Passed
Push — master ( b794fa...797527 )
by Christoph
82:28 queued 66:03
created
apps/files_external/lib/Service/StoragesService.php 2 patches
Spacing   +12 added lines, -12 removed lines patch added patch discarded remove patch
@@ -72,17 +72,17 @@  discard block
 block discarded – undo
72 72
 	}
73 73
 
74 74
 	protected function getStorageConfigFromDBMount(array $mount) {
75
-		$applicableUsers = array_filter($mount['applicable'], function ($applicable) {
75
+		$applicableUsers = array_filter($mount['applicable'], function($applicable) {
76 76
 			return $applicable['type'] === DBConfigService::APPLICABLE_TYPE_USER;
77 77
 		});
78
-		$applicableUsers = array_map(function ($applicable) {
78
+		$applicableUsers = array_map(function($applicable) {
79 79
 			return $applicable['value'];
80 80
 		}, $applicableUsers);
81 81
 
82
-		$applicableGroups = array_filter($mount['applicable'], function ($applicable) {
82
+		$applicableGroups = array_filter($mount['applicable'], function($applicable) {
83 83
 			return $applicable['type'] === DBConfigService::APPLICABLE_TYPE_GROUP;
84 84
 		});
85
-		$applicableGroups = array_map(function ($applicable) {
85
+		$applicableGroups = array_map(function($applicable) {
86 86
 			return $applicable['value'];
87 87
 		}, $applicableGroups);
88 88
 
@@ -98,7 +98,7 @@  discard block
 block discarded – undo
98 98
 				$mount['priority']
99 99
 			);
100 100
 			$config->setType($mount['type']);
101
-			$config->setId((int)$mount['mount_id']);
101
+			$config->setId((int) $mount['mount_id']);
102 102
 			return $config;
103 103
 		} catch (\UnexpectedValueException $e) {
104 104
 			// don't die if a storage backend doesn't exist
@@ -126,11 +126,11 @@  discard block
 block discarded – undo
126 126
 	protected function readConfig() {
127 127
 		$mounts = $this->readDBConfig();
128 128
 		$configs = array_map([$this, 'getStorageConfigFromDBMount'], $mounts);
129
-		$configs = array_filter($configs, function ($config) {
129
+		$configs = array_filter($configs, function($config) {
130 130
 			return $config instanceof StorageConfig;
131 131
 		});
132 132
 
133
-		$keys = array_map(function (StorageConfig $config) {
133
+		$keys = array_map(function(StorageConfig $config) {
134 134
 			return $config->getId();
135 135
 		}, $configs);
136 136
 
@@ -149,14 +149,14 @@  discard block
 block discarded – undo
149 149
 		$mount = $this->dbConfig->getMountById($id);
150 150
 
151 151
 		if (!is_array($mount)) {
152
-			throw new NotFoundException('Storage with ID "' . $id . '" not found');
152
+			throw new NotFoundException('Storage with ID "'.$id.'" not found');
153 153
 		}
154 154
 
155 155
 		$config = $this->getStorageConfigFromDBMount($mount);
156 156
 		if ($this->isApplicable($config)) {
157 157
 			return $config;
158 158
 		} else {
159
-			throw new NotFoundException('Storage with ID "' . $id . '" not found');
159
+			throw new NotFoundException('Storage with ID "'.$id.'" not found');
160 160
 		}
161 161
 	}
162 162
 
@@ -379,13 +379,13 @@  discard block
 block discarded – undo
379 379
 		$existingMount = $this->dbConfig->getMountById($id);
380 380
 
381 381
 		if (!is_array($existingMount)) {
382
-			throw new NotFoundException('Storage with ID "' . $id . '" not found while updating storage');
382
+			throw new NotFoundException('Storage with ID "'.$id.'" not found while updating storage');
383 383
 		}
384 384
 
385 385
 		$oldStorage = $this->getStorageConfigFromDBMount($existingMount);
386 386
 
387 387
 		if ($oldStorage->getBackend() instanceof InvalidBackend) {
388
-			throw new NotFoundException('Storage with id "' . $id . '" cannot be edited due to missing backend');
388
+			throw new NotFoundException('Storage with id "'.$id.'" cannot be edited due to missing backend');
389 389
 		}
390 390
 
391 391
 		$removedUsers = array_diff($oldStorage->getApplicableUsers(), $updatedStorage->getApplicableUsers());
@@ -462,7 +462,7 @@  discard block
 block discarded – undo
462 462
 		$existingMount = $this->dbConfig->getMountById($id);
463 463
 
464 464
 		if (!is_array($existingMount)) {
465
-			throw new NotFoundException('Storage with ID "' . $id . '" not found');
465
+			throw new NotFoundException('Storage with ID "'.$id.'" not found');
466 466
 		}
467 467
 
468 468
 		$this->dbConfig->removeMount($id);
Please login to merge, or discard this patch.
Indentation   +491 added lines, -491 removed lines patch added patch discarded remove patch
@@ -48,495 +48,495 @@
 block discarded – undo
48 48
  */
49 49
 abstract class StoragesService {
50 50
 
51
-	/** @var BackendService */
52
-	protected $backendService;
53
-
54
-	/**
55
-	 * @var DBConfigService
56
-	 */
57
-	protected $dbConfig;
58
-
59
-	/**
60
-	 * @var IUserMountCache
61
-	 */
62
-	protected $userMountCache;
63
-
64
-	/**
65
-	 * @param BackendService $backendService
66
-	 * @param DBConfigService $dbConfigService
67
-	 * @param IUserMountCache $userMountCache
68
-	 */
69
-	public function __construct(BackendService $backendService, DBConfigService $dbConfigService, IUserMountCache $userMountCache) {
70
-		$this->backendService = $backendService;
71
-		$this->dbConfig = $dbConfigService;
72
-		$this->userMountCache = $userMountCache;
73
-	}
74
-
75
-	protected function readDBConfig() {
76
-		return $this->dbConfig->getAdminMounts();
77
-	}
78
-
79
-	protected function getStorageConfigFromDBMount(array $mount) {
80
-		$applicableUsers = array_filter($mount['applicable'], function ($applicable) {
81
-			return $applicable['type'] === DBConfigService::APPLICABLE_TYPE_USER;
82
-		});
83
-		$applicableUsers = array_map(function ($applicable) {
84
-			return $applicable['value'];
85
-		}, $applicableUsers);
86
-
87
-		$applicableGroups = array_filter($mount['applicable'], function ($applicable) {
88
-			return $applicable['type'] === DBConfigService::APPLICABLE_TYPE_GROUP;
89
-		});
90
-		$applicableGroups = array_map(function ($applicable) {
91
-			return $applicable['value'];
92
-		}, $applicableGroups);
93
-
94
-		try {
95
-			$config = $this->createStorage(
96
-				$mount['mount_point'],
97
-				$mount['storage_backend'],
98
-				$mount['auth_backend'],
99
-				$mount['config'],
100
-				$mount['options'],
101
-				array_values($applicableUsers),
102
-				array_values($applicableGroups),
103
-				$mount['priority']
104
-			);
105
-			$config->setType($mount['type']);
106
-			$config->setId((int)$mount['mount_id']);
107
-			return $config;
108
-		} catch (\UnexpectedValueException $e) {
109
-			// don't die if a storage backend doesn't exist
110
-			\OC::$server->getLogger()->logException($e, [
111
-				'message' => 'Could not load storage.',
112
-				'level' => ILogger::ERROR,
113
-				'app' => 'files_external',
114
-			]);
115
-			return null;
116
-		} catch (\InvalidArgumentException $e) {
117
-			\OC::$server->getLogger()->logException($e, [
118
-				'message' => 'Could not load storage.',
119
-				'level' => ILogger::ERROR,
120
-				'app' => 'files_external',
121
-			]);
122
-			return null;
123
-		}
124
-	}
125
-
126
-	/**
127
-	 * Read the external storages config
128
-	 *
129
-	 * @return array map of storage id to storage config
130
-	 */
131
-	protected function readConfig() {
132
-		$mounts = $this->readDBConfig();
133
-		$configs = array_map([$this, 'getStorageConfigFromDBMount'], $mounts);
134
-		$configs = array_filter($configs, function ($config) {
135
-			return $config instanceof StorageConfig;
136
-		});
137
-
138
-		$keys = array_map(function (StorageConfig $config) {
139
-			return $config->getId();
140
-		}, $configs);
141
-
142
-		return array_combine($keys, $configs);
143
-	}
144
-
145
-	/**
146
-	 * Get a storage with status
147
-	 *
148
-	 * @param int $id storage id
149
-	 *
150
-	 * @return StorageConfig
151
-	 * @throws NotFoundException if the storage with the given id was not found
152
-	 */
153
-	public function getStorage($id) {
154
-		$mount = $this->dbConfig->getMountById($id);
155
-
156
-		if (!is_array($mount)) {
157
-			throw new NotFoundException('Storage with ID "' . $id . '" not found');
158
-		}
159
-
160
-		$config = $this->getStorageConfigFromDBMount($mount);
161
-		if ($this->isApplicable($config)) {
162
-			return $config;
163
-		} else {
164
-			throw new NotFoundException('Storage with ID "' . $id . '" not found');
165
-		}
166
-	}
167
-
168
-	/**
169
-	 * Check whether this storage service should provide access to a storage
170
-	 *
171
-	 * @param StorageConfig $config
172
-	 * @return bool
173
-	 */
174
-	abstract protected function isApplicable(StorageConfig $config);
175
-
176
-	/**
177
-	 * Gets all storages, valid or not
178
-	 *
179
-	 * @return StorageConfig[] array of storage configs
180
-	 */
181
-	public function getAllStorages() {
182
-		return $this->readConfig();
183
-	}
184
-
185
-	/**
186
-	 * Gets all valid storages
187
-	 *
188
-	 * @return StorageConfig[]
189
-	 */
190
-	public function getStorages() {
191
-		return array_filter($this->getAllStorages(), [$this, 'validateStorage']);
192
-	}
193
-
194
-	/**
195
-	 * Validate storage
196
-	 * FIXME: De-duplicate with StoragesController::validate()
197
-	 *
198
-	 * @param StorageConfig $storage
199
-	 * @return bool
200
-	 */
201
-	protected function validateStorage(StorageConfig $storage) {
202
-		/** @var Backend */
203
-		$backend = $storage->getBackend();
204
-		/** @var AuthMechanism */
205
-		$authMechanism = $storage->getAuthMechanism();
206
-
207
-		if (!$backend->isVisibleFor($this->getVisibilityType())) {
208
-			// not permitted to use backend
209
-			return false;
210
-		}
211
-		if (!$authMechanism->isVisibleFor($this->getVisibilityType())) {
212
-			// not permitted to use auth mechanism
213
-			return false;
214
-		}
215
-
216
-		return true;
217
-	}
218
-
219
-	/**
220
-	 * Get the visibility type for this controller, used in validation
221
-	 *
222
-	 * @return string BackendService::VISIBILITY_* constants
223
-	 */
224
-	abstract public function getVisibilityType();
225
-
226
-	/**
227
-	 * @return integer
228
-	 */
229
-	protected function getType() {
230
-		return DBConfigService::MOUNT_TYPE_ADMIN;
231
-	}
232
-
233
-	/**
234
-	 * Add new storage to the configuration
235
-	 *
236
-	 * @param StorageConfig $newStorage storage attributes
237
-	 *
238
-	 * @return StorageConfig storage config, with added id
239
-	 */
240
-	public function addStorage(StorageConfig $newStorage) {
241
-		$allStorages = $this->readConfig();
242
-
243
-		$configId = $this->dbConfig->addMount(
244
-			$newStorage->getMountPoint(),
245
-			$newStorage->getBackend()->getIdentifier(),
246
-			$newStorage->getAuthMechanism()->getIdentifier(),
247
-			$newStorage->getPriority(),
248
-			$this->getType()
249
-		);
250
-
251
-		$newStorage->setId($configId);
252
-
253
-		foreach ($newStorage->getApplicableUsers() as $user) {
254
-			$this->dbConfig->addApplicable($configId, DBConfigService::APPLICABLE_TYPE_USER, $user);
255
-		}
256
-		foreach ($newStorage->getApplicableGroups() as $group) {
257
-			$this->dbConfig->addApplicable($configId, DBConfigService::APPLICABLE_TYPE_GROUP, $group);
258
-		}
259
-		foreach ($newStorage->getBackendOptions() as $key => $value) {
260
-			$this->dbConfig->setConfig($configId, $key, $value);
261
-		}
262
-		foreach ($newStorage->getMountOptions() as $key => $value) {
263
-			$this->dbConfig->setOption($configId, $key, $value);
264
-		}
265
-
266
-		if (count($newStorage->getApplicableUsers()) === 0 && count($newStorage->getApplicableGroups()) === 0) {
267
-			$this->dbConfig->addApplicable($configId, DBConfigService::APPLICABLE_TYPE_GLOBAL, null);
268
-		}
269
-
270
-		// add new storage
271
-		$allStorages[$configId] = $newStorage;
272
-
273
-		$this->triggerHooks($newStorage, Filesystem::signal_create_mount);
274
-
275
-		$newStorage->setStatus(StorageNotAvailableException::STATUS_SUCCESS);
276
-		return $newStorage;
277
-	}
278
-
279
-	/**
280
-	 * Create a storage from its parameters
281
-	 *
282
-	 * @param string $mountPoint storage mount point
283
-	 * @param string $backendIdentifier backend identifier
284
-	 * @param string $authMechanismIdentifier authentication mechanism identifier
285
-	 * @param array $backendOptions backend-specific options
286
-	 * @param array|null $mountOptions mount-specific options
287
-	 * @param array|null $applicableUsers users for which to mount the storage
288
-	 * @param array|null $applicableGroups groups for which to mount the storage
289
-	 * @param int|null $priority priority
290
-	 *
291
-	 * @return StorageConfig
292
-	 */
293
-	public function createStorage(
294
-		$mountPoint,
295
-		$backendIdentifier,
296
-		$authMechanismIdentifier,
297
-		$backendOptions,
298
-		$mountOptions = null,
299
-		$applicableUsers = null,
300
-		$applicableGroups = null,
301
-		$priority = null
302
-	) {
303
-		$backend = $this->backendService->getBackend($backendIdentifier);
304
-		if (!$backend) {
305
-			$backend = new InvalidBackend($backendIdentifier);
306
-		}
307
-		$authMechanism = $this->backendService->getAuthMechanism($authMechanismIdentifier);
308
-		if (!$authMechanism) {
309
-			$authMechanism = new InvalidAuth($authMechanismIdentifier);
310
-		}
311
-		$newStorage = new StorageConfig();
312
-		$newStorage->setMountPoint($mountPoint);
313
-		$newStorage->setBackend($backend);
314
-		$newStorage->setAuthMechanism($authMechanism);
315
-		$newStorage->setBackendOptions($backendOptions);
316
-		if (isset($mountOptions)) {
317
-			$newStorage->setMountOptions($mountOptions);
318
-		}
319
-		if (isset($applicableUsers)) {
320
-			$newStorage->setApplicableUsers($applicableUsers);
321
-		}
322
-		if (isset($applicableGroups)) {
323
-			$newStorage->setApplicableGroups($applicableGroups);
324
-		}
325
-		if (isset($priority)) {
326
-			$newStorage->setPriority($priority);
327
-		}
328
-
329
-		return $newStorage;
330
-	}
331
-
332
-	/**
333
-	 * Triggers the given hook signal for all the applicables given
334
-	 *
335
-	 * @param string $signal signal
336
-	 * @param string $mountPoint hook mount pount param
337
-	 * @param string $mountType hook mount type param
338
-	 * @param array $applicableArray array of applicable users/groups for which to trigger the hook
339
-	 */
340
-	protected function triggerApplicableHooks($signal, $mountPoint, $mountType, $applicableArray) {
341
-		foreach ($applicableArray as $applicable) {
342
-			\OCP\Util::emitHook(
343
-				Filesystem::CLASSNAME,
344
-				$signal,
345
-				[
346
-					Filesystem::signal_param_path => $mountPoint,
347
-					Filesystem::signal_param_mount_type => $mountType,
348
-					Filesystem::signal_param_users => $applicable,
349
-				]
350
-			);
351
-		}
352
-	}
353
-
354
-	/**
355
-	 * Triggers $signal for all applicable users of the given
356
-	 * storage
357
-	 *
358
-	 * @param StorageConfig $storage storage data
359
-	 * @param string $signal signal to trigger
360
-	 */
361
-	abstract protected function triggerHooks(StorageConfig $storage, $signal);
362
-
363
-	/**
364
-	 * Triggers signal_create_mount or signal_delete_mount to
365
-	 * accommodate for additions/deletions in applicableUsers
366
-	 * and applicableGroups fields.
367
-	 *
368
-	 * @param StorageConfig $oldStorage old storage data
369
-	 * @param StorageConfig $newStorage new storage data
370
-	 */
371
-	abstract protected function triggerChangeHooks(StorageConfig $oldStorage, StorageConfig $newStorage);
372
-
373
-	/**
374
-	 * Update storage to the configuration
375
-	 *
376
-	 * @param StorageConfig $updatedStorage storage attributes
377
-	 *
378
-	 * @return StorageConfig storage config
379
-	 * @throws NotFoundException if the given storage does not exist in the config
380
-	 */
381
-	public function updateStorage(StorageConfig $updatedStorage) {
382
-		$id = $updatedStorage->getId();
383
-
384
-		$existingMount = $this->dbConfig->getMountById($id);
385
-
386
-		if (!is_array($existingMount)) {
387
-			throw new NotFoundException('Storage with ID "' . $id . '" not found while updating storage');
388
-		}
389
-
390
-		$oldStorage = $this->getStorageConfigFromDBMount($existingMount);
391
-
392
-		if ($oldStorage->getBackend() instanceof InvalidBackend) {
393
-			throw new NotFoundException('Storage with id "' . $id . '" cannot be edited due to missing backend');
394
-		}
395
-
396
-		$removedUsers = array_diff($oldStorage->getApplicableUsers(), $updatedStorage->getApplicableUsers());
397
-		$removedGroups = array_diff($oldStorage->getApplicableGroups(), $updatedStorage->getApplicableGroups());
398
-		$addedUsers = array_diff($updatedStorage->getApplicableUsers(), $oldStorage->getApplicableUsers());
399
-		$addedGroups = array_diff($updatedStorage->getApplicableGroups(), $oldStorage->getApplicableGroups());
400
-
401
-		$oldUserCount = count($oldStorage->getApplicableUsers());
402
-		$oldGroupCount = count($oldStorage->getApplicableGroups());
403
-		$newUserCount = count($updatedStorage->getApplicableUsers());
404
-		$newGroupCount = count($updatedStorage->getApplicableGroups());
405
-		$wasGlobal = ($oldUserCount + $oldGroupCount) === 0;
406
-		$isGlobal = ($newUserCount + $newGroupCount) === 0;
407
-
408
-		foreach ($removedUsers as $user) {
409
-			$this->dbConfig->removeApplicable($id, DBConfigService::APPLICABLE_TYPE_USER, $user);
410
-		}
411
-		foreach ($removedGroups as $group) {
412
-			$this->dbConfig->removeApplicable($id, DBConfigService::APPLICABLE_TYPE_GROUP, $group);
413
-		}
414
-		foreach ($addedUsers as $user) {
415
-			$this->dbConfig->addApplicable($id, DBConfigService::APPLICABLE_TYPE_USER, $user);
416
-		}
417
-		foreach ($addedGroups as $group) {
418
-			$this->dbConfig->addApplicable($id, DBConfigService::APPLICABLE_TYPE_GROUP, $group);
419
-		}
420
-
421
-		if ($wasGlobal && !$isGlobal) {
422
-			$this->dbConfig->removeApplicable($id, DBConfigService::APPLICABLE_TYPE_GLOBAL, null);
423
-		} elseif (!$wasGlobal && $isGlobal) {
424
-			$this->dbConfig->addApplicable($id, DBConfigService::APPLICABLE_TYPE_GLOBAL, null);
425
-		}
426
-
427
-		$changedConfig = array_diff_assoc($updatedStorage->getBackendOptions(), $oldStorage->getBackendOptions());
428
-		$changedOptions = array_diff_assoc($updatedStorage->getMountOptions(), $oldStorage->getMountOptions());
429
-
430
-		foreach ($changedConfig as $key => $value) {
431
-			if ($value !== DefinitionParameter::UNMODIFIED_PLACEHOLDER) {
432
-				$this->dbConfig->setConfig($id, $key, $value);
433
-			}
434
-		}
435
-		foreach ($changedOptions as $key => $value) {
436
-			$this->dbConfig->setOption($id, $key, $value);
437
-		}
438
-
439
-		if ($updatedStorage->getMountPoint() !== $oldStorage->getMountPoint()) {
440
-			$this->dbConfig->setMountPoint($id, $updatedStorage->getMountPoint());
441
-		}
442
-
443
-		if ($updatedStorage->getAuthMechanism()->getIdentifier() !== $oldStorage->getAuthMechanism()->getIdentifier()) {
444
-			$this->dbConfig->setAuthBackend($id, $updatedStorage->getAuthMechanism()->getIdentifier());
445
-		}
446
-
447
-		$this->triggerChangeHooks($oldStorage, $updatedStorage);
448
-
449
-		if (($wasGlobal && !$isGlobal) || count($removedGroups) > 0) { // to expensive to properly handle these on the fly
450
-			$this->userMountCache->remoteStorageMounts($this->getStorageId($updatedStorage));
451
-		} else {
452
-			$storageId = $this->getStorageId($updatedStorage);
453
-			foreach ($removedUsers as $userId) {
454
-				$this->userMountCache->removeUserStorageMount($storageId, $userId);
455
-			}
456
-		}
457
-
458
-		return $this->getStorage($id);
459
-	}
460
-
461
-	/**
462
-	 * Delete the storage with the given id.
463
-	 *
464
-	 * @param int $id storage id
465
-	 *
466
-	 * @throws NotFoundException if no storage was found with the given id
467
-	 */
468
-	public function removeStorage($id) {
469
-		$existingMount = $this->dbConfig->getMountById($id);
470
-
471
-		if (!is_array($existingMount)) {
472
-			throw new NotFoundException('Storage with ID "' . $id . '" not found');
473
-		}
474
-
475
-		$this->dbConfig->removeMount($id);
476
-
477
-		$deletedStorage = $this->getStorageConfigFromDBMount($existingMount);
478
-		$this->triggerHooks($deletedStorage, Filesystem::signal_delete_mount);
479
-
480
-		// delete oc_storages entries and oc_filecache
481
-		try {
482
-			$rustyStorageId = $this->getRustyStorageIdFromConfig($deletedStorage);
483
-			\OC\Files\Cache\Storage::remove($rustyStorageId);
484
-		} catch (\Exception $e) {
485
-			// can happen either for invalid configs where the storage could not
486
-			// be instantiated or whenever $user vars where used, in which case
487
-			// the storage id could not be computed
488
-			\OC::$server->getLogger()->logException($e, [
489
-				'level' => ILogger::ERROR,
490
-				'app' => 'files_external',
491
-			]);
492
-		}
493
-	}
494
-
495
-	/**
496
-	 * Returns the rusty storage id from oc_storages from the given storage config.
497
-	 *
498
-	 * @param StorageConfig $storageConfig
499
-	 * @return string rusty storage id
500
-	 */
501
-	private function getRustyStorageIdFromConfig(StorageConfig $storageConfig) {
502
-		// if any of the storage options contains $user, it is not possible
503
-		// to compute the possible storage id as we don't know which users
504
-		// mounted it already (and we certainly don't want to iterate over ALL users)
505
-		foreach ($storageConfig->getBackendOptions() as $value) {
506
-			if (strpos($value, '$user') !== false) {
507
-				throw new \Exception('Cannot compute storage id for deletion due to $user vars in the configuration');
508
-			}
509
-		}
510
-
511
-		// note: similar to ConfigAdapter->prepateStorageConfig()
512
-		$storageConfig->getAuthMechanism()->manipulateStorageConfig($storageConfig);
513
-		$storageConfig->getBackend()->manipulateStorageConfig($storageConfig);
514
-
515
-		$class = $storageConfig->getBackend()->getStorageClass();
516
-		$storageImpl = new $class($storageConfig->getBackendOptions());
517
-
518
-		return $storageImpl->getId();
519
-	}
520
-
521
-	/**
522
-	 * Construct the storage implementation
523
-	 *
524
-	 * @param StorageConfig $storageConfig
525
-	 * @return int
526
-	 */
527
-	private function getStorageId(StorageConfig $storageConfig) {
528
-		try {
529
-			$class = $storageConfig->getBackend()->getStorageClass();
530
-			/** @var \OC\Files\Storage\Storage $storage */
531
-			$storage = new $class($storageConfig->getBackendOptions());
532
-
533
-			// auth mechanism should fire first
534
-			$storage = $storageConfig->getBackend()->wrapStorage($storage);
535
-			$storage = $storageConfig->getAuthMechanism()->wrapStorage($storage);
536
-
537
-			return $storage->getStorageCache()->getNumericId();
538
-		} catch (\Exception $e) {
539
-			return -1;
540
-		}
541
-	}
51
+    /** @var BackendService */
52
+    protected $backendService;
53
+
54
+    /**
55
+     * @var DBConfigService
56
+     */
57
+    protected $dbConfig;
58
+
59
+    /**
60
+     * @var IUserMountCache
61
+     */
62
+    protected $userMountCache;
63
+
64
+    /**
65
+     * @param BackendService $backendService
66
+     * @param DBConfigService $dbConfigService
67
+     * @param IUserMountCache $userMountCache
68
+     */
69
+    public function __construct(BackendService $backendService, DBConfigService $dbConfigService, IUserMountCache $userMountCache) {
70
+        $this->backendService = $backendService;
71
+        $this->dbConfig = $dbConfigService;
72
+        $this->userMountCache = $userMountCache;
73
+    }
74
+
75
+    protected function readDBConfig() {
76
+        return $this->dbConfig->getAdminMounts();
77
+    }
78
+
79
+    protected function getStorageConfigFromDBMount(array $mount) {
80
+        $applicableUsers = array_filter($mount['applicable'], function ($applicable) {
81
+            return $applicable['type'] === DBConfigService::APPLICABLE_TYPE_USER;
82
+        });
83
+        $applicableUsers = array_map(function ($applicable) {
84
+            return $applicable['value'];
85
+        }, $applicableUsers);
86
+
87
+        $applicableGroups = array_filter($mount['applicable'], function ($applicable) {
88
+            return $applicable['type'] === DBConfigService::APPLICABLE_TYPE_GROUP;
89
+        });
90
+        $applicableGroups = array_map(function ($applicable) {
91
+            return $applicable['value'];
92
+        }, $applicableGroups);
93
+
94
+        try {
95
+            $config = $this->createStorage(
96
+                $mount['mount_point'],
97
+                $mount['storage_backend'],
98
+                $mount['auth_backend'],
99
+                $mount['config'],
100
+                $mount['options'],
101
+                array_values($applicableUsers),
102
+                array_values($applicableGroups),
103
+                $mount['priority']
104
+            );
105
+            $config->setType($mount['type']);
106
+            $config->setId((int)$mount['mount_id']);
107
+            return $config;
108
+        } catch (\UnexpectedValueException $e) {
109
+            // don't die if a storage backend doesn't exist
110
+            \OC::$server->getLogger()->logException($e, [
111
+                'message' => 'Could not load storage.',
112
+                'level' => ILogger::ERROR,
113
+                'app' => 'files_external',
114
+            ]);
115
+            return null;
116
+        } catch (\InvalidArgumentException $e) {
117
+            \OC::$server->getLogger()->logException($e, [
118
+                'message' => 'Could not load storage.',
119
+                'level' => ILogger::ERROR,
120
+                'app' => 'files_external',
121
+            ]);
122
+            return null;
123
+        }
124
+    }
125
+
126
+    /**
127
+     * Read the external storages config
128
+     *
129
+     * @return array map of storage id to storage config
130
+     */
131
+    protected function readConfig() {
132
+        $mounts = $this->readDBConfig();
133
+        $configs = array_map([$this, 'getStorageConfigFromDBMount'], $mounts);
134
+        $configs = array_filter($configs, function ($config) {
135
+            return $config instanceof StorageConfig;
136
+        });
137
+
138
+        $keys = array_map(function (StorageConfig $config) {
139
+            return $config->getId();
140
+        }, $configs);
141
+
142
+        return array_combine($keys, $configs);
143
+    }
144
+
145
+    /**
146
+     * Get a storage with status
147
+     *
148
+     * @param int $id storage id
149
+     *
150
+     * @return StorageConfig
151
+     * @throws NotFoundException if the storage with the given id was not found
152
+     */
153
+    public function getStorage($id) {
154
+        $mount = $this->dbConfig->getMountById($id);
155
+
156
+        if (!is_array($mount)) {
157
+            throw new NotFoundException('Storage with ID "' . $id . '" not found');
158
+        }
159
+
160
+        $config = $this->getStorageConfigFromDBMount($mount);
161
+        if ($this->isApplicable($config)) {
162
+            return $config;
163
+        } else {
164
+            throw new NotFoundException('Storage with ID "' . $id . '" not found');
165
+        }
166
+    }
167
+
168
+    /**
169
+     * Check whether this storage service should provide access to a storage
170
+     *
171
+     * @param StorageConfig $config
172
+     * @return bool
173
+     */
174
+    abstract protected function isApplicable(StorageConfig $config);
175
+
176
+    /**
177
+     * Gets all storages, valid or not
178
+     *
179
+     * @return StorageConfig[] array of storage configs
180
+     */
181
+    public function getAllStorages() {
182
+        return $this->readConfig();
183
+    }
184
+
185
+    /**
186
+     * Gets all valid storages
187
+     *
188
+     * @return StorageConfig[]
189
+     */
190
+    public function getStorages() {
191
+        return array_filter($this->getAllStorages(), [$this, 'validateStorage']);
192
+    }
193
+
194
+    /**
195
+     * Validate storage
196
+     * FIXME: De-duplicate with StoragesController::validate()
197
+     *
198
+     * @param StorageConfig $storage
199
+     * @return bool
200
+     */
201
+    protected function validateStorage(StorageConfig $storage) {
202
+        /** @var Backend */
203
+        $backend = $storage->getBackend();
204
+        /** @var AuthMechanism */
205
+        $authMechanism = $storage->getAuthMechanism();
206
+
207
+        if (!$backend->isVisibleFor($this->getVisibilityType())) {
208
+            // not permitted to use backend
209
+            return false;
210
+        }
211
+        if (!$authMechanism->isVisibleFor($this->getVisibilityType())) {
212
+            // not permitted to use auth mechanism
213
+            return false;
214
+        }
215
+
216
+        return true;
217
+    }
218
+
219
+    /**
220
+     * Get the visibility type for this controller, used in validation
221
+     *
222
+     * @return string BackendService::VISIBILITY_* constants
223
+     */
224
+    abstract public function getVisibilityType();
225
+
226
+    /**
227
+     * @return integer
228
+     */
229
+    protected function getType() {
230
+        return DBConfigService::MOUNT_TYPE_ADMIN;
231
+    }
232
+
233
+    /**
234
+     * Add new storage to the configuration
235
+     *
236
+     * @param StorageConfig $newStorage storage attributes
237
+     *
238
+     * @return StorageConfig storage config, with added id
239
+     */
240
+    public function addStorage(StorageConfig $newStorage) {
241
+        $allStorages = $this->readConfig();
242
+
243
+        $configId = $this->dbConfig->addMount(
244
+            $newStorage->getMountPoint(),
245
+            $newStorage->getBackend()->getIdentifier(),
246
+            $newStorage->getAuthMechanism()->getIdentifier(),
247
+            $newStorage->getPriority(),
248
+            $this->getType()
249
+        );
250
+
251
+        $newStorage->setId($configId);
252
+
253
+        foreach ($newStorage->getApplicableUsers() as $user) {
254
+            $this->dbConfig->addApplicable($configId, DBConfigService::APPLICABLE_TYPE_USER, $user);
255
+        }
256
+        foreach ($newStorage->getApplicableGroups() as $group) {
257
+            $this->dbConfig->addApplicable($configId, DBConfigService::APPLICABLE_TYPE_GROUP, $group);
258
+        }
259
+        foreach ($newStorage->getBackendOptions() as $key => $value) {
260
+            $this->dbConfig->setConfig($configId, $key, $value);
261
+        }
262
+        foreach ($newStorage->getMountOptions() as $key => $value) {
263
+            $this->dbConfig->setOption($configId, $key, $value);
264
+        }
265
+
266
+        if (count($newStorage->getApplicableUsers()) === 0 && count($newStorage->getApplicableGroups()) === 0) {
267
+            $this->dbConfig->addApplicable($configId, DBConfigService::APPLICABLE_TYPE_GLOBAL, null);
268
+        }
269
+
270
+        // add new storage
271
+        $allStorages[$configId] = $newStorage;
272
+
273
+        $this->triggerHooks($newStorage, Filesystem::signal_create_mount);
274
+
275
+        $newStorage->setStatus(StorageNotAvailableException::STATUS_SUCCESS);
276
+        return $newStorage;
277
+    }
278
+
279
+    /**
280
+     * Create a storage from its parameters
281
+     *
282
+     * @param string $mountPoint storage mount point
283
+     * @param string $backendIdentifier backend identifier
284
+     * @param string $authMechanismIdentifier authentication mechanism identifier
285
+     * @param array $backendOptions backend-specific options
286
+     * @param array|null $mountOptions mount-specific options
287
+     * @param array|null $applicableUsers users for which to mount the storage
288
+     * @param array|null $applicableGroups groups for which to mount the storage
289
+     * @param int|null $priority priority
290
+     *
291
+     * @return StorageConfig
292
+     */
293
+    public function createStorage(
294
+        $mountPoint,
295
+        $backendIdentifier,
296
+        $authMechanismIdentifier,
297
+        $backendOptions,
298
+        $mountOptions = null,
299
+        $applicableUsers = null,
300
+        $applicableGroups = null,
301
+        $priority = null
302
+    ) {
303
+        $backend = $this->backendService->getBackend($backendIdentifier);
304
+        if (!$backend) {
305
+            $backend = new InvalidBackend($backendIdentifier);
306
+        }
307
+        $authMechanism = $this->backendService->getAuthMechanism($authMechanismIdentifier);
308
+        if (!$authMechanism) {
309
+            $authMechanism = new InvalidAuth($authMechanismIdentifier);
310
+        }
311
+        $newStorage = new StorageConfig();
312
+        $newStorage->setMountPoint($mountPoint);
313
+        $newStorage->setBackend($backend);
314
+        $newStorage->setAuthMechanism($authMechanism);
315
+        $newStorage->setBackendOptions($backendOptions);
316
+        if (isset($mountOptions)) {
317
+            $newStorage->setMountOptions($mountOptions);
318
+        }
319
+        if (isset($applicableUsers)) {
320
+            $newStorage->setApplicableUsers($applicableUsers);
321
+        }
322
+        if (isset($applicableGroups)) {
323
+            $newStorage->setApplicableGroups($applicableGroups);
324
+        }
325
+        if (isset($priority)) {
326
+            $newStorage->setPriority($priority);
327
+        }
328
+
329
+        return $newStorage;
330
+    }
331
+
332
+    /**
333
+     * Triggers the given hook signal for all the applicables given
334
+     *
335
+     * @param string $signal signal
336
+     * @param string $mountPoint hook mount pount param
337
+     * @param string $mountType hook mount type param
338
+     * @param array $applicableArray array of applicable users/groups for which to trigger the hook
339
+     */
340
+    protected function triggerApplicableHooks($signal, $mountPoint, $mountType, $applicableArray) {
341
+        foreach ($applicableArray as $applicable) {
342
+            \OCP\Util::emitHook(
343
+                Filesystem::CLASSNAME,
344
+                $signal,
345
+                [
346
+                    Filesystem::signal_param_path => $mountPoint,
347
+                    Filesystem::signal_param_mount_type => $mountType,
348
+                    Filesystem::signal_param_users => $applicable,
349
+                ]
350
+            );
351
+        }
352
+    }
353
+
354
+    /**
355
+     * Triggers $signal for all applicable users of the given
356
+     * storage
357
+     *
358
+     * @param StorageConfig $storage storage data
359
+     * @param string $signal signal to trigger
360
+     */
361
+    abstract protected function triggerHooks(StorageConfig $storage, $signal);
362
+
363
+    /**
364
+     * Triggers signal_create_mount or signal_delete_mount to
365
+     * accommodate for additions/deletions in applicableUsers
366
+     * and applicableGroups fields.
367
+     *
368
+     * @param StorageConfig $oldStorage old storage data
369
+     * @param StorageConfig $newStorage new storage data
370
+     */
371
+    abstract protected function triggerChangeHooks(StorageConfig $oldStorage, StorageConfig $newStorage);
372
+
373
+    /**
374
+     * Update storage to the configuration
375
+     *
376
+     * @param StorageConfig $updatedStorage storage attributes
377
+     *
378
+     * @return StorageConfig storage config
379
+     * @throws NotFoundException if the given storage does not exist in the config
380
+     */
381
+    public function updateStorage(StorageConfig $updatedStorage) {
382
+        $id = $updatedStorage->getId();
383
+
384
+        $existingMount = $this->dbConfig->getMountById($id);
385
+
386
+        if (!is_array($existingMount)) {
387
+            throw new NotFoundException('Storage with ID "' . $id . '" not found while updating storage');
388
+        }
389
+
390
+        $oldStorage = $this->getStorageConfigFromDBMount($existingMount);
391
+
392
+        if ($oldStorage->getBackend() instanceof InvalidBackend) {
393
+            throw new NotFoundException('Storage with id "' . $id . '" cannot be edited due to missing backend');
394
+        }
395
+
396
+        $removedUsers = array_diff($oldStorage->getApplicableUsers(), $updatedStorage->getApplicableUsers());
397
+        $removedGroups = array_diff($oldStorage->getApplicableGroups(), $updatedStorage->getApplicableGroups());
398
+        $addedUsers = array_diff($updatedStorage->getApplicableUsers(), $oldStorage->getApplicableUsers());
399
+        $addedGroups = array_diff($updatedStorage->getApplicableGroups(), $oldStorage->getApplicableGroups());
400
+
401
+        $oldUserCount = count($oldStorage->getApplicableUsers());
402
+        $oldGroupCount = count($oldStorage->getApplicableGroups());
403
+        $newUserCount = count($updatedStorage->getApplicableUsers());
404
+        $newGroupCount = count($updatedStorage->getApplicableGroups());
405
+        $wasGlobal = ($oldUserCount + $oldGroupCount) === 0;
406
+        $isGlobal = ($newUserCount + $newGroupCount) === 0;
407
+
408
+        foreach ($removedUsers as $user) {
409
+            $this->dbConfig->removeApplicable($id, DBConfigService::APPLICABLE_TYPE_USER, $user);
410
+        }
411
+        foreach ($removedGroups as $group) {
412
+            $this->dbConfig->removeApplicable($id, DBConfigService::APPLICABLE_TYPE_GROUP, $group);
413
+        }
414
+        foreach ($addedUsers as $user) {
415
+            $this->dbConfig->addApplicable($id, DBConfigService::APPLICABLE_TYPE_USER, $user);
416
+        }
417
+        foreach ($addedGroups as $group) {
418
+            $this->dbConfig->addApplicable($id, DBConfigService::APPLICABLE_TYPE_GROUP, $group);
419
+        }
420
+
421
+        if ($wasGlobal && !$isGlobal) {
422
+            $this->dbConfig->removeApplicable($id, DBConfigService::APPLICABLE_TYPE_GLOBAL, null);
423
+        } elseif (!$wasGlobal && $isGlobal) {
424
+            $this->dbConfig->addApplicable($id, DBConfigService::APPLICABLE_TYPE_GLOBAL, null);
425
+        }
426
+
427
+        $changedConfig = array_diff_assoc($updatedStorage->getBackendOptions(), $oldStorage->getBackendOptions());
428
+        $changedOptions = array_diff_assoc($updatedStorage->getMountOptions(), $oldStorage->getMountOptions());
429
+
430
+        foreach ($changedConfig as $key => $value) {
431
+            if ($value !== DefinitionParameter::UNMODIFIED_PLACEHOLDER) {
432
+                $this->dbConfig->setConfig($id, $key, $value);
433
+            }
434
+        }
435
+        foreach ($changedOptions as $key => $value) {
436
+            $this->dbConfig->setOption($id, $key, $value);
437
+        }
438
+
439
+        if ($updatedStorage->getMountPoint() !== $oldStorage->getMountPoint()) {
440
+            $this->dbConfig->setMountPoint($id, $updatedStorage->getMountPoint());
441
+        }
442
+
443
+        if ($updatedStorage->getAuthMechanism()->getIdentifier() !== $oldStorage->getAuthMechanism()->getIdentifier()) {
444
+            $this->dbConfig->setAuthBackend($id, $updatedStorage->getAuthMechanism()->getIdentifier());
445
+        }
446
+
447
+        $this->triggerChangeHooks($oldStorage, $updatedStorage);
448
+
449
+        if (($wasGlobal && !$isGlobal) || count($removedGroups) > 0) { // to expensive to properly handle these on the fly
450
+            $this->userMountCache->remoteStorageMounts($this->getStorageId($updatedStorage));
451
+        } else {
452
+            $storageId = $this->getStorageId($updatedStorage);
453
+            foreach ($removedUsers as $userId) {
454
+                $this->userMountCache->removeUserStorageMount($storageId, $userId);
455
+            }
456
+        }
457
+
458
+        return $this->getStorage($id);
459
+    }
460
+
461
+    /**
462
+     * Delete the storage with the given id.
463
+     *
464
+     * @param int $id storage id
465
+     *
466
+     * @throws NotFoundException if no storage was found with the given id
467
+     */
468
+    public function removeStorage($id) {
469
+        $existingMount = $this->dbConfig->getMountById($id);
470
+
471
+        if (!is_array($existingMount)) {
472
+            throw new NotFoundException('Storage with ID "' . $id . '" not found');
473
+        }
474
+
475
+        $this->dbConfig->removeMount($id);
476
+
477
+        $deletedStorage = $this->getStorageConfigFromDBMount($existingMount);
478
+        $this->triggerHooks($deletedStorage, Filesystem::signal_delete_mount);
479
+
480
+        // delete oc_storages entries and oc_filecache
481
+        try {
482
+            $rustyStorageId = $this->getRustyStorageIdFromConfig($deletedStorage);
483
+            \OC\Files\Cache\Storage::remove($rustyStorageId);
484
+        } catch (\Exception $e) {
485
+            // can happen either for invalid configs where the storage could not
486
+            // be instantiated or whenever $user vars where used, in which case
487
+            // the storage id could not be computed
488
+            \OC::$server->getLogger()->logException($e, [
489
+                'level' => ILogger::ERROR,
490
+                'app' => 'files_external',
491
+            ]);
492
+        }
493
+    }
494
+
495
+    /**
496
+     * Returns the rusty storage id from oc_storages from the given storage config.
497
+     *
498
+     * @param StorageConfig $storageConfig
499
+     * @return string rusty storage id
500
+     */
501
+    private function getRustyStorageIdFromConfig(StorageConfig $storageConfig) {
502
+        // if any of the storage options contains $user, it is not possible
503
+        // to compute the possible storage id as we don't know which users
504
+        // mounted it already (and we certainly don't want to iterate over ALL users)
505
+        foreach ($storageConfig->getBackendOptions() as $value) {
506
+            if (strpos($value, '$user') !== false) {
507
+                throw new \Exception('Cannot compute storage id for deletion due to $user vars in the configuration');
508
+            }
509
+        }
510
+
511
+        // note: similar to ConfigAdapter->prepateStorageConfig()
512
+        $storageConfig->getAuthMechanism()->manipulateStorageConfig($storageConfig);
513
+        $storageConfig->getBackend()->manipulateStorageConfig($storageConfig);
514
+
515
+        $class = $storageConfig->getBackend()->getStorageClass();
516
+        $storageImpl = new $class($storageConfig->getBackendOptions());
517
+
518
+        return $storageImpl->getId();
519
+    }
520
+
521
+    /**
522
+     * Construct the storage implementation
523
+     *
524
+     * @param StorageConfig $storageConfig
525
+     * @return int
526
+     */
527
+    private function getStorageId(StorageConfig $storageConfig) {
528
+        try {
529
+            $class = $storageConfig->getBackend()->getStorageClass();
530
+            /** @var \OC\Files\Storage\Storage $storage */
531
+            $storage = new $class($storageConfig->getBackendOptions());
532
+
533
+            // auth mechanism should fire first
534
+            $storage = $storageConfig->getBackend()->wrapStorage($storage);
535
+            $storage = $storageConfig->getAuthMechanism()->wrapStorage($storage);
536
+
537
+            return $storage->getStorageCache()->getNumericId();
538
+        } catch (\Exception $e) {
539
+            return -1;
540
+        }
541
+    }
542 542
 }
Please login to merge, or discard this patch.
lib/public/IAppConfig.php 1 patch
Indentation   +34 added lines, -34 removed lines patch added patch discarded remove patch
@@ -31,41 +31,41 @@
 block discarded – undo
31 31
  * @since 7.0.0
32 32
  */
33 33
 interface IAppConfig {
34
-	/**
35
-	 * check if a key is set in the appconfig
36
-	 * @param string $app
37
-	 * @param string $key
38
-	 * @return bool
39
-	 * @since 7.0.0
40
-	 */
41
-	public function hasKey($app, $key);
34
+    /**
35
+     * check if a key is set in the appconfig
36
+     * @param string $app
37
+     * @param string $key
38
+     * @return bool
39
+     * @since 7.0.0
40
+     */
41
+    public function hasKey($app, $key);
42 42
 
43
-	/**
44
-	 * get multiply values, either the app or key can be used as wildcard by setting it to false
45
-	 *
46
-	 * @param string|false $key
47
-	 * @param string|false $app
48
-	 * @return array|false
49
-	 * @since 7.0.0
50
-	 */
51
-	public function getValues($app, $key);
43
+    /**
44
+     * get multiply values, either the app or key can be used as wildcard by setting it to false
45
+     *
46
+     * @param string|false $key
47
+     * @param string|false $app
48
+     * @return array|false
49
+     * @since 7.0.0
50
+     */
51
+    public function getValues($app, $key);
52 52
 
53
-	/**
54
-	 * get all values of the app or and filters out sensitive data
55
-	 *
56
-	 * @param string $app
57
-	 * @return array
58
-	 * @since 12.0.0
59
-	 */
60
-	public function getFilteredValues($app);
53
+    /**
54
+     * get all values of the app or and filters out sensitive data
55
+     *
56
+     * @param string $app
57
+     * @return array
58
+     * @since 12.0.0
59
+     */
60
+    public function getFilteredValues($app);
61 61
 
62
-	/**
63
-	 * Get all apps using the config
64
-	 * @return array an array of app ids
65
-	 *
66
-	 * This function returns a list of all apps that have at least one
67
-	 * entry in the appconfig table.
68
-	 * @since 7.0.0
69
-	 */
70
-	public function getApps();
62
+    /**
63
+     * Get all apps using the config
64
+     * @return array an array of app ids
65
+     *
66
+     * This function returns a list of all apps that have at least one
67
+     * entry in the appconfig table.
68
+     * @since 7.0.0
69
+     */
70
+    public function getApps();
71 71
 }
Please login to merge, or discard this patch.
apps/updatenotification/lib/Controller/AdminController.php 1 patch
Indentation   +54 added lines, -54 removed lines patch added patch discarded remove patch
@@ -38,63 +38,63 @@
 block discarded – undo
38 38
 use OCP\Util;
39 39
 
40 40
 class AdminController extends Controller {
41
-	/** @var IJobList */
42
-	private $jobList;
43
-	/** @var ISecureRandom */
44
-	private $secureRandom;
45
-	/** @var IConfig */
46
-	private $config;
47
-	/** @var ITimeFactory */
48
-	private $timeFactory;
49
-	/** @var IL10N */
50
-	private $l10n;
41
+    /** @var IJobList */
42
+    private $jobList;
43
+    /** @var ISecureRandom */
44
+    private $secureRandom;
45
+    /** @var IConfig */
46
+    private $config;
47
+    /** @var ITimeFactory */
48
+    private $timeFactory;
49
+    /** @var IL10N */
50
+    private $l10n;
51 51
 
52
-	/**
53
-	 * @param string $appName
54
-	 * @param IRequest $request
55
-	 * @param IJobList $jobList
56
-	 * @param ISecureRandom $secureRandom
57
-	 * @param IConfig $config
58
-	 * @param ITimeFactory $timeFactory
59
-	 * @param IL10N $l10n
60
-	 */
61
-	public function __construct($appName,
62
-								IRequest $request,
63
-								IJobList $jobList,
64
-								ISecureRandom $secureRandom,
65
-								IConfig $config,
66
-								ITimeFactory $timeFactory,
67
-								IL10N $l10n) {
68
-		parent::__construct($appName, $request);
69
-		$this->jobList = $jobList;
70
-		$this->secureRandom = $secureRandom;
71
-		$this->config = $config;
72
-		$this->timeFactory = $timeFactory;
73
-		$this->l10n = $l10n;
74
-	}
52
+    /**
53
+     * @param string $appName
54
+     * @param IRequest $request
55
+     * @param IJobList $jobList
56
+     * @param ISecureRandom $secureRandom
57
+     * @param IConfig $config
58
+     * @param ITimeFactory $timeFactory
59
+     * @param IL10N $l10n
60
+     */
61
+    public function __construct($appName,
62
+                                IRequest $request,
63
+                                IJobList $jobList,
64
+                                ISecureRandom $secureRandom,
65
+                                IConfig $config,
66
+                                ITimeFactory $timeFactory,
67
+                                IL10N $l10n) {
68
+        parent::__construct($appName, $request);
69
+        $this->jobList = $jobList;
70
+        $this->secureRandom = $secureRandom;
71
+        $this->config = $config;
72
+        $this->timeFactory = $timeFactory;
73
+        $this->l10n = $l10n;
74
+    }
75 75
 
76
-	/**
77
-	 * @param string $channel
78
-	 * @return DataResponse
79
-	 */
80
-	public function setChannel(string $channel): DataResponse {
81
-		Util::setChannel($channel);
82
-		$this->config->setAppValue('core', 'lastupdatedat', 0);
83
-		return new DataResponse(['status' => 'success', 'data' => ['message' => $this->l10n->t('Channel updated')]]);
84
-	}
76
+    /**
77
+     * @param string $channel
78
+     * @return DataResponse
79
+     */
80
+    public function setChannel(string $channel): DataResponse {
81
+        Util::setChannel($channel);
82
+        $this->config->setAppValue('core', 'lastupdatedat', 0);
83
+        return new DataResponse(['status' => 'success', 'data' => ['message' => $this->l10n->t('Channel updated')]]);
84
+    }
85 85
 
86
-	/**
87
-	 * @return DataResponse
88
-	 */
89
-	public function createCredentials(): DataResponse {
90
-		// Create a new job and store the creation date
91
-		$this->jobList->add(ResetTokenBackgroundJob::class);
92
-		$this->config->setAppValue('core', 'updater.secret.created', $this->timeFactory->getTime());
86
+    /**
87
+     * @return DataResponse
88
+     */
89
+    public function createCredentials(): DataResponse {
90
+        // Create a new job and store the creation date
91
+        $this->jobList->add(ResetTokenBackgroundJob::class);
92
+        $this->config->setAppValue('core', 'updater.secret.created', $this->timeFactory->getTime());
93 93
 
94
-		// Create a new token
95
-		$newToken = $this->secureRandom->generate(64);
96
-		$this->config->setSystemValue('updater.secret', password_hash($newToken, PASSWORD_DEFAULT));
94
+        // Create a new token
95
+        $newToken = $this->secureRandom->generate(64);
96
+        $this->config->setSystemValue('updater.secret', password_hash($newToken, PASSWORD_DEFAULT));
97 97
 
98
-		return new DataResponse($newToken);
99
-	}
98
+        return new DataResponse($newToken);
99
+    }
100 100
 }
Please login to merge, or discard this patch.
apps/admin_audit/lib/Actions/Security.php 1 patch
Indentation   +38 added lines, -38 removed lines patch added patch discarded remove patch
@@ -31,45 +31,45 @@
 block discarded – undo
31 31
  * @package OCA\AdminAudit\Actions
32 32
  */
33 33
 class Security extends Action {
34
-	/**
35
-	 * Log twofactor auth enabled
36
-	 *
37
-	 * @param IUser $user
38
-	 * @param array $params
39
-	 */
40
-	public function twofactorFailed(IUser $user, array $params) {
41
-		$params['uid'] = $user->getUID();
42
-		$params['displayName'] = $user->getDisplayName();
34
+    /**
35
+     * Log twofactor auth enabled
36
+     *
37
+     * @param IUser $user
38
+     * @param array $params
39
+     */
40
+    public function twofactorFailed(IUser $user, array $params) {
41
+        $params['uid'] = $user->getUID();
42
+        $params['displayName'] = $user->getDisplayName();
43 43
 
44
-		$this->log(
45
-			'Failed two factor attempt by user %s (%s) with provider %s',
46
-			$params,
47
-			[
48
-				'displayName',
49
-				'uid',
50
-				'provider',
51
-			]
52
-		);
53
-	}
44
+        $this->log(
45
+            'Failed two factor attempt by user %s (%s) with provider %s',
46
+            $params,
47
+            [
48
+                'displayName',
49
+                'uid',
50
+                'provider',
51
+            ]
52
+        );
53
+    }
54 54
 
55
-	/**
56
-	 * Logs unsharing of data
57
-	 *
58
-	 * @param IUser $user
59
-	 * @param array $params
60
-	 */
61
-	public function twofactorSuccess(IUser $user, array $params) {
62
-		$params['uid'] = $user->getUID();
63
-		$params['displayName'] = $user->getDisplayName();
55
+    /**
56
+     * Logs unsharing of data
57
+     *
58
+     * @param IUser $user
59
+     * @param array $params
60
+     */
61
+    public function twofactorSuccess(IUser $user, array $params) {
62
+        $params['uid'] = $user->getUID();
63
+        $params['displayName'] = $user->getDisplayName();
64 64
 
65
-		$this->log(
66
-			'Successful two factor attempt by user %s (%s) with provider %s',
67
-			$params,
68
-			[
69
-				'displayName',
70
-				'uid',
71
-				'provider',
72
-			]
73
-		);
74
-	}
65
+        $this->log(
66
+            'Successful two factor attempt by user %s (%s) with provider %s',
67
+            $params,
68
+            [
69
+                'displayName',
70
+                'uid',
71
+                'provider',
72
+            ]
73
+        );
74
+    }
75 75
 }
Please login to merge, or discard this patch.
apps/workflowengine/lib/Controller/RequestTime.php 2 patches
Indentation   +20 added lines, -20 removed lines patch added patch discarded remove patch
@@ -26,27 +26,27 @@
 block discarded – undo
26 26
 
27 27
 class RequestTime extends Controller {
28 28
 
29
-	/**
30
-	 * @NoAdminRequired
31
-	 *
32
-	 * @param string $search
33
-	 * @return JSONResponse
34
-	 */
35
-	public function getTimezones($search = '') {
36
-		$timezones = \DateTimeZone::listIdentifiers();
29
+    /**
30
+     * @NoAdminRequired
31
+     *
32
+     * @param string $search
33
+     * @return JSONResponse
34
+     */
35
+    public function getTimezones($search = '') {
36
+        $timezones = \DateTimeZone::listIdentifiers();
37 37
 
38
-		if ($search !== '') {
39
-			$timezones = array_filter($timezones, function ($timezone) use ($search) {
40
-				return stripos($timezone, $search) !== false;
41
-			});
42
-		}
38
+        if ($search !== '') {
39
+            $timezones = array_filter($timezones, function ($timezone) use ($search) {
40
+                return stripos($timezone, $search) !== false;
41
+            });
42
+        }
43 43
 
44
-		$timezones = array_slice($timezones, 0, 10);
44
+        $timezones = array_slice($timezones, 0, 10);
45 45
 
46
-		$response = [];
47
-		foreach ($timezones as $timezone) {
48
-			$response[$timezone] = $timezone;
49
-		}
50
-		return new JSONResponse($response);
51
-	}
46
+        $response = [];
47
+        foreach ($timezones as $timezone) {
48
+            $response[$timezone] = $timezone;
49
+        }
50
+        return new JSONResponse($response);
51
+    }
52 52
 }
Please login to merge, or discard this patch.
Spacing   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -36,7 +36,7 @@
 block discarded – undo
36 36
 		$timezones = \DateTimeZone::listIdentifiers();
37 37
 
38 38
 		if ($search !== '') {
39
-			$timezones = array_filter($timezones, function ($timezone) use ($search) {
39
+			$timezones = array_filter($timezones, function($timezone) use ($search) {
40 40
 				return stripos($timezone, $search) !== false;
41 41
 			});
42 42
 		}
Please login to merge, or discard this patch.
apps/dav/lib/CalDAV/Search/SearchPlugin.php 2 patches
Spacing   +4 added lines, -4 removed lines patch added patch discarded remove patch
@@ -78,7 +78,7 @@  discard block
 block discarded – undo
78 78
 
79 79
 		$server->on('report', [$this, 'report']);
80 80
 
81
-		$server->xml->elementMap['{' . self::NS_Nextcloud . '}calendar-search'] =
81
+		$server->xml->elementMap['{'.self::NS_Nextcloud.'}calendar-search'] =
82 82
 			CalendarSearchReport::class;
83 83
 	}
84 84
 
@@ -92,7 +92,7 @@  discard block
 block discarded – undo
92 92
 	 */
93 93
 	public function report($reportName, $report, $path) {
94 94
 		switch ($reportName) {
95
-			case '{' . self::NS_Nextcloud . '}calendar-search':
95
+			case '{'.self::NS_Nextcloud.'}calendar-search':
96 96
 				$this->server->transactionType = 'report-nc-calendar-search';
97 97
 				$this->calendarSearch($report);
98 98
 				return false;
@@ -114,7 +114,7 @@  discard block
 block discarded – undo
114 114
 
115 115
 		$reports = [];
116 116
 		if ($node instanceof CalendarHome) {
117
-			$reports[] = '{' . self::NS_Nextcloud . '}calendar-search';
117
+			$reports[] = '{'.self::NS_Nextcloud.'}calendar-search';
118 118
 		}
119 119
 
120 120
 		return $reports;
@@ -144,7 +144,7 @@  discard block
 block discarded – undo
144 144
 
145 145
 			foreach ($nodePaths as $path) {
146 146
 				list($properties) = $this->server->getPropertiesForPath(
147
-					$this->server->getRequestUri() . '/' . $path,
147
+					$this->server->getRequestUri().'/'.$path,
148 148
 					$report->properties);
149 149
 				$result[] = $properties;
150 150
 			}
Please login to merge, or discard this patch.
Indentation   +130 added lines, -130 removed lines patch added patch discarded remove patch
@@ -32,134 +32,134 @@
 block discarded – undo
32 32
 use Sabre\DAV\ServerPlugin;
33 33
 
34 34
 class SearchPlugin extends ServerPlugin {
35
-	public const NS_Nextcloud = 'http://nextcloud.com/ns';
36
-
37
-	/**
38
-	 * Reference to SabreDAV server object.
39
-	 *
40
-	 * @var \Sabre\DAV\Server
41
-	 */
42
-	protected $server;
43
-
44
-	/**
45
-	 * This method should return a list of server-features.
46
-	 *
47
-	 * This is for example 'versioning' and is added to the DAV: header
48
-	 * in an OPTIONS response.
49
-	 *
50
-	 * @return string[]
51
-	 */
52
-	public function getFeatures() {
53
-		// May have to be changed to be detected
54
-		return ['nc-calendar-search'];
55
-	}
56
-
57
-	/**
58
-	 * Returns a plugin name.
59
-	 *
60
-	 * Using this name other plugins will be able to access other plugins
61
-	 * using Sabre\DAV\Server::getPlugin
62
-	 *
63
-	 * @return string
64
-	 */
65
-	public function getPluginName() {
66
-		return 'nc-calendar-search';
67
-	}
68
-
69
-	/**
70
-	 * This initializes the plugin.
71
-	 *
72
-	 * This function is called by Sabre\DAV\Server, after
73
-	 * addPlugin is called.
74
-	 *
75
-	 * This method should set up the required event subscriptions.
76
-	 *
77
-	 * @param Server $server
78
-	 */
79
-	public function initialize(Server $server) {
80
-		$this->server = $server;
81
-
82
-		$server->on('report', [$this, 'report']);
83
-
84
-		$server->xml->elementMap['{' . self::NS_Nextcloud . '}calendar-search'] =
85
-			CalendarSearchReport::class;
86
-	}
87
-
88
-	/**
89
-	 * This functions handles REPORT requests specific to CalDAV
90
-	 *
91
-	 * @param string $reportName
92
-	 * @param mixed $report
93
-	 * @param mixed $path
94
-	 * @return bool
95
-	 */
96
-	public function report($reportName, $report, $path) {
97
-		switch ($reportName) {
98
-			case '{' . self::NS_Nextcloud . '}calendar-search':
99
-				$this->server->transactionType = 'report-nc-calendar-search';
100
-				$this->calendarSearch($report);
101
-				return false;
102
-		}
103
-	}
104
-
105
-	/**
106
-	 * Returns a list of reports this plugin supports.
107
-	 *
108
-	 * This will be used in the {DAV:}supported-report-set property.
109
-	 * Note that you still need to subscribe to the 'report' event to actually
110
-	 * implement them
111
-	 *
112
-	 * @param string $uri
113
-	 * @return array
114
-	 */
115
-	public function getSupportedReportSet($uri) {
116
-		$node = $this->server->tree->getNodeForPath($uri);
117
-
118
-		$reports = [];
119
-		if ($node instanceof CalendarHome) {
120
-			$reports[] = '{' . self::NS_Nextcloud . '}calendar-search';
121
-		}
122
-
123
-		return $reports;
124
-	}
125
-
126
-	/**
127
-	 * This function handles the calendar-query REPORT
128
-	 *
129
-	 * This report is used by clients to request calendar objects based on
130
-	 * complex conditions.
131
-	 *
132
-	 * @param Xml\Request\CalendarSearchReport $report
133
-	 * @return void
134
-	 */
135
-	private function calendarSearch($report) {
136
-		$node = $this->server->tree->getNodeForPath($this->server->getRequestUri());
137
-		$depth = $this->server->getHTTPDepth(2);
138
-
139
-		// The default result is an empty array
140
-		$result = [];
141
-
142
-		// If we're dealing with the calendar home, the calendar home itself is
143
-		// responsible for the calendar-query
144
-		if ($node instanceof CalendarHome && $depth === 2) {
145
-			$nodePaths = $node->calendarSearch($report->filters, $report->limit, $report->offset);
146
-
147
-			foreach ($nodePaths as $path) {
148
-				list($properties) = $this->server->getPropertiesForPath(
149
-					$this->server->getRequestUri() . '/' . $path,
150
-					$report->properties);
151
-				$result[] = $properties;
152
-			}
153
-		}
154
-
155
-		$prefer = $this->server->getHTTPPrefer();
156
-
157
-		$this->server->httpResponse->setStatus(207);
158
-		$this->server->httpResponse->setHeader('Content-Type',
159
-			'application/xml; charset=utf-8');
160
-		$this->server->httpResponse->setHeader('Vary', 'Brief,Prefer');
161
-		$this->server->httpResponse->setBody(
162
-			$this->server->generateMultiStatus($result,
163
-				$prefer['return'] === 'minimal'));
164
-	}
35
+    public const NS_Nextcloud = 'http://nextcloud.com/ns';
36
+
37
+    /**
38
+     * Reference to SabreDAV server object.
39
+     *
40
+     * @var \Sabre\DAV\Server
41
+     */
42
+    protected $server;
43
+
44
+    /**
45
+     * This method should return a list of server-features.
46
+     *
47
+     * This is for example 'versioning' and is added to the DAV: header
48
+     * in an OPTIONS response.
49
+     *
50
+     * @return string[]
51
+     */
52
+    public function getFeatures() {
53
+        // May have to be changed to be detected
54
+        return ['nc-calendar-search'];
55
+    }
56
+
57
+    /**
58
+     * Returns a plugin name.
59
+     *
60
+     * Using this name other plugins will be able to access other plugins
61
+     * using Sabre\DAV\Server::getPlugin
62
+     *
63
+     * @return string
64
+     */
65
+    public function getPluginName() {
66
+        return 'nc-calendar-search';
67
+    }
68
+
69
+    /**
70
+     * This initializes the plugin.
71
+     *
72
+     * This function is called by Sabre\DAV\Server, after
73
+     * addPlugin is called.
74
+     *
75
+     * This method should set up the required event subscriptions.
76
+     *
77
+     * @param Server $server
78
+     */
79
+    public function initialize(Server $server) {
80
+        $this->server = $server;
81
+
82
+        $server->on('report', [$this, 'report']);
83
+
84
+        $server->xml->elementMap['{' . self::NS_Nextcloud . '}calendar-search'] =
85
+            CalendarSearchReport::class;
86
+    }
87
+
88
+    /**
89
+     * This functions handles REPORT requests specific to CalDAV
90
+     *
91
+     * @param string $reportName
92
+     * @param mixed $report
93
+     * @param mixed $path
94
+     * @return bool
95
+     */
96
+    public function report($reportName, $report, $path) {
97
+        switch ($reportName) {
98
+            case '{' . self::NS_Nextcloud . '}calendar-search':
99
+                $this->server->transactionType = 'report-nc-calendar-search';
100
+                $this->calendarSearch($report);
101
+                return false;
102
+        }
103
+    }
104
+
105
+    /**
106
+     * Returns a list of reports this plugin supports.
107
+     *
108
+     * This will be used in the {DAV:}supported-report-set property.
109
+     * Note that you still need to subscribe to the 'report' event to actually
110
+     * implement them
111
+     *
112
+     * @param string $uri
113
+     * @return array
114
+     */
115
+    public function getSupportedReportSet($uri) {
116
+        $node = $this->server->tree->getNodeForPath($uri);
117
+
118
+        $reports = [];
119
+        if ($node instanceof CalendarHome) {
120
+            $reports[] = '{' . self::NS_Nextcloud . '}calendar-search';
121
+        }
122
+
123
+        return $reports;
124
+    }
125
+
126
+    /**
127
+     * This function handles the calendar-query REPORT
128
+     *
129
+     * This report is used by clients to request calendar objects based on
130
+     * complex conditions.
131
+     *
132
+     * @param Xml\Request\CalendarSearchReport $report
133
+     * @return void
134
+     */
135
+    private function calendarSearch($report) {
136
+        $node = $this->server->tree->getNodeForPath($this->server->getRequestUri());
137
+        $depth = $this->server->getHTTPDepth(2);
138
+
139
+        // The default result is an empty array
140
+        $result = [];
141
+
142
+        // If we're dealing with the calendar home, the calendar home itself is
143
+        // responsible for the calendar-query
144
+        if ($node instanceof CalendarHome && $depth === 2) {
145
+            $nodePaths = $node->calendarSearch($report->filters, $report->limit, $report->offset);
146
+
147
+            foreach ($nodePaths as $path) {
148
+                list($properties) = $this->server->getPropertiesForPath(
149
+                    $this->server->getRequestUri() . '/' . $path,
150
+                    $report->properties);
151
+                $result[] = $properties;
152
+            }
153
+        }
154
+
155
+        $prefer = $this->server->getHTTPPrefer();
156
+
157
+        $this->server->httpResponse->setStatus(207);
158
+        $this->server->httpResponse->setHeader('Content-Type',
159
+            'application/xml; charset=utf-8');
160
+        $this->server->httpResponse->setHeader('Vary', 'Brief,Prefer');
161
+        $this->server->httpResponse->setBody(
162
+            $this->server->generateMultiStatus($result,
163
+                $prefer['return'] === 'minimal'));
164
+    }
165 165
 }
Please login to merge, or discard this patch.
apps/files/lib/App.php 2 patches
Indentation   +32 added lines, -32 removed lines patch added patch discarded remove patch
@@ -28,40 +28,40 @@
 block discarded – undo
28 28
 namespace OCA\Files;
29 29
 
30 30
 class App {
31
-	/**
32
-	 * @var \OCP\INavigationManager
33
-	 */
34
-	private static $navigationManager;
31
+    /**
32
+     * @var \OCP\INavigationManager
33
+     */
34
+    private static $navigationManager;
35 35
 
36
-	/**
37
-	 * Returns the app's navigation manager
38
-	 *
39
-	 * @return \OCP\INavigationManager
40
-	 */
41
-	public static function getNavigationManager() {
42
-		// TODO: move this into a service in the Application class
43
-		if (self::$navigationManager === null) {
44
-			self::$navigationManager = new \OC\NavigationManager(
45
-				\OC::$server->getAppManager(),
46
-				\OC::$server->getURLGenerator(),
47
-				\OC::$server->getL10NFactory(),
48
-				\OC::$server->getUserSession(),
49
-				\OC::$server->getGroupManager(),
50
-				\OC::$server->getConfig()
51
-			);
52
-			self::$navigationManager->clear(false);
53
-		}
54
-		return self::$navigationManager;
55
-	}
36
+    /**
37
+     * Returns the app's navigation manager
38
+     *
39
+     * @return \OCP\INavigationManager
40
+     */
41
+    public static function getNavigationManager() {
42
+        // TODO: move this into a service in the Application class
43
+        if (self::$navigationManager === null) {
44
+            self::$navigationManager = new \OC\NavigationManager(
45
+                \OC::$server->getAppManager(),
46
+                \OC::$server->getURLGenerator(),
47
+                \OC::$server->getL10NFactory(),
48
+                \OC::$server->getUserSession(),
49
+                \OC::$server->getGroupManager(),
50
+                \OC::$server->getConfig()
51
+            );
52
+            self::$navigationManager->clear(false);
53
+        }
54
+        return self::$navigationManager;
55
+    }
56 56
 
57
-	public static function extendJsConfig($settings) {
58
-		$appConfig = json_decode($settings['array']['oc_appconfig'], true);
57
+    public static function extendJsConfig($settings) {
58
+        $appConfig = json_decode($settings['array']['oc_appconfig'], true);
59 59
 
60
-		$maxChunkSize = (int)\OC::$server->getConfig()->getAppValue('files', 'max_chunk_size', 10 * 1024 * 1024);
61
-		$appConfig['files'] = [
62
-			'max_chunk_size' => $maxChunkSize
63
-		];
60
+        $maxChunkSize = (int)\OC::$server->getConfig()->getAppValue('files', 'max_chunk_size', 10 * 1024 * 1024);
61
+        $appConfig['files'] = [
62
+            'max_chunk_size' => $maxChunkSize
63
+        ];
64 64
 
65
-		$settings['array']['oc_appconfig'] = json_encode($appConfig);
66
-	}
65
+        $settings['array']['oc_appconfig'] = json_encode($appConfig);
66
+    }
67 67
 }
Please login to merge, or discard this patch.
Spacing   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -57,7 +57,7 @@
 block discarded – undo
57 57
 	public static function extendJsConfig($settings) {
58 58
 		$appConfig = json_decode($settings['array']['oc_appconfig'], true);
59 59
 
60
-		$maxChunkSize = (int)\OC::$server->getConfig()->getAppValue('files', 'max_chunk_size', 10 * 1024 * 1024);
60
+		$maxChunkSize = (int) \OC::$server->getConfig()->getAppValue('files', 'max_chunk_size', 10 * 1024 * 1024);
61 61
 		$appConfig['files'] = [
62 62
 			'max_chunk_size' => $maxChunkSize
63 63
 		];
Please login to merge, or discard this patch.
apps/files_external/lib/Lib/Auth/PublicKey/RSA.php 1 patch
Indentation   +40 added lines, -40 removed lines patch added patch discarded remove patch
@@ -36,51 +36,51 @@
 block discarded – undo
36 36
  */
37 37
 class RSA extends AuthMechanism {
38 38
 
39
-	/** @var IConfig */
40
-	private $config;
39
+    /** @var IConfig */
40
+    private $config;
41 41
 
42
-	public function __construct(IL10N $l, IConfig $config) {
43
-		$this->config = $config;
42
+    public function __construct(IL10N $l, IConfig $config) {
43
+        $this->config = $config;
44 44
 
45
-		$this
46
-			->setIdentifier('publickey::rsa')
47
-			->setScheme(self::SCHEME_PUBLICKEY)
48
-			->setText($l->t('RSA public key'))
49
-			->addParameters([
50
-				new DefinitionParameter('user', $l->t('Username')),
51
-				new DefinitionParameter('public_key', $l->t('Public key')),
52
-				(new DefinitionParameter('private_key', 'private_key'))
53
-					->setType(DefinitionParameter::VALUE_HIDDEN),
54
-			])
55
-			->addCustomJs('public_key')
56
-		;
57
-	}
45
+        $this
46
+            ->setIdentifier('publickey::rsa')
47
+            ->setScheme(self::SCHEME_PUBLICKEY)
48
+            ->setText($l->t('RSA public key'))
49
+            ->addParameters([
50
+                new DefinitionParameter('user', $l->t('Username')),
51
+                new DefinitionParameter('public_key', $l->t('Public key')),
52
+                (new DefinitionParameter('private_key', 'private_key'))
53
+                    ->setType(DefinitionParameter::VALUE_HIDDEN),
54
+            ])
55
+            ->addCustomJs('public_key')
56
+        ;
57
+    }
58 58
 
59
-	public function manipulateStorageConfig(StorageConfig &$storage, IUser $user = null) {
60
-		$auth = new RSACrypt();
61
-		$auth->setPassword($this->config->getSystemValue('secret', ''));
62
-		if (!$auth->loadKey($storage->getBackendOption('private_key'))) {
63
-			throw new \RuntimeException('unable to load private key');
64
-		}
65
-		$storage->setBackendOption('public_key_auth', $auth);
66
-	}
59
+    public function manipulateStorageConfig(StorageConfig &$storage, IUser $user = null) {
60
+        $auth = new RSACrypt();
61
+        $auth->setPassword($this->config->getSystemValue('secret', ''));
62
+        if (!$auth->loadKey($storage->getBackendOption('private_key'))) {
63
+            throw new \RuntimeException('unable to load private key');
64
+        }
65
+        $storage->setBackendOption('public_key_auth', $auth);
66
+    }
67 67
 
68
-	/**
69
-	 * Generate a keypair
70
-	 *
71
-	 * @param int $keyLenth
72
-	 * @return array ['privatekey' => $privateKey, 'publickey' => $publicKey]
73
-	 */
74
-	public function createKey($keyLength) {
75
-		$rsa = new RSACrypt();
76
-		$rsa->setPublicKeyFormat(RSACrypt::PUBLIC_FORMAT_OPENSSH);
77
-		$rsa->setPassword($this->config->getSystemValue('secret', ''));
68
+    /**
69
+     * Generate a keypair
70
+     *
71
+     * @param int $keyLenth
72
+     * @return array ['privatekey' => $privateKey, 'publickey' => $publicKey]
73
+     */
74
+    public function createKey($keyLength) {
75
+        $rsa = new RSACrypt();
76
+        $rsa->setPublicKeyFormat(RSACrypt::PUBLIC_FORMAT_OPENSSH);
77
+        $rsa->setPassword($this->config->getSystemValue('secret', ''));
78 78
 
79
-		if ($keyLength !== 1024 && $keyLength !== 2048 && $keyLength !== 4096) {
80
-			$keyLength = 1024;
81
-		}
79
+        if ($keyLength !== 1024 && $keyLength !== 2048 && $keyLength !== 4096) {
80
+            $keyLength = 1024;
81
+        }
82 82
 
83
-		return $rsa->createKey($keyLength);
84
-	}
83
+        return $rsa->createKey($keyLength);
84
+    }
85 85
 
86 86
 }
Please login to merge, or discard this patch.
lib/private/Repair/ClearFrontendCaches.php 1 patch
Indentation   +29 added lines, -29 removed lines patch added patch discarded remove patch
@@ -31,40 +31,40 @@
 block discarded – undo
31 31
 
32 32
 class ClearFrontendCaches implements IRepairStep {
33 33
 
34
-	/** @var ICacheFactory */
35
-	protected $cacheFactory;
34
+    /** @var ICacheFactory */
35
+    protected $cacheFactory;
36 36
 
37
-	/** @var SCSSCacher */
38
-	protected $scssCacher;
37
+    /** @var SCSSCacher */
38
+    protected $scssCacher;
39 39
 
40
-	/** @var JSCombiner */
41
-	protected $jsCombiner;
40
+    /** @var JSCombiner */
41
+    protected $jsCombiner;
42 42
 
43
-	public function __construct(ICacheFactory $cacheFactory,
44
-								SCSSCacher $SCSSCacher,
45
-								JSCombiner $JSCombiner) {
46
-		$this->cacheFactory = $cacheFactory;
47
-		$this->scssCacher = $SCSSCacher;
48
-		$this->jsCombiner = $JSCombiner;
49
-	}
43
+    public function __construct(ICacheFactory $cacheFactory,
44
+                                SCSSCacher $SCSSCacher,
45
+                                JSCombiner $JSCombiner) {
46
+        $this->cacheFactory = $cacheFactory;
47
+        $this->scssCacher = $SCSSCacher;
48
+        $this->jsCombiner = $JSCombiner;
49
+    }
50 50
 
51
-	public function getName() {
52
-		return 'Clear frontend caches';
53
-	}
51
+    public function getName() {
52
+        return 'Clear frontend caches';
53
+    }
54 54
 
55
-	public function run(IOutput $output) {
56
-		try {
57
-			$c = $this->cacheFactory->createDistributed('imagePath');
58
-			$c->clear();
59
-			$output->info('Image cache cleared');
55
+    public function run(IOutput $output) {
56
+        try {
57
+            $c = $this->cacheFactory->createDistributed('imagePath');
58
+            $c->clear();
59
+            $output->info('Image cache cleared');
60 60
 
61
-			$this->scssCacher->resetCache();
62
-			$output->info('SCSS cache cleared');
61
+            $this->scssCacher->resetCache();
62
+            $output->info('SCSS cache cleared');
63 63
 
64
-			$this->jsCombiner->resetCache();
65
-			$output->info('JS cache cleared');
66
-		} catch (\Exception $e) {
67
-			$output->warning('Unable to clear the frontend cache');
68
-		}
69
-	}
64
+            $this->jsCombiner->resetCache();
65
+            $output->info('JS cache cleared');
66
+        } catch (\Exception $e) {
67
+            $output->warning('Unable to clear the frontend cache');
68
+        }
69
+    }
70 70
 }
Please login to merge, or discard this patch.