@@ -46,8 +46,8 @@ discard block |
||
46 | 46 | |
47 | 47 | $types = ['resources', 'rooms']; |
48 | 48 | foreach ($types as $type) { |
49 | - if (!$schema->hasTable('calendar_' . $type)) { |
|
50 | - $table = $schema->createTable('calendar_' . $type); |
|
49 | + if (!$schema->hasTable('calendar_'.$type)) { |
|
50 | + $table = $schema->createTable('calendar_'.$type); |
|
51 | 51 | |
52 | 52 | $table->addColumn('id', Types::BIGINT, [ |
53 | 53 | 'autoincrement' => true, |
@@ -77,9 +77,9 @@ discard block |
||
77 | 77 | ]); |
78 | 78 | |
79 | 79 | $table->setPrimaryKey(['id']); |
80 | - $table->addIndex(['backend_id', 'resource_id'], 'calendar_' . $type . '_bkdrsc'); |
|
81 | - $table->addIndex(['email'], 'calendar_' . $type . '_email'); |
|
82 | - $table->addIndex(['displayname'], 'calendar_' . $type . '_name'); |
|
80 | + $table->addIndex(['backend_id', 'resource_id'], 'calendar_'.$type.'_bkdrsc'); |
|
81 | + $table->addIndex(['email'], 'calendar_'.$type.'_email'); |
|
82 | + $table->addIndex(['displayname'], 'calendar_'.$type.'_name'); |
|
83 | 83 | } |
84 | 84 | } |
85 | 85 |
@@ -59,7 +59,7 @@ discard block |
||
59 | 59 | 'length' => 11, |
60 | 60 | 'unsigned' => true, |
61 | 61 | ]); |
62 | - $table->addColumn($type . '_id', Types::BIGINT, [ |
|
62 | + $table->addColumn($type.'_id', Types::BIGINT, [ |
|
63 | 63 | 'notnull' => true, |
64 | 64 | 'length' => 11, |
65 | 65 | 'unsigned' => true, |
@@ -74,7 +74,7 @@ discard block |
||
74 | 74 | ]); |
75 | 75 | |
76 | 76 | $table->setPrimaryKey(['id']); |
77 | - $table->addIndex([$type . '_id', 'key'], $this->getMetadataTableName($type) . '_idk'); |
|
77 | + $table->addIndex([$type.'_id', 'key'], $this->getMetadataTableName($type).'_idk'); |
|
78 | 78 | } |
79 | 79 | } |
80 | 80 | |
@@ -86,6 +86,6 @@ discard block |
||
86 | 86 | * @return string |
87 | 87 | */ |
88 | 88 | private function getMetadataTableName(string $type):string { |
89 | - return 'calendar_' . $type . 's_md'; |
|
89 | + return 'calendar_'.$type.'s_md'; |
|
90 | 90 | } |
91 | 91 | } |
@@ -72,10 +72,10 @@ |
||
72 | 72 | |
73 | 73 | foreach ($configuredEvents as $operationClass => $events) { |
74 | 74 | foreach ($events as $entityClass => $eventNames) { |
75 | - array_map(function (string $eventName) use ($manager, $container, $dispatcher, $logger, $operationClass, $entityClass) { |
|
75 | + array_map(function(string $eventName) use ($manager, $container, $dispatcher, $logger, $operationClass, $entityClass) { |
|
76 | 76 | $dispatcher->addListener( |
77 | 77 | $eventName, |
78 | - function ($event) use ($manager, $container, $eventName, $logger, $operationClass, $entityClass) { |
|
78 | + function($event) use ($manager, $container, $eventName, $logger, $operationClass, $entityClass) { |
|
79 | 79 | $ruleMatcher = $manager->getRuleMatcher(); |
80 | 80 | try { |
81 | 81 | /** @var IEntity $entity */ |
@@ -58,9 +58,9 @@ |
||
58 | 58 | public function search(string $query, array $inApps = [], int $page = 1, int $size = 30): JSONResponse { |
59 | 59 | $results = $this->searcher->searchPaged($query, $inApps, $page, $size); |
60 | 60 | |
61 | - $results = array_filter($results, function (Result $result) { |
|
61 | + $results = array_filter($results, function(Result $result) { |
|
62 | 62 | if (json_encode($result, JSON_HEX_TAG) === false) { |
63 | - $this->logger->warning("Skipping search result due to invalid encoding: {type: " . $result->type . ", id: " . $result->id . "}"); |
|
63 | + $this->logger->warning("Skipping search result due to invalid encoding: {type: ".$result->type.", id: ".$result->id."}"); |
|
64 | 64 | return false; |
65 | 65 | } else { |
66 | 66 | return true; |
@@ -43,7 +43,7 @@ |
||
43 | 43 | |
44 | 44 | public function injectFn(callable $fn) { |
45 | 45 | $reflected = new ReflectionFunction(Closure::fromCallable($fn)); |
46 | - return $fn(...array_map(function (ReflectionParameter $param) { |
|
46 | + return $fn(...array_map(function(ReflectionParameter $param) { |
|
47 | 47 | // First we try by type (more likely these days) |
48 | 48 | if (($type = $param->getType()) !== null) { |
49 | 49 | try { |
@@ -60,11 +60,11 @@ |
||
60 | 60 | if ($readablePath) { |
61 | 61 | $message = "\"$path\"(\"$readablePath\") is locked"; |
62 | 62 | } else { |
63 | - $message = '"' . $path . '" is locked'; |
|
63 | + $message = '"'.$path.'" is locked'; |
|
64 | 64 | } |
65 | 65 | $this->existingLock = $existingLock; |
66 | 66 | if ($existingLock) { |
67 | - $message .= ', existing lock on file: ' . $existingLock; |
|
67 | + $message .= ', existing lock on file: '.$existingLock; |
|
68 | 68 | } |
69 | 69 | parent::__construct($message, 0, $previous); |
70 | 70 | $this->path = $path; |
@@ -64,7 +64,7 @@ discard block |
||
64 | 64 | $linkCheckPlugin = new \OCA\DAV\Files\Sharing\PublicLinkCheckPlugin(); |
65 | 65 | $filesDropPlugin = new \OCA\DAV\Files\Sharing\FilesDropPlugin(); |
66 | 66 | |
67 | -$server = $serverFactory->createServer($baseuri, $requestUri, $authPlugin, function (\Sabre\DAV\Server $server) use ($authBackend, $linkCheckPlugin, $filesDropPlugin) { |
|
67 | +$server = $serverFactory->createServer($baseuri, $requestUri, $authPlugin, function(\Sabre\DAV\Server $server) use ($authBackend, $linkCheckPlugin, $filesDropPlugin) { |
|
68 | 68 | $isAjax = (isset($_SERVER['HTTP_X_REQUESTED_WITH']) && $_SERVER['HTTP_X_REQUESTED_WITH'] === 'XMLHttpRequest'); |
69 | 69 | /** @var \OCA\FederatedFileSharing\FederatedShareProvider $shareProvider */ |
70 | 70 | $federatedShareProvider = \OC::$server->query(\OCA\FederatedFileSharing\FederatedShareProvider::class); |
@@ -80,17 +80,17 @@ discard block |
||
80 | 80 | |
81 | 81 | // FIXME: should not add storage wrappers outside of preSetup, need to find a better way |
82 | 82 | $previousLog = \OC\Files\Filesystem::logWarningWhenAddingStorageWrapper(false); |
83 | - \OC\Files\Filesystem::addStorageWrapper('sharePermissions', function ($mountPoint, $storage) use ($share) { |
|
83 | + \OC\Files\Filesystem::addStorageWrapper('sharePermissions', function($mountPoint, $storage) use ($share) { |
|
84 | 84 | return new \OC\Files\Storage\Wrapper\PermissionsMask(['storage' => $storage, 'mask' => $share->getPermissions() | \OCP\Constants::PERMISSION_SHARE]); |
85 | 85 | }); |
86 | - \OC\Files\Filesystem::addStorageWrapper('shareOwner', function ($mountPoint, $storage) use ($share) { |
|
86 | + \OC\Files\Filesystem::addStorageWrapper('shareOwner', function($mountPoint, $storage) use ($share) { |
|
87 | 87 | return new \OCA\DAV\Storage\PublicOwnerWrapper(['storage' => $storage, 'owner' => $share->getShareOwner()]); |
88 | 88 | }); |
89 | 89 | \OC\Files\Filesystem::logWarningWhenAddingStorageWrapper($previousLog); |
90 | 90 | |
91 | 91 | OC_Util::tearDownFS(); |
92 | 92 | OC_Util::setupFS($owner); |
93 | - $ownerView = new \OC\Files\View('/'. $owner . '/files'); |
|
93 | + $ownerView = new \OC\Files\View('/'.$owner.'/files'); |
|
94 | 94 | $path = $ownerView->getPath($fileId); |
95 | 95 | $fileInfo = $ownerView->getFileInfo($path); |
96 | 96 | $linkCheckPlugin->setFileInfo($fileInfo); |
@@ -126,12 +126,12 @@ discard block |
||
126 | 126 | } |
127 | 127 | |
128 | 128 | private function loadCustomDefinitions(string $fileName, array $definitions): array { |
129 | - if (file_exists($this->customConfigDir . '/' . $fileName)) { |
|
130 | - $custom = json_decode(file_get_contents($this->customConfigDir . '/' . $fileName), true); |
|
129 | + if (file_exists($this->customConfigDir.'/'.$fileName)) { |
|
130 | + $custom = json_decode(file_get_contents($this->customConfigDir.'/'.$fileName), true); |
|
131 | 131 | if (json_last_error() === JSON_ERROR_NONE) { |
132 | 132 | $definitions = array_merge($definitions, $custom); |
133 | 133 | } else { |
134 | - $this->logger->warning('Failed to parse ' . $fileName . ': ' . json_last_error_msg()); |
|
134 | + $this->logger->warning('Failed to parse '.$fileName.': '.json_last_error_msg()); |
|
135 | 135 | } |
136 | 136 | } |
137 | 137 | return $definitions; |
@@ -145,7 +145,7 @@ discard block |
||
145 | 145 | return; |
146 | 146 | } |
147 | 147 | |
148 | - $this->mimeTypeAlias = json_decode(file_get_contents($this->defaultConfigDir . '/mimetypealiases.dist.json'), true); |
|
148 | + $this->mimeTypeAlias = json_decode(file_get_contents($this->defaultConfigDir.'/mimetypealiases.dist.json'), true); |
|
149 | 149 | $this->mimeTypeAlias = $this->loadCustomDefinitions(self::CUSTOM_MIMETYPEALIASES, $this->mimeTypeAlias); |
150 | 150 | } |
151 | 151 | |
@@ -159,7 +159,7 @@ discard block |
||
159 | 159 | |
160 | 160 | public function getOnlyDefaultAliases(): array { |
161 | 161 | $this->loadMappings(); |
162 | - $this->mimeTypeAlias = json_decode(file_get_contents($this->defaultConfigDir . '/mimetypealiases.dist.json'), true); |
|
162 | + $this->mimeTypeAlias = json_decode(file_get_contents($this->defaultConfigDir.'/mimetypealiases.dist.json'), true); |
|
163 | 163 | return $this->mimeTypeAlias; |
164 | 164 | } |
165 | 165 | |
@@ -171,7 +171,7 @@ discard block |
||
171 | 171 | return; |
172 | 172 | } |
173 | 173 | |
174 | - $mimetypeMapping = json_decode(file_get_contents($this->defaultConfigDir . '/mimetypemapping.dist.json'), true); |
|
174 | + $mimetypeMapping = json_decode(file_get_contents($this->defaultConfigDir.'/mimetypemapping.dist.json'), true); |
|
175 | 175 | $mimetypeMapping = $this->loadCustomDefinitions(self::CUSTOM_MIMETYPEMAPPING, $mimetypeMapping); |
176 | 176 | |
177 | 177 | $this->registerTypeArray($mimetypeMapping); |
@@ -366,7 +366,7 @@ discard block |
||
366 | 366 | |
367 | 367 | // Icon exists? |
368 | 368 | try { |
369 | - $this->mimetypeIcons[$mimetype] = $this->urlGenerator->imagePath('core', 'filetypes/' . $icon . '.svg'); |
|
369 | + $this->mimetypeIcons[$mimetype] = $this->urlGenerator->imagePath('core', 'filetypes/'.$icon.'.svg'); |
|
370 | 370 | return $this->mimetypeIcons[$mimetype]; |
371 | 371 | } catch (\RuntimeException $e) { |
372 | 372 | // Specified image not found |
@@ -377,7 +377,7 @@ discard block |
||
377 | 377 | if (strpos($icon, '-')) { |
378 | 378 | $mimePart = substr($icon, 0, strpos($icon, '-')); |
379 | 379 | try { |
380 | - $this->mimetypeIcons[$mimetype] = $this->urlGenerator->imagePath('core', 'filetypes/' . $mimePart . '.svg'); |
|
380 | + $this->mimetypeIcons[$mimetype] = $this->urlGenerator->imagePath('core', 'filetypes/'.$mimePart.'.svg'); |
|
381 | 381 | return $this->mimetypeIcons[$mimetype]; |
382 | 382 | } catch (\RuntimeException $e) { |
383 | 383 | // Image for the first part of the mimetype not found |
@@ -50,7 +50,7 @@ |
||
50 | 50 | $eventName = 'OCA\Files_Sharing::loadAdditionalScripts'; |
51 | 51 | |
52 | 52 | if ($event->getScope() !== null) { |
53 | - $eventName .= '::' . $event->getScope(); |
|
53 | + $eventName .= '::'.$event->getScope(); |
|
54 | 54 | } |
55 | 55 | |
56 | 56 | $legacyEvent = new GenericEvent(null, ['share' => $event->getShare()]); |