@@ -104,6 +104,10 @@ |
||
104 | 104 | } |
105 | 105 | } |
106 | 106 | |
107 | + /** |
|
108 | + * @param string $href |
|
109 | + * @param string $path |
|
110 | + */ |
|
107 | 111 | public function getPropertyDefinitionsForScope($href, $path) { |
108 | 112 | // all valid scopes support the same schema |
109 | 113 |
@@ -155,7 +155,7 @@ discard block |
||
155 | 155 | /** @var Folder $folder $results */ |
156 | 156 | $results = $folder->search($query); |
157 | 157 | |
158 | - return array_map(function (Node $node) { |
|
158 | + return array_map(function(Node $node) { |
|
159 | 159 | if ($node instanceof Folder) { |
160 | 160 | return new SearchResult(new \OCA\DAV\Connector\Sabre\Directory($this->view, $node, $this->tree, $this->shareManager), $this->getHrefForNode($node)); |
161 | 161 | } else { |
@@ -169,8 +169,8 @@ discard block |
||
169 | 169 | * @return string |
170 | 170 | */ |
171 | 171 | private function getHrefForNode(Node $node) { |
172 | - $base = '/files/' . $this->user->getUID(); |
|
173 | - return $base . $this->view->getRelativePath($node->getPath()); |
|
172 | + $base = '/files/'.$this->user->getUID(); |
|
173 | + return $base.$this->view->getRelativePath($node->getPath()); |
|
174 | 174 | } |
175 | 175 | |
176 | 176 | /** |
@@ -210,19 +210,19 @@ discard block |
||
210 | 210 | case Operator::OPERATION_LESS_THAN: |
211 | 211 | case Operator::OPERATION_IS_LIKE: |
212 | 212 | if (count($operator->arguments) !== 2) { |
213 | - throw new \InvalidArgumentException('Invalid number of arguments for ' . $trimmedType . ' operation'); |
|
213 | + throw new \InvalidArgumentException('Invalid number of arguments for '.$trimmedType.' operation'); |
|
214 | 214 | } |
215 | 215 | if (!is_string($operator->arguments[0])) { |
216 | - throw new \InvalidArgumentException('Invalid argument 1 for ' . $trimmedType . ' operation, expected property'); |
|
216 | + throw new \InvalidArgumentException('Invalid argument 1 for '.$trimmedType.' operation, expected property'); |
|
217 | 217 | } |
218 | 218 | if (!($operator->arguments[1] instanceof Literal)) { |
219 | - throw new \InvalidArgumentException('Invalid argument 2 for ' . $trimmedType . ' operation, expected literal'); |
|
219 | + throw new \InvalidArgumentException('Invalid argument 2 for '.$trimmedType.' operation, expected literal'); |
|
220 | 220 | } |
221 | 221 | return new SearchComparison($trimmedType, $this->mapPropertyNameToColumn($operator->arguments[0]), $this->castValue($operator->arguments[0], $operator->arguments[1]->value)); |
222 | 222 | case Operator::OPERATION_IS_COLLECTION: |
223 | 223 | return new SearchComparison('eq', 'mimetype', ICacheEntry::DIRECTORY_MIMETYPE); |
224 | 224 | default: |
225 | - throw new \InvalidArgumentException('Unsupported operation ' . $trimmedType . ' (' . $operator->type . ')'); |
|
225 | + throw new \InvalidArgumentException('Unsupported operation '.$trimmedType.' ('.$operator->type.')'); |
|
226 | 226 | } |
227 | 227 | } |
228 | 228 | |
@@ -247,7 +247,7 @@ discard block |
||
247 | 247 | case FilesPlugin::INTERNAL_FILEID_PROPERTYNAME: |
248 | 248 | return 'fileid'; |
249 | 249 | default: |
250 | - throw new \InvalidArgumentException('Unsupported property for search or order: ' . $propertyName); |
|
250 | + throw new \InvalidArgumentException('Unsupported property for search or order: '.$propertyName); |
|
251 | 251 | } |
252 | 252 | } |
253 | 253 |
@@ -49,231 +49,231 @@ |
||
49 | 49 | use SearchDAV\XML\Order; |
50 | 50 | |
51 | 51 | class FileSearchBackend implements ISearchBackend { |
52 | - /** @var Tree */ |
|
53 | - private $tree; |
|
52 | + /** @var Tree */ |
|
53 | + private $tree; |
|
54 | 54 | |
55 | - /** @var IUser */ |
|
56 | - private $user; |
|
55 | + /** @var IUser */ |
|
56 | + private $user; |
|
57 | 57 | |
58 | - /** @var IRootFolder */ |
|
59 | - private $rootFolder; |
|
58 | + /** @var IRootFolder */ |
|
59 | + private $rootFolder; |
|
60 | 60 | |
61 | - /** @var IManager */ |
|
62 | - private $shareManager; |
|
61 | + /** @var IManager */ |
|
62 | + private $shareManager; |
|
63 | 63 | |
64 | - /** @var View */ |
|
65 | - private $view; |
|
64 | + /** @var View */ |
|
65 | + private $view; |
|
66 | 66 | |
67 | - /** |
|
68 | - * FileSearchBackend constructor. |
|
69 | - * |
|
70 | - * @param Tree $tree |
|
71 | - * @param IUser $user |
|
72 | - * @param IRootFolder $rootFolder |
|
73 | - * @param IManager $shareManager |
|
74 | - * @param View $view |
|
75 | - * @internal param IRootFolder $rootFolder |
|
76 | - */ |
|
77 | - public function __construct(Tree $tree, IUser $user, IRootFolder $rootFolder, IManager $shareManager, View $view) { |
|
78 | - $this->tree = $tree; |
|
79 | - $this->user = $user; |
|
80 | - $this->rootFolder = $rootFolder; |
|
81 | - $this->shareManager = $shareManager; |
|
82 | - $this->view = $view; |
|
83 | - } |
|
67 | + /** |
|
68 | + * FileSearchBackend constructor. |
|
69 | + * |
|
70 | + * @param Tree $tree |
|
71 | + * @param IUser $user |
|
72 | + * @param IRootFolder $rootFolder |
|
73 | + * @param IManager $shareManager |
|
74 | + * @param View $view |
|
75 | + * @internal param IRootFolder $rootFolder |
|
76 | + */ |
|
77 | + public function __construct(Tree $tree, IUser $user, IRootFolder $rootFolder, IManager $shareManager, View $view) { |
|
78 | + $this->tree = $tree; |
|
79 | + $this->user = $user; |
|
80 | + $this->rootFolder = $rootFolder; |
|
81 | + $this->shareManager = $shareManager; |
|
82 | + $this->view = $view; |
|
83 | + } |
|
84 | 84 | |
85 | - /** |
|
86 | - * Search endpoint will be remote.php/dav |
|
87 | - * |
|
88 | - * @return string |
|
89 | - */ |
|
90 | - public function getArbiterPath() { |
|
91 | - return ''; |
|
92 | - } |
|
85 | + /** |
|
86 | + * Search endpoint will be remote.php/dav |
|
87 | + * |
|
88 | + * @return string |
|
89 | + */ |
|
90 | + public function getArbiterPath() { |
|
91 | + return ''; |
|
92 | + } |
|
93 | 93 | |
94 | - public function isValidScope($href, $depth, $path) { |
|
95 | - // only allow scopes inside the dav server |
|
96 | - if (is_null($path)) { |
|
97 | - return false; |
|
98 | - } |
|
94 | + public function isValidScope($href, $depth, $path) { |
|
95 | + // only allow scopes inside the dav server |
|
96 | + if (is_null($path)) { |
|
97 | + return false; |
|
98 | + } |
|
99 | 99 | |
100 | - try { |
|
101 | - $node = $this->tree->getNodeForPath($path); |
|
102 | - return $node instanceof Directory; |
|
103 | - } catch (NotFound $e) { |
|
104 | - return false; |
|
105 | - } |
|
106 | - } |
|
100 | + try { |
|
101 | + $node = $this->tree->getNodeForPath($path); |
|
102 | + return $node instanceof Directory; |
|
103 | + } catch (NotFound $e) { |
|
104 | + return false; |
|
105 | + } |
|
106 | + } |
|
107 | 107 | |
108 | - public function getPropertyDefinitionsForScope($href, $path) { |
|
109 | - // all valid scopes support the same schema |
|
108 | + public function getPropertyDefinitionsForScope($href, $path) { |
|
109 | + // all valid scopes support the same schema |
|
110 | 110 | |
111 | - //todo dynamically load all propfind properties that are supported |
|
112 | - return [ |
|
113 | - // queryable properties |
|
114 | - new SearchPropertyDefinition('{DAV:}displayname', true, false, true), |
|
115 | - new SearchPropertyDefinition('{DAV:}getcontenttype', true, true, true), |
|
116 | - new SearchPropertyDefinition('{DAV:}getlastmodified', true, true, true, SearchPropertyDefinition::DATATYPE_DATETIME), |
|
117 | - new SearchPropertyDefinition(FilesPlugin::SIZE_PROPERTYNAME, true, true, true, SearchPropertyDefinition::DATATYPE_NONNEGATIVE_INTEGER), |
|
118 | - new SearchPropertyDefinition(TagsPlugin::FAVORITE_PROPERTYNAME, true, true, true, SearchPropertyDefinition::DATATYPE_BOOLEAN), |
|
119 | - new SearchPropertyDefinition(FilesPlugin::INTERNAL_FILEID_PROPERTYNAME, true, true, false, SearchPropertyDefinition::DATATYPE_NONNEGATIVE_INTEGER), |
|
111 | + //todo dynamically load all propfind properties that are supported |
|
112 | + return [ |
|
113 | + // queryable properties |
|
114 | + new SearchPropertyDefinition('{DAV:}displayname', true, false, true), |
|
115 | + new SearchPropertyDefinition('{DAV:}getcontenttype', true, true, true), |
|
116 | + new SearchPropertyDefinition('{DAV:}getlastmodified', true, true, true, SearchPropertyDefinition::DATATYPE_DATETIME), |
|
117 | + new SearchPropertyDefinition(FilesPlugin::SIZE_PROPERTYNAME, true, true, true, SearchPropertyDefinition::DATATYPE_NONNEGATIVE_INTEGER), |
|
118 | + new SearchPropertyDefinition(TagsPlugin::FAVORITE_PROPERTYNAME, true, true, true, SearchPropertyDefinition::DATATYPE_BOOLEAN), |
|
119 | + new SearchPropertyDefinition(FilesPlugin::INTERNAL_FILEID_PROPERTYNAME, true, true, false, SearchPropertyDefinition::DATATYPE_NONNEGATIVE_INTEGER), |
|
120 | 120 | |
121 | - // select only properties |
|
122 | - new SearchPropertyDefinition('{DAV:}resourcetype', false, true, false), |
|
123 | - new SearchPropertyDefinition('{DAV:}getcontentlength', false, true, false), |
|
124 | - new SearchPropertyDefinition(FilesPlugin::CHECKSUMS_PROPERTYNAME, false, true, false), |
|
125 | - new SearchPropertyDefinition(FilesPlugin::PERMISSIONS_PROPERTYNAME, false, true, false), |
|
126 | - new SearchPropertyDefinition(FilesPlugin::GETETAG_PROPERTYNAME, false, true, false), |
|
127 | - new SearchPropertyDefinition(FilesPlugin::OWNER_ID_PROPERTYNAME, false, true, false), |
|
128 | - new SearchPropertyDefinition(FilesPlugin::OWNER_DISPLAY_NAME_PROPERTYNAME, false, true, false), |
|
129 | - new SearchPropertyDefinition(FilesPlugin::DATA_FINGERPRINT_PROPERTYNAME, false, true, false), |
|
130 | - new SearchPropertyDefinition(FilesPlugin::HAS_PREVIEW_PROPERTYNAME, false, true, false, SearchPropertyDefinition::DATATYPE_BOOLEAN), |
|
131 | - new SearchPropertyDefinition(FilesPlugin::FILEID_PROPERTYNAME, false, true, false, SearchPropertyDefinition::DATATYPE_NONNEGATIVE_INTEGER), |
|
132 | - ]; |
|
133 | - } |
|
121 | + // select only properties |
|
122 | + new SearchPropertyDefinition('{DAV:}resourcetype', false, true, false), |
|
123 | + new SearchPropertyDefinition('{DAV:}getcontentlength', false, true, false), |
|
124 | + new SearchPropertyDefinition(FilesPlugin::CHECKSUMS_PROPERTYNAME, false, true, false), |
|
125 | + new SearchPropertyDefinition(FilesPlugin::PERMISSIONS_PROPERTYNAME, false, true, false), |
|
126 | + new SearchPropertyDefinition(FilesPlugin::GETETAG_PROPERTYNAME, false, true, false), |
|
127 | + new SearchPropertyDefinition(FilesPlugin::OWNER_ID_PROPERTYNAME, false, true, false), |
|
128 | + new SearchPropertyDefinition(FilesPlugin::OWNER_DISPLAY_NAME_PROPERTYNAME, false, true, false), |
|
129 | + new SearchPropertyDefinition(FilesPlugin::DATA_FINGERPRINT_PROPERTYNAME, false, true, false), |
|
130 | + new SearchPropertyDefinition(FilesPlugin::HAS_PREVIEW_PROPERTYNAME, false, true, false, SearchPropertyDefinition::DATATYPE_BOOLEAN), |
|
131 | + new SearchPropertyDefinition(FilesPlugin::FILEID_PROPERTYNAME, false, true, false, SearchPropertyDefinition::DATATYPE_NONNEGATIVE_INTEGER), |
|
132 | + ]; |
|
133 | + } |
|
134 | 134 | |
135 | - /** |
|
136 | - * @param BasicSearch $search |
|
137 | - * @return SearchResult[] |
|
138 | - */ |
|
139 | - public function search(BasicSearch $search) { |
|
140 | - if (count($search->from) !== 1) { |
|
141 | - throw new \InvalidArgumentException('Searching more than one folder is not supported'); |
|
142 | - } |
|
143 | - $query = $this->transformQuery($search); |
|
144 | - $scope = $search->from[0]; |
|
145 | - if ($scope->path === null) { |
|
146 | - throw new \InvalidArgumentException('Using uri\'s as scope is not supported, please use a path relative to the search arbiter instead'); |
|
147 | - } |
|
148 | - $node = $this->tree->getNodeForPath($scope->path); |
|
149 | - if (!$node instanceof Directory) { |
|
150 | - throw new \InvalidArgumentException('Search is only supported on directories'); |
|
151 | - } |
|
135 | + /** |
|
136 | + * @param BasicSearch $search |
|
137 | + * @return SearchResult[] |
|
138 | + */ |
|
139 | + public function search(BasicSearch $search) { |
|
140 | + if (count($search->from) !== 1) { |
|
141 | + throw new \InvalidArgumentException('Searching more than one folder is not supported'); |
|
142 | + } |
|
143 | + $query = $this->transformQuery($search); |
|
144 | + $scope = $search->from[0]; |
|
145 | + if ($scope->path === null) { |
|
146 | + throw new \InvalidArgumentException('Using uri\'s as scope is not supported, please use a path relative to the search arbiter instead'); |
|
147 | + } |
|
148 | + $node = $this->tree->getNodeForPath($scope->path); |
|
149 | + if (!$node instanceof Directory) { |
|
150 | + throw new \InvalidArgumentException('Search is only supported on directories'); |
|
151 | + } |
|
152 | 152 | |
153 | - $fileInfo = $node->getFileInfo(); |
|
154 | - $folder = $this->rootFolder->get($fileInfo->getPath()); |
|
155 | - /** @var Folder $folder $results */ |
|
156 | - $results = $folder->search($query); |
|
153 | + $fileInfo = $node->getFileInfo(); |
|
154 | + $folder = $this->rootFolder->get($fileInfo->getPath()); |
|
155 | + /** @var Folder $folder $results */ |
|
156 | + $results = $folder->search($query); |
|
157 | 157 | |
158 | - return array_map(function (Node $node) { |
|
159 | - if ($node instanceof Folder) { |
|
160 | - return new SearchResult(new \OCA\DAV\Connector\Sabre\Directory($this->view, $node, $this->tree, $this->shareManager), $this->getHrefForNode($node)); |
|
161 | - } else { |
|
162 | - return new SearchResult(new \OCA\DAV\Connector\Sabre\File($this->view, $node, $this->shareManager), $this->getHrefForNode($node)); |
|
163 | - } |
|
164 | - }, $results); |
|
165 | - } |
|
158 | + return array_map(function (Node $node) { |
|
159 | + if ($node instanceof Folder) { |
|
160 | + return new SearchResult(new \OCA\DAV\Connector\Sabre\Directory($this->view, $node, $this->tree, $this->shareManager), $this->getHrefForNode($node)); |
|
161 | + } else { |
|
162 | + return new SearchResult(new \OCA\DAV\Connector\Sabre\File($this->view, $node, $this->shareManager), $this->getHrefForNode($node)); |
|
163 | + } |
|
164 | + }, $results); |
|
165 | + } |
|
166 | 166 | |
167 | - /** |
|
168 | - * @param Node $node |
|
169 | - * @return string |
|
170 | - */ |
|
171 | - private function getHrefForNode(Node $node) { |
|
172 | - $base = '/files/' . $this->user->getUID(); |
|
173 | - return $base . $this->view->getRelativePath($node->getPath()); |
|
174 | - } |
|
167 | + /** |
|
168 | + * @param Node $node |
|
169 | + * @return string |
|
170 | + */ |
|
171 | + private function getHrefForNode(Node $node) { |
|
172 | + $base = '/files/' . $this->user->getUID(); |
|
173 | + return $base . $this->view->getRelativePath($node->getPath()); |
|
174 | + } |
|
175 | 175 | |
176 | - /** |
|
177 | - * @param BasicSearch $query |
|
178 | - * @return ISearchQuery |
|
179 | - */ |
|
180 | - private function transformQuery(BasicSearch $query) { |
|
181 | - // TODO offset, limit |
|
182 | - $orders = array_map([$this, 'mapSearchOrder'], $query->orderBy); |
|
183 | - return new SearchQuery($this->transformSearchOperation($query->where), 0, 0, $orders, $this->user); |
|
184 | - } |
|
176 | + /** |
|
177 | + * @param BasicSearch $query |
|
178 | + * @return ISearchQuery |
|
179 | + */ |
|
180 | + private function transformQuery(BasicSearch $query) { |
|
181 | + // TODO offset, limit |
|
182 | + $orders = array_map([$this, 'mapSearchOrder'], $query->orderBy); |
|
183 | + return new SearchQuery($this->transformSearchOperation($query->where), 0, 0, $orders, $this->user); |
|
184 | + } |
|
185 | 185 | |
186 | - /** |
|
187 | - * @param Order $order |
|
188 | - * @return ISearchOrder |
|
189 | - */ |
|
190 | - private function mapSearchOrder(Order $order) { |
|
191 | - return new SearchOrder($order->order === Order::ASC ? ISearchOrder::DIRECTION_ASCENDING : ISearchOrder::DIRECTION_DESCENDING, $this->mapPropertyNameToColumn($order->property)); |
|
192 | - } |
|
186 | + /** |
|
187 | + * @param Order $order |
|
188 | + * @return ISearchOrder |
|
189 | + */ |
|
190 | + private function mapSearchOrder(Order $order) { |
|
191 | + return new SearchOrder($order->order === Order::ASC ? ISearchOrder::DIRECTION_ASCENDING : ISearchOrder::DIRECTION_DESCENDING, $this->mapPropertyNameToColumn($order->property)); |
|
192 | + } |
|
193 | 193 | |
194 | - /** |
|
195 | - * @param Operator $operator |
|
196 | - * @return ISearchOperator |
|
197 | - */ |
|
198 | - private function transformSearchOperation(Operator $operator) { |
|
199 | - list(, $trimmedType) = explode('}', $operator->type); |
|
200 | - switch ($operator->type) { |
|
201 | - case Operator::OPERATION_AND: |
|
202 | - case Operator::OPERATION_OR: |
|
203 | - case Operator::OPERATION_NOT: |
|
204 | - $arguments = array_map([$this, 'transformSearchOperation'], $operator->arguments); |
|
205 | - return new SearchBinaryOperator($trimmedType, $arguments); |
|
206 | - case Operator::OPERATION_EQUAL: |
|
207 | - case Operator::OPERATION_GREATER_OR_EQUAL_THAN: |
|
208 | - case Operator::OPERATION_GREATER_THAN: |
|
209 | - case Operator::OPERATION_LESS_OR_EQUAL_THAN: |
|
210 | - case Operator::OPERATION_LESS_THAN: |
|
211 | - case Operator::OPERATION_IS_LIKE: |
|
212 | - if (count($operator->arguments) !== 2) { |
|
213 | - throw new \InvalidArgumentException('Invalid number of arguments for ' . $trimmedType . ' operation'); |
|
214 | - } |
|
215 | - if (!is_string($operator->arguments[0])) { |
|
216 | - throw new \InvalidArgumentException('Invalid argument 1 for ' . $trimmedType . ' operation, expected property'); |
|
217 | - } |
|
218 | - if (!($operator->arguments[1] instanceof Literal)) { |
|
219 | - throw new \InvalidArgumentException('Invalid argument 2 for ' . $trimmedType . ' operation, expected literal'); |
|
220 | - } |
|
221 | - return new SearchComparison($trimmedType, $this->mapPropertyNameToColumn($operator->arguments[0]), $this->castValue($operator->arguments[0], $operator->arguments[1]->value)); |
|
222 | - case Operator::OPERATION_IS_COLLECTION: |
|
223 | - return new SearchComparison('eq', 'mimetype', ICacheEntry::DIRECTORY_MIMETYPE); |
|
224 | - default: |
|
225 | - throw new \InvalidArgumentException('Unsupported operation ' . $trimmedType . ' (' . $operator->type . ')'); |
|
226 | - } |
|
227 | - } |
|
194 | + /** |
|
195 | + * @param Operator $operator |
|
196 | + * @return ISearchOperator |
|
197 | + */ |
|
198 | + private function transformSearchOperation(Operator $operator) { |
|
199 | + list(, $trimmedType) = explode('}', $operator->type); |
|
200 | + switch ($operator->type) { |
|
201 | + case Operator::OPERATION_AND: |
|
202 | + case Operator::OPERATION_OR: |
|
203 | + case Operator::OPERATION_NOT: |
|
204 | + $arguments = array_map([$this, 'transformSearchOperation'], $operator->arguments); |
|
205 | + return new SearchBinaryOperator($trimmedType, $arguments); |
|
206 | + case Operator::OPERATION_EQUAL: |
|
207 | + case Operator::OPERATION_GREATER_OR_EQUAL_THAN: |
|
208 | + case Operator::OPERATION_GREATER_THAN: |
|
209 | + case Operator::OPERATION_LESS_OR_EQUAL_THAN: |
|
210 | + case Operator::OPERATION_LESS_THAN: |
|
211 | + case Operator::OPERATION_IS_LIKE: |
|
212 | + if (count($operator->arguments) !== 2) { |
|
213 | + throw new \InvalidArgumentException('Invalid number of arguments for ' . $trimmedType . ' operation'); |
|
214 | + } |
|
215 | + if (!is_string($operator->arguments[0])) { |
|
216 | + throw new \InvalidArgumentException('Invalid argument 1 for ' . $trimmedType . ' operation, expected property'); |
|
217 | + } |
|
218 | + if (!($operator->arguments[1] instanceof Literal)) { |
|
219 | + throw new \InvalidArgumentException('Invalid argument 2 for ' . $trimmedType . ' operation, expected literal'); |
|
220 | + } |
|
221 | + return new SearchComparison($trimmedType, $this->mapPropertyNameToColumn($operator->arguments[0]), $this->castValue($operator->arguments[0], $operator->arguments[1]->value)); |
|
222 | + case Operator::OPERATION_IS_COLLECTION: |
|
223 | + return new SearchComparison('eq', 'mimetype', ICacheEntry::DIRECTORY_MIMETYPE); |
|
224 | + default: |
|
225 | + throw new \InvalidArgumentException('Unsupported operation ' . $trimmedType . ' (' . $operator->type . ')'); |
|
226 | + } |
|
227 | + } |
|
228 | 228 | |
229 | - /** |
|
230 | - * @param string $propertyName |
|
231 | - * @return string |
|
232 | - */ |
|
233 | - private function mapPropertyNameToColumn($propertyName) { |
|
234 | - switch ($propertyName) { |
|
235 | - case '{DAV:}displayname': |
|
236 | - return 'name'; |
|
237 | - case '{DAV:}getcontenttype': |
|
238 | - return 'mimetype'; |
|
239 | - case '{DAV:}getlastmodified': |
|
240 | - return 'mtime'; |
|
241 | - case FilesPlugin::SIZE_PROPERTYNAME: |
|
242 | - return 'size'; |
|
243 | - case TagsPlugin::FAVORITE_PROPERTYNAME: |
|
244 | - return 'favorite'; |
|
245 | - case TagsPlugin::TAGS_PROPERTYNAME: |
|
246 | - return 'tagname'; |
|
247 | - case FilesPlugin::INTERNAL_FILEID_PROPERTYNAME: |
|
248 | - return 'fileid'; |
|
249 | - default: |
|
250 | - throw new \InvalidArgumentException('Unsupported property for search or order: ' . $propertyName); |
|
251 | - } |
|
252 | - } |
|
229 | + /** |
|
230 | + * @param string $propertyName |
|
231 | + * @return string |
|
232 | + */ |
|
233 | + private function mapPropertyNameToColumn($propertyName) { |
|
234 | + switch ($propertyName) { |
|
235 | + case '{DAV:}displayname': |
|
236 | + return 'name'; |
|
237 | + case '{DAV:}getcontenttype': |
|
238 | + return 'mimetype'; |
|
239 | + case '{DAV:}getlastmodified': |
|
240 | + return 'mtime'; |
|
241 | + case FilesPlugin::SIZE_PROPERTYNAME: |
|
242 | + return 'size'; |
|
243 | + case TagsPlugin::FAVORITE_PROPERTYNAME: |
|
244 | + return 'favorite'; |
|
245 | + case TagsPlugin::TAGS_PROPERTYNAME: |
|
246 | + return 'tagname'; |
|
247 | + case FilesPlugin::INTERNAL_FILEID_PROPERTYNAME: |
|
248 | + return 'fileid'; |
|
249 | + default: |
|
250 | + throw new \InvalidArgumentException('Unsupported property for search or order: ' . $propertyName); |
|
251 | + } |
|
252 | + } |
|
253 | 253 | |
254 | - private function castValue($propertyName, $value) { |
|
255 | - $allProps = $this->getPropertyDefinitionsForScope('', ''); |
|
256 | - foreach ($allProps as $prop) { |
|
257 | - if ($prop->name === $propertyName) { |
|
258 | - $dataType = $prop->dataType; |
|
259 | - switch ($dataType) { |
|
260 | - case SearchPropertyDefinition::DATATYPE_BOOLEAN: |
|
261 | - return $value === 'yes'; |
|
262 | - case SearchPropertyDefinition::DATATYPE_DECIMAL: |
|
263 | - case SearchPropertyDefinition::DATATYPE_INTEGER: |
|
264 | - case SearchPropertyDefinition::DATATYPE_NONNEGATIVE_INTEGER: |
|
265 | - return 0 + $value; |
|
266 | - case SearchPropertyDefinition::DATATYPE_DATETIME: |
|
267 | - if (is_numeric($value)) { |
|
268 | - return 0 + $value; |
|
269 | - } |
|
270 | - $date = \DateTime::createFromFormat(\DateTime::ATOM, $value); |
|
271 | - return ($date instanceof \DateTime) ? $date->getTimestamp() : 0; |
|
272 | - default: |
|
273 | - return $value; |
|
274 | - } |
|
275 | - } |
|
276 | - } |
|
277 | - return $value; |
|
278 | - } |
|
254 | + private function castValue($propertyName, $value) { |
|
255 | + $allProps = $this->getPropertyDefinitionsForScope('', ''); |
|
256 | + foreach ($allProps as $prop) { |
|
257 | + if ($prop->name === $propertyName) { |
|
258 | + $dataType = $prop->dataType; |
|
259 | + switch ($dataType) { |
|
260 | + case SearchPropertyDefinition::DATATYPE_BOOLEAN: |
|
261 | + return $value === 'yes'; |
|
262 | + case SearchPropertyDefinition::DATATYPE_DECIMAL: |
|
263 | + case SearchPropertyDefinition::DATATYPE_INTEGER: |
|
264 | + case SearchPropertyDefinition::DATATYPE_NONNEGATIVE_INTEGER: |
|
265 | + return 0 + $value; |
|
266 | + case SearchPropertyDefinition::DATATYPE_DATETIME: |
|
267 | + if (is_numeric($value)) { |
|
268 | + return 0 + $value; |
|
269 | + } |
|
270 | + $date = \DateTime::createFromFormat(\DateTime::ATOM, $value); |
|
271 | + return ($date instanceof \DateTime) ? $date->getTimestamp() : 0; |
|
272 | + default: |
|
273 | + return $value; |
|
274 | + } |
|
275 | + } |
|
276 | + } |
|
277 | + return $value; |
|
278 | + } |
|
279 | 279 | } |
@@ -37,7 +37,7 @@ |
||
37 | 37 | private $filePath; |
38 | 38 | |
39 | 39 | /** |
40 | - * @param string|resource $filePath the path to the file or a file handle which should be streamed |
|
40 | + * @param string $filePath the path to the file or a file handle which should be streamed |
|
41 | 41 | * @since 8.1.0 |
42 | 42 | */ |
43 | 43 | public function __construct ($filePath) { |
@@ -33,33 +33,33 @@ |
||
33 | 33 | * @since 8.1.0 |
34 | 34 | */ |
35 | 35 | class StreamResponse extends Response implements ICallbackResponse { |
36 | - /** @var string */ |
|
37 | - private $filePath; |
|
36 | + /** @var string */ |
|
37 | + private $filePath; |
|
38 | 38 | |
39 | - /** |
|
40 | - * @param string|resource $filePath the path to the file or a file handle which should be streamed |
|
41 | - * @since 8.1.0 |
|
42 | - */ |
|
43 | - public function __construct ($filePath) { |
|
44 | - $this->filePath = $filePath; |
|
45 | - } |
|
39 | + /** |
|
40 | + * @param string|resource $filePath the path to the file or a file handle which should be streamed |
|
41 | + * @since 8.1.0 |
|
42 | + */ |
|
43 | + public function __construct ($filePath) { |
|
44 | + $this->filePath = $filePath; |
|
45 | + } |
|
46 | 46 | |
47 | 47 | |
48 | - /** |
|
49 | - * Streams the file using readfile |
|
50 | - * |
|
51 | - * @param IOutput $output a small wrapper that handles output |
|
52 | - * @since 8.1.0 |
|
53 | - */ |
|
54 | - public function callback (IOutput $output) { |
|
55 | - // handle caching |
|
56 | - if ($output->getHttpResponseCode() !== Http::STATUS_NOT_MODIFIED) { |
|
57 | - if (!(is_resource($this->filePath) || file_exists($this->filePath))) { |
|
58 | - $output->setHttpResponseCode(Http::STATUS_NOT_FOUND); |
|
59 | - } elseif ($output->setReadfile($this->filePath) === false) { |
|
60 | - $output->setHttpResponseCode(Http::STATUS_BAD_REQUEST); |
|
61 | - } |
|
62 | - } |
|
63 | - } |
|
48 | + /** |
|
49 | + * Streams the file using readfile |
|
50 | + * |
|
51 | + * @param IOutput $output a small wrapper that handles output |
|
52 | + * @since 8.1.0 |
|
53 | + */ |
|
54 | + public function callback (IOutput $output) { |
|
55 | + // handle caching |
|
56 | + if ($output->getHttpResponseCode() !== Http::STATUS_NOT_MODIFIED) { |
|
57 | + if (!(is_resource($this->filePath) || file_exists($this->filePath))) { |
|
58 | + $output->setHttpResponseCode(Http::STATUS_NOT_FOUND); |
|
59 | + } elseif ($output->setReadfile($this->filePath) === false) { |
|
60 | + $output->setHttpResponseCode(Http::STATUS_BAD_REQUEST); |
|
61 | + } |
|
62 | + } |
|
63 | + } |
|
64 | 64 | |
65 | 65 | } |
@@ -40,7 +40,7 @@ discard block |
||
40 | 40 | * @param string|resource $filePath the path to the file or a file handle which should be streamed |
41 | 41 | * @since 8.1.0 |
42 | 42 | */ |
43 | - public function __construct ($filePath) { |
|
43 | + public function __construct($filePath) { |
|
44 | 44 | $this->filePath = $filePath; |
45 | 45 | } |
46 | 46 | |
@@ -51,7 +51,7 @@ discard block |
||
51 | 51 | * @param IOutput $output a small wrapper that handles output |
52 | 52 | * @since 8.1.0 |
53 | 53 | */ |
54 | - public function callback (IOutput $output) { |
|
54 | + public function callback(IOutput $output) { |
|
55 | 55 | // handle caching |
56 | 56 | if ($output->getHttpResponseCode() !== Http::STATUS_NOT_MODIFIED) { |
57 | 57 | if (!(is_resource($this->filePath) || file_exists($this->filePath))) { |
@@ -47,6 +47,9 @@ |
||
47 | 47 | $this->allowUnauthenticatedAccess = false; |
48 | 48 | } |
49 | 49 | |
50 | + /** |
|
51 | + * @param string $privileges |
|
52 | + */ |
|
50 | 53 | function checkPrivileges($uri, $privileges, $recursion = self::R_PARENT, $throwExceptions = true) { |
51 | 54 | $access = parent::checkPrivileges($uri, $privileges, $recursion, false); |
52 | 55 | if($access === false && $throwExceptions) { |
@@ -43,50 +43,50 @@ |
||
43 | 43 | * @package OCA\DAV\Connector\Sabre |
44 | 44 | */ |
45 | 45 | class DavAclPlugin extends \Sabre\DAVACL\Plugin { |
46 | - public function __construct() { |
|
47 | - $this->hideNodesFromListings = true; |
|
48 | - $this->allowUnauthenticatedAccess = false; |
|
49 | - } |
|
46 | + public function __construct() { |
|
47 | + $this->hideNodesFromListings = true; |
|
48 | + $this->allowUnauthenticatedAccess = false; |
|
49 | + } |
|
50 | 50 | |
51 | - function checkPrivileges($uri, $privileges, $recursion = self::R_PARENT, $throwExceptions = true) { |
|
52 | - $access = parent::checkPrivileges($uri, $privileges, $recursion, false); |
|
53 | - if($access === false && $throwExceptions) { |
|
54 | - /** @var INode $node */ |
|
55 | - $node = $this->server->tree->getNodeForPath($uri); |
|
51 | + function checkPrivileges($uri, $privileges, $recursion = self::R_PARENT, $throwExceptions = true) { |
|
52 | + $access = parent::checkPrivileges($uri, $privileges, $recursion, false); |
|
53 | + if($access === false && $throwExceptions) { |
|
54 | + /** @var INode $node */ |
|
55 | + $node = $this->server->tree->getNodeForPath($uri); |
|
56 | 56 | |
57 | - switch(get_class($node)) { |
|
58 | - case 'OCA\DAV\CardDAV\AddressBook': |
|
59 | - $type = 'Addressbook'; |
|
60 | - break; |
|
61 | - default: |
|
62 | - $type = 'Node'; |
|
63 | - break; |
|
64 | - } |
|
65 | - throw new NotFound( |
|
66 | - sprintf( |
|
67 | - "%s with name '%s' could not be found", |
|
68 | - $type, |
|
69 | - $node->getName() |
|
70 | - ) |
|
71 | - ); |
|
72 | - } |
|
57 | + switch(get_class($node)) { |
|
58 | + case 'OCA\DAV\CardDAV\AddressBook': |
|
59 | + $type = 'Addressbook'; |
|
60 | + break; |
|
61 | + default: |
|
62 | + $type = 'Node'; |
|
63 | + break; |
|
64 | + } |
|
65 | + throw new NotFound( |
|
66 | + sprintf( |
|
67 | + "%s with name '%s' could not be found", |
|
68 | + $type, |
|
69 | + $node->getName() |
|
70 | + ) |
|
71 | + ); |
|
72 | + } |
|
73 | 73 | |
74 | - return $access; |
|
75 | - } |
|
74 | + return $access; |
|
75 | + } |
|
76 | 76 | |
77 | - public function propFind(PropFind $propFind, INode $node) { |
|
78 | - // If the node is neither readable nor writable then fail unless its of |
|
79 | - // the standard user-principal |
|
80 | - if(!($node instanceof User)) { |
|
81 | - $path = $propFind->getPath(); |
|
82 | - $readPermissions = $this->checkPrivileges($path, '{DAV:}read', self::R_PARENT, false); |
|
83 | - $writePermissions = $this->checkPrivileges($path, '{DAV:}write', self::R_PARENT, false); |
|
84 | - if ($readPermissions === false && $writePermissions === false) { |
|
85 | - $this->checkPrivileges($path, '{DAV:}read', self::R_PARENT, true); |
|
86 | - $this->checkPrivileges($path, '{DAV:}write', self::R_PARENT, true); |
|
87 | - } |
|
88 | - } |
|
77 | + public function propFind(PropFind $propFind, INode $node) { |
|
78 | + // If the node is neither readable nor writable then fail unless its of |
|
79 | + // the standard user-principal |
|
80 | + if(!($node instanceof User)) { |
|
81 | + $path = $propFind->getPath(); |
|
82 | + $readPermissions = $this->checkPrivileges($path, '{DAV:}read', self::R_PARENT, false); |
|
83 | + $writePermissions = $this->checkPrivileges($path, '{DAV:}write', self::R_PARENT, false); |
|
84 | + if ($readPermissions === false && $writePermissions === false) { |
|
85 | + $this->checkPrivileges($path, '{DAV:}read', self::R_PARENT, true); |
|
86 | + $this->checkPrivileges($path, '{DAV:}write', self::R_PARENT, true); |
|
87 | + } |
|
88 | + } |
|
89 | 89 | |
90 | - return parent::propFind($propFind, $node); |
|
91 | - } |
|
90 | + return parent::propFind($propFind, $node); |
|
91 | + } |
|
92 | 92 | } |
@@ -50,11 +50,11 @@ discard block |
||
50 | 50 | |
51 | 51 | function checkPrivileges($uri, $privileges, $recursion = self::R_PARENT, $throwExceptions = true) { |
52 | 52 | $access = parent::checkPrivileges($uri, $privileges, $recursion, false); |
53 | - if($access === false && $throwExceptions) { |
|
53 | + if ($access === false && $throwExceptions) { |
|
54 | 54 | /** @var INode $node */ |
55 | 55 | $node = $this->server->tree->getNodeForPath($uri); |
56 | 56 | |
57 | - switch(get_class($node)) { |
|
57 | + switch (get_class($node)) { |
|
58 | 58 | case 'OCA\DAV\CardDAV\AddressBook': |
59 | 59 | $type = 'Addressbook'; |
60 | 60 | break; |
@@ -77,7 +77,7 @@ discard block |
||
77 | 77 | public function propFind(PropFind $propFind, INode $node) { |
78 | 78 | // If the node is neither readable nor writable then fail unless its of |
79 | 79 | // the standard user-principal |
80 | - if(!($node instanceof User)) { |
|
80 | + if (!($node instanceof User)) { |
|
81 | 81 | $path = $propFind->getPath(); |
82 | 82 | $readPermissions = $this->checkPrivileges($path, '{DAV:}read', self::R_PARENT, false); |
83 | 83 | $writePermissions = $this->checkPrivileges($path, '{DAV:}write', self::R_PARENT, false); |
@@ -100,6 +100,7 @@ discard block |
||
100 | 100 | * @param int $type \OCP\Lock\ILockingProvider::LOCK_SHARED or \OCP\Lock\ILockingProvider::LOCK_EXCLUSIVE |
101 | 101 | * @param \OCP\Lock\ILockingProvider $provider |
102 | 102 | * @throws \OCP\Lock\LockedException |
103 | + * @return void |
|
103 | 104 | */ |
104 | 105 | public function acquireLock($path, $type, ILockingProvider $provider); |
105 | 106 | |
@@ -108,6 +109,7 @@ discard block |
||
108 | 109 | * @param int $type \OCP\Lock\ILockingProvider::LOCK_SHARED or \OCP\Lock\ILockingProvider::LOCK_EXCLUSIVE |
109 | 110 | * @param \OCP\Lock\ILockingProvider $provider |
110 | 111 | * @throws \OCP\Lock\LockedException |
112 | + * @return void |
|
111 | 113 | */ |
112 | 114 | public function releaseLock($path, $type, ILockingProvider $provider); |
113 | 115 | |
@@ -116,6 +118,7 @@ discard block |
||
116 | 118 | * @param int $type \OCP\Lock\ILockingProvider::LOCK_SHARED or \OCP\Lock\ILockingProvider::LOCK_EXCLUSIVE |
117 | 119 | * @param \OCP\Lock\ILockingProvider $provider |
118 | 120 | * @throws \OCP\Lock\LockedException |
121 | + * @return void |
|
119 | 122 | */ |
120 | 123 | public function changeLock($path, $type, ILockingProvider $provider); |
121 | 124 | } |
@@ -32,90 +32,90 @@ |
||
32 | 32 | */ |
33 | 33 | interface Storage extends \OCP\Files\Storage { |
34 | 34 | |
35 | - /** |
|
36 | - * get a cache instance for the storage |
|
37 | - * |
|
38 | - * @param string $path |
|
39 | - * @param \OC\Files\Storage\Storage (optional) the storage to pass to the cache |
|
40 | - * @return \OC\Files\Cache\Cache |
|
41 | - */ |
|
42 | - public function getCache($path = '', $storage = null); |
|
35 | + /** |
|
36 | + * get a cache instance for the storage |
|
37 | + * |
|
38 | + * @param string $path |
|
39 | + * @param \OC\Files\Storage\Storage (optional) the storage to pass to the cache |
|
40 | + * @return \OC\Files\Cache\Cache |
|
41 | + */ |
|
42 | + public function getCache($path = '', $storage = null); |
|
43 | 43 | |
44 | - /** |
|
45 | - * get a scanner instance for the storage |
|
46 | - * |
|
47 | - * @param string $path |
|
48 | - * @param \OC\Files\Storage\Storage (optional) the storage to pass to the scanner |
|
49 | - * @return \OC\Files\Cache\Scanner |
|
50 | - */ |
|
51 | - public function getScanner($path = '', $storage = null); |
|
44 | + /** |
|
45 | + * get a scanner instance for the storage |
|
46 | + * |
|
47 | + * @param string $path |
|
48 | + * @param \OC\Files\Storage\Storage (optional) the storage to pass to the scanner |
|
49 | + * @return \OC\Files\Cache\Scanner |
|
50 | + */ |
|
51 | + public function getScanner($path = '', $storage = null); |
|
52 | 52 | |
53 | 53 | |
54 | - /** |
|
55 | - * get the user id of the owner of a file or folder |
|
56 | - * |
|
57 | - * @param string $path |
|
58 | - * @return string |
|
59 | - */ |
|
60 | - public function getOwner($path); |
|
54 | + /** |
|
55 | + * get the user id of the owner of a file or folder |
|
56 | + * |
|
57 | + * @param string $path |
|
58 | + * @return string |
|
59 | + */ |
|
60 | + public function getOwner($path); |
|
61 | 61 | |
62 | - /** |
|
63 | - * get a watcher instance for the cache |
|
64 | - * |
|
65 | - * @param string $path |
|
66 | - * @param \OC\Files\Storage\Storage (optional) the storage to pass to the watcher |
|
67 | - * @return \OC\Files\Cache\Watcher |
|
68 | - */ |
|
69 | - public function getWatcher($path = '', $storage = null); |
|
62 | + /** |
|
63 | + * get a watcher instance for the cache |
|
64 | + * |
|
65 | + * @param string $path |
|
66 | + * @param \OC\Files\Storage\Storage (optional) the storage to pass to the watcher |
|
67 | + * @return \OC\Files\Cache\Watcher |
|
68 | + */ |
|
69 | + public function getWatcher($path = '', $storage = null); |
|
70 | 70 | |
71 | - /** |
|
72 | - * get a propagator instance for the cache |
|
73 | - * |
|
74 | - * @param \OC\Files\Storage\Storage (optional) the storage to pass to the watcher |
|
75 | - * @return \OC\Files\Cache\Propagator |
|
76 | - */ |
|
77 | - public function getPropagator($storage = null); |
|
71 | + /** |
|
72 | + * get a propagator instance for the cache |
|
73 | + * |
|
74 | + * @param \OC\Files\Storage\Storage (optional) the storage to pass to the watcher |
|
75 | + * @return \OC\Files\Cache\Propagator |
|
76 | + */ |
|
77 | + public function getPropagator($storage = null); |
|
78 | 78 | |
79 | - /** |
|
80 | - * get a updater instance for the cache |
|
81 | - * |
|
82 | - * @param \OC\Files\Storage\Storage (optional) the storage to pass to the watcher |
|
83 | - * @return \OC\Files\Cache\Updater |
|
84 | - */ |
|
85 | - public function getUpdater($storage = null); |
|
79 | + /** |
|
80 | + * get a updater instance for the cache |
|
81 | + * |
|
82 | + * @param \OC\Files\Storage\Storage (optional) the storage to pass to the watcher |
|
83 | + * @return \OC\Files\Cache\Updater |
|
84 | + */ |
|
85 | + public function getUpdater($storage = null); |
|
86 | 86 | |
87 | - /** |
|
88 | - * @return \OC\Files\Cache\Storage |
|
89 | - */ |
|
90 | - public function getStorageCache(); |
|
87 | + /** |
|
88 | + * @return \OC\Files\Cache\Storage |
|
89 | + */ |
|
90 | + public function getStorageCache(); |
|
91 | 91 | |
92 | - /** |
|
93 | - * @param string $path |
|
94 | - * @return array |
|
95 | - */ |
|
96 | - public function getMetaData($path); |
|
92 | + /** |
|
93 | + * @param string $path |
|
94 | + * @return array |
|
95 | + */ |
|
96 | + public function getMetaData($path); |
|
97 | 97 | |
98 | - /** |
|
99 | - * @param string $path The path of the file to acquire the lock for |
|
100 | - * @param int $type \OCP\Lock\ILockingProvider::LOCK_SHARED or \OCP\Lock\ILockingProvider::LOCK_EXCLUSIVE |
|
101 | - * @param \OCP\Lock\ILockingProvider $provider |
|
102 | - * @throws \OCP\Lock\LockedException |
|
103 | - */ |
|
104 | - public function acquireLock($path, $type, ILockingProvider $provider); |
|
98 | + /** |
|
99 | + * @param string $path The path of the file to acquire the lock for |
|
100 | + * @param int $type \OCP\Lock\ILockingProvider::LOCK_SHARED or \OCP\Lock\ILockingProvider::LOCK_EXCLUSIVE |
|
101 | + * @param \OCP\Lock\ILockingProvider $provider |
|
102 | + * @throws \OCP\Lock\LockedException |
|
103 | + */ |
|
104 | + public function acquireLock($path, $type, ILockingProvider $provider); |
|
105 | 105 | |
106 | - /** |
|
107 | - * @param string $path The path of the file to release the lock for |
|
108 | - * @param int $type \OCP\Lock\ILockingProvider::LOCK_SHARED or \OCP\Lock\ILockingProvider::LOCK_EXCLUSIVE |
|
109 | - * @param \OCP\Lock\ILockingProvider $provider |
|
110 | - * @throws \OCP\Lock\LockedException |
|
111 | - */ |
|
112 | - public function releaseLock($path, $type, ILockingProvider $provider); |
|
106 | + /** |
|
107 | + * @param string $path The path of the file to release the lock for |
|
108 | + * @param int $type \OCP\Lock\ILockingProvider::LOCK_SHARED or \OCP\Lock\ILockingProvider::LOCK_EXCLUSIVE |
|
109 | + * @param \OCP\Lock\ILockingProvider $provider |
|
110 | + * @throws \OCP\Lock\LockedException |
|
111 | + */ |
|
112 | + public function releaseLock($path, $type, ILockingProvider $provider); |
|
113 | 113 | |
114 | - /** |
|
115 | - * @param string $path The path of the file to change the lock for |
|
116 | - * @param int $type \OCP\Lock\ILockingProvider::LOCK_SHARED or \OCP\Lock\ILockingProvider::LOCK_EXCLUSIVE |
|
117 | - * @param \OCP\Lock\ILockingProvider $provider |
|
118 | - * @throws \OCP\Lock\LockedException |
|
119 | - */ |
|
120 | - public function changeLock($path, $type, ILockingProvider $provider); |
|
114 | + /** |
|
115 | + * @param string $path The path of the file to change the lock for |
|
116 | + * @param int $type \OCP\Lock\ILockingProvider::LOCK_SHARED or \OCP\Lock\ILockingProvider::LOCK_EXCLUSIVE |
|
117 | + * @param \OCP\Lock\ILockingProvider $provider |
|
118 | + * @throws \OCP\Lock\LockedException |
|
119 | + */ |
|
120 | + public function changeLock($path, $type, ILockingProvider $provider); |
|
121 | 121 | } |
@@ -2,17 +2,17 @@ |
||
2 | 2 | |
3 | 3 | <div class="section"> |
4 | 4 | <h2><?php p($l->t('File handling')); ?></h2> |
5 | - <label for="maxUploadSize"><?php p($l->t( 'Maximum upload size' )); ?> </label> |
|
5 | + <label for="maxUploadSize"><?php p($l->t('Maximum upload size')); ?> </label> |
|
6 | 6 | <span id="maxUploadSizeSettingsMsg" class="msg"></span> |
7 | 7 | <br /> |
8 | - <input type="text" name='maxUploadSize' id="maxUploadSize" value='<?php p($_['uploadMaxFilesize']) ?>' <?php if(!$_['uploadChangable']) { p('disabled'); } ?> /> |
|
9 | - <?php if($_['displayMaxPossibleUploadSize']):?> |
|
8 | + <input type="text" name='maxUploadSize' id="maxUploadSize" value='<?php p($_['uploadMaxFilesize']) ?>' <?php if (!$_['uploadChangable']) { p('disabled'); } ?> /> |
|
9 | + <?php if ($_['displayMaxPossibleUploadSize']):?> |
|
10 | 10 | (<?php p($l->t('max. possible: ')); p($_['maxPossibleUploadSize']) ?>) |
11 | - <?php endif;?> |
|
11 | + <?php endif; ?> |
|
12 | 12 | <input type="hidden" value="<?php p($_['requesttoken']); ?>" name="requesttoken" /> |
13 | - <?php if($_['uploadChangable']): ?> |
|
13 | + <?php if ($_['uploadChangable']): ?> |
|
14 | 14 | <input type="submit" id="submitMaxUpload" |
15 | - value="<?php p($l->t( 'Save' )); ?>"/> |
|
15 | + value="<?php p($l->t('Save')); ?>"/> |
|
16 | 16 | <p><em><?php p($l->t('With PHP-FPM it might take 5 minutes for changes to be applied.')); ?></em></p> |
17 | 17 | <?php else: ?> |
18 | 18 | <p><em><?php p($l->t('Missing permissions to edit from here.')); ?></em></p> |
@@ -14,7 +14,10 @@ |
||
14 | 14 | <input type="submit" id="submitMaxUpload" |
15 | 15 | value="<?php p($l->t( 'Save' )); ?>"/> |
16 | 16 | <p><em><?php p($l->t('With PHP-FPM it might take 5 minutes for changes to be applied.')); ?></em></p> |
17 | - <?php else: ?> |
|
18 | - <p><em><?php p($l->t('Missing permissions to edit from here.')); ?></em></p> |
|
17 | + <?php else { |
|
18 | + : ?> |
|
19 | + <p><em><?php p($l->t('Missing permissions to edit from here.')); |
|
20 | +} |
|
21 | +?></em></p> |
|
19 | 22 | <?php endif; ?> |
20 | 23 | </div> |
@@ -19,14 +19,14 @@ |
||
19 | 19 | <tr> |
20 | 20 | <th id='headerName' class="hidden column-name"> |
21 | 21 | <div id="headerName-container"> |
22 | - <a class="name sort columntitle" data-sort="name"><span><?php p($l->t( 'Name' )); ?></span><span class="sort-indicator"></span></a> |
|
22 | + <a class="name sort columntitle" data-sort="name"><span><?php p($l->t('Name')); ?></span><span class="sort-indicator"></span></a> |
|
23 | 23 | </div> |
24 | 24 | </th> |
25 | 25 | <th id="headerSize" class="hidden column-size"> |
26 | 26 | <a class="size sort columntitle" data-sort="size"><span><?php p($l->t('Size')); ?></span><span class="sort-indicator"></span></a> |
27 | 27 | </th> |
28 | 28 | <th id="headerDate" class="hidden column-mtime"> |
29 | - <a id="modified" class="columntitle" data-sort="mtime"><span><?php p($l->t( 'Modified' )); ?></span><span class="sort-indicator"></span></a> |
|
29 | + <a id="modified" class="columntitle" data-sort="mtime"><span><?php p($l->t('Modified')); ?></span><span class="sort-indicator"></span></a> |
|
30 | 30 | <span class="selectedActions"><a href="" class="delete-selected"> |
31 | 31 | <?php p($l->t('Delete'))?> |
32 | 32 | <img class="svg" alt="<?php p($l->t('Delete'))?>" |
@@ -26,7 +26,7 @@ discard block |
||
26 | 26 | $dir = '/'; |
27 | 27 | |
28 | 28 | if (isset($_GET['dir'])) { |
29 | - $dir = (string)$_GET['dir']; |
|
29 | + $dir = (string)$_GET['dir']; |
|
30 | 30 | } |
31 | 31 | |
32 | 32 | OCP\JSON::checkLoggedIn(); |
@@ -34,7 +34,7 @@ discard block |
||
34 | 34 | |
35 | 35 | // send back json |
36 | 36 | try { |
37 | - OCP\JSON::success(array('data' => \OCA\Files\Helper::buildFileStorageStatistics($dir))); |
|
37 | + OCP\JSON::success(array('data' => \OCA\Files\Helper::buildFileStorageStatistics($dir))); |
|
38 | 38 | } catch (\OCP\Files\NotFoundException $e) { |
39 | - OCP\JSON::error(['data' => ['message' => 'Folder not found']]); |
|
39 | + OCP\JSON::error(['data' => ['message' => 'Folder not found']]); |
|
40 | 40 | } |
@@ -26,7 +26,7 @@ |
||
26 | 26 | $dir = '/'; |
27 | 27 | |
28 | 28 | if (isset($_GET['dir'])) { |
29 | - $dir = (string)$_GET['dir']; |
|
29 | + $dir = (string) $_GET['dir']; |
|
30 | 30 | } |
31 | 31 | |
32 | 32 | OCP\JSON::checkLoggedIn(); |
@@ -28,7 +28,7 @@ discard block |
||
28 | 28 | $l = \OC::$server->getL10N('files'); |
29 | 29 | |
30 | 30 | // Load the files |
31 | -$dir = isset($_GET['dir']) ? (string)$_GET['dir'] : ''; |
|
31 | +$dir = isset($_GET['dir']) ? (string) $_GET['dir'] : ''; |
|
32 | 32 | $dir = \OC\Files\Filesystem::normalizePath($dir); |
33 | 33 | |
34 | 34 | try { |
@@ -39,11 +39,11 @@ discard block |
||
39 | 39 | } |
40 | 40 | |
41 | 41 | $data = array(); |
42 | - $baseUrl = OCP\Util::linkTo('files', 'index.php') . '?dir='; |
|
42 | + $baseUrl = OCP\Util::linkTo('files', 'index.php').'?dir='; |
|
43 | 43 | |
44 | 44 | $permissions = $dirInfo->getPermissions(); |
45 | 45 | |
46 | - $sortAttribute = isset($_GET['sort']) ? (string)$_GET['sort'] : 'name'; |
|
46 | + $sortAttribute = isset($_GET['sort']) ? (string) $_GET['sort'] : 'name'; |
|
47 | 47 | $sortDirection = isset($_GET['sortdirection']) ? ($_GET['sortdirection'] === 'desc') : false; |
48 | 48 | $mimetypeFilters = isset($_GET['mimetypes']) ? json_decode($_GET['mimetypes']) : ''; |
49 | 49 |
@@ -32,72 +32,72 @@ |
||
32 | 32 | $dir = \OC\Files\Filesystem::normalizePath($dir); |
33 | 33 | |
34 | 34 | try { |
35 | - $dirInfo = \OC\Files\Filesystem::getFileInfo($dir); |
|
36 | - if (!$dirInfo || !$dirInfo->getType() === 'dir') { |
|
37 | - header("HTTP/1.0 404 Not Found"); |
|
38 | - exit(); |
|
39 | - } |
|
35 | + $dirInfo = \OC\Files\Filesystem::getFileInfo($dir); |
|
36 | + if (!$dirInfo || !$dirInfo->getType() === 'dir') { |
|
37 | + header("HTTP/1.0 404 Not Found"); |
|
38 | + exit(); |
|
39 | + } |
|
40 | 40 | |
41 | - $data = array(); |
|
42 | - $baseUrl = OCP\Util::linkTo('files', 'index.php') . '?dir='; |
|
41 | + $data = array(); |
|
42 | + $baseUrl = OCP\Util::linkTo('files', 'index.php') . '?dir='; |
|
43 | 43 | |
44 | - $permissions = $dirInfo->getPermissions(); |
|
44 | + $permissions = $dirInfo->getPermissions(); |
|
45 | 45 | |
46 | - $sortAttribute = isset($_GET['sort']) ? (string)$_GET['sort'] : 'name'; |
|
47 | - $sortDirection = isset($_GET['sortdirection']) ? ($_GET['sortdirection'] === 'desc') : false; |
|
48 | - $mimetypeFilters = isset($_GET['mimetypes']) ? json_decode($_GET['mimetypes']) : ''; |
|
46 | + $sortAttribute = isset($_GET['sort']) ? (string)$_GET['sort'] : 'name'; |
|
47 | + $sortDirection = isset($_GET['sortdirection']) ? ($_GET['sortdirection'] === 'desc') : false; |
|
48 | + $mimetypeFilters = isset($_GET['mimetypes']) ? json_decode($_GET['mimetypes']) : ''; |
|
49 | 49 | |
50 | - $files = []; |
|
51 | - // Clean up duplicates from array |
|
52 | - if (is_array($mimetypeFilters) && count($mimetypeFilters)) { |
|
53 | - $mimetypeFilters = array_unique($mimetypeFilters); |
|
50 | + $files = []; |
|
51 | + // Clean up duplicates from array |
|
52 | + if (is_array($mimetypeFilters) && count($mimetypeFilters)) { |
|
53 | + $mimetypeFilters = array_unique($mimetypeFilters); |
|
54 | 54 | |
55 | - if (!in_array('httpd/unix-directory', $mimetypeFilters)) { |
|
56 | - // append folder filter to be able to browse folders |
|
57 | - $mimetypeFilters[] = 'httpd/unix-directory'; |
|
58 | - } |
|
55 | + if (!in_array('httpd/unix-directory', $mimetypeFilters)) { |
|
56 | + // append folder filter to be able to browse folders |
|
57 | + $mimetypeFilters[] = 'httpd/unix-directory'; |
|
58 | + } |
|
59 | 59 | |
60 | - // create filelist with mimetype filter - as getFiles only supports on |
|
61 | - // mimetype filter at once we will filter this folder for each |
|
62 | - // mimetypeFilter |
|
63 | - foreach ($mimetypeFilters as $mimetypeFilter) { |
|
64 | - $files = array_merge($files, \OCA\Files\Helper::getFiles($dir, $sortAttribute, $sortDirection, $mimetypeFilter)); |
|
65 | - } |
|
60 | + // create filelist with mimetype filter - as getFiles only supports on |
|
61 | + // mimetype filter at once we will filter this folder for each |
|
62 | + // mimetypeFilter |
|
63 | + foreach ($mimetypeFilters as $mimetypeFilter) { |
|
64 | + $files = array_merge($files, \OCA\Files\Helper::getFiles($dir, $sortAttribute, $sortDirection, $mimetypeFilter)); |
|
65 | + } |
|
66 | 66 | |
67 | - // sort the files accordingly |
|
68 | - $files = \OCA\Files\Helper::sortFiles($files, $sortAttribute, $sortDirection); |
|
69 | - } else { |
|
70 | - // create file list without mimetype filter |
|
71 | - $files = \OCA\Files\Helper::getFiles($dir, $sortAttribute, $sortDirection); |
|
72 | - } |
|
67 | + // sort the files accordingly |
|
68 | + $files = \OCA\Files\Helper::sortFiles($files, $sortAttribute, $sortDirection); |
|
69 | + } else { |
|
70 | + // create file list without mimetype filter |
|
71 | + $files = \OCA\Files\Helper::getFiles($dir, $sortAttribute, $sortDirection); |
|
72 | + } |
|
73 | 73 | |
74 | - $data['directory'] = $dir; |
|
75 | - $data['files'] = \OCA\Files\Helper::formatFileInfos($files); |
|
76 | - $data['permissions'] = $permissions; |
|
74 | + $data['directory'] = $dir; |
|
75 | + $data['files'] = \OCA\Files\Helper::formatFileInfos($files); |
|
76 | + $data['permissions'] = $permissions; |
|
77 | 77 | |
78 | - OCP\JSON::success(array('data' => $data)); |
|
78 | + OCP\JSON::success(array('data' => $data)); |
|
79 | 79 | } catch (\OCP\Files\StorageNotAvailableException $e) { |
80 | - \OCP\Util::logException('files', $e); |
|
81 | - OCP\JSON::error([ |
|
82 | - 'data' => [ |
|
83 | - 'exception' => '\OCP\Files\StorageNotAvailableException', |
|
84 | - 'message' => $l->t('Storage is temporarily not available') |
|
85 | - ] |
|
86 | - ]); |
|
80 | + \OCP\Util::logException('files', $e); |
|
81 | + OCP\JSON::error([ |
|
82 | + 'data' => [ |
|
83 | + 'exception' => '\OCP\Files\StorageNotAvailableException', |
|
84 | + 'message' => $l->t('Storage is temporarily not available') |
|
85 | + ] |
|
86 | + ]); |
|
87 | 87 | } catch (\OCP\Files\StorageInvalidException $e) { |
88 | - \OCP\Util::logException('files', $e); |
|
89 | - OCP\JSON::error(array( |
|
90 | - 'data' => array( |
|
91 | - 'exception' => '\OCP\Files\StorageInvalidException', |
|
92 | - 'message' => $l->t('Storage invalid') |
|
93 | - ) |
|
94 | - )); |
|
88 | + \OCP\Util::logException('files', $e); |
|
89 | + OCP\JSON::error(array( |
|
90 | + 'data' => array( |
|
91 | + 'exception' => '\OCP\Files\StorageInvalidException', |
|
92 | + 'message' => $l->t('Storage invalid') |
|
93 | + ) |
|
94 | + )); |
|
95 | 95 | } catch (\Exception $e) { |
96 | - \OCP\Util::logException('files', $e); |
|
97 | - OCP\JSON::error(array( |
|
98 | - 'data' => array( |
|
99 | - 'exception' => '\Exception', |
|
100 | - 'message' => $l->t('Unknown error') |
|
101 | - ) |
|
102 | - )); |
|
96 | + \OCP\Util::logException('files', $e); |
|
97 | + OCP\JSON::error(array( |
|
98 | + 'data' => array( |
|
99 | + 'exception' => '\Exception', |
|
100 | + 'message' => $l->t('Unknown error') |
|
101 | + ) |
|
102 | + )); |
|
103 | 103 | } |
@@ -37,7 +37,7 @@ discard block |
||
37 | 37 | $files_list = json_decode($files); |
38 | 38 | // in case we get only a single file |
39 | 39 | if (!is_array($files_list)) { |
40 | - $files_list = array($files); |
|
40 | + $files_list = array($files); |
|
41 | 41 | } |
42 | 42 | |
43 | 43 | /** |
@@ -46,9 +46,9 @@ discard block |
||
46 | 46 | * alphanumeric characters |
47 | 47 | */ |
48 | 48 | if(isset($_GET['downloadStartSecret']) |
49 | - && !isset($_GET['downloadStartSecret'][32]) |
|
50 | - && preg_match('!^[a-zA-Z0-9]+$!', $_GET['downloadStartSecret']) === 1) { |
|
51 | - setcookie('ocDownloadStarted', $_GET['downloadStartSecret'], time() + 20, '/'); |
|
49 | + && !isset($_GET['downloadStartSecret'][32]) |
|
50 | + && preg_match('!^[a-zA-Z0-9]+$!', $_GET['downloadStartSecret']) === 1) { |
|
51 | + setcookie('ocDownloadStarted', $_GET['downloadStartSecret'], time() + 20, '/'); |
|
52 | 52 | } |
53 | 53 | |
54 | 54 | $server_params = array( 'head' => \OC::$server->getRequest()->getMethod() == 'HEAD' ); |
@@ -57,7 +57,7 @@ discard block |
||
57 | 57 | * Http range requests support |
58 | 58 | */ |
59 | 59 | if (isset($_SERVER['HTTP_RANGE'])) { |
60 | - $server_params['range'] = \OC::$server->getRequest()->getHeader('Range'); |
|
60 | + $server_params['range'] = \OC::$server->getRequest()->getHeader('Range'); |
|
61 | 61 | } |
62 | 62 | |
63 | 63 | OC_Files::get($dir, $files_list, $server_params); |
@@ -31,8 +31,8 @@ discard block |
||
31 | 31 | OCP\User::checkLoggedIn(); |
32 | 32 | \OC::$server->getSession()->close(); |
33 | 33 | |
34 | -$files = isset($_GET['files']) ? (string)$_GET['files'] : ''; |
|
35 | -$dir = isset($_GET['dir']) ? (string)$_GET['dir'] : ''; |
|
34 | +$files = isset($_GET['files']) ? (string) $_GET['files'] : ''; |
|
35 | +$dir = isset($_GET['dir']) ? (string) $_GET['dir'] : ''; |
|
36 | 36 | |
37 | 37 | $files_list = json_decode($files); |
38 | 38 | // in case we get only a single file |
@@ -45,13 +45,13 @@ discard block |
||
45 | 45 | * the content must not be longer than 32 characters and must only contain |
46 | 46 | * alphanumeric characters |
47 | 47 | */ |
48 | -if(isset($_GET['downloadStartSecret']) |
|
48 | +if (isset($_GET['downloadStartSecret']) |
|
49 | 49 | && !isset($_GET['downloadStartSecret'][32]) |
50 | 50 | && preg_match('!^[a-zA-Z0-9]+$!', $_GET['downloadStartSecret']) === 1) { |
51 | 51 | setcookie('ocDownloadStarted', $_GET['downloadStartSecret'], time() + 20, '/'); |
52 | 52 | } |
53 | 53 | |
54 | -$server_params = array( 'head' => \OC::$server->getRequest()->getMethod() == 'HEAD' ); |
|
54 | +$server_params = array('head' => \OC::$server->getRequest()->getMethod() == 'HEAD'); |
|
55 | 55 | |
56 | 56 | /** |
57 | 57 | * Http range requests support |