@@ -237,7 +237,7 @@ discard block |
||
237 | 237 | * @return string Formatted date and time string |
238 | 238 | */ |
239 | 239 | public function formatDateTime($timestamp, $formatDate = 'long', $formatTime = 'medium', \DateTimeZone $timeZone = null, \OCP\IL10N $l = null) { |
240 | - return $this->format($timestamp, 'datetime', $formatDate . '|' . $formatTime, $timeZone, $l); |
|
240 | + return $this->format($timestamp, 'datetime', $formatDate.'|'.$formatTime, $timeZone, $l); |
|
241 | 241 | } |
242 | 242 | |
243 | 243 | /** |
@@ -256,7 +256,7 @@ discard block |
||
256 | 256 | $formatDate .= '^'; |
257 | 257 | } |
258 | 258 | |
259 | - return $this->format($timestamp, 'datetime', $formatDate . '|' . $formatTime, $timeZone, $l); |
|
259 | + return $this->format($timestamp, 'datetime', $formatDate.'|'.$formatTime, $timeZone, $l); |
|
260 | 260 | } |
261 | 261 | |
262 | 262 | /** |
@@ -84,15 +84,15 @@ |
||
84 | 84 | $tmpPath = \OC::$server->getTempManager()->getTemporaryFile(); |
85 | 85 | |
86 | 86 | if (self::$avconvBinary) { |
87 | - $cmd = self::$avconvBinary . ' -y -ss ' . escapeshellarg($second) . |
|
88 | - ' -i ' . escapeshellarg($absPath) . |
|
89 | - ' -an -f mjpeg -vframes 1 -vsync 1 ' . escapeshellarg($tmpPath) . |
|
87 | + $cmd = self::$avconvBinary.' -y -ss '.escapeshellarg($second). |
|
88 | + ' -i '.escapeshellarg($absPath). |
|
89 | + ' -an -f mjpeg -vframes 1 -vsync 1 '.escapeshellarg($tmpPath). |
|
90 | 90 | ' > /dev/null 2>&1'; |
91 | 91 | } else { |
92 | - $cmd = self::$ffmpegBinary . ' -y -ss ' . escapeshellarg($second) . |
|
93 | - ' -i ' . escapeshellarg($absPath) . |
|
94 | - ' -f mjpeg -vframes 1' . |
|
95 | - ' ' . escapeshellarg($tmpPath) . |
|
92 | + $cmd = self::$ffmpegBinary.' -y -ss '.escapeshellarg($second). |
|
93 | + ' -i '.escapeshellarg($absPath). |
|
94 | + ' -f mjpeg -vframes 1'. |
|
95 | + ' '.escapeshellarg($tmpPath). |
|
96 | 96 | ' > /dev/null 2>&1'; |
97 | 97 | } |
98 | 98 |
@@ -86,10 +86,10 @@ discard block |
||
86 | 86 | */ |
87 | 87 | public function setId($id) { |
88 | 88 | if (is_int($id)) { |
89 | - $id = (string)$id; |
|
89 | + $id = (string) $id; |
|
90 | 90 | } |
91 | 91 | |
92 | - if(!is_string($id)) { |
|
92 | + if (!is_string($id)) { |
|
93 | 93 | throw new \InvalidArgumentException('String expected.'); |
94 | 94 | } |
95 | 95 | |
@@ -115,14 +115,14 @@ discard block |
||
115 | 115 | if ($this->providerId === null || $this->id === null) { |
116 | 116 | throw new \UnexpectedValueException; |
117 | 117 | } |
118 | - return $this->providerId . ':' . $this->id; |
|
118 | + return $this->providerId.':'.$this->id; |
|
119 | 119 | } |
120 | 120 | |
121 | 121 | /** |
122 | 122 | * @inheritdoc |
123 | 123 | */ |
124 | 124 | public function setProviderId($id) { |
125 | - if(!is_string($id)) { |
|
125 | + if (!is_string($id)) { |
|
126 | 126 | throw new \InvalidArgumentException('String expected.'); |
127 | 127 | } |
128 | 128 | |
@@ -156,7 +156,7 @@ discard block |
||
156 | 156 | |
157 | 157 | // for federated shares the owner can be a remote user, in this |
158 | 158 | // case we use the initiator |
159 | - if($this->userManager->userExists($this->shareOwner)) { |
|
159 | + if ($this->userManager->userExists($this->shareOwner)) { |
|
160 | 160 | $userFolder = $this->rootFolder->getUserFolder($this->shareOwner); |
161 | 161 | } else { |
162 | 162 | $userFolder = $this->rootFolder->getUserFolder($this->sharedBy); |
@@ -164,7 +164,7 @@ discard block |
||
164 | 164 | |
165 | 165 | $nodes = $userFolder->getById($this->fileId); |
166 | 166 | if (empty($nodes)) { |
167 | - throw new NotFoundException('Node for share not found, fileid: ' . $this->fileId); |
|
167 | + throw new NotFoundException('Node for share not found, fileid: '.$this->fileId); |
|
168 | 168 | } |
169 | 169 | |
170 | 170 | $this->node = $nodes[0]; |
@@ -244,7 +244,7 @@ discard block |
||
244 | 244 | } |
245 | 245 | |
246 | 246 | $mount = $file->getMountPoint(); |
247 | - if ($mount and !$mount->getOption('previews', true)){ |
|
247 | + if ($mount and !$mount->getOption('previews', true)) { |
|
248 | 248 | return false; |
249 | 249 | } |
250 | 250 | |
@@ -330,7 +330,7 @@ discard block |
||
330 | 330 | */ |
331 | 331 | protected function registerCoreProvider($class, $mimeType, $options = []) { |
332 | 332 | if (in_array(trim($class, '\\'), $this->getEnabledDefaultProvider())) { |
333 | - $this->registerProvider($mimeType, function () use ($class, $options) { |
|
333 | + $this->registerProvider($mimeType, function() use ($class, $options) { |
|
334 | 334 | return new $class($options); |
335 | 335 | }); |
336 | 336 | } |
@@ -32,7 +32,7 @@ |
||
32 | 32 | * @param string $name |
33 | 33 | */ |
34 | 34 | public function __construct($id, $name) { |
35 | - parent::__construct('Id "' . $id . '" already used by encryption module "' . $name . '"'); |
|
35 | + parent::__construct('Id "'.$id.'" already used by encryption module "'.$name.'"'); |
|
36 | 36 | } |
37 | 37 | |
38 | 38 | } |
@@ -31,6 +31,6 @@ |
||
31 | 31 | * @param string $key |
32 | 32 | */ |
33 | 33 | public function __construct($key) { |
34 | - parent::__construct('header key "'. $key . '" already reserved by ownCloud'); |
|
34 | + parent::__construct('header key "'.$key.'" already reserved by ownCloud'); |
|
35 | 35 | } |
36 | 36 | } |
@@ -26,6 +26,6 @@ |
||
26 | 26 | |
27 | 27 | use OCP\Encryption\Exceptions\GenericEncryptionException; |
28 | 28 | |
29 | -class EncryptionFailedException extends GenericEncryptionException{ |
|
29 | +class EncryptionFailedException extends GenericEncryptionException { |
|
30 | 30 | |
31 | 31 | } |
@@ -26,6 +26,6 @@ |
||
26 | 26 | |
27 | 27 | use OCP\Encryption\Exceptions\GenericEncryptionException; |
28 | 28 | |
29 | -class EmptyEncryptionDataException extends GenericEncryptionException{ |
|
29 | +class EmptyEncryptionDataException extends GenericEncryptionException { |
|
30 | 30 | |
31 | 31 | } |
@@ -66,8 +66,8 @@ discard block |
||
66 | 66 | $this->util = $util; |
67 | 67 | |
68 | 68 | $this->encryption_base_dir = '/files_encryption'; |
69 | - $this->keys_base_dir = $this->encryption_base_dir .'/keys'; |
|
70 | - $this->backup_base_dir = $this->encryption_base_dir .'/backup'; |
|
69 | + $this->keys_base_dir = $this->encryption_base_dir.'/keys'; |
|
70 | + $this->backup_base_dir = $this->encryption_base_dir.'/backup'; |
|
71 | 71 | $this->root_dir = $this->util->getKeyStorageRoot(); |
72 | 72 | } |
73 | 73 | |
@@ -85,14 +85,14 @@ discard block |
||
85 | 85 | public function getFileKey($path, $keyId, $encryptionModuleId) { |
86 | 86 | $realFile = $this->util->stripPartialFileExtension($path); |
87 | 87 | $keyDir = $this->getFileKeyDir($encryptionModuleId, $realFile); |
88 | - $key = $this->getKey($keyDir . $keyId); |
|
88 | + $key = $this->getKey($keyDir.$keyId); |
|
89 | 89 | |
90 | 90 | if ($key === '' && $realFile !== $path) { |
91 | 91 | // Check if the part file has keys and use them, if no normal keys |
92 | 92 | // exist. This is required to fix copyBetweenStorage() when we |
93 | 93 | // rename a .part file over storage borders. |
94 | 94 | $keyDir = $this->getFileKeyDir($encryptionModuleId, $path); |
95 | - $key = $this->getKey($keyDir . $keyId); |
|
95 | + $key = $this->getKey($keyDir.$keyId); |
|
96 | 96 | } |
97 | 97 | |
98 | 98 | return $key; |
@@ -119,7 +119,7 @@ discard block |
||
119 | 119 | */ |
120 | 120 | public function setFileKey($path, $keyId, $key, $encryptionModuleId) { |
121 | 121 | $keyDir = $this->getFileKeyDir($encryptionModuleId, $path); |
122 | - return $this->setKey($keyDir . $keyId, $key); |
|
122 | + return $this->setKey($keyDir.$keyId, $key); |
|
123 | 123 | } |
124 | 124 | |
125 | 125 | /** |
@@ -143,7 +143,7 @@ discard block |
||
143 | 143 | */ |
144 | 144 | public function deleteFileKey($path, $keyId, $encryptionModuleId) { |
145 | 145 | $keyDir = $this->getFileKeyDir($encryptionModuleId, $path); |
146 | - return !$this->view->file_exists($keyDir . $keyId) || $this->view->unlink($keyDir . $keyId); |
|
146 | + return !$this->view->file_exists($keyDir.$keyId) || $this->view->unlink($keyDir.$keyId); |
|
147 | 147 | } |
148 | 148 | |
149 | 149 | /** |
@@ -173,10 +173,10 @@ discard block |
||
173 | 173 | protected function constructUserKeyPath($encryptionModuleId, $keyId, $uid) { |
174 | 174 | |
175 | 175 | if ($uid === null) { |
176 | - $path = $this->root_dir . '/' . $this->encryption_base_dir . '/' . $encryptionModuleId . '/' . $keyId; |
|
176 | + $path = $this->root_dir.'/'.$this->encryption_base_dir.'/'.$encryptionModuleId.'/'.$keyId; |
|
177 | 177 | } else { |
178 | - $path = $this->root_dir . '/' . $uid . $this->encryption_base_dir . '/' |
|
179 | - . $encryptionModuleId . '/' . $uid . '.' . $keyId; |
|
178 | + $path = $this->root_dir.'/'.$uid.$this->encryption_base_dir.'/' |
|
179 | + . $encryptionModuleId.'/'.$uid.'.'.$keyId; |
|
180 | 180 | } |
181 | 181 | |
182 | 182 | return \OC\Files\Filesystem::normalizePath($path); |
@@ -194,7 +194,7 @@ discard block |
||
194 | 194 | |
195 | 195 | if ($this->view->file_exists($path)) { |
196 | 196 | if (isset($this->keyCache[$path])) { |
197 | - $key = $this->keyCache[$path]; |
|
197 | + $key = $this->keyCache[$path]; |
|
198 | 198 | } else { |
199 | 199 | $key = $this->view->file_get_contents($path); |
200 | 200 | $this->keyCache[$path] = $key; |
@@ -238,12 +238,12 @@ discard block |
||
238 | 238 | |
239 | 239 | // in case of system wide mount points the keys are stored directly in the data directory |
240 | 240 | if ($this->util->isSystemWideMountPoint($filename, $owner)) { |
241 | - $keyPath = $this->root_dir . '/' . $this->keys_base_dir . $filename . '/'; |
|
241 | + $keyPath = $this->root_dir.'/'.$this->keys_base_dir.$filename.'/'; |
|
242 | 242 | } else { |
243 | - $keyPath = $this->root_dir . '/' . $owner . $this->keys_base_dir . $filename . '/'; |
|
243 | + $keyPath = $this->root_dir.'/'.$owner.$this->keys_base_dir.$filename.'/'; |
|
244 | 244 | } |
245 | 245 | |
246 | - return Filesystem::normalizePath($keyPath . $encryptionModuleId . '/', false); |
|
246 | + return Filesystem::normalizePath($keyPath.$encryptionModuleId.'/', false); |
|
247 | 247 | } |
248 | 248 | |
249 | 249 | /** |
@@ -300,13 +300,13 @@ discard block |
||
300 | 300 | * @since 12.0.0 |
301 | 301 | */ |
302 | 302 | public function backupUserKeys($encryptionModuleId, $purpose, $uid) { |
303 | - $source = $uid . $this->encryption_base_dir . '/' . $encryptionModuleId; |
|
304 | - $backupDir = $uid . $this->backup_base_dir; |
|
303 | + $source = $uid.$this->encryption_base_dir.'/'.$encryptionModuleId; |
|
304 | + $backupDir = $uid.$this->backup_base_dir; |
|
305 | 305 | if (!$this->view->file_exists($backupDir)) { |
306 | 306 | $this->view->mkdir($backupDir); |
307 | 307 | } |
308 | 308 | |
309 | - $backupDir = $backupDir . '/' . $purpose . '.' . $encryptionModuleId . '.' . $this->getTimestamp(); |
|
309 | + $backupDir = $backupDir.'/'.$purpose.'.'.$encryptionModuleId.'.'.$this->getTimestamp(); |
|
310 | 310 | $this->view->mkdir($backupDir); |
311 | 311 | |
312 | 312 | return $this->view->copy($source, $backupDir); |
@@ -332,9 +332,9 @@ discard block |
||
332 | 332 | $systemWideMountPoint = $this->util->isSystemWideMountPoint($relativePath, $owner); |
333 | 333 | |
334 | 334 | if ($systemWideMountPoint) { |
335 | - $systemPath = $this->root_dir . '/' . $this->keys_base_dir . $relativePath . '/'; |
|
335 | + $systemPath = $this->root_dir.'/'.$this->keys_base_dir.$relativePath.'/'; |
|
336 | 336 | } else { |
337 | - $systemPath = $this->root_dir . '/' . $owner . $this->keys_base_dir . $relativePath . '/'; |
|
337 | + $systemPath = $this->root_dir.'/'.$owner.$this->keys_base_dir.$relativePath.'/'; |
|
338 | 338 | } |
339 | 339 | |
340 | 340 | return Filesystem::normalizePath($systemPath, false); |
@@ -351,7 +351,7 @@ discard block |
||
351 | 351 | $sub_dirs = explode('/', ltrim($path, '/')); |
352 | 352 | $dir = ''; |
353 | 353 | foreach ($sub_dirs as $sub_dir) { |
354 | - $dir .= '/' . $sub_dir; |
|
354 | + $dir .= '/'.$sub_dir; |
|
355 | 355 | if (!$this->view->is_dir($dir)) { |
356 | 356 | $this->view->mkdir($dir); |
357 | 357 | } |