@@ -113,11 +113,11 @@ discard block |
||
113 | 113 | $values = $this->appConfig->getValues(false, 'enabled'); |
114 | 114 | |
115 | 115 | $alwaysEnabledApps = $this->getAlwaysEnabledApps(); |
116 | - foreach($alwaysEnabledApps as $appId) { |
|
116 | + foreach ($alwaysEnabledApps as $appId) { |
|
117 | 117 | $values[$appId] = 'yes'; |
118 | 118 | } |
119 | 119 | |
120 | - $this->installedAppsCache = array_filter($values, function ($value) { |
|
120 | + $this->installedAppsCache = array_filter($values, function($value) { |
|
121 | 121 | return $value !== 'no'; |
122 | 122 | }); |
123 | 123 | ksort($this->installedAppsCache); |
@@ -142,7 +142,7 @@ discard block |
||
142 | 142 | */ |
143 | 143 | public function getEnabledAppsForUser(IUser $user) { |
144 | 144 | $apps = $this->getInstalledAppsValues(); |
145 | - $appsForUser = array_filter($apps, function ($enabled) use ($user) { |
|
145 | + $appsForUser = array_filter($apps, function($enabled) use ($user) { |
|
146 | 146 | return $this->checkAppForUser($enabled, $user); |
147 | 147 | }); |
148 | 148 | return array_keys($appsForUser); |
@@ -181,7 +181,7 @@ discard block |
||
181 | 181 | } elseif ($user === null) { |
182 | 182 | return false; |
183 | 183 | } else { |
184 | - if(empty($enabled)){ |
|
184 | + if (empty($enabled)) { |
|
185 | 185 | return false; |
186 | 186 | } |
187 | 187 | |
@@ -189,7 +189,7 @@ discard block |
||
189 | 189 | |
190 | 190 | if (!is_array($groupIds)) { |
191 | 191 | $jsonError = json_last_error(); |
192 | - \OC::$server->getLogger()->warning('AppManger::checkAppForUser - can\'t decode group IDs: ' . print_r($enabled, true) . ' - json error code: ' . $jsonError, ['app' => 'lib']); |
|
192 | + \OC::$server->getLogger()->warning('AppManger::checkAppForUser - can\'t decode group IDs: '.print_r($enabled, true).' - json error code: '.$jsonError, ['app' => 'lib']); |
|
193 | 193 | return false; |
194 | 194 | } |
195 | 195 | |
@@ -263,7 +263,7 @@ discard block |
||
263 | 263 | } |
264 | 264 | } |
265 | 265 | |
266 | - $groupIds = array_map(function ($group) { |
|
266 | + $groupIds = array_map(function($group) { |
|
267 | 267 | /** @var \OCP\IGroup $group */ |
268 | 268 | return $group->getGID(); |
269 | 269 | }, $groups); |
@@ -302,8 +302,8 @@ discard block |
||
302 | 302 | */ |
303 | 303 | public function getAppPath($appId) { |
304 | 304 | $appPath = \OC_App::getAppPath($appId); |
305 | - if($appPath === false) { |
|
306 | - throw new AppPathNotFoundException('Could not find path for ' . $appId); |
|
305 | + if ($appPath === false) { |
|
306 | + throw new AppPathNotFoundException('Could not find path for '.$appId); |
|
307 | 307 | } |
308 | 308 | return $appPath; |
309 | 309 | } |
@@ -363,7 +363,7 @@ discard block |
||
363 | 363 | } catch (AppPathNotFoundException $e) { |
364 | 364 | return null; |
365 | 365 | } |
366 | - $file = $appPath . '/appinfo/info.xml'; |
|
366 | + $file = $appPath.'/appinfo/info.xml'; |
|
367 | 367 | } |
368 | 368 | |
369 | 369 | $parser = new InfoParser($this->memCacheFactory->createLocal('core.appinfo')); |
@@ -381,7 +381,7 @@ discard block |
||
381 | 381 | } |
382 | 382 | |
383 | 383 | public function getAppVersion(string $appId, bool $useCache = true): string { |
384 | - if(!$useCache || !isset($this->appVersions[$appId])) { |
|
384 | + if (!$useCache || !isset($this->appVersions[$appId])) { |
|
385 | 385 | $appInfo = \OC::$server->getAppManager()->getAppInfo($appId); |
386 | 386 | $this->appVersions[$appId] = ($appInfo !== null && isset($appInfo['version'])) ? $appInfo['version'] : '0'; |
387 | 387 | } |
@@ -429,7 +429,7 @@ discard block |
||
429 | 429 | */ |
430 | 430 | private function loadShippedJson() { |
431 | 431 | if ($this->shippedApps === null) { |
432 | - $shippedJson = \OC::$SERVERROOT . '/core/shipped.json'; |
|
432 | + $shippedJson = \OC::$SERVERROOT.'/core/shipped.json'; |
|
433 | 433 | if (!file_exists($shippedJson)) { |
434 | 434 | throw new \Exception("File not found: $shippedJson"); |
435 | 435 | } |
@@ -53,7 +53,7 @@ discard block |
||
53 | 53 | $appId = $input->getArgument('app-id'); |
54 | 54 | |
55 | 55 | if (\OC_App::getAppPath($appId)) { |
56 | - $output->writeln($appId . ' already installed'); |
|
56 | + $output->writeln($appId.' already installed'); |
|
57 | 57 | return 1; |
58 | 58 | } |
59 | 59 | |
@@ -61,22 +61,22 @@ discard block |
||
61 | 61 | $installer = \OC::$server->query(Installer::class); |
62 | 62 | $installer->downloadApp($appId); |
63 | 63 | $result = $installer->installApp($appId); |
64 | - } catch(\Exception $e) { |
|
65 | - $output->writeln('Error: ' . $e->getMessage()); |
|
64 | + } catch (\Exception $e) { |
|
65 | + $output->writeln('Error: '.$e->getMessage()); |
|
66 | 66 | return 1; |
67 | 67 | } |
68 | 68 | |
69 | - if($result === false) { |
|
70 | - $output->writeln($appId . ' couldn\'t be installed'); |
|
69 | + if ($result === false) { |
|
70 | + $output->writeln($appId.' couldn\'t be installed'); |
|
71 | 71 | return 1; |
72 | 72 | } |
73 | 73 | |
74 | - $output->writeln($appId . ' installed'); |
|
74 | + $output->writeln($appId.' installed'); |
|
75 | 75 | |
76 | 76 | if (!$input->getOption('keep-disabled')) { |
77 | 77 | $appClass = new \OC_App(); |
78 | 78 | $appClass->enable($appId); |
79 | - $output->writeln($appId . ' enabled'); |
|
79 | + $output->writeln($appId.' enabled'); |
|
80 | 80 | } |
81 | 81 | |
82 | 82 | return 0; |
@@ -141,12 +141,12 @@ discard block |
||
141 | 141 | return $storage->getId(); |
142 | 142 | }, $storages)); |
143 | 143 | |
144 | - $availableStorages = array_map(function (Storage\IStorage $storage, StorageConfig $storageConfig) { |
|
144 | + $availableStorages = array_map(function(Storage\IStorage $storage, StorageConfig $storageConfig) { |
|
145 | 145 | try { |
146 | 146 | $availability = $storage->getAvailability(); |
147 | 147 | if (!$availability['available'] && !Availability::shouldRecheck($availability)) { |
148 | 148 | $storage = new FailedStorage([ |
149 | - 'exception' => new StorageNotAvailableException('Storage with mount id ' . $storageConfig->getId() . ' is not available') |
|
149 | + 'exception' => new StorageNotAvailableException('Storage with mount id '.$storageConfig->getId().' is not available') |
|
150 | 150 | ]); |
151 | 151 | } |
152 | 152 | } catch (\Exception $e) { |
@@ -162,7 +162,7 @@ discard block |
||
162 | 162 | $this->userStoragesService, |
163 | 163 | $storageConfig->getId(), |
164 | 164 | $storage, |
165 | - '/' . $user->getUID() . '/files' . $storageConfig->getMountPoint(), |
|
165 | + '/'.$user->getUID().'/files'.$storageConfig->getMountPoint(), |
|
166 | 166 | null, |
167 | 167 | $loader, |
168 | 168 | $storageConfig->getMountOptions() |
@@ -170,7 +170,7 @@ discard block |
||
170 | 170 | } else { |
171 | 171 | return new ExternalMountPoint( |
172 | 172 | $storage, |
173 | - '/' . $user->getUID() . '/files' . $storageConfig->getMountPoint(), |
|
173 | + '/'.$user->getUID().'/files'.$storageConfig->getMountPoint(), |
|
174 | 174 | null, |
175 | 175 | $loader, |
176 | 176 | $storageConfig->getMountOptions(), |
@@ -1,11 +1,11 @@ discard block |
||
1 | 1 | <fieldset id="ldapWizard2"> |
2 | 2 | <div> |
3 | 3 | <p> |
4 | - <?php p($l->t('Listing and searching for users is constrained by these criteria:'));?> |
|
4 | + <?php p($l->t('Listing and searching for users is constrained by these criteria:')); ?> |
|
5 | 5 | </p> |
6 | 6 | <p> |
7 | 7 | <label for="ldap_userfilter_objectclass"> |
8 | - <?php p($l->t('Only these object classes:'));?> |
|
8 | + <?php p($l->t('Only these object classes:')); ?> |
|
9 | 9 | </label> |
10 | 10 | |
11 | 11 | <select id="ldap_userfilter_objectclass" multiple="multiple" |
@@ -14,14 +14,14 @@ discard block |
||
14 | 14 | </p> |
15 | 15 | <p> |
16 | 16 | <label></label> |
17 | - <span class="ldapInputColElement"><?php p($l->t('The most common object classes for users are organizationalPerson, person, user, and inetOrgPerson. If you are not sure which object class to select, please consult your directory admin.'));?></span> |
|
17 | + <span class="ldapInputColElement"><?php p($l->t('The most common object classes for users are organizationalPerson, person, user, and inetOrgPerson. If you are not sure which object class to select, please consult your directory admin.')); ?></span> |
|
18 | 18 | </p> |
19 | 19 | <p> |
20 | 20 | <label for="ldap_userfilter_groups"> |
21 | - <?php p($l->t('Only from these groups:'));?> |
|
21 | + <?php p($l->t('Only from these groups:')); ?> |
|
22 | 22 | </label> |
23 | 23 | |
24 | - <input type="text" class="ldapManyGroupsSupport ldapManyGroupsSearch hidden" placeholder="<?php p($l->t('Search groups'));?>" /> |
|
24 | + <input type="text" class="ldapManyGroupsSupport ldapManyGroupsSearch hidden" placeholder="<?php p($l->t('Search groups')); ?>" /> |
|
25 | 25 | |
26 | 26 | <select id="ldap_userfilter_groups" multiple="multiple" |
27 | 27 | name="ldap_userfilter_groups" class="multiSelectPlugin"> |
@@ -30,26 +30,26 @@ discard block |
||
30 | 30 | <p class="ldapManyGroupsSupport hidden"> |
31 | 31 | <label></label> |
32 | 32 | <select class="ldapGroupList ldapGroupListAvailable" multiple="multiple" |
33 | - title="<?php p($l->t('Available groups'));?>"></select> |
|
33 | + title="<?php p($l->t('Available groups')); ?>"></select> |
|
34 | 34 | <span class="buttonSpan"> |
35 | 35 | <button class="ldapGroupListSelect" type="button">></button><br/> |
36 | 36 | <button class="ldapGroupListDeselect" type="button"><</button> |
37 | 37 | </span> |
38 | 38 | <select class="ldapGroupList ldapGroupListSelected" multiple="multiple" |
39 | - title="<?php p($l->t('Selected groups'));?>"></select> |
|
39 | + title="<?php p($l->t('Selected groups')); ?>"></select> |
|
40 | 40 | </p> |
41 | 41 | <p> |
42 | - <label><a id='toggleRawUserFilter' class='ldapToggle'>↓ <?php p($l->t('Edit LDAP Query'));?></a></label> |
|
42 | + <label><a id='toggleRawUserFilter' class='ldapToggle'>↓ <?php p($l->t('Edit LDAP Query')); ?></a></label> |
|
43 | 43 | </p> |
44 | 44 | <p id="ldapReadOnlyUserFilterContainer" class="hidden ldapReadOnlyFilterContainer"> |
45 | - <label><?php p($l->t('LDAP Filter:'));?></label> |
|
45 | + <label><?php p($l->t('LDAP Filter:')); ?></label> |
|
46 | 46 | <span class="ldapFilterReadOnlyElement ldapInputColElement"></span> |
47 | 47 | </p> |
48 | 48 | <p id="rawUserFilterContainer"> |
49 | 49 | <textarea type="text" id="ldap_userlist_filter" name="ldap_userlist_filter" |
50 | 50 | class="ldapFilterInputElement" |
51 | - placeholder="<?php p($l->t('Edit LDAP Query'));?>" |
|
52 | - title="<?php p($l->t('The filter specifies which LDAP users shall have access to the %s instance.', [$theme->getName()]));?>"> |
|
51 | + placeholder="<?php p($l->t('Edit LDAP Query')); ?>" |
|
52 | + title="<?php p($l->t('The filter specifies which LDAP users shall have access to the %s instance.', [$theme->getName()])); ?>"> |
|
53 | 53 | </textarea> |
54 | 54 | </p> |
55 | 55 | <p> |
@@ -57,7 +57,7 @@ discard block |
||
57 | 57 | </p> |
58 | 58 | <p class="ldap_count"> |
59 | 59 | <button class="ldapGetEntryCount ldapGetUserCount" name="ldapGetEntryCount" type="button"> |
60 | - <?php p($l->t('Verify settings and count users'));?> |
|
60 | + <?php p($l->t('Verify settings and count users')); ?> |
|
61 | 61 | </button> |
62 | 62 | <span id="ldap_user_count"></span> |
63 | 63 | </p> |
@@ -1,11 +1,11 @@ discard block |
||
1 | 1 | <fieldset id="ldapWizard4"> |
2 | 2 | <div> |
3 | 3 | <p> |
4 | - <?php p($l->t('Groups meeting these criteria are available in %s:', [$theme->getName()]));?> |
|
4 | + <?php p($l->t('Groups meeting these criteria are available in %s:', [$theme->getName()])); ?> |
|
5 | 5 | </p> |
6 | 6 | <p> |
7 | 7 | <label for="ldap_groupfilter_objectclass"> |
8 | - <?php p($l->t('Only these object classes:'));?> |
|
8 | + <?php p($l->t('Only these object classes:')); ?> |
|
9 | 9 | </label> |
10 | 10 | |
11 | 11 | <select id="ldap_groupfilter_objectclass" multiple="multiple" |
@@ -14,10 +14,10 @@ discard block |
||
14 | 14 | </p> |
15 | 15 | <p> |
16 | 16 | <label for="ldap_groupfilter_groups"> |
17 | - <?php p($l->t('Only from these groups:'));?> |
|
17 | + <?php p($l->t('Only from these groups:')); ?> |
|
18 | 18 | </label> |
19 | 19 | |
20 | - <input type="text" class="ldapManyGroupsSupport ldapManyGroupsSearch hidden" placeholder="<?php p($l->t('Search groups'));?>" /> |
|
20 | + <input type="text" class="ldapManyGroupsSupport ldapManyGroupsSearch hidden" placeholder="<?php p($l->t('Search groups')); ?>" /> |
|
21 | 21 | |
22 | 22 | <select id="ldap_groupfilter_groups" multiple="multiple" |
23 | 23 | name="ldap_groupfilter_groups" class="multiSelectPlugin"> |
@@ -27,25 +27,25 @@ discard block |
||
27 | 27 | <p class="ldapManyGroupsSupport hidden"> |
28 | 28 | <label></label> |
29 | 29 | <select class="ldapGroupList ldapGroupListAvailable" multiple="multiple" |
30 | - title="<?php p($l->t('Available groups'));?>"></select> |
|
30 | + title="<?php p($l->t('Available groups')); ?>"></select> |
|
31 | 31 | <span class="buttonSpan"> |
32 | 32 | <button class="ldapGroupListSelect" type="button">></button><br/> |
33 | 33 | <button class="ldapGroupListDeselect" type="button"><</button> |
34 | 34 | </span> |
35 | 35 | <select class="ldapGroupList ldapGroupListSelected" multiple="multiple" |
36 | - title="<?php p($l->t('Selected groups'));?>"></select> |
|
36 | + title="<?php p($l->t('Selected groups')); ?>"></select> |
|
37 | 37 | </p> |
38 | 38 | <p> |
39 | - <label><a id='toggleRawGroupFilter' class='ldapToggle'>↓ <?php p($l->t('Edit LDAP Query'));?></a></label> |
|
39 | + <label><a id='toggleRawGroupFilter' class='ldapToggle'>↓ <?php p($l->t('Edit LDAP Query')); ?></a></label> |
|
40 | 40 | </p> |
41 | 41 | <p id="ldapReadOnlyGroupFilterContainer" class="hidden ldapReadOnlyFilterContainer"> |
42 | - <label><?php p($l->t('LDAP Filter:'));?></label> |
|
42 | + <label><?php p($l->t('LDAP Filter:')); ?></label> |
|
43 | 43 | <span class="ldapFilterReadOnlyElement ldapInputColElement"></span> |
44 | 44 | </p> |
45 | 45 | <p id="rawGroupFilterContainer" class="invisible"> |
46 | 46 | <textarea type="text" id="ldap_group_filter" name="ldap_group_filter" |
47 | - placeholder="<?php p($l->t('Edit LDAP Query'));?>" |
|
48 | - title="<?php p($l->t('The filter specifies which LDAP groups shall have access to the %s instance.', [$theme->getName()]));?>"> |
|
47 | + placeholder="<?php p($l->t('Edit LDAP Query')); ?>" |
|
48 | + title="<?php p($l->t('The filter specifies which LDAP groups shall have access to the %s instance.', [$theme->getName()])); ?>"> |
|
49 | 49 | </textarea> |
50 | 50 | </p> |
51 | 51 | <p> |
@@ -53,7 +53,7 @@ discard block |
||
53 | 53 | </p> |
54 | 54 | <p class="ldap_count"> |
55 | 55 | <button class="ldapGetEntryCount ldapGetGroupCount" name="ldapGetEntryCount" type="button"> |
56 | - <?php p($l->t('Verify settings and count the groups'));?> |
|
56 | + <?php p($l->t('Verify settings and count the groups')); ?> |
|
57 | 57 | </button> |
58 | 58 | <span id="ldap_group_count"></span> |
59 | 59 | </p> |
@@ -1,29 +1,29 @@ discard block |
||
1 | 1 | <fieldset id="ldapWizard3"> |
2 | 2 | <div> |
3 | 3 | <p> |
4 | - <?php p($l->t('When logging in, %s will find the user based on the following attributes:', [$theme->getName()]));?> |
|
4 | + <?php p($l->t('When logging in, %s will find the user based on the following attributes:', [$theme->getName()])); ?> |
|
5 | 5 | </p> |
6 | 6 | <p> |
7 | 7 | <label for="ldap_loginfilter_username"> |
8 | - <?php p($l->t('LDAP / AD Username:'));?> |
|
8 | + <?php p($l->t('LDAP / AD Username:')); ?> |
|
9 | 9 | </label> |
10 | 10 | |
11 | 11 | <input type="checkbox" id="ldap_loginfilter_username" |
12 | - title="<?php p($l->t('Allows login against the LDAP / AD username, which is either "uid" or "sAMAccountName" and will be detected.'));?>" |
|
12 | + title="<?php p($l->t('Allows login against the LDAP / AD username, which is either "uid" or "sAMAccountName" and will be detected.')); ?>" |
|
13 | 13 | name="ldap_loginfilter_username" value="1" /> |
14 | 14 | </p> |
15 | 15 | <p> |
16 | 16 | <label for="ldap_loginfilter_email"> |
17 | - <?php p($l->t('LDAP / AD Email Address:'));?> |
|
17 | + <?php p($l->t('LDAP / AD Email Address:')); ?> |
|
18 | 18 | </label> |
19 | 19 | |
20 | 20 | <input type="checkbox" id="ldap_loginfilter_email" |
21 | - title="<?php p($l->t('Allows login against an email attribute. "mail" and "mailPrimaryAddress" allowed.'));?>" |
|
21 | + title="<?php p($l->t('Allows login against an email attribute. "mail" and "mailPrimaryAddress" allowed.')); ?>" |
|
22 | 22 | name="ldap_loginfilter_email" value="1" /> |
23 | 23 | </p> |
24 | 24 | <p> |
25 | 25 | <label for="ldap_loginfilter_attributes"> |
26 | - <?php p($l->t('Other Attributes:'));?> |
|
26 | + <?php p($l->t('Other Attributes:')); ?> |
|
27 | 27 | </label> |
28 | 28 | |
29 | 29 | <select id="ldap_loginfilter_attributes" multiple="multiple" |
@@ -31,17 +31,17 @@ discard block |
||
31 | 31 | </select> |
32 | 32 | </p> |
33 | 33 | <p> |
34 | - <label><a id='toggleRawLoginFilter' class='ldapToggle'>↓ <?php p($l->t('Edit LDAP Query'));?></a></label> |
|
34 | + <label><a id='toggleRawLoginFilter' class='ldapToggle'>↓ <?php p($l->t('Edit LDAP Query')); ?></a></label> |
|
35 | 35 | </p> |
36 | 36 | <p id="ldapReadOnlyLoginFilterContainer" class="hidden ldapReadOnlyFilterContainer"> |
37 | - <label><?php p($l->t('LDAP Filter:'));?></label> |
|
37 | + <label><?php p($l->t('LDAP Filter:')); ?></label> |
|
38 | 38 | <span class="ldapFilterReadOnlyElement ldapInputColElement"></span> |
39 | 39 | </p> |
40 | 40 | <p id="rawLoginFilterContainer" class="invisible"> |
41 | 41 | <textarea type="text" id="ldap_login_filter" name="ldap_login_filter" |
42 | 42 | class="ldapFilterInputElement" |
43 | - placeholder="<?php p($l->t('Edit LDAP Query'));?>" |
|
44 | - title="<?php p($l->t('Defines the filter to apply, when login is attempted. "%%uid" replaces the username in the login action. Example: "uid=%%uid"'));?>"> |
|
43 | + placeholder="<?php p($l->t('Edit LDAP Query')); ?>" |
|
44 | + title="<?php p($l->t('Defines the filter to apply, when login is attempted. "%%uid" replaces the username in the login action. Example: "uid=%%uid"')); ?>"> |
|
45 | 45 | </textarea> |
46 | 46 | </p> |
47 | 47 | <p> |
@@ -49,11 +49,11 @@ discard block |
||
49 | 49 | </p> |
50 | 50 | <p class="ldap_verify"> |
51 | 51 | <input type="text" id="ldap_test_loginname" name="ldap_test_loginname" |
52 | - placeholder="<?php p($l->t('Test Loginname'));?>" |
|
52 | + placeholder="<?php p($l->t('Test Loginname')); ?>" |
|
53 | 53 | class="ldapVerifyInput" |
54 | 54 | title="Attempts to receive a DN for the given loginname and the current login filter"/> |
55 | 55 | <button class="ldapVerifyLoginName" name="ldapTestLoginSettings" type="button" disabled="disabled"> |
56 | - <?php p($l->t('Verify settings'));?> |
|
56 | + <?php p($l->t('Verify settings')); ?> |
|
57 | 57 | </button> |
58 | 58 | </p> |
59 | 59 | <?php print_unescaped($_['wizardControls']); ?> |
@@ -14,7 +14,7 @@ discard block |
||
14 | 14 | <ul> |
15 | 15 | <li><?php p($l->t('Remote Address: %s', [$_['remoteAddr']])) ?></li> |
16 | 16 | <li><?php p($l->t('Request ID: %s', [$_['requestID']])) ?></li> |
17 | - <?php if($_['debugMode']): ?> |
|
17 | + <?php if ($_['debugMode']): ?> |
|
18 | 18 | <li><?php p($l->t('Type: %s', [$_['errorClass']])) ?></li> |
19 | 19 | <li><?php p($l->t('Code: %s', [$_['errorCode']])) ?></li> |
20 | 20 | <li><?php p($l->t('Message: %s', [$_['errorMsg']])) ?></li> |
@@ -23,7 +23,7 @@ discard block |
||
23 | 23 | <?php endif; ?> |
24 | 24 | </ul> |
25 | 25 | |
26 | - <?php if($_['debugMode']): ?> |
|
26 | + <?php if ($_['debugMode']): ?> |
|
27 | 27 | <br /> |
28 | 28 | <h3><?php p($l->t('Trace')) ?></h3> |
29 | 29 | <pre><?php p($_['trace']) ?></pre> |
@@ -66,8 +66,8 @@ discard block |
||
66 | 66 | * @throws \Exception |
67 | 67 | */ |
68 | 68 | public function beforeController($controller, $methodName) { |
69 | - if(!$this->reflector->hasAnnotation('NoSubadminRequired')) { |
|
70 | - if(!$this->isSubAdmin) { |
|
69 | + if (!$this->reflector->hasAnnotation('NoSubadminRequired')) { |
|
70 | + if (!$this->isSubAdmin) { |
|
71 | 71 | throw new NotAdminException($this->l10n->t('Logged in user must be a subadmin')); |
72 | 72 | } |
73 | 73 | } |
@@ -82,7 +82,7 @@ discard block |
||
82 | 82 | * @throws \Exception |
83 | 83 | */ |
84 | 84 | public function afterException($controller, $methodName, \Exception $exception) { |
85 | - if($exception instanceof NotAdminException) { |
|
85 | + if ($exception instanceof NotAdminException) { |
|
86 | 86 | $response = new TemplateResponse('core', '403', array(), 'guest'); |
87 | 87 | $response->setStatus(Http::STATUS_FORBIDDEN); |
88 | 88 | return $response; |
@@ -110,7 +110,7 @@ discard block |
||
110 | 110 | $activity->setApp('systemtags') |
111 | 111 | ->setType('systemtags') |
112 | 112 | ->setAuthor($actor) |
113 | - ->setObject('systemtag', (int)$tag->getId(), $tag->getName()); |
|
113 | + ->setObject('systemtag', (int) $tag->getId(), $tag->getName()); |
|
114 | 114 | if ($event->getEvent() === ManagerEvent::EVENT_CREATE) { |
115 | 115 | $activity->setSubject(Provider::CREATE_TAG, [ |
116 | 116 | $actor, |
@@ -150,7 +150,7 @@ discard block |
||
150 | 150 | */ |
151 | 151 | public function mapperEvent(MapperEvent $event) { |
152 | 152 | $tagIds = $event->getTags(); |
153 | - if ($event->getObjectType() !== 'files' ||empty($tagIds) |
|
153 | + if ($event->getObjectType() !== 'files' || empty($tagIds) |
|
154 | 154 | || !in_array($event->getEvent(), [MapperEvent::EVENT_ASSIGN, MapperEvent::EVENT_UNASSIGN]) |
155 | 155 | || !$this->appManager->isInstalled('activity')) { |
156 | 156 | // System tags not for files, no tags, not (un-)assigning or no activity-app enabled (save the energy) |
@@ -202,7 +202,7 @@ discard block |
||
202 | 202 | ->setObject($event->getObjectType(), (int) $event->getObjectId()); |
203 | 203 | |
204 | 204 | foreach ($users as $user => $path) { |
205 | - $user = (string)$user; // numerical ids could be ints which are not accepted everywhere |
|
205 | + $user = (string) $user; // numerical ids could be ints which are not accepted everywhere |
|
206 | 206 | $activity->setAffectedUser($user); |
207 | 207 | |
208 | 208 | foreach ($tags as $tag) { |