@@ -22,7 +22,6 @@ |
||
| 22 | 22 | |
| 23 | 23 | namespace OC\Core\Controller; |
| 24 | 24 | |
| 25 | -use OC\AppFramework\Utility\TimeFactory; |
|
| 26 | 25 | use OC\Authentication\TwoFactorAuth\Manager; |
| 27 | 26 | use OC\Security\Bruteforce\Throttler; |
| 28 | 27 | use OC\User\Session; |
@@ -22,13 +22,10 @@ |
||
| 22 | 22 | namespace OC\Core\Controller; |
| 23 | 23 | |
| 24 | 24 | use OC\AppFramework\Http; |
| 25 | -use OC\AppFramework\Utility\TimeFactory; |
|
| 26 | -use OC\Authentication\Token\DefaultTokenProvider; |
|
| 27 | 25 | use OC\Authentication\Token\IProvider; |
| 28 | 26 | use OC\Authentication\Token\IToken; |
| 29 | 27 | use OC\Authentication\TwoFactorAuth\Manager as TwoFactorAuthManager; |
| 30 | 28 | use OC\User\Manager as UserManager; |
| 31 | -use OCA\User_LDAP\User\Manager; |
|
| 32 | 29 | use OCP\AppFramework\Controller; |
| 33 | 30 | use OCP\AppFramework\Http\JSONResponse; |
| 34 | 31 | use OCP\IRequest; |
@@ -219,7 +219,7 @@ |
||
| 219 | 219 | * @param array $groupSharesById |
| 220 | 220 | * @param array $subShares |
| 221 | 221 | * |
| 222 | - * @return true if the share is valid, false if it needs repair |
|
| 222 | + * @return boolean if the share is valid, false if it needs repair |
|
| 223 | 223 | */ |
| 224 | 224 | private function isThisShareValid($groupSharesById, $subShares) { |
| 225 | 225 | $foundTargets = []; |
@@ -21,12 +21,10 @@ |
||
| 21 | 21 | |
| 22 | 22 | namespace OCA\User_LDAP; |
| 23 | 23 | |
| 24 | -use OCP\IUserBackend; |
|
| 25 | 24 | use OCP\LDAP\ILDAPProvider; |
| 26 | 25 | use OCP\LDAP\IDeletionFlagSupport; |
| 27 | 26 | use OCP\IServerContainer; |
| 28 | 27 | use OCA\User_LDAP\User\DeletedUsersIndex; |
| 29 | -use OCA\User_LDAP\Mapping\UserMapping; |
|
| 30 | 28 | |
| 31 | 29 | /** |
| 32 | 30 | * LDAP provider for pulic access to the LDAP backend. |
@@ -567,7 +567,7 @@ |
||
| 567 | 567 | /** |
| 568 | 568 | * update permissions in database |
| 569 | 569 | * |
| 570 | - * @param IShare $share |
|
| 570 | + * @param Share\IShare $share |
|
| 571 | 571 | * @param int $permissions |
| 572 | 572 | */ |
| 573 | 573 | protected function updatePermissionsInDatabase(IShare $share, $permissions) { |
@@ -397,7 +397,7 @@ discard block |
||
| 397 | 397 | |
| 398 | 398 | /** |
| 399 | 399 | * returns the internal ownCloud name for the given LDAP DN of the user, false on DN outside of search DN or failure |
| 400 | - * @param string $dn the dn of the user object |
|
| 400 | + * @param string $fdn the dn of the user object |
|
| 401 | 401 | * @param string $ldapName optional, the display name of the object |
| 402 | 402 | * @return string|false with with the name to use in ownCloud |
| 403 | 403 | */ |
@@ -414,7 +414,7 @@ discard block |
||
| 414 | 414 | |
| 415 | 415 | /** |
| 416 | 416 | * returns an internal ownCloud name for the given LDAP DN, false on DN outside of search DN |
| 417 | - * @param string $dn the dn of the user object |
|
| 417 | + * @param string $fdn the dn of the user object |
|
| 418 | 418 | * @param string $ldapName optional, the display name of the object |
| 419 | 419 | * @param bool $isUser optional, whether it is a user object (otherwise group assumed) |
| 420 | 420 | * @return string|false with with the name to use in ownCloud |
@@ -674,7 +674,7 @@ discard block |
||
| 674 | 674 | * the login filter. |
| 675 | 675 | * |
| 676 | 676 | * @param string $loginName |
| 677 | - * @param array $attributes optional, list of attributes to read |
|
| 677 | + * @param string[] $attributes optional, list of attributes to read |
|
| 678 | 678 | * @return array |
| 679 | 679 | */ |
| 680 | 680 | public function fetchUsersByLoginName($loginName, $attributes = array('dn')) { |
@@ -747,7 +747,7 @@ discard block |
||
| 747 | 747 | |
| 748 | 748 | /** |
| 749 | 749 | * @param string $filter |
| 750 | - * @param string|string[] $attr |
|
| 750 | + * @param string[] $attr |
|
| 751 | 751 | * @param int $limit |
| 752 | 752 | * @param int $offset |
| 753 | 753 | * @return array |
@@ -795,7 +795,7 @@ discard block |
||
| 795 | 795 | |
| 796 | 796 | /** |
| 797 | 797 | * @param string $filter |
| 798 | - * @param string|string[] $attr |
|
| 798 | + * @param string[] $attr |
|
| 799 | 799 | * @param int $limit |
| 800 | 800 | * @param int $offset |
| 801 | 801 | * @return false|int |
@@ -845,6 +845,7 @@ discard block |
||
| 845 | 845 | * retrieved. Results will according to the order in the array. |
| 846 | 846 | * @param int $limit optional, maximum results to be counted |
| 847 | 847 | * @param int $offset optional, a starting point |
| 848 | + * @param string $filter |
|
| 848 | 849 | * @return array|false array with the search result as first value and pagedSearchOK as |
| 849 | 850 | * second | false if not successful |
| 850 | 851 | */ |
@@ -891,7 +892,7 @@ discard block |
||
| 891 | 892 | * @param bool $pagedSearchOK whether a paged search has been executed |
| 892 | 893 | * @param bool $skipHandling required for paged search when cookies to |
| 893 | 894 | * prior results need to be gained |
| 894 | - * @return bool cookie validity, true if we have more pages, false otherwise. |
|
| 895 | + * @return null|boolean cookie validity, true if we have more pages, false otherwise. |
|
| 895 | 896 | */ |
| 896 | 897 | private function processPagedSearchStatus($sr, $filter, $base, $iFoundItems, $limit, $offset, $pagedSearchOK, $skipHandling) { |
| 897 | 898 | $cookie = null; |
@@ -1100,7 +1101,7 @@ discard block |
||
| 1100 | 1101 | |
| 1101 | 1102 | /** |
| 1102 | 1103 | * @param string $name |
| 1103 | - * @return bool|mixed|string |
|
| 1104 | + * @return string |
|
| 1104 | 1105 | */ |
| 1105 | 1106 | public function sanitizeUsername($name) { |
| 1106 | 1107 | if($this->connection->ldapIgnoreNamingRules) { |
@@ -1124,6 +1125,7 @@ discard block |
||
| 1124 | 1125 | * escapes (user provided) parts for LDAP filter |
| 1125 | 1126 | * @param string $input, the provided value |
| 1126 | 1127 | * @param bool $allowAsterisk whether in * at the beginning should be preserved |
| 1128 | + * @param string $input |
|
| 1127 | 1129 | * @return string the escaped string |
| 1128 | 1130 | */ |
| 1129 | 1131 | public function escapeFilterPart($input, $allowAsterisk = false) { |
@@ -1104,7 +1104,7 @@ |
||
| 1104 | 1104 | } |
| 1105 | 1105 | |
| 1106 | 1106 | /** |
| 1107 | - * @param array $reqs |
|
| 1107 | + * @param string[] $reqs |
|
| 1108 | 1108 | * @return bool |
| 1109 | 1109 | */ |
| 1110 | 1110 | private function checkRequirements($reqs) { |
@@ -71,7 +71,7 @@ discard block |
||
| 71 | 71 | |
| 72 | 72 | /** |
| 73 | 73 | * @param array $entry |
| 74 | - * @return array |
|
| 74 | + * @return string |
|
| 75 | 75 | */ |
| 76 | 76 | protected function formatCacheEntry($entry) { |
| 77 | 77 | if (isset($entry['path'])) { |
@@ -190,6 +190,9 @@ discard block |
||
| 190 | 190 | return $this->cache->getStatus($this->getSourcePath($file)); |
| 191 | 191 | } |
| 192 | 192 | |
| 193 | + /** |
|
| 194 | + * @param \OCP\Files\Cache\ICacheEntry[] $results |
|
| 195 | + */ |
|
| 193 | 196 | private function formatSearchResults($results) { |
| 194 | 197 | $results = array_filter($results, array($this, 'filterCacheEntry')); |
| 195 | 198 | $results = array_values($results); |
@@ -53,7 +53,7 @@ |
||
| 53 | 53 | * Wrapper around file_put_contents($filename, $data) |
| 54 | 54 | * |
| 55 | 55 | * @param string $filename |
| 56 | - * @param $data |
|
| 56 | + * @param string $data |
|
| 57 | 57 | * @return int|false |
| 58 | 58 | */ |
| 59 | 59 | public function file_put_contents($filename, $data) { |