@@ -37,7 +37,7 @@ |
||
37 | 37 | * Creates a Folder that represents a non-existing path |
38 | 38 | * |
39 | 39 | * @param string $path path |
40 | - * @return string non-existing node class |
|
40 | + * @return NonExistingFolder non-existing node class |
|
41 | 41 | */ |
42 | 42 | protected function createNonExistingNode($path) { |
43 | 43 | return new NonExistingFolder($this->root, $this->view, $path); |
@@ -33,6 +33,7 @@ |
||
33 | 33 | * |
34 | 34 | * @returns string |
35 | 35 | * @since 12 |
36 | + * @return string |
|
36 | 37 | */ |
37 | 38 | public function getIcon(); |
38 | 39 | } |
@@ -139,6 +139,9 @@ |
||
139 | 139 | return false; |
140 | 140 | } |
141 | 141 | |
142 | + /** |
|
143 | + * @param string $path |
|
144 | + */ |
|
142 | 145 | public function writeBack($tmpFile, $path) { |
143 | 146 | $this->uploadFile($tmpFile, $path); |
144 | 147 | unlink($tmpFile); |
@@ -616,6 +616,9 @@ |
||
616 | 616 | return $this->container; |
617 | 617 | } |
618 | 618 | |
619 | + /** |
|
620 | + * @param string $path |
|
621 | + */ |
|
619 | 622 | public function writeBack($tmpFile, $path) { |
620 | 623 | $fileData = fopen($tmpFile, 'r'); |
621 | 624 | $this->getContainer()->uploadObject($path, $fileData); |
@@ -597,7 +597,7 @@ |
||
597 | 597 | * publish activity |
598 | 598 | * |
599 | 599 | * @param string $subject |
600 | - * @param array $parameters |
|
600 | + * @param string[] $parameters |
|
601 | 601 | * @param string $affectedUser |
602 | 602 | * @param int $fileId |
603 | 603 | * @param string $filePath |
@@ -358,7 +358,7 @@ discard block |
||
358 | 358 | * split user and remote from federated cloud id |
359 | 359 | * |
360 | 360 | * @param string $address federated share address |
361 | - * @return array [user, remoteURL] |
|
361 | + * @return string[] [user, remoteURL] |
|
362 | 362 | * @throws \Exception |
363 | 363 | */ |
364 | 364 | public function splitUserRemote($address) { |
@@ -633,6 +633,9 @@ discard block |
||
633 | 633 | return $result; |
634 | 634 | } |
635 | 635 | |
636 | + /** |
|
637 | + * @param string $search |
|
638 | + */ |
|
636 | 639 | protected function getLookup($search) { |
637 | 640 | $isEnabled = $this->config->getAppValue('files_sharing', 'lookupServerEnabled', 'no'); |
638 | 641 | $result = []; |
@@ -225,7 +225,7 @@ |
||
225 | 225 | /** |
226 | 226 | * creates a array with all user data |
227 | 227 | * |
228 | - * @param $userId |
|
228 | + * @param string $userId |
|
229 | 229 | * @return array |
230 | 230 | * @throws OCSException |
231 | 231 | */ |
@@ -124,6 +124,9 @@ |
||
124 | 124 | return $nextPrefix; |
125 | 125 | } |
126 | 126 | |
127 | + /** |
|
128 | + * @param string $value |
|
129 | + */ |
|
127 | 130 | private function getServersConfig($value) { |
128 | 131 | $regex = '/' . $value . '$/S'; |
129 | 132 |
@@ -104,6 +104,10 @@ |
||
104 | 104 | // TODO: dont check/enforce 2FA if a auth token is used |
105 | 105 | } |
106 | 106 | |
107 | + /** |
|
108 | + * @param Controller $controller |
|
109 | + * @param string $methodName |
|
110 | + */ |
|
107 | 111 | private function checkTwoFactor($controller, $methodName, IUser $user) { |
108 | 112 | // If two-factor auth is in progress disallow access to any controllers |
109 | 113 | // defined within "LoginController". |