Completed
Push — master ( f38d36...9039b7 )
by Lukas
21:28 queued 09:01
created
apps/user_ldap/lib/User/User.php 2 patches
Indentation   +499 added lines, -499 removed lines patch added patch discarded remove patch
@@ -41,504 +41,504 @@
 block discarded – undo
41 41
  * represents an LDAP user, gets and holds user-specific information from LDAP
42 42
  */
43 43
 class User {
44
-	/**
45
-	 * @var IUserTools
46
-	 */
47
-	protected $access;
48
-	/**
49
-	 * @var Connection
50
-	 */
51
-	protected $connection;
52
-	/**
53
-	 * @var IConfig
54
-	 */
55
-	protected $config;
56
-	/**
57
-	 * @var FilesystemHelper
58
-	 */
59
-	protected $fs;
60
-	/**
61
-	 * @var Image
62
-	 */
63
-	protected $image;
64
-	/**
65
-	 * @var LogWrapper
66
-	 */
67
-	protected $log;
68
-	/**
69
-	 * @var IAvatarManager
70
-	 */
71
-	protected $avatarManager;
72
-	/**
73
-	 * @var IUserManager
74
-	 */
75
-	protected $userManager;
76
-	/**
77
-	 * @var string
78
-	 */
79
-	protected $dn;
80
-	/**
81
-	 * @var string
82
-	 */
83
-	protected $uid;
84
-	/**
85
-	 * @var string[]
86
-	 */
87
-	protected $refreshedFeatures = array();
88
-	/**
89
-	 * @var string
90
-	 */
91
-	protected $avatarImage;
92
-
93
-	/**
94
-	 * DB config keys for user preferences
95
-	 */
96
-	const USER_PREFKEY_FIRSTLOGIN  = 'firstLoginAccomplished';
97
-	const USER_PREFKEY_LASTREFRESH = 'lastFeatureRefresh';
98
-
99
-	/**
100
-	 * @brief constructor, make sure the subclasses call this one!
101
-	 * @param string $username the internal username
102
-	 * @param string $dn the LDAP DN
103
-	 * @param IUserTools $access an instance that implements IUserTools for
104
-	 * LDAP interaction
105
-	 * @param IConfig $config
106
-	 * @param FilesystemHelper $fs
107
-	 * @param Image $image any empty instance
108
-	 * @param LogWrapper $log
109
-	 * @param IAvatarManager $avatarManager
110
-	 * @param IUserManager $userManager
111
-	 */
112
-	public function __construct($username, $dn, IUserTools $access,
113
-		IConfig $config, FilesystemHelper $fs, Image $image,
114
-		LogWrapper $log, IAvatarManager $avatarManager, IUserManager $userManager) {
115
-
116
-		if ($username === null) {
117
-			$log->log("uid for '$dn' must not be null!", Util::ERROR);
118
-			throw new \InvalidArgumentException('uid must not be null!');
119
-		} else if ($username === '') {
120
-			$log->log("uid for '$dn' must not be an empty string", Util::ERROR);
121
-			throw new \InvalidArgumentException('uid must not be an empty string!');
122
-		}
123
-
124
-		$this->access        = $access;
125
-		$this->connection    = $access->getConnection();
126
-		$this->config        = $config;
127
-		$this->fs            = $fs;
128
-		$this->dn            = $dn;
129
-		$this->uid           = $username;
130
-		$this->image         = $image;
131
-		$this->log           = $log;
132
-		$this->avatarManager = $avatarManager;
133
-		$this->userManager   = $userManager;
134
-	}
135
-
136
-	/**
137
-	 * @brief updates properties like email, quota or avatar provided by LDAP
138
-	 * @return null
139
-	 */
140
-	public function update() {
141
-		if(is_null($this->dn)) {
142
-			return null;
143
-		}
144
-
145
-		$hasLoggedIn = $this->config->getUserValue($this->uid, 'user_ldap',
146
-				self::USER_PREFKEY_FIRSTLOGIN, 0);
147
-
148
-		if($this->needsRefresh()) {
149
-			$this->updateEmail();
150
-			$this->updateQuota();
151
-			if($hasLoggedIn !== 0) {
152
-				//we do not need to try it, when the user has not been logged in
153
-				//before, because the file system will not be ready.
154
-				$this->updateAvatar();
155
-				//in order to get an avatar as soon as possible, mark the user
156
-				//as refreshed only when updating the avatar did happen
157
-				$this->markRefreshTime();
158
-			}
159
-		}
160
-	}
161
-
162
-	/**
163
-	 * processes results from LDAP for attributes as returned by getAttributesToRead()
164
-	 * @param array $ldapEntry the user entry as retrieved from LDAP
165
-	 */
166
-	public function processAttributes($ldapEntry) {
167
-		$this->markRefreshTime();
168
-		//Quota
169
-		$attr = strtolower($this->connection->ldapQuotaAttribute);
170
-		if(isset($ldapEntry[$attr])) {
171
-			$this->updateQuota($ldapEntry[$attr][0]);
172
-		}
173
-		unset($attr);
174
-
175
-		//Email
176
-		$attr = strtolower($this->connection->ldapEmailAttribute);
177
-		if(isset($ldapEntry[$attr])) {
178
-			$this->updateEmail($ldapEntry[$attr][0]);
179
-		}
180
-		unset($attr);
181
-
182
-		//displayName
183
-		$displayName = $displayName2 = '';
184
-		$attr = strtolower($this->connection->ldapUserDisplayName);
185
-		if(isset($ldapEntry[$attr])) {
186
-			$displayName = strval($ldapEntry[$attr][0]);
187
-		}
188
-		$attr = strtolower($this->connection->ldapUserDisplayName2);
189
-		if(isset($ldapEntry[$attr])) {
190
-			$displayName2 = strval($ldapEntry[$attr][0]);
191
-		}
192
-		if ($displayName !== '') {
193
-			$this->composeAndStoreDisplayName($displayName);
194
-			$this->access->cacheUserDisplayName(
195
-				$this->getUsername(),
196
-				$displayName,
197
-				$displayName2
198
-			);
199
-		}
200
-		unset($attr);
201
-
202
-		// LDAP Username, needed for s2s sharing
203
-		if(isset($ldapEntry['uid'])) {
204
-			$this->storeLDAPUserName($ldapEntry['uid'][0]);
205
-		} else if(isset($ldapEntry['samaccountname'])) {
206
-			$this->storeLDAPUserName($ldapEntry['samaccountname'][0]);
207
-		}
208
-
209
-		//homePath
210
-		if(strpos($this->connection->homeFolderNamingRule, 'attr:') === 0) {
211
-			$attr = strtolower(substr($this->connection->homeFolderNamingRule, strlen('attr:')));
212
-			if(isset($ldapEntry[$attr])) {
213
-				$this->access->cacheUserHome(
214
-					$this->getUsername(), $this->getHomePath($ldapEntry[$attr][0]));
215
-			}
216
-		}
217
-
218
-		//memberOf groups
219
-		$cacheKey = 'getMemberOf'.$this->getUsername();
220
-		$groups = false;
221
-		if(isset($ldapEntry['memberof'])) {
222
-			$groups = $ldapEntry['memberof'];
223
-		}
224
-		$this->connection->writeToCache($cacheKey, $groups);
225
-
226
-		//Avatar
227
-		$attrs = array('jpegphoto', 'thumbnailphoto');
228
-		foreach ($attrs as $attr)  {
229
-			if(isset($ldapEntry[$attr])) {
230
-				$this->avatarImage = $ldapEntry[$attr][0];
231
-				// the call to the method that saves the avatar in the file
232
-				// system must be postponed after the login. It is to ensure
233
-				// external mounts are mounted properly (e.g. with login
234
-				// credentials from the session).
235
-				\OCP\Util::connectHook('OC_User', 'post_login', $this, 'updateAvatarPostLogin');
236
-				break;
237
-			}
238
-		}
239
-	}
240
-
241
-	/**
242
-	 * @brief returns the LDAP DN of the user
243
-	 * @return string
244
-	 */
245
-	public function getDN() {
246
-		return $this->dn;
247
-	}
248
-
249
-	/**
250
-	 * @brief returns the ownCloud internal username of the user
251
-	 * @return string
252
-	 */
253
-	public function getUsername() {
254
-		return $this->uid;
255
-	}
256
-
257
-	/**
258
-	 * returns the home directory of the user if specified by LDAP settings
259
-	 * @param string $valueFromLDAP
260
-	 * @return bool|string
261
-	 * @throws \Exception
262
-	 */
263
-	public function getHomePath($valueFromLDAP = null) {
264
-		$path = strval($valueFromLDAP);
265
-		$attr = null;
266
-
267
-		if (is_null($valueFromLDAP)
268
-		   && strpos($this->access->connection->homeFolderNamingRule, 'attr:') === 0
269
-		   && $this->access->connection->homeFolderNamingRule !== 'attr:')
270
-		{
271
-			$attr = substr($this->access->connection->homeFolderNamingRule, strlen('attr:'));
272
-			$homedir = $this->access->readAttribute(
273
-				$this->access->username2dn($this->getUsername()), $attr);
274
-			if ($homedir && isset($homedir[0])) {
275
-				$path = $homedir[0];
276
-			}
277
-		}
278
-
279
-		if ($path !== '') {
280
-			//if attribute's value is an absolute path take this, otherwise append it to data dir
281
-			//check for / at the beginning or pattern c:\ resp. c:/
282
-			if(   '/' !== $path[0]
283
-			   && !(3 < strlen($path) && ctype_alpha($path[0])
284
-			       && $path[1] === ':' && ('\\' === $path[2] || '/' === $path[2]))
285
-			) {
286
-				$path = $this->config->getSystemValue('datadirectory',
287
-						\OC::$SERVERROOT.'/data' ) . '/' . $path;
288
-			}
289
-			//we need it to store it in the DB as well in case a user gets
290
-			//deleted so we can clean up afterwards
291
-			$this->config->setUserValue(
292
-				$this->getUsername(), 'user_ldap', 'homePath', $path
293
-			);
294
-			return $path;
295
-		}
296
-
297
-		if(    !is_null($attr)
298
-			&& $this->config->getAppValue('user_ldap', 'enforce_home_folder_naming_rule', true)
299
-		) {
300
-			// a naming rule attribute is defined, but it doesn't exist for that LDAP user
301
-			throw new \Exception('Home dir attribute can\'t be read from LDAP for uid: ' . $this->getUsername());
302
-		}
303
-
304
-		//false will apply default behaviour as defined and done by OC_User
305
-		$this->config->setUserValue($this->getUsername(), 'user_ldap', 'homePath', '');
306
-		return false;
307
-	}
308
-
309
-	public function getMemberOfGroups() {
310
-		$cacheKey = 'getMemberOf'.$this->getUsername();
311
-		$memberOfGroups = $this->connection->getFromCache($cacheKey);
312
-		if(!is_null($memberOfGroups)) {
313
-			return $memberOfGroups;
314
-		}
315
-		$groupDNs = $this->access->readAttribute($this->getDN(), 'memberOf');
316
-		$this->connection->writeToCache($cacheKey, $groupDNs);
317
-		return $groupDNs;
318
-	}
319
-
320
-	/**
321
-	 * @brief reads the image from LDAP that shall be used as Avatar
322
-	 * @return string data (provided by LDAP) | false
323
-	 */
324
-	public function getAvatarImage() {
325
-		if(!is_null($this->avatarImage)) {
326
-			return $this->avatarImage;
327
-		}
328
-
329
-		$this->avatarImage = false;
330
-		$attributes = array('jpegPhoto', 'thumbnailPhoto');
331
-		foreach($attributes as $attribute) {
332
-			$result = $this->access->readAttribute($this->dn, $attribute);
333
-			if($result !== false && is_array($result) && isset($result[0])) {
334
-				$this->avatarImage = $result[0];
335
-				break;
336
-			}
337
-		}
338
-
339
-		return $this->avatarImage;
340
-	}
341
-
342
-	/**
343
-	 * @brief marks the user as having logged in at least once
344
-	 * @return null
345
-	 */
346
-	public function markLogin() {
347
-		$this->config->setUserValue(
348
-			$this->uid, 'user_ldap', self::USER_PREFKEY_FIRSTLOGIN, 1);
349
-	}
350
-
351
-	/**
352
-	 * @brief marks the time when user features like email have been updated
353
-	 * @return null
354
-	 */
355
-	public function markRefreshTime() {
356
-		$this->config->setUserValue(
357
-			$this->uid, 'user_ldap', self::USER_PREFKEY_LASTREFRESH, time());
358
-	}
359
-
360
-	/**
361
-	 * @brief checks whether user features needs to be updated again by
362
-	 * comparing the difference of time of the last refresh to now with the
363
-	 * desired interval
364
-	 * @return bool
365
-	 */
366
-	private function needsRefresh() {
367
-		$lastChecked = $this->config->getUserValue($this->uid, 'user_ldap',
368
-			self::USER_PREFKEY_LASTREFRESH, 0);
369
-
370
-		//TODO make interval configurable
371
-		if((time() - intval($lastChecked)) < 86400 ) {
372
-			return false;
373
-		}
374
-		return  true;
375
-	}
376
-
377
-	/**
378
-	 * Stores a key-value pair in relation to this user
379
-	 *
380
-	 * @param string $key
381
-	 * @param string $value
382
-	 */
383
-	private function store($key, $value) {
384
-		$this->config->setUserValue($this->uid, 'user_ldap', $key, $value);
385
-	}
386
-
387
-	/**
388
-	 * Composes the display name and stores it in the database. The final
389
-	 * display name is returned.
390
-	 *
391
-	 * @param string $displayName
392
-	 * @param string $displayName2
393
-	 * @returns string the effective display name
394
-	 */
395
-	public function composeAndStoreDisplayName($displayName, $displayName2 = '') {
396
-		$displayName2 = strval($displayName2);
397
-		if($displayName2 !== '') {
398
-			$displayName .= ' (' . $displayName2 . ')';
399
-		}
400
-		$this->store('displayName', $displayName);
401
-		return $displayName;
402
-	}
403
-
404
-	/**
405
-	 * Stores the LDAP Username in the Database
406
-	 * @param string $userName
407
-	 */
408
-	public function storeLDAPUserName($userName) {
409
-		$this->store('uid', $userName);
410
-	}
411
-
412
-	/**
413
-	 * @brief checks whether an update method specified by feature was run
414
-	 * already. If not, it will marked like this, because it is expected that
415
-	 * the method will be run, when false is returned.
416
-	 * @param string $feature email | quota | avatar (can be extended)
417
-	 * @return bool
418
-	 */
419
-	private function wasRefreshed($feature) {
420
-		if(isset($this->refreshedFeatures[$feature])) {
421
-			return true;
422
-		}
423
-		$this->refreshedFeatures[$feature] = 1;
424
-		return false;
425
-	}
426
-
427
-	/**
428
-	 * fetches the email from LDAP and stores it as ownCloud user value
429
-	 * @param string $valueFromLDAP if known, to save an LDAP read request
430
-	 * @return null
431
-	 */
432
-	public function updateEmail($valueFromLDAP = null) {
433
-		if($this->wasRefreshed('email')) {
434
-			return;
435
-		}
436
-		$email = strval($valueFromLDAP);
437
-		if(is_null($valueFromLDAP)) {
438
-			$emailAttribute = $this->connection->ldapEmailAttribute;
439
-			if ($emailAttribute !== '') {
440
-				$aEmail = $this->access->readAttribute($this->dn, $emailAttribute);
441
-				if(is_array($aEmail) && (count($aEmail) > 0)) {
442
-					$email = strval($aEmail[0]);
443
-				}
444
-			}
445
-		}
446
-		if ($email !== '') {
447
-			$user = $this->userManager->get($this->uid);
448
-			if (!is_null($user)) {
449
-				$currentEmail = strval($user->getEMailAddress());
450
-				if ($currentEmail !== $email) {
451
-					$user->setEMailAddress($email);
452
-				}
453
-			}
454
-		}
455
-	}
456
-
457
-	/**
458
-	 * fetches the quota from LDAP and stores it as ownCloud user value
459
-	 * @param string $valueFromLDAP the quota attribute's value can be passed,
460
-	 * to save the readAttribute request
461
-	 * @return null
462
-	 */
463
-	public function updateQuota($valueFromLDAP = null) {
464
-		if($this->wasRefreshed('quota')) {
465
-			return;
466
-		}
467
-		//can be null
468
-		$quotaDefault = $this->connection->ldapQuotaDefault;
469
-		$quota = $quotaDefault !== '' ? $quotaDefault : null;
470
-		$quota = !is_null($valueFromLDAP) ? $valueFromLDAP : $quota;
471
-
472
-		if(is_null($valueFromLDAP)) {
473
-			$quotaAttribute = $this->connection->ldapQuotaAttribute;
474
-			if ($quotaAttribute !== '') {
475
-				$aQuota = $this->access->readAttribute($this->dn, $quotaAttribute);
476
-				if($aQuota && (count($aQuota) > 0)) {
477
-					$quota = $aQuota[0];
478
-				}
479
-			}
480
-		}
481
-		if(!is_null($quota)) {
482
-			$this->userManager->get($this->uid)->setQuota($quota);
483
-		}
484
-	}
485
-
486
-	/**
487
-	 * called by a post_login hook to save the avatar picture
488
-	 *
489
-	 * @param array $params
490
-	 */
491
-	public function updateAvatarPostLogin($params) {
492
-		if(isset($params['uid']) && $params['uid'] === $this->getUsername()) {
493
-			$this->updateAvatar();
494
-		}
495
-	}
496
-
497
-	/**
498
-	 * @brief attempts to get an image from LDAP and sets it as ownCloud avatar
499
-	 * @return null
500
-	 */
501
-	public function updateAvatar() {
502
-		if($this->wasRefreshed('avatar')) {
503
-			return;
504
-		}
505
-		$avatarImage = $this->getAvatarImage();
506
-		if($avatarImage === false) {
507
-			//not set, nothing left to do;
508
-			return;
509
-		}
510
-		$this->image->loadFromBase64(base64_encode($avatarImage));
511
-		$this->setOwnCloudAvatar();
512
-	}
513
-
514
-	/**
515
-	 * @brief sets an image as ownCloud avatar
516
-	 * @return null
517
-	 */
518
-	private function setOwnCloudAvatar() {
519
-		if(!$this->image->valid()) {
520
-			$this->log->log('jpegPhoto data invalid for '.$this->dn, \OCP\Util::ERROR);
521
-			return;
522
-		}
523
-		//make sure it is a square and not bigger than 128x128
524
-		$size = min(array($this->image->width(), $this->image->height(), 128));
525
-		if(!$this->image->centerCrop($size)) {
526
-			$this->log->log('croping image for avatar failed for '.$this->dn, \OCP\Util::ERROR);
527
-			return;
528
-		}
529
-
530
-		if(!$this->fs->isLoaded()) {
531
-			$this->fs->setup($this->uid);
532
-		}
533
-
534
-		try {
535
-			$avatar = $this->avatarManager->getAvatar($this->uid);
536
-			$avatar->set($this->image);
537
-		} catch (\Exception $e) {
538
-			\OC::$server->getLogger()->notice(
539
-				'Could not set avatar for ' . $this->dn	. ', because: ' . $e->getMessage(),
540
-				['app' => 'user_ldap']);
541
-		}
542
-	}
44
+    /**
45
+     * @var IUserTools
46
+     */
47
+    protected $access;
48
+    /**
49
+     * @var Connection
50
+     */
51
+    protected $connection;
52
+    /**
53
+     * @var IConfig
54
+     */
55
+    protected $config;
56
+    /**
57
+     * @var FilesystemHelper
58
+     */
59
+    protected $fs;
60
+    /**
61
+     * @var Image
62
+     */
63
+    protected $image;
64
+    /**
65
+     * @var LogWrapper
66
+     */
67
+    protected $log;
68
+    /**
69
+     * @var IAvatarManager
70
+     */
71
+    protected $avatarManager;
72
+    /**
73
+     * @var IUserManager
74
+     */
75
+    protected $userManager;
76
+    /**
77
+     * @var string
78
+     */
79
+    protected $dn;
80
+    /**
81
+     * @var string
82
+     */
83
+    protected $uid;
84
+    /**
85
+     * @var string[]
86
+     */
87
+    protected $refreshedFeatures = array();
88
+    /**
89
+     * @var string
90
+     */
91
+    protected $avatarImage;
92
+
93
+    /**
94
+     * DB config keys for user preferences
95
+     */
96
+    const USER_PREFKEY_FIRSTLOGIN  = 'firstLoginAccomplished';
97
+    const USER_PREFKEY_LASTREFRESH = 'lastFeatureRefresh';
98
+
99
+    /**
100
+     * @brief constructor, make sure the subclasses call this one!
101
+     * @param string $username the internal username
102
+     * @param string $dn the LDAP DN
103
+     * @param IUserTools $access an instance that implements IUserTools for
104
+     * LDAP interaction
105
+     * @param IConfig $config
106
+     * @param FilesystemHelper $fs
107
+     * @param Image $image any empty instance
108
+     * @param LogWrapper $log
109
+     * @param IAvatarManager $avatarManager
110
+     * @param IUserManager $userManager
111
+     */
112
+    public function __construct($username, $dn, IUserTools $access,
113
+        IConfig $config, FilesystemHelper $fs, Image $image,
114
+        LogWrapper $log, IAvatarManager $avatarManager, IUserManager $userManager) {
115
+
116
+        if ($username === null) {
117
+            $log->log("uid for '$dn' must not be null!", Util::ERROR);
118
+            throw new \InvalidArgumentException('uid must not be null!');
119
+        } else if ($username === '') {
120
+            $log->log("uid for '$dn' must not be an empty string", Util::ERROR);
121
+            throw new \InvalidArgumentException('uid must not be an empty string!');
122
+        }
123
+
124
+        $this->access        = $access;
125
+        $this->connection    = $access->getConnection();
126
+        $this->config        = $config;
127
+        $this->fs            = $fs;
128
+        $this->dn            = $dn;
129
+        $this->uid           = $username;
130
+        $this->image         = $image;
131
+        $this->log           = $log;
132
+        $this->avatarManager = $avatarManager;
133
+        $this->userManager   = $userManager;
134
+    }
135
+
136
+    /**
137
+     * @brief updates properties like email, quota or avatar provided by LDAP
138
+     * @return null
139
+     */
140
+    public function update() {
141
+        if(is_null($this->dn)) {
142
+            return null;
143
+        }
144
+
145
+        $hasLoggedIn = $this->config->getUserValue($this->uid, 'user_ldap',
146
+                self::USER_PREFKEY_FIRSTLOGIN, 0);
147
+
148
+        if($this->needsRefresh()) {
149
+            $this->updateEmail();
150
+            $this->updateQuota();
151
+            if($hasLoggedIn !== 0) {
152
+                //we do not need to try it, when the user has not been logged in
153
+                //before, because the file system will not be ready.
154
+                $this->updateAvatar();
155
+                //in order to get an avatar as soon as possible, mark the user
156
+                //as refreshed only when updating the avatar did happen
157
+                $this->markRefreshTime();
158
+            }
159
+        }
160
+    }
161
+
162
+    /**
163
+     * processes results from LDAP for attributes as returned by getAttributesToRead()
164
+     * @param array $ldapEntry the user entry as retrieved from LDAP
165
+     */
166
+    public function processAttributes($ldapEntry) {
167
+        $this->markRefreshTime();
168
+        //Quota
169
+        $attr = strtolower($this->connection->ldapQuotaAttribute);
170
+        if(isset($ldapEntry[$attr])) {
171
+            $this->updateQuota($ldapEntry[$attr][0]);
172
+        }
173
+        unset($attr);
174
+
175
+        //Email
176
+        $attr = strtolower($this->connection->ldapEmailAttribute);
177
+        if(isset($ldapEntry[$attr])) {
178
+            $this->updateEmail($ldapEntry[$attr][0]);
179
+        }
180
+        unset($attr);
181
+
182
+        //displayName
183
+        $displayName = $displayName2 = '';
184
+        $attr = strtolower($this->connection->ldapUserDisplayName);
185
+        if(isset($ldapEntry[$attr])) {
186
+            $displayName = strval($ldapEntry[$attr][0]);
187
+        }
188
+        $attr = strtolower($this->connection->ldapUserDisplayName2);
189
+        if(isset($ldapEntry[$attr])) {
190
+            $displayName2 = strval($ldapEntry[$attr][0]);
191
+        }
192
+        if ($displayName !== '') {
193
+            $this->composeAndStoreDisplayName($displayName);
194
+            $this->access->cacheUserDisplayName(
195
+                $this->getUsername(),
196
+                $displayName,
197
+                $displayName2
198
+            );
199
+        }
200
+        unset($attr);
201
+
202
+        // LDAP Username, needed for s2s sharing
203
+        if(isset($ldapEntry['uid'])) {
204
+            $this->storeLDAPUserName($ldapEntry['uid'][0]);
205
+        } else if(isset($ldapEntry['samaccountname'])) {
206
+            $this->storeLDAPUserName($ldapEntry['samaccountname'][0]);
207
+        }
208
+
209
+        //homePath
210
+        if(strpos($this->connection->homeFolderNamingRule, 'attr:') === 0) {
211
+            $attr = strtolower(substr($this->connection->homeFolderNamingRule, strlen('attr:')));
212
+            if(isset($ldapEntry[$attr])) {
213
+                $this->access->cacheUserHome(
214
+                    $this->getUsername(), $this->getHomePath($ldapEntry[$attr][0]));
215
+            }
216
+        }
217
+
218
+        //memberOf groups
219
+        $cacheKey = 'getMemberOf'.$this->getUsername();
220
+        $groups = false;
221
+        if(isset($ldapEntry['memberof'])) {
222
+            $groups = $ldapEntry['memberof'];
223
+        }
224
+        $this->connection->writeToCache($cacheKey, $groups);
225
+
226
+        //Avatar
227
+        $attrs = array('jpegphoto', 'thumbnailphoto');
228
+        foreach ($attrs as $attr)  {
229
+            if(isset($ldapEntry[$attr])) {
230
+                $this->avatarImage = $ldapEntry[$attr][0];
231
+                // the call to the method that saves the avatar in the file
232
+                // system must be postponed after the login. It is to ensure
233
+                // external mounts are mounted properly (e.g. with login
234
+                // credentials from the session).
235
+                \OCP\Util::connectHook('OC_User', 'post_login', $this, 'updateAvatarPostLogin');
236
+                break;
237
+            }
238
+        }
239
+    }
240
+
241
+    /**
242
+     * @brief returns the LDAP DN of the user
243
+     * @return string
244
+     */
245
+    public function getDN() {
246
+        return $this->dn;
247
+    }
248
+
249
+    /**
250
+     * @brief returns the ownCloud internal username of the user
251
+     * @return string
252
+     */
253
+    public function getUsername() {
254
+        return $this->uid;
255
+    }
256
+
257
+    /**
258
+     * returns the home directory of the user if specified by LDAP settings
259
+     * @param string $valueFromLDAP
260
+     * @return bool|string
261
+     * @throws \Exception
262
+     */
263
+    public function getHomePath($valueFromLDAP = null) {
264
+        $path = strval($valueFromLDAP);
265
+        $attr = null;
266
+
267
+        if (is_null($valueFromLDAP)
268
+           && strpos($this->access->connection->homeFolderNamingRule, 'attr:') === 0
269
+           && $this->access->connection->homeFolderNamingRule !== 'attr:')
270
+        {
271
+            $attr = substr($this->access->connection->homeFolderNamingRule, strlen('attr:'));
272
+            $homedir = $this->access->readAttribute(
273
+                $this->access->username2dn($this->getUsername()), $attr);
274
+            if ($homedir && isset($homedir[0])) {
275
+                $path = $homedir[0];
276
+            }
277
+        }
278
+
279
+        if ($path !== '') {
280
+            //if attribute's value is an absolute path take this, otherwise append it to data dir
281
+            //check for / at the beginning or pattern c:\ resp. c:/
282
+            if(   '/' !== $path[0]
283
+               && !(3 < strlen($path) && ctype_alpha($path[0])
284
+                   && $path[1] === ':' && ('\\' === $path[2] || '/' === $path[2]))
285
+            ) {
286
+                $path = $this->config->getSystemValue('datadirectory',
287
+                        \OC::$SERVERROOT.'/data' ) . '/' . $path;
288
+            }
289
+            //we need it to store it in the DB as well in case a user gets
290
+            //deleted so we can clean up afterwards
291
+            $this->config->setUserValue(
292
+                $this->getUsername(), 'user_ldap', 'homePath', $path
293
+            );
294
+            return $path;
295
+        }
296
+
297
+        if(    !is_null($attr)
298
+            && $this->config->getAppValue('user_ldap', 'enforce_home_folder_naming_rule', true)
299
+        ) {
300
+            // a naming rule attribute is defined, but it doesn't exist for that LDAP user
301
+            throw new \Exception('Home dir attribute can\'t be read from LDAP for uid: ' . $this->getUsername());
302
+        }
303
+
304
+        //false will apply default behaviour as defined and done by OC_User
305
+        $this->config->setUserValue($this->getUsername(), 'user_ldap', 'homePath', '');
306
+        return false;
307
+    }
308
+
309
+    public function getMemberOfGroups() {
310
+        $cacheKey = 'getMemberOf'.$this->getUsername();
311
+        $memberOfGroups = $this->connection->getFromCache($cacheKey);
312
+        if(!is_null($memberOfGroups)) {
313
+            return $memberOfGroups;
314
+        }
315
+        $groupDNs = $this->access->readAttribute($this->getDN(), 'memberOf');
316
+        $this->connection->writeToCache($cacheKey, $groupDNs);
317
+        return $groupDNs;
318
+    }
319
+
320
+    /**
321
+     * @brief reads the image from LDAP that shall be used as Avatar
322
+     * @return string data (provided by LDAP) | false
323
+     */
324
+    public function getAvatarImage() {
325
+        if(!is_null($this->avatarImage)) {
326
+            return $this->avatarImage;
327
+        }
328
+
329
+        $this->avatarImage = false;
330
+        $attributes = array('jpegPhoto', 'thumbnailPhoto');
331
+        foreach($attributes as $attribute) {
332
+            $result = $this->access->readAttribute($this->dn, $attribute);
333
+            if($result !== false && is_array($result) && isset($result[0])) {
334
+                $this->avatarImage = $result[0];
335
+                break;
336
+            }
337
+        }
338
+
339
+        return $this->avatarImage;
340
+    }
341
+
342
+    /**
343
+     * @brief marks the user as having logged in at least once
344
+     * @return null
345
+     */
346
+    public function markLogin() {
347
+        $this->config->setUserValue(
348
+            $this->uid, 'user_ldap', self::USER_PREFKEY_FIRSTLOGIN, 1);
349
+    }
350
+
351
+    /**
352
+     * @brief marks the time when user features like email have been updated
353
+     * @return null
354
+     */
355
+    public function markRefreshTime() {
356
+        $this->config->setUserValue(
357
+            $this->uid, 'user_ldap', self::USER_PREFKEY_LASTREFRESH, time());
358
+    }
359
+
360
+    /**
361
+     * @brief checks whether user features needs to be updated again by
362
+     * comparing the difference of time of the last refresh to now with the
363
+     * desired interval
364
+     * @return bool
365
+     */
366
+    private function needsRefresh() {
367
+        $lastChecked = $this->config->getUserValue($this->uid, 'user_ldap',
368
+            self::USER_PREFKEY_LASTREFRESH, 0);
369
+
370
+        //TODO make interval configurable
371
+        if((time() - intval($lastChecked)) < 86400 ) {
372
+            return false;
373
+        }
374
+        return  true;
375
+    }
376
+
377
+    /**
378
+     * Stores a key-value pair in relation to this user
379
+     *
380
+     * @param string $key
381
+     * @param string $value
382
+     */
383
+    private function store($key, $value) {
384
+        $this->config->setUserValue($this->uid, 'user_ldap', $key, $value);
385
+    }
386
+
387
+    /**
388
+     * Composes the display name and stores it in the database. The final
389
+     * display name is returned.
390
+     *
391
+     * @param string $displayName
392
+     * @param string $displayName2
393
+     * @returns string the effective display name
394
+     */
395
+    public function composeAndStoreDisplayName($displayName, $displayName2 = '') {
396
+        $displayName2 = strval($displayName2);
397
+        if($displayName2 !== '') {
398
+            $displayName .= ' (' . $displayName2 . ')';
399
+        }
400
+        $this->store('displayName', $displayName);
401
+        return $displayName;
402
+    }
403
+
404
+    /**
405
+     * Stores the LDAP Username in the Database
406
+     * @param string $userName
407
+     */
408
+    public function storeLDAPUserName($userName) {
409
+        $this->store('uid', $userName);
410
+    }
411
+
412
+    /**
413
+     * @brief checks whether an update method specified by feature was run
414
+     * already. If not, it will marked like this, because it is expected that
415
+     * the method will be run, when false is returned.
416
+     * @param string $feature email | quota | avatar (can be extended)
417
+     * @return bool
418
+     */
419
+    private function wasRefreshed($feature) {
420
+        if(isset($this->refreshedFeatures[$feature])) {
421
+            return true;
422
+        }
423
+        $this->refreshedFeatures[$feature] = 1;
424
+        return false;
425
+    }
426
+
427
+    /**
428
+     * fetches the email from LDAP and stores it as ownCloud user value
429
+     * @param string $valueFromLDAP if known, to save an LDAP read request
430
+     * @return null
431
+     */
432
+    public function updateEmail($valueFromLDAP = null) {
433
+        if($this->wasRefreshed('email')) {
434
+            return;
435
+        }
436
+        $email = strval($valueFromLDAP);
437
+        if(is_null($valueFromLDAP)) {
438
+            $emailAttribute = $this->connection->ldapEmailAttribute;
439
+            if ($emailAttribute !== '') {
440
+                $aEmail = $this->access->readAttribute($this->dn, $emailAttribute);
441
+                if(is_array($aEmail) && (count($aEmail) > 0)) {
442
+                    $email = strval($aEmail[0]);
443
+                }
444
+            }
445
+        }
446
+        if ($email !== '') {
447
+            $user = $this->userManager->get($this->uid);
448
+            if (!is_null($user)) {
449
+                $currentEmail = strval($user->getEMailAddress());
450
+                if ($currentEmail !== $email) {
451
+                    $user->setEMailAddress($email);
452
+                }
453
+            }
454
+        }
455
+    }
456
+
457
+    /**
458
+     * fetches the quota from LDAP and stores it as ownCloud user value
459
+     * @param string $valueFromLDAP the quota attribute's value can be passed,
460
+     * to save the readAttribute request
461
+     * @return null
462
+     */
463
+    public function updateQuota($valueFromLDAP = null) {
464
+        if($this->wasRefreshed('quota')) {
465
+            return;
466
+        }
467
+        //can be null
468
+        $quotaDefault = $this->connection->ldapQuotaDefault;
469
+        $quota = $quotaDefault !== '' ? $quotaDefault : null;
470
+        $quota = !is_null($valueFromLDAP) ? $valueFromLDAP : $quota;
471
+
472
+        if(is_null($valueFromLDAP)) {
473
+            $quotaAttribute = $this->connection->ldapQuotaAttribute;
474
+            if ($quotaAttribute !== '') {
475
+                $aQuota = $this->access->readAttribute($this->dn, $quotaAttribute);
476
+                if($aQuota && (count($aQuota) > 0)) {
477
+                    $quota = $aQuota[0];
478
+                }
479
+            }
480
+        }
481
+        if(!is_null($quota)) {
482
+            $this->userManager->get($this->uid)->setQuota($quota);
483
+        }
484
+    }
485
+
486
+    /**
487
+     * called by a post_login hook to save the avatar picture
488
+     *
489
+     * @param array $params
490
+     */
491
+    public function updateAvatarPostLogin($params) {
492
+        if(isset($params['uid']) && $params['uid'] === $this->getUsername()) {
493
+            $this->updateAvatar();
494
+        }
495
+    }
496
+
497
+    /**
498
+     * @brief attempts to get an image from LDAP and sets it as ownCloud avatar
499
+     * @return null
500
+     */
501
+    public function updateAvatar() {
502
+        if($this->wasRefreshed('avatar')) {
503
+            return;
504
+        }
505
+        $avatarImage = $this->getAvatarImage();
506
+        if($avatarImage === false) {
507
+            //not set, nothing left to do;
508
+            return;
509
+        }
510
+        $this->image->loadFromBase64(base64_encode($avatarImage));
511
+        $this->setOwnCloudAvatar();
512
+    }
513
+
514
+    /**
515
+     * @brief sets an image as ownCloud avatar
516
+     * @return null
517
+     */
518
+    private function setOwnCloudAvatar() {
519
+        if(!$this->image->valid()) {
520
+            $this->log->log('jpegPhoto data invalid for '.$this->dn, \OCP\Util::ERROR);
521
+            return;
522
+        }
523
+        //make sure it is a square and not bigger than 128x128
524
+        $size = min(array($this->image->width(), $this->image->height(), 128));
525
+        if(!$this->image->centerCrop($size)) {
526
+            $this->log->log('croping image for avatar failed for '.$this->dn, \OCP\Util::ERROR);
527
+            return;
528
+        }
529
+
530
+        if(!$this->fs->isLoaded()) {
531
+            $this->fs->setup($this->uid);
532
+        }
533
+
534
+        try {
535
+            $avatar = $this->avatarManager->getAvatar($this->uid);
536
+            $avatar->set($this->image);
537
+        } catch (\Exception $e) {
538
+            \OC::$server->getLogger()->notice(
539
+                'Could not set avatar for ' . $this->dn	. ', because: ' . $e->getMessage(),
540
+                ['app' => 'user_ldap']);
541
+        }
542
+    }
543 543
 
544 544
 }
Please login to merge, or discard this patch.
Spacing   +40 added lines, -40 removed lines patch added patch discarded remove patch
@@ -138,17 +138,17 @@  discard block
 block discarded – undo
138 138
 	 * @return null
139 139
 	 */
140 140
 	public function update() {
141
-		if(is_null($this->dn)) {
141
+		if (is_null($this->dn)) {
142 142
 			return null;
143 143
 		}
144 144
 
145 145
 		$hasLoggedIn = $this->config->getUserValue($this->uid, 'user_ldap',
146 146
 				self::USER_PREFKEY_FIRSTLOGIN, 0);
147 147
 
148
-		if($this->needsRefresh()) {
148
+		if ($this->needsRefresh()) {
149 149
 			$this->updateEmail();
150 150
 			$this->updateQuota();
151
-			if($hasLoggedIn !== 0) {
151
+			if ($hasLoggedIn !== 0) {
152 152
 				//we do not need to try it, when the user has not been logged in
153 153
 				//before, because the file system will not be ready.
154 154
 				$this->updateAvatar();
@@ -167,14 +167,14 @@  discard block
 block discarded – undo
167 167
 		$this->markRefreshTime();
168 168
 		//Quota
169 169
 		$attr = strtolower($this->connection->ldapQuotaAttribute);
170
-		if(isset($ldapEntry[$attr])) {
170
+		if (isset($ldapEntry[$attr])) {
171 171
 			$this->updateQuota($ldapEntry[$attr][0]);
172 172
 		}
173 173
 		unset($attr);
174 174
 
175 175
 		//Email
176 176
 		$attr = strtolower($this->connection->ldapEmailAttribute);
177
-		if(isset($ldapEntry[$attr])) {
177
+		if (isset($ldapEntry[$attr])) {
178 178
 			$this->updateEmail($ldapEntry[$attr][0]);
179 179
 		}
180 180
 		unset($attr);
@@ -182,11 +182,11 @@  discard block
 block discarded – undo
182 182
 		//displayName
183 183
 		$displayName = $displayName2 = '';
184 184
 		$attr = strtolower($this->connection->ldapUserDisplayName);
185
-		if(isset($ldapEntry[$attr])) {
185
+		if (isset($ldapEntry[$attr])) {
186 186
 			$displayName = strval($ldapEntry[$attr][0]);
187 187
 		}
188 188
 		$attr = strtolower($this->connection->ldapUserDisplayName2);
189
-		if(isset($ldapEntry[$attr])) {
189
+		if (isset($ldapEntry[$attr])) {
190 190
 			$displayName2 = strval($ldapEntry[$attr][0]);
191 191
 		}
192 192
 		if ($displayName !== '') {
@@ -200,16 +200,16 @@  discard block
 block discarded – undo
200 200
 		unset($attr);
201 201
 
202 202
 		// LDAP Username, needed for s2s sharing
203
-		if(isset($ldapEntry['uid'])) {
203
+		if (isset($ldapEntry['uid'])) {
204 204
 			$this->storeLDAPUserName($ldapEntry['uid'][0]);
205
-		} else if(isset($ldapEntry['samaccountname'])) {
205
+		} else if (isset($ldapEntry['samaccountname'])) {
206 206
 			$this->storeLDAPUserName($ldapEntry['samaccountname'][0]);
207 207
 		}
208 208
 
209 209
 		//homePath
210
-		if(strpos($this->connection->homeFolderNamingRule, 'attr:') === 0) {
210
+		if (strpos($this->connection->homeFolderNamingRule, 'attr:') === 0) {
211 211
 			$attr = strtolower(substr($this->connection->homeFolderNamingRule, strlen('attr:')));
212
-			if(isset($ldapEntry[$attr])) {
212
+			if (isset($ldapEntry[$attr])) {
213 213
 				$this->access->cacheUserHome(
214 214
 					$this->getUsername(), $this->getHomePath($ldapEntry[$attr][0]));
215 215
 			}
@@ -218,15 +218,15 @@  discard block
 block discarded – undo
218 218
 		//memberOf groups
219 219
 		$cacheKey = 'getMemberOf'.$this->getUsername();
220 220
 		$groups = false;
221
-		if(isset($ldapEntry['memberof'])) {
221
+		if (isset($ldapEntry['memberof'])) {
222 222
 			$groups = $ldapEntry['memberof'];
223 223
 		}
224 224
 		$this->connection->writeToCache($cacheKey, $groups);
225 225
 
226 226
 		//Avatar
227 227
 		$attrs = array('jpegphoto', 'thumbnailphoto');
228
-		foreach ($attrs as $attr)  {
229
-			if(isset($ldapEntry[$attr])) {
228
+		foreach ($attrs as $attr) {
229
+			if (isset($ldapEntry[$attr])) {
230 230
 				$this->avatarImage = $ldapEntry[$attr][0];
231 231
 				// the call to the method that saves the avatar in the file
232 232
 				// system must be postponed after the login. It is to ensure
@@ -279,12 +279,12 @@  discard block
 block discarded – undo
279 279
 		if ($path !== '') {
280 280
 			//if attribute's value is an absolute path take this, otherwise append it to data dir
281 281
 			//check for / at the beginning or pattern c:\ resp. c:/
282
-			if(   '/' !== $path[0]
282
+			if ('/' !== $path[0]
283 283
 			   && !(3 < strlen($path) && ctype_alpha($path[0])
284 284
 			       && $path[1] === ':' && ('\\' === $path[2] || '/' === $path[2]))
285 285
 			) {
286 286
 				$path = $this->config->getSystemValue('datadirectory',
287
-						\OC::$SERVERROOT.'/data' ) . '/' . $path;
287
+						\OC::$SERVERROOT.'/data').'/'.$path;
288 288
 			}
289 289
 			//we need it to store it in the DB as well in case a user gets
290 290
 			//deleted so we can clean up afterwards
@@ -294,11 +294,11 @@  discard block
 block discarded – undo
294 294
 			return $path;
295 295
 		}
296 296
 
297
-		if(    !is_null($attr)
297
+		if (!is_null($attr)
298 298
 			&& $this->config->getAppValue('user_ldap', 'enforce_home_folder_naming_rule', true)
299 299
 		) {
300 300
 			// a naming rule attribute is defined, but it doesn't exist for that LDAP user
301
-			throw new \Exception('Home dir attribute can\'t be read from LDAP for uid: ' . $this->getUsername());
301
+			throw new \Exception('Home dir attribute can\'t be read from LDAP for uid: '.$this->getUsername());
302 302
 		}
303 303
 
304 304
 		//false will apply default behaviour as defined and done by OC_User
@@ -309,7 +309,7 @@  discard block
 block discarded – undo
309 309
 	public function getMemberOfGroups() {
310 310
 		$cacheKey = 'getMemberOf'.$this->getUsername();
311 311
 		$memberOfGroups = $this->connection->getFromCache($cacheKey);
312
-		if(!is_null($memberOfGroups)) {
312
+		if (!is_null($memberOfGroups)) {
313 313
 			return $memberOfGroups;
314 314
 		}
315 315
 		$groupDNs = $this->access->readAttribute($this->getDN(), 'memberOf');
@@ -322,15 +322,15 @@  discard block
 block discarded – undo
322 322
 	 * @return string data (provided by LDAP) | false
323 323
 	 */
324 324
 	public function getAvatarImage() {
325
-		if(!is_null($this->avatarImage)) {
325
+		if (!is_null($this->avatarImage)) {
326 326
 			return $this->avatarImage;
327 327
 		}
328 328
 
329 329
 		$this->avatarImage = false;
330 330
 		$attributes = array('jpegPhoto', 'thumbnailPhoto');
331
-		foreach($attributes as $attribute) {
331
+		foreach ($attributes as $attribute) {
332 332
 			$result = $this->access->readAttribute($this->dn, $attribute);
333
-			if($result !== false && is_array($result) && isset($result[0])) {
333
+			if ($result !== false && is_array($result) && isset($result[0])) {
334 334
 				$this->avatarImage = $result[0];
335 335
 				break;
336 336
 			}
@@ -368,7 +368,7 @@  discard block
 block discarded – undo
368 368
 			self::USER_PREFKEY_LASTREFRESH, 0);
369 369
 
370 370
 		//TODO make interval configurable
371
-		if((time() - intval($lastChecked)) < 86400 ) {
371
+		if ((time() - intval($lastChecked)) < 86400) {
372 372
 			return false;
373 373
 		}
374 374
 		return  true;
@@ -394,8 +394,8 @@  discard block
 block discarded – undo
394 394
 	 */
395 395
 	public function composeAndStoreDisplayName($displayName, $displayName2 = '') {
396 396
 		$displayName2 = strval($displayName2);
397
-		if($displayName2 !== '') {
398
-			$displayName .= ' (' . $displayName2 . ')';
397
+		if ($displayName2 !== '') {
398
+			$displayName .= ' ('.$displayName2.')';
399 399
 		}
400 400
 		$this->store('displayName', $displayName);
401 401
 		return $displayName;
@@ -417,7 +417,7 @@  discard block
 block discarded – undo
417 417
 	 * @return bool
418 418
 	 */
419 419
 	private function wasRefreshed($feature) {
420
-		if(isset($this->refreshedFeatures[$feature])) {
420
+		if (isset($this->refreshedFeatures[$feature])) {
421 421
 			return true;
422 422
 		}
423 423
 		$this->refreshedFeatures[$feature] = 1;
@@ -430,15 +430,15 @@  discard block
 block discarded – undo
430 430
 	 * @return null
431 431
 	 */
432 432
 	public function updateEmail($valueFromLDAP = null) {
433
-		if($this->wasRefreshed('email')) {
433
+		if ($this->wasRefreshed('email')) {
434 434
 			return;
435 435
 		}
436 436
 		$email = strval($valueFromLDAP);
437
-		if(is_null($valueFromLDAP)) {
437
+		if (is_null($valueFromLDAP)) {
438 438
 			$emailAttribute = $this->connection->ldapEmailAttribute;
439 439
 			if ($emailAttribute !== '') {
440 440
 				$aEmail = $this->access->readAttribute($this->dn, $emailAttribute);
441
-				if(is_array($aEmail) && (count($aEmail) > 0)) {
441
+				if (is_array($aEmail) && (count($aEmail) > 0)) {
442 442
 					$email = strval($aEmail[0]);
443 443
 				}
444 444
 			}
@@ -461,7 +461,7 @@  discard block
 block discarded – undo
461 461
 	 * @return null
462 462
 	 */
463 463
 	public function updateQuota($valueFromLDAP = null) {
464
-		if($this->wasRefreshed('quota')) {
464
+		if ($this->wasRefreshed('quota')) {
465 465
 			return;
466 466
 		}
467 467
 		//can be null
@@ -469,16 +469,16 @@  discard block
 block discarded – undo
469 469
 		$quota = $quotaDefault !== '' ? $quotaDefault : null;
470 470
 		$quota = !is_null($valueFromLDAP) ? $valueFromLDAP : $quota;
471 471
 
472
-		if(is_null($valueFromLDAP)) {
472
+		if (is_null($valueFromLDAP)) {
473 473
 			$quotaAttribute = $this->connection->ldapQuotaAttribute;
474 474
 			if ($quotaAttribute !== '') {
475 475
 				$aQuota = $this->access->readAttribute($this->dn, $quotaAttribute);
476
-				if($aQuota && (count($aQuota) > 0)) {
476
+				if ($aQuota && (count($aQuota) > 0)) {
477 477
 					$quota = $aQuota[0];
478 478
 				}
479 479
 			}
480 480
 		}
481
-		if(!is_null($quota)) {
481
+		if (!is_null($quota)) {
482 482
 			$this->userManager->get($this->uid)->setQuota($quota);
483 483
 		}
484 484
 	}
@@ -489,7 +489,7 @@  discard block
 block discarded – undo
489 489
 	 * @param array $params
490 490
 	 */
491 491
 	public function updateAvatarPostLogin($params) {
492
-		if(isset($params['uid']) && $params['uid'] === $this->getUsername()) {
492
+		if (isset($params['uid']) && $params['uid'] === $this->getUsername()) {
493 493
 			$this->updateAvatar();
494 494
 		}
495 495
 	}
@@ -499,11 +499,11 @@  discard block
 block discarded – undo
499 499
 	 * @return null
500 500
 	 */
501 501
 	public function updateAvatar() {
502
-		if($this->wasRefreshed('avatar')) {
502
+		if ($this->wasRefreshed('avatar')) {
503 503
 			return;
504 504
 		}
505 505
 		$avatarImage = $this->getAvatarImage();
506
-		if($avatarImage === false) {
506
+		if ($avatarImage === false) {
507 507
 			//not set, nothing left to do;
508 508
 			return;
509 509
 		}
@@ -516,18 +516,18 @@  discard block
 block discarded – undo
516 516
 	 * @return null
517 517
 	 */
518 518
 	private function setOwnCloudAvatar() {
519
-		if(!$this->image->valid()) {
519
+		if (!$this->image->valid()) {
520 520
 			$this->log->log('jpegPhoto data invalid for '.$this->dn, \OCP\Util::ERROR);
521 521
 			return;
522 522
 		}
523 523
 		//make sure it is a square and not bigger than 128x128
524 524
 		$size = min(array($this->image->width(), $this->image->height(), 128));
525
-		if(!$this->image->centerCrop($size)) {
525
+		if (!$this->image->centerCrop($size)) {
526 526
 			$this->log->log('croping image for avatar failed for '.$this->dn, \OCP\Util::ERROR);
527 527
 			return;
528 528
 		}
529 529
 
530
-		if(!$this->fs->isLoaded()) {
530
+		if (!$this->fs->isLoaded()) {
531 531
 			$this->fs->setup($this->uid);
532 532
 		}
533 533
 
@@ -536,7 +536,7 @@  discard block
 block discarded – undo
536 536
 			$avatar->set($this->image);
537 537
 		} catch (\Exception $e) {
538 538
 			\OC::$server->getLogger()->notice(
539
-				'Could not set avatar for ' . $this->dn	. ', because: ' . $e->getMessage(),
539
+				'Could not set avatar for '.$this->dn.', because: '.$e->getMessage(),
540 540
 				['app' => 'user_ldap']);
541 541
 		}
542 542
 	}
Please login to merge, or discard this patch.
apps/user_ldap/lib/User/DeletedUsersIndex.php 2 patches
Indentation   +70 added lines, -70 removed lines patch added patch discarded remove patch
@@ -31,84 +31,84 @@
 block discarded – undo
31 31
  * @package OCA\User_LDAP
32 32
  */
33 33
 class DeletedUsersIndex {
34
-	/**
35
-	 * @var \OCP\IConfig $config
36
-	 */
37
-	protected $config;
34
+    /**
35
+     * @var \OCP\IConfig $config
36
+     */
37
+    protected $config;
38 38
 
39
-	/**
40
-	 * @var \OCP\IDBConnection $db
41
-	 */
42
-	protected $db;
39
+    /**
40
+     * @var \OCP\IDBConnection $db
41
+     */
42
+    protected $db;
43 43
 
44
-	/**
45
-	 * @var \OCA\User_LDAP\Mapping\UserMapping $mapping
46
-	 */
47
-	protected $mapping;
44
+    /**
45
+     * @var \OCA\User_LDAP\Mapping\UserMapping $mapping
46
+     */
47
+    protected $mapping;
48 48
 
49
-	/**
50
-	 * @var array $deletedUsers
51
-	 */
52
-	protected $deletedUsers;
49
+    /**
50
+     * @var array $deletedUsers
51
+     */
52
+    protected $deletedUsers;
53 53
 
54
-	/**
55
-	 * @param \OCP\IConfig $config
56
-	 * @param \OCP\IDBConnection $db
57
-	 * @param \OCA\User_LDAP\Mapping\UserMapping $mapping
58
-	 */
59
-	public function __construct(\OCP\IConfig $config, \OCP\IDBConnection $db, UserMapping $mapping) {
60
-		$this->config = $config;
61
-		$this->db = $db;
62
-		$this->mapping = $mapping;
63
-	}
54
+    /**
55
+     * @param \OCP\IConfig $config
56
+     * @param \OCP\IDBConnection $db
57
+     * @param \OCA\User_LDAP\Mapping\UserMapping $mapping
58
+     */
59
+    public function __construct(\OCP\IConfig $config, \OCP\IDBConnection $db, UserMapping $mapping) {
60
+        $this->config = $config;
61
+        $this->db = $db;
62
+        $this->mapping = $mapping;
63
+    }
64 64
 
65
-	/**
66
-	 * reads LDAP users marked as deleted from the database
67
-	 * @return \OCA\User_LDAP\User\OfflineUser[]
68
-	 */
69
-	private function fetchDeletedUsers() {
70
-		$deletedUsers = $this->config->getUsersForUserValue(
71
-			'user_ldap', 'isDeleted', '1');
65
+    /**
66
+     * reads LDAP users marked as deleted from the database
67
+     * @return \OCA\User_LDAP\User\OfflineUser[]
68
+     */
69
+    private function fetchDeletedUsers() {
70
+        $deletedUsers = $this->config->getUsersForUserValue(
71
+            'user_ldap', 'isDeleted', '1');
72 72
 
73
-		$userObjects = array();
74
-		foreach($deletedUsers as $user) {
75
-			$userObjects[] = new OfflineUser($user, $this->config, $this->db, $this->mapping);
76
-		}
77
-		$this->deletedUsers = $userObjects;
73
+        $userObjects = array();
74
+        foreach($deletedUsers as $user) {
75
+            $userObjects[] = new OfflineUser($user, $this->config, $this->db, $this->mapping);
76
+        }
77
+        $this->deletedUsers = $userObjects;
78 78
 
79
-		return $this->deletedUsers;
80
-	}
79
+        return $this->deletedUsers;
80
+    }
81 81
 
82
-	/**
83
-	 * returns all LDAP users that are marked as deleted
84
-	 * @return \OCA\User_LDAP\User\OfflineUser[]
85
-	 */
86
-	public function getUsers() {
87
-		if(is_array($this->deletedUsers)) {
88
-			return $this->deletedUsers;
89
-		}
90
-		return $this->fetchDeletedUsers();
91
-	}
82
+    /**
83
+     * returns all LDAP users that are marked as deleted
84
+     * @return \OCA\User_LDAP\User\OfflineUser[]
85
+     */
86
+    public function getUsers() {
87
+        if(is_array($this->deletedUsers)) {
88
+            return $this->deletedUsers;
89
+        }
90
+        return $this->fetchDeletedUsers();
91
+    }
92 92
 
93
-	/**
94
-	 * whether at least one user was detected as deleted
95
-	 * @return bool
96
-	 */
97
-	public function hasUsers() {
98
-		if($this->deletedUsers === false) {
99
-			$this->fetchDeletedUsers();
100
-		}
101
-		if(is_array($this->deletedUsers) && count($this->deletedUsers) > 0) {
102
-			return true;
103
-		}
104
-		return false;
105
-	}
93
+    /**
94
+     * whether at least one user was detected as deleted
95
+     * @return bool
96
+     */
97
+    public function hasUsers() {
98
+        if($this->deletedUsers === false) {
99
+            $this->fetchDeletedUsers();
100
+        }
101
+        if(is_array($this->deletedUsers) && count($this->deletedUsers) > 0) {
102
+            return true;
103
+        }
104
+        return false;
105
+    }
106 106
 
107
-	/**
108
-	 * marks a user as deleted
109
-	 * @param string $ocName
110
-	 */
111
-	public function markUser($ocName) {
112
-		$this->config->setUserValue($ocName, 'user_ldap', 'isDeleted', '1');
113
-	}
107
+    /**
108
+     * marks a user as deleted
109
+     * @param string $ocName
110
+     */
111
+    public function markUser($ocName) {
112
+        $this->config->setUserValue($ocName, 'user_ldap', 'isDeleted', '1');
113
+    }
114 114
 }
Please login to merge, or discard this patch.
Spacing   +4 added lines, -4 removed lines patch added patch discarded remove patch
@@ -71,7 +71,7 @@  discard block
 block discarded – undo
71 71
 			'user_ldap', 'isDeleted', '1');
72 72
 
73 73
 		$userObjects = array();
74
-		foreach($deletedUsers as $user) {
74
+		foreach ($deletedUsers as $user) {
75 75
 			$userObjects[] = new OfflineUser($user, $this->config, $this->db, $this->mapping);
76 76
 		}
77 77
 		$this->deletedUsers = $userObjects;
@@ -84,7 +84,7 @@  discard block
 block discarded – undo
84 84
 	 * @return \OCA\User_LDAP\User\OfflineUser[]
85 85
 	 */
86 86
 	public function getUsers() {
87
-		if(is_array($this->deletedUsers)) {
87
+		if (is_array($this->deletedUsers)) {
88 88
 			return $this->deletedUsers;
89 89
 		}
90 90
 		return $this->fetchDeletedUsers();
@@ -95,10 +95,10 @@  discard block
 block discarded – undo
95 95
 	 * @return bool
96 96
 	 */
97 97
 	public function hasUsers() {
98
-		if($this->deletedUsers === false) {
98
+		if ($this->deletedUsers === false) {
99 99
 			$this->fetchDeletedUsers();
100 100
 		}
101
-		if(is_array($this->deletedUsers) && count($this->deletedUsers) > 0) {
101
+		if (is_array($this->deletedUsers) && count($this->deletedUsers) > 0) {
102 102
 			return true;
103 103
 		}
104 104
 		return false;
Please login to merge, or discard this patch.
apps/user_ldap/lib/User/IUserTools.php 1 patch
Indentation   +5 added lines, -5 removed lines patch added patch discarded remove patch
@@ -30,13 +30,13 @@
 block discarded – undo
30 30
  * defines methods that are required by User class for LDAP interaction
31 31
  */
32 32
 interface IUserTools {
33
-	public function getConnection();
33
+    public function getConnection();
34 34
 
35
-	public function readAttribute($dn, $attr, $filter = 'objectClass=*');
35
+    public function readAttribute($dn, $attr, $filter = 'objectClass=*');
36 36
 
37
-	public function stringResemblesDN($string);
37
+    public function stringResemblesDN($string);
38 38
 
39
-	public function dn2username($dn, $ldapname = null);
39
+    public function dn2username($dn, $ldapname = null);
40 40
 
41
-	public function username2dn($name);
41
+    public function username2dn($name);
42 42
 }
Please login to merge, or discard this patch.
apps/user_ldap/lib/User/Manager.php 2 patches
Indentation   +195 added lines, -195 removed lines patch added patch discarded remove patch
@@ -42,200 +42,200 @@
 block discarded – undo
42 42
  * cache
43 43
  */
44 44
 class Manager {
45
-	/** @var IUserTools */
46
-	protected $access;
47
-
48
-	/** @var IConfig */
49
-	protected $ocConfig;
50
-
51
-	/** @var IDBConnection */
52
-	protected $db;
53
-
54
-	/** @var FilesystemHelper */
55
-	protected $ocFilesystem;
56
-
57
-	/** @var LogWrapper */
58
-	protected $ocLog;
59
-
60
-	/** @var Image */
61
-	protected $image;
62
-
63
-	/** @param \OCP\IAvatarManager */
64
-	protected $avatarManager;
65
-
66
-	/**
67
-	 * @var CappedMemoryCache $usersByDN
68
-	 */
69
-	protected $usersByDN;
70
-	/**
71
-	 * @var CappedMemoryCache $usersByUid
72
-	 */
73
-	protected $usersByUid;
74
-
75
-	/**
76
-	 * @param IConfig $ocConfig
77
-	 * @param \OCA\User_LDAP\FilesystemHelper $ocFilesystem object that
78
-	 * gives access to necessary functions from the OC filesystem
79
-	 * @param  \OCA\User_LDAP\LogWrapper $ocLog
80
-	 * @param IAvatarManager $avatarManager
81
-	 * @param Image $image an empty image instance
82
-	 * @param IDBConnection $db
83
-	 * @throws \Exception when the methods mentioned above do not exist
84
-	 */
85
-	public function __construct(IConfig $ocConfig,
86
-								FilesystemHelper $ocFilesystem, LogWrapper $ocLog,
87
-								IAvatarManager $avatarManager, Image $image,
88
-								IDBConnection $db, IUserManager $userManager) {
89
-
90
-		$this->ocConfig      = $ocConfig;
91
-		$this->ocFilesystem  = $ocFilesystem;
92
-		$this->ocLog         = $ocLog;
93
-		$this->avatarManager = $avatarManager;
94
-		$this->image         = $image;
95
-		$this->db            = $db;
96
-		$this->userManager   = $userManager;
97
-		$this->usersByDN     = new CappedMemoryCache();
98
-		$this->usersByUid    = new CappedMemoryCache();
99
-	}
100
-
101
-	/**
102
-	 * @brief binds manager to an instance of IUserTools (implemented by
103
-	 * Access). It needs to be assigned first before the manager can be used.
104
-	 * @param IUserTools
105
-	 */
106
-	public function setLdapAccess(IUserTools $access) {
107
-		$this->access = $access;
108
-	}
109
-
110
-	/**
111
-	 * @brief creates an instance of User and caches (just runtime) it in the
112
-	 * property array
113
-	 * @param string $dn the DN of the user
114
-	 * @param string $uid the internal (owncloud) username
115
-	 * @return \OCA\User_LDAP\User\User
116
-	 */
117
-	private function createAndCache($dn, $uid) {
118
-		$this->checkAccess();
119
-		$user = new User($uid, $dn, $this->access, $this->ocConfig,
120
-			$this->ocFilesystem, clone $this->image, $this->ocLog,
121
-			$this->avatarManager, $this->userManager);
122
-		$this->usersByDN[$dn]   = $user;
123
-		$this->usersByUid[$uid] = $user;
124
-		return $user;
125
-	}
126
-
127
-	/**
128
-	 * @brief checks whether the Access instance has been set
129
-	 * @throws \Exception if Access has not been set
130
-	 * @return null
131
-	 */
132
-	private function checkAccess() {
133
-		if(is_null($this->access)) {
134
-			throw new \Exception('LDAP Access instance must be set first');
135
-		}
136
-	}
137
-
138
-	/**
139
-	 * returns a list of attributes that will be processed further, e.g. quota,
140
-	 * email, displayname, or others.
141
-	 * @param bool $minimal - optional, set to true to skip attributes with big
142
-	 * payload
143
-	 * @return string[]
144
-	 */
145
-	public function getAttributes($minimal = false) {
146
-		$attributes = array('dn', 'uid', 'samaccountname', 'memberof');
147
-		$possible = array(
148
-			$this->access->getConnection()->ldapQuotaAttribute,
149
-			$this->access->getConnection()->ldapEmailAttribute,
150
-			$this->access->getConnection()->ldapUserDisplayName,
151
-			$this->access->getConnection()->ldapUserDisplayName2,
152
-		);
153
-		foreach($possible as $attr) {
154
-			if(!is_null($attr)) {
155
-				$attributes[] = $attr;
156
-			}
157
-		}
158
-
159
-		$homeRule = $this->access->getConnection()->homeFolderNamingRule;
160
-		if(strpos($homeRule, 'attr:') === 0) {
161
-			$attributes[] = substr($homeRule, strlen('attr:'));
162
-		}
163
-
164
-		if(!$minimal) {
165
-			// attributes that are not really important but may come with big
166
-			// payload.
167
-			$attributes = array_merge($attributes, array(
168
-				'jpegphoto',
169
-				'thumbnailphoto'
170
-			));
171
-		}
172
-
173
-		return $attributes;
174
-	}
175
-
176
-	/**
177
-	 * Checks whether the specified user is marked as deleted
178
-	 * @param string $id the ownCloud user name
179
-	 * @return bool
180
-	 */
181
-	public function isDeletedUser($id) {
182
-		$isDeleted = $this->ocConfig->getUserValue(
183
-			$id, 'user_ldap', 'isDeleted', 0);
184
-		return intval($isDeleted) === 1;
185
-	}
186
-
187
-	/**
188
-	 * creates and returns an instance of OfflineUser for the specified user
189
-	 * @param string $id
190
-	 * @return \OCA\User_LDAP\User\OfflineUser
191
-	 */
192
-	public function getDeletedUser($id) {
193
-		return new OfflineUser(
194
-			$id,
195
-			$this->ocConfig,
196
-			$this->db,
197
-			$this->access->getUserMapper());
198
-	}
199
-
200
-	/**
201
-	 * @brief returns a User object by it's ownCloud username
202
-	 * @param string $id the DN or username of the user
203
-	 * @return \OCA\User_LDAP\User\User|\OCA\User_LDAP\User\OfflineUser|null
204
-	 */
205
-	protected function createInstancyByUserName($id) {
206
-		//most likely a uid. Check whether it is a deleted user
207
-		if($this->isDeletedUser($id)) {
208
-			return $this->getDeletedUser($id);
209
-		}
210
-		$dn = $this->access->username2dn($id);
211
-		if($dn !== false) {
212
-			return $this->createAndCache($dn, $id);
213
-		}
214
-		return null;
215
-	}
216
-
217
-	/**
218
-	 * @brief returns a User object by it's DN or ownCloud username
219
-	 * @param string $id the DN or username of the user
220
-	 * @return \OCA\User_LDAP\User\User|\OCA\User_LDAP\User\OfflineUser|null
221
-	 * @throws \Exception when connection could not be established
222
-	 */
223
-	public function get($id) {
224
-		$this->checkAccess();
225
-		if(isset($this->usersByDN[$id])) {
226
-			return $this->usersByDN[$id];
227
-		} else if(isset($this->usersByUid[$id])) {
228
-			return $this->usersByUid[$id];
229
-		}
230
-
231
-		if($this->access->stringResemblesDN($id) ) {
232
-			$uid = $this->access->dn2username($id);
233
-			if($uid !== false) {
234
-				return $this->createAndCache($id, $uid);
235
-			}
236
-		}
237
-
238
-		return $this->createInstancyByUserName($id);
239
-	}
45
+    /** @var IUserTools */
46
+    protected $access;
47
+
48
+    /** @var IConfig */
49
+    protected $ocConfig;
50
+
51
+    /** @var IDBConnection */
52
+    protected $db;
53
+
54
+    /** @var FilesystemHelper */
55
+    protected $ocFilesystem;
56
+
57
+    /** @var LogWrapper */
58
+    protected $ocLog;
59
+
60
+    /** @var Image */
61
+    protected $image;
62
+
63
+    /** @param \OCP\IAvatarManager */
64
+    protected $avatarManager;
65
+
66
+    /**
67
+     * @var CappedMemoryCache $usersByDN
68
+     */
69
+    protected $usersByDN;
70
+    /**
71
+     * @var CappedMemoryCache $usersByUid
72
+     */
73
+    protected $usersByUid;
74
+
75
+    /**
76
+     * @param IConfig $ocConfig
77
+     * @param \OCA\User_LDAP\FilesystemHelper $ocFilesystem object that
78
+     * gives access to necessary functions from the OC filesystem
79
+     * @param  \OCA\User_LDAP\LogWrapper $ocLog
80
+     * @param IAvatarManager $avatarManager
81
+     * @param Image $image an empty image instance
82
+     * @param IDBConnection $db
83
+     * @throws \Exception when the methods mentioned above do not exist
84
+     */
85
+    public function __construct(IConfig $ocConfig,
86
+                                FilesystemHelper $ocFilesystem, LogWrapper $ocLog,
87
+                                IAvatarManager $avatarManager, Image $image,
88
+                                IDBConnection $db, IUserManager $userManager) {
89
+
90
+        $this->ocConfig      = $ocConfig;
91
+        $this->ocFilesystem  = $ocFilesystem;
92
+        $this->ocLog         = $ocLog;
93
+        $this->avatarManager = $avatarManager;
94
+        $this->image         = $image;
95
+        $this->db            = $db;
96
+        $this->userManager   = $userManager;
97
+        $this->usersByDN     = new CappedMemoryCache();
98
+        $this->usersByUid    = new CappedMemoryCache();
99
+    }
100
+
101
+    /**
102
+     * @brief binds manager to an instance of IUserTools (implemented by
103
+     * Access). It needs to be assigned first before the manager can be used.
104
+     * @param IUserTools
105
+     */
106
+    public function setLdapAccess(IUserTools $access) {
107
+        $this->access = $access;
108
+    }
109
+
110
+    /**
111
+     * @brief creates an instance of User and caches (just runtime) it in the
112
+     * property array
113
+     * @param string $dn the DN of the user
114
+     * @param string $uid the internal (owncloud) username
115
+     * @return \OCA\User_LDAP\User\User
116
+     */
117
+    private function createAndCache($dn, $uid) {
118
+        $this->checkAccess();
119
+        $user = new User($uid, $dn, $this->access, $this->ocConfig,
120
+            $this->ocFilesystem, clone $this->image, $this->ocLog,
121
+            $this->avatarManager, $this->userManager);
122
+        $this->usersByDN[$dn]   = $user;
123
+        $this->usersByUid[$uid] = $user;
124
+        return $user;
125
+    }
126
+
127
+    /**
128
+     * @brief checks whether the Access instance has been set
129
+     * @throws \Exception if Access has not been set
130
+     * @return null
131
+     */
132
+    private function checkAccess() {
133
+        if(is_null($this->access)) {
134
+            throw new \Exception('LDAP Access instance must be set first');
135
+        }
136
+    }
137
+
138
+    /**
139
+     * returns a list of attributes that will be processed further, e.g. quota,
140
+     * email, displayname, or others.
141
+     * @param bool $minimal - optional, set to true to skip attributes with big
142
+     * payload
143
+     * @return string[]
144
+     */
145
+    public function getAttributes($minimal = false) {
146
+        $attributes = array('dn', 'uid', 'samaccountname', 'memberof');
147
+        $possible = array(
148
+            $this->access->getConnection()->ldapQuotaAttribute,
149
+            $this->access->getConnection()->ldapEmailAttribute,
150
+            $this->access->getConnection()->ldapUserDisplayName,
151
+            $this->access->getConnection()->ldapUserDisplayName2,
152
+        );
153
+        foreach($possible as $attr) {
154
+            if(!is_null($attr)) {
155
+                $attributes[] = $attr;
156
+            }
157
+        }
158
+
159
+        $homeRule = $this->access->getConnection()->homeFolderNamingRule;
160
+        if(strpos($homeRule, 'attr:') === 0) {
161
+            $attributes[] = substr($homeRule, strlen('attr:'));
162
+        }
163
+
164
+        if(!$minimal) {
165
+            // attributes that are not really important but may come with big
166
+            // payload.
167
+            $attributes = array_merge($attributes, array(
168
+                'jpegphoto',
169
+                'thumbnailphoto'
170
+            ));
171
+        }
172
+
173
+        return $attributes;
174
+    }
175
+
176
+    /**
177
+     * Checks whether the specified user is marked as deleted
178
+     * @param string $id the ownCloud user name
179
+     * @return bool
180
+     */
181
+    public function isDeletedUser($id) {
182
+        $isDeleted = $this->ocConfig->getUserValue(
183
+            $id, 'user_ldap', 'isDeleted', 0);
184
+        return intval($isDeleted) === 1;
185
+    }
186
+
187
+    /**
188
+     * creates and returns an instance of OfflineUser for the specified user
189
+     * @param string $id
190
+     * @return \OCA\User_LDAP\User\OfflineUser
191
+     */
192
+    public function getDeletedUser($id) {
193
+        return new OfflineUser(
194
+            $id,
195
+            $this->ocConfig,
196
+            $this->db,
197
+            $this->access->getUserMapper());
198
+    }
199
+
200
+    /**
201
+     * @brief returns a User object by it's ownCloud username
202
+     * @param string $id the DN or username of the user
203
+     * @return \OCA\User_LDAP\User\User|\OCA\User_LDAP\User\OfflineUser|null
204
+     */
205
+    protected function createInstancyByUserName($id) {
206
+        //most likely a uid. Check whether it is a deleted user
207
+        if($this->isDeletedUser($id)) {
208
+            return $this->getDeletedUser($id);
209
+        }
210
+        $dn = $this->access->username2dn($id);
211
+        if($dn !== false) {
212
+            return $this->createAndCache($dn, $id);
213
+        }
214
+        return null;
215
+    }
216
+
217
+    /**
218
+     * @brief returns a User object by it's DN or ownCloud username
219
+     * @param string $id the DN or username of the user
220
+     * @return \OCA\User_LDAP\User\User|\OCA\User_LDAP\User\OfflineUser|null
221
+     * @throws \Exception when connection could not be established
222
+     */
223
+    public function get($id) {
224
+        $this->checkAccess();
225
+        if(isset($this->usersByDN[$id])) {
226
+            return $this->usersByDN[$id];
227
+        } else if(isset($this->usersByUid[$id])) {
228
+            return $this->usersByUid[$id];
229
+        }
230
+
231
+        if($this->access->stringResemblesDN($id) ) {
232
+            $uid = $this->access->dn2username($id);
233
+            if($uid !== false) {
234
+                return $this->createAndCache($id, $uid);
235
+            }
236
+        }
237
+
238
+        return $this->createInstancyByUserName($id);
239
+    }
240 240
 
241 241
 }
Please login to merge, or discard this patch.
Spacing   +11 added lines, -11 removed lines patch added patch discarded remove patch
@@ -130,7 +130,7 @@  discard block
 block discarded – undo
130 130
 	 * @return null
131 131
 	 */
132 132
 	private function checkAccess() {
133
-		if(is_null($this->access)) {
133
+		if (is_null($this->access)) {
134 134
 			throw new \Exception('LDAP Access instance must be set first');
135 135
 		}
136 136
 	}
@@ -150,18 +150,18 @@  discard block
 block discarded – undo
150 150
 			$this->access->getConnection()->ldapUserDisplayName,
151 151
 			$this->access->getConnection()->ldapUserDisplayName2,
152 152
 		);
153
-		foreach($possible as $attr) {
154
-			if(!is_null($attr)) {
153
+		foreach ($possible as $attr) {
154
+			if (!is_null($attr)) {
155 155
 				$attributes[] = $attr;
156 156
 			}
157 157
 		}
158 158
 
159 159
 		$homeRule = $this->access->getConnection()->homeFolderNamingRule;
160
-		if(strpos($homeRule, 'attr:') === 0) {
160
+		if (strpos($homeRule, 'attr:') === 0) {
161 161
 			$attributes[] = substr($homeRule, strlen('attr:'));
162 162
 		}
163 163
 
164
-		if(!$minimal) {
164
+		if (!$minimal) {
165 165
 			// attributes that are not really important but may come with big
166 166
 			// payload.
167 167
 			$attributes = array_merge($attributes, array(
@@ -204,11 +204,11 @@  discard block
 block discarded – undo
204 204
 	 */
205 205
 	protected function createInstancyByUserName($id) {
206 206
 		//most likely a uid. Check whether it is a deleted user
207
-		if($this->isDeletedUser($id)) {
207
+		if ($this->isDeletedUser($id)) {
208 208
 			return $this->getDeletedUser($id);
209 209
 		}
210 210
 		$dn = $this->access->username2dn($id);
211
-		if($dn !== false) {
211
+		if ($dn !== false) {
212 212
 			return $this->createAndCache($dn, $id);
213 213
 		}
214 214
 		return null;
@@ -222,15 +222,15 @@  discard block
 block discarded – undo
222 222
 	 */
223 223
 	public function get($id) {
224 224
 		$this->checkAccess();
225
-		if(isset($this->usersByDN[$id])) {
225
+		if (isset($this->usersByDN[$id])) {
226 226
 			return $this->usersByDN[$id];
227
-		} else if(isset($this->usersByUid[$id])) {
227
+		} else if (isset($this->usersByUid[$id])) {
228 228
 			return $this->usersByUid[$id];
229 229
 		}
230 230
 
231
-		if($this->access->stringResemblesDN($id) ) {
231
+		if ($this->access->stringResemblesDN($id)) {
232 232
 			$uid = $this->access->dn2username($id);
233
-			if($uid !== false) {
233
+			if ($uid !== false) {
234 234
 				return $this->createAndCache($id, $uid);
235 235
 			}
236 236
 		}
Please login to merge, or discard this patch.
apps/user_ldap/lib/User/OfflineUser.php 2 patches
Indentation   +193 added lines, -193 removed lines patch added patch discarded remove patch
@@ -27,205 +27,205 @@
 block discarded – undo
27 27
 use OCA\User_LDAP\Mapping\UserMapping;
28 28
 
29 29
 class OfflineUser {
30
-	/**
31
-	 * @var string $ocName
32
-	 */
33
-	protected $ocName;
34
-	/**
35
-	 * @var string $dn
36
-	 */
37
-	protected $dn;
38
-	/**
39
-	 * @var string $uid the UID as provided by LDAP
40
-	 */
41
-	protected $uid;
42
-	/**
43
-	 * @var string $displayName
44
-	 */
45
-	protected $displayName;
46
-	/**
47
-	 * @var string $homePath
48
-	 */
49
-	protected $homePath;
50
-	/**
51
-	 * @var string $lastLogin the timestamp of the last login
52
-	 */
53
-	protected $lastLogin;
54
-	/**
55
-	 * @var string $email
56
-	 */
57
-	protected $email;
58
-	/**
59
-	 * @var bool $hasActiveShares
60
-	 */
61
-	protected $hasActiveShares;
62
-	/**
63
-	 * @var \OCP\IConfig $config
64
-	 */
65
-	protected $config;
66
-	/**
67
-	 * @var \OCP\IDBConnection $db
68
-	 */
69
-	protected $db;
70
-	/**
71
-	 * @var \OCA\User_LDAP\Mapping\UserMapping
72
-	 */
73
-	protected $mapping;
74
-
75
-	/**
76
-	 * @param string $ocName
77
-	 * @param \OCP\IConfig $config
78
-	 * @param \OCP\IDBConnection $db
79
-	 * @param \OCA\User_LDAP\Mapping\UserMapping $mapping
80
-	 */
81
-	public function __construct($ocName, \OCP\IConfig $config, \OCP\IDBConnection $db, UserMapping $mapping) {
82
-		$this->ocName = $ocName;
83
-		$this->config = $config;
84
-		$this->db = $db;
85
-		$this->mapping = $mapping;
86
-		$this->fetchDetails();
87
-	}
88
-
89
-	/**
90
-	 * remove the Delete-flag from the user.
91
-	 */
92
-	public function unmark() {
93
-		$this->config->setUserValue($this->ocName, 'user_ldap', 'isDeleted', '0');
94
-	}
95
-
96
-	/**
97
-	 * exports the user details in an assoc array
98
-	 * @return array
99
-	 */
100
-	public function export() {
101
-		$data = array();
102
-		$data['ocName'] = $this->getOCName();
103
-		$data['dn'] = $this->getDN();
104
-		$data['uid'] = $this->getUID();
105
-		$data['displayName'] = $this->getDisplayName();
106
-		$data['homePath'] = $this->getHomePath();
107
-		$data['lastLogin'] = $this->getLastLogin();
108
-		$data['email'] = $this->getEmail();
109
-		$data['hasActiveShares'] = $this->getHasActiveShares();
110
-
111
-		return $data;
112
-	}
113
-
114
-	/**
115
-	 * getter for ownCloud internal name
116
-	 * @return string
117
-	 */
118
-	public function getOCName() {
119
-		return $this->ocName;
120
-	}
121
-
122
-	/**
123
-	 * getter for LDAP uid
124
-	 * @return string
125
-	 */
126
-	public function getUID() {
127
-		return $this->uid;
128
-	}
129
-
130
-	/**
131
-	 * getter for LDAP DN
132
-	 * @return string
133
-	 */
134
-	public function getDN() {
135
-		return $this->dn;
136
-	}
137
-
138
-	/**
139
-	 * getter for display name
140
-	 * @return string
141
-	 */
142
-	public function getDisplayName() {
143
-		return $this->displayName;
144
-	}
145
-
146
-	/**
147
-	 * getter for email
148
-	 * @return string
149
-	 */
150
-	public function getEmail() {
151
-		return $this->email;
152
-	}
153
-
154
-	/**
155
-	 * getter for home directory path
156
-	 * @return string
157
-	 */
158
-	public function getHomePath() {
159
-		return $this->homePath;
160
-	}
161
-
162
-	/**
163
-	 * getter for the last login timestamp
164
-	 * @return int
165
-	 */
166
-	public function getLastLogin() {
167
-		return intval($this->lastLogin);
168
-	}
169
-
170
-	/**
171
-	 * getter for having active shares
172
-	 * @return bool
173
-	 */
174
-	public function getHasActiveShares() {
175
-		return $this->hasActiveShares;
176
-	}
177
-
178
-	/**
179
-	 * reads the user details
180
-	 */
181
-	protected function fetchDetails() {
182
-		$properties = array (
183
-			'displayName' => 'user_ldap',
184
-			'uid'         => 'user_ldap',
185
-			'homePath'    => 'user_ldap',
186
-			'email'       => 'settings',
187
-			'lastLogin'   => 'login'
188
-		);
189
-		foreach($properties as $property => $app) {
190
-			$this->$property = $this->config->getUserValue($this->ocName, $app, $property, '');
191
-		}
192
-
193
-		$dn = $this->mapping->getDNByName($this->ocName);
194
-		$this->dn = ($dn !== false) ? $dn : '';
195
-
196
-		$this->determineShares();
197
-	}
198
-
199
-
200
-	/**
201
-	 * finds out whether the user has active shares. The result is stored in
202
-	 * $this->hasActiveShares
203
-	 */
204
-	protected function determineShares() {
205
-		$query = $this->db->prepare('
30
+    /**
31
+     * @var string $ocName
32
+     */
33
+    protected $ocName;
34
+    /**
35
+     * @var string $dn
36
+     */
37
+    protected $dn;
38
+    /**
39
+     * @var string $uid the UID as provided by LDAP
40
+     */
41
+    protected $uid;
42
+    /**
43
+     * @var string $displayName
44
+     */
45
+    protected $displayName;
46
+    /**
47
+     * @var string $homePath
48
+     */
49
+    protected $homePath;
50
+    /**
51
+     * @var string $lastLogin the timestamp of the last login
52
+     */
53
+    protected $lastLogin;
54
+    /**
55
+     * @var string $email
56
+     */
57
+    protected $email;
58
+    /**
59
+     * @var bool $hasActiveShares
60
+     */
61
+    protected $hasActiveShares;
62
+    /**
63
+     * @var \OCP\IConfig $config
64
+     */
65
+    protected $config;
66
+    /**
67
+     * @var \OCP\IDBConnection $db
68
+     */
69
+    protected $db;
70
+    /**
71
+     * @var \OCA\User_LDAP\Mapping\UserMapping
72
+     */
73
+    protected $mapping;
74
+
75
+    /**
76
+     * @param string $ocName
77
+     * @param \OCP\IConfig $config
78
+     * @param \OCP\IDBConnection $db
79
+     * @param \OCA\User_LDAP\Mapping\UserMapping $mapping
80
+     */
81
+    public function __construct($ocName, \OCP\IConfig $config, \OCP\IDBConnection $db, UserMapping $mapping) {
82
+        $this->ocName = $ocName;
83
+        $this->config = $config;
84
+        $this->db = $db;
85
+        $this->mapping = $mapping;
86
+        $this->fetchDetails();
87
+    }
88
+
89
+    /**
90
+     * remove the Delete-flag from the user.
91
+     */
92
+    public function unmark() {
93
+        $this->config->setUserValue($this->ocName, 'user_ldap', 'isDeleted', '0');
94
+    }
95
+
96
+    /**
97
+     * exports the user details in an assoc array
98
+     * @return array
99
+     */
100
+    public function export() {
101
+        $data = array();
102
+        $data['ocName'] = $this->getOCName();
103
+        $data['dn'] = $this->getDN();
104
+        $data['uid'] = $this->getUID();
105
+        $data['displayName'] = $this->getDisplayName();
106
+        $data['homePath'] = $this->getHomePath();
107
+        $data['lastLogin'] = $this->getLastLogin();
108
+        $data['email'] = $this->getEmail();
109
+        $data['hasActiveShares'] = $this->getHasActiveShares();
110
+
111
+        return $data;
112
+    }
113
+
114
+    /**
115
+     * getter for ownCloud internal name
116
+     * @return string
117
+     */
118
+    public function getOCName() {
119
+        return $this->ocName;
120
+    }
121
+
122
+    /**
123
+     * getter for LDAP uid
124
+     * @return string
125
+     */
126
+    public function getUID() {
127
+        return $this->uid;
128
+    }
129
+
130
+    /**
131
+     * getter for LDAP DN
132
+     * @return string
133
+     */
134
+    public function getDN() {
135
+        return $this->dn;
136
+    }
137
+
138
+    /**
139
+     * getter for display name
140
+     * @return string
141
+     */
142
+    public function getDisplayName() {
143
+        return $this->displayName;
144
+    }
145
+
146
+    /**
147
+     * getter for email
148
+     * @return string
149
+     */
150
+    public function getEmail() {
151
+        return $this->email;
152
+    }
153
+
154
+    /**
155
+     * getter for home directory path
156
+     * @return string
157
+     */
158
+    public function getHomePath() {
159
+        return $this->homePath;
160
+    }
161
+
162
+    /**
163
+     * getter for the last login timestamp
164
+     * @return int
165
+     */
166
+    public function getLastLogin() {
167
+        return intval($this->lastLogin);
168
+    }
169
+
170
+    /**
171
+     * getter for having active shares
172
+     * @return bool
173
+     */
174
+    public function getHasActiveShares() {
175
+        return $this->hasActiveShares;
176
+    }
177
+
178
+    /**
179
+     * reads the user details
180
+     */
181
+    protected function fetchDetails() {
182
+        $properties = array (
183
+            'displayName' => 'user_ldap',
184
+            'uid'         => 'user_ldap',
185
+            'homePath'    => 'user_ldap',
186
+            'email'       => 'settings',
187
+            'lastLogin'   => 'login'
188
+        );
189
+        foreach($properties as $property => $app) {
190
+            $this->$property = $this->config->getUserValue($this->ocName, $app, $property, '');
191
+        }
192
+
193
+        $dn = $this->mapping->getDNByName($this->ocName);
194
+        $this->dn = ($dn !== false) ? $dn : '';
195
+
196
+        $this->determineShares();
197
+    }
198
+
199
+
200
+    /**
201
+     * finds out whether the user has active shares. The result is stored in
202
+     * $this->hasActiveShares
203
+     */
204
+    protected function determineShares() {
205
+        $query = $this->db->prepare('
206 206
 			SELECT COUNT(`uid_owner`)
207 207
 			FROM `*PREFIX*share`
208 208
 			WHERE `uid_owner` = ?
209 209
 		', 1);
210
-		$query->execute(array($this->ocName));
211
-		$sResult = $query->fetchColumn(0);
212
-		if(intval($sResult) === 1) {
213
-			$this->hasActiveShares = true;
214
-			return;
215
-		}
216
-
217
-		$query = $this->db->prepare('
210
+        $query->execute(array($this->ocName));
211
+        $sResult = $query->fetchColumn(0);
212
+        if(intval($sResult) === 1) {
213
+            $this->hasActiveShares = true;
214
+            return;
215
+        }
216
+
217
+        $query = $this->db->prepare('
218 218
 			SELECT COUNT(`owner`)
219 219
 			FROM `*PREFIX*share_external`
220 220
 			WHERE `owner` = ?
221 221
 		', 1);
222
-		$query->execute(array($this->ocName));
223
-		$sResult = $query->fetchColumn(0);
224
-		if(intval($sResult) === 1) {
225
-			$this->hasActiveShares = true;
226
-			return;
227
-		}
228
-
229
-		$this->hasActiveShares = false;
230
-	}
222
+        $query->execute(array($this->ocName));
223
+        $sResult = $query->fetchColumn(0);
224
+        if(intval($sResult) === 1) {
225
+            $this->hasActiveShares = true;
226
+            return;
227
+        }
228
+
229
+        $this->hasActiveShares = false;
230
+    }
231 231
 }
Please login to merge, or discard this patch.
Spacing   +4 added lines, -4 removed lines patch added patch discarded remove patch
@@ -179,14 +179,14 @@  discard block
 block discarded – undo
179 179
 	 * reads the user details
180 180
 	 */
181 181
 	protected function fetchDetails() {
182
-		$properties = array (
182
+		$properties = array(
183 183
 			'displayName' => 'user_ldap',
184 184
 			'uid'         => 'user_ldap',
185 185
 			'homePath'    => 'user_ldap',
186 186
 			'email'       => 'settings',
187 187
 			'lastLogin'   => 'login'
188 188
 		);
189
-		foreach($properties as $property => $app) {
189
+		foreach ($properties as $property => $app) {
190 190
 			$this->$property = $this->config->getUserValue($this->ocName, $app, $property, '');
191 191
 		}
192 192
 
@@ -209,7 +209,7 @@  discard block
 block discarded – undo
209 209
 		', 1);
210 210
 		$query->execute(array($this->ocName));
211 211
 		$sResult = $query->fetchColumn(0);
212
-		if(intval($sResult) === 1) {
212
+		if (intval($sResult) === 1) {
213 213
 			$this->hasActiveShares = true;
214 214
 			return;
215 215
 		}
@@ -221,7 +221,7 @@  discard block
 block discarded – undo
221 221
 		', 1);
222 222
 		$query->execute(array($this->ocName));
223 223
 		$sResult = $query->fetchColumn(0);
224
-		if(intval($sResult) === 1) {
224
+		if (intval($sResult) === 1) {
225 225
 			$this->hasActiveShares = true;
226 226
 			return;
227 227
 		}
Please login to merge, or discard this patch.
apps/user_ldap/lib/IUserLDAP.php 1 patch
Indentation   +19 added lines, -19 removed lines patch added patch discarded remove patch
@@ -24,26 +24,26 @@
 block discarded – undo
24 24
 
25 25
 interface IUserLDAP {
26 26
 
27
-	//Functions used by LDAPProvider
27
+    //Functions used by LDAPProvider
28 28
 	
29
-	/**
30
-	 * Return access for LDAP interaction.
31
-	 * @param string $uid
32
-	 * @return Access instance of Access for LDAP interaction
33
-	 */
34
-	public function getLDAPAccess($uid);
29
+    /**
30
+     * Return access for LDAP interaction.
31
+     * @param string $uid
32
+     * @return Access instance of Access for LDAP interaction
33
+     */
34
+    public function getLDAPAccess($uid);
35 35
 	
36
-	/**
37
-	 * Return a new LDAP connection for the specified user.
38
-	 * @param string $uid
39
-	 * @return resource of the LDAP connection
40
-	 */
41
-	public function getNewLDAPConnection($uid);
36
+    /**
37
+     * Return a new LDAP connection for the specified user.
38
+     * @param string $uid
39
+     * @return resource of the LDAP connection
40
+     */
41
+    public function getNewLDAPConnection($uid);
42 42
 
43
-	/**
44
-	 * Return the username for the given LDAP DN, if available.
45
-	 * @param string $dn
46
-	 * @return string|false with the username
47
-	 */
48
-	public function dn2UserName($dn);
43
+    /**
44
+     * Return the username for the given LDAP DN, if available.
45
+     * @param string $dn
46
+     * @return string|false with the username
47
+     */
48
+    public function dn2UserName($dn);
49 49
 }
Please login to merge, or discard this patch.
apps/user_ldap/lib/Controller/ConfigAPIController.php 2 patches
Indentation   +262 added lines, -262 removed lines patch added patch discarded remove patch
@@ -40,283 +40,283 @@
 block discarded – undo
40 40
 
41 41
 class ConfigAPIController extends OCSController {
42 42
 
43
-	/** @var Helper */
44
-	private $ldapHelper;
43
+    /** @var Helper */
44
+    private $ldapHelper;
45 45
 
46
-	/** @var ILogger */
47
-	private $logger;
46
+    /** @var ILogger */
47
+    private $logger;
48 48
 
49
-	public function __construct(
50
-		$appName,
51
-		IRequest $request,
52
-		CapabilitiesManager $capabilitiesManager,
53
-		IUserSession $userSession,
54
-		IUserManager $userManager,
55
-		Throttler $throttler,
56
-		Manager $keyManager,
57
-		Helper $ldapHelper,
58
-		ILogger $logger
59
-	) {
60
-		parent::__construct(
61
-			$appName,
62
-			$request,
63
-			$capabilitiesManager,
64
-			$userSession,
65
-			$userManager,
66
-			$throttler,
67
-			$keyManager
68
-		);
49
+    public function __construct(
50
+        $appName,
51
+        IRequest $request,
52
+        CapabilitiesManager $capabilitiesManager,
53
+        IUserSession $userSession,
54
+        IUserManager $userManager,
55
+        Throttler $throttler,
56
+        Manager $keyManager,
57
+        Helper $ldapHelper,
58
+        ILogger $logger
59
+    ) {
60
+        parent::__construct(
61
+            $appName,
62
+            $request,
63
+            $capabilitiesManager,
64
+            $userSession,
65
+            $userManager,
66
+            $throttler,
67
+            $keyManager
68
+        );
69 69
 
70 70
 
71
-		$this->ldapHelper = $ldapHelper;
72
-		$this->logger = $logger;
73
-	}
71
+        $this->ldapHelper = $ldapHelper;
72
+        $this->logger = $logger;
73
+    }
74 74
 
75
-	/**
76
-	 * creates a new (empty) configuration and returns the resulting prefix
77
-	 *
78
-	 * Example: curl -X POST -H "OCS-APIREQUEST: true"  -u $admin:$password \
79
-	 *   https://nextcloud.server/ocs/v2.php/apps/user_ldap/api/v1/config
80
-	 *
81
-	 * results in:
82
-	 *
83
-	 * <?xml version="1.0"?>
84
-	 * <ocs>
85
-	 *   <meta>
86
-	 *     <status>ok</status>
87
-	 *     <statuscode>200</statuscode>
88
-	 *     <message>OK</message>
89
-	 *   </meta>
90
-	 *   <data>
91
-	 *     <configID>s40</configID>
92
-	 *   </data>
93
-	 * </ocs>
94
-	 *
95
-	 * Failing example: if an exception is thrown (e.g. Database connection lost)
96
-	 * the detailed error will be logged. The output will then look like:
97
-	 *
98
-	 * <?xml version="1.0"?>
99
-	 * <ocs>
100
-	 *   <meta>
101
-	 *     <status>failure</status>
102
-	 *     <statuscode>999</statuscode>
103
-	 *     <message>An issue occurred when creating the new config.</message>
104
-	 *   </meta>
105
-	 *   <data/>
106
-	 * </ocs>
107
-	 *
108
-	 * For JSON output provide the format=json parameter
109
-	 *
110
-	 * @return DataResponse
111
-	 * @throws OCSException
112
-	 */
113
-	public function create() {
114
-		try {
115
-			$configPrefix = $this->ldapHelper->getNextServerConfigurationPrefix();
116
-			$configHolder = new Configuration($configPrefix);
117
-			$configHolder->saveConfiguration();
118
-		} catch (\Exception $e) {
119
-			$this->logger->logException($e);
120
-			throw new OCSException('An issue occurred when creating the new config.');
121
-		}
122
-		return new DataResponse(['configID' => $configPrefix]);
123
-	}
75
+    /**
76
+     * creates a new (empty) configuration and returns the resulting prefix
77
+     *
78
+     * Example: curl -X POST -H "OCS-APIREQUEST: true"  -u $admin:$password \
79
+     *   https://nextcloud.server/ocs/v2.php/apps/user_ldap/api/v1/config
80
+     *
81
+     * results in:
82
+     *
83
+     * <?xml version="1.0"?>
84
+     * <ocs>
85
+     *   <meta>
86
+     *     <status>ok</status>
87
+     *     <statuscode>200</statuscode>
88
+     *     <message>OK</message>
89
+     *   </meta>
90
+     *   <data>
91
+     *     <configID>s40</configID>
92
+     *   </data>
93
+     * </ocs>
94
+     *
95
+     * Failing example: if an exception is thrown (e.g. Database connection lost)
96
+     * the detailed error will be logged. The output will then look like:
97
+     *
98
+     * <?xml version="1.0"?>
99
+     * <ocs>
100
+     *   <meta>
101
+     *     <status>failure</status>
102
+     *     <statuscode>999</statuscode>
103
+     *     <message>An issue occurred when creating the new config.</message>
104
+     *   </meta>
105
+     *   <data/>
106
+     * </ocs>
107
+     *
108
+     * For JSON output provide the format=json parameter
109
+     *
110
+     * @return DataResponse
111
+     * @throws OCSException
112
+     */
113
+    public function create() {
114
+        try {
115
+            $configPrefix = $this->ldapHelper->getNextServerConfigurationPrefix();
116
+            $configHolder = new Configuration($configPrefix);
117
+            $configHolder->saveConfiguration();
118
+        } catch (\Exception $e) {
119
+            $this->logger->logException($e);
120
+            throw new OCSException('An issue occurred when creating the new config.');
121
+        }
122
+        return new DataResponse(['configID' => $configPrefix]);
123
+    }
124 124
 
125
-	/**
126
-	 * Deletes a LDAP configuration, if present.
127
-	 *
128
-	 * Example:
129
-	 *   curl -X DELETE -H "OCS-APIREQUEST: true" -u $admin:$password \
130
-	 *    https://nextcloud.server/ocs/v2.php/apps/user_ldap/api/v1/config/s60
131
-	 *
132
-	 * <?xml version="1.0"?>
133
-	 * <ocs>
134
-	 *   <meta>
135
-	 *     <status>ok</status>
136
-	 *     <statuscode>200</statuscode>
137
-	 *     <message>OK</message>
138
-	 *   </meta>
139
-	 *   <data/>
140
-	 * </ocs>
141
-	 *
142
-	 * @param string $configID
143
-	 * @return DataResponse
144
-	 * @throws OCSBadRequestException
145
-	 * @throws OCSException
146
-	 */
147
-	public function delete($configID) {
148
-		try {
149
-			$this->ensureConfigIDExists($configID);
150
-			if(!$this->ldapHelper->deleteServerConfiguration($configID)) {
151
-				throw new OCSException('Could not delete configuration');
152
-			}
153
-		} catch(OCSException $e) {
154
-			throw $e;
155
-		} catch(\Exception $e) {
156
-			$this->logger->logException($e);
157
-			throw new OCSException('An issue occurred when deleting the config.');
158
-		}
125
+    /**
126
+     * Deletes a LDAP configuration, if present.
127
+     *
128
+     * Example:
129
+     *   curl -X DELETE -H "OCS-APIREQUEST: true" -u $admin:$password \
130
+     *    https://nextcloud.server/ocs/v2.php/apps/user_ldap/api/v1/config/s60
131
+     *
132
+     * <?xml version="1.0"?>
133
+     * <ocs>
134
+     *   <meta>
135
+     *     <status>ok</status>
136
+     *     <statuscode>200</statuscode>
137
+     *     <message>OK</message>
138
+     *   </meta>
139
+     *   <data/>
140
+     * </ocs>
141
+     *
142
+     * @param string $configID
143
+     * @return DataResponse
144
+     * @throws OCSBadRequestException
145
+     * @throws OCSException
146
+     */
147
+    public function delete($configID) {
148
+        try {
149
+            $this->ensureConfigIDExists($configID);
150
+            if(!$this->ldapHelper->deleteServerConfiguration($configID)) {
151
+                throw new OCSException('Could not delete configuration');
152
+            }
153
+        } catch(OCSException $e) {
154
+            throw $e;
155
+        } catch(\Exception $e) {
156
+            $this->logger->logException($e);
157
+            throw new OCSException('An issue occurred when deleting the config.');
158
+        }
159 159
 
160
-		return new DataResponse();
161
-	}
160
+        return new DataResponse();
161
+    }
162 162
 
163
-	/**
164
-	 * modifies a configuration
165
-	 *
166
-	 * Example:
167
-	 *   curl -X PUT -d "configData[ldapHost]=ldaps://my.ldap.server&configData[ldapPort]=636" \
168
-	 *    -H "OCS-APIREQUEST: true" -u $admin:$password \
169
-	 *    https://nextcloud.server/ocs/v2.php/apps/user_ldap/api/v1/config/s60
170
-	 *
171
-	 * <?xml version="1.0"?>
172
-	 * <ocs>
173
-	 *   <meta>
174
-	 *     <status>ok</status>
175
-	 *     <statuscode>200</statuscode>
176
-	 *     <message>OK</message>
177
-	 *   </meta>
178
-	 *   <data/>
179
-	 * </ocs>
180
-	 *
181
-	 * @param string $configID
182
-	 * @param array $configData
183
-	 * @return DataResponse
184
-	 * @throws OCSException
185
-	 */
186
-	public function modify($configID, $configData) {
187
-		try {
188
-			$this->ensureConfigIDExists($configID);
163
+    /**
164
+     * modifies a configuration
165
+     *
166
+     * Example:
167
+     *   curl -X PUT -d "configData[ldapHost]=ldaps://my.ldap.server&configData[ldapPort]=636" \
168
+     *    -H "OCS-APIREQUEST: true" -u $admin:$password \
169
+     *    https://nextcloud.server/ocs/v2.php/apps/user_ldap/api/v1/config/s60
170
+     *
171
+     * <?xml version="1.0"?>
172
+     * <ocs>
173
+     *   <meta>
174
+     *     <status>ok</status>
175
+     *     <statuscode>200</statuscode>
176
+     *     <message>OK</message>
177
+     *   </meta>
178
+     *   <data/>
179
+     * </ocs>
180
+     *
181
+     * @param string $configID
182
+     * @param array $configData
183
+     * @return DataResponse
184
+     * @throws OCSException
185
+     */
186
+    public function modify($configID, $configData) {
187
+        try {
188
+            $this->ensureConfigIDExists($configID);
189 189
 
190
-			if(!is_array($configData)) {
191
-				throw new OCSBadRequestException('configData is not properly set');
192
-			}
190
+            if(!is_array($configData)) {
191
+                throw new OCSBadRequestException('configData is not properly set');
192
+            }
193 193
 
194
-			$configuration = new Configuration($configID);
195
-			$configKeys = $configuration->getConfigTranslationArray();
194
+            $configuration = new Configuration($configID);
195
+            $configKeys = $configuration->getConfigTranslationArray();
196 196
 
197
-			foreach ($configKeys as $i => $key) {
198
-				if(isset($configData[$key])) {
199
-					$configuration->$key = $configData[$key];
200
-				}
201
-			}
197
+            foreach ($configKeys as $i => $key) {
198
+                if(isset($configData[$key])) {
199
+                    $configuration->$key = $configData[$key];
200
+                }
201
+            }
202 202
 
203
-			$configuration->saveConfiguration();
204
-		} catch(OCSException $e) {
205
-			throw $e;
206
-		} catch (\Exception $e) {
207
-			$this->logger->logException($e);
208
-			throw new OCSException('An issue occurred when modifying the config.');
209
-		}
203
+            $configuration->saveConfiguration();
204
+        } catch(OCSException $e) {
205
+            throw $e;
206
+        } catch (\Exception $e) {
207
+            $this->logger->logException($e);
208
+            throw new OCSException('An issue occurred when modifying the config.');
209
+        }
210 210
 
211
-		return new DataResponse();
212
-	}
211
+        return new DataResponse();
212
+    }
213 213
 
214
-	/**
215
-	 * retrieves a configuration
216
-	 *
217
-	 * <?xml version="1.0"?>
218
-	 * <ocs>
219
-	 *   <meta>
220
-	 *     <status>ok</status>
221
-	 *     <statuscode>200</statuscode>
222
-	 *     <message>OK</message>
223
-	 *   </meta>
224
-	 *   <data>
225
-	 *     <ldapHost>ldaps://my.ldap.server</ldapHost>
226
-	 *     <ldapPort>7770</ldapPort>
227
-	 *     <ldapBackupHost></ldapBackupHost>
228
-	 *     <ldapBackupPort></ldapBackupPort>
229
-	 *     <ldapBase>ou=small,dc=my,dc=ldap,dc=server</ldapBase>
230
-	 *     <ldapBaseUsers>ou=users,ou=small,dc=my,dc=ldap,dc=server</ldapBaseUsers>
231
-	 *     <ldapBaseGroups>ou=small,dc=my,dc=ldap,dc=server</ldapBaseGroups>
232
-	 *     <ldapAgentName>cn=root,dc=my,dc=ldap,dc=server</ldapAgentName>
233
-	 *     <ldapAgentPassword>clearTextWithShowPassword=1</ldapAgentPassword>
234
-	 *     <ldapTLS>1</ldapTLS>
235
-	 *     <turnOffCertCheck>0</turnOffCertCheck>
236
-	 *     <ldapIgnoreNamingRules/>
237
-	 *     <ldapUserDisplayName>displayname</ldapUserDisplayName>
238
-	 *     <ldapUserDisplayName2>uid</ldapUserDisplayName2>
239
-	 *     <ldapUserFilterObjectclass>inetOrgPerson</ldapUserFilterObjectclass>
240
-	 *     <ldapUserFilterGroups></ldapUserFilterGroups>
241
-	 *     <ldapUserFilter>(&amp;(objectclass=nextcloudUser)(nextcloudEnabled=TRUE))</ldapUserFilter>
242
-	 *     <ldapUserFilterMode>1</ldapUserFilterMode>
243
-	 *     <ldapGroupFilter>(&amp;(|(objectclass=nextcloudGroup)))</ldapGroupFilter>
244
-	 *     <ldapGroupFilterMode>0</ldapGroupFilterMode>
245
-	 *     <ldapGroupFilterObjectclass>nextcloudGroup</ldapGroupFilterObjectclass>
246
-	 *     <ldapGroupFilterGroups></ldapGroupFilterGroups>
247
-	 *     <ldapGroupDisplayName>cn</ldapGroupDisplayName>
248
-	 *     <ldapGroupMemberAssocAttr>memberUid</ldapGroupMemberAssocAttr>
249
-	 *     <ldapLoginFilter>(&amp;(|(objectclass=inetOrgPerson))(uid=%uid))</ldapLoginFilter>
250
-	 *     <ldapLoginFilterMode>0</ldapLoginFilterMode>
251
-	 *     <ldapLoginFilterEmail>0</ldapLoginFilterEmail>
252
-	 *     <ldapLoginFilterUsername>1</ldapLoginFilterUsername>
253
-	 *     <ldapLoginFilterAttributes></ldapLoginFilterAttributes>
254
-	 *     <ldapQuotaAttribute></ldapQuotaAttribute>
255
-	 *     <ldapQuotaDefault></ldapQuotaDefault>
256
-	 *     <ldapEmailAttribute>mail</ldapEmailAttribute>
257
-	 *     <ldapCacheTTL>20</ldapCacheTTL>
258
-	 *     <ldapUuidUserAttribute>auto</ldapUuidUserAttribute>
259
-	 *     <ldapUuidGroupAttribute>auto</ldapUuidGroupAttribute>
260
-	 *     <ldapOverrideMainServer></ldapOverrideMainServer>
261
-	 *     <ldapConfigurationActive>1</ldapConfigurationActive>
262
-	 *     <ldapAttributesForUserSearch>uid;sn;givenname</ldapAttributesForUserSearch>
263
-	 *     <ldapAttributesForGroupSearch></ldapAttributesForGroupSearch>
264
-	 *     <ldapExperiencedAdmin>0</ldapExperiencedAdmin>
265
-	 *     <homeFolderNamingRule></homeFolderNamingRule>
266
-	 *     <hasPagedResultSupport></hasPagedResultSupport>
267
-	 *     <hasMemberOfFilterSupport></hasMemberOfFilterSupport>
268
-	 *     <useMemberOfToDetectMembership>1</useMemberOfToDetectMembership>
269
-	 *     <ldapExpertUsernameAttr>uid</ldapExpertUsernameAttr>
270
-	 *     <ldapExpertUUIDUserAttr>uid</ldapExpertUUIDUserAttr>
271
-	 *     <ldapExpertUUIDGroupAttr></ldapExpertUUIDGroupAttr>
272
-	 *     <lastJpegPhotoLookup>0</lastJpegPhotoLookup>
273
-	 *     <ldapNestedGroups>0</ldapNestedGroups>
274
-	 *     <ldapPagingSize>500</ldapPagingSize>
275
-	 *     <turnOnPasswordChange>1</turnOnPasswordChange>
276
-	 *     <ldapDynamicGroupMemberURL></ldapDynamicGroupMemberURL>
277
-	 *   </data>
278
-	 * </ocs>
279
-	 *
280
-	 * @param string $configID
281
-	 * @param bool|string $showPassword
282
-	 * @return DataResponse
283
-	 * @throws OCSException
284
-	 */
285
-	public function show($configID, $showPassword = false) {
286
-		try {
287
-			$this->ensureConfigIDExists($configID);
214
+    /**
215
+     * retrieves a configuration
216
+     *
217
+     * <?xml version="1.0"?>
218
+     * <ocs>
219
+     *   <meta>
220
+     *     <status>ok</status>
221
+     *     <statuscode>200</statuscode>
222
+     *     <message>OK</message>
223
+     *   </meta>
224
+     *   <data>
225
+     *     <ldapHost>ldaps://my.ldap.server</ldapHost>
226
+     *     <ldapPort>7770</ldapPort>
227
+     *     <ldapBackupHost></ldapBackupHost>
228
+     *     <ldapBackupPort></ldapBackupPort>
229
+     *     <ldapBase>ou=small,dc=my,dc=ldap,dc=server</ldapBase>
230
+     *     <ldapBaseUsers>ou=users,ou=small,dc=my,dc=ldap,dc=server</ldapBaseUsers>
231
+     *     <ldapBaseGroups>ou=small,dc=my,dc=ldap,dc=server</ldapBaseGroups>
232
+     *     <ldapAgentName>cn=root,dc=my,dc=ldap,dc=server</ldapAgentName>
233
+     *     <ldapAgentPassword>clearTextWithShowPassword=1</ldapAgentPassword>
234
+     *     <ldapTLS>1</ldapTLS>
235
+     *     <turnOffCertCheck>0</turnOffCertCheck>
236
+     *     <ldapIgnoreNamingRules/>
237
+     *     <ldapUserDisplayName>displayname</ldapUserDisplayName>
238
+     *     <ldapUserDisplayName2>uid</ldapUserDisplayName2>
239
+     *     <ldapUserFilterObjectclass>inetOrgPerson</ldapUserFilterObjectclass>
240
+     *     <ldapUserFilterGroups></ldapUserFilterGroups>
241
+     *     <ldapUserFilter>(&amp;(objectclass=nextcloudUser)(nextcloudEnabled=TRUE))</ldapUserFilter>
242
+     *     <ldapUserFilterMode>1</ldapUserFilterMode>
243
+     *     <ldapGroupFilter>(&amp;(|(objectclass=nextcloudGroup)))</ldapGroupFilter>
244
+     *     <ldapGroupFilterMode>0</ldapGroupFilterMode>
245
+     *     <ldapGroupFilterObjectclass>nextcloudGroup</ldapGroupFilterObjectclass>
246
+     *     <ldapGroupFilterGroups></ldapGroupFilterGroups>
247
+     *     <ldapGroupDisplayName>cn</ldapGroupDisplayName>
248
+     *     <ldapGroupMemberAssocAttr>memberUid</ldapGroupMemberAssocAttr>
249
+     *     <ldapLoginFilter>(&amp;(|(objectclass=inetOrgPerson))(uid=%uid))</ldapLoginFilter>
250
+     *     <ldapLoginFilterMode>0</ldapLoginFilterMode>
251
+     *     <ldapLoginFilterEmail>0</ldapLoginFilterEmail>
252
+     *     <ldapLoginFilterUsername>1</ldapLoginFilterUsername>
253
+     *     <ldapLoginFilterAttributes></ldapLoginFilterAttributes>
254
+     *     <ldapQuotaAttribute></ldapQuotaAttribute>
255
+     *     <ldapQuotaDefault></ldapQuotaDefault>
256
+     *     <ldapEmailAttribute>mail</ldapEmailAttribute>
257
+     *     <ldapCacheTTL>20</ldapCacheTTL>
258
+     *     <ldapUuidUserAttribute>auto</ldapUuidUserAttribute>
259
+     *     <ldapUuidGroupAttribute>auto</ldapUuidGroupAttribute>
260
+     *     <ldapOverrideMainServer></ldapOverrideMainServer>
261
+     *     <ldapConfigurationActive>1</ldapConfigurationActive>
262
+     *     <ldapAttributesForUserSearch>uid;sn;givenname</ldapAttributesForUserSearch>
263
+     *     <ldapAttributesForGroupSearch></ldapAttributesForGroupSearch>
264
+     *     <ldapExperiencedAdmin>0</ldapExperiencedAdmin>
265
+     *     <homeFolderNamingRule></homeFolderNamingRule>
266
+     *     <hasPagedResultSupport></hasPagedResultSupport>
267
+     *     <hasMemberOfFilterSupport></hasMemberOfFilterSupport>
268
+     *     <useMemberOfToDetectMembership>1</useMemberOfToDetectMembership>
269
+     *     <ldapExpertUsernameAttr>uid</ldapExpertUsernameAttr>
270
+     *     <ldapExpertUUIDUserAttr>uid</ldapExpertUUIDUserAttr>
271
+     *     <ldapExpertUUIDGroupAttr></ldapExpertUUIDGroupAttr>
272
+     *     <lastJpegPhotoLookup>0</lastJpegPhotoLookup>
273
+     *     <ldapNestedGroups>0</ldapNestedGroups>
274
+     *     <ldapPagingSize>500</ldapPagingSize>
275
+     *     <turnOnPasswordChange>1</turnOnPasswordChange>
276
+     *     <ldapDynamicGroupMemberURL></ldapDynamicGroupMemberURL>
277
+     *   </data>
278
+     * </ocs>
279
+     *
280
+     * @param string $configID
281
+     * @param bool|string $showPassword
282
+     * @return DataResponse
283
+     * @throws OCSException
284
+     */
285
+    public function show($configID, $showPassword = false) {
286
+        try {
287
+            $this->ensureConfigIDExists($configID);
288 288
 
289
-			$config = new Configuration($configID);
290
-			$data = $config->getConfiguration();
291
-			if(!boolval(intval($showPassword))) {
292
-				$data['ldapAgentPassword'] = '***';
293
-			}
294
-			foreach ($data as $key => $value) {
295
-				if(is_array($value)) {
296
-					$value = implode(';', $value);
297
-					$data[$key] = $value;
298
-				}
299
-			}
300
-		} catch(OCSException $e) {
301
-			throw $e;
302
-		} catch (\Exception $e) {
303
-			$this->logger->logException($e);
304
-			throw new OCSException('An issue occurred when modifying the config.');
305
-		}
289
+            $config = new Configuration($configID);
290
+            $data = $config->getConfiguration();
291
+            if(!boolval(intval($showPassword))) {
292
+                $data['ldapAgentPassword'] = '***';
293
+            }
294
+            foreach ($data as $key => $value) {
295
+                if(is_array($value)) {
296
+                    $value = implode(';', $value);
297
+                    $data[$key] = $value;
298
+                }
299
+            }
300
+        } catch(OCSException $e) {
301
+            throw $e;
302
+        } catch (\Exception $e) {
303
+            $this->logger->logException($e);
304
+            throw new OCSException('An issue occurred when modifying the config.');
305
+        }
306 306
 
307
-		return new DataResponse($data);
308
-	}
307
+        return new DataResponse($data);
308
+    }
309 309
 
310
-	/**
311
-	 * if the given config ID is not available, an exception is thrown
312
-	 *
313
-	 * @param string $configID
314
-	 * @throws OCSNotFoundException
315
-	 */
316
-	private function ensureConfigIDExists($configID) {
317
-		$prefixes = $this->ldapHelper->getServerConfigurationPrefixes();
318
-		if(!in_array($configID, $prefixes, true)) {
319
-			throw new OCSNotFoundException('Config ID not found');
320
-		}
321
-	}
310
+    /**
311
+     * if the given config ID is not available, an exception is thrown
312
+     *
313
+     * @param string $configID
314
+     * @throws OCSNotFoundException
315
+     */
316
+    private function ensureConfigIDExists($configID) {
317
+        $prefixes = $this->ldapHelper->getServerConfigurationPrefixes();
318
+        if(!in_array($configID, $prefixes, true)) {
319
+            throw new OCSNotFoundException('Config ID not found');
320
+        }
321
+    }
322 322
 }
Please login to merge, or discard this patch.
Spacing   +10 added lines, -10 removed lines patch added patch discarded remove patch
@@ -147,12 +147,12 @@  discard block
 block discarded – undo
147 147
 	public function delete($configID) {
148 148
 		try {
149 149
 			$this->ensureConfigIDExists($configID);
150
-			if(!$this->ldapHelper->deleteServerConfiguration($configID)) {
150
+			if (!$this->ldapHelper->deleteServerConfiguration($configID)) {
151 151
 				throw new OCSException('Could not delete configuration');
152 152
 			}
153
-		} catch(OCSException $e) {
153
+		} catch (OCSException $e) {
154 154
 			throw $e;
155
-		} catch(\Exception $e) {
155
+		} catch (\Exception $e) {
156 156
 			$this->logger->logException($e);
157 157
 			throw new OCSException('An issue occurred when deleting the config.');
158 158
 		}
@@ -187,7 +187,7 @@  discard block
 block discarded – undo
187 187
 		try {
188 188
 			$this->ensureConfigIDExists($configID);
189 189
 
190
-			if(!is_array($configData)) {
190
+			if (!is_array($configData)) {
191 191
 				throw new OCSBadRequestException('configData is not properly set');
192 192
 			}
193 193
 
@@ -195,13 +195,13 @@  discard block
 block discarded – undo
195 195
 			$configKeys = $configuration->getConfigTranslationArray();
196 196
 
197 197
 			foreach ($configKeys as $i => $key) {
198
-				if(isset($configData[$key])) {
198
+				if (isset($configData[$key])) {
199 199
 					$configuration->$key = $configData[$key];
200 200
 				}
201 201
 			}
202 202
 
203 203
 			$configuration->saveConfiguration();
204
-		} catch(OCSException $e) {
204
+		} catch (OCSException $e) {
205 205
 			throw $e;
206 206
 		} catch (\Exception $e) {
207 207
 			$this->logger->logException($e);
@@ -288,16 +288,16 @@  discard block
 block discarded – undo
288 288
 
289 289
 			$config = new Configuration($configID);
290 290
 			$data = $config->getConfiguration();
291
-			if(!boolval(intval($showPassword))) {
291
+			if (!boolval(intval($showPassword))) {
292 292
 				$data['ldapAgentPassword'] = '***';
293 293
 			}
294 294
 			foreach ($data as $key => $value) {
295
-				if(is_array($value)) {
295
+				if (is_array($value)) {
296 296
 					$value = implode(';', $value);
297 297
 					$data[$key] = $value;
298 298
 				}
299 299
 			}
300
-		} catch(OCSException $e) {
300
+		} catch (OCSException $e) {
301 301
 			throw $e;
302 302
 		} catch (\Exception $e) {
303 303
 			$this->logger->logException($e);
@@ -315,7 +315,7 @@  discard block
 block discarded – undo
315 315
 	 */
316 316
 	private function ensureConfigIDExists($configID) {
317 317
 		$prefixes = $this->ldapHelper->getServerConfigurationPrefixes();
318
-		if(!in_array($configID, $prefixes, true)) {
318
+		if (!in_array($configID, $prefixes, true)) {
319 319
 			throw new OCSNotFoundException('Config ID not found');
320 320
 		}
321 321
 	}
Please login to merge, or discard this patch.
apps/user_ldap/lib/Jobs/CleanUp.php 2 patches
Indentation   +189 added lines, -189 removed lines patch added patch discarded remove patch
@@ -40,194 +40,194 @@
 block discarded – undo
40 40
  * @package OCA\User_LDAP\Jobs;
41 41
  */
42 42
 class CleanUp extends TimedJob {
43
-	/** @var int $limit amount of users that should be checked per run */
44
-	protected $limit = 50;
45
-
46
-	/** @var int $defaultIntervalMin default interval in minutes */
47
-	protected $defaultIntervalMin = 51;
48
-
49
-	/** @var User_LDAP|User_Proxy $userBackend */
50
-	protected $userBackend;
51
-
52
-	/** @var \OCP\IConfig $ocConfig */
53
-	protected $ocConfig;
54
-
55
-	/** @var \OCP\IDBConnection $db */
56
-	protected $db;
57
-
58
-	/** @var Helper $ldapHelper */
59
-	protected $ldapHelper;
60
-
61
-	/** @var \OCA\User_LDAP\Mapping\UserMapping */
62
-	protected $mapping;
63
-
64
-	/** @var \OCA\User_LDAP\User\DeletedUsersIndex */
65
-	protected $dui;
66
-
67
-	public function __construct() {
68
-		$minutes = \OC::$server->getConfig()->getSystemValue(
69
-			'ldapUserCleanupInterval', strval($this->defaultIntervalMin));
70
-		$this->setInterval(intval($minutes) * 60);
71
-	}
72
-
73
-	/**
74
-	 * assigns the instances passed to run() to the class properties
75
-	 * @param array $arguments
76
-	 */
77
-	public function setArguments($arguments) {
78
-		//Dependency Injection is not possible, because the constructor will
79
-		//only get values that are serialized to JSON. I.e. whatever we would
80
-		//pass in app.php we do add here, except something else is passed e.g.
81
-		//in tests.
82
-
83
-		if(isset($arguments['helper'])) {
84
-			$this->ldapHelper = $arguments['helper'];
85
-		} else {
86
-			$this->ldapHelper = new Helper(\OC::$server->getConfig());
87
-		}
88
-
89
-		if(isset($arguments['ocConfig'])) {
90
-			$this->ocConfig = $arguments['ocConfig'];
91
-		} else {
92
-			$this->ocConfig = \OC::$server->getConfig();
93
-		}
94
-
95
-		if(isset($arguments['userBackend'])) {
96
-			$this->userBackend = $arguments['userBackend'];
97
-		} else {
98
-			$this->userBackend =  new User_Proxy(
99
-				$this->ldapHelper->getServerConfigurationPrefixes(true),
100
-				new LDAP(),
101
-				$this->ocConfig
102
-			);
103
-		}
104
-
105
-		if(isset($arguments['db'])) {
106
-			$this->db = $arguments['db'];
107
-		} else {
108
-			$this->db = \OC::$server->getDatabaseConnection();
109
-		}
110
-
111
-		if(isset($arguments['mapping'])) {
112
-			$this->mapping = $arguments['mapping'];
113
-		} else {
114
-			$this->mapping = new UserMapping($this->db);
115
-		}
116
-
117
-		if(isset($arguments['deletedUsersIndex'])) {
118
-			$this->dui = $arguments['deletedUsersIndex'];
119
-		} else {
120
-			$this->dui = new DeletedUsersIndex(
121
-				$this->ocConfig, $this->db, $this->mapping);
122
-		}
123
-	}
124
-
125
-	/**
126
-	 * makes the background job do its work
127
-	 * @param array $argument
128
-	 */
129
-	public function run($argument) {
130
-		$this->setArguments($argument);
131
-
132
-		if(!$this->isCleanUpAllowed()) {
133
-			return;
134
-		}
135
-		$users = $this->mapping->getList($this->getOffset(), $this->limit);
136
-		if(!is_array($users)) {
137
-			//something wrong? Let's start from the beginning next time and
138
-			//abort
139
-			$this->setOffset(true);
140
-			return;
141
-		}
142
-		$resetOffset = $this->isOffsetResetNecessary(count($users));
143
-		$this->checkUsers($users);
144
-		$this->setOffset($resetOffset);
145
-	}
146
-
147
-	/**
148
-	 * checks whether next run should start at 0 again
149
-	 * @param int $resultCount
150
-	 * @return bool
151
-	 */
152
-	public function isOffsetResetNecessary($resultCount) {
153
-		return ($resultCount < $this->limit) ? true : false;
154
-	}
155
-
156
-	/**
157
-	 * checks whether cleaning up LDAP users is allowed
158
-	 * @return bool
159
-	 */
160
-	public function isCleanUpAllowed() {
161
-		try {
162
-			if($this->ldapHelper->haveDisabledConfigurations()) {
163
-				return false;
164
-			}
165
-		} catch (\Exception $e) {
166
-			return false;
167
-		}
168
-
169
-		$enabled = $this->isCleanUpEnabled();
170
-
171
-		return $enabled;
172
-	}
173
-
174
-	/**
175
-	 * checks whether clean up is enabled by configuration
176
-	 * @return bool
177
-	 */
178
-	private function isCleanUpEnabled() {
179
-		return (bool)$this->ocConfig->getSystemValue(
180
-			'ldapUserCleanupInterval', strval($this->defaultIntervalMin));
181
-	}
182
-
183
-	/**
184
-	 * checks users whether they are still existing
185
-	 * @param array $users result from getMappedUsers()
186
-	 */
187
-	private function checkUsers(array $users) {
188
-		foreach($users as $user) {
189
-			$this->checkUser($user);
190
-		}
191
-	}
192
-
193
-	/**
194
-	 * checks whether a user is still existing in LDAP
195
-	 * @param string[] $user
196
-	 */
197
-	private function checkUser(array $user) {
198
-		if($this->userBackend->userExistsOnLDAP($user['name'])) {
199
-			//still available, all good
200
-
201
-			return;
202
-		}
203
-
204
-		$this->dui->markUser($user['name']);
205
-	}
206
-
207
-	/**
208
-	 * gets the offset to fetch users from the mappings table
209
-	 * @return int
210
-	 */
211
-	private function getOffset() {
212
-		return intval($this->ocConfig->getAppValue('user_ldap', 'cleanUpJobOffset', 0));
213
-	}
214
-
215
-	/**
216
-	 * sets the new offset for the next run
217
-	 * @param bool $reset whether the offset should be set to 0
218
-	 */
219
-	public function setOffset($reset = false) {
220
-		$newOffset = $reset ? 0 :
221
-			$this->getOffset() + $this->limit;
222
-		$this->ocConfig->setAppValue('user_ldap', 'cleanUpJobOffset', $newOffset);
223
-	}
224
-
225
-	/**
226
-	 * returns the chunk size (limit in DB speak)
227
-	 * @return int
228
-	 */
229
-	public function getChunkSize() {
230
-		return $this->limit;
231
-	}
43
+    /** @var int $limit amount of users that should be checked per run */
44
+    protected $limit = 50;
45
+
46
+    /** @var int $defaultIntervalMin default interval in minutes */
47
+    protected $defaultIntervalMin = 51;
48
+
49
+    /** @var User_LDAP|User_Proxy $userBackend */
50
+    protected $userBackend;
51
+
52
+    /** @var \OCP\IConfig $ocConfig */
53
+    protected $ocConfig;
54
+
55
+    /** @var \OCP\IDBConnection $db */
56
+    protected $db;
57
+
58
+    /** @var Helper $ldapHelper */
59
+    protected $ldapHelper;
60
+
61
+    /** @var \OCA\User_LDAP\Mapping\UserMapping */
62
+    protected $mapping;
63
+
64
+    /** @var \OCA\User_LDAP\User\DeletedUsersIndex */
65
+    protected $dui;
66
+
67
+    public function __construct() {
68
+        $minutes = \OC::$server->getConfig()->getSystemValue(
69
+            'ldapUserCleanupInterval', strval($this->defaultIntervalMin));
70
+        $this->setInterval(intval($minutes) * 60);
71
+    }
72
+
73
+    /**
74
+     * assigns the instances passed to run() to the class properties
75
+     * @param array $arguments
76
+     */
77
+    public function setArguments($arguments) {
78
+        //Dependency Injection is not possible, because the constructor will
79
+        //only get values that are serialized to JSON. I.e. whatever we would
80
+        //pass in app.php we do add here, except something else is passed e.g.
81
+        //in tests.
82
+
83
+        if(isset($arguments['helper'])) {
84
+            $this->ldapHelper = $arguments['helper'];
85
+        } else {
86
+            $this->ldapHelper = new Helper(\OC::$server->getConfig());
87
+        }
88
+
89
+        if(isset($arguments['ocConfig'])) {
90
+            $this->ocConfig = $arguments['ocConfig'];
91
+        } else {
92
+            $this->ocConfig = \OC::$server->getConfig();
93
+        }
94
+
95
+        if(isset($arguments['userBackend'])) {
96
+            $this->userBackend = $arguments['userBackend'];
97
+        } else {
98
+            $this->userBackend =  new User_Proxy(
99
+                $this->ldapHelper->getServerConfigurationPrefixes(true),
100
+                new LDAP(),
101
+                $this->ocConfig
102
+            );
103
+        }
104
+
105
+        if(isset($arguments['db'])) {
106
+            $this->db = $arguments['db'];
107
+        } else {
108
+            $this->db = \OC::$server->getDatabaseConnection();
109
+        }
110
+
111
+        if(isset($arguments['mapping'])) {
112
+            $this->mapping = $arguments['mapping'];
113
+        } else {
114
+            $this->mapping = new UserMapping($this->db);
115
+        }
116
+
117
+        if(isset($arguments['deletedUsersIndex'])) {
118
+            $this->dui = $arguments['deletedUsersIndex'];
119
+        } else {
120
+            $this->dui = new DeletedUsersIndex(
121
+                $this->ocConfig, $this->db, $this->mapping);
122
+        }
123
+    }
124
+
125
+    /**
126
+     * makes the background job do its work
127
+     * @param array $argument
128
+     */
129
+    public function run($argument) {
130
+        $this->setArguments($argument);
131
+
132
+        if(!$this->isCleanUpAllowed()) {
133
+            return;
134
+        }
135
+        $users = $this->mapping->getList($this->getOffset(), $this->limit);
136
+        if(!is_array($users)) {
137
+            //something wrong? Let's start from the beginning next time and
138
+            //abort
139
+            $this->setOffset(true);
140
+            return;
141
+        }
142
+        $resetOffset = $this->isOffsetResetNecessary(count($users));
143
+        $this->checkUsers($users);
144
+        $this->setOffset($resetOffset);
145
+    }
146
+
147
+    /**
148
+     * checks whether next run should start at 0 again
149
+     * @param int $resultCount
150
+     * @return bool
151
+     */
152
+    public function isOffsetResetNecessary($resultCount) {
153
+        return ($resultCount < $this->limit) ? true : false;
154
+    }
155
+
156
+    /**
157
+     * checks whether cleaning up LDAP users is allowed
158
+     * @return bool
159
+     */
160
+    public function isCleanUpAllowed() {
161
+        try {
162
+            if($this->ldapHelper->haveDisabledConfigurations()) {
163
+                return false;
164
+            }
165
+        } catch (\Exception $e) {
166
+            return false;
167
+        }
168
+
169
+        $enabled = $this->isCleanUpEnabled();
170
+
171
+        return $enabled;
172
+    }
173
+
174
+    /**
175
+     * checks whether clean up is enabled by configuration
176
+     * @return bool
177
+     */
178
+    private function isCleanUpEnabled() {
179
+        return (bool)$this->ocConfig->getSystemValue(
180
+            'ldapUserCleanupInterval', strval($this->defaultIntervalMin));
181
+    }
182
+
183
+    /**
184
+     * checks users whether they are still existing
185
+     * @param array $users result from getMappedUsers()
186
+     */
187
+    private function checkUsers(array $users) {
188
+        foreach($users as $user) {
189
+            $this->checkUser($user);
190
+        }
191
+    }
192
+
193
+    /**
194
+     * checks whether a user is still existing in LDAP
195
+     * @param string[] $user
196
+     */
197
+    private function checkUser(array $user) {
198
+        if($this->userBackend->userExistsOnLDAP($user['name'])) {
199
+            //still available, all good
200
+
201
+            return;
202
+        }
203
+
204
+        $this->dui->markUser($user['name']);
205
+    }
206
+
207
+    /**
208
+     * gets the offset to fetch users from the mappings table
209
+     * @return int
210
+     */
211
+    private function getOffset() {
212
+        return intval($this->ocConfig->getAppValue('user_ldap', 'cleanUpJobOffset', 0));
213
+    }
214
+
215
+    /**
216
+     * sets the new offset for the next run
217
+     * @param bool $reset whether the offset should be set to 0
218
+     */
219
+    public function setOffset($reset = false) {
220
+        $newOffset = $reset ? 0 :
221
+            $this->getOffset() + $this->limit;
222
+        $this->ocConfig->setAppValue('user_ldap', 'cleanUpJobOffset', $newOffset);
223
+    }
224
+
225
+    /**
226
+     * returns the chunk size (limit in DB speak)
227
+     * @return int
228
+     */
229
+    public function getChunkSize() {
230
+        return $this->limit;
231
+    }
232 232
 
233 233
 }
Please login to merge, or discard this patch.
Spacing   +14 added lines, -15 removed lines patch added patch discarded remove patch
@@ -80,41 +80,41 @@  discard block
 block discarded – undo
80 80
 		//pass in app.php we do add here, except something else is passed e.g.
81 81
 		//in tests.
82 82
 
83
-		if(isset($arguments['helper'])) {
83
+		if (isset($arguments['helper'])) {
84 84
 			$this->ldapHelper = $arguments['helper'];
85 85
 		} else {
86 86
 			$this->ldapHelper = new Helper(\OC::$server->getConfig());
87 87
 		}
88 88
 
89
-		if(isset($arguments['ocConfig'])) {
89
+		if (isset($arguments['ocConfig'])) {
90 90
 			$this->ocConfig = $arguments['ocConfig'];
91 91
 		} else {
92 92
 			$this->ocConfig = \OC::$server->getConfig();
93 93
 		}
94 94
 
95
-		if(isset($arguments['userBackend'])) {
95
+		if (isset($arguments['userBackend'])) {
96 96
 			$this->userBackend = $arguments['userBackend'];
97 97
 		} else {
98
-			$this->userBackend =  new User_Proxy(
98
+			$this->userBackend = new User_Proxy(
99 99
 				$this->ldapHelper->getServerConfigurationPrefixes(true),
100 100
 				new LDAP(),
101 101
 				$this->ocConfig
102 102
 			);
103 103
 		}
104 104
 
105
-		if(isset($arguments['db'])) {
105
+		if (isset($arguments['db'])) {
106 106
 			$this->db = $arguments['db'];
107 107
 		} else {
108 108
 			$this->db = \OC::$server->getDatabaseConnection();
109 109
 		}
110 110
 
111
-		if(isset($arguments['mapping'])) {
111
+		if (isset($arguments['mapping'])) {
112 112
 			$this->mapping = $arguments['mapping'];
113 113
 		} else {
114 114
 			$this->mapping = new UserMapping($this->db);
115 115
 		}
116 116
 
117
-		if(isset($arguments['deletedUsersIndex'])) {
117
+		if (isset($arguments['deletedUsersIndex'])) {
118 118
 			$this->dui = $arguments['deletedUsersIndex'];
119 119
 		} else {
120 120
 			$this->dui = new DeletedUsersIndex(
@@ -129,11 +129,11 @@  discard block
 block discarded – undo
129 129
 	public function run($argument) {
130 130
 		$this->setArguments($argument);
131 131
 
132
-		if(!$this->isCleanUpAllowed()) {
132
+		if (!$this->isCleanUpAllowed()) {
133 133
 			return;
134 134
 		}
135 135
 		$users = $this->mapping->getList($this->getOffset(), $this->limit);
136
-		if(!is_array($users)) {
136
+		if (!is_array($users)) {
137 137
 			//something wrong? Let's start from the beginning next time and
138 138
 			//abort
139 139
 			$this->setOffset(true);
@@ -159,7 +159,7 @@  discard block
 block discarded – undo
159 159
 	 */
160 160
 	public function isCleanUpAllowed() {
161 161
 		try {
162
-			if($this->ldapHelper->haveDisabledConfigurations()) {
162
+			if ($this->ldapHelper->haveDisabledConfigurations()) {
163 163
 				return false;
164 164
 			}
165 165
 		} catch (\Exception $e) {
@@ -176,7 +176,7 @@  discard block
 block discarded – undo
176 176
 	 * @return bool
177 177
 	 */
178 178
 	private function isCleanUpEnabled() {
179
-		return (bool)$this->ocConfig->getSystemValue(
179
+		return (bool) $this->ocConfig->getSystemValue(
180 180
 			'ldapUserCleanupInterval', strval($this->defaultIntervalMin));
181 181
 	}
182 182
 
@@ -185,7 +185,7 @@  discard block
 block discarded – undo
185 185
 	 * @param array $users result from getMappedUsers()
186 186
 	 */
187 187
 	private function checkUsers(array $users) {
188
-		foreach($users as $user) {
188
+		foreach ($users as $user) {
189 189
 			$this->checkUser($user);
190 190
 		}
191 191
 	}
@@ -195,7 +195,7 @@  discard block
 block discarded – undo
195 195
 	 * @param string[] $user
196 196
 	 */
197 197
 	private function checkUser(array $user) {
198
-		if($this->userBackend->userExistsOnLDAP($user['name'])) {
198
+		if ($this->userBackend->userExistsOnLDAP($user['name'])) {
199 199
 			//still available, all good
200 200
 
201 201
 			return;
@@ -217,8 +217,7 @@  discard block
 block discarded – undo
217 217
 	 * @param bool $reset whether the offset should be set to 0
218 218
 	 */
219 219
 	public function setOffset($reset = false) {
220
-		$newOffset = $reset ? 0 :
221
-			$this->getOffset() + $this->limit;
220
+		$newOffset = $reset ? 0 : $this->getOffset() + $this->limit;
222 221
 		$this->ocConfig->setAppValue('user_ldap', 'cleanUpJobOffset', $newOffset);
223 222
 	}
224 223
 
Please login to merge, or discard this patch.
apps/user_ldap/lib/BackendUtility.php 1 patch
Indentation   +8 added lines, -8 removed lines patch added patch discarded remove patch
@@ -27,13 +27,13 @@
 block discarded – undo
27 27
 
28 28
 
29 29
 abstract class BackendUtility {
30
-	protected $access;
30
+    protected $access;
31 31
 
32
-	/**
33
-	 * constructor, make sure the subclasses call this one!
34
-	 * @param Access $access an instance of Access for LDAP interaction
35
-	 */
36
-	public function __construct(Access $access) {
37
-		$this->access = $access;
38
-	}
32
+    /**
33
+     * constructor, make sure the subclasses call this one!
34
+     * @param Access $access an instance of Access for LDAP interaction
35
+     */
36
+    public function __construct(Access $access) {
37
+        $this->access = $access;
38
+    }
39 39
 }
Please login to merge, or discard this patch.