@@ -39,7 +39,7 @@ |
||
39 | 39 | } |
40 | 40 | |
41 | 41 | public function createDirectory($name) { |
42 | - throw new Forbidden('Permission denied to create file (filename ' . $name . ')'); |
|
42 | + throw new Forbidden('Permission denied to create file (filename '.$name.')'); |
|
43 | 43 | } |
44 | 44 | |
45 | 45 | public function getChild($name) { |
@@ -84,7 +84,7 @@ |
||
84 | 84 | */ |
85 | 85 | public function getSize() { |
86 | 86 | $children = $this->root->getChildren(); |
87 | - $sizes = array_map(function ($node) { |
|
87 | + $sizes = array_map(function($node) { |
|
88 | 88 | /** @var IFile $node */ |
89 | 89 | return $node->getSize(); |
90 | 90 | }, $children); |
@@ -62,7 +62,7 @@ |
||
62 | 62 | |
63 | 63 | $requestUri = \OC::$server->getRequest()->getRequestUri(); |
64 | 64 | |
65 | -$server = $serverFactory->createServer($baseuri, $requestUri, $authPlugin, function () { |
|
65 | +$server = $serverFactory->createServer($baseuri, $requestUri, $authPlugin, function() { |
|
66 | 66 | // use the view for the logged in user |
67 | 67 | return \OC\Files\Filesystem::getView(); |
68 | 68 | }); |
@@ -55,8 +55,8 @@ |
||
55 | 55 | $logger = \OC::$server->getLogger(); |
56 | 56 | |
57 | 57 | $sql = |
58 | - 'DELETE FROM `*PREFIX*share` ' . |
|
59 | - 'WHERE `item_type` in (\'file\', \'folder\') ' . |
|
58 | + 'DELETE FROM `*PREFIX*share` '. |
|
59 | + 'WHERE `item_type` in (\'file\', \'folder\') '. |
|
60 | 60 | 'AND NOT EXISTS (SELECT `fileid` FROM `*PREFIX*filecache` WHERE `file_source` = `fileid`)'; |
61 | 61 | |
62 | 62 | $deletedEntries = $connection->executeUpdate($sql); |
@@ -220,7 +220,7 @@ discard block |
||
220 | 220 | if (isset($parameters[$key])) { |
221 | 221 | switch ($parameters[$key]->getType()) { |
222 | 222 | case \OCA\Files_External\Lib\DefinitionParameter::VALUE_BOOLEAN: |
223 | - $value = (bool)$value; |
|
223 | + $value = (bool) $value; |
|
224 | 224 | break; |
225 | 225 | } |
226 | 226 | $backendOptions[$key] = $value; |
@@ -426,7 +426,7 @@ discard block |
||
426 | 426 | $result['statusMessage'] = $this->statusMessage; |
427 | 427 | } |
428 | 428 | $result['userProvided'] = $this->authMechanism instanceof IUserProvided; |
429 | - $result['type'] = ($this->getType() === self::MOUNT_TYPE_PERSONAl) ? 'personal': 'system'; |
|
429 | + $result['type'] = ($this->getType() === self::MOUNT_TYPE_PERSONAl) ? 'personal' : 'system'; |
|
430 | 430 | return $result; |
431 | 431 | } |
432 | 432 | } |
@@ -50,7 +50,7 @@ |
||
50 | 50 | ->setFlag(DefinitionParameter::FLAG_OPTIONAL), |
51 | 51 | ]) |
52 | 52 | ->addAuthScheme(AuthMechanism::SCHEME_OPENSTACK) |
53 | - ->setLegacyAuthMechanismCallback(function (array $params) use ($openstackAuth, $rackspaceAuth) { |
|
53 | + ->setLegacyAuthMechanismCallback(function(array $params) use ($openstackAuth, $rackspaceAuth) { |
|
54 | 54 | if (isset($params['options']['key']) && $params['options']['key']) { |
55 | 55 | return $rackspaceAuth; |
56 | 56 | } |
@@ -134,7 +134,7 @@ discard block |
||
134 | 134 | */ |
135 | 135 | public function requestSharedSecret($url, $token) { |
136 | 136 | if ($this->trustedServers->isTrustedServer($url) === false) { |
137 | - $this->logger->error('remote server not trusted (' . $url . ') while requesting shared secret', ['app' => 'federation']); |
|
137 | + $this->logger->error('remote server not trusted ('.$url.') while requesting shared secret', ['app' => 'federation']); |
|
138 | 138 | throw new OCSForbiddenException(); |
139 | 139 | } |
140 | 140 | |
@@ -143,7 +143,7 @@ discard block |
||
143 | 143 | $localToken = $this->dbHandler->getToken($url); |
144 | 144 | if (strcmp($localToken, $token) > 0) { |
145 | 145 | $this->logger->info( |
146 | - 'remote server (' . $url . ') presented lower token. We will initiate the exchange of the shared secret.', |
|
146 | + 'remote server ('.$url.') presented lower token. We will initiate the exchange of the shared secret.', |
|
147 | 147 | ['app' => 'federation'] |
148 | 148 | ); |
149 | 149 | throw new OCSForbiddenException(); |
@@ -183,14 +183,14 @@ discard block |
||
183 | 183 | */ |
184 | 184 | public function getSharedSecret($url, $token) { |
185 | 185 | if ($this->trustedServers->isTrustedServer($url) === false) { |
186 | - $this->logger->error('remote server not trusted (' . $url . ') while getting shared secret', ['app' => 'federation']); |
|
186 | + $this->logger->error('remote server not trusted ('.$url.') while getting shared secret', ['app' => 'federation']); |
|
187 | 187 | throw new OCSForbiddenException(); |
188 | 188 | } |
189 | 189 | |
190 | 190 | if ($this->isValidToken($url, $token) === false) { |
191 | 191 | $expectedToken = $this->dbHandler->getToken($url); |
192 | 192 | $this->logger->error( |
193 | - 'remote server (' . $url . ') didn\'t send a valid token (got "' . $token . '" but expected "'. $expectedToken . '") while getting shared secret', |
|
193 | + 'remote server ('.$url.') didn\'t send a valid token (got "'.$token.'" but expected "'.$expectedToken.'") while getting shared secret', |
|
194 | 194 | ['app' => 'federation'] |
195 | 195 | ); |
196 | 196 | throw new OCSForbiddenException(); |
@@ -53,7 +53,7 @@ |
||
53 | 53 | public function getLastUsedTagIds() { |
54 | 54 | $lastUsed = $this->config->getUserValue($this->userSession->getUser()->getUID(), 'systemtags', 'last_used', '[]'); |
55 | 55 | $tagIds = json_decode($lastUsed, true); |
56 | - return new DataResponse(array_map(function ($id) { |
|
56 | + return new DataResponse(array_map(function($id) { |
|
57 | 57 | return (string) $id; |
58 | 58 | }, $tagIds)); |
59 | 59 | } |
@@ -90,7 +90,7 @@ discard block |
||
90 | 90 | } else { |
91 | 91 | $p = new ProgressBar($output); |
92 | 92 | $p->start(); |
93 | - $this->userManager->callForSeenUsers(function (IUser $user) use ($p) { |
|
93 | + $this->userManager->callForSeenUsers(function(IUser $user) use ($p) { |
|
94 | 94 | $p->advance(); |
95 | 95 | $this->expireTrashForUser($user); |
96 | 96 | }); |
@@ -118,7 +118,7 @@ discard block |
||
118 | 118 | \OC_Util::setupFS($user); |
119 | 119 | |
120 | 120 | // Check if this user has a trashbin directory |
121 | - $view = new \OC\Files\View('/' . $user); |
|
121 | + $view = new \OC\Files\View('/'.$user); |
|
122 | 122 | if (!$view->is_dir('/files_trashbin/files')) { |
123 | 123 | return false; |
124 | 124 | } |