisplayNames-'.$search.'-'.$limit.'-'.$offset;
453
-		if(!is_null($displayNames = $this->access->connection->getFromCache($cacheKey))) {
454
-			return $displayNames;
455
-		}
456
-
457
-		$displayNames = array();
458
-		$users = $this->getUsers($search, $limit, $offset);
459
-		foreach ($users as $user) {
460
-			$displayNames[$user] = $this->getDisplayName($user);
461
-		}
462
-		$this->access->connection->writeToCache($cacheKey, $displayNames);
463
-		return $displayNames;
464
-	}
465
-
466
-	/**
467
-	* Check if backend implements actions
468
-	* @param int $actions bitwise-or'ed actions
469
-	* @return boolean
470
-	*
471
-	* Returns the supported actions as int to be
472
-	* compared with OC_USER_BACKEND_CREATE_USER etc.
473
-	*/
474
-	public function implementsActions($actions) {
475
-		return (bool)((Backend::CHECK_PASSWORD
476
-			| Backend::GET_HOME
477
-			| Backend::GET_DISPLAYNAME
478
-			| Backend::PROVIDE_AVATAR
479
-			| Backend::COUNT_USERS
480
-			| ((intval($this->access->connection->turnOnPasswordChange) === 1)?(Backend::SET_PASSWORD):0))
481
-			& $actions);
482
-	}
483
-
484
-	/**
485
-	 * @return bool
486
-	 */
487
-	public function hasUserListings() {
488
-		return true;
489
-	}
490
-
491
-	/**
492
-	 * counts the users in LDAP
493
-	 *
494
-	 * @return int|bool
495
-	 */
496
-	public function countUsers() {
497
-		$filter = $this->access->getFilterForUserCount();
498
-		$cacheKey = 'countUsers-'.$filter;
499
-		if(!is_null($entries = $this->access->connection->getFromCache($cacheKey))) {
500
-			return $entries;
501
-		}
502
-		$entries = $this->access->countUsers($filter);
503
-		$this->access->connection->writeToCache($cacheKey, $entries);
504
-		return $entries;
505
-	}
506
-
507
-	/**
508
-	 * Backend name to be shown in user management
509
-	 * @return string the name of the backend to be shown
510
-	 */
511
-	public function getBackendName(){
512
-		return 'LDAP';
513
-	}
110
+    /**
111
+     * returns the username for the given LDAP DN, if available
112
+     *
113
+     * @param string $dn
114
+     * @return string|false with the username
115
+     */
116
+    public function dn2UserName($dn) {
117
+        return $this->access->dn2username($dn);
118
+    }
119
+
120
+    /**
121
+     * returns an LDAP record based on a given login name
122
+     *
123
+     * @param string $loginName
124
+     * @return array
125
+     * @throws NotOnLDAP
126
+     */
127
+    public function getLDAPUserByLoginName($loginName) {
128
+        //find out dn of the user name
129
+        $attrs = $this->access->userManager->getAttributes();
130
+        $users = $this->access->fetchUsersByLoginName($loginName, $attrs);
131
+        if(count($users) < 1) {
132
+            throw new NotOnLDAP('No user available for the given login name on ' .
133
+                $this->access->connection->ldapHost . ':' . $this->access->connection->ldapPort);
134
+        }
135
+        return $users[0];
136
+    }
137
+
138
+    /**
139
+     * Check if the password is correct without logging in the user
140
+     *
141
+     * @param string $uid The username
142
+     * @param string $password The password
143
+     * @return false|string
144
+     */
145
+    public function checkPassword($uid, $password) {
146
+        try {
147
+            $ldapRecord = $this->getLDAPUserByLoginName($uid);
148
+        } catch(NotOnLDAP $e) {
149
+            if($this->ocConfig->getSystemValue('loglevel', Util::WARN) === Util::DEBUG) {
150
+                \OC::$server->getLogger()->logException($e, ['app' => 'user_ldap']);
151
+            }
152
+            return false;
153
+        }
154
+        $dn = $ldapRecord['dn'][0];
155
+        $user = $this->access->userManager->get($dn);
156
+
157
+        if(!$user instanceof User) {
158
+            Util::writeLog('user_ldap',
159
+                'LDAP Login: Could not get user object for DN ' . $dn .
160
+                '. Maybe the LDAP entry has no set display name attribute?',
161
+                Util::WARN);
162
+            return false;
163
+        }
164
+        if($user->getUsername() !== false) {
165
+            //are the credentials OK?
166
+            if(!$this->access->areCredentialsValid($dn, $password)) {
167
+                return false;
168
+            }
169
+
170
+            $this->access->cacheUserExists($user->getUsername());
171
+            $user->processAttributes($ldapRecord);
172
+            $user->markLogin();
173
+
174
+            return $user->getUsername();
175
+        }
176
+
177
+        return false;
178
+    }
179
+
180
+    /**
181
+     * Set password
182
+     * @param string $uid The username
183
+     * @param string $password The new password
184
+     * @return bool
185
+     */
186
+    public function setPassword($uid, $password) {
187
+        $user = $this->access->userManager->get($uid);
188
+
189
+        if(!$user instanceof User) {
190
+            throw new \Exception('LDAP setPassword: Could not get user object for uid ' . $uid .
191
+                '. Maybe the LDAP entry has no set display name attribute?');
192
+        }
193
+        if($user->getUsername() !== false) {
194
+            return $this->access->setPassword($user->getDN(), $password);
195
+        }
196
+
197
+        return false;
198
+    }
199
+
200
+    /**
201
+     * Get a list of all users
202
+     *
203
+     * @param string $search
204
+     * @param integer $limit
205
+     * @param integer $offset
206
+     * @return string[] an array of all uids
207
+     */
208
+    public function getUsers($search = '', $limit = 10, $offset = 0) {
209
+        $search = $this->access->escapeFilterPart($search, true);
210
+        $cachekey = 'getUsers-'.$search.'-'.$limit.'-'.$offset;
211
+
212
+        //check if users are cached, if so return
213
+        $ldap_users = $this->access->connection->getFromCache($cachekey);
214
+        if(!is_null($ldap_users)) {
215
+            return $ldap_users;
216
+        }
217
+
218
+        // if we'd pass -1 to LDAP search, we'd end up in a Protocol
219
+        // error. With a limit of 0, we get 0 results. So we pass null.
220
+        if($limit <= 0) {
221
+            $limit = null;
222
+        }
223
+        $filter = $this->access->combineFilterWithAnd(array(
224
+            $this->access->connection->ldapUserFilter,
225
+            $this->access->connection->ldapUserDisplayName . '=*',
226
+            $this->access->getFilterPartForUserSearch($search)
227
+        ));
228
+
229
+        Util::writeLog('user_ldap',
230
+            'getUsers: Options: search '.$search.' limit '.$limit.' offset '.$offset.' Filter: '.$filter,
231
+            Util::DEBUG);
232
+        //do the search and translate results to owncloud names
233
+        $ldap_users = $this->access->fetchListOfUsers(
234
+            $filter,
235
+            $this->access->userManager->getAttributes(true),
236
+            $limit, $offset);
237
+        $ldap_users = $this->access->ownCloudUserNames($ldap_users);
238
+        Util::writeLog('user_ldap', 'getUsers: '.count($ldap_users). ' Users found', Util::DEBUG);
239
+
240
+        $this->access->connection->writeToCache($cachekey, $ldap_users);
241
+        return $ldap_users;
242
+    }
243
+
244
+    /**
245
+     * checks whether a user is still available on LDAP
246
+     *
247
+     * @param string|\OCA\User_LDAP\User\User $user either the ownCloud user
248
+     * name or an instance of that user
249
+     * @return bool
250
+     * @throws \Exception
251
+     * @throws \OC\ServerNotAvailableException
252
+     */
253
+    public function userExistsOnLDAP($user) {
254
+        if(is_string($user)) {
255
+            $user = $this->access->userManager->get($user);
256
+        }
257
+        if(is_null($user)) {
258
+            return false;
259
+        }
260
+
261
+        $dn = $user->getDN();
262
+        //check if user really still exists by reading its entry
263
+        if(!is_array($this->access->readAttribute($dn, '', $this->access->connection->ldapUserFilter))) {
264
+            $lcr = $this->access->connection->getConnectionResource();
265
+            if(is_null($lcr)) {
266
+                throw new \Exception('No LDAP Connection to server ' . $this->access->connection->ldapHost);
267
+            }
268
+
269
+            try {
270
+                $uuid = $this->access->getUserMapper()->getUUIDByDN($dn);
271
+                if(!$uuid) {
272
+                    return false;
273
+                }
274
+                $newDn = $this->access->getUserDnByUuid($uuid);
275
+                //check if renamed user is still valid by reapplying the ldap filter
276
+                if(!is_array($this->access->readAttribute($newDn, '', $this->access->connection->ldapUserFilter))) {
277
+                    return false;
278
+                }
279
+                $this->access->getUserMapper()->setDNbyUUID($newDn, $uuid);
280
+                return true;
281
+            } catch (\Exception $e) {
282
+                return false;
283
+            }
284
+        }
285
+
286
+        if($user instanceof OfflineUser) {
287
+            $user->unmark();
288
+        }
289
+
290
+        return true;
291
+    }
292
+
293
+    /**
294
+     * check if a user exists
295
+     * @param string $uid the username
296
+     * @return boolean
297
+     * @throws \Exception when connection could not be established
298
+     */
299
+    public function userExists($uid) {
300
+        $userExists = $this->access->connection->getFromCache('userExists'.$uid);
301
+        if(!is_null($userExists)) {
302
+            return (bool)$userExists;
303
+        }
304
+        //getting dn, if false the user does not exist. If dn, he may be mapped only, requires more checking.
305
+        $user = $this->access->userManager->get($uid);
306
+
307
+        if(is_null($user)) {
308
+            Util::writeLog('user_ldap', 'No DN found for '.$uid.' on '.
309
+                $this->access->connection->ldapHost, Util::DEBUG);
310
+            $this->access->connection->writeToCache('userExists'.$uid, false);
311
+            return false;
312
+        } else if($user instanceof OfflineUser) {
313
+            //express check for users marked as deleted. Returning true is
314
+            //necessary for cleanup
315
+            return true;
316
+        }
317
+
318
+        $result = $this->userExistsOnLDAP($user);
319
+        $this->access->connection->writeToCache('userExists'.$uid, $result);
320
+        if($result === true) {
321
+            $user->update();
322
+        }
323
+        return $result;
324
+    }
325
+
326
+    /**
327
+     * returns whether a user was deleted in LDAP
328
+     *
329
+     * @param string $uid The username of the user to delete
330
+     * @return bool
331
+     */
332
+    public function deleteUser($uid) {
333
+        $marked = $this->ocConfig->getUserValue($uid, 'user_ldap', 'isDeleted', 0);
334
+        if(intval($marked) === 0) {
335
+            \OC::$server->getLogger()->notice(
336
+                'User '.$uid . ' is not marked as deleted, not cleaning up.',
337
+                array('app' => 'user_ldap'));
338
+            return false;
339
+        }
340
+        \OC::$server->getLogger()->info('Cleaning up after user ' . $uid,
341
+            array('app' => 'user_ldap'));
342
+
343
+        //Get Home Directory out of user preferences so we can return it later,
344
+        //necessary for removing directories as done by OC_User.
345
+        $home = $this->ocConfig->getUserValue($uid, 'user_ldap', 'homePath', '');
346
+        $this->homesToKill[$uid] = $home;
347
+        $this->access->getUserMapper()->unmap($uid);
348
+
349
+        return true;
350
+    }
351
+
352
+    /**
353
+     * get the user's home directory
354
+     *
355
+     * @param string $uid the username
356
+     * @return bool|string
357
+     * @throws NoUserException
358
+     * @throws \Exception
359
+     */
360
+    public function getHome($uid) {
361
+        if(isset($this->homesToKill[$uid]) && !empty($this->homesToKill[$uid])) {
362
+            //a deleted user who needs some clean up
363
+            return $this->homesToKill[$uid];
364
+        }
365
+
366
+        // user Exists check required as it is not done in user proxy!
367
+        if(!$this->userExists($uid)) {
368
+            return false;
369
+        }
370
+
371
+        $cacheKey = 'getHome'.$uid;
372
+        $path = $this->access->connection->getFromCache($cacheKey);
373
+        if(!is_null($path)) {
374
+            return $path;
375
+        }
376
+
377
+        $user = $this->access->userManager->get($uid);
378
+        if(is_null($user) || ($user instanceof OfflineUser && !$this->userExistsOnLDAP($user->getOCName()))) {
379
+            throw new NoUserException($uid . ' is not a valid user anymore');
380
+        }
381
+        if($user instanceof OfflineUser) {
382
+            // apparently this user survived the userExistsOnLDAP check,
383
+            // we request the user instance again in order to retrieve a User
384
+            // instance instead
385
+            $user = $this->access->userManager->get($uid);
386
+        }
387
+        $path = $user->getHomePath();
388
+        $this->access->cacheUserHome($uid, $path);
389
+
390
+        return $path;
391
+    }
392
+
393
+    /**
394
+     * get display name of the user
395
+     * @param string $uid user ID of the user
396
+     * @return string|false display name
397
+     */
398
+    public function getDisplayName($uid) {
399
+        if(!$this->userExists($uid)) {
400
+            return false;
401
+        }
402
+
403
+        $cacheKey = 'getDisplayName'.$uid;
404
+        if(!is_null($displayName = $this->access->connection->getFromCache($cacheKey))) {
405
+            return $displayName;
406
+        }
407
+
408
+        //Check whether the display name is configured to have a 2nd feature
409
+        $additionalAttribute = $this->access->connection->ldapUserDisplayName2;
410
+        $displayName2 = '';
411
+        if ($additionalAttribute !== '') {
412
+            $displayName2 = $this->access->readAttribute(
413
+                $this->access->username2dn($uid),
414
+                $additionalAttribute);
415
+        }
416
+
417
+        $displayName = $this->access->readAttribute(
418
+            $this->access->username2dn($uid),
419
+            $this->access->connection->ldapUserDisplayName);
420
+
421
+        if($displayName && (count($displayName) > 0)) {
422
+            $displayName = $displayName[0];
423
+
424
+            if (is_array($displayName2)){
425
+                $displayName2 = count($displayName2) > 0 ? $displayName2[0] : '';
426
+            }
427
+
428
+            $user = $this->access->userManager->get($uid);
429
+            if ($user instanceof User) {
430
+                $displayName = $user->composeAndStoreDisplayName($displayName, $displayName2);
431
+                $this->access->connection->writeToCache($cacheKey, $displayName);
432
+            }
433
+            if ($user instanceof OfflineUser) {
434
+                /** @var OfflineUser $user*/
435
+                $displayName = $user->getDisplayName();
436
+            }
437
+            return $displayName;
438
+        }
439
+
440
+        return null;
441
+    }
442
+
443
+    /**
444
+     * Get a list of all display names
445
+     *
446
+     * @param string $search
447
+     * @param string|null $limit
448
+     * @param string|null $offset
449
+     * @return array an array of all displayNames (value) and the corresponding uids (key)
450
+     */
451
+    public function getDisplayNames($search = '', $limit = null, $offset = null) {
452
+        $cacheKey = 'getDisplayNames-'.$search.'-'.$limit.'-'.$offset;
453
+        if(!is_null($displayNames = $this->access->connection->getFromCache($cacheKey))) {
454
+            return $displayNames;
455
+        }
456
+
457
+        $displayNames = array();
458
+        $users = $this->getUsers($search, $limit, $offset);
459
+        foreach ($users as $user) {
460
+            $displayNames[$user] = $this->getDisplayName($user);
461
+        }
462
+        $this->access->connection->writeToCache($cacheKey, $displayNames);
463
+        return $displayNames;
464
+    }
465
+
466
+    /**
467
+     * Check if backend implements actions
468
+     * @param int $actions bitwise-or'ed actions
469
+     * @return boolean
470
+     *
471
+     * Returns the supported actions as int to be
472
+     * compared with OC_USER_BACKEND_CREATE_USER etc.
473
+     */
474
+    public function implementsActions($actions) {
475
+        return (bool)((Backend::CHECK_PASSWORD
476
+            | Backend::GET_HOME
477
+            | Backend::GET_DISPLAYNAME
478
+            | Backend::PROVIDE_AVATAR
479
+            | Backend::COUNT_USERS
480
+            | ((intval($this->access->connection->turnOnPasswordChange) === 1)?(Backend::SET_PASSWORD):0))
481
+            & $actions);
482
+    }
483
+
484
+    /**
485
+     * @return bool
486
+     */
487
+    public function hasUserListings() {
488
+        return true;
489
+    }
490
+
491
+    /**
492
+     * counts the users in LDAP
493
+     *
494
+     * @return int|bool
495
+     */
496
+    public function countUsers() {
497
+        $filter = $this->access->getFilterForUserCount();
498
+        $cacheKey = 'countUsers-'.$filter;
499
+        if(!is_null($entries = $this->access->connection->getFromCache($cacheKey))) {
500
+            return $entries;
501
+        }
502
+        $entries = $this->access->countUsers($filter);
503
+        $this->access->connection->writeToCache($cacheKey, $entries);
504
+        return $entries;
505
+    }
506
+
507
+    /**
508
+     * Backend name to be shown in user management
509
+     * @return string the name of the backend to be shown
510
+     */
511
+    public function getBackendName(){
512
+        return 'LDAP';
513
+    }
514 514
 	
515
-	/**
516
-	 * Return access for LDAP interaction.
517
-	 * @param string $uid
518
-	 * @return Access instance of Access for LDAP interaction
519
-	 */
520
-	public function getLDAPAccess($uid) {
521
-		return $this->access;
522
-	}
515
+    /**
516
+     * Return access for LDAP interaction.
517
+     * @param string $uid
518
+     * @return Access instance of Access for LDAP interaction
519
+     */
520
+    public function getLDAPAccess($uid) {
521
+        return $this->access;
522
+    }
523 523
 	
524
-	/**
525
-	 * Return LDAP connection resource from a cloned connection.
526
-	 * The cloned connection needs to be closed manually.
527
-	 * of the current access.
528
-	 * @param string $uid
529
-	 * @return resource of the LDAP connection
530
-	 */
531
-	public function getNewLDAPConnection($uid) {
532
-		$connection = clone $this->access->getConnection();
533
-		return $connection->getConnectionResource();
534
-	}
524
+    /**
525
+     * Return LDAP connection resource from a cloned connection.
526
+     * The cloned connection needs to be closed manually.
527
+     * of the current access.
528
+     * @param string $uid
529
+     * @return resource of the LDAP connection
530
+     */
531
+    public function getNewLDAPConnection($uid) {
532
+        $connection = clone $this->access->getConnection();
533
+        return $connection->getConnectionResource();
534
+    }
535 535
 }
Please login to merge, or discard this patch.
Spacing   +51 added lines, -51 removed lines patch added patch discarded remove patch
@@ -66,10 +66,10 @@  discard block
 block discarded – undo
66 66
 	 */
67 67
 	public function canChangeAvatar($uid) {
68 68
 		$user = $this->access->userManager->get($uid);
69
-		if(!$user instanceof User) {
69
+		if (!$user instanceof User) {
70 70
 			return false;
71 71
 		}
72
-		if($user->getAvatarImage() === false) {
72
+		if ($user->getAvatarImage() === false) {
73 73
 			return true;
74 74
 		}
75 75
 
@@ -85,14 +85,14 @@  discard block
 block discarded – undo
85 85
 	public function loginName2UserName($loginName) {
86 86
 		$cacheKey = 'loginName2UserName-'.$loginName;
87 87
 		$username = $this->access->connection->getFromCache($cacheKey);
88
-		if(!is_null($username)) {
88
+		if (!is_null($username)) {
89 89
 			return $username;
90 90
 		}
91 91
 
92 92
 		try {
93 93
 			$ldapRecord = $this->getLDAPUserByLoginName($loginName);
94 94
 			$user = $this->access->userManager->get($ldapRecord['dn'][0]);
95
-			if($user instanceof OfflineUser) {
95
+			if ($user instanceof OfflineUser) {
96 96
 				// this path is not really possible, however get() is documented
97 97
 				// to return User or OfflineUser so we are very defensive here.
98 98
 				$this->access->connection->writeToCache($cacheKey, false);
@@ -128,9 +128,9 @@  discard block
 block discarded – undo
128 128
 		//find out dn of the user name
129 129
 		$attrs = $this->access->userManager->getAttributes();
130 130
 		$users = $this->access->fetchUsersByLoginName($loginName, $attrs);
131
-		if(count($users) < 1) {
132
-			throw new NotOnLDAP('No user available for the given login name on ' .
133
-				$this->access->connection->ldapHost . ':' . $this->access->connection->ldapPort);
131
+		if (count($users) < 1) {
132
+			throw new NotOnLDAP('No user available for the given login name on '.
133
+				$this->access->connection->ldapHost.':'.$this->access->connection->ldapPort);
134 134
 		}
135 135
 		return $users[0];
136 136
 	}
@@ -145,8 +145,8 @@  discard block
 block discarded – undo
145 145
 	public function checkPassword($uid, $password) {
146 146
 		try {
147 147
 			$ldapRecord = $this->getLDAPUserByLoginName($uid);
148
-		} catch(NotOnLDAP $e) {
149
-			if($this->ocConfig->getSystemValue('loglevel', Util::WARN) === Util::DEBUG) {
148
+		} catch (NotOnLDAP $e) {
149
+			if ($this->ocConfig->getSystemValue('loglevel', Util::WARN) === Util::DEBUG) {
150 150
 				\OC::$server->getLogger()->logException($e, ['app' => 'user_ldap']);
151 151
 			}
152 152
 			return false;
@@ -154,16 +154,16 @@  discard block
 block discarded – undo
154 154
 		$dn = $ldapRecord['dn'][0];
155 155
 		$user = $this->access->userManager->get($dn);
156 156
 
157
-		if(!$user instanceof User) {
157
+		if (!$user instanceof User) {
158 158
 			Util::writeLog('user_ldap',
159
-				'LDAP Login: Could not get user object for DN ' . $dn .
159
+				'LDAP Login: Could not get user object for DN '.$dn.
160 160
 				'. Maybe the LDAP entry has no set display name attribute?',
161 161
 				Util::WARN);
162 162
 			return false;
163 163
 		}
164
-		if($user->getUsername() !== false) {
164
+		if ($user->getUsername() !== false) {
165 165
 			//are the credentials OK?
166
-			if(!$this->access->areCredentialsValid($dn, $password)) {
166
+			if (!$this->access->areCredentialsValid($dn, $password)) {
167 167
 				return false;
168 168
 			}
169 169
 
@@ -186,11 +186,11 @@  discard block
 block discarded – undo
186 186
 	public function setPassword($uid, $password) {
187 187
 		$user = $this->access->userManager->get($uid);
188 188
 
189
-		if(!$user instanceof User) {
190
-			throw new \Exception('LDAP setPassword: Could not get user object for uid ' . $uid .
189
+		if (!$user instanceof User) {
190
+			throw new \Exception('LDAP setPassword: Could not get user object for uid '.$uid.
191 191
 				'. Maybe the LDAP entry has no set display name attribute?');
192 192
 		}
193
-		if($user->getUsername() !== false) {
193
+		if ($user->getUsername() !== false) {
194 194
 			return $this->access->setPassword($user->getDN(), $password);
195 195
 		}
196 196
 
@@ -211,18 +211,18 @@  discard block
 block discarded – undo
211 211
 
212 212
 		//check if users are cached, if so return
213 213
 		$ldap_users = $this->access->connection->getFromCache($cachekey);
214
-		if(!is_null($ldap_users)) {
214
+		if (!is_null($ldap_users)) {
215 215
 			return $ldap_users;
216 216
 		}
217 217
 
218 218
 		// if we'd pass -1 to LDAP search, we'd end up in a Protocol
219 219
 		// error. With a limit of 0, we get 0 results. So we pass null.
220
-		if($limit <= 0) {
220
+		if ($limit <= 0) {
221 221
 			$limit = null;
222 222
 		}
223 223
 		$filter = $this->access->combineFilterWithAnd(array(
224 224
 			$this->access->connection->ldapUserFilter,
225
-			$this->access->connection->ldapUserDisplayName . '=*',
225
+			$this->access->connection->ldapUserDisplayName.'=*',
226 226
 			$this->access->getFilterPartForUserSearch($search)
227 227
 		));
228 228
 
@@ -235,7 +235,7 @@  discard block
 block discarded – undo
235 235
 			$this->access->userManager->getAttributes(true),
236 236
 			$limit, $offset);
237 237
 		$ldap_users = $this->access->ownCloudUserNames($ldap_users);
238
-		Util::writeLog('user_ldap', 'getUsers: '.count($ldap_users). ' Users found', Util::DEBUG);
238
+		Util::writeLog('user_ldap', 'getUsers: '.count($ldap_users).' Users found', Util::DEBUG);
239 239
 
240 240
 		$this->access->connection->writeToCache($cachekey, $ldap_users);
241 241
 		return $ldap_users;
@@ -251,29 +251,29 @@  discard block
 block discarded – undo
251 251
 	 * @throws \OC\ServerNotAvailableException
252 252
 	 */
253 253
 	public function userExistsOnLDAP($user) {
254
-		if(is_string($user)) {
254
+		if (is_string($user)) {
255 255
 			$user = $this->access->userManager->get($user);
256 256
 		}
257
-		if(is_null($user)) {
257
+		if (is_null($user)) {
258 258
 			return false;
259 259
 		}
260 260
 
261 261
 		$dn = $user->getDN();
262 262
 		//check if user really still exists by reading its entry
263
-		if(!is_array($this->access->readAttribute($dn, '', $this->access->connection->ldapUserFilter))) {
263
+		if (!is_array($this->access->readAttribute($dn, '', $this->access->connection->ldapUserFilter))) {
264 264
 			$lcr = $this->access->connection->getConnectionResource();
265
-			if(is_null($lcr)) {
266
-				throw new \Exception('No LDAP Connection to server ' . $this->access->connection->ldapHost);
265
+			if (is_null($lcr)) {
266
+				throw new \Exception('No LDAP Connection to server '.$this->access->connection->ldapHost);
267 267
 			}
268 268
 
269 269
 			try {
270 270
 				$uuid = $this->access->getUserMapper()->getUUIDByDN($dn);
271
-				if(!$uuid) {
271
+				if (!$uuid) {
272 272
 					return false;
273 273
 				}
274 274
 				$newDn = $this->access->getUserDnByUuid($uuid);
275 275
 				//check if renamed user is still valid by reapplying the ldap filter
276
-				if(!is_array($this->access->readAttribute($newDn, '', $this->access->connection->ldapUserFilter))) {
276
+				if (!is_array($this->access->readAttribute($newDn, '', $this->access->connection->ldapUserFilter))) {
277 277
 					return false;
278 278
 				}
279 279
 				$this->access->getUserMapper()->setDNbyUUID($newDn, $uuid);
@@ -283,7 +283,7 @@  discard block
 block discarded – undo
283 283
 			}
284 284
 		}
285 285
 
286
-		if($user instanceof OfflineUser) {
286
+		if ($user instanceof OfflineUser) {
287 287
 			$user->unmark();
288 288
 		}
289 289
 
@@ -298,18 +298,18 @@  discard block
 block discarded – undo
298 298
 	 */
299 299
 	public function userExists($uid) {
300 300
 		$userExists = $this->access->connection->getFromCache('userExists'.$uid);
301
-		if(!is_null($userExists)) {
302
-			return (bool)$userExists;
301
+		if (!is_null($userExists)) {
302
+			return (bool) $userExists;
303 303
 		}
304 304
 		//getting dn, if false the user does not exist. If dn, he may be mapped only, requires more checking.
305 305
 		$user = $this->access->userManager->get($uid);
306 306
 
307
-		if(is_null($user)) {
307
+		if (is_null($user)) {
308 308
 			Util::writeLog('user_ldap', 'No DN found for '.$uid.' on '.
309 309
 				$this->access->connection->ldapHost, Util::DEBUG);
310 310
 			$this->access->connection->writeToCache('userExists'.$uid, false);
311 311
 			return false;
312
-		} else if($user instanceof OfflineUser) {
312
+		} else if ($user instanceof OfflineUser) {
313 313
 			//express check for users marked as deleted. Returning true is
314 314
 			//necessary for cleanup
315 315
 			return true;
@@ -317,7 +317,7 @@  discard block
 block discarded – undo
317 317
 
318 318
 		$result = $this->userExistsOnLDAP($user);
319 319
 		$this->access->connection->writeToCache('userExists'.$uid, $result);
320
-		if($result === true) {
320
+		if ($result === true) {
321 321
 			$user->update();
322 322
 		}
323 323
 		return $result;
@@ -331,13 +331,13 @@  discard block
 block discarded – undo
331 331
 	*/
332 332
 	public function deleteUser($uid) {
333 333
 		$marked = $this->ocConfig->getUserValue($uid, 'user_ldap', 'isDeleted', 0);
334
-		if(intval($marked) === 0) {
334
+		if (intval($marked) === 0) {
335 335
 			\OC::$server->getLogger()->notice(
336
-				'User '.$uid . ' is not marked as deleted, not cleaning up.',
336
+				'User '.$uid.' is not marked as deleted, not cleaning up.',
337 337
 				array('app' => 'user_ldap'));
338 338
 			return false;
339 339
 		}
340
-		\OC::$server->getLogger()->info('Cleaning up after user ' . $uid,
340
+		\OC::$server->getLogger()->info('Cleaning up after user '.$uid,
341 341
 			array('app' => 'user_ldap'));
342 342
 
343 343
 		//Get Home Directory out of user preferences so we can return it later,
@@ -358,27 +358,27 @@  discard block
 block discarded – undo
358 358
 	 * @throws \Exception
359 359
 	 */
360 360
 	public function getHome($uid) {
361
-		if(isset($this->homesToKill[$uid]) && !empty($this->homesToKill[$uid])) {
361
+		if (isset($this->homesToKill[$uid]) && !empty($this->homesToKill[$uid])) {
362 362
 			//a deleted user who needs some clean up
363 363
 			return $this->homesToKill[$uid];
364 364
 		}
365 365
 
366 366
 		// user Exists check required as it is not done in user proxy!
367
-		if(!$this->userExists($uid)) {
367
+		if (!$this->userExists($uid)) {
368 368
 			return false;
369 369
 		}
370 370
 
371 371
 		$cacheKey = 'getHome'.$uid;
372 372
 		$path = $this->access->connection->getFromCache($cacheKey);
373
-		if(!is_null($path)) {
373
+		if (!is_null($path)) {
374 374
 			return $path;
375 375
 		}
376 376
 
377 377
 		$user = $this->access->userManager->get($uid);
378
-		if(is_null($user) || ($user instanceof OfflineUser && !$this->userExistsOnLDAP($user->getOCName()))) {
379
-			throw new NoUserException($uid . ' is not a valid user anymore');
378
+		if (is_null($user) || ($user instanceof OfflineUser && !$this->userExistsOnLDAP($user->getOCName()))) {
379
+			throw new NoUserException($uid.' is not a valid user anymore');
380 380
 		}
381
-		if($user instanceof OfflineUser) {
381
+		if ($user instanceof OfflineUser) {
382 382
 			// apparently this user survived the userExistsOnLDAP check,
383 383
 			// we request the user instance again in order to retrieve a User
384 384
 			// instance instead
@@ -396,12 +396,12 @@  discard block
 block discarded – undo
396 396
 	 * @return string|false display name
397 397
 	 */
398 398
 	public function getDisplayName($uid) {
399
-		if(!$this->userExists($uid)) {
399
+		if (!$this->userExists($uid)) {
400 400
 			return false;
401 401
 		}
402 402
 
403 403
 		$cacheKey = 'getDisplayName'.$uid;
404
-		if(!is_null($displayName = $this->access->connection->getFromCache($cacheKey))) {
404
+		if (!is_null($displayName = $this->access->connection->getFromCache($cacheKey))) {
405 405
 			return $displayName;
406 406
 		}
407 407
 
@@ -418,10 +418,10 @@  discard block
 block discarded – undo
418 418
 			$this->access->username2dn($uid),
419 419
 			$this->access->connection->ldapUserDisplayName);
420 420
 
421
-		if($displayName && (count($displayName) > 0)) {
421
+		if ($displayName && (count($displayName) > 0)) {
422 422
 			$displayName = $displayName[0];
423 423
 
424
-			if (is_array($displayName2)){
424
+			if (is_array($displayName2)) {
425 425
 				$displayName2 = count($displayName2) > 0 ? $displayName2[0] : '';
426 426
 			}
427 427
 
@@ -450,7 +450,7 @@  discard block
 block discarded – undo
450 450
 	 */
451 451
 	public function getDisplayNames($search = '', $limit = null, $offset = null) {
452 452
 		$cacheKey = 'getDisplayNames-'.$search.'-'.$limit.'-'.$offset;
453
-		if(!is_null($displayNames = $this->access->connection->getFromCache($cacheKey))) {
453
+		if (!is_null($displayNames = $this->access->connection->getFromCache($cacheKey))) {
454 454
 			return $displayNames;
455 455
 		}
456 456
 
@@ -472,12 +472,12 @@  discard block
 block discarded – undo
472 472
 	* compared with OC_USER_BACKEND_CREATE_USER etc.
473 473
 	*/
474 474
 	public function implementsActions($actions) {
475
-		return (bool)((Backend::CHECK_PASSWORD
475
+		return (bool) ((Backend::CHECK_PASSWORD
476 476
 			| Backend::GET_HOME
477 477
 			| Backend::GET_DISPLAYNAME
478 478
 			| Backend::PROVIDE_AVATAR
479 479
 			| Backend::COUNT_USERS
480
-			| ((intval($this->access->connection->turnOnPasswordChange) === 1)?(Backend::SET_PASSWORD):0))
480
+			| ((intval($this->access->connection->turnOnPasswordChange) === 1) ? (Backend::SET_PASSWORD) : 0))
481 481
 			& $actions);
482 482
 	}
483 483
 
@@ -496,7 +496,7 @@  discard block
 block discarded – undo
496 496
 	public function countUsers() {
497 497
 		$filter = $this->access->getFilterForUserCount();
498 498
 		$cacheKey = 'countUsers-'.$filter;
499
-		if(!is_null($entries = $this->access->connection->getFromCache($cacheKey))) {
499
+		if (!is_null($entries = $this->access->connection->getFromCache($cacheKey))) {
500 500
 			return $entries;
501 501
 		}
502 502
 		$entries = $this->access->countUsers($filter);
@@ -508,7 +508,7 @@  discard block
 block discarded – undo
508 508
 	 * Backend name to be shown in user management
509 509
 	 * @return string the name of the backend to be shown
510 510
 	 */
511
-	public function getBackendName(){
511
+	public function getBackendName() {
512 512
 		return 'LDAP';
513 513
 	}
514 514
 	
Please login to merge, or discard this patch.
apps/user_ldap/lib/LogWrapper.php 1 patch
Indentation   +8 added lines, -8 removed lines patch added patch discarded remove patch
@@ -28,13 +28,13 @@
 block discarded – undo
28 28
  * @brief wraps around static ownCloud core methods
29 29
  */
30 30
 class LogWrapper {
31
-	protected $app = 'user_ldap';
31
+    protected $app = 'user_ldap';
32 32
 
33
-	/**
34
-	 * @brief states whether the filesystem was loaded
35
-	 * @return bool
36
-	 */
37
-	public function log($msg, $level) {
38
-		\OCP\Util::writeLog($this->app, $msg, $level);
39
-	}
33
+    /**
34
+     * @brief states whether the filesystem was loaded
35
+     * @return bool
36
+     */
37
+    public function log($msg, $level) {
38
+        \OCP\Util::writeLog($this->app, $msg, $level);
39
+    }
40 40
 }
Please login to merge, or discard this patch.
apps/user_ldap/lib/LDAPProviderFactory.php 1 patch
Indentation   +26 added lines, -26 removed lines patch added patch discarded remove patch
@@ -28,32 +28,32 @@
 block discarded – undo
28 28
 use OCA\User_LDAP\Mapping\UserMapping;
29 29
 
30 30
 class LDAPProviderFactory implements ILDAPProviderFactory {
31
-	/**
32
-	 * Server container
33
-	 *
34
-	 * @var IServerContainer
35
-	 */
36
-	private $serverContainer;
31
+    /**
32
+     * Server container
33
+     *
34
+     * @var IServerContainer
35
+     */
36
+    private $serverContainer;
37 37
 	
38
-	/**
39
-	 * Constructor for the LDAP provider factory
40
-	 *
41
-	 * @param IServerContainer $serverContainer server container
42
-	 */
43
-	public function __construct(IServerContainer $serverContainer) {
44
-		$this->serverContainer = $serverContainer;
45
-	}
38
+    /**
39
+     * Constructor for the LDAP provider factory
40
+     *
41
+     * @param IServerContainer $serverContainer server container
42
+     */
43
+    public function __construct(IServerContainer $serverContainer) {
44
+        $this->serverContainer = $serverContainer;
45
+    }
46 46
 	
47
-	/**
48
-	 * creates and returns an instance of the ILDAPProvider
49
-	 *
50
-	 * @return OCP\LDAP\ILDAPProvider
51
-	 */
52
-	public function getLDAPProvider() {
53
-		$dbConnection = $this->serverContainer->getDatabaseConnection();
54
-		$userMapping = new UserMapping($dbConnection);
55
-		return new LDAPProvider($this->serverContainer, new Helper($this->serverContainer->getConfig()),
56
-					new DeletedUsersIndex($this->serverContainer->getConfig(), 
57
-					$dbConnection, $userMapping));
58
-	}
47
+    /**
48
+     * creates and returns an instance of the ILDAPProvider
49
+     *
50
+     * @return OCP\LDAP\ILDAPProvider
51
+     */
52
+    public function getLDAPProvider() {
53
+        $dbConnection = $this->serverContainer->getDatabaseConnection();
54
+        $userMapping = new UserMapping($dbConnection);
55
+        return new LDAPProvider($this->serverContainer, new Helper($this->serverContainer->getConfig()),
56
+                    new DeletedUsersIndex($this->serverContainer->getConfig(), 
57
+                    $dbConnection, $userMapping));
58
+    }
59 59
 }
Please login to merge, or discard this patch.
apps/user_ldap/lib/ILDAPWrapper.php 1 patch
Indentation   +186 added lines, -186 removed lines patch added patch discarded remove patch
@@ -29,192 +29,192 @@
 block discarded – undo
29 29
 
30 30
 interface ILDAPWrapper {
31 31
 
32
-	//LDAP functions in use
33
-
34
-	/**
35
-	 * Bind to LDAP directory
36
-	 * @param resource $link LDAP link resource
37
-	 * @param string $dn an RDN to log in with
38
-	 * @param string $password the password
39
-	 * @return bool true on success, false otherwise
40
-	 *
41
-	 * with $dn and $password as null a anonymous bind is attempted.
42
-	 */
43
-	public function bind($link, $dn, $password);
44
-
45
-	/**
46
-	 * connect to an LDAP server
47
-	 * @param string $host The host to connect to
48
-	 * @param string $port The port to connect to
49
-	 * @return mixed a link resource on success, otherwise false
50
-	 */
51
-	public function connect($host, $port);
52
-
53
-	/**
54
-	 * Send LDAP pagination control
55
-	 * @param resource $link LDAP link resource
56
-	 * @param int $pageSize number of results per page
57
-	 * @param bool $isCritical Indicates whether the pagination is critical of not.
58
-	 * @param string $cookie structure sent by LDAP server
59
-	 * @return bool true on success, false otherwise
60
-	 */
61
-	public function controlPagedResult($link, $pageSize, $isCritical, $cookie);
62
-
63
-	/**
64
-	 * Retrieve the LDAP pagination cookie
65
-	 * @param resource $link LDAP link resource
66
-	 * @param resource $result LDAP result resource
67
-	 * @param string $cookie structure sent by LDAP server
68
-	 * @return bool true on success, false otherwise
69
-	 *
70
-	 * Corresponds to ldap_control_paged_result_response
71
-	 */
72
-	public function controlPagedResultResponse($link, $result, &$cookie);
73
-
74
-	/**
75
-	 * Count the number of entries in a search
76
-	 * @param resource $link LDAP link resource
77
-	 * @param resource $result LDAP result resource
78
-	 * @return int|false number of results on success, false otherwise
79
-	 */
80
-	public function countEntries($link, $result);
81
-
82
-	/**
83
-	 * Return the LDAP error number of the last LDAP command
84
-	 * @param resource $link LDAP link resource
85
-	 * @return string error message as string
86
-	 */
87
-	public function errno($link);
88
-
89
-	/**
90
-	 * Return the LDAP error message of the last LDAP command
91
-	 * @param resource $link LDAP link resource
92
-	 * @return int error code as integer
93
-	 */
94
-	public function error($link);
95
-
96
-	/**
97
-	 * Splits DN into its component parts
98
-	 * @param string $dn
99
-	 * @param int @withAttrib
100
-	 * @return array|false
101
-	 * @link http://www.php.net/manual/en/function.ldap-explode-dn.php
102
-	 */
103
-	public function explodeDN($dn, $withAttrib);
104
-
105
-	/**
106
-	 * Return first result id
107
-	 * @param resource $link LDAP link resource
108
-	 * @param resource $result LDAP result resource
109
-	 * @return Resource an LDAP search result resource
110
-	 * */
111
-	public function firstEntry($link, $result);
112
-
113
-	/**
114
-	 * Get attributes from a search result entry
115
-	 * @param resource $link LDAP link resource
116
-	 * @param resource $result LDAP result resource
117
-	 * @return array containing the results, false on error
118
-	 * */
119
-	public function getAttributes($link, $result);
120
-
121
-	/**
122
-	 * Get the DN of a result entry
123
-	 * @param resource $link LDAP link resource
124
-	 * @param resource $result LDAP result resource
125
-	 * @return string containing the DN, false on error
126
-	 */
127
-	public function getDN($link, $result);
128
-
129
-	/**
130
-	 * Get all result entries
131
-	 * @param resource $link LDAP link resource
132
-	 * @param resource $result LDAP result resource
133
-	 * @return array containing the results, false on error
134
-	 */
135
-	public function getEntries($link, $result);
136
-
137
-	/**
138
-	 * Return next result id
139
-	 * @param resource $link LDAP link resource
140
-	 * @param resource $result LDAP entry result resource
141
-	 * @return resource an LDAP search result resource
142
-	 * */
143
-	public function nextEntry($link, $result);
144
-
145
-	/**
146
-	 * Read an entry
147
-	 * @param resource $link LDAP link resource
148
-	 * @param array $baseDN The DN of the entry to read from
149
-	 * @param string $filter An LDAP filter
150
-	 * @param array $attr array of the attributes to read
151
-	 * @return resource an LDAP search result resource
152
-	 */
153
-	public function read($link, $baseDN, $filter, $attr);
154
-
155
-	/**
156
-	 * Search LDAP tree
157
-	 * @param resource $link LDAP link resource
158
-	 * @param string $baseDN The DN of the entry to read from
159
-	 * @param string $filter An LDAP filter
160
-	 * @param array $attr array of the attributes to read
161
-	 * @param int $attrsOnly optional, 1 if only attribute types shall be returned
162
-	 * @param int $limit optional, limits the result entries
163
-	 * @return resource|false an LDAP search result resource, false on error
164
-	 */
165
-	public function search($link, $baseDN, $filter, $attr, $attrsOnly = 0, $limit = 0);
32
+    //LDAP functions in use
33
+
34
+    /**
35
+     * Bind to LDAP directory
36
+     * @param resource $link LDAP link resource
37
+     * @param string $dn an RDN to log in with
38
+     * @param string $password the password
39
+     * @return bool true on success, false otherwise
40
+     *
41
+     * with $dn and $password as null a anonymous bind is attempted.
42
+     */
43
+    public function bind($link, $dn, $password);
44
+
45
+    /**
46
+     * connect to an LDAP server
47
+     * @param string $host The host to connect to
48
+     * @param string $port The port to connect to
49
+     * @return mixed a link resource on success, otherwise false
50
+     */
51
+    public function connect($host, $port);
52
+
53
+    /**
54
+     * Send LDAP pagination control
55
+     * @param resource $link LDAP link resource
56
+     * @param int $pageSize number of results per page
57
+     * @param bool $isCritical Indicates whether the pagination is critical of not.
58
+     * @param string $cookie structure sent by LDAP server
59
+     * @return bool true on success, false otherwise
60
+     */
61
+    public function controlPagedResult($link, $pageSize, $isCritical, $cookie);
62
+
63
+    /**
64
+     * Retrieve the LDAP pagination cookie
65
+     * @param resource $link LDAP link resource
66
+     * @param resource $result LDAP result resource
67
+     * @param string $cookie structure sent by LDAP server
68
+     * @return bool true on success, false otherwise
69
+     *
70
+     * Corresponds to ldap_control_paged_result_response
71
+     */
72
+    public function controlPagedResultResponse($link, $result, &$cookie);
73
+
74
+    /**
75
+     * Count the number of entries in a search
76
+     * @param resource $link LDAP link resource
77
+     * @param resource $result LDAP result resource
78
+     * @return int|false number of results on success, false otherwise
79
+     */
80
+    public function countEntries($link, $result);
81
+
82
+    /**
83
+     * Return the LDAP error number of the last LDAP command
84
+     * @param resource $link LDAP link resource
85
+     * @return string error message as string
86
+     */
87
+    public function errno($link);
88
+
89
+    /**
90
+     * Return the LDAP error message of the last LDAP command
91
+     * @param resource $link LDAP link resource
92
+     * @return int error code as integer
93
+     */
94
+    public function error($link);
95
+
96
+    /**
97
+     * Splits DN into its component parts
98
+     * @param string $dn
99
+     * @param int @withAttrib
100
+     * @return array|false
101
+     * @link http://www.php.net/manual/en/function.ldap-explode-dn.php
102
+     */
103
+    public function explodeDN($dn, $withAttrib);
104
+
105
+    /**
106
+     * Return first result id
107
+     * @param resource $link LDAP link resource
108
+     * @param resource $result LDAP result resource
109
+     * @return Resource an LDAP search result resource
110
+     * */
111
+    public function firstEntry($link, $result);
112
+
113
+    /**
114
+     * Get attributes from a search result entry
115
+     * @param resource $link LDAP link resource
116
+     * @param resource $result LDAP result resource
117
+     * @return array containing the results, false on error
118
+     * */
119
+    public function getAttributes($link, $result);
120
+
121
+    /**
122
+     * Get the DN of a result entry
123
+     * @param resource $link LDAP link resource
124
+     * @param resource $result LDAP result resource
125
+     * @return string containing the DN, false on error
126
+     */
127
+    public function getDN($link, $result);
128
+
129
+    /**
130
+     * Get all result entries
131
+     * @param resource $link LDAP link resource
132
+     * @param resource $result LDAP result resource
133
+     * @return array containing the results, false on error
134
+     */
135
+    public function getEntries($link, $result);
136
+
137
+    /**
138
+     * Return next result id
139
+     * @param resource $link LDAP link resource
140
+     * @param resource $result LDAP entry result resource
141
+     * @return resource an LDAP search result resource
142
+     * */
143
+    public function nextEntry($link, $result);
144
+
145
+    /**
146
+     * Read an entry
147
+     * @param resource $link LDAP link resource
148
+     * @param array $baseDN The DN of the entry to read from
149
+     * @param string $filter An LDAP filter
150
+     * @param array $attr array of the attributes to read
151
+     * @return resource an LDAP search result resource
152
+     */
153
+    public function read($link, $baseDN, $filter, $attr);
154
+
155
+    /**
156
+     * Search LDAP tree
157
+     * @param resource $link LDAP link resource
158
+     * @param string $baseDN The DN of the entry to read from
159
+     * @param string $filter An LDAP filter
160
+     * @param array $attr array of the attributes to read
161
+     * @param int $attrsOnly optional, 1 if only attribute types shall be returned
162
+     * @param int $limit optional, limits the result entries
163
+     * @return resource|false an LDAP search result resource, false on error
164
+     */
165
+    public function search($link, $baseDN, $filter, $attr, $attrsOnly = 0, $limit = 0);
166 166
 	
167
-	/**
168
-	 * Replace the value of a userPassword by $password
169
-	 * @param resource $link LDAP link resource
170
-	 * @param string $userDN the DN of the user whose password is to be replaced
171
-	 * @param string $password the new value for the userPassword
172
-	 * @return bool true on success, false otherwise
173
-	 */
174
-	public function modReplace($link, $userDN, $password);
175
-
176
-	/**
177
-	 * Sets the value of the specified option to be $value
178
-	 * @param resource $link LDAP link resource
179
-	 * @param string $option a defined LDAP Server option
180
-	 * @param int $value the new value for the option
181
-	 * @return bool true on success, false otherwise
182
-	 */
183
-	public function setOption($link, $option, $value);
184
-
185
-	/**
186
-	 * establish Start TLS
187
-	 * @param resource $link LDAP link resource
188
-	 * @return bool true on success, false otherwise
189
-	 */
190
-	public function startTls($link);
191
-
192
-	/**
193
-	 * Unbind from LDAP directory
194
-	 * @param resource $link LDAP link resource
195
-	 * @return bool true on success, false otherwise
196
-	 */
197
-	public function unbind($link);
198
-
199
-	//additional required methods in ownCloud
200
-
201
-	/**
202
-	 * Checks whether the server supports LDAP
203
-	 * @return bool true if it the case, false otherwise
204
-	 * */
205
-	public function areLDAPFunctionsAvailable();
206
-
207
-	/**
208
-	 * Checks whether PHP supports LDAP Paged Results
209
-	 * @return bool true if it the case, false otherwise
210
-	 * */
211
-	public function hasPagedResultSupport();
212
-
213
-	/**
214
-	 * Checks whether the submitted parameter is a resource
215
-	 * @param resource $resource the resource variable to check
216
-	 * @return bool true if it is a resource, false otherwise
217
-	 */
218
-	public function isResource($resource);
167
+    /**
168
+     * Replace the value of a userPassword by $password
169
+     * @param resource $link LDAP link resource
170
+     * @param string $userDN the DN of the user whose password is to be replaced
171
+     * @param string $password the new value for the userPassword
172
+     * @return bool true on success, false otherwise
173
+     */
174
+    public function modReplace($link, $userDN, $password);
175
+
176
+    /**
177
+     * Sets the value of the specified option to be $value
178
+     * @param resource $link LDAP link resource
179
+     * @param string $option a defined LDAP Server option
180
+     * @param int $value the new value for the option
181
+     * @return bool true on success, false otherwise
182
+     */
183
+    public function setOption($link, $option, $value);
184
+
185
+    /**
186
+     * establish Start TLS
187
+     * @param resource $link LDAP link resource
188
+     * @return bool true on success, false otherwise
189
+     */
190
+    public function startTls($link);
191
+
192
+    /**
193
+     * Unbind from LDAP directory
194
+     * @param resource $link LDAP link resource
195
+     * @return bool true on success, false otherwise
196
+     */
197
+    public function unbind($link);
198
+
199
+    //additional required methods in ownCloud
200
+
201
+    /**
202
+     * Checks whether the server supports LDAP
203
+     * @return bool true if it the case, false otherwise
204
+     * */
205
+    public function areLDAPFunctionsAvailable();
206
+
207
+    /**
208
+     * Checks whether PHP supports LDAP Paged Results
209
+     * @return bool true if it the case, false otherwise
210
+     * */
211
+    public function hasPagedResultSupport();
212
+
213
+    /**
214
+     * Checks whether the submitted parameter is a resource
215
+     * @param resource $resource the resource variable to check
216
+     * @return bool true if it is a resource, false otherwise
217
+     */
218
+    public function isResource($resource);
219 219
 
220 220
 }
Please login to merge, or discard this patch.
apps/user_ldap/appinfo/routes.php 2 patches
Indentation   +13 added lines, -13 removed lines patch added patch discarded remove patch
@@ -23,26 +23,26 @@
 block discarded – undo
23 23
 
24 24
 /** @var $this \OCP\Route\IRouter */
25 25
 $this->create('user_ldap_ajax_clearMappings', 'ajax/clearMappings.php')
26
-	->actionInclude('user_ldap/ajax/clearMappings.php');
26
+    ->actionInclude('user_ldap/ajax/clearMappings.php');
27 27
 $this->create('user_ldap_ajax_deleteConfiguration', 'ajax/deleteConfiguration.php')
28
-	->actionInclude('user_ldap/ajax/deleteConfiguration.php');
28
+    ->actionInclude('user_ldap/ajax/deleteConfiguration.php');
29 29
 $this->create('user_ldap_ajax_getConfiguration', 'ajax/getConfiguration.php')
30
-	->actionInclude('user_ldap/ajax/getConfiguration.php');
30
+    ->actionInclude('user_ldap/ajax/getConfiguration.php');
31 31
 $this->create('user_ldap_ajax_getNewServerConfigPrefix', 'ajax/getNewServerConfigPrefix.php')
32
-	->actionInclude('user_ldap/ajax/getNewServerConfigPrefix.php');
32
+    ->actionInclude('user_ldap/ajax/getNewServerConfigPrefix.php');
33 33
 $this->create('user_ldap_ajax_setConfiguration', 'ajax/setConfiguration.php')
34
-	->actionInclude('user_ldap/ajax/setConfiguration.php');
34
+    ->actionInclude('user_ldap/ajax/setConfiguration.php');
35 35
 $this->create('user_ldap_ajax_testConfiguration', 'ajax/testConfiguration.php')
36
-	->actionInclude('user_ldap/ajax/testConfiguration.php');
36
+    ->actionInclude('user_ldap/ajax/testConfiguration.php');
37 37
 $this->create('user_ldap_ajax_wizard', 'ajax/wizard.php')
38
-	->actionInclude('user_ldap/ajax/wizard.php');
38
+    ->actionInclude('user_ldap/ajax/wizard.php');
39 39
 
40 40
 $application = new \OCP\AppFramework\App('user_ldap');
41 41
 $application->registerRoutes($this, [
42
-	'ocs' => [
43
-		['name' => 'ConfigAPI#create', 'url' => '/api/v1/config', 'verb' => 'POST'],
44
-		['name' => 'ConfigAPI#show',   'url' => '/api/v1/config/{configID}', 'verb' => 'GET'],
45
-		['name' => 'ConfigAPI#modify', 'url' => '/api/v1/config/{configID}', 'verb' => 'PUT'],
46
-		['name' => 'ConfigAPI#delete', 'url' => '/api/v1/config/{configID}', 'verb' => 'DELETE'],
47
-	]
42
+    'ocs' => [
43
+        ['name' => 'ConfigAPI#create', 'url' => '/api/v1/config', 'verb' => 'POST'],
44
+        ['name' => 'ConfigAPI#show',   'url' => '/api/v1/config/{configID}', 'verb' => 'GET'],
45
+        ['name' => 'ConfigAPI#modify', 'url' => '/api/v1/config/{configID}', 'verb' => 'PUT'],
46
+        ['name' => 'ConfigAPI#delete', 'url' => '/api/v1/config/{configID}', 'verb' => 'DELETE'],
47
+    ]
48 48
 ]);
Please login to merge, or discard this patch.
Spacing   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -41,7 +41,7 @@
 block discarded – undo
41 41
 $application->registerRoutes($this, [
42 42
 	'ocs' => [
43 43
 		['name' => 'ConfigAPI#create', 'url' => '/api/v1/config', 'verb' => 'POST'],
44
-		['name' => 'ConfigAPI#show',   'url' => '/api/v1/config/{configID}', 'verb' => 'GET'],
44
+		['name' => 'ConfigAPI#show', 'url' => '/api/v1/config/{configID}', 'verb' => 'GET'],
45 45
 		['name' => 'ConfigAPI#modify', 'url' => '/api/v1/config/{configID}', 'verb' => 'PUT'],
46 46
 		['name' => 'ConfigAPI#delete', 'url' => '/api/v1/config/{configID}', 'verb' => 'DELETE'],
47 47
 	]
Please login to merge, or discard this patch.
apps/user_ldap/appinfo/register_command.php 1 patch
Indentation   +6 added lines, -6 removed lines patch added patch discarded remove patch
@@ -33,12 +33,12 @@  discard block
 block discarded – undo
33 33
 $helper = new Helper(\OC::$server->getConfig());
34 34
 $ocConfig = \OC::$server->getConfig();
35 35
 $uBackend = new User_Proxy(
36
-	$helper->getServerConfigurationPrefixes(true),
37
-	new LDAP(),
38
-	$ocConfig
36
+    $helper->getServerConfigurationPrefixes(true),
37
+    new LDAP(),
38
+    $ocConfig
39 39
 );
40 40
 $deletedUsersIndex = new DeletedUsersIndex(
41
-	$ocConfig, $dbConnection, $userMapping
41
+    $ocConfig, $dbConnection, $userMapping
42 42
 );
43 43
 
44 44
 $application->add(new OCA\User_LDAP\Command\ShowConfig($helper));
@@ -48,8 +48,8 @@  discard block
 block discarded – undo
48 48
 $application->add(new OCA\User_LDAP\Command\DeleteConfig($helper));
49 49
 $application->add(new OCA\User_LDAP\Command\Search($ocConfig));
50 50
 $application->add(new OCA\User_LDAP\Command\ShowRemnants(
51
-	$deletedUsersIndex, \OC::$server->getDateTimeFormatter())
51
+    $deletedUsersIndex, \OC::$server->getDateTimeFormatter())
52 52
 );
53 53
 $application->add(new OCA\User_LDAP\Command\CheckUser(
54
-	$uBackend, $helper, $deletedUsersIndex, $userMapping)
54
+    $uBackend, $helper, $deletedUsersIndex, $userMapping)
55 55
 );
Please login to merge, or discard this patch.
apps/user_ldap/appinfo/install.php 2 patches
Indentation   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -23,7 +23,7 @@
 block discarded – undo
23 23
  */
24 24
 $state = OCP\Config::getSystemValue('ldapIgnoreNamingRules', 'doSet');
25 25
 if($state === 'doSet') {
26
-	OCP\Config::setSystemValue('ldapIgnoreNamingRules', false);
26
+    OCP\Config::setSystemValue('ldapIgnoreNamingRules', false);
27 27
 }
28 28
 
29 29
 $helper = new \OCA\User_LDAP\Helper(\OC::$server->getConfig());
Please login to merge, or discard this patch.
Spacing   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -22,7 +22,7 @@
 block discarded – undo
22 22
  *
23 23
  */
24 24
 $state = OCP\Config::getSystemValue('ldapIgnoreNamingRules', 'doSet');
25
-if($state === 'doSet') {
25
+if ($state === 'doSet') {
26 26
 	OCP\Config::setSystemValue('ldapIgnoreNamingRules', false);
27 27
 }
28 28
 
Please login to merge, or discard this patch.
apps/user_ldap/appinfo/app.php 2 patches
Indentation   +29 added lines, -29 removed lines patch added patch discarded remove patch
@@ -32,44 +32,44 @@
 block discarded – undo
32 32
 $ldapWrapper = new OCA\User_LDAP\LDAP();
33 33
 $ocConfig = \OC::$server->getConfig();
34 34
 if(count($configPrefixes) === 1) {
35
-	$dbc = \OC::$server->getDatabaseConnection();
36
-	$userManager = new OCA\User_LDAP\User\Manager($ocConfig,
37
-		new OCA\User_LDAP\FilesystemHelper(),
38
-		new OCA\User_LDAP\LogWrapper(),
39
-		\OC::$server->getAvatarManager(),
40
-		new \OCP\Image(),
41
-		$dbc,
42
-		\OC::$server->getUserManager()
43
-	);
44
-	$connector = new OCA\User_LDAP\Connection($ldapWrapper, $configPrefixes[0]);
45
-	$ldapAccess = new OCA\User_LDAP\Access($connector, $ldapWrapper, $userManager, $helper);
35
+    $dbc = \OC::$server->getDatabaseConnection();
36
+    $userManager = new OCA\User_LDAP\User\Manager($ocConfig,
37
+        new OCA\User_LDAP\FilesystemHelper(),
38
+        new OCA\User_LDAP\LogWrapper(),
39
+        \OC::$server->getAvatarManager(),
40
+        new \OCP\Image(),
41
+        $dbc,
42
+        \OC::$server->getUserManager()
43
+    );
44
+    $connector = new OCA\User_LDAP\Connection($ldapWrapper, $configPrefixes[0]);
45
+    $ldapAccess = new OCA\User_LDAP\Access($connector, $ldapWrapper, $userManager, $helper);
46 46
 
47
-	$ldapAccess->setUserMapper(new OCA\User_LDAP\Mapping\UserMapping($dbc));
48
-	$ldapAccess->setGroupMapper(new OCA\User_LDAP\Mapping\GroupMapping($dbc));
49
-	$userBackend  = new OCA\User_LDAP\User_LDAP($ldapAccess, $ocConfig);
50
-	$groupBackend = new \OCA\User_LDAP\Group_LDAP($ldapAccess);
47
+    $ldapAccess->setUserMapper(new OCA\User_LDAP\Mapping\UserMapping($dbc));
48
+    $ldapAccess->setGroupMapper(new OCA\User_LDAP\Mapping\GroupMapping($dbc));
49
+    $userBackend  = new OCA\User_LDAP\User_LDAP($ldapAccess, $ocConfig);
50
+    $groupBackend = new \OCA\User_LDAP\Group_LDAP($ldapAccess);
51 51
 } else if(count($configPrefixes) > 1) {
52
-	$userBackend  = new OCA\User_LDAP\User_Proxy(
53
-		$configPrefixes, $ldapWrapper, $ocConfig
54
-	);
55
-	$groupBackend  = new OCA\User_LDAP\Group_Proxy($configPrefixes, $ldapWrapper);
52
+    $userBackend  = new OCA\User_LDAP\User_Proxy(
53
+        $configPrefixes, $ldapWrapper, $ocConfig
54
+    );
55
+    $groupBackend  = new OCA\User_LDAP\Group_Proxy($configPrefixes, $ldapWrapper);
56 56
 }
57 57
 
58 58
 if(count($configPrefixes) > 0) {
59
-	// register user backend
60
-	OC_User::useBackend($userBackend);
61
-	OC_Group::useBackend($groupBackend);
59
+    // register user backend
60
+    OC_User::useBackend($userBackend);
61
+    OC_Group::useBackend($groupBackend);
62 62
 }
63 63
 
64 64
 \OCP\Util::connectHook(
65
-	'\OCA\Files_Sharing\API\Server2Server',
66
-	'preLoginNameUsedAsUserName',
67
-	'\OCA\User_LDAP\Helper',
68
-	'loginName2UserName'
65
+    '\OCA\Files_Sharing\API\Server2Server',
66
+    'preLoginNameUsedAsUserName',
67
+    '\OCA\User_LDAP\Helper',
68
+    'loginName2UserName'
69 69
 );
70 70
 
71 71
 if(OCP\App::isEnabled('user_webdavauth')) {
72
-	OCP\Util::writeLog('user_ldap',
73
-		'user_ldap and user_webdavauth are incompatible. You may experience unexpected behaviour',
74
-		OCP\Util::WARN);
72
+    OCP\Util::writeLog('user_ldap',
73
+        'user_ldap and user_webdavauth are incompatible. You may experience unexpected behaviour',
74
+        OCP\Util::WARN);
75 75
 }
Please login to merge, or discard this patch.
Spacing   +5 added lines, -5 removed lines patch added patch discarded remove patch
@@ -31,7 +31,7 @@  discard block
 block discarded – undo
31 31
 $configPrefixes = $helper->getServerConfigurationPrefixes(true);
32 32
 $ldapWrapper = new OCA\User_LDAP\LDAP();
33 33
 $ocConfig = \OC::$server->getConfig();
34
-if(count($configPrefixes) === 1) {
34
+if (count($configPrefixes) === 1) {
35 35
 	$dbc = \OC::$server->getDatabaseConnection();
36 36
 	$userManager = new OCA\User_LDAP\User\Manager($ocConfig,
37 37
 		new OCA\User_LDAP\FilesystemHelper(),
@@ -48,14 +48,14 @@  discard block
 block discarded – undo
48 48
 	$ldapAccess->setGroupMapper(new OCA\User_LDAP\Mapping\GroupMapping($dbc));
49 49
 	$userBackend  = new OCA\User_LDAP\User_LDAP($ldapAccess, $ocConfig);
50 50
 	$groupBackend = new \OCA\User_LDAP\Group_LDAP($ldapAccess);
51
-} else if(count($configPrefixes) > 1) {
51
+} else if (count($configPrefixes) > 1) {
52 52
 	$userBackend  = new OCA\User_LDAP\User_Proxy(
53 53
 		$configPrefixes, $ldapWrapper, $ocConfig
54 54
 	);
55
-	$groupBackend  = new OCA\User_LDAP\Group_Proxy($configPrefixes, $ldapWrapper);
55
+	$groupBackend = new OCA\User_LDAP\Group_Proxy($configPrefixes, $ldapWrapper);
56 56
 }
57 57
 
58
-if(count($configPrefixes) > 0) {
58
+if (count($configPrefixes) > 0) {
59 59
 	// register user backend
60 60
 	OC_User::useBackend($userBackend);
61 61
 	OC_Group::useBackend($groupBackend);
@@ -68,7 +68,7 @@  discard block
 block discarded – undo
68 68
 	'loginName2UserName'
69 69
 );
70 70
 
71
-if(OCP\App::isEnabled('user_webdavauth')) {
71
+if (OCP\App::isEnabled('user_webdavauth')) {
72 72
 	OCP\Util::writeLog('user_ldap',
73 73
 		'user_ldap and user_webdavauth are incompatible. You may experience unexpected behaviour',
74 74
 		OCP\Util::WARN);
Please login to merge, or discard this patch.
apps/files_external/templates/list.php 1 patch
Spacing   +2 added lines, -2 removed lines patch added patch discarded remove patch
@@ -7,7 +7,7 @@  discard block
 block discarded – undo
7 7
 <div id="emptycontent" class="hidden">
8 8
 	<div class="icon-external"></div>
9 9
 	<h2><?php p($l->t('No external storage configured')); ?></h2>
10
-	<p><a href="<?php p(link_to('', 'index.php/settings/personal#files_external' )); ?>"><?php p($l->t('You can add external storages in the personal settings')); ?></a></p>
10
+	<p><a href="<?php p(link_to('', 'index.php/settings/personal#files_external')); ?>"><?php p($l->t('You can add external storages in the personal settings')); ?></a></p>
11 11
 </div>
12 12
 
13 13
 <input type="hidden" name="dir" value="" id="dir">
@@ -17,7 +17,7 @@  discard block
 block discarded – undo
17 17
 		<tr>
18 18
 			<th id='headerName' class="hidden column-name">
19 19
 				<div id="headerName-container">
20
-					<a class="name sort columntitle" data-sort="name"><span><?php p($l->t( 'Name' )); ?></span><span class="sort-indicator"></span></a>
20
+					<a class="name sort columntitle" data-sort="name"><span><?php p($l->t('Name')); ?></span><span class="sort-indicator"></span></a>
21 21
 				</div>
22 22
 			</th>
23 23
 			<th id="headerBackend" class="hidden column-backend">
Please login to merge, or discard this patch.