@@ -141,12 +141,12 @@ discard block |
||
141 | 141 | return $storage->getId(); |
142 | 142 | }, $storages)); |
143 | 143 | |
144 | - $availableStorages = array_map(function (Storage\IStorage $storage, StorageConfig $storageConfig) { |
|
144 | + $availableStorages = array_map(function(Storage\IStorage $storage, StorageConfig $storageConfig) { |
|
145 | 145 | try { |
146 | 146 | $availability = $storage->getAvailability(); |
147 | 147 | if (!$availability['available'] && !Availability::shouldRecheck($availability)) { |
148 | 148 | $storage = new FailedStorage([ |
149 | - 'exception' => new StorageNotAvailableException('Storage with mount id ' . $storageConfig->getId() . ' is not available') |
|
149 | + 'exception' => new StorageNotAvailableException('Storage with mount id '.$storageConfig->getId().' is not available') |
|
150 | 150 | ]); |
151 | 151 | } |
152 | 152 | } catch (\Exception $e) { |
@@ -162,7 +162,7 @@ discard block |
||
162 | 162 | $this->userStoragesService, |
163 | 163 | $storageConfig->getId(), |
164 | 164 | $storage, |
165 | - '/' . $user->getUID() . '/files' . $storageConfig->getMountPoint(), |
|
165 | + '/'.$user->getUID().'/files'.$storageConfig->getMountPoint(), |
|
166 | 166 | null, |
167 | 167 | $loader, |
168 | 168 | $storageConfig->getMountOptions() |
@@ -170,7 +170,7 @@ discard block |
||
170 | 170 | } else { |
171 | 171 | return new ExternalMountPoint( |
172 | 172 | $storage, |
173 | - '/' . $user->getUID() . '/files' . $storageConfig->getMountPoint(), |
|
173 | + '/'.$user->getUID().'/files'.$storageConfig->getMountPoint(), |
|
174 | 174 | null, |
175 | 175 | $loader, |
176 | 176 | $storageConfig->getMountOptions(), |
@@ -1,11 +1,11 @@ discard block |
||
1 | 1 | <fieldset id="ldapWizard2"> |
2 | 2 | <div> |
3 | 3 | <p> |
4 | - <?php p($l->t('Listing and searching for users is constrained by these criteria:'));?> |
|
4 | + <?php p($l->t('Listing and searching for users is constrained by these criteria:')); ?> |
|
5 | 5 | </p> |
6 | 6 | <p> |
7 | 7 | <label for="ldap_userfilter_objectclass"> |
8 | - <?php p($l->t('Only these object classes:'));?> |
|
8 | + <?php p($l->t('Only these object classes:')); ?> |
|
9 | 9 | </label> |
10 | 10 | |
11 | 11 | <select id="ldap_userfilter_objectclass" multiple="multiple" |
@@ -14,14 +14,14 @@ discard block |
||
14 | 14 | </p> |
15 | 15 | <p> |
16 | 16 | <label></label> |
17 | - <span class="ldapInputColElement"><?php p($l->t('The most common object classes for users are organizationalPerson, person, user, and inetOrgPerson. If you are not sure which object class to select, please consult your directory admin.'));?></span> |
|
17 | + <span class="ldapInputColElement"><?php p($l->t('The most common object classes for users are organizationalPerson, person, user, and inetOrgPerson. If you are not sure which object class to select, please consult your directory admin.')); ?></span> |
|
18 | 18 | </p> |
19 | 19 | <p> |
20 | 20 | <label for="ldap_userfilter_groups"> |
21 | - <?php p($l->t('Only from these groups:'));?> |
|
21 | + <?php p($l->t('Only from these groups:')); ?> |
|
22 | 22 | </label> |
23 | 23 | |
24 | - <input type="text" class="ldapManyGroupsSupport ldapManyGroupsSearch hidden" placeholder="<?php p($l->t('Search groups'));?>" /> |
|
24 | + <input type="text" class="ldapManyGroupsSupport ldapManyGroupsSearch hidden" placeholder="<?php p($l->t('Search groups')); ?>" /> |
|
25 | 25 | |
26 | 26 | <select id="ldap_userfilter_groups" multiple="multiple" |
27 | 27 | name="ldap_userfilter_groups" class="multiSelectPlugin"> |
@@ -30,26 +30,26 @@ discard block |
||
30 | 30 | <p class="ldapManyGroupsSupport hidden"> |
31 | 31 | <label></label> |
32 | 32 | <select class="ldapGroupList ldapGroupListAvailable" multiple="multiple" |
33 | - title="<?php p($l->t('Available groups'));?>"></select> |
|
33 | + title="<?php p($l->t('Available groups')); ?>"></select> |
|
34 | 34 | <span class="buttonSpan"> |
35 | 35 | <button class="ldapGroupListSelect" type="button">></button><br/> |
36 | 36 | <button class="ldapGroupListDeselect" type="button"><</button> |
37 | 37 | </span> |
38 | 38 | <select class="ldapGroupList ldapGroupListSelected" multiple="multiple" |
39 | - title="<?php p($l->t('Selected groups'));?>"></select> |
|
39 | + title="<?php p($l->t('Selected groups')); ?>"></select> |
|
40 | 40 | </p> |
41 | 41 | <p> |
42 | - <label><a id='toggleRawUserFilter' class='ldapToggle'>↓ <?php p($l->t('Edit LDAP Query'));?></a></label> |
|
42 | + <label><a id='toggleRawUserFilter' class='ldapToggle'>↓ <?php p($l->t('Edit LDAP Query')); ?></a></label> |
|
43 | 43 | </p> |
44 | 44 | <p id="ldapReadOnlyUserFilterContainer" class="hidden ldapReadOnlyFilterContainer"> |
45 | - <label><?php p($l->t('LDAP Filter:'));?></label> |
|
45 | + <label><?php p($l->t('LDAP Filter:')); ?></label> |
|
46 | 46 | <span class="ldapFilterReadOnlyElement ldapInputColElement"></span> |
47 | 47 | </p> |
48 | 48 | <p id="rawUserFilterContainer"> |
49 | 49 | <textarea type="text" id="ldap_userlist_filter" name="ldap_userlist_filter" |
50 | 50 | class="ldapFilterInputElement" |
51 | - placeholder="<?php p($l->t('Edit LDAP Query'));?>" |
|
52 | - title="<?php p($l->t('The filter specifies which LDAP users shall have access to the %s instance.', [$theme->getName()]));?>"> |
|
51 | + placeholder="<?php p($l->t('Edit LDAP Query')); ?>" |
|
52 | + title="<?php p($l->t('The filter specifies which LDAP users shall have access to the %s instance.', [$theme->getName()])); ?>"> |
|
53 | 53 | </textarea> |
54 | 54 | </p> |
55 | 55 | <p> |
@@ -57,7 +57,7 @@ discard block |
||
57 | 57 | </p> |
58 | 58 | <p class="ldap_count"> |
59 | 59 | <button class="ldapGetEntryCount ldapGetUserCount" name="ldapGetEntryCount" type="button"> |
60 | - <?php p($l->t('Verify settings and count users'));?> |
|
60 | + <?php p($l->t('Verify settings and count users')); ?> |
|
61 | 61 | </button> |
62 | 62 | <span id="ldap_user_count"></span> |
63 | 63 | </p> |
@@ -1,11 +1,11 @@ discard block |
||
1 | 1 | <fieldset id="ldapWizard4"> |
2 | 2 | <div> |
3 | 3 | <p> |
4 | - <?php p($l->t('Groups meeting these criteria are available in %s:', [$theme->getName()]));?> |
|
4 | + <?php p($l->t('Groups meeting these criteria are available in %s:', [$theme->getName()])); ?> |
|
5 | 5 | </p> |
6 | 6 | <p> |
7 | 7 | <label for="ldap_groupfilter_objectclass"> |
8 | - <?php p($l->t('Only these object classes:'));?> |
|
8 | + <?php p($l->t('Only these object classes:')); ?> |
|
9 | 9 | </label> |
10 | 10 | |
11 | 11 | <select id="ldap_groupfilter_objectclass" multiple="multiple" |
@@ -14,10 +14,10 @@ discard block |
||
14 | 14 | </p> |
15 | 15 | <p> |
16 | 16 | <label for="ldap_groupfilter_groups"> |
17 | - <?php p($l->t('Only from these groups:'));?> |
|
17 | + <?php p($l->t('Only from these groups:')); ?> |
|
18 | 18 | </label> |
19 | 19 | |
20 | - <input type="text" class="ldapManyGroupsSupport ldapManyGroupsSearch hidden" placeholder="<?php p($l->t('Search groups'));?>" /> |
|
20 | + <input type="text" class="ldapManyGroupsSupport ldapManyGroupsSearch hidden" placeholder="<?php p($l->t('Search groups')); ?>" /> |
|
21 | 21 | |
22 | 22 | <select id="ldap_groupfilter_groups" multiple="multiple" |
23 | 23 | name="ldap_groupfilter_groups" class="multiSelectPlugin"> |
@@ -27,25 +27,25 @@ discard block |
||
27 | 27 | <p class="ldapManyGroupsSupport hidden"> |
28 | 28 | <label></label> |
29 | 29 | <select class="ldapGroupList ldapGroupListAvailable" multiple="multiple" |
30 | - title="<?php p($l->t('Available groups'));?>"></select> |
|
30 | + title="<?php p($l->t('Available groups')); ?>"></select> |
|
31 | 31 | <span class="buttonSpan"> |
32 | 32 | <button class="ldapGroupListSelect" type="button">></button><br/> |
33 | 33 | <button class="ldapGroupListDeselect" type="button"><</button> |
34 | 34 | </span> |
35 | 35 | <select class="ldapGroupList ldapGroupListSelected" multiple="multiple" |
36 | - title="<?php p($l->t('Selected groups'));?>"></select> |
|
36 | + title="<?php p($l->t('Selected groups')); ?>"></select> |
|
37 | 37 | </p> |
38 | 38 | <p> |
39 | - <label><a id='toggleRawGroupFilter' class='ldapToggle'>↓ <?php p($l->t('Edit LDAP Query'));?></a></label> |
|
39 | + <label><a id='toggleRawGroupFilter' class='ldapToggle'>↓ <?php p($l->t('Edit LDAP Query')); ?></a></label> |
|
40 | 40 | </p> |
41 | 41 | <p id="ldapReadOnlyGroupFilterContainer" class="hidden ldapReadOnlyFilterContainer"> |
42 | - <label><?php p($l->t('LDAP Filter:'));?></label> |
|
42 | + <label><?php p($l->t('LDAP Filter:')); ?></label> |
|
43 | 43 | <span class="ldapFilterReadOnlyElement ldapInputColElement"></span> |
44 | 44 | </p> |
45 | 45 | <p id="rawGroupFilterContainer" class="invisible"> |
46 | 46 | <textarea type="text" id="ldap_group_filter" name="ldap_group_filter" |
47 | - placeholder="<?php p($l->t('Edit LDAP Query'));?>" |
|
48 | - title="<?php p($l->t('The filter specifies which LDAP groups shall have access to the %s instance.', [$theme->getName()]));?>"> |
|
47 | + placeholder="<?php p($l->t('Edit LDAP Query')); ?>" |
|
48 | + title="<?php p($l->t('The filter specifies which LDAP groups shall have access to the %s instance.', [$theme->getName()])); ?>"> |
|
49 | 49 | </textarea> |
50 | 50 | </p> |
51 | 51 | <p> |
@@ -53,7 +53,7 @@ discard block |
||
53 | 53 | </p> |
54 | 54 | <p class="ldap_count"> |
55 | 55 | <button class="ldapGetEntryCount ldapGetGroupCount" name="ldapGetEntryCount" type="button"> |
56 | - <?php p($l->t('Verify settings and count the groups'));?> |
|
56 | + <?php p($l->t('Verify settings and count the groups')); ?> |
|
57 | 57 | </button> |
58 | 58 | <span id="ldap_group_count"></span> |
59 | 59 | </p> |
@@ -1,29 +1,29 @@ discard block |
||
1 | 1 | <fieldset id="ldapWizard3"> |
2 | 2 | <div> |
3 | 3 | <p> |
4 | - <?php p($l->t('When logging in, %s will find the user based on the following attributes:', [$theme->getName()]));?> |
|
4 | + <?php p($l->t('When logging in, %s will find the user based on the following attributes:', [$theme->getName()])); ?> |
|
5 | 5 | </p> |
6 | 6 | <p> |
7 | 7 | <label for="ldap_loginfilter_username"> |
8 | - <?php p($l->t('LDAP / AD Username:'));?> |
|
8 | + <?php p($l->t('LDAP / AD Username:')); ?> |
|
9 | 9 | </label> |
10 | 10 | |
11 | 11 | <input type="checkbox" id="ldap_loginfilter_username" |
12 | - title="<?php p($l->t('Allows login against the LDAP / AD username, which is either "uid" or "sAMAccountName" and will be detected.'));?>" |
|
12 | + title="<?php p($l->t('Allows login against the LDAP / AD username, which is either "uid" or "sAMAccountName" and will be detected.')); ?>" |
|
13 | 13 | name="ldap_loginfilter_username" value="1" /> |
14 | 14 | </p> |
15 | 15 | <p> |
16 | 16 | <label for="ldap_loginfilter_email"> |
17 | - <?php p($l->t('LDAP / AD Email Address:'));?> |
|
17 | + <?php p($l->t('LDAP / AD Email Address:')); ?> |
|
18 | 18 | </label> |
19 | 19 | |
20 | 20 | <input type="checkbox" id="ldap_loginfilter_email" |
21 | - title="<?php p($l->t('Allows login against an email attribute. "mail" and "mailPrimaryAddress" allowed.'));?>" |
|
21 | + title="<?php p($l->t('Allows login against an email attribute. "mail" and "mailPrimaryAddress" allowed.')); ?>" |
|
22 | 22 | name="ldap_loginfilter_email" value="1" /> |
23 | 23 | </p> |
24 | 24 | <p> |
25 | 25 | <label for="ldap_loginfilter_attributes"> |
26 | - <?php p($l->t('Other Attributes:'));?> |
|
26 | + <?php p($l->t('Other Attributes:')); ?> |
|
27 | 27 | </label> |
28 | 28 | |
29 | 29 | <select id="ldap_loginfilter_attributes" multiple="multiple" |
@@ -31,17 +31,17 @@ discard block |
||
31 | 31 | </select> |
32 | 32 | </p> |
33 | 33 | <p> |
34 | - <label><a id='toggleRawLoginFilter' class='ldapToggle'>↓ <?php p($l->t('Edit LDAP Query'));?></a></label> |
|
34 | + <label><a id='toggleRawLoginFilter' class='ldapToggle'>↓ <?php p($l->t('Edit LDAP Query')); ?></a></label> |
|
35 | 35 | </p> |
36 | 36 | <p id="ldapReadOnlyLoginFilterContainer" class="hidden ldapReadOnlyFilterContainer"> |
37 | - <label><?php p($l->t('LDAP Filter:'));?></label> |
|
37 | + <label><?php p($l->t('LDAP Filter:')); ?></label> |
|
38 | 38 | <span class="ldapFilterReadOnlyElement ldapInputColElement"></span> |
39 | 39 | </p> |
40 | 40 | <p id="rawLoginFilterContainer" class="invisible"> |
41 | 41 | <textarea type="text" id="ldap_login_filter" name="ldap_login_filter" |
42 | 42 | class="ldapFilterInputElement" |
43 | - placeholder="<?php p($l->t('Edit LDAP Query'));?>" |
|
44 | - title="<?php p($l->t('Defines the filter to apply, when login is attempted. "%%uid" replaces the username in the login action. Example: "uid=%%uid"'));?>"> |
|
43 | + placeholder="<?php p($l->t('Edit LDAP Query')); ?>" |
|
44 | + title="<?php p($l->t('Defines the filter to apply, when login is attempted. "%%uid" replaces the username in the login action. Example: "uid=%%uid"')); ?>"> |
|
45 | 45 | </textarea> |
46 | 46 | </p> |
47 | 47 | <p> |
@@ -49,11 +49,11 @@ discard block |
||
49 | 49 | </p> |
50 | 50 | <p class="ldap_verify"> |
51 | 51 | <input type="text" id="ldap_test_loginname" name="ldap_test_loginname" |
52 | - placeholder="<?php p($l->t('Test Loginname'));?>" |
|
52 | + placeholder="<?php p($l->t('Test Loginname')); ?>" |
|
53 | 53 | class="ldapVerifyInput" |
54 | 54 | title="Attempts to receive a DN for the given loginname and the current login filter"/> |
55 | 55 | <button class="ldapVerifyLoginName" name="ldapTestLoginSettings" type="button" disabled="disabled"> |
56 | - <?php p($l->t('Verify settings'));?> |
|
56 | + <?php p($l->t('Verify settings')); ?> |
|
57 | 57 | </button> |
58 | 58 | </p> |
59 | 59 | <?php print_unescaped($_['wizardControls']); ?> |
@@ -14,7 +14,7 @@ discard block |
||
14 | 14 | <ul> |
15 | 15 | <li><?php p($l->t('Remote Address: %s', [$_['remoteAddr']])) ?></li> |
16 | 16 | <li><?php p($l->t('Request ID: %s', [$_['requestID']])) ?></li> |
17 | - <?php if($_['debugMode']): ?> |
|
17 | + <?php if ($_['debugMode']): ?> |
|
18 | 18 | <li><?php p($l->t('Type: %s', [$_['errorClass']])) ?></li> |
19 | 19 | <li><?php p($l->t('Code: %s', [$_['errorCode']])) ?></li> |
20 | 20 | <li><?php p($l->t('Message: %s', [$_['errorMsg']])) ?></li> |
@@ -23,7 +23,7 @@ discard block |
||
23 | 23 | <?php endif; ?> |
24 | 24 | </ul> |
25 | 25 | |
26 | - <?php if($_['debugMode']): ?> |
|
26 | + <?php if ($_['debugMode']): ?> |
|
27 | 27 | <br /> |
28 | 28 | <h3><?php p($l->t('Trace')) ?></h3> |
29 | 29 | <pre><?php p($_['trace']) ?></pre> |
@@ -110,7 +110,7 @@ discard block |
||
110 | 110 | $activity->setApp('systemtags') |
111 | 111 | ->setType('systemtags') |
112 | 112 | ->setAuthor($actor) |
113 | - ->setObject('systemtag', (int)$tag->getId(), $tag->getName()); |
|
113 | + ->setObject('systemtag', (int) $tag->getId(), $tag->getName()); |
|
114 | 114 | if ($event->getEvent() === ManagerEvent::EVENT_CREATE) { |
115 | 115 | $activity->setSubject(Provider::CREATE_TAG, [ |
116 | 116 | $actor, |
@@ -150,7 +150,7 @@ discard block |
||
150 | 150 | */ |
151 | 151 | public function mapperEvent(MapperEvent $event) { |
152 | 152 | $tagIds = $event->getTags(); |
153 | - if ($event->getObjectType() !== 'files' ||empty($tagIds) |
|
153 | + if ($event->getObjectType() !== 'files' || empty($tagIds) |
|
154 | 154 | || !in_array($event->getEvent(), [MapperEvent::EVENT_ASSIGN, MapperEvent::EVENT_UNASSIGN]) |
155 | 155 | || !$this->appManager->isInstalled('activity')) { |
156 | 156 | // System tags not for files, no tags, not (un-)assigning or no activity-app enabled (save the energy) |
@@ -202,7 +202,7 @@ discard block |
||
202 | 202 | ->setObject($event->getObjectType(), (int) $event->getObjectId()); |
203 | 203 | |
204 | 204 | foreach ($users as $user => $path) { |
205 | - $user = (string)$user; // numerical ids could be ints which are not accepted everywhere |
|
205 | + $user = (string) $user; // numerical ids could be ints which are not accepted everywhere |
|
206 | 206 | $activity->setAffectedUser($user); |
207 | 207 | |
208 | 208 | foreach ($tags as $tag) { |
@@ -157,11 +157,11 @@ discard block |
||
157 | 157 | } |
158 | 158 | |
159 | 159 | if ($outputType === self::OUTPUT_FORMAT_JSON || $outputType === self::OUTPUT_FORMAT_JSON_PRETTY) { |
160 | - $keys = array_map(function ($header) { |
|
160 | + $keys = array_map(function($header) { |
|
161 | 161 | return strtolower(str_replace(' ', '_', $header)); |
162 | 162 | }, $headers); |
163 | 163 | |
164 | - $pairs = array_map(function (StorageConfig $config) use ($keys, $userId) { |
|
164 | + $pairs = array_map(function(StorageConfig $config) use ($keys, $userId) { |
|
165 | 165 | $values = [ |
166 | 166 | $config->getId(), |
167 | 167 | $config->getMountPoint(), |
@@ -195,23 +195,23 @@ discard block |
||
195 | 195 | 'encoding_compatibility' => false, |
196 | 196 | 'readonly' => false, |
197 | 197 | ]; |
198 | - $rows = array_map(function (StorageConfig $config) use ($userId, $defaultMountOptions, $full) { |
|
198 | + $rows = array_map(function(StorageConfig $config) use ($userId, $defaultMountOptions, $full) { |
|
199 | 199 | $storageConfig = $config->getBackendOptions(); |
200 | 200 | $keys = array_keys($storageConfig); |
201 | 201 | $values = array_values($storageConfig); |
202 | 202 | |
203 | 203 | if (!$full) { |
204 | - $values = array_map(function ($value) { |
|
204 | + $values = array_map(function($value) { |
|
205 | 205 | if (is_string($value) && strlen($value) > 32) { |
206 | - return substr($value, 0, 6) . '...' . substr($value, -6, 6); |
|
206 | + return substr($value, 0, 6).'...'.substr($value, -6, 6); |
|
207 | 207 | } else { |
208 | 208 | return $value; |
209 | 209 | } |
210 | 210 | }, $values); |
211 | 211 | } |
212 | 212 | |
213 | - $configStrings = array_map(function ($key, $value) { |
|
214 | - return $key . ': ' . json_encode($value); |
|
213 | + $configStrings = array_map(function($key, $value) { |
|
214 | + return $key.': '.json_encode($value); |
|
215 | 215 | }, $keys, $values); |
216 | 216 | $configString = implode(', ', $configStrings); |
217 | 217 | |
@@ -225,8 +225,8 @@ discard block |
||
225 | 225 | $keys = array_keys($mountOptions); |
226 | 226 | $values = array_values($mountOptions); |
227 | 227 | |
228 | - $optionsStrings = array_map(function ($key, $value) { |
|
229 | - return $key . ': ' . json_encode($value); |
|
228 | + $optionsStrings = array_map(function($key, $value) { |
|
229 | + return $key.': '.json_encode($value); |
|
230 | 230 | }, $keys, $values); |
231 | 231 | $optionsString = implode(', ', $optionsStrings); |
232 | 232 |
@@ -58,7 +58,7 @@ discard block |
||
58 | 58 | $dir = $pathinfo['dirname']; |
59 | 59 | $i = 2; |
60 | 60 | while ($view->file_exists($path) || in_array($path, $excludeList)) { |
61 | - $path = Filesystem::normalizePath($dir . '/' . $name . ' ('.$i.')' . $ext); |
|
61 | + $path = Filesystem::normalizePath($dir.'/'.$name.' ('.$i.')'.$ext); |
|
62 | 62 | $i++; |
63 | 63 | } |
64 | 64 | |
@@ -82,7 +82,7 @@ discard block |
||
82 | 82 | $dir = ''; |
83 | 83 | $subdirs = explode('/', $shareFolder); |
84 | 84 | foreach ($subdirs as $subdir) { |
85 | - $dir = $dir . '/' . $subdir; |
|
85 | + $dir = $dir.'/'.$subdir; |
|
86 | 86 | if (!$view->is_dir($dir)) { |
87 | 87 | $view->mkdir($dir); |
88 | 88 | } |
@@ -130,7 +130,7 @@ discard block |
||
130 | 130 | $container = $this->getContainer(); |
131 | 131 | |
132 | 132 | $container->registerService('Crypt', |
133 | - function (IAppContainer $c) { |
|
133 | + function(IAppContainer $c) { |
|
134 | 134 | $server = $c->getServer(); |
135 | 135 | return new Crypt($server->getLogger(), |
136 | 136 | $server->getUserSession(), |
@@ -139,14 +139,14 @@ discard block |
||
139 | 139 | }); |
140 | 140 | |
141 | 141 | $container->registerService('Session', |
142 | - function (IAppContainer $c) { |
|
142 | + function(IAppContainer $c) { |
|
143 | 143 | $server = $c->getServer(); |
144 | 144 | return new Session($server->getSession()); |
145 | 145 | } |
146 | 146 | ); |
147 | 147 | |
148 | 148 | $container->registerService('KeyManager', |
149 | - function (IAppContainer $c) { |
|
149 | + function(IAppContainer $c) { |
|
150 | 150 | $server = $c->getServer(); |
151 | 151 | |
152 | 152 | return new KeyManager($server->getEncryptionKeyStorage(), |
@@ -160,7 +160,7 @@ discard block |
||
160 | 160 | }); |
161 | 161 | |
162 | 162 | $container->registerService('Recovery', |
163 | - function (IAppContainer $c) { |
|
163 | + function(IAppContainer $c) { |
|
164 | 164 | $server = $c->getServer(); |
165 | 165 | |
166 | 166 | return new Recovery( |
@@ -174,7 +174,7 @@ discard block |
||
174 | 174 | new View()); |
175 | 175 | }); |
176 | 176 | |
177 | - $container->registerService('RecoveryController', function (IAppContainer $c) { |
|
177 | + $container->registerService('RecoveryController', function(IAppContainer $c) { |
|
178 | 178 | $server = $c->getServer(); |
179 | 179 | return new RecoveryController( |
180 | 180 | $c->getAppName(), |
@@ -184,7 +184,7 @@ discard block |
||
184 | 184 | $c->query('Recovery')); |
185 | 185 | }); |
186 | 186 | |
187 | - $container->registerService('StatusController', function (IAppContainer $c) { |
|
187 | + $container->registerService('StatusController', function(IAppContainer $c) { |
|
188 | 188 | $server = $c->getServer(); |
189 | 189 | return new StatusController( |
190 | 190 | $c->getAppName(), |
@@ -195,7 +195,7 @@ discard block |
||
195 | 195 | ); |
196 | 196 | }); |
197 | 197 | |
198 | - $container->registerService('SettingsController', function (IAppContainer $c) { |
|
198 | + $container->registerService('SettingsController', function(IAppContainer $c) { |
|
199 | 199 | $server = $c->getServer(); |
200 | 200 | return new SettingsController( |
201 | 201 | $c->getAppName(), |
@@ -212,7 +212,7 @@ discard block |
||
212 | 212 | }); |
213 | 213 | |
214 | 214 | $container->registerService('UserSetup', |
215 | - function (IAppContainer $c) { |
|
215 | + function(IAppContainer $c) { |
|
216 | 216 | $server = $c->getServer(); |
217 | 217 | return new Setup($server->getLogger(), |
218 | 218 | $server->getUserSession(), |
@@ -221,7 +221,7 @@ discard block |
||
221 | 221 | }); |
222 | 222 | |
223 | 223 | $container->registerService('Util', |
224 | - function (IAppContainer $c) { |
|
224 | + function(IAppContainer $c) { |
|
225 | 225 | $server = $c->getServer(); |
226 | 226 | |
227 | 227 | return new Util( |
@@ -234,7 +234,7 @@ discard block |
||
234 | 234 | }); |
235 | 235 | |
236 | 236 | $container->registerService('EncryptAll', |
237 | - function (IAppContainer $c) { |
|
237 | + function(IAppContainer $c) { |
|
238 | 238 | $server = $c->getServer(); |
239 | 239 | return new EncryptAll( |
240 | 240 | $c->query('UserSetup'), |
@@ -252,7 +252,7 @@ discard block |
||
252 | 252 | ); |
253 | 253 | |
254 | 254 | $container->registerService('DecryptAll', |
255 | - function (IAppContainer $c) { |
|
255 | + function(IAppContainer $c) { |
|
256 | 256 | return new DecryptAll( |
257 | 257 | $c->query('Util'), |
258 | 258 | $c->query('KeyManager'), |