@@ -199,7 +199,7 @@ discard block |
||
| 199 | 199 | $this->abandonPagedSearch(); |
| 200 | 200 | // openLDAP requires that we init a new Paged Search. Not needed by AD, |
| 201 | 201 | // but does not hurt either. |
| 202 | - $pagingSize = (int)$this->connection->ldapPagingSize; |
|
| 202 | + $pagingSize = (int) $this->connection->ldapPagingSize; |
|
| 203 | 203 | // 0 won't result in replies, small numbers may leave out groups |
| 204 | 204 | // (cf. #12306), 500 is default for paging and should work everywhere. |
| 205 | 205 | $maxResults = $pagingSize > 20 ? $pagingSize : 500; |
@@ -240,13 +240,13 @@ discard block |
||
| 240 | 240 | return $values; |
| 241 | 241 | } else { |
| 242 | 242 | $low = $result['rangeHigh'] + 1; |
| 243 | - $attrToRead = $result['attributeName'] . ';range=' . $low . '-*'; |
|
| 243 | + $attrToRead = $result['attributeName'].';range='.$low.'-*'; |
|
| 244 | 244 | $isRangeRequest = true; |
| 245 | 245 | } |
| 246 | 246 | } |
| 247 | 247 | } while ($isRangeRequest); |
| 248 | 248 | |
| 249 | - \OCP\Util::writeLog('user_ldap', 'Requested attribute ' . $attr . ' not found for ' . $dn, ILogger::DEBUG); |
|
| 249 | + \OCP\Util::writeLog('user_ldap', 'Requested attribute '.$attr.' not found for '.$dn, ILogger::DEBUG); |
|
| 250 | 250 | return false; |
| 251 | 251 | } |
| 252 | 252 | |
@@ -270,13 +270,13 @@ discard block |
||
| 270 | 270 | if (!$this->ldap->isResource($rr)) { |
| 271 | 271 | if ($attribute !== '') { |
| 272 | 272 | //do not throw this message on userExists check, irritates |
| 273 | - \OCP\Util::writeLog('user_ldap', 'readAttribute failed for DN ' . $dn, ILogger::DEBUG); |
|
| 273 | + \OCP\Util::writeLog('user_ldap', 'readAttribute failed for DN '.$dn, ILogger::DEBUG); |
|
| 274 | 274 | } |
| 275 | 275 | //in case an error occurs , e.g. object does not exist |
| 276 | 276 | return false; |
| 277 | 277 | } |
| 278 | 278 | if ($attribute === '' && ($filter === 'objectclass=*' || $this->invokeLDAPMethod('countEntries', $cr, $rr) === 1)) { |
| 279 | - \OCP\Util::writeLog('user_ldap', 'readAttribute: ' . $dn . ' found', ILogger::DEBUG); |
|
| 279 | + \OCP\Util::writeLog('user_ldap', 'readAttribute: '.$dn.' found', ILogger::DEBUG); |
|
| 280 | 280 | return true; |
| 281 | 281 | } |
| 282 | 282 | $er = $this->invokeLDAPMethod('firstEntry', $cr, $rr); |
@@ -356,7 +356,7 @@ discard block |
||
| 356 | 356 | * @throws \Exception |
| 357 | 357 | */ |
| 358 | 358 | public function setPassword($userDN, $password) { |
| 359 | - if ((int)$this->connection->turnOnPasswordChange !== 1) { |
|
| 359 | + if ((int) $this->connection->turnOnPasswordChange !== 1) { |
|
| 360 | 360 | throw new \Exception('LDAP password changes are disabled.'); |
| 361 | 361 | } |
| 362 | 362 | $cr = $this->connection->getConnectionResource(); |
@@ -370,7 +370,7 @@ discard block |
||
| 370 | 370 | return @$this->invokeLDAPMethod('exopPasswd', $cr, $userDN, '', $password) || |
| 371 | 371 | @$this->invokeLDAPMethod('modReplace', $cr, $userDN, $password); |
| 372 | 372 | } catch (ConstraintViolationException $e) { |
| 373 | - throw new HintException('Password change rejected.', \OC::$server->getL10N('user_ldap')->t('Password change rejected. Hint: ') . $e->getMessage(), $e->getCode()); |
|
| 373 | + throw new HintException('Password change rejected.', \OC::$server->getL10N('user_ldap')->t('Password change rejected. Hint: ').$e->getMessage(), $e->getCode()); |
|
| 374 | 374 | } |
| 375 | 375 | } |
| 376 | 376 | |
@@ -536,21 +536,21 @@ discard block |
||
| 536 | 536 | } |
| 537 | 537 | } else { |
| 538 | 538 | //If the UUID can't be detected something is foul. |
| 539 | - \OCP\Util::writeLog('user_ldap', 'Cannot determine UUID for ' . $fdn . '. Skipping.', ILogger::INFO); |
|
| 539 | + \OCP\Util::writeLog('user_ldap', 'Cannot determine UUID for '.$fdn.'. Skipping.', ILogger::INFO); |
|
| 540 | 540 | return false; |
| 541 | 541 | } |
| 542 | 542 | |
| 543 | 543 | if (is_null($ldapName)) { |
| 544 | 544 | $ldapName = $this->readAttribute($fdn, $nameAttribute, $filter); |
| 545 | 545 | if (!isset($ldapName[0]) && empty($ldapName[0])) { |
| 546 | - \OCP\Util::writeLog('user_ldap', 'No or empty name for ' . $fdn . ' with filter ' . $filter . '.', ILogger::DEBUG); |
|
| 546 | + \OCP\Util::writeLog('user_ldap', 'No or empty name for '.$fdn.' with filter '.$filter.'.', ILogger::DEBUG); |
|
| 547 | 547 | return false; |
| 548 | 548 | } |
| 549 | 549 | $ldapName = $ldapName[0]; |
| 550 | 550 | } |
| 551 | 551 | |
| 552 | 552 | if ($isUser) { |
| 553 | - $usernameAttribute = (string)$this->connection->ldapExpertUsernameAttr; |
|
| 553 | + $usernameAttribute = (string) $this->connection->ldapExpertUsernameAttr; |
|
| 554 | 554 | if ($usernameAttribute !== '') { |
| 555 | 555 | $username = $this->readAttribute($fdn, $usernameAttribute); |
| 556 | 556 | $username = $username[0]; |
@@ -602,7 +602,7 @@ discard block |
||
| 602 | 602 | } |
| 603 | 603 | |
| 604 | 604 | //if everything else did not help.. |
| 605 | - \OCP\Util::writeLog('user_ldap', 'Could not create unique name for ' . $fdn . '.', ILogger::INFO); |
|
| 605 | + \OCP\Util::writeLog('user_ldap', 'Could not create unique name for '.$fdn.'.', ILogger::INFO); |
|
| 606 | 606 | return false; |
| 607 | 607 | } |
| 608 | 608 | |
@@ -717,7 +717,7 @@ discard block |
||
| 717 | 717 | * @param string|false $home the home directory path |
| 718 | 718 | */ |
| 719 | 719 | public function cacheUserHome($ocName, $home) { |
| 720 | - $cacheKey = 'getHome' . $ocName; |
|
| 720 | + $cacheKey = 'getHome'.$ocName; |
|
| 721 | 721 | $this->connection->writeToCache($cacheKey, $home); |
| 722 | 722 | } |
| 723 | 723 | |
@@ -727,14 +727,14 @@ discard block |
||
| 727 | 727 | * @param string $ocName the internal Nextcloud username |
| 728 | 728 | */ |
| 729 | 729 | public function cacheUserExists($ocName) { |
| 730 | - $this->connection->writeToCache('userExists' . $ocName, true); |
|
| 730 | + $this->connection->writeToCache('userExists'.$ocName, true); |
|
| 731 | 731 | } |
| 732 | 732 | |
| 733 | 733 | /** |
| 734 | 734 | * caches a group as existing |
| 735 | 735 | */ |
| 736 | 736 | public function cacheGroupExists(string $gid): void { |
| 737 | - $this->connection->writeToCache('groupExists' . $gid, true); |
|
| 737 | + $this->connection->writeToCache('groupExists'.$gid, true); |
|
| 738 | 738 | } |
| 739 | 739 | |
| 740 | 740 | /** |
@@ -752,11 +752,11 @@ discard block |
||
| 752 | 752 | } |
| 753 | 753 | $displayName = $user->composeAndStoreDisplayName($displayName, $displayName2); |
| 754 | 754 | $cacheKeyTrunk = 'getDisplayName'; |
| 755 | - $this->connection->writeToCache($cacheKeyTrunk . $ocName, $displayName); |
|
| 755 | + $this->connection->writeToCache($cacheKeyTrunk.$ocName, $displayName); |
|
| 756 | 756 | } |
| 757 | 757 | |
| 758 | 758 | public function cacheGroupDisplayName(string $ncName, string $displayName): void { |
| 759 | - $cacheKey = 'group_getDisplayName' . $ncName; |
|
| 759 | + $cacheKey = 'group_getDisplayName'.$ncName; |
|
| 760 | 760 | $this->connection->writeToCache($cacheKey, $displayName); |
| 761 | 761 | } |
| 762 | 762 | |
@@ -774,7 +774,7 @@ discard block |
||
| 774 | 774 | //while loop is just a precaution. If a name is not generated within |
| 775 | 775 | //20 attempts, something else is very wrong. Avoids infinite loop. |
| 776 | 776 | while ($attempts < 20) { |
| 777 | - $altName = $name . '_' . rand(1000, 9999); |
|
| 777 | + $altName = $name.'_'.rand(1000, 9999); |
|
| 778 | 778 | if (!$this->ncUserManager->userExists($altName)) { |
| 779 | 779 | return $altName; |
| 780 | 780 | } |
@@ -803,9 +803,9 @@ discard block |
||
| 803 | 803 | } else { |
| 804 | 804 | natsort($usedNames); |
| 805 | 805 | $lastName = array_pop($usedNames); |
| 806 | - $lastNo = (int)substr($lastName, strrpos($lastName, '_') + 1); |
|
| 806 | + $lastNo = (int) substr($lastName, strrpos($lastName, '_') + 1); |
|
| 807 | 807 | } |
| 808 | - $altName = $name . '_' . (string)($lastNo + 1); |
|
| 808 | + $altName = $name.'_'.(string) ($lastNo + 1); |
|
| 809 | 809 | unset($usedNames); |
| 810 | 810 | |
| 811 | 811 | $attempts = 1; |
@@ -816,7 +816,7 @@ discard block |
||
| 816 | 816 | if (!\OC::$server->getGroupManager()->groupExists($altName)) { |
| 817 | 817 | return $altName; |
| 818 | 818 | } |
| 819 | - $altName = $name . '_' . ($lastNo + $attempts); |
|
| 819 | + $altName = $name.'_'.($lastNo + $attempts); |
|
| 820 | 820 | $attempts++; |
| 821 | 821 | } |
| 822 | 822 | return false; |
@@ -874,12 +874,12 @@ discard block |
||
| 874 | 874 | if (!$forceApplyAttributes) { |
| 875 | 875 | $isBackgroundJobModeAjax = $this->config |
| 876 | 876 | ->getAppValue('core', 'backgroundjobs_mode', 'ajax') === 'ajax'; |
| 877 | - $listOfDNs = array_reduce($ldapRecords, function ($listOfDNs, $entry) { |
|
| 877 | + $listOfDNs = array_reduce($ldapRecords, function($listOfDNs, $entry) { |
|
| 878 | 878 | $listOfDNs[] = $entry['dn'][0]; |
| 879 | 879 | return $listOfDNs; |
| 880 | 880 | }, []); |
| 881 | 881 | $idsByDn = $this->userMapper->getListOfIdsByDn($listOfDNs); |
| 882 | - $recordsToUpdate = array_filter($ldapRecords, function ($record) use ($isBackgroundJobModeAjax, $idsByDn) { |
|
| 882 | + $recordsToUpdate = array_filter($ldapRecords, function($record) use ($isBackgroundJobModeAjax, $idsByDn) { |
|
| 883 | 883 | $newlyMapped = false; |
| 884 | 884 | $uid = $idsByDn[$record['dn'][0]] ?? null; |
| 885 | 885 | if ($uid === null) { |
@@ -937,13 +937,13 @@ discard block |
||
| 937 | 937 | public function fetchListOfGroups($filter, $attr, $limit = null, $offset = null) { |
| 938 | 938 | $groupRecords = $this->searchGroups($filter, $attr, $limit, $offset); |
| 939 | 939 | |
| 940 | - $listOfDNs = array_reduce($groupRecords, function ($listOfDNs, $entry) { |
|
| 940 | + $listOfDNs = array_reduce($groupRecords, function($listOfDNs, $entry) { |
|
| 941 | 941 | $listOfDNs[] = $entry['dn'][0]; |
| 942 | 942 | return $listOfDNs; |
| 943 | 943 | }, []); |
| 944 | 944 | $idsByDn = $this->groupMapper->getListOfIdsByDn($listOfDNs); |
| 945 | 945 | |
| 946 | - array_walk($groupRecords, function ($record) use ($idsByDn) { |
|
| 946 | + array_walk($groupRecords, function($record) use ($idsByDn) { |
|
| 947 | 947 | $newlyMapped = false; |
| 948 | 948 | $gid = $idsByDn[$record['dn'][0]] ?? null; |
| 949 | 949 | if ($gid === null) { |
@@ -966,7 +966,7 @@ discard block |
||
| 966 | 966 | if ($manyAttributes) { |
| 967 | 967 | return $list; |
| 968 | 968 | } else { |
| 969 | - $list = array_reduce($list, function ($carry, $item) { |
|
| 969 | + $list = array_reduce($list, function($carry, $item) { |
|
| 970 | 970 | $attribute = array_keys($item)[0]; |
| 971 | 971 | $carry[] = $item[$attribute][0]; |
| 972 | 972 | return $carry; |
@@ -1002,7 +1002,7 @@ discard block |
||
| 1002 | 1002 | $result = false; |
| 1003 | 1003 | foreach ($this->connection->ldapBaseUsers as $base) { |
| 1004 | 1004 | $count = $this->count($filter, [$base], $attr, $limit, $offset); |
| 1005 | - $result = is_int($count) ? (int)$result + $count : $result; |
|
| 1005 | + $result = is_int($count) ? (int) $result + $count : $result; |
|
| 1006 | 1006 | } |
| 1007 | 1007 | return $result; |
| 1008 | 1008 | } |
@@ -1041,7 +1041,7 @@ discard block |
||
| 1041 | 1041 | $result = false; |
| 1042 | 1042 | foreach ($this->connection->ldapBaseGroups as $base) { |
| 1043 | 1043 | $count = $this->count($filter, [$base], $attr, $limit, $offset); |
| 1044 | - $result = is_int($count) ? (int)$result + $count : $result; |
|
| 1044 | + $result = is_int($count) ? (int) $result + $count : $result; |
|
| 1045 | 1045 | } |
| 1046 | 1046 | return $result; |
| 1047 | 1047 | } |
@@ -1058,7 +1058,7 @@ discard block |
||
| 1058 | 1058 | $result = false; |
| 1059 | 1059 | foreach ($this->connection->ldapBase as $base) { |
| 1060 | 1060 | $count = $this->count('objectclass=*', [$base], ['dn'], $limit, $offset); |
| 1061 | - $result = is_int($count) ? (int)$result + $count : $result; |
|
| 1061 | + $result = is_int($count) ? (int) $result + $count : $result; |
|
| 1062 | 1062 | } |
| 1063 | 1063 | return $result; |
| 1064 | 1064 | } |
@@ -1084,7 +1084,7 @@ discard block |
||
| 1084 | 1084 | // php no longer supports call-time pass-by-reference |
| 1085 | 1085 | // thus cannot support controlPagedResultResponse as the third argument |
| 1086 | 1086 | // is a reference |
| 1087 | - $doMethod = function () use ($command, &$arguments) { |
|
| 1087 | + $doMethod = function() use ($command, &$arguments) { |
|
| 1088 | 1088 | if ($command == 'controlPagedResultResponse') { |
| 1089 | 1089 | throw new \InvalidArgumentException('Invoker does not support controlPagedResultResponse, call LDAP Wrapper directly instead.'); |
| 1090 | 1090 | } else { |
@@ -1143,13 +1143,13 @@ discard block |
||
| 1143 | 1143 | } |
| 1144 | 1144 | |
| 1145 | 1145 | //check whether paged search should be attempted |
| 1146 | - $pagedSearchOK = $this->initPagedSearch($filter, $base, $attr, (int)$limit, (int)$offset); |
|
| 1146 | + $pagedSearchOK = $this->initPagedSearch($filter, $base, $attr, (int) $limit, (int) $offset); |
|
| 1147 | 1147 | |
| 1148 | 1148 | $sr = $this->invokeLDAPMethod('search', $cr, $base, $filter, $attr); |
| 1149 | 1149 | // cannot use $cr anymore, might have changed in the previous call! |
| 1150 | 1150 | $error = $this->ldap->errno($this->connection->getConnectionResource()); |
| 1151 | 1151 | if (!$this->ldap->isResource($sr) || $error !== 0) { |
| 1152 | - \OCP\Util::writeLog('user_ldap', 'Attempt for Paging? ' . print_r($pagedSearchOK, true), ILogger::ERROR); |
|
| 1152 | + \OCP\Util::writeLog('user_ldap', 'Attempt for Paging? '.print_r($pagedSearchOK, true), ILogger::ERROR); |
|
| 1153 | 1153 | return false; |
| 1154 | 1154 | } |
| 1155 | 1155 | |
@@ -1193,7 +1193,7 @@ discard block |
||
| 1193 | 1193 | $this->pagedSearchedSuccessful = true; |
| 1194 | 1194 | } |
| 1195 | 1195 | } else { |
| 1196 | - if (!is_null($limit) && (int)$this->connection->ldapPagingSize !== 0) { |
|
| 1196 | + if (!is_null($limit) && (int) $this->connection->ldapPagingSize !== 0) { |
|
| 1197 | 1197 | \OC::$server->getLogger()->debug( |
| 1198 | 1198 | 'Paged search was not available', |
| 1199 | 1199 | ['app' => 'user_ldap'] |
@@ -1239,7 +1239,7 @@ discard block |
||
| 1239 | 1239 | $attr = [mb_strtolower($attr, 'UTF-8')]; |
| 1240 | 1240 | } |
| 1241 | 1241 | |
| 1242 | - $limitPerPage = (int)$this->connection->ldapPagingSize; |
|
| 1242 | + $limitPerPage = (int) $this->connection->ldapPagingSize; |
|
| 1243 | 1243 | if (!is_null($limit) && $limit < $limitPerPage && $limit > 0) { |
| 1244 | 1244 | $limitPerPage = $limit; |
| 1245 | 1245 | } |
@@ -1281,7 +1281,7 @@ discard block |
||
| 1281 | 1281 | * @throws ServerNotAvailableException |
| 1282 | 1282 | */ |
| 1283 | 1283 | private function countEntriesInSearchResults($sr): int { |
| 1284 | - return (int)$this->invokeLDAPMethod('countEntries', $this->connection->getConnectionResource(), $sr); |
|
| 1284 | + return (int) $this->invokeLDAPMethod('countEntries', $this->connection->getConnectionResource(), $sr); |
|
| 1285 | 1285 | } |
| 1286 | 1286 | |
| 1287 | 1287 | /** |
@@ -1297,7 +1297,7 @@ discard block |
||
| 1297 | 1297 | ?int $offset = null, |
| 1298 | 1298 | bool $skipHandling = false |
| 1299 | 1299 | ): array { |
| 1300 | - $limitPerPage = (int)$this->connection->ldapPagingSize; |
|
| 1300 | + $limitPerPage = (int) $this->connection->ldapPagingSize; |
|
| 1301 | 1301 | if (!is_null($limit) && $limit < $limitPerPage && $limit > 0) { |
| 1302 | 1302 | $limitPerPage = $limit; |
| 1303 | 1303 | } |
@@ -1389,7 +1389,7 @@ discard block |
||
| 1389 | 1389 | && !is_null($limit) |
| 1390 | 1390 | ) |
| 1391 | 1391 | ) { |
| 1392 | - $findings = array_slice($findings, (int)$offset, $limit); |
|
| 1392 | + $findings = array_slice($findings, (int) $offset, $limit); |
|
| 1393 | 1393 | } |
| 1394 | 1394 | return $findings; |
| 1395 | 1395 | } |
@@ -1441,7 +1441,7 @@ discard block |
||
| 1441 | 1441 | } |
| 1442 | 1442 | $search = ['*', '\\', '(', ')']; |
| 1443 | 1443 | $replace = ['\\*', '\\\\', '\\(', '\\)']; |
| 1444 | - return $asterisk . str_replace($search, $replace, $input); |
|
| 1444 | + return $asterisk.str_replace($search, $replace, $input); |
|
| 1445 | 1445 | } |
| 1446 | 1446 | |
| 1447 | 1447 | /** |
@@ -1473,10 +1473,10 @@ discard block |
||
| 1473 | 1473 | * @return string the combined filter |
| 1474 | 1474 | */ |
| 1475 | 1475 | private function combineFilter($filters, $operator) { |
| 1476 | - $combinedFilter = '(' . $operator; |
|
| 1476 | + $combinedFilter = '('.$operator; |
|
| 1477 | 1477 | foreach ($filters as $filter) { |
| 1478 | 1478 | if ($filter !== '' && $filter[0] !== '(') { |
| 1479 | - $filter = '(' . $filter . ')'; |
|
| 1479 | + $filter = '('.$filter.')'; |
|
| 1480 | 1480 | } |
| 1481 | 1481 | $combinedFilter .= $filter; |
| 1482 | 1482 | } |
@@ -1529,7 +1529,7 @@ discard block |
||
| 1529 | 1529 | //every word needs to appear at least once |
| 1530 | 1530 | $wordMatchOneAttrFilters = []; |
| 1531 | 1531 | foreach ($searchAttributes as $attr) { |
| 1532 | - $wordMatchOneAttrFilters[] = $attr . '=' . $word; |
|
| 1532 | + $wordMatchOneAttrFilters[] = $attr.'='.$word; |
|
| 1533 | 1533 | } |
| 1534 | 1534 | $wordFilters[] = $this->combineFilterWithOr($wordMatchOneAttrFilters); |
| 1535 | 1535 | } |
@@ -1561,14 +1561,14 @@ discard block |
||
| 1561 | 1561 | if ($fallbackAttribute === '') { |
| 1562 | 1562 | return ''; |
| 1563 | 1563 | } |
| 1564 | - $filter[] = $fallbackAttribute . '=' . $search; |
|
| 1564 | + $filter[] = $fallbackAttribute.'='.$search; |
|
| 1565 | 1565 | } else { |
| 1566 | 1566 | foreach ($searchAttributes as $attribute) { |
| 1567 | - $filter[] = $attribute . '=' . $search; |
|
| 1567 | + $filter[] = $attribute.'='.$search; |
|
| 1568 | 1568 | } |
| 1569 | 1569 | } |
| 1570 | 1570 | if (count($filter) === 1) { |
| 1571 | - return '(' . $filter[0] . ')'; |
|
| 1571 | + return '('.$filter[0].')'; |
|
| 1572 | 1572 | } |
| 1573 | 1573 | return $this->combineFilterWithOr($filter); |
| 1574 | 1574 | } |
@@ -1589,7 +1589,7 @@ discard block |
||
| 1589 | 1589 | if ($term === '') { |
| 1590 | 1590 | $result = '*'; |
| 1591 | 1591 | } elseif ($allowEnum !== 'no') { |
| 1592 | - $result = $term . '*'; |
|
| 1592 | + $result = $term.'*'; |
|
| 1593 | 1593 | } |
| 1594 | 1594 | return $result; |
| 1595 | 1595 | } |
@@ -1602,7 +1602,7 @@ discard block |
||
| 1602 | 1602 | public function getFilterForUserCount() { |
| 1603 | 1603 | $filter = $this->combineFilterWithAnd([ |
| 1604 | 1604 | $this->connection->ldapUserFilter, |
| 1605 | - $this->connection->ldapUserDisplayName . '=*' |
|
| 1605 | + $this->connection->ldapUserDisplayName.'=*' |
|
| 1606 | 1606 | ]); |
| 1607 | 1607 | |
| 1608 | 1608 | return $filter; |
@@ -1668,7 +1668,7 @@ discard block |
||
| 1668 | 1668 | $uuid = $this->formatGuid2ForFilterUser($uuid); |
| 1669 | 1669 | } |
| 1670 | 1670 | |
| 1671 | - $filter = $uuidAttr . '=' . $uuid; |
|
| 1671 | + $filter = $uuidAttr.'='.$uuid; |
|
| 1672 | 1672 | $result = $this->searchUsers($filter, ['dn'], 2); |
| 1673 | 1673 | if (is_array($result) && isset($result[0]) && isset($result[0]['dn']) && count($result) === 1) { |
| 1674 | 1674 | // we put the count into account to make sure that this is |
@@ -1798,8 +1798,8 @@ discard block |
||
| 1798 | 1798 | for ($k = 1; $k <= 2; ++$k) { |
| 1799 | 1799 | $hex_guid_to_guid_str .= substr($hex_guid, 16 - 2 * $k, 2); |
| 1800 | 1800 | } |
| 1801 | - $hex_guid_to_guid_str .= '-' . substr($hex_guid, 16, 4); |
|
| 1802 | - $hex_guid_to_guid_str .= '-' . substr($hex_guid, 20); |
|
| 1801 | + $hex_guid_to_guid_str .= '-'.substr($hex_guid, 16, 4); |
|
| 1802 | + $hex_guid_to_guid_str .= '-'.substr($hex_guid, 20); |
|
| 1803 | 1803 | |
| 1804 | 1804 | return strtoupper($hex_guid_to_guid_str); |
| 1805 | 1805 | } |
@@ -1833,7 +1833,7 @@ discard block |
||
| 1833 | 1833 | * user. Instead we write a log message. |
| 1834 | 1834 | */ |
| 1835 | 1835 | \OC::$server->getLogger()->info( |
| 1836 | - 'Passed string does not resemble a valid GUID. Known UUID ' . |
|
| 1836 | + 'Passed string does not resemble a valid GUID. Known UUID '. |
|
| 1837 | 1837 | '({uuid}) probably does not match UUID configuration.', |
| 1838 | 1838 | ['app' => 'user_ldap', 'uuid' => $guid] |
| 1839 | 1839 | ); |
@@ -1846,7 +1846,7 @@ discard block |
||
| 1846 | 1846 | } |
| 1847 | 1847 | for ($i = 0; $i < 5; $i++) { |
| 1848 | 1848 | $pairs = str_split($blocks[$i], 2); |
| 1849 | - $blocks[$i] = '\\' . implode('\\', $pairs); |
|
| 1849 | + $blocks[$i] = '\\'.implode('\\', $pairs); |
|
| 1850 | 1850 | } |
| 1851 | 1851 | return implode('', $blocks); |
| 1852 | 1852 | } |
@@ -1860,7 +1860,7 @@ discard block |
||
| 1860 | 1860 | */ |
| 1861 | 1861 | public function getSID($dn) { |
| 1862 | 1862 | $domainDN = $this->getDomainDNFromDN($dn); |
| 1863 | - $cacheKey = 'getSID-' . $domainDN; |
|
| 1863 | + $cacheKey = 'getSID-'.$domainDN; |
|
| 1864 | 1864 | $sid = $this->connection->getFromCache($cacheKey); |
| 1865 | 1865 | if (!is_null($sid)) { |
| 1866 | 1866 | return $sid; |
@@ -2053,7 +2053,7 @@ discard block |
||
| 2053 | 2053 | $this->abandonPagedSearch(); |
| 2054 | 2054 | // in case someone set it to 0 … use 500, otherwise no results will |
| 2055 | 2055 | // be returned. |
| 2056 | - $pageSize = (int)$this->connection->ldapPagingSize > 0 ? (int)$this->connection->ldapPagingSize : 500; |
|
| 2056 | + $pageSize = (int) $this->connection->ldapPagingSize > 0 ? (int) $this->connection->ldapPagingSize : 500; |
|
| 2057 | 2057 | $pagedSearchOK = $this->invokeLDAPMethod('controlPagedResult', |
| 2058 | 2058 | $this->connection->getConnectionResource(), |
| 2059 | 2059 | $pageSize, false); |