@@ -114,18 +114,18 @@ discard block |
||
114 | 114 | * @param int $remoteId |
115 | 115 | * @return Mount|null |
116 | 116 | */ |
117 | - public function addShare($remote, $token, $password, $name, $owner, $accepted=false, $user = null, $remoteId = -1) { |
|
117 | + public function addShare($remote, $token, $password, $name, $owner, $accepted = false, $user = null, $remoteId = -1) { |
|
118 | 118 | |
119 | 119 | $user = $user ? $user : $this->uid; |
120 | 120 | $accepted = $accepted ? 1 : 0; |
121 | - $name = Filesystem::normalizePath('/' . $name); |
|
121 | + $name = Filesystem::normalizePath('/'.$name); |
|
122 | 122 | |
123 | 123 | if (!$accepted) { |
124 | 124 | // To avoid conflicts with the mount point generation later, |
125 | 125 | // we only use a temporary mount point name here. The real |
126 | 126 | // mount point name will be generated when accepting the share, |
127 | 127 | // using the original share item name. |
128 | - $tmpMountPointName = '{{TemporaryMountPointName#' . $name . '}}'; |
|
128 | + $tmpMountPointName = '{{TemporaryMountPointName#'.$name.'}}'; |
|
129 | 129 | $mountPoint = $tmpMountPointName; |
130 | 130 | $hash = md5($tmpMountPointName); |
131 | 131 | $data = [ |
@@ -144,7 +144,7 @@ discard block |
||
144 | 144 | $i = 1; |
145 | 145 | while (!$this->connection->insertIfNotExist('*PREFIX*share_external', $data, ['user', 'mountpoint_hash'])) { |
146 | 146 | // The external share already exists for the user |
147 | - $data['mountpoint'] = $tmpMountPointName . '-' . $i; |
|
147 | + $data['mountpoint'] = $tmpMountPointName.'-'.$i; |
|
148 | 148 | $data['mountpoint_hash'] = md5($data['mountpoint']); |
149 | 149 | $i++; |
150 | 150 | } |
@@ -152,7 +152,7 @@ discard block |
||
152 | 152 | } |
153 | 153 | |
154 | 154 | $mountPoint = Files::buildNotExistingFileName('/', $name); |
155 | - $mountPoint = Filesystem::normalizePath('/' . $mountPoint); |
|
155 | + $mountPoint = Filesystem::normalizePath('/'.$mountPoint); |
|
156 | 156 | $hash = md5($mountPoint); |
157 | 157 | |
158 | 158 | $query = $this->connection->prepare(' |
@@ -271,7 +271,7 @@ discard block |
||
271 | 271 | $federationEndpoints = $this->discoveryService->discover($remote, 'FEDERATED_SHARING'); |
272 | 272 | $endpoint = isset($federationEndpoints['share']) ? $federationEndpoints['share'] : '/ocs/v2.php/cloud/shares'; |
273 | 273 | |
274 | - $url = rtrim($remote, '/') . $endpoint . '/' . $remoteId . '/' . $feedback . '?format=' . \OCP\Share::RESPONSE_FORMAT; |
|
274 | + $url = rtrim($remote, '/').$endpoint.'/'.$remoteId.'/'.$feedback.'?format='.\OCP\Share::RESPONSE_FORMAT; |
|
275 | 275 | $fields = array('token' => $token); |
276 | 276 | |
277 | 277 | $client = $this->clientService->newClient(); |
@@ -300,13 +300,13 @@ discard block |
||
300 | 300 | * @return string |
301 | 301 | */ |
302 | 302 | protected function stripPath($path) { |
303 | - $prefix = '/' . $this->uid . '/files'; |
|
303 | + $prefix = '/'.$this->uid.'/files'; |
|
304 | 304 | return rtrim(substr($path, strlen($prefix)), '/'); |
305 | 305 | } |
306 | 306 | |
307 | 307 | public function getMount($data) { |
308 | 308 | $data['manager'] = $this; |
309 | - $mountPoint = '/' . $this->uid . '/files' . $data['mountpoint']; |
|
309 | + $mountPoint = '/'.$this->uid.'/files'.$data['mountpoint']; |
|
310 | 310 | $data['mountpoint'] = $mountPoint; |
311 | 311 | $data['certificateManager'] = \OC::$server->getCertificateManager($this->uid); |
312 | 312 | return new Mount(self::STORAGE, $mountPoint, $data, $this, $this->storageLoader); |
@@ -346,7 +346,7 @@ discard block |
||
346 | 346 | WHERE `mountpoint_hash` = ? |
347 | 347 | AND `user` = ? |
348 | 348 | '); |
349 | - $result = (bool)$query->execute(array($target, $targetHash, $sourceHash, $this->uid)); |
|
349 | + $result = (bool) $query->execute(array($target, $targetHash, $sourceHash, $this->uid)); |
|
350 | 350 | |
351 | 351 | return $result; |
352 | 352 | } |
@@ -376,9 +376,9 @@ discard block |
||
376 | 376 | WHERE `mountpoint_hash` = ? |
377 | 377 | AND `user` = ? |
378 | 378 | '); |
379 | - $result = (bool)$query->execute(array($hash, $this->uid)); |
|
379 | + $result = (bool) $query->execute(array($hash, $this->uid)); |
|
380 | 380 | |
381 | - if($result) { |
|
381 | + if ($result) { |
|
382 | 382 | $this->removeReShares($id); |
383 | 383 | } |
384 | 384 | |
@@ -399,7 +399,7 @@ discard block |
||
399 | 399 | |
400 | 400 | |
401 | 401 | $query->delete('federated_reshares') |
402 | - ->where($query->expr()->in('share_id', $query->createFunction('(' . $select . ')'))); |
|
402 | + ->where($query->expr()->in('share_id', $query->createFunction('('.$select.')'))); |
|
403 | 403 | $query->execute(); |
404 | 404 | |
405 | 405 | $deleteReShares = $this->connection->getQueryBuilder(); |
@@ -423,7 +423,7 @@ discard block |
||
423 | 423 | |
424 | 424 | if ($result) { |
425 | 425 | $shares = $getShare->fetchAll(); |
426 | - foreach($shares as $share) { |
|
426 | + foreach ($shares as $share) { |
|
427 | 427 | $this->sendFeedbackToRemote($share['remote'], $share['share_token'], $share['remote_id'], 'decline'); |
428 | 428 | } |
429 | 429 | } |
@@ -432,7 +432,7 @@ discard block |
||
432 | 432 | DELETE FROM `*PREFIX*share_external` |
433 | 433 | WHERE `user` = ? |
434 | 434 | '); |
435 | - return (bool)$query->execute(array($uid)); |
|
435 | + return (bool) $query->execute(array($uid)); |
|
436 | 436 | } |
437 | 437 | |
438 | 438 | /** |
@@ -362,77 +362,77 @@ |
||
362 | 362 | $policy .= "base-uri 'none';"; |
363 | 363 | $policy .= "manifest-src 'self';"; |
364 | 364 | |
365 | - if(!empty($this->allowedScriptDomains) || $this->inlineScriptAllowed || $this->evalScriptAllowed) { |
|
365 | + if (!empty($this->allowedScriptDomains) || $this->inlineScriptAllowed || $this->evalScriptAllowed) { |
|
366 | 366 | $policy .= 'script-src '; |
367 | - if(is_string($this->useJsNonce)) { |
|
367 | + if (is_string($this->useJsNonce)) { |
|
368 | 368 | $policy .= '\'nonce-'.base64_encode($this->useJsNonce).'\''; |
369 | 369 | $allowedScriptDomains = array_flip($this->allowedScriptDomains); |
370 | 370 | unset($allowedScriptDomains['\'self\'']); |
371 | 371 | $this->allowedScriptDomains = array_flip($allowedScriptDomains); |
372 | - if(count($allowedScriptDomains) !== 0) { |
|
372 | + if (count($allowedScriptDomains) !== 0) { |
|
373 | 373 | $policy .= ' '; |
374 | 374 | } |
375 | 375 | } |
376 | - if(is_array($this->allowedScriptDomains)) { |
|
376 | + if (is_array($this->allowedScriptDomains)) { |
|
377 | 377 | $policy .= implode(' ', $this->allowedScriptDomains); |
378 | 378 | } |
379 | - if($this->inlineScriptAllowed) { |
|
379 | + if ($this->inlineScriptAllowed) { |
|
380 | 380 | $policy .= ' \'unsafe-inline\''; |
381 | 381 | } |
382 | - if($this->evalScriptAllowed) { |
|
382 | + if ($this->evalScriptAllowed) { |
|
383 | 383 | $policy .= ' \'unsafe-eval\''; |
384 | 384 | } |
385 | 385 | $policy .= ';'; |
386 | 386 | } |
387 | 387 | |
388 | - if(!empty($this->allowedStyleDomains) || $this->inlineStyleAllowed) { |
|
388 | + if (!empty($this->allowedStyleDomains) || $this->inlineStyleAllowed) { |
|
389 | 389 | $policy .= 'style-src '; |
390 | - if(is_array($this->allowedStyleDomains)) { |
|
390 | + if (is_array($this->allowedStyleDomains)) { |
|
391 | 391 | $policy .= implode(' ', $this->allowedStyleDomains); |
392 | 392 | } |
393 | - if($this->inlineStyleAllowed) { |
|
393 | + if ($this->inlineStyleAllowed) { |
|
394 | 394 | $policy .= ' \'unsafe-inline\''; |
395 | 395 | } |
396 | 396 | $policy .= ';'; |
397 | 397 | } |
398 | 398 | |
399 | - if(!empty($this->allowedImageDomains)) { |
|
400 | - $policy .= 'img-src ' . implode(' ', $this->allowedImageDomains); |
|
399 | + if (!empty($this->allowedImageDomains)) { |
|
400 | + $policy .= 'img-src '.implode(' ', $this->allowedImageDomains); |
|
401 | 401 | $policy .= ';'; |
402 | 402 | } |
403 | 403 | |
404 | - if(!empty($this->allowedFontDomains)) { |
|
405 | - $policy .= 'font-src ' . implode(' ', $this->allowedFontDomains); |
|
404 | + if (!empty($this->allowedFontDomains)) { |
|
405 | + $policy .= 'font-src '.implode(' ', $this->allowedFontDomains); |
|
406 | 406 | $policy .= ';'; |
407 | 407 | } |
408 | 408 | |
409 | - if(!empty($this->allowedConnectDomains)) { |
|
410 | - $policy .= 'connect-src ' . implode(' ', $this->allowedConnectDomains); |
|
409 | + if (!empty($this->allowedConnectDomains)) { |
|
410 | + $policy .= 'connect-src '.implode(' ', $this->allowedConnectDomains); |
|
411 | 411 | $policy .= ';'; |
412 | 412 | } |
413 | 413 | |
414 | - if(!empty($this->allowedMediaDomains)) { |
|
415 | - $policy .= 'media-src ' . implode(' ', $this->allowedMediaDomains); |
|
414 | + if (!empty($this->allowedMediaDomains)) { |
|
415 | + $policy .= 'media-src '.implode(' ', $this->allowedMediaDomains); |
|
416 | 416 | $policy .= ';'; |
417 | 417 | } |
418 | 418 | |
419 | - if(!empty($this->allowedObjectDomains)) { |
|
420 | - $policy .= 'object-src ' . implode(' ', $this->allowedObjectDomains); |
|
419 | + if (!empty($this->allowedObjectDomains)) { |
|
420 | + $policy .= 'object-src '.implode(' ', $this->allowedObjectDomains); |
|
421 | 421 | $policy .= ';'; |
422 | 422 | } |
423 | 423 | |
424 | - if(!empty($this->allowedFrameDomains)) { |
|
425 | - $policy .= 'frame-src ' . implode(' ', $this->allowedFrameDomains); |
|
424 | + if (!empty($this->allowedFrameDomains)) { |
|
425 | + $policy .= 'frame-src '.implode(' ', $this->allowedFrameDomains); |
|
426 | 426 | $policy .= ';'; |
427 | 427 | } |
428 | 428 | |
429 | - if(!empty($this->allowedChildSrcDomains)) { |
|
430 | - $policy .= 'child-src ' . implode(' ', $this->allowedChildSrcDomains); |
|
429 | + if (!empty($this->allowedChildSrcDomains)) { |
|
430 | + $policy .= 'child-src '.implode(' ', $this->allowedChildSrcDomains); |
|
431 | 431 | $policy .= ';'; |
432 | 432 | } |
433 | 433 | |
434 | - if(!empty($this->allowedFrameAncestors)) { |
|
435 | - $policy .= 'frame-ancestors ' . implode(' ', $this->allowedFrameAncestors); |
|
434 | + if (!empty($this->allowedFrameAncestors)) { |
|
435 | + $policy .= 'frame-ancestors '.implode(' ', $this->allowedFrameAncestors); |
|
436 | 436 | $policy .= ';'; |
437 | 437 | } |
438 | 438 |
@@ -1,12 +1,12 @@ |
||
1 | 1 | <div class="error"> |
2 | 2 | <h2><?php p($l->t('Error')) ?></h2> |
3 | 3 | <ul> |
4 | - <?php foreach($_["errors"] as $error):?> |
|
4 | + <?php foreach ($_["errors"] as $error):?> |
|
5 | 5 | <li> |
6 | 6 | <p><?php p($error['error']) ?></p> |
7 | - <?php if(isset($error['hint']) && $error['hint']): ?> |
|
7 | + <?php if (isset($error['hint']) && $error['hint']): ?> |
|
8 | 8 | <p class='hint'><?php p($error['hint']) ?></p> |
9 | - <?php endif;?> |
|
9 | + <?php endif; ?> |
|
10 | 10 | </li> |
11 | 11 | <?php endforeach ?> |
12 | 12 | </ul> |
@@ -64,7 +64,7 @@ |
||
64 | 64 | */ |
65 | 65 | public function getForm() { |
66 | 66 | $cloudID = $this->userSession->getUser()->getCloudId(); |
67 | - $url = 'https://nextcloud.com/federation#' . $cloudID; |
|
67 | + $url = 'https://nextcloud.com/federation#'.$cloudID; |
|
68 | 68 | |
69 | 69 | $parameters = [ |
70 | 70 | 'outgoingServer2serverShareEnabled' => $this->federatedShareProvider->isOutgoingServer2serverShareEnabled(), |
@@ -95,7 +95,7 @@ discard block |
||
95 | 95 | 'edition' => '', |
96 | 96 | ); |
97 | 97 | |
98 | - if($this->userSession->isLoggedIn()) { |
|
98 | + if ($this->userSession->isLoggedIn()) { |
|
99 | 99 | $result['capabilities'] = $this->capabilitiesManager->getCapabilities(); |
100 | 100 | } else { |
101 | 101 | $result['capabilities'] = $this->capabilitiesManager->getCapabilities(true); |
@@ -138,7 +138,7 @@ discard block |
||
138 | 138 | public function getIdentityProof($cloudId) { |
139 | 139 | $userObject = $this->userManager->get($cloudId); |
140 | 140 | |
141 | - if($userObject !== null) { |
|
141 | + if ($userObject !== null) { |
|
142 | 142 | $key = $this->keyManager->getKey($userObject); |
143 | 143 | $data = [ |
144 | 144 | 'public' => $key->getPublic(), |
@@ -35,7 +35,7 @@ discard block |
||
35 | 35 | * @param array $params |
36 | 36 | */ |
37 | 37 | public function shared(array $params) { |
38 | - if($params['shareType'] === Share::SHARE_TYPE_LINK) { |
|
38 | + if ($params['shareType'] === Share::SHARE_TYPE_LINK) { |
|
39 | 39 | $this->log( |
40 | 40 | 'The %s "%s" with ID "%s" has been shared via link with permissions "%s" (Share ID: %s)', |
41 | 41 | $params, |
@@ -47,7 +47,7 @@ discard block |
||
47 | 47 | 'id', |
48 | 48 | ] |
49 | 49 | ); |
50 | - } elseif($params['shareType'] === Share::SHARE_TYPE_USER) { |
|
50 | + } elseif ($params['shareType'] === Share::SHARE_TYPE_USER) { |
|
51 | 51 | $this->log( |
52 | 52 | 'The %s "%s" with ID "%s" has been shared to the user "%s" with permissions "%s" (Share ID: %s)', |
53 | 53 | $params, |
@@ -60,7 +60,7 @@ discard block |
||
60 | 60 | 'id', |
61 | 61 | ] |
62 | 62 | ); |
63 | - } elseif($params['shareType'] === Share::SHARE_TYPE_GROUP) { |
|
63 | + } elseif ($params['shareType'] === Share::SHARE_TYPE_GROUP) { |
|
64 | 64 | $this->log( |
65 | 65 | 'The %s "%s" with ID "%s" has been shared to the group "%s" with permissions "%s" (Share ID: %s)', |
66 | 66 | $params, |
@@ -82,7 +82,7 @@ discard block |
||
82 | 82 | * @param array $params |
83 | 83 | */ |
84 | 84 | public function unshare(array $params) { |
85 | - if($params['shareType'] === Share::SHARE_TYPE_LINK) { |
|
85 | + if ($params['shareType'] === Share::SHARE_TYPE_LINK) { |
|
86 | 86 | $this->log( |
87 | 87 | 'The %s "%s" with ID "%s" has been unshared (Share ID: %s)', |
88 | 88 | $params, |
@@ -93,7 +93,7 @@ discard block |
||
93 | 93 | 'id', |
94 | 94 | ] |
95 | 95 | ); |
96 | - } elseif($params['shareType'] === Share::SHARE_TYPE_USER) { |
|
96 | + } elseif ($params['shareType'] === Share::SHARE_TYPE_USER) { |
|
97 | 97 | $this->log( |
98 | 98 | 'The %s "%s" with ID "%s" has been unshared from the user "%s" (Share ID: %s)', |
99 | 99 | $params, |
@@ -105,7 +105,7 @@ discard block |
||
105 | 105 | 'id', |
106 | 106 | ] |
107 | 107 | ); |
108 | - } elseif($params['shareType'] === Share::SHARE_TYPE_GROUP) { |
|
108 | + } elseif ($params['shareType'] === Share::SHARE_TYPE_GROUP) { |
|
109 | 109 | $this->log( |
110 | 110 | 'The %s "%s" with ID "%s" has been unshared from the group "%s" (Share ID: %s)', |
111 | 111 | $params, |
@@ -1,16 +1,16 @@ discard block |
||
1 | 1 | <fieldset id="ldapWizard1"> |
2 | 2 | <p> |
3 | 3 | <select id="ldap_serverconfig_chooser" name="ldap_serverconfig_chooser"> |
4 | - <?php if(count($_['serverConfigurationPrefixes']) === 0 ) { |
|
4 | + <?php if (count($_['serverConfigurationPrefixes']) === 0) { |
|
5 | 5 | ?> |
6 | - <option value="" selected><?php p($l->t('1. Server'));?></option>'); |
|
6 | + <option value="" selected><?php p($l->t('1. Server')); ?></option>'); |
|
7 | 7 | <?php |
8 | 8 | } else { |
9 | 9 | $i = 1; |
10 | 10 | $sel = ' selected'; |
11 | - foreach($_['serverConfigurationPrefixes'] as $prefix) { |
|
11 | + foreach ($_['serverConfigurationPrefixes'] as $prefix) { |
|
12 | 12 | ?> |
13 | - <option value="<?php p($prefix); ?>"<?php p($sel); $sel = ''; ?>><?php p($l->t('%s. Server:', array($i++)));?> <?php p(' '.$_['serverConfigurationHosts'][$prefix]); ?></option> |
|
13 | + <option value="<?php p($prefix); ?>"<?php p($sel); $sel = ''; ?>><?php p($l->t('%s. Server:', array($i++))); ?> <?php p(' '.$_['serverConfigurationHosts'][$prefix]); ?></option> |
|
14 | 14 | <?php |
15 | 15 | } |
16 | 16 | } |
@@ -18,14 +18,14 @@ discard block |
||
18 | 18 | </select> |
19 | 19 | <button type="button" id="ldap_action_add_configuration" |
20 | 20 | name="ldap_action_add_configuration" class="icon-add icon-default-style" |
21 | - title="<?php p($l->t('Add a new configuration'));?>"> </button> |
|
21 | + title="<?php p($l->t('Add a new configuration')); ?>"> </button> |
|
22 | 22 | <button type="button" id="ldap_action_copy_configuration" |
23 | 23 | name="ldap_action_copy_configuration" |
24 | 24 | class="ldapIconCopy icon-default-style" |
25 | - title="<?php p($l->t('Copy current configuration into new directory binding'));?>"> </button> |
|
25 | + title="<?php p($l->t('Copy current configuration into new directory binding')); ?>"> </button> |
|
26 | 26 | <button type="button" id="ldap_action_delete_configuration" |
27 | 27 | name="ldap_action_delete_configuration" class="icon-delete icon-default-style" |
28 | - title="<?php p($l->t('Delete the current configuration'));?>"> </button> |
|
28 | + title="<?php p($l->t('Delete the current configuration')); ?>"> </button> |
|
29 | 29 | </p> |
30 | 30 | |
31 | 31 | <div class="hostPortCombinator"> |
@@ -34,14 +34,14 @@ discard block |
||
34 | 34 | <div class="table"> |
35 | 35 | <input type="text" class="host" id="ldap_host" |
36 | 36 | name="ldap_host" |
37 | - placeholder="<?php p($l->t('Host'));?>" |
|
38 | - title="<?php p($l->t('You can omit the protocol, unless you require SSL. If so, start with ldaps://'));?>" |
|
37 | + placeholder="<?php p($l->t('Host')); ?>" |
|
38 | + title="<?php p($l->t('You can omit the protocol, unless you require SSL. If so, start with ldaps://')); ?>" |
|
39 | 39 | /> |
40 | 40 | <span class="hostPortCombinatorSpan"> |
41 | 41 | <input type="number" id="ldap_port" name="ldap_port" |
42 | - placeholder="<?php p($l->t('Port'));?>" /> |
|
42 | + placeholder="<?php p($l->t('Port')); ?>" /> |
|
43 | 43 | <button class="ldapDetectPort" name="ldapDetectPort" type="button"> |
44 | - <?php p($l->t('Detect Port'));?> |
|
44 | + <?php p($l->t('Detect Port')); ?> |
|
45 | 45 | </button> |
46 | 46 | </span> |
47 | 47 | </div> |
@@ -51,19 +51,19 @@ discard block |
||
51 | 51 | <div class="tablerow"> |
52 | 52 | <input type="text" id="ldap_dn" name="ldap_dn" |
53 | 53 | class="tablecell" |
54 | - placeholder="<?php p($l->t('User DN'));?>" autocomplete="off" |
|
55 | - title="<?php p($l->t('The DN of the client user with which the bind shall be done, e.g. uid=agent,dc=example,dc=com. For anonymous access, leave DN and Password empty.'));?>" |
|
54 | + placeholder="<?php p($l->t('User DN')); ?>" autocomplete="off" |
|
55 | + title="<?php p($l->t('The DN of the client user with which the bind shall be done, e.g. uid=agent,dc=example,dc=com. For anonymous access, leave DN and Password empty.')); ?>" |
|
56 | 56 | /> |
57 | 57 | </div> |
58 | 58 | |
59 | 59 | <div class="tablerow"> |
60 | 60 | <input type="password" id="ldap_agent_password" |
61 | 61 | class="tablecell" name="ldap_agent_password" |
62 | - placeholder="<?php p($l->t('Password'));?>" autocomplete="off" |
|
63 | - title="<?php p($l->t('For anonymous access, leave DN and Password empty.'));?>" |
|
62 | + placeholder="<?php p($l->t('Password')); ?>" autocomplete="off" |
|
63 | + title="<?php p($l->t('For anonymous access, leave DN and Password empty.')); ?>" |
|
64 | 64 | /> |
65 | 65 | <button class="ldapSaveAgentCredentials" name="ldapSaveAgentCredentials" type="button"> |
66 | - <?php p($l->t('Save Credentials'));?> |
|
66 | + <?php p($l->t('Save Credentials')); ?> |
|
67 | 67 | </button> |
68 | 68 | </div> |
69 | 69 | <div class="tablerow"> </div> |
@@ -71,24 +71,24 @@ discard block |
||
71 | 71 | <div class="tablerow"> |
72 | 72 | <textarea id="ldap_base" name="ldap_base" |
73 | 73 | class="tablecell" |
74 | - placeholder="<?php p($l->t('One Base DN per line'));?>" |
|
75 | - title="<?php p($l->t('You can specify Base DN for users and groups in the Advanced tab'));?>"> |
|
74 | + placeholder="<?php p($l->t('One Base DN per line')); ?>" |
|
75 | + title="<?php p($l->t('You can specify Base DN for users and groups in the Advanced tab')); ?>"> |
|
76 | 76 | </textarea> |
77 | 77 | <button class="ldapDetectBase" name="ldapDetectBase" type="button"> |
78 | - <?php p($l->t('Detect Base DN'));?> |
|
78 | + <?php p($l->t('Detect Base DN')); ?> |
|
79 | 79 | </button> |
80 | 80 | <button class="ldapTestBase" name="ldapTestBase" type="button"> |
81 | - <?php p($l->t('Test Base DN'));?> |
|
81 | + <?php p($l->t('Test Base DN')); ?> |
|
82 | 82 | </button> |
83 | 83 | </div> |
84 | 84 | |
85 | 85 | <div class="tablerow left"> |
86 | 86 | <input type="checkbox" id="ldap_experienced_admin" value="1" |
87 | 87 | name="ldap_experienced_admin" class="tablecell" |
88 | - title="<?php p($l->t('Avoids automatic LDAP requests. Better for bigger setups, but requires some LDAP knowledge.'));?>" |
|
88 | + title="<?php p($l->t('Avoids automatic LDAP requests. Better for bigger setups, but requires some LDAP knowledge.')); ?>" |
|
89 | 89 | /> |
90 | 90 | <label for="ldap_experienced_admin" class="tablecell"> |
91 | - <?php p($l->t('Manually enter LDAP filters (recommended for large directories)'));?> |
|
91 | + <?php p($l->t('Manually enter LDAP filters (recommended for large directories)')); ?> |
|
92 | 92 | </label> |
93 | 93 | </div> |
94 | 94 |
@@ -7,49 +7,49 @@ discard block |
||
7 | 7 | <form id="ocDefaultEncryptionModule" class="section"> |
8 | 8 | <h2 data-anchor-name="basic-encryption-module"><?php p($l->t('Basic encryption module')); ?></h2> |
9 | 9 | |
10 | - <?php if ($_["initialized"] === \OCA\Encryption\Session::NOT_INITIALIZED ): ?> |
|
10 | + <?php if ($_["initialized"] === \OCA\Encryption\Session::NOT_INITIALIZED): ?> |
|
11 | 11 | |
12 | 12 | <?php p($l->t("Encryption App is enabled, but your keys are not initialized. Please log-out and log-in again.")); ?> |
13 | 13 | |
14 | - <?php elseif ( $_["initialized"] === \OCA\Encryption\Session::INIT_EXECUTED ): ?> |
|
14 | + <?php elseif ($_["initialized"] === \OCA\Encryption\Session::INIT_EXECUTED): ?> |
|
15 | 15 | <p> |
16 | 16 | <a name="changePKPasswd" /> |
17 | 17 | <label for="changePrivateKeyPasswd"> |
18 | - <em><?php p( $l->t( "Your private key password no longer matches your log-in password." ) ); ?></em> |
|
18 | + <em><?php p($l->t("Your private key password no longer matches your log-in password.")); ?></em> |
|
19 | 19 | </label> |
20 | 20 | <br /> |
21 | - <?php p( $l->t( "Set your old private key password to your current log-in password:" ) ); ?> |
|
22 | - <?php if ( $_["recoveryEnabledForUser"] ): |
|
23 | - p( $l->t( " If you don't remember your old password you can ask your administrator to recover your files." ) ); |
|
21 | + <?php p($l->t("Set your old private key password to your current log-in password:")); ?> |
|
22 | + <?php if ($_["recoveryEnabledForUser"]): |
|
23 | + p($l->t(" If you don't remember your old password you can ask your administrator to recover your files.")); |
|
24 | 24 | endif; ?> |
25 | 25 | <br /> |
26 | 26 | <input |
27 | 27 | type="password" |
28 | 28 | name="changePrivateKeyPassword" |
29 | 29 | id="oldPrivateKeyPassword" /> |
30 | - <label for="oldPrivateKeyPassword"><?php p($l->t( "Old log-in password" )); ?></label> |
|
30 | + <label for="oldPrivateKeyPassword"><?php p($l->t("Old log-in password")); ?></label> |
|
31 | 31 | <br /> |
32 | 32 | <input |
33 | 33 | type="password" |
34 | 34 | name="changePrivateKeyPassword" |
35 | 35 | id="newPrivateKeyPassword" /> |
36 | - <label for="newRecoveryPassword"><?php p($l->t( "Current log-in password" )); ?></label> |
|
36 | + <label for="newRecoveryPassword"><?php p($l->t("Current log-in password")); ?></label> |
|
37 | 37 | <br /> |
38 | 38 | <button |
39 | 39 | type="button" |
40 | 40 | name="submitChangePrivateKeyPassword" |
41 | - disabled><?php p($l->t( "Update Private Key Password" )); ?> |
|
41 | + disabled><?php p($l->t("Update Private Key Password")); ?> |
|
42 | 42 | </button> |
43 | 43 | <span class="msg"></span> |
44 | 44 | </p> |
45 | 45 | |
46 | - <?php elseif ( $_["recoveryEnabled"] && $_["privateKeySet"] && $_["initialized"] === \OCA\Encryption\Session::INIT_SUCCESSFUL ): ?> |
|
46 | + <?php elseif ($_["recoveryEnabled"] && $_["privateKeySet"] && $_["initialized"] === \OCA\Encryption\Session::INIT_SUCCESSFUL): ?> |
|
47 | 47 | <br /> |
48 | 48 | <p id="userEnableRecovery"> |
49 | - <label for="userEnableRecovery"><?php p( $l->t( "Enable password recovery:" ) ); ?></label> |
|
49 | + <label for="userEnableRecovery"><?php p($l->t("Enable password recovery:")); ?></label> |
|
50 | 50 | <span class="msg"></span> |
51 | 51 | <br /> |
52 | - <em><?php p( $l->t( "Enabling this option will allow you to reobtain access to your encrypted files in case of password loss" ) ); ?></em> |
|
52 | + <em><?php p($l->t("Enabling this option will allow you to reobtain access to your encrypted files in case of password loss")); ?></em> |
|
53 | 53 | <br /> |
54 | 54 | <input |
55 | 55 | type="radio" |
@@ -57,8 +57,8 @@ discard block |
||
57 | 57 | id="userEnableRecoveryCheckbox" |
58 | 58 | name="userEnableRecovery" |
59 | 59 | value="1" |
60 | - <?php echo ( $_["recoveryEnabledForUser"] ? 'checked="checked"' : '' ); ?> /> |
|
61 | - <label for="userEnableRecoveryCheckbox"><?php p( $l->t( "Enabled" ) ); ?></label> |
|
60 | + <?php echo ($_["recoveryEnabledForUser"] ? 'checked="checked"' : ''); ?> /> |
|
61 | + <label for="userEnableRecoveryCheckbox"><?php p($l->t("Enabled")); ?></label> |
|
62 | 62 | <br /> |
63 | 63 | |
64 | 64 | <input |
@@ -67,8 +67,8 @@ discard block |
||
67 | 67 | id="userDisableRecoveryCheckbox" |
68 | 68 | name="userEnableRecovery" |
69 | 69 | value="0" |
70 | - <?php echo ( $_["recoveryEnabledForUser"] === false ? 'checked="checked"' : '' ); ?> /> |
|
71 | - <label for="userDisableRecoveryCheckbox"><?php p( $l->t( "Disabled" ) ); ?></label> |
|
70 | + <?php echo ($_["recoveryEnabledForUser"] === false ? 'checked="checked"' : ''); ?> /> |
|
71 | + <label for="userDisableRecoveryCheckbox"><?php p($l->t("Disabled")); ?></label> |
|
72 | 72 | </p> |
73 | 73 | <?php endif; ?> |
74 | 74 | </form> |
@@ -66,14 +66,14 @@ discard block |
||
66 | 66 | |
67 | 67 | $nodes = $this->nodes; |
68 | 68 | // http://stackoverflow.com/a/10985500 |
69 | - @usort($nodes, function (IFile $a, IFile $b) { |
|
69 | + @usort($nodes, function(IFile $a, IFile $b) { |
|
70 | 70 | return strnatcmp($a->getName(), $b->getName()); |
71 | 71 | }); |
72 | 72 | $this->nodes = array_values($nodes); |
73 | 73 | if (count($this->nodes) > 0) { |
74 | 74 | $this->currentStream = $this->getStream($this->nodes[0]); |
75 | 75 | } |
76 | - $this->size = array_reduce($this->nodes, function ($size, IFile $file) { |
|
76 | + $this->size = array_reduce($this->nodes, function($size, IFile $file) { |
|
77 | 77 | return $size + $file->getSize(); |
78 | 78 | }, 0); |
79 | 79 | return true; |
@@ -202,7 +202,7 @@ discard block |
||
202 | 202 | if (isset($context[$name])) { |
203 | 203 | $context = $context[$name]; |
204 | 204 | } else { |
205 | - throw new \BadMethodCallException('Invalid context, "' . $name . '" options not set'); |
|
205 | + throw new \BadMethodCallException('Invalid context, "'.$name.'" options not set'); |
|
206 | 206 | } |
207 | 207 | if (isset($context['nodes']) and is_array($context['nodes'])) { |
208 | 208 | $this->nodes = $context['nodes']; |