Passed
Push — master ( 4a4262...32927f )
by Roeland
24:24 queued 11:41
created
apps/files_sharing/lib/External/Cache.php 1 patch
Indentation   +37 added lines, -37 removed lines patch added patch discarded remove patch
@@ -27,44 +27,44 @@
 block discarded – undo
27 27
 use OCP\Federation\ICloudId;
28 28
 
29 29
 class Cache extends \OC\Files\Cache\Cache {
30
-	/** @var ICloudId */
31
-	private $cloudId;
32
-	private $remote;
33
-	private $remoteUser;
34
-	private $storage;
30
+    /** @var ICloudId */
31
+    private $cloudId;
32
+    private $remote;
33
+    private $remoteUser;
34
+    private $storage;
35 35
 
36
-	/**
37
-	 * @param \OCA\Files_Sharing\External\Storage $storage
38
-	 * @param ICloudId $cloudId
39
-	 */
40
-	public function __construct($storage, ICloudId $cloudId) {
41
-		$this->cloudId = $cloudId;
42
-		$this->storage = $storage;
43
-		list(, $remote) = explode('://', $cloudId->getRemote(), 2);
44
-		$this->remote = $remote;
45
-		$this->remoteUser = $cloudId->getUser();
46
-		parent::__construct($storage);
47
-	}
36
+    /**
37
+     * @param \OCA\Files_Sharing\External\Storage $storage
38
+     * @param ICloudId $cloudId
39
+     */
40
+    public function __construct($storage, ICloudId $cloudId) {
41
+        $this->cloudId = $cloudId;
42
+        $this->storage = $storage;
43
+        list(, $remote) = explode('://', $cloudId->getRemote(), 2);
44
+        $this->remote = $remote;
45
+        $this->remoteUser = $cloudId->getUser();
46
+        parent::__construct($storage);
47
+    }
48 48
 
49
-	public function get($file) {
50
-		$result = parent::get($file);
51
-		if (!$result) {
52
-			return false;
53
-		}
54
-		$result['displayname_owner'] = $this->cloudId->getDisplayId();
55
-		if (!$file || $file === '') {
56
-			$result['is_share_mount_point'] = true;
57
-			$mountPoint = rtrim($this->storage->getMountPoint());
58
-			$result['name'] = basename($mountPoint);
59
-		}
60
-		return $result;
61
-	}
49
+    public function get($file) {
50
+        $result = parent::get($file);
51
+        if (!$result) {
52
+            return false;
53
+        }
54
+        $result['displayname_owner'] = $this->cloudId->getDisplayId();
55
+        if (!$file || $file === '') {
56
+            $result['is_share_mount_point'] = true;
57
+            $mountPoint = rtrim($this->storage->getMountPoint());
58
+            $result['name'] = basename($mountPoint);
59
+        }
60
+        return $result;
61
+    }
62 62
 
63
-	public function getFolderContentsById($id) {
64
-		$results = parent::getFolderContentsById($id);
65
-		foreach ($results as &$file) {
66
-			$file['displayname_owner'] = $this->cloudId->getDisplayId();
67
-		}
68
-		return $results;
69
-	}
63
+    public function getFolderContentsById($id) {
64
+        $results = parent::getFolderContentsById($id);
65
+        foreach ($results as &$file) {
66
+            $file['displayname_owner'] = $this->cloudId->getDisplayId();
67
+        }
68
+        return $results;
69
+    }
70 70
 }
Please login to merge, or discard this patch.
apps/files_sharing/lib/External/MountProvider.php 2 patches
Spacing   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -61,7 +61,7 @@
 block discarded – undo
61 61
 		$managerProvider = $this->managerProvider;
62 62
 		$manager = $managerProvider();
63 63
 		$data['manager'] = $manager;
64
-		$mountPoint = '/' . $user->getUID() . '/files/' . ltrim($data['mountpoint'], '/');
64
+		$mountPoint = '/'.$user->getUID().'/files/'.ltrim($data['mountpoint'], '/');
65 65
 		$data['mountpoint'] = $mountPoint;
66 66
 		$data['cloudId'] = $this->cloudIdManager->getCloudId($data['owner'], $data['remote']);
67 67
 		$data['certificateManager'] = \OC::$server->getCertificateManager($user->getUID());
Please login to merge, or discard this patch.
Indentation   +45 added lines, -45 removed lines patch added patch discarded remove patch
@@ -30,59 +30,59 @@
 block discarded – undo
30 30
 use OCP\IUser;
31 31
 
32 32
 class MountProvider implements IMountProvider {
33
-	public const STORAGE = '\OCA\Files_Sharing\External\Storage';
33
+    public const STORAGE = '\OCA\Files_Sharing\External\Storage';
34 34
 
35
-	/**
36
-	 * @var \OCP\IDBConnection
37
-	 */
38
-	private $connection;
35
+    /**
36
+     * @var \OCP\IDBConnection
37
+     */
38
+    private $connection;
39 39
 
40
-	/**
41
-	 * @var callable
42
-	 */
43
-	private $managerProvider;
40
+    /**
41
+     * @var callable
42
+     */
43
+    private $managerProvider;
44 44
 
45
-	/**
46
-	 * @var ICloudIdManager
47
-	 */
48
-	private $cloudIdManager;
45
+    /**
46
+     * @var ICloudIdManager
47
+     */
48
+    private $cloudIdManager;
49 49
 
50
-	/**
51
-	 * @param \OCP\IDBConnection $connection
52
-	 * @param callable $managerProvider due to setup order we need a callable that return the manager instead of the manager itself
53
-	 * @param ICloudIdManager $cloudIdManager
54
-	 */
55
-	public function __construct(IDBConnection $connection, callable $managerProvider, ICloudIdManager $cloudIdManager) {
56
-		$this->connection = $connection;
57
-		$this->managerProvider = $managerProvider;
58
-		$this->cloudIdManager = $cloudIdManager;
59
-	}
50
+    /**
51
+     * @param \OCP\IDBConnection $connection
52
+     * @param callable $managerProvider due to setup order we need a callable that return the manager instead of the manager itself
53
+     * @param ICloudIdManager $cloudIdManager
54
+     */
55
+    public function __construct(IDBConnection $connection, callable $managerProvider, ICloudIdManager $cloudIdManager) {
56
+        $this->connection = $connection;
57
+        $this->managerProvider = $managerProvider;
58
+        $this->cloudIdManager = $cloudIdManager;
59
+    }
60 60
 
61
-	public function getMount(IUser $user, $data, IStorageFactory $storageFactory) {
62
-		$managerProvider = $this->managerProvider;
63
-		$manager = $managerProvider();
64
-		$data['manager'] = $manager;
65
-		$mountPoint = '/' . $user->getUID() . '/files/' . ltrim($data['mountpoint'], '/');
66
-		$data['mountpoint'] = $mountPoint;
67
-		$data['cloudId'] = $this->cloudIdManager->getCloudId($data['owner'], $data['remote']);
68
-		$data['certificateManager'] = \OC::$server->getCertificateManager($user->getUID());
69
-		$data['HttpClientService'] = \OC::$server->getHTTPClientService();
70
-		return new Mount(self::STORAGE, $mountPoint, $data, $manager, $storageFactory);
71
-	}
61
+    public function getMount(IUser $user, $data, IStorageFactory $storageFactory) {
62
+        $managerProvider = $this->managerProvider;
63
+        $manager = $managerProvider();
64
+        $data['manager'] = $manager;
65
+        $mountPoint = '/' . $user->getUID() . '/files/' . ltrim($data['mountpoint'], '/');
66
+        $data['mountpoint'] = $mountPoint;
67
+        $data['cloudId'] = $this->cloudIdManager->getCloudId($data['owner'], $data['remote']);
68
+        $data['certificateManager'] = \OC::$server->getCertificateManager($user->getUID());
69
+        $data['HttpClientService'] = \OC::$server->getHTTPClientService();
70
+        return new Mount(self::STORAGE, $mountPoint, $data, $manager, $storageFactory);
71
+    }
72 72
 
73
-	public function getMountsForUser(IUser $user, IStorageFactory $loader) {
74
-		$query = $this->connection->prepare('
73
+    public function getMountsForUser(IUser $user, IStorageFactory $loader) {
74
+        $query = $this->connection->prepare('
75 75
 				SELECT `remote`, `share_token`, `password`, `mountpoint`, `owner`
76 76
 				FROM `*PREFIX*share_external`
77 77
 				WHERE `user` = ? AND `accepted` = ?
78 78
 			');
79
-		$query->execute([$user->getUID(), 1]);
80
-		$mounts = [];
81
-		while ($row = $query->fetch()) {
82
-			$row['manager'] = $this;
83
-			$row['token'] = $row['share_token'];
84
-			$mounts[] = $this->getMount($user, $row, $loader);
85
-		}
86
-		return $mounts;
87
-	}
79
+        $query->execute([$user->getUID(), 1]);
80
+        $mounts = [];
81
+        while ($row = $query->fetch()) {
82
+            $row['manager'] = $this;
83
+            $row['token'] = $row['share_token'];
84
+            $mounts[] = $this->getMount($user, $row, $loader);
85
+        }
86
+        return $mounts;
87
+    }
88 88
 }
Please login to merge, or discard this patch.
apps/files_sharing/lib/External/Watcher.php 1 patch
Indentation   +8 added lines, -8 removed lines patch added patch discarded remove patch
@@ -23,12 +23,12 @@
 block discarded – undo
23 23
 namespace OCA\Files_Sharing\External;
24 24
 
25 25
 class Watcher extends \OC\Files\Cache\Watcher {
26
-	/**
27
-	 * remove deleted files in $path from the cache
28
-	 *
29
-	 * @param string $path
30
-	 */
31
-	public function cleanFolder($path) {
32
-		// not needed, the scanner takes care of this
33
-	}
26
+    /**
27
+     * remove deleted files in $path from the cache
28
+     *
29
+     * @param string $path
30
+     */
31
+    public function cleanFolder($path) {
32
+        // not needed, the scanner takes care of this
33
+    }
34 34
 }
Please login to merge, or discard this patch.
apps/files_sharing/lib/ShareBackend/File.php 2 patches
Spacing   +4 added lines, -4 removed lines patch added patch discarded remove patch
@@ -96,7 +96,7 @@  discard block
 block discarded – undo
96 96
 	 */
97 97
 	public function generateTarget($filePath, $shareWith, $exclude = null) {
98 98
 		$shareFolder = \OCA\Files_Sharing\Helper::getShareFolder();
99
-		$target = \OC\Files\Filesystem::normalizePath($shareFolder . '/' . basename($filePath));
99
+		$target = \OC\Files\Filesystem::normalizePath($shareFolder.'/'.basename($filePath));
100 100
 
101 101
 		// for group shares we return the target right away
102 102
 		if ($shareWith === false) {
@@ -104,13 +104,13 @@  discard block
 block discarded – undo
104 104
 		}
105 105
 
106 106
 		\OC\Files\Filesystem::initMountPoints($shareWith);
107
-		$view = new \OC\Files\View('/' . $shareWith . '/files');
107
+		$view = new \OC\Files\View('/'.$shareWith.'/files');
108 108
 
109 109
 		if (!$view->is_dir($shareFolder)) {
110 110
 			$dir = '';
111 111
 			$subdirs = explode('/', $shareFolder);
112 112
 			foreach ($subdirs as $subdir) {
113
-				$dir = $dir . '/' . $subdir;
113
+				$dir = $dir.'/'.$subdir;
114 114
 				if (!$view->is_dir($dir)) {
115 115
 					$view->mkdir($dir);
116 116
 				}
@@ -237,7 +237,7 @@  discard block
 block discarded – undo
237 237
 		if ($share['item_type'] === 'folder' && $target !== '') {
238 238
 			// note: in case of ext storage mount points the path might be empty
239 239
 			// which would cause a leading slash to appear
240
-			$share['path'] = ltrim($share['path'] . '/' . $target, '/');
240
+			$share['path'] = ltrim($share['path'].'/'.$target, '/');
241 241
 		}
242 242
 		return self::resolveReshares($share);
243 243
 	}
Please login to merge, or discard this patch.
Indentation   +196 added lines, -196 removed lines patch added patch discarded remove patch
@@ -39,219 +39,219 @@
 block discarded – undo
39 39
 use OCP\Share\IShare;
40 40
 
41 41
 class File implements \OCP\Share_Backend_File_Dependent {
42
-	public const FORMAT_SHARED_STORAGE = 0;
43
-	public const FORMAT_GET_FOLDER_CONTENTS = 1;
44
-	public const FORMAT_FILE_APP_ROOT = 2;
45
-	public const FORMAT_OPENDIR = 3;
46
-	public const FORMAT_GET_ALL = 4;
47
-	public const FORMAT_PERMISSIONS = 5;
48
-	public const FORMAT_TARGET_NAMES = 6;
42
+    public const FORMAT_SHARED_STORAGE = 0;
43
+    public const FORMAT_GET_FOLDER_CONTENTS = 1;
44
+    public const FORMAT_FILE_APP_ROOT = 2;
45
+    public const FORMAT_OPENDIR = 3;
46
+    public const FORMAT_GET_ALL = 4;
47
+    public const FORMAT_PERMISSIONS = 5;
48
+    public const FORMAT_TARGET_NAMES = 6;
49 49
 
50
-	private $path;
50
+    private $path;
51 51
 
52
-	/** @var FederatedShareProvider */
53
-	private $federatedShareProvider;
52
+    /** @var FederatedShareProvider */
53
+    private $federatedShareProvider;
54 54
 
55
-	public function __construct(FederatedShareProvider $federatedShareProvider = null) {
56
-		if ($federatedShareProvider) {
57
-			$this->federatedShareProvider = $federatedShareProvider;
58
-		} else {
59
-			$federatedSharingApp = \OC::$server->query(Application::class);
60
-			$this->federatedShareProvider = $federatedSharingApp->getFederatedShareProvider();
61
-		}
62
-	}
55
+    public function __construct(FederatedShareProvider $federatedShareProvider = null) {
56
+        if ($federatedShareProvider) {
57
+            $this->federatedShareProvider = $federatedShareProvider;
58
+        } else {
59
+            $federatedSharingApp = \OC::$server->query(Application::class);
60
+            $this->federatedShareProvider = $federatedSharingApp->getFederatedShareProvider();
61
+        }
62
+    }
63 63
 
64
-	public function isValidSource($itemSource, $uidOwner) {
65
-		try {
66
-			$path = \OC\Files\Filesystem::getPath($itemSource);
67
-			// FIXME: attributes should not be set here,
68
-			// keeping this pattern for now to avoid unexpected
69
-			// regressions
70
-			$this->path = \OC\Files\Filesystem::normalizePath(basename($path));
71
-			return true;
72
-		} catch (\OCP\Files\NotFoundException $e) {
73
-			return false;
74
-		}
75
-	}
64
+    public function isValidSource($itemSource, $uidOwner) {
65
+        try {
66
+            $path = \OC\Files\Filesystem::getPath($itemSource);
67
+            // FIXME: attributes should not be set here,
68
+            // keeping this pattern for now to avoid unexpected
69
+            // regressions
70
+            $this->path = \OC\Files\Filesystem::normalizePath(basename($path));
71
+            return true;
72
+        } catch (\OCP\Files\NotFoundException $e) {
73
+            return false;
74
+        }
75
+    }
76 76
 
77
-	public function getFilePath($itemSource, $uidOwner) {
78
-		if (isset($this->path)) {
79
-			$path = $this->path;
80
-			$this->path = null;
81
-			return $path;
82
-		} else {
83
-			try {
84
-				$path = \OC\Files\Filesystem::getPath($itemSource);
85
-				return $path;
86
-			} catch (\OCP\Files\NotFoundException $e) {
87
-				return false;
88
-			}
89
-		}
90
-	}
77
+    public function getFilePath($itemSource, $uidOwner) {
78
+        if (isset($this->path)) {
79
+            $path = $this->path;
80
+            $this->path = null;
81
+            return $path;
82
+        } else {
83
+            try {
84
+                $path = \OC\Files\Filesystem::getPath($itemSource);
85
+                return $path;
86
+            } catch (\OCP\Files\NotFoundException $e) {
87
+                return false;
88
+            }
89
+        }
90
+    }
91 91
 
92
-	/**
93
-	 * create unique target
94
-	 * @param string $filePath
95
-	 * @param string $shareWith
96
-	 * @param array $exclude (optional)
97
-	 * @return string
98
-	 */
99
-	public function generateTarget($filePath, $shareWith, $exclude = null) {
100
-		$shareFolder = \OCA\Files_Sharing\Helper::getShareFolder();
101
-		$target = \OC\Files\Filesystem::normalizePath($shareFolder . '/' . basename($filePath));
92
+    /**
93
+     * create unique target
94
+     * @param string $filePath
95
+     * @param string $shareWith
96
+     * @param array $exclude (optional)
97
+     * @return string
98
+     */
99
+    public function generateTarget($filePath, $shareWith, $exclude = null) {
100
+        $shareFolder = \OCA\Files_Sharing\Helper::getShareFolder();
101
+        $target = \OC\Files\Filesystem::normalizePath($shareFolder . '/' . basename($filePath));
102 102
 
103
-		// for group shares we return the target right away
104
-		if ($shareWith === false) {
105
-			return $target;
106
-		}
103
+        // for group shares we return the target right away
104
+        if ($shareWith === false) {
105
+            return $target;
106
+        }
107 107
 
108
-		\OC\Files\Filesystem::initMountPoints($shareWith);
109
-		$view = new \OC\Files\View('/' . $shareWith . '/files');
108
+        \OC\Files\Filesystem::initMountPoints($shareWith);
109
+        $view = new \OC\Files\View('/' . $shareWith . '/files');
110 110
 
111
-		if (!$view->is_dir($shareFolder)) {
112
-			$dir = '';
113
-			$subdirs = explode('/', $shareFolder);
114
-			foreach ($subdirs as $subdir) {
115
-				$dir = $dir . '/' . $subdir;
116
-				if (!$view->is_dir($dir)) {
117
-					$view->mkdir($dir);
118
-				}
119
-			}
120
-		}
111
+        if (!$view->is_dir($shareFolder)) {
112
+            $dir = '';
113
+            $subdirs = explode('/', $shareFolder);
114
+            foreach ($subdirs as $subdir) {
115
+                $dir = $dir . '/' . $subdir;
116
+                if (!$view->is_dir($dir)) {
117
+                    $view->mkdir($dir);
118
+                }
119
+            }
120
+        }
121 121
 
122
-		$excludeList = is_array($exclude) ? $exclude : [];
122
+        $excludeList = is_array($exclude) ? $exclude : [];
123 123
 
124
-		return \OCA\Files_Sharing\Helper::generateUniqueTarget($target, $excludeList, $view);
125
-	}
124
+        return \OCA\Files_Sharing\Helper::generateUniqueTarget($target, $excludeList, $view);
125
+    }
126 126
 
127
-	public function formatItems($items, $format, $parameters = null) {
128
-		if ($format === self::FORMAT_SHARED_STORAGE) {
129
-			// Only 1 item should come through for this format call
130
-			$item = array_shift($items);
131
-			return [
132
-				'parent' => $item['parent'],
133
-				'path' => $item['path'],
134
-				'storage' => $item['storage'],
135
-				'permissions' => $item['permissions'],
136
-				'uid_owner' => $item['uid_owner'],
137
-			];
138
-		} elseif ($format === self::FORMAT_GET_FOLDER_CONTENTS) {
139
-			$files = [];
140
-			foreach ($items as $item) {
141
-				$file = [];
142
-				$file['fileid'] = $item['file_source'];
143
-				$file['storage'] = $item['storage'];
144
-				$file['path'] = $item['file_target'];
145
-				$file['parent'] = $item['file_parent'];
146
-				$file['name'] = basename($item['file_target']);
147
-				$file['mimetype'] = $item['mimetype'];
148
-				$file['mimepart'] = $item['mimepart'];
149
-				$file['mtime'] = $item['mtime'];
150
-				$file['encrypted'] = $item['encrypted'];
151
-				$file['etag'] = $item['etag'];
152
-				$file['uid_owner'] = $item['uid_owner'];
153
-				$file['displayname_owner'] = $item['displayname_owner'];
127
+    public function formatItems($items, $format, $parameters = null) {
128
+        if ($format === self::FORMAT_SHARED_STORAGE) {
129
+            // Only 1 item should come through for this format call
130
+            $item = array_shift($items);
131
+            return [
132
+                'parent' => $item['parent'],
133
+                'path' => $item['path'],
134
+                'storage' => $item['storage'],
135
+                'permissions' => $item['permissions'],
136
+                'uid_owner' => $item['uid_owner'],
137
+            ];
138
+        } elseif ($format === self::FORMAT_GET_FOLDER_CONTENTS) {
139
+            $files = [];
140
+            foreach ($items as $item) {
141
+                $file = [];
142
+                $file['fileid'] = $item['file_source'];
143
+                $file['storage'] = $item['storage'];
144
+                $file['path'] = $item['file_target'];
145
+                $file['parent'] = $item['file_parent'];
146
+                $file['name'] = basename($item['file_target']);
147
+                $file['mimetype'] = $item['mimetype'];
148
+                $file['mimepart'] = $item['mimepart'];
149
+                $file['mtime'] = $item['mtime'];
150
+                $file['encrypted'] = $item['encrypted'];
151
+                $file['etag'] = $item['etag'];
152
+                $file['uid_owner'] = $item['uid_owner'];
153
+                $file['displayname_owner'] = $item['displayname_owner'];
154 154
 
155
-				$storage = \OC\Files\Filesystem::getStorage('/');
156
-				$cache = $storage->getCache();
157
-				$file['size'] = $item['size'];
158
-				$files[] = $file;
159
-			}
160
-			return $files;
161
-		} elseif ($format === self::FORMAT_OPENDIR) {
162
-			$files = [];
163
-			foreach ($items as $item) {
164
-				$files[] = basename($item['file_target']);
165
-			}
166
-			return $files;
167
-		} elseif ($format === self::FORMAT_GET_ALL) {
168
-			$ids = [];
169
-			foreach ($items as $item) {
170
-				$ids[] = $item['file_source'];
171
-			}
172
-			return $ids;
173
-		} elseif ($format === self::FORMAT_PERMISSIONS) {
174
-			$filePermissions = [];
175
-			foreach ($items as $item) {
176
-				$filePermissions[$item['file_source']] = $item['permissions'];
177
-			}
178
-			return $filePermissions;
179
-		} elseif ($format === self::FORMAT_TARGET_NAMES) {
180
-			$targets = [];
181
-			foreach ($items as $item) {
182
-				$targets[] = $item['file_target'];
183
-			}
184
-			return $targets;
185
-		}
186
-		return [];
187
-	}
155
+                $storage = \OC\Files\Filesystem::getStorage('/');
156
+                $cache = $storage->getCache();
157
+                $file['size'] = $item['size'];
158
+                $files[] = $file;
159
+            }
160
+            return $files;
161
+        } elseif ($format === self::FORMAT_OPENDIR) {
162
+            $files = [];
163
+            foreach ($items as $item) {
164
+                $files[] = basename($item['file_target']);
165
+            }
166
+            return $files;
167
+        } elseif ($format === self::FORMAT_GET_ALL) {
168
+            $ids = [];
169
+            foreach ($items as $item) {
170
+                $ids[] = $item['file_source'];
171
+            }
172
+            return $ids;
173
+        } elseif ($format === self::FORMAT_PERMISSIONS) {
174
+            $filePermissions = [];
175
+            foreach ($items as $item) {
176
+                $filePermissions[$item['file_source']] = $item['permissions'];
177
+            }
178
+            return $filePermissions;
179
+        } elseif ($format === self::FORMAT_TARGET_NAMES) {
180
+            $targets = [];
181
+            foreach ($items as $item) {
182
+                $targets[] = $item['file_target'];
183
+            }
184
+            return $targets;
185
+        }
186
+        return [];
187
+    }
188 188
 
189
-	/**
190
-	 * check if server2server share is enabled
191
-	 *
192
-	 * @param int $shareType
193
-	 * @return boolean
194
-	 */
195
-	public function isShareTypeAllowed($shareType) {
196
-		if ($shareType === IShare::TYPE_REMOTE) {
197
-			return $this->federatedShareProvider->isOutgoingServer2serverShareEnabled();
198
-		}
189
+    /**
190
+     * check if server2server share is enabled
191
+     *
192
+     * @param int $shareType
193
+     * @return boolean
194
+     */
195
+    public function isShareTypeAllowed($shareType) {
196
+        if ($shareType === IShare::TYPE_REMOTE) {
197
+            return $this->federatedShareProvider->isOutgoingServer2serverShareEnabled();
198
+        }
199 199
 
200
-		if ($shareType === IShare::TYPE_REMOTE_GROUP) {
201
-			return $this->federatedShareProvider->isOutgoingServer2serverGroupShareEnabled();
202
-		}
200
+        if ($shareType === IShare::TYPE_REMOTE_GROUP) {
201
+            return $this->federatedShareProvider->isOutgoingServer2serverGroupShareEnabled();
202
+        }
203 203
 
204
-		return true;
205
-	}
204
+        return true;
205
+    }
206 206
 
207
-	/**
208
-	 * resolve reshares to return the correct source item
209
-	 * @param array $source
210
-	 * @return array source item
211
-	 */
212
-	protected static function resolveReshares($source) {
213
-		if (isset($source['parent'])) {
214
-			$parent = $source['parent'];
215
-			while (isset($parent)) {
216
-				$qb = \OC::$server->getDatabaseConnection()->getQueryBuilder();
217
-				$qb->select('parent', 'uid_owner')
218
-					->from('share')
219
-					->where(
220
-						$qb->expr()->eq('id', $qb->createNamedParameter($parent))
221
-					);
222
-				$result = $qb->execute();
223
-				$item = $result->fetch();
224
-				$result->closeCursor();
225
-				if (isset($item['parent'])) {
226
-					$parent = $item['parent'];
227
-				} else {
228
-					$fileOwner = $item['uid_owner'];
229
-					break;
230
-				}
231
-			}
232
-		} else {
233
-			$fileOwner = $source['uid_owner'];
234
-		}
235
-		if (isset($fileOwner)) {
236
-			$source['fileOwner'] = $fileOwner;
237
-		} else {
238
-			\OC::$server->getLogger()->error('No owner found for reshare', ['app' => 'files_sharing']);
239
-		}
207
+    /**
208
+     * resolve reshares to return the correct source item
209
+     * @param array $source
210
+     * @return array source item
211
+     */
212
+    protected static function resolveReshares($source) {
213
+        if (isset($source['parent'])) {
214
+            $parent = $source['parent'];
215
+            while (isset($parent)) {
216
+                $qb = \OC::$server->getDatabaseConnection()->getQueryBuilder();
217
+                $qb->select('parent', 'uid_owner')
218
+                    ->from('share')
219
+                    ->where(
220
+                        $qb->expr()->eq('id', $qb->createNamedParameter($parent))
221
+                    );
222
+                $result = $qb->execute();
223
+                $item = $result->fetch();
224
+                $result->closeCursor();
225
+                if (isset($item['parent'])) {
226
+                    $parent = $item['parent'];
227
+                } else {
228
+                    $fileOwner = $item['uid_owner'];
229
+                    break;
230
+                }
231
+            }
232
+        } else {
233
+            $fileOwner = $source['uid_owner'];
234
+        }
235
+        if (isset($fileOwner)) {
236
+            $source['fileOwner'] = $fileOwner;
237
+        } else {
238
+            \OC::$server->getLogger()->error('No owner found for reshare', ['app' => 'files_sharing']);
239
+        }
240 240
 
241
-		return $source;
242
-	}
241
+        return $source;
242
+    }
243 243
 
244
-	/**
245
-	 * @param string $target
246
-	 * @param array $share
247
-	 * @return array|false source item
248
-	 */
249
-	public static function getSource($target, $share) {
250
-		if ($share['item_type'] === 'folder' && $target !== '') {
251
-			// note: in case of ext storage mount points the path might be empty
252
-			// which would cause a leading slash to appear
253
-			$share['path'] = ltrim($share['path'] . '/' . $target, '/');
254
-		}
255
-		return self::resolveReshares($share);
256
-	}
244
+    /**
245
+     * @param string $target
246
+     * @param array $share
247
+     * @return array|false source item
248
+     */
249
+    public static function getSource($target, $share) {
250
+        if ($share['item_type'] === 'folder' && $target !== '') {
251
+            // note: in case of ext storage mount points the path might be empty
252
+            // which would cause a leading slash to appear
253
+            $share['path'] = ltrim($share['path'] . '/' . $target, '/');
254
+        }
255
+        return self::resolveReshares($share);
256
+    }
257 257
 }
Please login to merge, or discard this patch.
apps/theming/lib/Settings/Section.php 1 patch
Indentation   +46 added lines, -46 removed lines patch added patch discarded remove patch
@@ -28,55 +28,55 @@
 block discarded – undo
28 28
 use OCP\Settings\IIconSection;
29 29
 
30 30
 class Section implements IIconSection {
31
-	/** @var IL10N */
32
-	private $l;
33
-	/** @var IURLGenerator */
34
-	private $url;
31
+    /** @var IL10N */
32
+    private $l;
33
+    /** @var IURLGenerator */
34
+    private $url;
35 35
 
36
-	/**
37
-	 * @param IURLGenerator $url
38
-	 * @param IL10N $l
39
-	 */
40
-	public function __construct(IURLGenerator $url, IL10N $l) {
41
-		$this->url = $url;
42
-		$this->l = $l;
43
-	}
36
+    /**
37
+     * @param IURLGenerator $url
38
+     * @param IL10N $l
39
+     */
40
+    public function __construct(IURLGenerator $url, IL10N $l) {
41
+        $this->url = $url;
42
+        $this->l = $l;
43
+    }
44 44
 
45
-	/**
46
-	 * returns the ID of the section. It is supposed to be a lower case string,
47
-	 * e.g. 'ldap'
48
-	 *
49
-	 * @returns string
50
-	 */
51
-	public function getID() {
52
-		return 'theming';
53
-	}
45
+    /**
46
+     * returns the ID of the section. It is supposed to be a lower case string,
47
+     * e.g. 'ldap'
48
+     *
49
+     * @returns string
50
+     */
51
+    public function getID() {
52
+        return 'theming';
53
+    }
54 54
 
55
-	/**
56
-	 * returns the translated name as it should be displayed, e.g. 'LDAP / AD
57
-	 * integration'. Use the L10N service to translate it.
58
-	 *
59
-	 * @return string
60
-	 */
61
-	public function getName() {
62
-		return $this->l->t('Theming');
63
-	}
55
+    /**
56
+     * returns the translated name as it should be displayed, e.g. 'LDAP / AD
57
+     * integration'. Use the L10N service to translate it.
58
+     *
59
+     * @return string
60
+     */
61
+    public function getName() {
62
+        return $this->l->t('Theming');
63
+    }
64 64
 
65
-	/**
66
-	 * @return int whether the form should be rather on the top or bottom of
67
-	 * the settings navigation. The sections are arranged in ascending order of
68
-	 * the priority values. It is required to return a value between 0 and 99.
69
-	 *
70
-	 * E.g.: 70
71
-	 */
72
-	public function getPriority() {
73
-		return 30;
74
-	}
65
+    /**
66
+     * @return int whether the form should be rather on the top or bottom of
67
+     * the settings navigation. The sections are arranged in ascending order of
68
+     * the priority values. It is required to return a value between 0 and 99.
69
+     *
70
+     * E.g.: 70
71
+     */
72
+    public function getPriority() {
73
+        return 30;
74
+    }
75 75
 
76
-	/**
77
-	 * {@inheritdoc}
78
-	 */
79
-	public function getIcon() {
80
-		return $this->url->imagePath('theming', 'app-dark.svg');
81
-	}
76
+    /**
77
+     * {@inheritdoc}
78
+     */
79
+    public function getIcon() {
80
+        return $this->url->imagePath('theming', 'app-dark.svg');
81
+    }
82 82
 }
Please login to merge, or discard this patch.
apps/twofactor_backupcodes/lib/Db/BackupCode.php 1 patch
Indentation   +6 added lines, -6 removed lines patch added patch discarded remove patch
@@ -34,13 +34,13 @@
 block discarded – undo
34 34
  */
35 35
 class BackupCode extends Entity {
36 36
 
37
-	/** @var string */
38
-	protected $userId;
37
+    /** @var string */
38
+    protected $userId;
39 39
 
40
-	/** @var string */
41
-	protected $code;
40
+    /** @var string */
41
+    protected $code;
42 42
 
43
-	/** @var int */
44
-	protected $used;
43
+    /** @var int */
44
+    protected $used;
45 45
 
46 46
 }
Please login to merge, or discard this patch.
apps/encryption/lib/Controller/SettingsController.php 2 patches
Spacing   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -128,7 +128,7 @@
 block discarded – undo
128 128
 				$encryptedKey = $this->crypt->encryptPrivateKey($decryptedKey, $newPassword, $uid);
129 129
 				$header = $this->crypt->generateHeader();
130 130
 				if ($encryptedKey) {
131
-					$this->keyManager->setPrivateKey($uid, $header . $encryptedKey);
131
+					$this->keyManager->setPrivateKey($uid, $header.$encryptedKey);
132 132
 					$this->session->setPrivateKey($decryptedKey);
133 133
 					$result = true;
134 134
 				}
Please login to merge, or discard this patch.
Indentation   +123 added lines, -123 removed lines patch added patch discarded remove patch
@@ -38,128 +38,128 @@
 block discarded – undo
38 38
 
39 39
 class SettingsController extends Controller {
40 40
 
41
-	/** @var IL10N */
42
-	private $l;
43
-
44
-	/** @var IUserManager */
45
-	private $userManager;
46
-
47
-	/** @var IUserSession */
48
-	private $userSession;
49
-
50
-	/** @var KeyManager */
51
-	private $keyManager;
52
-
53
-	/** @var Crypt */
54
-	private $crypt;
55
-
56
-	/** @var Session */
57
-	private $session;
58
-
59
-	/** @var ISession  */
60
-	private $ocSession;
61
-
62
-	/** @var  Util */
63
-	private $util;
64
-
65
-	/**
66
-	 * @param string $AppName
67
-	 * @param IRequest $request
68
-	 * @param IL10N $l10n
69
-	 * @param IUserManager $userManager
70
-	 * @param IUserSession $userSession
71
-	 * @param KeyManager $keyManager
72
-	 * @param Crypt $crypt
73
-	 * @param Session $session
74
-	 * @param ISession $ocSession
75
-	 * @param Util $util
76
-	 */
77
-	public function __construct($AppName,
78
-								IRequest $request,
79
-								IL10N $l10n,
80
-								IUserManager $userManager,
81
-								IUserSession $userSession,
82
-								KeyManager $keyManager,
83
-								Crypt $crypt,
84
-								Session $session,
85
-								ISession $ocSession,
86
-								Util $util
41
+    /** @var IL10N */
42
+    private $l;
43
+
44
+    /** @var IUserManager */
45
+    private $userManager;
46
+
47
+    /** @var IUserSession */
48
+    private $userSession;
49
+
50
+    /** @var KeyManager */
51
+    private $keyManager;
52
+
53
+    /** @var Crypt */
54
+    private $crypt;
55
+
56
+    /** @var Session */
57
+    private $session;
58
+
59
+    /** @var ISession  */
60
+    private $ocSession;
61
+
62
+    /** @var  Util */
63
+    private $util;
64
+
65
+    /**
66
+     * @param string $AppName
67
+     * @param IRequest $request
68
+     * @param IL10N $l10n
69
+     * @param IUserManager $userManager
70
+     * @param IUserSession $userSession
71
+     * @param KeyManager $keyManager
72
+     * @param Crypt $crypt
73
+     * @param Session $session
74
+     * @param ISession $ocSession
75
+     * @param Util $util
76
+     */
77
+    public function __construct($AppName,
78
+                                IRequest $request,
79
+                                IL10N $l10n,
80
+                                IUserManager $userManager,
81
+                                IUserSession $userSession,
82
+                                KeyManager $keyManager,
83
+                                Crypt $crypt,
84
+                                Session $session,
85
+                                ISession $ocSession,
86
+                                Util $util
87 87
 ) {
88
-		parent::__construct($AppName, $request);
89
-		$this->l = $l10n;
90
-		$this->userSession = $userSession;
91
-		$this->userManager = $userManager;
92
-		$this->keyManager = $keyManager;
93
-		$this->crypt = $crypt;
94
-		$this->session = $session;
95
-		$this->ocSession = $ocSession;
96
-		$this->util = $util;
97
-	}
98
-
99
-
100
-	/**
101
-	 * @NoAdminRequired
102
-	 * @UseSession
103
-	 *
104
-	 * @param string $oldPassword
105
-	 * @param string $newPassword
106
-	 * @return DataResponse
107
-	 */
108
-	public function updatePrivateKeyPassword($oldPassword, $newPassword) {
109
-		$result = false;
110
-		$uid = $this->userSession->getUser()->getUID();
111
-		$errorMessage = $this->l->t('Could not update the private key password.');
112
-
113
-		//check if password is correct
114
-		$passwordCorrect = $this->userManager->checkPassword($uid, $newPassword);
115
-		if ($passwordCorrect === false) {
116
-			// if check with uid fails we need to check the password with the login name
117
-			// e.g. in the ldap case. For local user we need to check the password with
118
-			// the uid because in this case the login name is case insensitive
119
-			$loginName = $this->ocSession->get('loginname');
120
-			$passwordCorrect = $this->userManager->checkPassword($loginName, $newPassword);
121
-		}
122
-
123
-		if ($passwordCorrect !== false) {
124
-			$encryptedKey = $this->keyManager->getPrivateKey($uid);
125
-			$decryptedKey = $this->crypt->decryptPrivateKey($encryptedKey, $oldPassword, $uid);
126
-
127
-			if ($decryptedKey) {
128
-				$encryptedKey = $this->crypt->encryptPrivateKey($decryptedKey, $newPassword, $uid);
129
-				$header = $this->crypt->generateHeader();
130
-				if ($encryptedKey) {
131
-					$this->keyManager->setPrivateKey($uid, $header . $encryptedKey);
132
-					$this->session->setPrivateKey($decryptedKey);
133
-					$result = true;
134
-				}
135
-			} else {
136
-				$errorMessage = $this->l->t('The old password was not correct, please try again.');
137
-			}
138
-		} else {
139
-			$errorMessage = $this->l->t('The current log-in password was not correct, please try again.');
140
-		}
141
-
142
-		if ($result === true) {
143
-			$this->session->setStatus(Session::INIT_SUCCESSFUL);
144
-			return new DataResponse(
145
-				['message' => (string) $this->l->t('Private key password successfully updated.')]
146
-			);
147
-		} else {
148
-			return new DataResponse(
149
-				['message' => (string) $errorMessage],
150
-				Http::STATUS_BAD_REQUEST
151
-			);
152
-		}
153
-	}
154
-
155
-	/**
156
-	 * @UseSession
157
-	 *
158
-	 * @param bool $encryptHomeStorage
159
-	 * @return DataResponse
160
-	 */
161
-	public function setEncryptHomeStorage($encryptHomeStorage) {
162
-		$this->util->setEncryptHomeStorage($encryptHomeStorage);
163
-		return new DataResponse();
164
-	}
88
+        parent::__construct($AppName, $request);
89
+        $this->l = $l10n;
90
+        $this->userSession = $userSession;
91
+        $this->userManager = $userManager;
92
+        $this->keyManager = $keyManager;
93
+        $this->crypt = $crypt;
94
+        $this->session = $session;
95
+        $this->ocSession = $ocSession;
96
+        $this->util = $util;
97
+    }
98
+
99
+
100
+    /**
101
+     * @NoAdminRequired
102
+     * @UseSession
103
+     *
104
+     * @param string $oldPassword
105
+     * @param string $newPassword
106
+     * @return DataResponse
107
+     */
108
+    public function updatePrivateKeyPassword($oldPassword, $newPassword) {
109
+        $result = false;
110
+        $uid = $this->userSession->getUser()->getUID();
111
+        $errorMessage = $this->l->t('Could not update the private key password.');
112
+
113
+        //check if password is correct
114
+        $passwordCorrect = $this->userManager->checkPassword($uid, $newPassword);
115
+        if ($passwordCorrect === false) {
116
+            // if check with uid fails we need to check the password with the login name
117
+            // e.g. in the ldap case. For local user we need to check the password with
118
+            // the uid because in this case the login name is case insensitive
119
+            $loginName = $this->ocSession->get('loginname');
120
+            $passwordCorrect = $this->userManager->checkPassword($loginName, $newPassword);
121
+        }
122
+
123
+        if ($passwordCorrect !== false) {
124
+            $encryptedKey = $this->keyManager->getPrivateKey($uid);
125
+            $decryptedKey = $this->crypt->decryptPrivateKey($encryptedKey, $oldPassword, $uid);
126
+
127
+            if ($decryptedKey) {
128
+                $encryptedKey = $this->crypt->encryptPrivateKey($decryptedKey, $newPassword, $uid);
129
+                $header = $this->crypt->generateHeader();
130
+                if ($encryptedKey) {
131
+                    $this->keyManager->setPrivateKey($uid, $header . $encryptedKey);
132
+                    $this->session->setPrivateKey($decryptedKey);
133
+                    $result = true;
134
+                }
135
+            } else {
136
+                $errorMessage = $this->l->t('The old password was not correct, please try again.');
137
+            }
138
+        } else {
139
+            $errorMessage = $this->l->t('The current log-in password was not correct, please try again.');
140
+        }
141
+
142
+        if ($result === true) {
143
+            $this->session->setStatus(Session::INIT_SUCCESSFUL);
144
+            return new DataResponse(
145
+                ['message' => (string) $this->l->t('Private key password successfully updated.')]
146
+            );
147
+        } else {
148
+            return new DataResponse(
149
+                ['message' => (string) $errorMessage],
150
+                Http::STATUS_BAD_REQUEST
151
+            );
152
+        }
153
+    }
154
+
155
+    /**
156
+     * @UseSession
157
+     *
158
+     * @param bool $encryptHomeStorage
159
+     * @return DataResponse
160
+     */
161
+    public function setEncryptHomeStorage($encryptHomeStorage) {
162
+        $this->util->setEncryptHomeStorage($encryptHomeStorage);
163
+        return new DataResponse();
164
+    }
165 165
 }
Please login to merge, or discard this patch.
apps/comments/lib/Activity/Setting.php 1 patch
Indentation   +59 added lines, -59 removed lines patch added patch discarded remove patch
@@ -27,72 +27,72 @@
 block discarded – undo
27 27
 
28 28
 class Setting implements ISetting {
29 29
 
30
-	/** @var IL10N */
31
-	protected $l;
30
+    /** @var IL10N */
31
+    protected $l;
32 32
 
33
-	/**
34
-	 * @param IL10N $l
35
-	 */
36
-	public function __construct(IL10N $l) {
37
-		$this->l = $l;
38
-	}
33
+    /**
34
+     * @param IL10N $l
35
+     */
36
+    public function __construct(IL10N $l) {
37
+        $this->l = $l;
38
+    }
39 39
 
40
-	/**
41
-	 * @return string Lowercase a-z and underscore only identifier
42
-	 * @since 11.0.0
43
-	 */
44
-	public function getIdentifier() {
45
-		return 'comments';
46
-	}
40
+    /**
41
+     * @return string Lowercase a-z and underscore only identifier
42
+     * @since 11.0.0
43
+     */
44
+    public function getIdentifier() {
45
+        return 'comments';
46
+    }
47 47
 
48
-	/**
49
-	 * @return string A translated string
50
-	 * @since 11.0.0
51
-	 */
52
-	public function getName() {
53
-		return $this->l->t('<strong>Comments</strong> for files');
54
-	}
48
+    /**
49
+     * @return string A translated string
50
+     * @since 11.0.0
51
+     */
52
+    public function getName() {
53
+        return $this->l->t('<strong>Comments</strong> for files');
54
+    }
55 55
 
56
-	/**
57
-	 * @return int whether the filter should be rather on the top or bottom of
58
-	 * the admin section. The filters are arranged in ascending order of the
59
-	 * priority values. It is required to return a value between 0 and 100.
60
-	 * @since 11.0.0
61
-	 */
62
-	public function getPriority() {
63
-		return 50;
64
-	}
56
+    /**
57
+     * @return int whether the filter should be rather on the top or bottom of
58
+     * the admin section. The filters are arranged in ascending order of the
59
+     * priority values. It is required to return a value between 0 and 100.
60
+     * @since 11.0.0
61
+     */
62
+    public function getPriority() {
63
+        return 50;
64
+    }
65 65
 
66
-	/**
67
-	 * @return bool True when the option can be changed for the stream
68
-	 * @since 11.0.0
69
-	 */
70
-	public function canChangeStream() {
71
-		return true;
72
-	}
66
+    /**
67
+     * @return bool True when the option can be changed for the stream
68
+     * @since 11.0.0
69
+     */
70
+    public function canChangeStream() {
71
+        return true;
72
+    }
73 73
 
74
-	/**
75
-	 * @return bool True when the option can be changed for the stream
76
-	 * @since 11.0.0
77
-	 */
78
-	public function isDefaultEnabledStream() {
79
-		return true;
80
-	}
74
+    /**
75
+     * @return bool True when the option can be changed for the stream
76
+     * @since 11.0.0
77
+     */
78
+    public function isDefaultEnabledStream() {
79
+        return true;
80
+    }
81 81
 
82
-	/**
83
-	 * @return bool True when the option can be changed for the mail
84
-	 * @since 11.0.0
85
-	 */
86
-	public function canChangeMail() {
87
-		return true;
88
-	}
82
+    /**
83
+     * @return bool True when the option can be changed for the mail
84
+     * @since 11.0.0
85
+     */
86
+    public function canChangeMail() {
87
+        return true;
88
+    }
89 89
 
90
-	/**
91
-	 * @return bool True when the option can be changed for the stream
92
-	 * @since 11.0.0
93
-	 */
94
-	public function isDefaultEnabledMail() {
95
-		return false;
96
-	}
90
+    /**
91
+     * @return bool True when the option can be changed for the stream
92
+     * @since 11.0.0
93
+     */
94
+    public function isDefaultEnabledMail() {
95
+        return false;
96
+    }
97 97
 }
98 98
 
Please login to merge, or discard this patch.
apps/comments/lib/Activity/Filter.php 1 patch
Indentation   +51 added lines, -51 removed lines patch added patch discarded remove patch
@@ -28,63 +28,63 @@
 block discarded – undo
28 28
 
29 29
 class Filter implements IFilter {
30 30
 
31
-	/** @var IL10N */
32
-	protected $l;
31
+    /** @var IL10N */
32
+    protected $l;
33 33
 
34
-	/** @var IURLGenerator */
35
-	protected $url;
34
+    /** @var IURLGenerator */
35
+    protected $url;
36 36
 
37
-	public function __construct(IL10N $l, IURLGenerator $url) {
38
-		$this->l = $l;
39
-		$this->url = $url;
40
-	}
37
+    public function __construct(IL10N $l, IURLGenerator $url) {
38
+        $this->l = $l;
39
+        $this->url = $url;
40
+    }
41 41
 
42
-	/**
43
-	 * @return string Lowercase a-z only identifier
44
-	 * @since 11.0.0
45
-	 */
46
-	public function getIdentifier() {
47
-		return 'comments';
48
-	}
42
+    /**
43
+     * @return string Lowercase a-z only identifier
44
+     * @since 11.0.0
45
+     */
46
+    public function getIdentifier() {
47
+        return 'comments';
48
+    }
49 49
 
50
-	/**
51
-	 * @return string A translated string
52
-	 * @since 11.0.0
53
-	 */
54
-	public function getName() {
55
-		return $this->l->t('Comments');
56
-	}
50
+    /**
51
+     * @return string A translated string
52
+     * @since 11.0.0
53
+     */
54
+    public function getName() {
55
+        return $this->l->t('Comments');
56
+    }
57 57
 
58
-	/**
59
-	 * @return int
60
-	 * @since 11.0.0
61
-	 */
62
-	public function getPriority() {
63
-		return 40;
64
-	}
58
+    /**
59
+     * @return int
60
+     * @since 11.0.0
61
+     */
62
+    public function getPriority() {
63
+        return 40;
64
+    }
65 65
 
66
-	/**
67
-	 * @return string Full URL to an icon, empty string when none is given
68
-	 * @since 11.0.0
69
-	 */
70
-	public function getIcon() {
71
-		return $this->url->getAbsoluteURL($this->url->imagePath('core', 'actions/comment.svg'));
72
-	}
66
+    /**
67
+     * @return string Full URL to an icon, empty string when none is given
68
+     * @since 11.0.0
69
+     */
70
+    public function getIcon() {
71
+        return $this->url->getAbsoluteURL($this->url->imagePath('core', 'actions/comment.svg'));
72
+    }
73 73
 
74
-	/**
75
-	 * @param string[] $types
76
-	 * @return string[] An array of allowed apps from which activities should be displayed
77
-	 * @since 11.0.0
78
-	 */
79
-	public function filterTypes(array $types) {
80
-		return $types;
81
-	}
74
+    /**
75
+     * @param string[] $types
76
+     * @return string[] An array of allowed apps from which activities should be displayed
77
+     * @since 11.0.0
78
+     */
79
+    public function filterTypes(array $types) {
80
+        return $types;
81
+    }
82 82
 
83
-	/**
84
-	 * @return string[] An array of allowed apps from which activities should be displayed
85
-	 * @since 11.0.0
86
-	 */
87
-	public function allowedApps() {
88
-		return ['comments'];
89
-	}
83
+    /**
84
+     * @return string[] An array of allowed apps from which activities should be displayed
85
+     * @since 11.0.0
86
+     */
87
+    public function allowedApps() {
88
+        return ['comments'];
89
+    }
90 90
 }
Please login to merge, or discard this patch.