Passed
Push — master ( 84a353...212138 )
by Blizzz
12:21 queued 10s
created
apps/user_ldap/lib/User_Proxy.php 1 patch
Spacing   +2 added lines, -2 removed lines patch added patch discarded remove patch
@@ -197,7 +197,7 @@  discard block
 block discarded – undo
197 197
 	 * @return string|false
198 198
 	 */
199 199
 	public function loginName2UserName($loginName) {
200
-		$id = 'LOGINNAME,' . $loginName;
200
+		$id = 'LOGINNAME,'.$loginName;
201 201
 		return $this->handleRequest($id, 'loginName2UserName', [$loginName]);
202 202
 	}
203 203
 	
@@ -208,7 +208,7 @@  discard block
 block discarded – undo
208 208
 	 * @return string|false with the username
209 209
 	 */
210 210
 	public function dn2UserName($dn) {
211
-		$id = 'DN,' . $dn;
211
+		$id = 'DN,'.$dn;
212 212
 		return $this->handleRequest($id, 'dn2UserName', [$dn]);
213 213
 	}
214 214
 
Please login to merge, or discard this patch.
apps/user_ldap/lib/Group_LDAP.php 1 patch
Spacing   +44 added lines, -44 removed lines patch added patch discarded remove patch
@@ -96,10 +96,10 @@  discard block
 block discarded – undo
96 96
 		if (!$this->enabled) {
97 97
 			return false;
98 98
 		}
99
-		$cacheKey = 'inGroup' . $uid . ':' . $gid;
99
+		$cacheKey = 'inGroup'.$uid.':'.$gid;
100 100
 		$inGroup = $this->access->connection->getFromCache($cacheKey);
101 101
 		if (!is_null($inGroup)) {
102
-			return (bool)$inGroup;
102
+			return (bool) $inGroup;
103 103
 		}
104 104
 
105 105
 		$userDN = $this->access->username2dn($uid);
@@ -109,7 +109,7 @@  discard block
 block discarded – undo
109 109
 			return $isInGroup;
110 110
 		}
111 111
 
112
-		$cacheKeyMembers = 'inGroup-members:' . $gid;
112
+		$cacheKeyMembers = 'inGroup-members:'.$gid;
113 113
 		$members = $this->access->connection->getFromCache($cacheKeyMembers);
114 114
 		if (!is_null($members)) {
115 115
 			$this->cachedGroupMembers[$gid] = $members;
@@ -206,8 +206,8 @@  discard block
 block discarded – undo
206 206
 					$dynamicMembers[$value['dn'][0]] = 1;
207 207
 				}
208 208
 			} else {
209
-				\OCP\Util::writeLog('user_ldap', 'No search filter found on member url ' .
210
-					'of group ' . $dnGroup, ILogger::DEBUG);
209
+				\OCP\Util::writeLog('user_ldap', 'No search filter found on member url '.
210
+					'of group '.$dnGroup, ILogger::DEBUG);
211 211
 			}
212 212
 		}
213 213
 		return $dynamicMembers;
@@ -229,7 +229,7 @@  discard block
 block discarded – undo
229 229
 			return [];
230 230
 		}
231 231
 		// used extensively in cron job, caching makes sense for nested groups
232
-		$cacheKey = '_groupMembers' . $dnGroup;
232
+		$cacheKey = '_groupMembers'.$dnGroup;
233 233
 		$groupMembers = $this->access->connection->getFromCache($cacheKey);
234 234
 		if ($groupMembers !== null) {
235 235
 			return $groupMembers;
@@ -237,7 +237,7 @@  discard block
 block discarded – undo
237 237
 		$seen[$dnGroup] = 1;
238 238
 		$members = $this->access->readAttribute($dnGroup, $this->access->connection->ldapGroupMemberAssocAttr);
239 239
 		if (is_array($members)) {
240
-			$fetcher = function ($memberDN, &$seen) {
240
+			$fetcher = function($memberDN, &$seen) {
241 241
 				return $this->_groupMembers($memberDN, $seen);
242 242
 			};
243 243
 			$allMembers = $this->walkNestedGroups($dnGroup, $fetcher, $members);
@@ -261,7 +261,7 @@  discard block
 block discarded – undo
261 261
 			return [];
262 262
 		}
263 263
 
264
-		$fetcher = function ($groupDN) {
264
+		$fetcher = function($groupDN) {
265 265
 			if (isset($this->cachedNestedGroups[$groupDN])) {
266 266
 				$nestedGroups = $this->cachedNestedGroups[$groupDN];
267 267
 			} else {
@@ -285,7 +285,7 @@  discard block
 block discarded – undo
285 285
 	 * @return array
286 286
 	 */
287 287
 	private function walkNestedGroups(string $dn, \Closure $fetcher, array $list): array {
288
-		$nesting = (int)$this->access->connection->ldapNestedGroups;
288
+		$nesting = (int) $this->access->connection->ldapNestedGroups;
289 289
 		// depending on the input, we either have a list of DNs or a list of LDAP records
290 290
 		// also, the output expects either DNs or records. Testing the first element should suffice.
291 291
 		$recordMode = is_array($list) && isset($list[0]) && is_array($list[0]) && isset($list[0]['dn'][0]);
@@ -293,7 +293,7 @@  discard block
 block discarded – undo
293 293
 		if ($nesting !== 1) {
294 294
 			if ($recordMode) {
295 295
 				// the keys are numeric, but should hold the DN
296
-				return array_reduce($list, function ($transformed, $record) use ($dn) {
296
+				return array_reduce($list, function($transformed, $record) use ($dn) {
297 297
 					if ($record['dn'][0] != $dn) {
298 298
 						$transformed[$record['dn'][0]] = $record;
299 299
 					}
@@ -326,7 +326,7 @@  discard block
 block discarded – undo
326 326
 	 * @return string|bool
327 327
 	 */
328 328
 	public function gidNumber2Name($gid, $dn) {
329
-		$cacheKey = 'gidNumberToName' . $gid;
329
+		$cacheKey = 'gidNumberToName'.$gid;
330 330
 		$groupName = $this->access->connection->getFromCache($cacheKey);
331 331
 		if (!is_null($groupName) && isset($groupName)) {
332 332
 			return $groupName;
@@ -336,7 +336,7 @@  discard block
 block discarded – undo
336 336
 		$filter = $this->access->combineFilterWithAnd([
337 337
 			$this->access->connection->ldapGroupFilter,
338 338
 			'objectClass=posixGroup',
339
-			$this->access->connection->ldapGidNumber . '=' . $gid
339
+			$this->access->connection->ldapGidNumber.'='.$gid
340 340
 		]);
341 341
 		$result = $this->access->searchGroups($filter, ['dn'], 1);
342 342
 		if (empty($result)) {
@@ -415,7 +415,7 @@  discard block
 block discarded – undo
415 415
 		if ($search !== '') {
416 416
 			$filterParts[] = $this->access->getFilterPartForUserSearch($search);
417 417
 		}
418
-		$filterParts[] = $this->access->connection->ldapGidNumber . '=' . $groupID;
418
+		$filterParts[] = $this->access->connection->ldapGidNumber.'='.$groupID;
419 419
 
420 420
 		return $this->access->combineFilterWithAnd($filterParts);
421 421
 	}
@@ -457,7 +457,7 @@  discard block
 block discarded – undo
457 457
 		try {
458 458
 			$filter = $this->prepareFilterForUsersHasGidNumber($groupDN, $search);
459 459
 			$users = $this->access->countUsers($filter, ['dn'], $limit, $offset);
460
-			return (int)$users;
460
+			return (int) $users;
461 461
 		} catch (\Exception $e) {
462 462
 			return 0;
463 463
 		}
@@ -503,7 +503,7 @@  discard block
 block discarded – undo
503 503
 		//we need to get the DN from LDAP
504 504
 		$filter = $this->access->combineFilterWithAnd([
505 505
 			$this->access->connection->ldapGroupFilter,
506
-			'objectsid=' . $domainObjectSid . '-' . $gid
506
+			'objectsid='.$domainObjectSid.'-'.$gid
507 507
 		]);
508 508
 		$result = $this->access->searchGroups($filter, ['dn'], 1);
509 509
 		if (empty($result)) {
@@ -582,7 +582,7 @@  discard block
 block discarded – undo
582 582
 		if ($search !== '') {
583 583
 			$filterParts[] = $this->access->getFilterPartForUserSearch($search);
584 584
 		}
585
-		$filterParts[] = 'primaryGroupID=' . $groupID;
585
+		$filterParts[] = 'primaryGroupID='.$groupID;
586 586
 
587 587
 		return $this->access->combineFilterWithAnd($filterParts);
588 588
 	}
@@ -624,7 +624,7 @@  discard block
 block discarded – undo
624 624
 		try {
625 625
 			$filter = $this->prepareFilterForUsersInPrimaryGroup($groupDN, $search);
626 626
 			$users = $this->access->countUsers($filter, ['dn'], $limit, $offset);
627
-			return (int)$users;
627
+			return (int) $users;
628 628
 		} catch (\Exception $e) {
629 629
 			return 0;
630 630
 		}
@@ -663,7 +663,7 @@  discard block
 block discarded – undo
663 663
 		if (!$this->enabled) {
664 664
 			return [];
665 665
 		}
666
-		$cacheKey = 'getUserGroups' . $uid;
666
+		$cacheKey = 'getUserGroups'.$uid;
667 667
 		$userGroups = $this->access->connection->getFromCache($cacheKey);
668 668
 		if (!is_null($userGroups)) {
669 669
 			return $userGroups;
@@ -708,8 +708,8 @@  discard block
 block discarded – undo
708 708
 						}
709 709
 					}
710 710
 				} else {
711
-					\OCP\Util::writeLog('user_ldap', 'No search filter found on member url ' .
712
-						'of group ' . print_r($dynamicGroup, true), ILogger::DEBUG);
711
+					\OCP\Util::writeLog('user_ldap', 'No search filter found on member url '.
712
+						'of group '.print_r($dynamicGroup, true), ILogger::DEBUG);
713 713
 				}
714 714
 			}
715 715
 		}
@@ -717,8 +717,8 @@  discard block
 block discarded – undo
717 717
 		// if possible, read out membership via memberOf. It's far faster than
718 718
 		// performing a search, which still is a fallback later.
719 719
 		// memberof doesn't support memberuid, so skip it here.
720
-		if ((int)$this->access->connection->hasMemberOfFilterSupport === 1
721
-			&& (int)$this->access->connection->useMemberOfToDetectMembership === 1
720
+		if ((int) $this->access->connection->hasMemberOfFilterSupport === 1
721
+			&& (int) $this->access->connection->useMemberOfToDetectMembership === 1
722 722
 			&& strtolower($this->access->connection->ldapGroupMemberAssocAttr) !== 'memberuid'
723 723
 		) {
724 724
 			$groupDNs = $this->_getGroupDNsFromMemberOf($userDN);
@@ -751,7 +751,7 @@  discard block
 block discarded – undo
751 751
 		} elseif (strtolower($this->access->connection->ldapGroupMemberAssocAttr) === 'memberuid') {
752 752
 			$result = $this->access->readAttribute($userDN, 'uid');
753 753
 			if ($result === false) {
754
-				\OCP\Util::writeLog('user_ldap', 'No uid attribute found for DN ' . $userDN . ' on ' .
754
+				\OCP\Util::writeLog('user_ldap', 'No uid attribute found for DN '.$userDN.' on '.
755 755
 					$this->access->connection->ldapHost, ILogger::DEBUG);
756 756
 				$uid = false;
757 757
 			} else {
@@ -801,11 +801,11 @@  discard block
 block discarded – undo
801 801
 		}
802 802
 		$allGroups = [];
803 803
 		$seen[$dn] = true;
804
-		$filter = $this->access->connection->ldapGroupMemberAssocAttr . '=' . $dn;
804
+		$filter = $this->access->connection->ldapGroupMemberAssocAttr.'='.$dn;
805 805
 		$groups = $this->access->fetchListOfGroups($filter,
806 806
 			[strtolower($this->access->connection->ldapGroupMemberAssocAttr), $this->access->connection->ldapGroupDisplayName, 'dn']);
807 807
 		if (is_array($groups)) {
808
-			$fetcher = function ($dn, &$seen) {
808
+			$fetcher = function($dn, &$seen) {
809 809
 				if (is_array($dn) && isset($dn['dn'][0])) {
810 810
 					$dn = $dn['dn'][0];
811 811
 				}
@@ -835,7 +835,7 @@  discard block
 block discarded – undo
835 835
 			return [];
836 836
 		}
837 837
 		$search = $this->access->escapeFilterPart($search, true);
838
-		$cacheKey = 'usersInGroup-' . $gid . '-' . $search . '-' . $limit . '-' . $offset;
838
+		$cacheKey = 'usersInGroup-'.$gid.'-'.$search.'-'.$limit.'-'.$offset;
839 839
 		// check for cache of the exact query
840 840
 		$groupUsers = $this->access->connection->getFromCache($cacheKey);
841 841
 		if (!is_null($groupUsers)) {
@@ -843,7 +843,7 @@  discard block
 block discarded – undo
843 843
 		}
844 844
 
845 845
 		// check for cache of the query without limit and offset
846
-		$groupUsers = $this->access->connection->getFromCache('usersInGroup-' . $gid . '-' . $search);
846
+		$groupUsers = $this->access->connection->getFromCache('usersInGroup-'.$gid.'-'.$search);
847 847
 		if (!is_null($groupUsers)) {
848 848
 			$groupUsers = array_slice($groupUsers, $offset, $limit);
849 849
 			$this->access->connection->writeToCache($cacheKey, $groupUsers);
@@ -894,7 +894,7 @@  discard block
 block discarded – undo
894 894
 					continue;
895 895
 				}
896 896
 
897
-				$cacheKey = 'userExistsOnLDAP' . $uid;
897
+				$cacheKey = 'userExistsOnLDAP'.$uid;
898 898
 				$userExists = $this->access->connection->getFromCache($cacheKey);
899 899
 				if ($userExists === false) {
900 900
 					continue;
@@ -919,7 +919,7 @@  discard block
 block discarded – undo
919 919
 
920 920
 		$groupUsers = array_unique(array_merge($groupUsers, $primaryUsers, $posixGroupUsers));
921 921
 		natsort($groupUsers);
922
-		$this->access->connection->writeToCache('usersInGroup-' . $gid . '-' . $search, $groupUsers);
922
+		$this->access->connection->writeToCache('usersInGroup-'.$gid.'-'.$search, $groupUsers);
923 923
 		$groupUsers = array_slice($groupUsers, $offset, $limit);
924 924
 
925 925
 		$this->access->connection->writeToCache($cacheKey, $groupUsers);
@@ -939,7 +939,7 @@  discard block
 block discarded – undo
939 939
 			return $this->groupPluginManager->countUsersInGroup($gid, $search);
940 940
 		}
941 941
 
942
-		$cacheKey = 'countUsersInGroup-' . $gid . '-' . $search;
942
+		$cacheKey = 'countUsersInGroup-'.$gid.'-'.$search;
943 943
 		if (!$this->enabled || !$this->groupExists($gid)) {
944 944
 			return false;
945 945
 		}
@@ -1028,10 +1028,10 @@  discard block
 block discarded – undo
1028 1028
 		if (!$this->enabled) {
1029 1029
 			return [];
1030 1030
 		}
1031
-		$cacheKey = 'getGroups-' . $search . '-' . $limit . '-' . $offset;
1031
+		$cacheKey = 'getGroups-'.$search.'-'.$limit.'-'.$offset;
1032 1032
 
1033 1033
 		//Check cache before driving unnecessary searches
1034
-		\OCP\Util::writeLog('user_ldap', 'getGroups ' . $cacheKey, ILogger::DEBUG);
1034
+		\OCP\Util::writeLog('user_ldap', 'getGroups '.$cacheKey, ILogger::DEBUG);
1035 1035
 		$ldap_groups = $this->access->connection->getFromCache($cacheKey);
1036 1036
 		if (!is_null($ldap_groups)) {
1037 1037
 			return $ldap_groups;
@@ -1046,7 +1046,7 @@  discard block
 block discarded – undo
1046 1046
 			$this->access->connection->ldapGroupFilter,
1047 1047
 			$this->access->getFilterPartForGroupSearch($search)
1048 1048
 		]);
1049
-		\OCP\Util::writeLog('user_ldap', 'getGroups Filter ' . $filter, ILogger::DEBUG);
1049
+		\OCP\Util::writeLog('user_ldap', 'getGroups Filter '.$filter, ILogger::DEBUG);
1050 1050
 		$ldap_groups = $this->access->fetchListOfGroups($filter,
1051 1051
 			[$this->access->connection->ldapGroupDisplayName, 'dn'],
1052 1052
 			$limit,
@@ -1075,7 +1075,7 @@  discard block
 block discarded – undo
1075 1075
 			return [];
1076 1076
 		}
1077 1077
 		$search = $this->access->escapeFilterPart($search, true);
1078
-		$pagingSize = (int)$this->access->connection->ldapPagingSize;
1078
+		$pagingSize = (int) $this->access->connection->ldapPagingSize;
1079 1079
 		if ($pagingSize <= 0) {
1080 1080
 			return $this->getGroupsChunk($search, $limit, $offset);
1081 1081
 		}
@@ -1091,7 +1091,7 @@  discard block
 block discarded – undo
1091 1091
 			$chunkLimit = min($pagingSize, $overallLimit - $chunkOffset);
1092 1092
 			$ldapGroups = $this->getGroupsChunk($search, $chunkLimit, $chunkOffset);
1093 1093
 			$nread = count($ldapGroups);
1094
-			\OCP\Util::writeLog('user_ldap', 'getGroups(' . $search . '): read ' . $nread . ' at offset ' . $chunkOffset . ' (limit: ' . $chunkLimit . ')', ILogger::DEBUG);
1094
+			\OCP\Util::writeLog('user_ldap', 'getGroups('.$search.'): read '.$nread.' at offset '.$chunkOffset.' (limit: '.$chunkLimit.')', ILogger::DEBUG);
1095 1095
 			if ($nread) {
1096 1096
 				$allGroups = array_merge($allGroups, $ldapGroups);
1097 1097
 				$chunkOffset += $nread;
@@ -1118,31 +1118,31 @@  discard block
 block discarded – undo
1118 1118
 	 * @return bool
1119 1119
 	 */
1120 1120
 	public function groupExists($gid) {
1121
-		$groupExists = $this->access->connection->getFromCache('groupExists' . $gid);
1121
+		$groupExists = $this->access->connection->getFromCache('groupExists'.$gid);
1122 1122
 		if (!is_null($groupExists)) {
1123
-			return (bool)$groupExists;
1123
+			return (bool) $groupExists;
1124 1124
 		}
1125 1125
 
1126 1126
 		//getting dn, if false the group does not exist. If dn, it may be mapped
1127 1127
 		//only, requires more checking.
1128 1128
 		$dn = $this->access->groupname2dn($gid);
1129 1129
 		if (!$dn) {
1130
-			$this->access->connection->writeToCache('groupExists' . $gid, false);
1130
+			$this->access->connection->writeToCache('groupExists'.$gid, false);
1131 1131
 			return false;
1132 1132
 		}
1133 1133
 
1134 1134
 		if (!$this->access->isDNPartOfBase($dn, $this->access->connection->ldapBaseGroups)) {
1135
-			$this->access->connection->writeToCache('groupExists' . $gid, false);
1135
+			$this->access->connection->writeToCache('groupExists'.$gid, false);
1136 1136
 			return false;
1137 1137
 		}
1138 1138
 
1139 1139
 		//if group really still exists, we will be able to read its objectclass
1140 1140
 		if (!is_array($this->access->readAttribute($dn, '', $this->access->connection->ldapGroupFilter))) {
1141
-			$this->access->connection->writeToCache('groupExists' . $gid, false);
1141
+			$this->access->connection->writeToCache('groupExists'.$gid, false);
1142 1142
 			return false;
1143 1143
 		}
1144 1144
 
1145
-		$this->access->connection->writeToCache('groupExists' . $gid, true);
1145
+		$this->access->connection->writeToCache('groupExists'.$gid, true);
1146 1146
 		return true;
1147 1147
 	}
1148 1148
 
@@ -1171,7 +1171,7 @@  discard block
 block discarded – undo
1171 1171
 	 * compared with GroupInterface::CREATE_GROUP etc.
1172 1172
 	 */
1173 1173
 	public function implementsActions($actions) {
1174
-		return (bool)((GroupInterface::COUNT_USERS |
1174
+		return (bool) ((GroupInterface::COUNT_USERS |
1175 1175
 				$this->groupPluginManager->getImplementedActions()) & $actions);
1176 1176
 	}
1177 1177
 
@@ -1224,7 +1224,7 @@  discard block
 block discarded – undo
1224 1224
 			if ($ret = $this->groupPluginManager->deleteGroup($gid)) {
1225 1225
 				#delete group in nextcloud internal db
1226 1226
 				$this->access->getGroupMapper()->unmap($gid);
1227
-				$this->access->connection->writeToCache("groupExists" . $gid, false);
1227
+				$this->access->connection->writeToCache("groupExists".$gid, false);
1228 1228
 			}
1229 1229
 			return $ret;
1230 1230
 		}
@@ -1304,7 +1304,7 @@  discard block
 block discarded – undo
1304 1304
 			return $this->groupPluginManager->getDisplayName($gid);
1305 1305
 		}
1306 1306
 
1307
-		$cacheKey = 'group_getDisplayName' . $gid;
1307
+		$cacheKey = 'group_getDisplayName'.$gid;
1308 1308
 		if (!is_null($displayName = $this->access->connection->getFromCache($cacheKey))) {
1309 1309
 			return $displayName;
1310 1310
 		}
Please login to merge, or discard this patch.
apps/user_ldap/lib/Helper.php 1 patch
Spacing   +6 added lines, -6 removed lines patch added patch discarded remove patch
@@ -131,12 +131,12 @@  discard block
 block discarded – undo
131 131
 
132 132
 		sort($serverConnections);
133 133
 		$lastKey = array_pop($serverConnections);
134
-		$lastNumber = (int)str_replace('s', '', $lastKey);
135
-		return 's' . str_pad($lastNumber + 1, 2, '0', STR_PAD_LEFT);
134
+		$lastNumber = (int) str_replace('s', '', $lastKey);
135
+		return 's'.str_pad($lastNumber + 1, 2, '0', STR_PAD_LEFT);
136 136
 	}
137 137
 
138 138
 	private function getServersConfig($value) {
139
-		$regex = '/' . $value . '$/S';
139
+		$regex = '/'.$value.'$/S';
140 140
 
141 141
 		$keys = $this->config->getAppKeys('user_ldap');
142 142
 		$result = [];
@@ -169,11 +169,11 @@  discard block
 block discarded – undo
169 169
 			DELETE
170 170
 			FROM `*PREFIX*appconfig`
171 171
 			WHERE `configkey` LIKE ?
172
-				' . $saveOtherConfigurations . '
172
+				' . $saveOtherConfigurations.'
173 173
 				AND `appid` = \'user_ldap\'
174 174
 				AND `configkey` NOT IN (\'enabled\', \'installed_version\', \'types\', \'bgjUpdateGroupsLastRun\')
175 175
 		');
176
-		$delRows = $query->execute([$prefix . '%']);
176
+		$delRows = $query->execute([$prefix.'%']);
177 177
 
178 178
 		if ($delRows === null) {
179 179
 			return false;
@@ -254,7 +254,7 @@  discard block
 block discarded – undo
254 254
 		}
255 255
 
256 256
 		if (!is_string($dn)) {
257
-			throw new \LogicException('String expected ' . \gettype($dn) . ' given');
257
+			throw new \LogicException('String expected '.\gettype($dn).' given');
258 258
 		}
259 259
 
260 260
 		if (($sanitizedDn = $this->sanitizeDnCache->get($dn)) !== null) {
Please login to merge, or discard this patch.
apps/user_ldap/lib/Mapping/UserMapping.php 1 patch
Spacing   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -35,6 +35,6 @@
 block discarded – undo
35 35
 	 */
36 36
 	protected function getTableName(bool $includePrefix = true) {
37 37
 		$p = $includePrefix ? '*PREFIX*' : '';
38
-		return $p . 'ldap_user_mapping';
38
+		return $p.'ldap_user_mapping';
39 39
 	}
40 40
 }
Please login to merge, or discard this patch.
apps/user_ldap/lib/Mapping/AbstractMapping.php 1 patch
Spacing   +13 added lines, -13 removed lines patch added patch discarded remove patch
@@ -89,9 +89,9 @@  discard block
 block discarded – undo
89 89
 			throw new \Exception('Invalid Column Name');
90 90
 		}
91 91
 		$query = $this->dbc->prepare('
92
-			SELECT `' . $fetchCol . '`
93
-			FROM `' . $this->getTableName() . '`
94
-			WHERE `' . $compareCol . '` = ?
92
+			SELECT `' . $fetchCol.'`
93
+			FROM `' . $this->getTableName().'`
94
+			WHERE `' . $compareCol.'` = ?
95 95
 		');
96 96
 
97 97
 		$res = $query->execute([$search]);
@@ -140,7 +140,7 @@  discard block
 block discarded – undo
140 140
 	public function setDNbyUUID($fdn, $uuid) {
141 141
 		$oldDn = $this->getDnByUUID($uuid);
142 142
 		$query = $this->dbc->prepare('
143
-			UPDATE `' . $this->getTableName() . '`
143
+			UPDATE `' . $this->getTableName().'`
144 144
 			SET `ldap_dn` = ?
145 145
 			WHERE `directory_uuid` = ?
146 146
 		');
@@ -166,7 +166,7 @@  discard block
 block discarded – undo
166 166
 	 */
167 167
 	public function setUUIDbyDN($uuid, $fdn) {
168 168
 		$query = $this->dbc->prepare('
169
-			UPDATE `' . $this->getTableName() . '`
169
+			UPDATE `' . $this->getTableName().'`
170 170
 			SET `directory_uuid` = ?
171 171
 			WHERE `ldap_dn` = ?
172 172
 		');
@@ -217,11 +217,11 @@  discard block
 block discarded – undo
217 217
 	public function getNamesBySearch($search, $prefixMatch = "", $postfixMatch = "") {
218 218
 		$query = $this->dbc->prepare('
219 219
 			SELECT `owncloud_name`
220
-			FROM `' . $this->getTableName() . '`
220
+			FROM `' . $this->getTableName().'`
221 221
 			WHERE `owncloud_name` LIKE ?
222 222
 		');
223 223
 
224
-		$res = $query->execute([$prefixMatch . $this->dbc->escapeLikeParameter($search) . $postfixMatch]);
224
+		$res = $query->execute([$prefixMatch.$this->dbc->escapeLikeParameter($search).$postfixMatch]);
225 225
 		$names = [];
226 226
 		if ($res !== false) {
227 227
 			while ($row = $query->fetch()) {
@@ -269,7 +269,7 @@  discard block
 block discarded – undo
269 269
 				`ldap_dn` AS `dn`,
270 270
 				`owncloud_name` AS `name`,
271 271
 				`directory_uuid` AS `uuid`
272
-			FROM `' . $this->getTableName() . '`',
272
+			FROM `' . $this->getTableName().'`',
273 273
 			$limit,
274 274
 			$offset
275 275
 		);
@@ -306,11 +306,11 @@  discard block
 block discarded – undo
306 306
 
307 307
 		try {
308 308
 			$result = $this->dbc->insertIfNotExist($this->getTableName(), $row);
309
-			if ((bool)$result === true) {
309
+			if ((bool) $result === true) {
310 310
 				$this->cache[$fdn] = $name;
311 311
 			}
312 312
 			// insertIfNotExist returns values as int
313
-			return (bool)$result;
313
+			return (bool) $result;
314 314
 		} catch (\Exception $e) {
315 315
 			return false;
316 316
 		}
@@ -324,7 +324,7 @@  discard block
 block discarded – undo
324 324
 	 */
325 325
 	public function unmap($name) {
326 326
 		$query = $this->dbc->prepare('
327
-			DELETE FROM `' . $this->getTableName() . '`
327
+			DELETE FROM `' . $this->getTableName().'`
328 328
 			WHERE `owncloud_name` = ?');
329 329
 
330 330
 		return $this->modify($query, [$name]);
@@ -338,7 +338,7 @@  discard block
 block discarded – undo
338 338
 	public function clear() {
339 339
 		$sql = $this->dbc
340 340
 			->getDatabasePlatform()
341
-			->getTruncateTableSQL('`' . $this->getTableName() . '`');
341
+			->getTruncateTableSQL('`'.$this->getTableName().'`');
342 342
 		return $this->dbc->prepare($sql)->execute();
343 343
 	}
344 344
 
@@ -380,6 +380,6 @@  discard block
 block discarded – undo
380 380
 		$res = $query->execute();
381 381
 		$count = $res->fetchColumn();
382 382
 		$res->closeCursor();
383
-		return (int)$count;
383
+		return (int) $count;
384 384
 	}
385 385
 }
Please login to merge, or discard this patch.
apps/user_ldap/lib/Mapping/GroupMapping.php 1 patch
Spacing   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -35,6 +35,6 @@
 block discarded – undo
35 35
 	 */
36 36
 	protected function getTableName(bool $includePrefix = true) {
37 37
 		$p = $includePrefix ? '*PREFIX*' : '';
38
-		return $p . 'ldap_group_mapping';
38
+		return $p.'ldap_group_mapping';
39 39
 	}
40 40
 }
Please login to merge, or discard this patch.
apps/user_ldap/lib/Access.php 1 patch
Spacing   +52 added lines, -52 removed lines patch added patch discarded remove patch
@@ -203,7 +203,7 @@  discard block
 block discarded – undo
203 203
 		$this->abandonPagedSearch();
204 204
 		// openLDAP requires that we init a new Paged Search. Not needed by AD,
205 205
 		// but does not hurt either.
206
-		$pagingSize = (int)$this->connection->ldapPagingSize;
206
+		$pagingSize = (int) $this->connection->ldapPagingSize;
207 207
 		// 0 won't result in replies, small numbers may leave out groups
208 208
 		// (cf. #12306), 500 is default for paging and should work everywhere.
209 209
 		$maxResults = $pagingSize > 20 ? $pagingSize : 500;
@@ -244,13 +244,13 @@  discard block
 block discarded – undo
244 244
 					return $values;
245 245
 				} else {
246 246
 					$low = $result['rangeHigh'] + 1;
247
-					$attrToRead = $result['attributeName'] . ';range=' . $low . '-*';
247
+					$attrToRead = $result['attributeName'].';range='.$low.'-*';
248 248
 					$isRangeRequest = true;
249 249
 				}
250 250
 			}
251 251
 		} while ($isRangeRequest);
252 252
 
253
-		\OCP\Util::writeLog('user_ldap', 'Requested attribute ' . $attr . ' not found for ' . $dn, ILogger::DEBUG);
253
+		\OCP\Util::writeLog('user_ldap', 'Requested attribute '.$attr.' not found for '.$dn, ILogger::DEBUG);
254 254
 		return false;
255 255
 	}
256 256
 
@@ -274,13 +274,13 @@  discard block
 block discarded – undo
274 274
 		if (!$this->ldap->isResource($rr)) {
275 275
 			if ($attribute !== '') {
276 276
 				//do not throw this message on userExists check, irritates
277
-				\OCP\Util::writeLog('user_ldap', 'readAttribute failed for DN ' . $dn, ILogger::DEBUG);
277
+				\OCP\Util::writeLog('user_ldap', 'readAttribute failed for DN '.$dn, ILogger::DEBUG);
278 278
 			}
279 279
 			//in case an error occurs , e.g. object does not exist
280 280
 			return false;
281 281
 		}
282 282
 		if ($attribute === '' && ($filter === 'objectclass=*' || $this->invokeLDAPMethod('countEntries', $cr, $rr) === 1)) {
283
-			\OCP\Util::writeLog('user_ldap', 'readAttribute: ' . $dn . ' found', ILogger::DEBUG);
283
+			\OCP\Util::writeLog('user_ldap', 'readAttribute: '.$dn.' found', ILogger::DEBUG);
284 284
 			return true;
285 285
 		}
286 286
 		$er = $this->invokeLDAPMethod('firstEntry', $cr, $rr);
@@ -360,7 +360,7 @@  discard block
 block discarded – undo
360 360
 	 * @throws \Exception
361 361
 	 */
362 362
 	public function setPassword($userDN, $password) {
363
-		if ((int)$this->connection->turnOnPasswordChange !== 1) {
363
+		if ((int) $this->connection->turnOnPasswordChange !== 1) {
364 364
 			throw new \Exception('LDAP password changes are disabled.');
365 365
 		}
366 366
 		$cr = $this->connection->getConnectionResource();
@@ -374,7 +374,7 @@  discard block
 block discarded – undo
374 374
 			return @$this->invokeLDAPMethod('exopPasswd', $cr, $userDN, '', $password) ||
375 375
 				@$this->invokeLDAPMethod('modReplace', $cr, $userDN, $password);
376 376
 		} catch (ConstraintViolationException $e) {
377
-			throw new HintException('Password change rejected.', \OC::$server->getL10N('user_ldap')->t('Password change rejected. Hint: ') . $e->getMessage(), $e->getCode());
377
+			throw new HintException('Password change rejected.', \OC::$server->getL10N('user_ldap')->t('Password change rejected. Hint: ').$e->getMessage(), $e->getCode());
378 378
 		}
379 379
 	}
380 380
 
@@ -540,21 +540,21 @@  discard block
 block discarded – undo
540 540
 			}
541 541
 		} else {
542 542
 			//If the UUID can't be detected something is foul.
543
-			\OCP\Util::writeLog('user_ldap', 'Cannot determine UUID for ' . $fdn . '. Skipping.', ILogger::INFO);
543
+			\OCP\Util::writeLog('user_ldap', 'Cannot determine UUID for '.$fdn.'. Skipping.', ILogger::INFO);
544 544
 			return false;
545 545
 		}
546 546
 
547 547
 		if (is_null($ldapName)) {
548 548
 			$ldapName = $this->readAttribute($fdn, $nameAttribute, $filter);
549 549
 			if (!isset($ldapName[0]) && empty($ldapName[0])) {
550
-				\OCP\Util::writeLog('user_ldap', 'No or empty name for ' . $fdn . ' with filter ' . $filter . '.', ILogger::INFO);
550
+				\OCP\Util::writeLog('user_ldap', 'No or empty name for '.$fdn.' with filter '.$filter.'.', ILogger::INFO);
551 551
 				return false;
552 552
 			}
553 553
 			$ldapName = $ldapName[0];
554 554
 		}
555 555
 
556 556
 		if ($isUser) {
557
-			$usernameAttribute = (string)$this->connection->ldapExpertUsernameAttr;
557
+			$usernameAttribute = (string) $this->connection->ldapExpertUsernameAttr;
558 558
 			if ($usernameAttribute !== '') {
559 559
 				$username = $this->readAttribute($fdn, $usernameAttribute);
560 560
 				$username = $username[0];
@@ -606,7 +606,7 @@  discard block
 block discarded – undo
606 606
 		}
607 607
 
608 608
 		//if everything else did not help..
609
-		\OCP\Util::writeLog('user_ldap', 'Could not create unique name for ' . $fdn . '.', ILogger::INFO);
609
+		\OCP\Util::writeLog('user_ldap', 'Could not create unique name for '.$fdn.'.', ILogger::INFO);
610 610
 		return false;
611 611
 	}
612 612
 
@@ -721,7 +721,7 @@  discard block
 block discarded – undo
721 721
 	 * @param string|false $home the home directory path
722 722
 	 */
723 723
 	public function cacheUserHome($ocName, $home) {
724
-		$cacheKey = 'getHome' . $ocName;
724
+		$cacheKey = 'getHome'.$ocName;
725 725
 		$this->connection->writeToCache($cacheKey, $home);
726 726
 	}
727 727
 
@@ -731,14 +731,14 @@  discard block
 block discarded – undo
731 731
 	 * @param string $ocName the internal Nextcloud username
732 732
 	 */
733 733
 	public function cacheUserExists($ocName) {
734
-		$this->connection->writeToCache('userExists' . $ocName, true);
734
+		$this->connection->writeToCache('userExists'.$ocName, true);
735 735
 	}
736 736
 
737 737
 	/**
738 738
 	 * caches a group as existing
739 739
 	 */
740 740
 	public function cacheGroupExists(string $gid): void {
741
-		$this->connection->writeToCache('groupExists' . $gid, true);
741
+		$this->connection->writeToCache('groupExists'.$gid, true);
742 742
 	}
743 743
 
744 744
 	/**
@@ -756,11 +756,11 @@  discard block
 block discarded – undo
756 756
 		}
757 757
 		$displayName = $user->composeAndStoreDisplayName($displayName, $displayName2);
758 758
 		$cacheKeyTrunk = 'getDisplayName';
759
-		$this->connection->writeToCache($cacheKeyTrunk . $ocName, $displayName);
759
+		$this->connection->writeToCache($cacheKeyTrunk.$ocName, $displayName);
760 760
 	}
761 761
 
762 762
 	public function cacheGroupDisplayName(string $ncName, string $displayName): void {
763
-		$cacheKey = 'group_getDisplayName' . $ncName;
763
+		$cacheKey = 'group_getDisplayName'.$ncName;
764 764
 		$this->connection->writeToCache($cacheKey, $displayName);
765 765
 	}
766 766
 
@@ -778,7 +778,7 @@  discard block
 block discarded – undo
778 778
 		//while loop is just a precaution. If a name is not generated within
779 779
 		//20 attempts, something else is very wrong. Avoids infinite loop.
780 780
 		while ($attempts < 20) {
781
-			$altName = $name . '_' . rand(1000, 9999);
781
+			$altName = $name.'_'.rand(1000, 9999);
782 782
 			if (!$this->ncUserManager->userExists($altName)) {
783 783
 				return $altName;
784 784
 			}
@@ -807,9 +807,9 @@  discard block
 block discarded – undo
807 807
 		} else {
808 808
 			natsort($usedNames);
809 809
 			$lastName = array_pop($usedNames);
810
-			$lastNo = (int)substr($lastName, strrpos($lastName, '_') + 1);
810
+			$lastNo = (int) substr($lastName, strrpos($lastName, '_') + 1);
811 811
 		}
812
-		$altName = $name . '_' . (string)($lastNo + 1);
812
+		$altName = $name.'_'.(string) ($lastNo + 1);
813 813
 		unset($usedNames);
814 814
 
815 815
 		$attempts = 1;
@@ -820,7 +820,7 @@  discard block
 block discarded – undo
820 820
 			if (!\OC::$server->getGroupManager()->groupExists($altName)) {
821 821
 				return $altName;
822 822
 			}
823
-			$altName = $name . '_' . ($lastNo + $attempts);
823
+			$altName = $name.'_'.($lastNo + $attempts);
824 824
 			$attempts++;
825 825
 		}
826 826
 		return false;
@@ -888,12 +888,12 @@  discard block
 block discarded – undo
888 888
 		if (!$forceApplyAttributes) {
889 889
 			$isBackgroundJobModeAjax = $this->config
890 890
 					->getAppValue('core', 'backgroundjobs_mode', 'ajax') === 'ajax';
891
-			$listOfDNs = array_reduce($ldapRecords, function ($listOfDNs, $entry) {
891
+			$listOfDNs = array_reduce($ldapRecords, function($listOfDNs, $entry) {
892 892
 				$listOfDNs[] = $entry['dn'][0];
893 893
 				return $listOfDNs;
894 894
 			}, []);
895 895
 			$idsByDn = $this->userMapper->getListOfIdsByDn($listOfDNs);
896
-			$recordsToUpdate = array_filter($ldapRecords, function ($record) use ($isBackgroundJobModeAjax, $idsByDn) {
896
+			$recordsToUpdate = array_filter($ldapRecords, function($record) use ($isBackgroundJobModeAjax, $idsByDn) {
897 897
 				$newlyMapped = false;
898 898
 				$uid = $idsByDn[$record['dn'][0]] ?? null;
899 899
 				if ($uid === null) {
@@ -951,13 +951,13 @@  discard block
 block discarded – undo
951 951
 	public function fetchListOfGroups($filter, $attr, $limit = null, $offset = null) {
952 952
 		$groupRecords = $this->searchGroups($filter, $attr, $limit, $offset);
953 953
 
954
-		$listOfDNs = array_reduce($groupRecords, function ($listOfDNs, $entry) {
954
+		$listOfDNs = array_reduce($groupRecords, function($listOfDNs, $entry) {
955 955
 			$listOfDNs[] = $entry['dn'][0];
956 956
 			return $listOfDNs;
957 957
 		}, []);
958 958
 		$idsByDn = $this->groupMapper->getListOfIdsByDn($listOfDNs);
959 959
 
960
-		array_walk($groupRecords, function ($record) use ($idsByDn) {
960
+		array_walk($groupRecords, function($record) use ($idsByDn) {
961 961
 			$newlyMapped = false;
962 962
 			$gid = $uidsByDn[$record['dn'][0]] ?? null;
963 963
 			if ($gid === null) {
@@ -980,7 +980,7 @@  discard block
 block discarded – undo
980 980
 			if ($manyAttributes) {
981 981
 				return $list;
982 982
 			} else {
983
-				$list = array_reduce($list, function ($carry, $item) {
983
+				$list = array_reduce($list, function($carry, $item) {
984 984
 					$attribute = array_keys($item)[0];
985 985
 					$carry[] = $item[$attribute][0];
986 986
 					return $carry;
@@ -1025,7 +1025,7 @@  discard block
 block discarded – undo
1025 1025
 		$result = false;
1026 1026
 		foreach ($this->connection->ldapBaseUsers as $base) {
1027 1027
 			$count = $this->count($filter, [$base], $attr, $limit, $offset);
1028
-			$result = is_int($count) ? (int)$result + $count : $result;
1028
+			$result = is_int($count) ? (int) $result + $count : $result;
1029 1029
 		}
1030 1030
 		return $result;
1031 1031
 	}
@@ -1064,7 +1064,7 @@  discard block
 block discarded – undo
1064 1064
 		$result = false;
1065 1065
 		foreach ($this->connection->ldapBaseGroups as $base) {
1066 1066
 			$count = $this->count($filter, [$base], $attr, $limit, $offset);
1067
-			$result = is_int($count) ? (int)$result + $count : $result;
1067
+			$result = is_int($count) ? (int) $result + $count : $result;
1068 1068
 		}
1069 1069
 		return $result;
1070 1070
 	}
@@ -1081,7 +1081,7 @@  discard block
 block discarded – undo
1081 1081
 		$result = false;
1082 1082
 		foreach ($this->connection->ldapBase as $base) {
1083 1083
 			$count = $this->count('objectclass=*', [$base], ['dn'], $limit, $offset);
1084
-			$result = is_int($count) ? (int)$result + $count : $result;
1084
+			$result = is_int($count) ? (int) $result + $count : $result;
1085 1085
 		}
1086 1086
 		return $result;
1087 1087
 	}
@@ -1107,7 +1107,7 @@  discard block
 block discarded – undo
1107 1107
 		// php no longer supports call-time pass-by-reference
1108 1108
 		// thus cannot support controlPagedResultResponse as the third argument
1109 1109
 		// is a reference
1110
-		$doMethod = function () use ($command, &$arguments) {
1110
+		$doMethod = function() use ($command, &$arguments) {
1111 1111
 			if ($command == 'controlPagedResultResponse') {
1112 1112
 				throw new \InvalidArgumentException('Invoker does not support controlPagedResultResponse, call LDAP Wrapper directly instead.');
1113 1113
 			} else {
@@ -1166,13 +1166,13 @@  discard block
 block discarded – undo
1166 1166
 		}
1167 1167
 
1168 1168
 		//check whether paged search should be attempted
1169
-		$pagedSearchOK = $this->initPagedSearch($filter, $base, $attr, (int)$limit, (int)$offset);
1169
+		$pagedSearchOK = $this->initPagedSearch($filter, $base, $attr, (int) $limit, (int) $offset);
1170 1170
 
1171 1171
 		$sr = $this->invokeLDAPMethod('search', $cr, $base, $filter, $attr);
1172 1172
 		// cannot use $cr anymore, might have changed in the previous call!
1173 1173
 		$error = $this->ldap->errno($this->connection->getConnectionResource());
1174 1174
 		if (!$this->ldap->isResource($sr) || $error !== 0) {
1175
-			\OCP\Util::writeLog('user_ldap', 'Attempt for Paging?  ' . print_r($pagedSearchOK, true), ILogger::ERROR);
1175
+			\OCP\Util::writeLog('user_ldap', 'Attempt for Paging?  '.print_r($pagedSearchOK, true), ILogger::ERROR);
1176 1176
 			return false;
1177 1177
 		}
1178 1178
 
@@ -1216,7 +1216,7 @@  discard block
 block discarded – undo
1216 1216
 				$this->pagedSearchedSuccessful = true;
1217 1217
 			}
1218 1218
 		} else {
1219
-			if (!is_null($limit) && (int)$this->connection->ldapPagingSize !== 0) {
1219
+			if (!is_null($limit) && (int) $this->connection->ldapPagingSize !== 0) {
1220 1220
 				\OC::$server->getLogger()->debug(
1221 1221
 					'Paged search was not available',
1222 1222
 					['app' => 'user_ldap']
@@ -1262,7 +1262,7 @@  discard block
 block discarded – undo
1262 1262
 			$attr = [mb_strtolower($attr, 'UTF-8')];
1263 1263
 		}
1264 1264
 
1265
-		$limitPerPage = (int)$this->connection->ldapPagingSize;
1265
+		$limitPerPage = (int) $this->connection->ldapPagingSize;
1266 1266
 		if (!is_null($limit) && $limit < $limitPerPage && $limit > 0) {
1267 1267
 			$limitPerPage = $limit;
1268 1268
 		}
@@ -1304,7 +1304,7 @@  discard block
 block discarded – undo
1304 1304
 	 * @throws ServerNotAvailableException
1305 1305
 	 */
1306 1306
 	private function countEntriesInSearchResults($sr): int {
1307
-		return (int)$this->invokeLDAPMethod('countEntries', $this->connection->getConnectionResource(), $sr);
1307
+		return (int) $this->invokeLDAPMethod('countEntries', $this->connection->getConnectionResource(), $sr);
1308 1308
 	}
1309 1309
 
1310 1310
 	/**
@@ -1320,7 +1320,7 @@  discard block
 block discarded – undo
1320 1320
 		?int $offset = null,
1321 1321
 		bool $skipHandling = false
1322 1322
 	): array {
1323
-		$limitPerPage = (int)$this->connection->ldapPagingSize;
1323
+		$limitPerPage = (int) $this->connection->ldapPagingSize;
1324 1324
 		if (!is_null($limit) && $limit < $limitPerPage && $limit > 0) {
1325 1325
 			$limitPerPage = $limit;
1326 1326
 		}
@@ -1412,7 +1412,7 @@  discard block
 block discarded – undo
1412 1412
 				&& !is_null($limit)
1413 1413
 			)
1414 1414
 		) {
1415
-			$findings = array_slice($findings, (int)$offset, $limit);
1415
+			$findings = array_slice($findings, (int) $offset, $limit);
1416 1416
 		}
1417 1417
 		return $findings;
1418 1418
 	}
@@ -1464,7 +1464,7 @@  discard block
 block discarded – undo
1464 1464
 		}
1465 1465
 		$search = ['*', '\\', '(', ')'];
1466 1466
 		$replace = ['\\*', '\\\\', '\\(', '\\)'];
1467
-		return $asterisk . str_replace($search, $replace, $input);
1467
+		return $asterisk.str_replace($search, $replace, $input);
1468 1468
 	}
1469 1469
 
1470 1470
 	/**
@@ -1496,10 +1496,10 @@  discard block
 block discarded – undo
1496 1496
 	 * @return string the combined filter
1497 1497
 	 */
1498 1498
 	private function combineFilter($filters, $operator) {
1499
-		$combinedFilter = '(' . $operator;
1499
+		$combinedFilter = '('.$operator;
1500 1500
 		foreach ($filters as $filter) {
1501 1501
 			if ($filter !== '' && $filter[0] !== '(') {
1502
-				$filter = '(' . $filter . ')';
1502
+				$filter = '('.$filter.')';
1503 1503
 			}
1504 1504
 			$combinedFilter .= $filter;
1505 1505
 		}
@@ -1552,7 +1552,7 @@  discard block
 block discarded – undo
1552 1552
 			//every word needs to appear at least once
1553 1553
 			$wordMatchOneAttrFilters = [];
1554 1554
 			foreach ($searchAttributes as $attr) {
1555
-				$wordMatchOneAttrFilters[] = $attr . '=' . $word;
1555
+				$wordMatchOneAttrFilters[] = $attr.'='.$word;
1556 1556
 			}
1557 1557
 			$wordFilters[] = $this->combineFilterWithOr($wordMatchOneAttrFilters);
1558 1558
 		}
@@ -1588,14 +1588,14 @@  discard block
 block discarded – undo
1588 1588
 			if ($fallbackAttribute === '') {
1589 1589
 				return '';
1590 1590
 			}
1591
-			$filter[] = $fallbackAttribute . '=' . $search;
1591
+			$filter[] = $fallbackAttribute.'='.$search;
1592 1592
 		} else {
1593 1593
 			foreach ($searchAttributes as $attribute) {
1594
-				$filter[] = $attribute . '=' . $search;
1594
+				$filter[] = $attribute.'='.$search;
1595 1595
 			}
1596 1596
 		}
1597 1597
 		if (count($filter) === 1) {
1598
-			return '(' . $filter[0] . ')';
1598
+			return '('.$filter[0].')';
1599 1599
 		}
1600 1600
 		return $this->combineFilterWithOr($filter);
1601 1601
 	}
@@ -1616,7 +1616,7 @@  discard block
 block discarded – undo
1616 1616
 		if ($term === '') {
1617 1617
 			$result = '*';
1618 1618
 		} elseif ($allowEnum !== 'no') {
1619
-			$result = $term . '*';
1619
+			$result = $term.'*';
1620 1620
 		}
1621 1621
 		return $result;
1622 1622
 	}
@@ -1629,7 +1629,7 @@  discard block
 block discarded – undo
1629 1629
 	public function getFilterForUserCount() {
1630 1630
 		$filter = $this->combineFilterWithAnd([
1631 1631
 			$this->connection->ldapUserFilter,
1632
-			$this->connection->ldapUserDisplayName . '=*'
1632
+			$this->connection->ldapUserDisplayName.'=*'
1633 1633
 		]);
1634 1634
 
1635 1635
 		return $filter;
@@ -1695,7 +1695,7 @@  discard block
 block discarded – undo
1695 1695
 			$uuid = $this->formatGuid2ForFilterUser($uuid);
1696 1696
 		}
1697 1697
 
1698
-		$filter = $uuidAttr . '=' . $uuid;
1698
+		$filter = $uuidAttr.'='.$uuid;
1699 1699
 		$result = $this->searchUsers($filter, ['dn'], 2);
1700 1700
 		if (is_array($result) && isset($result[0]) && isset($result[0]['dn']) && count($result) === 1) {
1701 1701
 			// we put the count into account to make sure that this is
@@ -1825,8 +1825,8 @@  discard block
 block discarded – undo
1825 1825
 		for ($k = 1; $k <= 2; ++$k) {
1826 1826
 			$hex_guid_to_guid_str .= substr($hex_guid, 16 - 2 * $k, 2);
1827 1827
 		}
1828
-		$hex_guid_to_guid_str .= '-' . substr($hex_guid, 16, 4);
1829
-		$hex_guid_to_guid_str .= '-' . substr($hex_guid, 20);
1828
+		$hex_guid_to_guid_str .= '-'.substr($hex_guid, 16, 4);
1829
+		$hex_guid_to_guid_str .= '-'.substr($hex_guid, 20);
1830 1830
 
1831 1831
 		return strtoupper($hex_guid_to_guid_str);
1832 1832
 	}
@@ -1860,7 +1860,7 @@  discard block
 block discarded – undo
1860 1860
 			 * user. Instead we write a log message.
1861 1861
 			 */
1862 1862
 			\OC::$server->getLogger()->info(
1863
-				'Passed string does not resemble a valid GUID. Known UUID ' .
1863
+				'Passed string does not resemble a valid GUID. Known UUID '.
1864 1864
 				'({uuid}) probably does not match UUID configuration.',
1865 1865
 				['app' => 'user_ldap', 'uuid' => $guid]
1866 1866
 			);
@@ -1873,7 +1873,7 @@  discard block
 block discarded – undo
1873 1873
 		}
1874 1874
 		for ($i = 0; $i < 5; $i++) {
1875 1875
 			$pairs = str_split($blocks[$i], 2);
1876
-			$blocks[$i] = '\\' . implode('\\', $pairs);
1876
+			$blocks[$i] = '\\'.implode('\\', $pairs);
1877 1877
 		}
1878 1878
 		return implode('', $blocks);
1879 1879
 	}
@@ -1887,7 +1887,7 @@  discard block
 block discarded – undo
1887 1887
 	 */
1888 1888
 	public function getSID($dn) {
1889 1889
 		$domainDN = $this->getDomainDNFromDN($dn);
1890
-		$cacheKey = 'getSID-' . $domainDN;
1890
+		$cacheKey = 'getSID-'.$domainDN;
1891 1891
 		$sid = $this->connection->getFromCache($cacheKey);
1892 1892
 		if (!is_null($sid)) {
1893 1893
 			return $sid;
@@ -2075,7 +2075,7 @@  discard block
 block discarded – undo
2075 2075
 			$this->abandonPagedSearch();
2076 2076
 			// in case someone set it to 0 … use 500, otherwise no results will
2077 2077
 			// be returned.
2078
-			$pageSize = (int)$this->connection->ldapPagingSize > 0 ? (int)$this->connection->ldapPagingSize : 500;
2078
+			$pageSize = (int) $this->connection->ldapPagingSize > 0 ? (int) $this->connection->ldapPagingSize : 500;
2079 2079
 			$pagedSearchOK = $this->invokeLDAPMethod('controlPagedResult',
2080 2080
 				$this->connection->getConnectionResource(),
2081 2081
 				$pageSize, false);
Please login to merge, or discard this patch.
apps/user_ldap/lib/Proxy.php 1 patch
Spacing   +3 added lines, -3 removed lines patch added patch discarded remove patch
@@ -107,7 +107,7 @@  discard block
 block discarded – undo
107 107
 	 * @return string
108 108
 	 */
109 109
 	protected function getUserCacheKey($uid) {
110
-		return 'user-' . $uid . '-lastSeenOn';
110
+		return 'user-'.$uid.'-lastSeenOn';
111 111
 	}
112 112
 
113 113
 	/**
@@ -115,7 +115,7 @@  discard block
 block discarded – undo
115 115
 	 * @return string
116 116
 	 */
117 117
 	protected function getGroupCacheKey($gid) {
118
-		return 'group-' . $gid . '-lastSeenOn';
118
+		return 'group-'.$gid.'-lastSeenOn';
119 119
 	}
120 120
 
121 121
 	/**
@@ -178,7 +178,7 @@  discard block
 block discarded – undo
178 178
 		if ($key === null) {
179 179
 			return $prefix;
180 180
 		}
181
-		return $prefix . hash('sha256', $key);
181
+		return $prefix.hash('sha256', $key);
182 182
 	}
183 183
 
184 184
 	/**
Please login to merge, or discard this patch.