@@ -31,25 +31,25 @@ |
||
31 | 31 | \OC_JSON::checkAppEnabled('user_ldap'); |
32 | 32 | \OC_JSON::callCheck(); |
33 | 33 | |
34 | -$subject = (string)$_POST['ldap_clear_mapping']; |
|
34 | +$subject = (string) $_POST['ldap_clear_mapping']; |
|
35 | 35 | $mapping = null; |
36 | 36 | try { |
37 | - if($subject === 'user') { |
|
37 | + if ($subject === 'user') { |
|
38 | 38 | $mapping = new UserMapping(\OC::$server->getDatabaseConnection()); |
39 | 39 | $result = $mapping->clearCb( |
40 | - function ($uid) { |
|
40 | + function($uid) { |
|
41 | 41 | \OC::$server->getUserManager()->emit('\OC\User', 'preUnassignedUserId', [$uid]); |
42 | 42 | }, |
43 | - function ($uid) { |
|
43 | + function($uid) { |
|
44 | 44 | \OC::$server->getUserManager()->emit('\OC\User', 'postUnassignedUserId', [$uid]); |
45 | 45 | } |
46 | 46 | ); |
47 | - } else if($subject === 'group') { |
|
47 | + } else if ($subject === 'group') { |
|
48 | 48 | $mapping = new GroupMapping(\OC::$server->getDatabaseConnection()); |
49 | 49 | $result = $mapping->clear(); |
50 | 50 | } |
51 | 51 | |
52 | - if($mapping === null || !$result) { |
|
52 | + if ($mapping === null || !$result) { |
|
53 | 53 | $l = \OC::$server->getL10N('user_ldap'); |
54 | 54 | throw new \Exception($l->t('Failed to clear the mappings.')); |
55 | 55 | } |
@@ -51,16 +51,16 @@ |
||
51 | 51 | * @since 14.0.0 |
52 | 52 | */ |
53 | 53 | public function render(): string { |
54 | - return '<li>' . |
|
55 | - '<a id="directLink-container">' . |
|
56 | - '<span class="icon ' . Util::sanitizeHTML($this->getIcon()) . '"></span>' . |
|
57 | - '<label for="directLink">' . Util::sanitizeHTML($this->getLabel()) . '</label>' . |
|
58 | - '</a>' . |
|
59 | - '</li>' . |
|
60 | - '<li>' . |
|
61 | - '<span class="menuitem">' . |
|
62 | - '<input id="directLink" type="text" readonly="" value="' . Util::sanitizeHTML($this->getLink()) . '">' . |
|
63 | - '</span>' . |
|
54 | + return '<li>'. |
|
55 | + '<a id="directLink-container">'. |
|
56 | + '<span class="icon '.Util::sanitizeHTML($this->getIcon()).'"></span>'. |
|
57 | + '<label for="directLink">'.Util::sanitizeHTML($this->getLabel()).'</label>'. |
|
58 | + '</a>'. |
|
59 | + '</li>'. |
|
60 | + '<li>'. |
|
61 | + '<span class="menuitem">'. |
|
62 | + '<input id="directLink" type="text" readonly="" value="'.Util::sanitizeHTML($this->getLink()).'">'. |
|
63 | + '</span>'. |
|
64 | 64 | '</li>'; |
65 | 65 | } |
66 | 66 | } |
@@ -63,15 +63,15 @@ |
||
63 | 63 | * @since 14.0.0 |
64 | 64 | */ |
65 | 65 | public function render(): string { |
66 | - return '<li>' . |
|
67 | - '<a id="save-external-share" data-protected="false" data-owner-display-name="' . Util::sanitizeHTML($this->displayname) . '" data-owner="' . Util::sanitizeHTML($this->owner) . '" data-name="' . Util::sanitizeHTML($this->shareName) . '">' . |
|
68 | - '<span class="icon ' . Util::sanitizeHTML($this->getIcon()) . '"></span>' . |
|
69 | - '<label for="remote_address">' . Util::sanitizeHTML($this->getLabel()) . '</label>' . |
|
70 | - '<form class="save-form hidden" action="#">' . |
|
71 | - '<input type="text" id="remote_address" placeholder="[email protected]">' . |
|
72 | - '<input type="submit" value=" " id="save-button-confirm" class="icon-confirm" disabled="disabled"></button>' . |
|
73 | - '</form>' . |
|
74 | - '</a>' . |
|
66 | + return '<li>'. |
|
67 | + '<a id="save-external-share" data-protected="false" data-owner-display-name="'.Util::sanitizeHTML($this->displayname).'" data-owner="'.Util::sanitizeHTML($this->owner).'" data-name="'.Util::sanitizeHTML($this->shareName).'">'. |
|
68 | + '<span class="icon '.Util::sanitizeHTML($this->getIcon()).'"></span>'. |
|
69 | + '<label for="remote_address">'.Util::sanitizeHTML($this->getLabel()).'</label>'. |
|
70 | + '<form class="save-form hidden" action="#">'. |
|
71 | + '<input type="text" id="remote_address" placeholder="[email protected]">'. |
|
72 | + '<input type="submit" value=" " id="save-button-confirm" class="icon-confirm" disabled="disabled"></button>'. |
|
73 | + '</form>'. |
|
74 | + '</a>'. |
|
75 | 75 | '</li>'; |
76 | 76 | } |
77 | 77 | } |
@@ -27,7 +27,7 @@ |
||
27 | 27 | ->from('share_external'); |
28 | 28 | |
29 | 29 | $result = $qb->execute(); |
30 | - while($row = $result->fetch()) { |
|
30 | + while ($row = $result->fetch()) { |
|
31 | 31 | $this->discoveryService->discover($row['remote'], 'FEDERATED_SHARING', true); |
32 | 32 | } |
33 | 33 | $result->closeCursor(); |
@@ -105,7 +105,7 @@ |
||
105 | 105 | $defaultLogFile = rtrim($dataDir, '/').'/nextcloud.log'; |
106 | 106 | $output->writeln('Log file: '.$this->config->getSystemValue('logfile', $defaultLogFile)); |
107 | 107 | |
108 | - $rotateSize = $this->config->getSystemValue('log_rotate_size', 100*1024*1024); |
|
108 | + $rotateSize = $this->config->getSystemValue('log_rotate_size', 100 * 1024 * 1024); |
|
109 | 109 | if ($rotateSize) { |
110 | 110 | $rotateString = \OCP\Util::humanFileSize($rotateSize); |
111 | 111 | } else { |
@@ -154,7 +154,7 @@ discard block |
||
154 | 154 | } |
155 | 155 | $query = $this->connection->prepare('SELECT `lock` from `*PREFIX*file_locks` WHERE `key` = ?'); |
156 | 156 | $query->execute([$path]); |
157 | - $lockValue = (int)$query->fetchColumn(); |
|
157 | + $lockValue = (int) $query->fetchColumn(); |
|
158 | 158 | if ($type === self::LOCK_SHARED) { |
159 | 159 | if ($this->isLocallyLocked($path)) { |
160 | 160 | // if we have a shared lock we kept open locally but it's released we always have at least 1 shared lock in the db |
@@ -291,7 +291,7 @@ discard block |
||
291 | 291 | } |
292 | 292 | // since we keep shared locks we need to manually clean those |
293 | 293 | $lockedPaths = array_keys($this->sharedLocks); |
294 | - $lockedPaths = array_filter($lockedPaths, function ($path) { |
|
294 | + $lockedPaths = array_filter($lockedPaths, function($path) { |
|
295 | 295 | return $this->sharedLocks[$path]; |
296 | 296 | }); |
297 | 297 |
@@ -59,10 +59,10 @@ |
||
59 | 59 | if (is_array($value)) { |
60 | 60 | $output->writeln(" <comment>>></comment> $key:"); |
61 | 61 | foreach ($value as $subKey => $subValue) { |
62 | - $output->writeln(" <comment>>></comment> $subKey: " . str_repeat(' ', 46 - strlen($subKey)) . $subValue); |
|
62 | + $output->writeln(" <comment>>></comment> $subKey: ".str_repeat(' ', 46 - strlen($subKey)).$subValue); |
|
63 | 63 | } |
64 | 64 | } else { |
65 | - $output->writeln(" <comment>>></comment> $key: " . str_repeat(' ', 50 - strlen($key)) . $value); |
|
65 | + $output->writeln(" <comment>>></comment> $key: ".str_repeat(' ', 50 - strlen($key)).$value); |
|
66 | 66 | } |
67 | 67 | } |
68 | 68 | } |
@@ -92,7 +92,7 @@ discard block |
||
92 | 92 | return; |
93 | 93 | } |
94 | 94 | |
95 | - return $this->checkQuota($parent->getPath() . '/' . basename($uri)); |
|
95 | + return $this->checkQuota($parent->getPath().'/'.basename($uri)); |
|
96 | 96 | } |
97 | 97 | |
98 | 98 | /** |
@@ -152,7 +152,7 @@ discard block |
||
152 | 152 | |
153 | 153 | if ($length) { |
154 | 154 | list($parentPath, $newName) = \Sabre\Uri\split($path); |
155 | - if(is_null($parentPath)) { |
|
155 | + if (is_null($parentPath)) { |
|
156 | 156 | $parentPath = ''; |
157 | 157 | } |
158 | 158 | $req = $this->server->httpRequest; |
@@ -163,7 +163,7 @@ discard block |
||
163 | 163 | // there is still enough space for the remaining chunks |
164 | 164 | $length -= $chunkHandler->getCurrentSize(); |
165 | 165 | // use target file name for free space check in case of shared files |
166 | - $path = rtrim($parentPath, '/') . '/' . $info['name']; |
|
166 | + $path = rtrim($parentPath, '/').'/'.$info['name']; |
|
167 | 167 | } |
168 | 168 | $freeSpace = $this->getFreeSpace($path); |
169 | 169 | if ($freeSpace >= 0 && $length > $freeSpace) { |
@@ -106,7 +106,7 @@ |
||
106 | 106 | $suffix = '…'; |
107 | 107 | } |
108 | 108 | |
109 | - return $prefix . substr($message, $start, $end - $start) . $suffix; |
|
109 | + return $prefix.substr($message, $start, $end - $start).$suffix; |
|
110 | 110 | } |
111 | 111 | |
112 | 112 | } |