@@ -126,7 +126,7 @@ discard block |
||
126 | 126 | // exit if we can't create a new file and we don't updatable existing file |
127 | 127 | $chunkInfo = \OC_FileChunking::decodeName($name); |
128 | 128 | if (!$this->fileView->isCreatable($this->path) && |
129 | - !$this->fileView->isUpdatable($this->path . '/' . $chunkInfo['name']) |
|
129 | + !$this->fileView->isUpdatable($this->path.'/'.$chunkInfo['name']) |
|
130 | 130 | ) { |
131 | 131 | throw new \Sabre\DAV\Exception\Forbidden(); |
132 | 132 | } |
@@ -140,9 +140,9 @@ discard block |
||
140 | 140 | |
141 | 141 | $this->fileView->verifyPath($this->path, $name); |
142 | 142 | |
143 | - $path = $this->fileView->getAbsolutePath($this->path) . '/' . $name; |
|
143 | + $path = $this->fileView->getAbsolutePath($this->path).'/'.$name; |
|
144 | 144 | // in case the file already exists/overwriting |
145 | - $info = $this->fileView->getFileInfo($this->path . '/' . $name); |
|
145 | + $info = $this->fileView->getFileInfo($this->path.'/'.$name); |
|
146 | 146 | if (!$info) { |
147 | 147 | // use a dummy FileInfo which is acceptable here since it will be refreshed after the put is complete |
148 | 148 | $info = new \OC\Files\FileInfo($path, null, null, [], null); |
@@ -151,11 +151,11 @@ discard block |
||
151 | 151 | |
152 | 152 | // only allow 1 process to upload a file at once but still allow reading the file while writing the part file |
153 | 153 | $node->acquireLock(ILockingProvider::LOCK_SHARED); |
154 | - $this->fileView->lockFile($path . '.upload.part', ILockingProvider::LOCK_EXCLUSIVE); |
|
154 | + $this->fileView->lockFile($path.'.upload.part', ILockingProvider::LOCK_EXCLUSIVE); |
|
155 | 155 | |
156 | 156 | $result = $node->put($data); |
157 | 157 | |
158 | - $this->fileView->unlockFile($path . '.upload.part', ILockingProvider::LOCK_EXCLUSIVE); |
|
158 | + $this->fileView->unlockFile($path.'.upload.part', ILockingProvider::LOCK_EXCLUSIVE); |
|
159 | 159 | $node->releaseLock(ILockingProvider::LOCK_SHARED); |
160 | 160 | return $result; |
161 | 161 | } catch (\OCP\Files\StorageNotAvailableException $e) { |
@@ -185,9 +185,9 @@ discard block |
||
185 | 185 | } |
186 | 186 | |
187 | 187 | $this->fileView->verifyPath($this->path, $name); |
188 | - $newPath = $this->path . '/' . $name; |
|
188 | + $newPath = $this->path.'/'.$name; |
|
189 | 189 | if (!$this->fileView->mkdir($newPath)) { |
190 | - throw new \Sabre\DAV\Exception\Forbidden('Could not create directory ' . $newPath); |
|
190 | + throw new \Sabre\DAV\Exception\Forbidden('Could not create directory '.$newPath); |
|
191 | 191 | } |
192 | 192 | } catch (\OCP\Files\StorageNotAvailableException $e) { |
193 | 193 | throw new \Sabre\DAV\Exception\ServiceUnavailable($e->getMessage()); |
@@ -216,7 +216,7 @@ discard block |
||
216 | 216 | throw new NotFound(); |
217 | 217 | } |
218 | 218 | |
219 | - $path = $this->path . '/' . $name; |
|
219 | + $path = $this->path.'/'.$name; |
|
220 | 220 | if (is_null($info)) { |
221 | 221 | try { |
222 | 222 | $this->fileView->verifyPath($this->path, $name); |
@@ -231,7 +231,7 @@ discard block |
||
231 | 231 | } |
232 | 232 | |
233 | 233 | if (!$info) { |
234 | - throw new \Sabre\DAV\Exception\NotFound('File with name ' . $path . ' could not be located'); |
|
234 | + throw new \Sabre\DAV\Exception\NotFound('File with name '.$path.' could not be located'); |
|
235 | 235 | } |
236 | 236 | |
237 | 237 | if ($info['mimetype'] === 'httpd/unix-directory') { |
@@ -290,7 +290,7 @@ discard block |
||
290 | 290 | // (required old code) instead of "updateFile". |
291 | 291 | // |
292 | 292 | // TODO: resolve chunk file name here and implement "updateFile" |
293 | - $path = $this->path . '/' . $name; |
|
293 | + $path = $this->path.'/'.$name; |
|
294 | 294 | return $this->fileView->file_exists($path); |
295 | 295 | |
296 | 296 | } |
@@ -385,7 +385,7 @@ discard block |
||
385 | 385 | throw new ServiceUnavailable('filesystem not setup'); |
386 | 386 | } |
387 | 387 | |
388 | - $destinationPath = $this->getPath() . '/' . $targetName; |
|
388 | + $destinationPath = $this->getPath().'/'.$targetName; |
|
389 | 389 | |
390 | 390 | |
391 | 391 | $targetNodeExists = $this->childExists($targetName); |
@@ -393,7 +393,7 @@ discard block |
||
393 | 393 | // at getNodeForPath we also check the path for isForbiddenFileOrDir |
394 | 394 | // with that we have covered both source and destination |
395 | 395 | if ($sourceNode instanceof Directory && $targetNodeExists) { |
396 | - throw new \Sabre\DAV\Exception\Forbidden('Could not copy directory ' . $sourceNode->getName() . ', target exists'); |
|
396 | + throw new \Sabre\DAV\Exception\Forbidden('Could not copy directory '.$sourceNode->getName().', target exists'); |
|
397 | 397 | } |
398 | 398 | |
399 | 399 | list($sourceDir,) = \Sabre\Uri\split($sourceNode->getPath()); |
@@ -113,7 +113,7 @@ discard block |
||
113 | 113 | $appName = $input->getArgument('app'); |
114 | 114 | $version = $input->getArgument('version'); |
115 | 115 | |
116 | - if (!preg_match('/^\d{1,16}$/',$version)) { |
|
116 | + if (!preg_match('/^\d{1,16}$/', $version)) { |
|
117 | 117 | $output->writeln('<error>The given version is invalid. Only 0-9 are allowed (max. 16 digits)</error>'); |
118 | 118 | return 1; |
119 | 119 | } |
@@ -121,7 +121,7 @@ discard block |
||
121 | 121 | $ms = new MigrationService($appName, $this->connection, new ConsoleOutput($output)); |
122 | 122 | |
123 | 123 | $date = date('YmdHis'); |
124 | - $path = $this->generateMigration($ms, 'Version' . $version . 'Date' . $date); |
|
124 | + $path = $this->generateMigration($ms, 'Version'.$version.'Date'.$date); |
|
125 | 125 | |
126 | 126 | $output->writeln("New migration class has been generated to <info>$path</info>"); |
127 | 127 | return 0; |
@@ -151,7 +151,7 @@ discard block |
||
151 | 151 | $appName = $context->getWordAtIndex($context->getWordIndex() - 1); |
152 | 152 | |
153 | 153 | $version = explode('.', $this->appManager->getAppVersion($appName)); |
154 | - return [$version[0] . sprintf('%1$03d', $version[1])]; |
|
154 | + return [$version[0].sprintf('%1$03d', $version[1])]; |
|
155 | 155 | } |
156 | 156 | |
157 | 157 | return []; |
@@ -165,7 +165,7 @@ discard block |
||
165 | 165 | */ |
166 | 166 | protected function generateMigration(MigrationService $ms, $className, $schemaBody = '') { |
167 | 167 | if ($schemaBody === '') { |
168 | - $schemaBody = "\t\t" . 'return null;'; |
|
168 | + $schemaBody = "\t\t".'return null;'; |
|
169 | 169 | } |
170 | 170 | |
171 | 171 | |
@@ -183,7 +183,7 @@ discard block |
||
183 | 183 | $dir = $ms->getMigrationsDirectory(); |
184 | 184 | |
185 | 185 | $this->ensureMigrationDirExists($dir); |
186 | - $path = $dir . '/' . $className . '.php'; |
|
186 | + $path = $dir.'/'.$className.'.php'; |
|
187 | 187 | |
188 | 188 | if (file_put_contents($path, $code) === false) { |
189 | 189 | throw new RuntimeException('Failed to generate new migration step.'); |
@@ -31,7 +31,7 @@ |
||
31 | 31 | */ |
32 | 32 | public function __construct($action) { |
33 | 33 | $l = \OC::$server->getL10N('federation'); |
34 | - $message = 'Action "' . $action . '" not supported or implemented.'; |
|
34 | + $message = 'Action "'.$action.'" not supported or implemented.'; |
|
35 | 35 | $hint = $l->t('Action "%s" not supported or implemented.', [$action]); |
36 | 36 | parent::__construct($message, $hint); |
37 | 37 | } |
@@ -55,7 +55,7 @@ |
||
55 | 55 | } |
56 | 56 | |
57 | 57 | try { |
58 | - $folder = $this->appData->getFolder((string)$node->getId()); |
|
58 | + $folder = $this->appData->getFolder((string) $node->getId()); |
|
59 | 59 | $folder->delete(); |
60 | 60 | } catch (NotFoundException $e) { |
61 | 61 | //Nothing to do |
@@ -57,7 +57,7 @@ |
||
57 | 57 | public function connectWatcher() { |
58 | 58 | // Do not connect if we are not setup yet! |
59 | 59 | if ($this->config->getValue('instanceid', null) !== null) { |
60 | - $this->root->listen('\OC\Files', 'postWrite', function (Node $node) { |
|
60 | + $this->root->listen('\OC\Files', 'postWrite', function(Node $node) { |
|
61 | 61 | $this->getWatcher()->postWrite($node); |
62 | 62 | }); |
63 | 63 |
@@ -162,7 +162,7 @@ |
||
162 | 162 | if (\is_array($scope)) { |
163 | 163 | parent::setScope(json_encode($scope)); |
164 | 164 | } else { |
165 | - parent::setScope((string)$scope); |
|
165 | + parent::setScope((string) $scope); |
|
166 | 166 | } |
167 | 167 | } |
168 | 168 |
@@ -71,7 +71,7 @@ |
||
71 | 71 | |
72 | 72 | if ($response_type !== 'code') { |
73 | 73 | //Fail |
74 | - $url = $client->getRedirectUri() . '?error=unsupported_response_type&state=' . $state; |
|
74 | + $url = $client->getRedirectUri().'?error=unsupported_response_type&state='.$state; |
|
75 | 75 | return new RedirectResponse($url); |
76 | 76 | } |
77 | 77 |
@@ -129,7 +129,7 @@ |
||
129 | 129 | $data = $result->fetchAll(); |
130 | 130 | $result->closeCursor(); |
131 | 131 | |
132 | - $entities = array_map(function ($row) { |
|
132 | + $entities = array_map(function($row) { |
|
133 | 133 | return PublicKeyToken::fromRow($row); |
134 | 134 | }, $data); |
135 | 135 |
@@ -36,7 +36,7 @@ |
||
36 | 36 | $l = \OC::$server->getL10N('federation'); |
37 | 37 | $this->parameterList = $missingParameters; |
38 | 38 | $parameterList = implode(',', $missingParameters); |
39 | - $message = 'Parameters missing in order to complete the request. Missing Parameters: ' . $parameterList; |
|
39 | + $message = 'Parameters missing in order to complete the request. Missing Parameters: '.$parameterList; |
|
40 | 40 | $hint = $l->t('Parameters missing in order to complete the request. Missing Parameters: "%s"', [$parameterList]); |
41 | 41 | parent::__construct($message, $hint); |
42 | 42 | } |