Completed
Push — master ( aa525d...2bfa1c )
by Lukas
19:34
created
apps/user_ldap/templates/part.wizard-server.php 1 patch
Spacing   +22 added lines, -22 removed lines patch added patch discarded remove patch
@@ -1,16 +1,16 @@  discard block
 block discarded – undo
1 1
 <fieldset id="ldapWizard1">
2 2
 		<p>
3 3
 		<select id="ldap_serverconfig_chooser" name="ldap_serverconfig_chooser">
4
-		<?php if(count($_['serverConfigurationPrefixes']) === 0 ) {
4
+		<?php if (count($_['serverConfigurationPrefixes']) === 0) {
5 5
 			?>
6
-				<option value="" selected><?php p($l->t('1. Server'));?></option>');
6
+				<option value="" selected><?php p($l->t('1. Server')); ?></option>');
7 7
 			<?php
8 8
 		} else {
9 9
 			$i = 1;
10 10
 			$sel = ' selected';
11
-			foreach($_['serverConfigurationPrefixes'] as $prefix) {
11
+			foreach ($_['serverConfigurationPrefixes'] as $prefix) {
12 12
 				?>
13
-				<option value="<?php p($prefix); ?>"<?php p($sel); $sel = ''; ?>><?php p($l->t('%s. Server:', array($i++)));?> <?php p(' '.$_['serverConfigurationHosts'][$prefix]); ?></option>
13
+				<option value="<?php p($prefix); ?>"<?php p($sel); $sel = ''; ?>><?php p($l->t('%s. Server:', array($i++))); ?> <?php p(' '.$_['serverConfigurationHosts'][$prefix]); ?></option>
14 14
 				<?php
15 15
 			}
16 16
 		}
@@ -18,14 +18,14 @@  discard block
 block discarded – undo
18 18
 		</select>
19 19
 		<button type="button" id="ldap_action_add_configuration"
20 20
 			name="ldap_action_add_configuration" class="icon-add icon-default-style"
21
-			title="<?php p($l->t('Add a new configuration'));?>">&nbsp;</button>
21
+			title="<?php p($l->t('Add a new configuration')); ?>">&nbsp;</button>
22 22
 		<button type="button" id="ldap_action_copy_configuration"
23 23
 			name="ldap_action_copy_configuration"
24 24
 			class="ldapIconCopy icon-default-style"
25
-			title="<?php p($l->t('Copy current configuration into new directory binding'));?>">&nbsp;</button>
25
+			title="<?php p($l->t('Copy current configuration into new directory binding')); ?>">&nbsp;</button>
26 26
 		<button type="button" id="ldap_action_delete_configuration"
27 27
 			name="ldap_action_delete_configuration" class="icon-delete icon-default-style"
28
-			title="<?php p($l->t('Delete the current configuration'));?>">&nbsp;</button>
28
+			title="<?php p($l->t('Delete the current configuration')); ?>">&nbsp;</button>
29 29
 		</p>
30 30
 
31 31
 		<div class="hostPortCombinator">
@@ -34,14 +34,14 @@  discard block
 block discarded – undo
34 34
 					<div class="table">
35 35
 						<input type="text" class="host" id="ldap_host"
36 36
 							name="ldap_host"
37
-							placeholder="<?php p($l->t('Host'));?>"
38
-							title="<?php p($l->t('You can omit the protocol, unless you require SSL. If so, start with ldaps://'));?>"
37
+							placeholder="<?php p($l->t('Host')); ?>"
38
+							title="<?php p($l->t('You can omit the protocol, unless you require SSL. If so, start with ldaps://')); ?>"
39 39
 							/>
40 40
 						<span class="hostPortCombinatorSpan">
41 41
 							<input type="number" id="ldap_port" name="ldap_port"
42
-								placeholder="<?php p($l->t('Port'));?>" />
42
+								placeholder="<?php p($l->t('Port')); ?>" />
43 43
 							<button class="ldapDetectPort" name="ldapDetectPort" type="button">
44
-								<?php p($l->t('Detect Port'));?>
44
+								<?php p($l->t('Detect Port')); ?>
45 45
 							</button>
46 46
 						</span>
47 47
 					</div>
@@ -51,19 +51,19 @@  discard block
 block discarded – undo
51 51
 			<div class="tablerow">
52 52
 				<input type="text" id="ldap_dn" name="ldap_dn"
53 53
 				class="tablecell"
54
-				placeholder="<?php p($l->t('User DN'));?>" autocomplete="off"
55
-				title="<?php p($l->t('The DN of the client user with which the bind shall be done, e.g. uid=agent,dc=example,dc=com. For anonymous access, leave DN and Password empty.'));?>"
54
+				placeholder="<?php p($l->t('User DN')); ?>" autocomplete="off"
55
+				title="<?php p($l->t('The DN of the client user with which the bind shall be done, e.g. uid=agent,dc=example,dc=com. For anonymous access, leave DN and Password empty.')); ?>"
56 56
 				/>
57 57
 			</div>
58 58
 
59 59
 			<div class="tablerow">
60 60
 				<input type="password" id="ldap_agent_password"
61 61
 				class="tablecell" name="ldap_agent_password"
62
-				placeholder="<?php p($l->t('Password'));?>" autocomplete="off"
63
-				title="<?php p($l->t('For anonymous access, leave DN and Password empty.'));?>"
62
+				placeholder="<?php p($l->t('Password')); ?>" autocomplete="off"
63
+				title="<?php p($l->t('For anonymous access, leave DN and Password empty.')); ?>"
64 64
 				/>
65 65
 				<button class="ldapSaveAgentCredentials" name="ldapSaveAgentCredentials" type="button">
66
-					<?php p($l->t('Save Credentials'));?>
66
+					<?php p($l->t('Save Credentials')); ?>
67 67
 				</button>
68 68
 			</div>
69 69
 			<div class="tablerow">&nbsp;</div>
@@ -71,24 +71,24 @@  discard block
 block discarded – undo
71 71
 			<div class="tablerow">
72 72
 				<textarea id="ldap_base" name="ldap_base"
73 73
 					class="tablecell"
74
-					placeholder="<?php p($l->t('One Base DN per line'));?>"
75
-					title="<?php p($l->t('You can specify Base DN for users and groups in the Advanced tab'));?>">
74
+					placeholder="<?php p($l->t('One Base DN per line')); ?>"
75
+					title="<?php p($l->t('You can specify Base DN for users and groups in the Advanced tab')); ?>">
76 76
 				</textarea>
77 77
 				<button class="ldapDetectBase" name="ldapDetectBase" type="button">
78
-					<?php p($l->t('Detect Base DN'));?>
78
+					<?php p($l->t('Detect Base DN')); ?>
79 79
 				</button>
80 80
 				<button class="ldapTestBase" name="ldapTestBase" type="button">
81
-					<?php p($l->t('Test Base DN'));?>
81
+					<?php p($l->t('Test Base DN')); ?>
82 82
 				</button>
83 83
 			</div>
84 84
 
85 85
 			<div class="tablerow left">
86 86
 				<input type="checkbox" id="ldap_experienced_admin" value="1"
87 87
 					name="ldap_experienced_admin" class="tablecell"
88
-					title="<?php p($l->t('Avoids automatic LDAP requests. Better for bigger setups, but requires some LDAP knowledge.'));?>"
88
+					title="<?php p($l->t('Avoids automatic LDAP requests. Better for bigger setups, but requires some LDAP knowledge.')); ?>"
89 89
 					/>
90 90
 				<label for="ldap_experienced_admin" class="tablecell">
91
-					<?php p($l->t('Manually enter LDAP filters (recommended for large directories)'));?>
91
+					<?php p($l->t('Manually enter LDAP filters (recommended for large directories)')); ?>
92 92
 				</label>
93 93
 			</div>
94 94
 
Please login to merge, or discard this patch.
apps/user_ldap/lib/Configuration.php 1 patch
Spacing   +23 added lines, -23 removed lines patch added patch discarded remove patch
@@ -107,7 +107,7 @@  discard block
 block discarded – undo
107 107
 	 */
108 108
 	public function __construct($configPrefix, $autoRead = true) {
109 109
 		$this->configPrefix = $configPrefix;
110
-		if($autoRead) {
110
+		if ($autoRead) {
111 111
 			$this->readConfiguration();
112 112
 		}
113 113
 	}
@@ -117,7 +117,7 @@  discard block
 block discarded – undo
117 117
 	 * @return mixed|null
118 118
 	 */
119 119
 	public function __get($name) {
120
-		if(isset($this->config[$name])) {
120
+		if (isset($this->config[$name])) {
121 121
 			return $this->config[$name];
122 122
 		}
123 123
 		return null;
@@ -148,22 +148,22 @@  discard block
 block discarded – undo
148 148
 	 * @return false|null
149 149
 	 */
150 150
 	public function setConfiguration($config, &$applied = null) {
151
-		if(!is_array($config)) {
151
+		if (!is_array($config)) {
152 152
 			return false;
153 153
 		}
154 154
 
155 155
 		$cta = $this->getConfigTranslationArray();
156
-		foreach($config as $inputKey => $val) {
157
-			if(strpos($inputKey, '_') !== false && array_key_exists($inputKey, $cta)) {
156
+		foreach ($config as $inputKey => $val) {
157
+			if (strpos($inputKey, '_') !== false && array_key_exists($inputKey, $cta)) {
158 158
 				$key = $cta[$inputKey];
159
-			} elseif(array_key_exists($inputKey, $this->config)) {
159
+			} elseif (array_key_exists($inputKey, $this->config)) {
160 160
 				$key = $inputKey;
161 161
 			} else {
162 162
 				continue;
163 163
 			}
164 164
 
165 165
 			$setMethod = 'setValue';
166
-			switch($key) {
166
+			switch ($key) {
167 167
 				case 'ldapAgentPassword':
168 168
 					$setMethod = 'setRawValue';
169 169
 					break;
@@ -187,7 +187,7 @@  discard block
 block discarded – undo
187 187
 					break;
188 188
 			}
189 189
 			$this->$setMethod($key, $val);
190
-			if(is_array($applied)) {
190
+			if (is_array($applied)) {
191 191
 				$applied[] = $inputKey;
192 192
 				// storing key as index avoids duplication, and as value for simplicity
193 193
 			}
@@ -197,15 +197,15 @@  discard block
 block discarded – undo
197 197
 	}
198 198
 
199 199
 	public function readConfiguration() {
200
-		if(!$this->configRead && !is_null($this->configPrefix)) {
200
+		if (!$this->configRead && !is_null($this->configPrefix)) {
201 201
 			$cta = array_flip($this->getConfigTranslationArray());
202
-			foreach($this->config as $key => $val) {
203
-				if(!isset($cta[$key])) {
202
+			foreach ($this->config as $key => $val) {
203
+				if (!isset($cta[$key])) {
204 204
 					//some are determined
205 205
 					continue;
206 206
 				}
207 207
 				$dbKey = $cta[$key];
208
-				switch($key) {
208
+				switch ($key) {
209 209
 					case 'ldapBase':
210 210
 					case 'ldapBaseUsers':
211 211
 					case 'ldapBaseGroups':
@@ -248,7 +248,7 @@  discard block
 block discarded – undo
248 248
 	 */
249 249
 	public function saveConfiguration() {
250 250
 		$cta = array_flip($this->getConfigTranslationArray());
251
-		foreach($this->unsavedChanges as $key) {
251
+		foreach ($this->unsavedChanges as $key) {
252 252
 			$value = $this->config[$key];
253 253
 			switch ($key) {
254 254
 				case 'ldapAgentPassword':
@@ -264,7 +264,7 @@  discard block
 block discarded – undo
264 264
 				case 'ldapGroupFilterObjectclass':
265 265
 				case 'ldapGroupFilterGroups':
266 266
 				case 'ldapLoginFilterAttributes':
267
-					if(is_array($value)) {
267
+					if (is_array($value)) {
268 268
 						$value = implode("\n", $value);
269 269
 					}
270 270
 					break;
@@ -275,7 +275,7 @@  discard block
 block discarded – undo
275 275
 				case 'ldapUuidGroupAttribute':
276 276
 					continue 2;
277 277
 			}
278
-			if(is_null($value)) {
278
+			if (is_null($value)) {
279 279
 				$value = '';
280 280
 			}
281 281
 			$this->saveValue($cta[$key], $value);
@@ -289,7 +289,7 @@  discard block
 block discarded – undo
289 289
 	 */
290 290
 	protected function getMultiLine($varName) {
291 291
 		$value = $this->getValue($varName);
292
-		if(empty($value)) {
292
+		if (empty($value)) {
293 293
 			$value = '';
294 294
 		} else {
295 295
 			$value = preg_split('/\r\n|\r|\n/', $value);
@@ -305,21 +305,21 @@  discard block
 block discarded – undo
305 305
 	 * @param array|string $value to set
306 306
 	 */
307 307
 	protected function setMultiLine($varName, $value) {
308
-		if(empty($value)) {
308
+		if (empty($value)) {
309 309
 			$value = '';
310 310
 		} else if (!is_array($value)) {
311 311
 			$value = preg_split('/\r\n|\r|\n|;/', $value);
312
-			if($value === false) {
312
+			if ($value === false) {
313 313
 				$value = '';
314 314
 			}
315 315
 		}
316 316
 
317
-		if(!is_array($value)) {
317
+		if (!is_array($value)) {
318 318
 			$finalValue = trim($value);
319 319
 		} else {
320 320
 			$finalValue = [];
321
-			foreach($value as $key => $val) {
322
-				if(is_string($val)) {
321
+			foreach ($value as $key => $val) {
322
+				if (is_string($val)) {
323 323
 					$val = trim($val);
324 324
 					if ($val !== '') {
325 325
 						//accidental line breaks are not wanted and can cause
@@ -366,7 +366,7 @@  discard block
 block discarded – undo
366 366
 	 */
367 367
 	protected function getValue($varName) {
368 368
 		static $defaults;
369
-		if(is_null($defaults)) {
369
+		if (is_null($defaults)) {
370 370
 			$defaults = $this->getDefaults();
371 371
 		}
372 372
 		return \OCP\Config::getAppValue('user_ldap',
@@ -381,7 +381,7 @@  discard block
 block discarded – undo
381 381
 	 * @param mixed $value to set
382 382
 	 */
383 383
 	protected function setValue($varName, $value) {
384
-		if(is_string($value)) {
384
+		if (is_string($value)) {
385 385
 			$value = trim($value);
386 386
 		}
387 387
 		$this->config[$varName] = $value;
Please login to merge, or discard this patch.
apps/user_ldap/lib/Connection.php 1 patch
Spacing   +60 added lines, -60 removed lines patch added patch discarded remove patch
@@ -97,7 +97,7 @@  discard block
 block discarded – undo
97 97
 		$this->configuration = new Configuration($configPrefix,
98 98
 												 !is_null($configID));
99 99
 		$memcache = \OC::$server->getMemCacheFactory();
100
-		if($memcache->isAvailable()) {
100
+		if ($memcache->isAvailable()) {
101 101
 			$this->cache = $memcache->create();
102 102
 		}
103 103
 		$helper = new Helper(\OC::$server->getConfig());
@@ -109,7 +109,7 @@  discard block
 block discarded – undo
109 109
 	}
110 110
 
111 111
 	public function __destruct() {
112
-		if(!$this->dontDestruct && $this->ldap->isResource($this->ldapConnectionRes)) {
112
+		if (!$this->dontDestruct && $this->ldap->isResource($this->ldapConnectionRes)) {
113 113
 			@$this->ldap->unbind($this->ldapConnectionRes);
114 114
 		};
115 115
 	}
@@ -129,11 +129,11 @@  discard block
 block discarded – undo
129 129
 	 * @return bool|mixed
130 130
 	 */
131 131
 	public function __get($name) {
132
-		if(!$this->configured) {
132
+		if (!$this->configured) {
133 133
 			$this->readConfiguration();
134 134
 		}
135 135
 
136
-		if($name === 'hasPagedResultSupport') {
136
+		if ($name === 'hasPagedResultSupport') {
137 137
 			return $this->hasPagedResultSupport;
138 138
 		}
139 139
 
@@ -149,7 +149,7 @@  discard block
 block discarded – undo
149 149
 		$before = $this->configuration->$name;
150 150
 		$this->configuration->$name = $value;
151 151
 		$after = $this->configuration->$name;
152
-		if($before !== $after) {
152
+		if ($before !== $after) {
153 153
 			if ($this->configID !== '' && $this->configID !== null) {
154 154
 				$this->configuration->saveConfiguration();
155 155
 			}
@@ -164,7 +164,7 @@  discard block
 block discarded – undo
164 164
 	 * @param bool $state
165 165
 	 */
166 166
 	public function setIgnoreValidation($state) {
167
-		$this->ignoreValidation = (bool)$state;
167
+		$this->ignoreValidation = (bool) $state;
168 168
 	}
169 169
 
170 170
 	/**
@@ -180,14 +180,14 @@  discard block
 block discarded – undo
180 180
 	 * Returns the LDAP handler
181 181
 	 */
182 182
 	public function getConnectionResource() {
183
-		if(!$this->ldapConnectionRes) {
183
+		if (!$this->ldapConnectionRes) {
184 184
 			$this->init();
185
-		} else if(!$this->ldap->isResource($this->ldapConnectionRes)) {
185
+		} else if (!$this->ldap->isResource($this->ldapConnectionRes)) {
186 186
 			$this->ldapConnectionRes = null;
187 187
 			$this->establishConnection();
188 188
 		}
189
-		if(is_null($this->ldapConnectionRes)) {
190
-			\OCP\Util::writeLog('user_ldap', 'No LDAP Connection to server ' . $this->configuration->ldapHost, \OCP\Util::ERROR);
189
+		if (is_null($this->ldapConnectionRes)) {
190
+			\OCP\Util::writeLog('user_ldap', 'No LDAP Connection to server '.$this->configuration->ldapHost, \OCP\Util::ERROR);
191 191
 			throw new ServerNotAvailableException('Connection to LDAP server could not be established');
192 192
 		}
193 193
 		return $this->ldapConnectionRes;
@@ -197,7 +197,7 @@  discard block
 block discarded – undo
197 197
 	 * resets the connection resource
198 198
 	 */
199 199
 	public function resetConnectionResource() {
200
-		if(!is_null($this->ldapConnectionRes)) {
200
+		if (!is_null($this->ldapConnectionRes)) {
201 201
 			@$this->ldap->unbind($this->ldapConnectionRes);
202 202
 			$this->ldapConnectionRes = null;
203 203
 		}
@@ -209,7 +209,7 @@  discard block
 block discarded – undo
209 209
 	 */
210 210
 	private function getCacheKey($key) {
211 211
 		$prefix = 'LDAP-'.$this->configID.'-'.$this->configPrefix.'-';
212
-		if(is_null($key)) {
212
+		if (is_null($key)) {
213 213
 			return $prefix;
214 214
 		}
215 215
 		return $prefix.md5($key);
@@ -220,10 +220,10 @@  discard block
 block discarded – undo
220 220
 	 * @return mixed|null
221 221
 	 */
222 222
 	public function getFromCache($key) {
223
-		if(!$this->configured) {
223
+		if (!$this->configured) {
224 224
 			$this->readConfiguration();
225 225
 		}
226
-		if(is_null($this->cache) || !$this->configuration->ldapCacheTTL) {
226
+		if (is_null($this->cache) || !$this->configuration->ldapCacheTTL) {
227 227
 			return null;
228 228
 		}
229 229
 		$key = $this->getCacheKey($key);
@@ -238,10 +238,10 @@  discard block
 block discarded – undo
238 238
 	 * @return string
239 239
 	 */
240 240
 	public function writeToCache($key, $value) {
241
-		if(!$this->configured) {
241
+		if (!$this->configured) {
242 242
 			$this->readConfiguration();
243 243
 		}
244
-		if(is_null($this->cache)
244
+		if (is_null($this->cache)
245 245
 			|| !$this->configuration->ldapCacheTTL
246 246
 			|| !$this->configuration->ldapConfigurationActive) {
247 247
 			return null;
@@ -252,7 +252,7 @@  discard block
 block discarded – undo
252 252
 	}
253 253
 
254 254
 	public function clearCache() {
255
-		if(!is_null($this->cache)) {
255
+		if (!is_null($this->cache)) {
256 256
 			$this->cache->clear($this->getCacheKey(null));
257 257
 		}
258 258
 	}
@@ -264,7 +264,7 @@  discard block
 block discarded – undo
264 264
 	 * @return null
265 265
 	 */
266 266
 	private function readConfiguration($force = false) {
267
-		if((!$this->configured || $force) && !is_null($this->configID)) {
267
+		if ((!$this->configured || $force) && !is_null($this->configID)) {
268 268
 			$this->configuration->readConfiguration();
269 269
 			$this->configured = $this->validateConfiguration();
270 270
 		}
@@ -277,12 +277,12 @@  discard block
 block discarded – undo
277 277
 	 * @return boolean true if config validates, false otherwise. Check with $setParameters for detailed success on single parameters
278 278
 	 */
279 279
 	public function setConfiguration($config, &$setParameters = null) {
280
-		if(is_null($setParameters)) {
280
+		if (is_null($setParameters)) {
281 281
 			$setParameters = array();
282 282
 		}
283 283
 		$this->doNotValidate = false;
284 284
 		$this->configuration->setConfiguration($config, $setParameters);
285
-		if(count($setParameters) > 0) {
285
+		if (count($setParameters) > 0) {
286 286
 			$this->configured = $this->validateConfiguration();
287 287
 		}
288 288
 
@@ -309,10 +309,10 @@  discard block
 block discarded – undo
309 309
 		$config = $this->configuration->getConfiguration();
310 310
 		$cta = $this->configuration->getConfigTranslationArray();
311 311
 		$result = array();
312
-		foreach($cta as $dbkey => $configkey) {
313
-			switch($configkey) {
312
+		foreach ($cta as $dbkey => $configkey) {
313
+			switch ($configkey) {
314 314
 				case 'homeFolderNamingRule':
315
-					if(strpos($config[$configkey], 'attr:') === 0) {
315
+					if (strpos($config[$configkey], 'attr:') === 0) {
316 316
 						$result[$dbkey] = substr($config[$configkey], 5);
317 317
 					} else {
318 318
 						$result[$dbkey] = '';
@@ -323,7 +323,7 @@  discard block
 block discarded – undo
323 323
 				case 'ldapBaseGroups':
324 324
 				case 'ldapAttributesForUserSearch':
325 325
 				case 'ldapAttributesForGroupSearch':
326
-					if(is_array($config[$configkey])) {
326
+					if (is_array($config[$configkey])) {
327 327
 						$result[$dbkey] = implode("\n", $config[$configkey]);
328 328
 						break;
329 329
 					} //else follows default
@@ -336,23 +336,23 @@  discard block
 block discarded – undo
336 336
 
337 337
 	private function doSoftValidation() {
338 338
 		//if User or Group Base are not set, take over Base DN setting
339
-		foreach(array('ldapBaseUsers', 'ldapBaseGroups') as $keyBase) {
339
+		foreach (array('ldapBaseUsers', 'ldapBaseGroups') as $keyBase) {
340 340
 			$val = $this->configuration->$keyBase;
341
-			if(empty($val)) {
341
+			if (empty($val)) {
342 342
 				$this->configuration->$keyBase = $this->configuration->ldapBase;
343 343
 			}
344 344
 		}
345 345
 
346
-		foreach(array('ldapExpertUUIDUserAttr'  => 'ldapUuidUserAttribute',
346
+		foreach (array('ldapExpertUUIDUserAttr'  => 'ldapUuidUserAttribute',
347 347
 					  'ldapExpertUUIDGroupAttr' => 'ldapUuidGroupAttribute')
348 348
 				as $expertSetting => $effectiveSetting) {
349 349
 			$uuidOverride = $this->configuration->$expertSetting;
350
-			if(!empty($uuidOverride)) {
350
+			if (!empty($uuidOverride)) {
351 351
 				$this->configuration->$effectiveSetting = $uuidOverride;
352 352
 			} else {
353 353
 				$uuidAttributes = array('auto', 'entryuuid', 'nsuniqueid',
354 354
 										'objectguid', 'guid', 'ipauniqueid');
355
-				if(!in_array($this->configuration->$effectiveSetting,
355
+				if (!in_array($this->configuration->$effectiveSetting,
356 356
 							$uuidAttributes)
357 357
 					&& (!is_null($this->configID))) {
358 358
 					$this->configuration->$effectiveSetting = 'auto';
@@ -374,14 +374,14 @@  discard block
 block discarded – undo
374 374
 		//make sure empty search attributes are saved as simple, empty array
375 375
 		$saKeys = array('ldapAttributesForUserSearch',
376 376
 						'ldapAttributesForGroupSearch');
377
-		foreach($saKeys as $key) {
377
+		foreach ($saKeys as $key) {
378 378
 			$val = $this->configuration->$key;
379
-			if(is_array($val) && count($val) === 1 && empty($val[0])) {
379
+			if (is_array($val) && count($val) === 1 && empty($val[0])) {
380 380
 				$this->configuration->$key = array();
381 381
 			}
382 382
 		}
383 383
 
384
-		if((stripos($this->configuration->ldapHost, 'ldaps://') === 0)
384
+		if ((stripos($this->configuration->ldapHost, 'ldaps://') === 0)
385 385
 			&& $this->configuration->ldapTLS) {
386 386
 			$this->configuration->ldapTLS = false;
387 387
 			\OCP\Util::writeLog('user_ldap',
@@ -402,10 +402,10 @@  discard block
 block discarded – undo
402 402
 		//options that shall not be empty
403 403
 		$options = array('ldapHost', 'ldapPort', 'ldapUserDisplayName',
404 404
 						 'ldapGroupDisplayName', 'ldapLoginFilter');
405
-		foreach($options as $key) {
405
+		foreach ($options as $key) {
406 406
 			$val = $this->configuration->$key;
407
-			if(empty($val)) {
408
-				switch($key) {
407
+			if (empty($val)) {
408
+				switch ($key) {
409 409
 					case 'ldapHost':
410 410
 						$subj = 'LDAP Host';
411 411
 						break;
@@ -436,7 +436,7 @@  discard block
 block discarded – undo
436 436
 		$agent = $this->configuration->ldapAgentName;
437 437
 		$pwd = $this->configuration->ldapAgentPassword;
438 438
 		if (
439
-			($agent === ''  && $pwd !== '')
439
+			($agent === '' && $pwd !== '')
440 440
 			|| ($agent !== '' && $pwd === '')
441 441
 		) {
442 442
 			\OCP\Util::writeLog('user_ldap',
@@ -451,14 +451,14 @@  discard block
 block discarded – undo
451 451
 		$baseUsers = $this->configuration->ldapBaseUsers;
452 452
 		$baseGroups = $this->configuration->ldapBaseGroups;
453 453
 
454
-		if(empty($base) && empty($baseUsers) && empty($baseGroups)) {
454
+		if (empty($base) && empty($baseUsers) && empty($baseGroups)) {
455 455
 			\OCP\Util::writeLog('user_ldap',
456 456
 								$errorStr.'Not a single Base DN given.',
457 457
 								\OCP\Util::WARN);
458 458
 			$configurationOK = false;
459 459
 		}
460 460
 
461
-		if(mb_strpos($this->configuration->ldapLoginFilter, '%uid', 0, 'UTF-8')
461
+		if (mb_strpos($this->configuration->ldapLoginFilter, '%uid', 0, 'UTF-8')
462 462
 		   === false) {
463 463
 			\OCP\Util::writeLog('user_ldap',
464 464
 								$errorStr.'login filter does not contain %uid '.
@@ -476,7 +476,7 @@  discard block
 block discarded – undo
476 476
 	 */
477 477
 	private function validateConfiguration() {
478 478
 
479
-		if($this->doNotValidate) {
479
+		if ($this->doNotValidate) {
480 480
 			//don't do a validation if it is a new configuration with pure
481 481
 			//default values. Will be allowed on changes via __set or
482 482
 			//setConfiguration
@@ -497,21 +497,21 @@  discard block
 block discarded – undo
497 497
 	 * Connects and Binds to LDAP
498 498
 	 */
499 499
 	private function establishConnection() {
500
-		if(!$this->configuration->ldapConfigurationActive) {
500
+		if (!$this->configuration->ldapConfigurationActive) {
501 501
 			return null;
502 502
 		}
503 503
 		static $phpLDAPinstalled = true;
504
-		if(!$phpLDAPinstalled) {
504
+		if (!$phpLDAPinstalled) {
505 505
 			return false;
506 506
 		}
507
-		if(!$this->ignoreValidation && !$this->configured) {
507
+		if (!$this->ignoreValidation && !$this->configured) {
508 508
 			\OCP\Util::writeLog('user_ldap',
509 509
 								'Configuration is invalid, cannot connect',
510 510
 								\OCP\Util::WARN);
511 511
 			return false;
512 512
 		}
513
-		if(!$this->ldapConnectionRes) {
514
-			if(!$this->ldap->areLDAPFunctionsAvailable()) {
513
+		if (!$this->ldapConnectionRes) {
514
+			if (!$this->ldap->areLDAPFunctionsAvailable()) {
515 515
 				$phpLDAPinstalled = false;
516 516
 				\OCP\Util::writeLog('user_ldap',
517 517
 									'function ldap_connect is not available. Make '.
@@ -520,8 +520,8 @@  discard block
 block discarded – undo
520 520
 
521 521
 				return false;
522 522
 			}
523
-			if($this->configuration->turnOffCertCheck) {
524
-				if(putenv('LDAPTLS_REQCERT=never')) {
523
+			if ($this->configuration->turnOffCertCheck) {
524
+				if (putenv('LDAPTLS_REQCERT=never')) {
525 525
 					\OCP\Util::writeLog('user_ldap',
526 526
 						'Turned off SSL certificate validation successfully.',
527 527
 						\OCP\Util::DEBUG);
@@ -545,23 +545,23 @@  discard block
 block discarded – undo
545 545
 					$error = $this->ldap->isResource($this->ldapConnectionRes) ?
546 546
 						$this->ldap->errno($this->ldapConnectionRes) : -1;
547 547
 				}
548
-				if($bindStatus === true) {
548
+				if ($bindStatus === true) {
549 549
 					return $bindStatus;
550 550
 				}
551 551
 			} catch (ServerNotAvailableException $e) {
552
-				if(!$isBackupHost) {
552
+				if (!$isBackupHost) {
553 553
 					throw $e;
554 554
 				}
555 555
 			}
556 556
 
557 557
 			//if LDAP server is not reachable, try the Backup (Replica!) Server
558
-			if($isBackupHost && ($error !== 0 || $isOverrideMainServer)) {
558
+			if ($isBackupHost && ($error !== 0 || $isOverrideMainServer)) {
559 559
 				$this->doConnect($this->configuration->ldapBackupHost,
560 560
 								 $this->configuration->ldapBackupPort);
561 561
 				$bindStatus = $this->bind();
562 562
 				$error = $this->ldap->isResource($this->ldapConnectionRes) ?
563 563
 					$this->ldap->errno($this->ldapConnectionRes) : -1;
564
-				if($bindStatus && $error === 0 && !$this->getFromCache('overrideMainServer')) {
564
+				if ($bindStatus && $error === 0 && !$this->getFromCache('overrideMainServer')) {
565 565
 					//when bind to backup server succeeded and failed to main server,
566 566
 					//skip contacting him until next cache refresh
567 567
 					$this->writeToCache('overrideMainServer', true);
@@ -586,17 +586,17 @@  discard block
 block discarded – undo
586 586
 
587 587
 		$this->ldapConnectionRes = $this->ldap->connect($host, $port);
588 588
 
589
-		if(!$this->ldap->setOption($this->ldapConnectionRes, LDAP_OPT_PROTOCOL_VERSION, 3)) {
589
+		if (!$this->ldap->setOption($this->ldapConnectionRes, LDAP_OPT_PROTOCOL_VERSION, 3)) {
590 590
 			throw new ServerNotAvailableException('Could not set required LDAP Protocol version.');
591 591
 		}
592 592
 
593
-		if(!$this->ldap->setOption($this->ldapConnectionRes, LDAP_OPT_REFERRALS, 0)) {
593
+		if (!$this->ldap->setOption($this->ldapConnectionRes, LDAP_OPT_REFERRALS, 0)) {
594 594
 			throw new ServerNotAvailableException('Could not disable LDAP referrals.');
595 595
 		}
596 596
 
597
-		if($this->configuration->ldapTLS) {
598
-			if(!$this->ldap->startTls($this->ldapConnectionRes)) {
599
-				throw new ServerNotAvailableException('Start TLS failed, when connecting to LDAP host ' . $host . '.');
597
+		if ($this->configuration->ldapTLS) {
598
+			if (!$this->ldap->startTls($this->ldapConnectionRes)) {
599
+				throw new ServerNotAvailableException('Start TLS failed, when connecting to LDAP host '.$host.'.');
600 600
 			}
601 601
 		}
602 602
 
@@ -607,25 +607,25 @@  discard block
 block discarded – undo
607 607
 	 * Binds to LDAP
608 608
 	 */
609 609
 	public function bind() {
610
-		if(!$this->configuration->ldapConfigurationActive) {
610
+		if (!$this->configuration->ldapConfigurationActive) {
611 611
 			return false;
612 612
 		}
613 613
 		$cr = $this->getConnectionResource();
614
-		if(!$this->ldap->isResource($cr)) {
614
+		if (!$this->ldap->isResource($cr)) {
615 615
 			return false;
616 616
 		}
617 617
 		$ldapLogin = @$this->ldap->bind($cr,
618 618
 										$this->configuration->ldapAgentName,
619 619
 										$this->configuration->ldapAgentPassword);
620
-		if(!$ldapLogin) {
620
+		if (!$ldapLogin) {
621 621
 			$errno = $this->ldap->errno($cr);
622 622
 
623 623
 			\OCP\Util::writeLog('user_ldap',
624
-				'Bind failed: ' . $errno . ': ' . $this->ldap->error($cr),
624
+				'Bind failed: '.$errno.': '.$this->ldap->error($cr),
625 625
 				\OCP\Util::WARN);
626 626
 
627 627
 			// Set to failure mode, if LDAP error code is not LDAP_SUCCESS or LDAP_INVALID_CREDENTIALS
628
-			if($errno !== 0x00 && $errno !== 0x31) {
628
+			if ($errno !== 0x00 && $errno !== 0x31) {
629 629
 				$this->ldapConnectionRes = null;
630 630
 			}
631 631
 
Please login to merge, or discard this patch.