@@ -58,8 +58,8 @@ |
||
| 58 | 58 | */ |
| 59 | 59 | public function postConnect(ConnectionEventArgs $args) { |
| 60 | 60 | $sensitive = $this->caseSensitiveLike ? 'true' : 'false'; |
| 61 | - $args->getConnection()->executeUpdate('PRAGMA case_sensitive_like = ' . $sensitive); |
|
| 62 | - $args->getConnection()->executeUpdate('PRAGMA journal_mode = ' . $this->journalMode); |
|
| 61 | + $args->getConnection()->executeUpdate('PRAGMA case_sensitive_like = '.$sensitive); |
|
| 62 | + $args->getConnection()->executeUpdate('PRAGMA journal_mode = '.$this->journalMode); |
|
| 63 | 63 | /** @var \Doctrine\DBAL\Driver\PDO\Connection $connection */ |
| 64 | 64 | $connection = $args->getConnection()->getWrappedConnection(); |
| 65 | 65 | $pdo = $connection->getWrappedConnection(); |
@@ -134,7 +134,7 @@ discard block |
||
| 134 | 134 | $this->input = $input; |
| 135 | 135 | $this->output = $output; |
| 136 | 136 | |
| 137 | - $headline = 'Encrypt all files with the ' . Encryption::DISPLAY_NAME; |
|
| 137 | + $headline = 'Encrypt all files with the '.Encryption::DISPLAY_NAME; |
|
| 138 | 138 | $this->output->writeln("\n"); |
| 139 | 139 | $this->output->writeln($headline); |
| 140 | 140 | $this->output->writeln(str_pad('', strlen($headline), '=')); |
@@ -190,7 +190,7 @@ discard block |
||
| 190 | 190 | $users = $backend->getUsers('', $limit, $offset); |
| 191 | 191 | foreach ($users as $user) { |
| 192 | 192 | if ($this->keyManager->userHasKeys($user) === false) { |
| 193 | - $progress->setMessage('Create key-pair for ' . $user); |
|
| 193 | + $progress->setMessage('Create key-pair for '.$user); |
|
| 194 | 194 | $progress->advance(); |
| 195 | 195 | $this->setupUserFS($user); |
| 196 | 196 | $password = $this->generateOneTimePassword($user); |
@@ -264,12 +264,12 @@ discard block |
||
| 264 | 264 | protected function encryptUsersFiles($uid, ProgressBar $progress, $userCount) { |
| 265 | 265 | $this->setupUserFS($uid); |
| 266 | 266 | $directories = []; |
| 267 | - $directories[] = '/' . $uid . '/files'; |
|
| 267 | + $directories[] = '/'.$uid.'/files'; |
|
| 268 | 268 | |
| 269 | 269 | while ($root = array_pop($directories)) { |
| 270 | 270 | $content = $this->rootView->getDirectoryContent($root); |
| 271 | 271 | foreach ($content as $file) { |
| 272 | - $path = $root . '/' . $file['name']; |
|
| 272 | + $path = $root.'/'.$file['name']; |
|
| 273 | 273 | if ($this->rootView->is_dir($path)) { |
| 274 | 274 | $directories[] = $path; |
| 275 | 275 | continue; |
@@ -300,7 +300,7 @@ discard block |
||
| 300 | 300 | } |
| 301 | 301 | |
| 302 | 302 | $source = $path; |
| 303 | - $target = $path . '.encrypted.' . time(); |
|
| 303 | + $target = $path.'.encrypted.'.time(); |
|
| 304 | 304 | |
| 305 | 305 | try { |
| 306 | 306 | $this->rootView->copy($source, $target); |
@@ -74,7 +74,7 @@ discard block |
||
| 74 | 74 | $qb = $this->dbc->getQueryBuilder(); |
| 75 | 75 | $qb->select(['id', 'principaluri']) |
| 76 | 76 | ->from('dav_shares') |
| 77 | - ->where($qb->expr()->like('principaluri', $qb->createNamedParameter(self::GROUP_PRINCIPAL_PREFIX . '%'))); |
|
| 77 | + ->where($qb->expr()->like('principaluri', $qb->createNamedParameter(self::GROUP_PRINCIPAL_PREFIX.'%'))); |
|
| 78 | 78 | |
| 79 | 79 | $updateQuery = $this->dbc->getQueryBuilder(); |
| 80 | 80 | $updateQuery->update('dav_shares') |
@@ -100,7 +100,7 @@ discard block |
||
| 100 | 100 | // + AND there are no ambivalent groups |
| 101 | 101 | |
| 102 | 102 | try { |
| 103 | - $fixedPrincipal = self::GROUP_PRINCIPAL_PREFIX . $encodedGid; |
|
| 103 | + $fixedPrincipal = self::GROUP_PRINCIPAL_PREFIX.$encodedGid; |
|
| 104 | 104 | $logParameters = [ |
| 105 | 105 | 'app' => 'core', |
| 106 | 106 | 'id' => $share['id'], |
@@ -101,7 +101,7 @@ |
||
| 101 | 101 | } |
| 102 | 102 | } |
| 103 | 103 | } catch (Throwable $e) { |
| 104 | - $this->logger->warning('Could not read calendar data for interaction events: ' . $e->getMessage(), [ |
|
| 104 | + $this->logger->warning('Could not read calendar data for interaction events: '.$e->getMessage(), [ |
|
| 105 | 105 | 'exception' => $e, |
| 106 | 106 | ]); |
| 107 | 107 | } |
@@ -37,6 +37,6 @@ |
||
| 37 | 37 | } |
| 38 | 38 | |
| 39 | 39 | public function isAvailable(FileInfo $file): bool { |
| 40 | - return (bool)(imagetypes() & IMG_WEBP); |
|
| 40 | + return (bool) (imagetypes() & IMG_WEBP); |
|
| 41 | 41 | } |
| 42 | 42 | } |
@@ -261,7 +261,7 @@ discard block |
||
| 261 | 261 | } |
| 262 | 262 | } |
| 263 | 263 | |
| 264 | - throw new \Exception('Could not load ' . $className, 0, $e); |
|
| 264 | + throw new \Exception('Could not load '.$className, 0, $e); |
|
| 265 | 265 | } |
| 266 | 266 | |
| 267 | 267 | |
@@ -271,10 +271,10 @@ discard block |
||
| 271 | 271 | * @throws \Exception |
| 272 | 272 | */ |
| 273 | 273 | private function loadSabrePluginsFromInfoXml(array $classes): array { |
| 274 | - return array_map(function (string $className): ServerPlugin { |
|
| 274 | + return array_map(function(string $className): ServerPlugin { |
|
| 275 | 275 | $instance = $this->createClass($className); |
| 276 | 276 | if (!($instance instanceof ServerPlugin)) { |
| 277 | - throw new \Exception('Sabre server plugin ' . $className . ' does not implement the ' . ServerPlugin::class . ' interface'); |
|
| 277 | + throw new \Exception('Sabre server plugin '.$className.' does not implement the '.ServerPlugin::class.' interface'); |
|
| 278 | 278 | } |
| 279 | 279 | return $instance; |
| 280 | 280 | }, $classes); |
@@ -285,10 +285,10 @@ discard block |
||
| 285 | 285 | * @return Collection[] |
| 286 | 286 | */ |
| 287 | 287 | private function loadSabreCollectionsFromInfoXml(array $classes): array { |
| 288 | - return array_map(function (string $className): Collection { |
|
| 288 | + return array_map(function(string $className): Collection { |
|
| 289 | 289 | $instance = $this->createClass($className); |
| 290 | 290 | if (!($instance instanceof Collection)) { |
| 291 | - throw new \Exception('Sabre collection plugin ' . $className . ' does not implement the ' . Collection::class . ' interface'); |
|
| 291 | + throw new \Exception('Sabre collection plugin '.$className.' does not implement the '.Collection::class.' interface'); |
|
| 292 | 292 | } |
| 293 | 293 | return $instance; |
| 294 | 294 | }, $classes); |
@@ -299,10 +299,10 @@ discard block |
||
| 299 | 299 | * @return IAddressBookProvider[] |
| 300 | 300 | */ |
| 301 | 301 | private function loadSabreAddressBookPluginsFromInfoXml(array $classes): array { |
| 302 | - return array_map(function (string $className): IAddressBookProvider { |
|
| 302 | + return array_map(function(string $className): IAddressBookProvider { |
|
| 303 | 303 | $instance = $this->createClass($className); |
| 304 | 304 | if (!($instance instanceof IAddressBookProvider)) { |
| 305 | - throw new \Exception('Sabre address book plugin class ' . $className . ' does not implement the ' . IAddressBookProvider::class . ' interface'); |
|
| 305 | + throw new \Exception('Sabre address book plugin class '.$className.' does not implement the '.IAddressBookProvider::class.' interface'); |
|
| 306 | 306 | } |
| 307 | 307 | return $instance; |
| 308 | 308 | }, $classes); |
@@ -313,10 +313,10 @@ discard block |
||
| 313 | 313 | * @return ICalendarProvider[] |
| 314 | 314 | */ |
| 315 | 315 | private function loadSabreCalendarPluginsFromInfoXml(array $classes): array { |
| 316 | - return array_map(function (string $className): ICalendarProvider { |
|
| 316 | + return array_map(function(string $className): ICalendarProvider { |
|
| 317 | 317 | $instance = $this->createClass($className); |
| 318 | 318 | if (!($instance instanceof ICalendarProvider)) { |
| 319 | - throw new \Exception('Sabre calendar plugin class ' . $className . ' does not implement the ' . ICalendarProvider::class . ' interface'); |
|
| 319 | + throw new \Exception('Sabre calendar plugin class '.$className.' does not implement the '.ICalendarProvider::class.' interface'); |
|
| 320 | 320 | } |
| 321 | 321 | return $instance; |
| 322 | 322 | }, $classes); |
@@ -61,7 +61,7 @@ |
||
| 61 | 61 | if ($this->enabled && $this->cloudIdManager->isValidCloudId($search) && $offset === 0) { |
| 62 | 62 | [$remoteGroup, $serverUrl] = $this->splitGroupRemote($search); |
| 63 | 63 | $result['exact'][] = [ |
| 64 | - 'label' => $remoteGroup . " ($serverUrl)", |
|
| 64 | + 'label' => $remoteGroup." ($serverUrl)", |
|
| 65 | 65 | 'guid' => $remoteGroup, |
| 66 | 66 | 'name' => $remoteGroup, |
| 67 | 67 | 'value' => [ |
@@ -45,15 +45,15 @@ discard block |
||
| 45 | 45 | protected function getAddressbookHomeForPrincipal($principal) { |
| 46 | 46 | if (strrpos($principal, 'principals/users', -strlen($principal)) !== false) { |
| 47 | 47 | [, $principalId] = \Sabre\Uri\split($principal); |
| 48 | - return self::ADDRESSBOOK_ROOT . '/users/' . $principalId; |
|
| 48 | + return self::ADDRESSBOOK_ROOT.'/users/'.$principalId; |
|
| 49 | 49 | } |
| 50 | 50 | if (strrpos($principal, 'principals/groups', -strlen($principal)) !== false) { |
| 51 | 51 | [, $principalId] = \Sabre\Uri\split($principal); |
| 52 | - return self::ADDRESSBOOK_ROOT . '/groups/' . $principalId; |
|
| 52 | + return self::ADDRESSBOOK_ROOT.'/groups/'.$principalId; |
|
| 53 | 53 | } |
| 54 | 54 | if (strrpos($principal, 'principals/system', -strlen($principal)) !== false) { |
| 55 | 55 | [, $principalId] = \Sabre\Uri\split($principal); |
| 56 | - return self::ADDRESSBOOK_ROOT . '/system/' . $principalId; |
|
| 56 | + return self::ADDRESSBOOK_ROOT.'/system/'.$principalId; |
|
| 57 | 57 | } |
| 58 | 58 | } |
| 59 | 59 | |
@@ -68,7 +68,7 @@ discard block |
||
| 68 | 68 | $ns = '{http://owncloud.org/ns}'; |
| 69 | 69 | |
| 70 | 70 | if ($node instanceof AddressBook) { |
| 71 | - $propFind->handle($ns . 'groups', function () use ($node) { |
|
| 71 | + $propFind->handle($ns.'groups', function() use ($node) { |
|
| 72 | 72 | return new Groups($node->getContactsGroups()); |
| 73 | 73 | }); |
| 74 | 74 | } |
@@ -92,11 +92,11 @@ discard block |
||
| 92 | 92 | $proxies = $this->proxyMapper->getProxiesFor($principal); |
| 93 | 93 | foreach ($proxies as $proxy) { |
| 94 | 94 | if ($proxy->getPermissions() === ProxyMapper::PERMISSION_READ) { |
| 95 | - $groups[] = $proxy->getOwnerId() . '/calendar-proxy-read'; |
|
| 95 | + $groups[] = $proxy->getOwnerId().'/calendar-proxy-read'; |
|
| 96 | 96 | } |
| 97 | 97 | |
| 98 | 98 | if ($proxy->getPermissions() === (ProxyMapper::PERMISSION_READ | ProxyMapper::PERMISSION_WRITE)) { |
| 99 | - $groups[] = $proxy->getOwnerId() . '/calendar-proxy-write'; |
|
| 99 | + $groups[] = $proxy->getOwnerId().'/calendar-proxy-write'; |
|
| 100 | 100 | } |
| 101 | 101 | } |
| 102 | 102 | |
@@ -136,7 +136,7 @@ discard block |
||
| 136 | 136 | [$prefix, $name] = \Sabre\Uri\split($member); |
| 137 | 137 | |
| 138 | 138 | if ($prefix !== $this->principalPrefix) { |
| 139 | - throw new Exception('Invalid member group prefix: ' . $prefix); |
|
| 139 | + throw new Exception('Invalid member group prefix: '.$prefix); |
|
| 140 | 140 | } |
| 141 | 141 | |
| 142 | 142 | $principalArray = $this->getPrincipalByPath($member); |
@@ -151,7 +151,7 @@ discard block |
||
| 151 | 151 | $proxy->setPermissions($proxy->getPermissions() | $permission); |
| 152 | 152 | $this->proxyMapper->update($proxy); |
| 153 | 153 | |
| 154 | - $proxies = array_filter($proxies, function (Proxy $p) use ($proxy) { |
|
| 154 | + $proxies = array_filter($proxies, function(Proxy $p) use ($proxy) { |
|
| 155 | 155 | return $p->getId() !== $proxy->getId(); |
| 156 | 156 | }); |
| 157 | 157 | break; |