Completed
Pull Request — master (#3233)
by Jan-Christoph
12:09
created
apps/user_ldap/lib/Command/ShowConfig.php 1 patch
Spacing   +6 added lines, -6 removed lines patch added patch discarded remove patch
@@ -67,9 +67,9 @@  discard block
 block discarded – undo
67 67
 	protected function execute(InputInterface $input, OutputInterface $output) {
68 68
 		$availableConfigs = $this->helper->getServerConfigurationPrefixes();
69 69
 		$configID = $input->getArgument('configID');
70
-		if(!is_null($configID)) {
70
+		if (!is_null($configID)) {
71 71
 			$configIDs[] = $configID;
72
-			if(!in_array($configIDs[0], $availableConfigs)) {
72
+			if (!in_array($configIDs[0], $availableConfigs)) {
73 73
 				$output->writeln("Invalid configID");
74 74
 				return;
75 75
 			}
@@ -87,7 +87,7 @@  discard block
 block discarded – undo
87 87
 	 * @param bool $withPassword      Set to TRUE to show plaintext passwords in output
88 88
 	 */
89 89
 	protected function renderConfigs($configIDs, $output, $withPassword) {
90
-		foreach($configIDs as $id) {
90
+		foreach ($configIDs as $id) {
91 91
 			$configHolder = new Configuration($id);
92 92
 			$configuration = $configHolder->getConfiguration();
93 93
 			ksort($configuration);
@@ -95,11 +95,11 @@  discard block
 block discarded – undo
95 95
 			$table = new Table($output);
96 96
 			$table->setHeaders(array('Configuration', $id));
97 97
 			$rows = array();
98
-			foreach($configuration as $key => $value) {
99
-				if($key === 'ldapAgentPassword' && !$withPassword) {
98
+			foreach ($configuration as $key => $value) {
99
+				if ($key === 'ldapAgentPassword' && !$withPassword) {
100 100
 					$value = '***';
101 101
 				}
102
-				if(is_array($value)) {
102
+				if (is_array($value)) {
103 103
 					$value = implode(';', $value);
104 104
 				}
105 105
 				$rows[] = array($key, $value);
Please login to merge, or discard this patch.
apps/user_ldap/lib/Configuration.php 1 patch
Spacing   +23 added lines, -23 removed lines patch added patch discarded remove patch
@@ -101,7 +101,7 @@  discard block
 block discarded – undo
101 101
 	 */
102 102
 	public function __construct($configPrefix, $autoRead = true) {
103 103
 		$this->configPrefix = $configPrefix;
104
-		if($autoRead) {
104
+		if ($autoRead) {
105 105
 			$this->readConfiguration();
106 106
 		}
107 107
 	}
@@ -111,7 +111,7 @@  discard block
 block discarded – undo
111 111
 	 * @return mixed|null
112 112
 	 */
113 113
 	public function __get($name) {
114
-		if(isset($this->config[$name])) {
114
+		if (isset($this->config[$name])) {
115 115
 			return $this->config[$name];
116 116
 		}
117 117
 		return null;
@@ -142,22 +142,22 @@  discard block
 block discarded – undo
142 142
 	 * @return false|null
143 143
 	 */
144 144
 	public function setConfiguration($config, &$applied = null) {
145
-		if(!is_array($config)) {
145
+		if (!is_array($config)) {
146 146
 			return false;
147 147
 		}
148 148
 
149 149
 		$cta = $this->getConfigTranslationArray();
150
-		foreach($config as $inputKey => $val) {
151
-			if(strpos($inputKey, '_') !== false && array_key_exists($inputKey, $cta)) {
150
+		foreach ($config as $inputKey => $val) {
151
+			if (strpos($inputKey, '_') !== false && array_key_exists($inputKey, $cta)) {
152 152
 				$key = $cta[$inputKey];
153
-			} elseif(array_key_exists($inputKey, $this->config)) {
153
+			} elseif (array_key_exists($inputKey, $this->config)) {
154 154
 				$key = $inputKey;
155 155
 			} else {
156 156
 				continue;
157 157
 			}
158 158
 
159 159
 			$setMethod = 'setValue';
160
-			switch($key) {
160
+			switch ($key) {
161 161
 				case 'ldapAgentPassword':
162 162
 					$setMethod = 'setRawValue';
163 163
 					break;
@@ -181,7 +181,7 @@  discard block
 block discarded – undo
181 181
 					break;
182 182
 			}
183 183
 			$this->$setMethod($key, $val);
184
-			if(is_array($applied)) {
184
+			if (is_array($applied)) {
185 185
 				$applied[] = $inputKey;
186 186
 			}
187 187
 		}
@@ -189,15 +189,15 @@  discard block
 block discarded – undo
189 189
 	}
190 190
 
191 191
 	public function readConfiguration() {
192
-		if(!$this->configRead && !is_null($this->configPrefix)) {
192
+		if (!$this->configRead && !is_null($this->configPrefix)) {
193 193
 			$cta = array_flip($this->getConfigTranslationArray());
194
-			foreach($this->config as $key => $val) {
195
-				if(!isset($cta[$key])) {
194
+			foreach ($this->config as $key => $val) {
195
+				if (!isset($cta[$key])) {
196 196
 					//some are determined
197 197
 					continue;
198 198
 				}
199 199
 				$dbKey = $cta[$key];
200
-				switch($key) {
200
+				switch ($key) {
201 201
 					case 'ldapBase':
202 202
 					case 'ldapBaseUsers':
203 203
 					case 'ldapBaseGroups':
@@ -240,7 +240,7 @@  discard block
 block discarded – undo
240 240
 	 */
241 241
 	public function saveConfiguration() {
242 242
 		$cta = array_flip($this->getConfigTranslationArray());
243
-		foreach($this->config as $key => $value) {
243
+		foreach ($this->config as $key => $value) {
244 244
 			switch ($key) {
245 245
 				case 'ldapAgentPassword':
246 246
 					$value = base64_encode($value);
@@ -255,7 +255,7 @@  discard block
 block discarded – undo
255 255
 				case 'ldapGroupFilterObjectclass':
256 256
 				case 'ldapGroupFilterGroups':
257 257
 				case 'ldapLoginFilterAttributes':
258
-					if(is_array($value)) {
258
+					if (is_array($value)) {
259 259
 						$value = implode("\n", $value);
260 260
 					}
261 261
 					break;
@@ -266,7 +266,7 @@  discard block
 block discarded – undo
266 266
 				case 'ldapUuidGroupAttribute':
267 267
 					continue 2;
268 268
 			}
269
-			if(is_null($value)) {
269
+			if (is_null($value)) {
270 270
 				$value = '';
271 271
 			}
272 272
 			$this->saveValue($cta[$key], $value);
@@ -279,7 +279,7 @@  discard block
 block discarded – undo
279 279
 	 */
280 280
 	protected function getMultiLine($varName) {
281 281
 		$value = $this->getValue($varName);
282
-		if(empty($value)) {
282
+		if (empty($value)) {
283 283
 			$value = '';
284 284
 		} else {
285 285
 			$value = preg_split('/\r\n|\r|\n/', $value);
@@ -295,21 +295,21 @@  discard block
 block discarded – undo
295 295
 	 * @param array|string $value to set
296 296
 	 */
297 297
 	protected function setMultiLine($varName, $value) {
298
-		if(empty($value)) {
298
+		if (empty($value)) {
299 299
 			$value = '';
300 300
 		} else if (!is_array($value)) {
301 301
 			$value = preg_split('/\r\n|\r|\n|;/', $value);
302
-			if($value === false) {
302
+			if ($value === false) {
303 303
 				$value = '';
304 304
 			}
305 305
 		}
306 306
 
307
-		if(!is_array($value)) {
307
+		if (!is_array($value)) {
308 308
 			$finalValue = trim($value);
309 309
 		} else {
310 310
 			$finalValue = [];
311
-			foreach($value as $key => $val) {
312
-				if(is_string($val)) {
311
+			foreach ($value as $key => $val) {
312
+				if (is_string($val)) {
313 313
 					$val = trim($val);
314 314
 					if ($val !== '') {
315 315
 						//accidental line breaks are not wanted and can cause
@@ -356,7 +356,7 @@  discard block
 block discarded – undo
356 356
 	 */
357 357
 	protected function getValue($varName) {
358 358
 		static $defaults;
359
-		if(is_null($defaults)) {
359
+		if (is_null($defaults)) {
360 360
 			$defaults = $this->getDefaults();
361 361
 		}
362 362
 		return \OCP\Config::getAppValue('user_ldap',
@@ -371,7 +371,7 @@  discard block
 block discarded – undo
371 371
 	 * @param mixed $value to set
372 372
 	 */
373 373
 	protected function setValue($varName, $value) {
374
-		if(is_string($value)) {
374
+		if (is_string($value)) {
375 375
 			$value = trim($value);
376 376
 		}
377 377
 		$this->config[$varName] = $value;
Please login to merge, or discard this patch.
apps/user_ldap/lib/Settings/Admin.php 1 patch
Spacing   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -62,7 +62,7 @@
 block discarded – undo
62 62
 		// assign default values
63 63
 		$config = new Configuration('', false);
64 64
 		$defaults = $config->getDefaults();
65
-		foreach($defaults as $key => $default) {
65
+		foreach ($defaults as $key => $default) {
66 66
 			$parameters[$key.'_default'] = $default;
67 67
 		}
68 68
 
Please login to merge, or discard this patch.
apps/user_ldap/lib/User_Proxy.php 1 patch
Spacing   +15 added lines, -15 removed lines patch added patch discarded remove patch
@@ -42,10 +42,10 @@  discard block
 block discarded – undo
42 42
 	 */
43 43
 	public function __construct(array $serverConfigPrefixes, ILDAPWrapper $ldap, IConfig $ocConfig) {
44 44
 		parent::__construct($ldap);
45
-		foreach($serverConfigPrefixes as $configPrefix) {
45
+		foreach ($serverConfigPrefixes as $configPrefix) {
46 46
 			$this->backends[$configPrefix] =
47 47
 				new User_LDAP($this->getAccess($configPrefix), $ocConfig);
48
-			if(is_null($this->refBackend)) {
48
+			if (is_null($this->refBackend)) {
49 49
 				$this->refBackend = &$this->backends[$configPrefix];
50 50
 			}
51 51
 		}
@@ -60,13 +60,13 @@  discard block
 block discarded – undo
60 60
 	 */
61 61
 	protected function walkBackends($uid, $method, $parameters) {
62 62
 		$cacheKey = $this->getUserCacheKey($uid);
63
-		foreach($this->backends as $configPrefix => $backend) {
63
+		foreach ($this->backends as $configPrefix => $backend) {
64 64
 			$instance = $backend;
65
-			if(!method_exists($instance, $method)
65
+			if (!method_exists($instance, $method)
66 66
 				&& method_exists($this->getAccess($configPrefix), $method)) {
67 67
 				$instance = $this->getAccess($configPrefix);
68 68
 			}
69
-			if($result = call_user_func_array(array($instance, $method), $parameters)) {
69
+			if ($result = call_user_func_array(array($instance, $method), $parameters)) {
70 70
 				$this->writeToCache($cacheKey, $configPrefix);
71 71
 				return $result;
72 72
 			}
@@ -86,22 +86,22 @@  discard block
 block discarded – undo
86 86
 		$cacheKey = $this->getUserCacheKey($uid);
87 87
 		$prefix = $this->getFromCache($cacheKey);
88 88
 		//in case the uid has been found in the past, try this stored connection first
89
-		if(!is_null($prefix)) {
90
-			if(isset($this->backends[$prefix])) {
89
+		if (!is_null($prefix)) {
90
+			if (isset($this->backends[$prefix])) {
91 91
 				$instance = $this->backends[$prefix];
92
-				if(!method_exists($instance, $method)
92
+				if (!method_exists($instance, $method)
93 93
 					&& method_exists($this->getAccess($prefix), $method)) {
94 94
 					$instance = $this->getAccess($prefix);
95 95
 				}
96 96
 				$result = call_user_func_array(array($instance, $method), $parameters);
97
-				if($result === $passOnWhen) {
97
+				if ($result === $passOnWhen) {
98 98
 					//not found here, reset cache to null if user vanished
99 99
 					//because sometimes methods return false with a reason
100 100
 					$userExists = call_user_func_array(
101 101
 						array($this->backends[$prefix], 'userExists'),
102 102
 						array($uid)
103 103
 					);
104
-					if(!$userExists) {
104
+					if (!$userExists) {
105 105
 						$this->writeToCache($cacheKey, null);
106 106
 					}
107 107
 				}
@@ -143,7 +143,7 @@  discard block
 block discarded – undo
143 143
 	public function getUsers($search = '', $limit = 10, $offset = 0) {
144 144
 		//we do it just as the /OC_User implementation: do not play around with limit and offset but ask all backends
145 145
 		$users = array();
146
-		foreach($this->backends as $backend) {
146
+		foreach ($this->backends as $backend) {
147 147
 			$backendUsers = $backend->getUsers($search, $limit, $offset);
148 148
 			if (is_array($backendUsers)) {
149 149
 				$users = array_merge($users, $backendUsers);
@@ -191,7 +191,7 @@  discard block
 block discarded – undo
191 191
 	 * @return string|false
192 192
 	 */
193 193
 	public function loginName2UserName($loginName) {
194
-		$id = 'LOGINNAME,' . $loginName;
194
+		$id = 'LOGINNAME,'.$loginName;
195 195
 		return $this->handleRequest($id, 'loginName2UserName', array($loginName));
196 196
 	}
197 197
 	
@@ -202,7 +202,7 @@  discard block
 block discarded – undo
202 202
 	 * @return string|false with the username
203 203
 	 */
204 204
 	public function dn2UserName($dn) {
205
-		$id = 'DN,' . $dn;
205
+		$id = 'DN,'.$dn;
206 206
 		return $this->handleRequest($id, 'dn2UserName', array($dn));
207 207
 	}
208 208
 
@@ -243,7 +243,7 @@  discard block
 block discarded – undo
243 243
 	public function getDisplayNames($search = '', $limit = null, $offset = null) {
244 244
 		//we do it just as the /OC_User implementation: do not play around with limit and offset but ask all backends
245 245
 		$users = array();
246
-		foreach($this->backends as $backend) {
246
+		foreach ($this->backends as $backend) {
247 247
 			$backendUsers = $backend->getDisplayNames($search, $limit, $offset);
248 248
 			if (is_array($backendUsers)) {
249 249
 				$users = $users + $backendUsers;
@@ -287,7 +287,7 @@  discard block
 block discarded – undo
287 287
 	 */
288 288
 	public function countUsers() {
289 289
 		$users = false;
290
-		foreach($this->backends as $backend) {
290
+		foreach ($this->backends as $backend) {
291 291
 			$backendUsers = $backend->countUsers();
292 292
 			if ($backendUsers !== false) {
293 293
 				$users += $backendUsers;
Please login to merge, or discard this patch.
apps/user_ldap/lib/Connection.php 1 patch
Spacing   +58 added lines, -58 removed lines patch added patch discarded remove patch
@@ -87,7 +87,7 @@  discard block
 block discarded – undo
87 87
 		$this->configuration = new Configuration($configPrefix,
88 88
 												 !is_null($configID));
89 89
 		$memcache = \OC::$server->getMemCacheFactory();
90
-		if($memcache->isAvailable()) {
90
+		if ($memcache->isAvailable()) {
91 91
 			$this->cache = $memcache->create();
92 92
 		}
93 93
 		$helper = new Helper(\OC::$server->getConfig());
@@ -99,7 +99,7 @@  discard block
 block discarded – undo
99 99
 	}
100 100
 
101 101
 	public function __destruct() {
102
-		if(!$this->dontDestruct && $this->ldap->isResource($this->ldapConnectionRes)) {
102
+		if (!$this->dontDestruct && $this->ldap->isResource($this->ldapConnectionRes)) {
103 103
 			@$this->ldap->unbind($this->ldapConnectionRes);
104 104
 		};
105 105
 	}
@@ -119,11 +119,11 @@  discard block
 block discarded – undo
119 119
 	 * @return bool|mixed|void
120 120
 	 */
121 121
 	public function __get($name) {
122
-		if(!$this->configured) {
122
+		if (!$this->configured) {
123 123
 			$this->readConfiguration();
124 124
 		}
125 125
 
126
-		if($name === 'hasPagedResultSupport') {
126
+		if ($name === 'hasPagedResultSupport') {
127 127
 			return $this->hasPagedResultSupport;
128 128
 		}
129 129
 
@@ -139,7 +139,7 @@  discard block
 block discarded – undo
139 139
 		$before = $this->configuration->$name;
140 140
 		$this->configuration->$name = $value;
141 141
 		$after = $this->configuration->$name;
142
-		if($before !== $after) {
142
+		if ($before !== $after) {
143 143
 			if ($this->configID !== '') {
144 144
 				$this->configuration->saveConfiguration();
145 145
 			}
@@ -154,7 +154,7 @@  discard block
 block discarded – undo
154 154
 	 * @param bool $state
155 155
 	 */
156 156
 	public function setIgnoreValidation($state) {
157
-		$this->ignoreValidation = (bool)$state;
157
+		$this->ignoreValidation = (bool) $state;
158 158
 	}
159 159
 
160 160
 	/**
@@ -170,14 +170,14 @@  discard block
 block discarded – undo
170 170
 	 * Returns the LDAP handler
171 171
 	 */
172 172
 	public function getConnectionResource() {
173
-		if(!$this->ldapConnectionRes) {
173
+		if (!$this->ldapConnectionRes) {
174 174
 			$this->init();
175
-		} else if(!$this->ldap->isResource($this->ldapConnectionRes)) {
175
+		} else if (!$this->ldap->isResource($this->ldapConnectionRes)) {
176 176
 			$this->ldapConnectionRes = null;
177 177
 			$this->establishConnection();
178 178
 		}
179
-		if(is_null($this->ldapConnectionRes)) {
180
-			\OCP\Util::writeLog('user_ldap', 'No LDAP Connection to server ' . $this->configuration->ldapHost, \OCP\Util::ERROR);
179
+		if (is_null($this->ldapConnectionRes)) {
180
+			\OCP\Util::writeLog('user_ldap', 'No LDAP Connection to server '.$this->configuration->ldapHost, \OCP\Util::ERROR);
181 181
 			throw new ServerNotAvailableException('Connection to LDAP server could not be established');
182 182
 		}
183 183
 		return $this->ldapConnectionRes;
@@ -187,7 +187,7 @@  discard block
 block discarded – undo
187 187
 	 * resets the connection resource
188 188
 	 */
189 189
 	public function resetConnectionResource() {
190
-		if(!is_null($this->ldapConnectionRes)) {
190
+		if (!is_null($this->ldapConnectionRes)) {
191 191
 			@$this->ldap->unbind($this->ldapConnectionRes);
192 192
 			$this->ldapConnectionRes = null;
193 193
 		}
@@ -199,7 +199,7 @@  discard block
 block discarded – undo
199 199
 	 */
200 200
 	private function getCacheKey($key) {
201 201
 		$prefix = 'LDAP-'.$this->configID.'-'.$this->configPrefix.'-';
202
-		if(is_null($key)) {
202
+		if (is_null($key)) {
203 203
 			return $prefix;
204 204
 		}
205 205
 		return $prefix.md5($key);
@@ -210,10 +210,10 @@  discard block
 block discarded – undo
210 210
 	 * @return mixed|null
211 211
 	 */
212 212
 	public function getFromCache($key) {
213
-		if(!$this->configured) {
213
+		if (!$this->configured) {
214 214
 			$this->readConfiguration();
215 215
 		}
216
-		if(is_null($this->cache) || !$this->configuration->ldapCacheTTL) {
216
+		if (is_null($this->cache) || !$this->configuration->ldapCacheTTL) {
217 217
 			return null;
218 218
 		}
219 219
 		$key = $this->getCacheKey($key);
@@ -228,10 +228,10 @@  discard block
 block discarded – undo
228 228
 	 * @return string
229 229
 	 */
230 230
 	public function writeToCache($key, $value) {
231
-		if(!$this->configured) {
231
+		if (!$this->configured) {
232 232
 			$this->readConfiguration();
233 233
 		}
234
-		if(is_null($this->cache)
234
+		if (is_null($this->cache)
235 235
 			|| !$this->configuration->ldapCacheTTL
236 236
 			|| !$this->configuration->ldapConfigurationActive) {
237 237
 			return null;
@@ -242,7 +242,7 @@  discard block
 block discarded – undo
242 242
 	}
243 243
 
244 244
 	public function clearCache() {
245
-		if(!is_null($this->cache)) {
245
+		if (!is_null($this->cache)) {
246 246
 			$this->cache->clear($this->getCacheKey(null));
247 247
 		}
248 248
 	}
@@ -254,7 +254,7 @@  discard block
 block discarded – undo
254 254
 	 * @return null
255 255
 	 */
256 256
 	private function readConfiguration($force = false) {
257
-		if((!$this->configured || $force) && !is_null($this->configID)) {
257
+		if ((!$this->configured || $force) && !is_null($this->configID)) {
258 258
 			$this->configuration->readConfiguration();
259 259
 			$this->configured = $this->validateConfiguration();
260 260
 		}
@@ -267,12 +267,12 @@  discard block
 block discarded – undo
267 267
 	 * @return boolean true if config validates, false otherwise. Check with $setParameters for detailed success on single parameters
268 268
 	 */
269 269
 	public function setConfiguration($config, &$setParameters = null) {
270
-		if(is_null($setParameters)) {
270
+		if (is_null($setParameters)) {
271 271
 			$setParameters = array();
272 272
 		}
273 273
 		$this->doNotValidate = false;
274 274
 		$this->configuration->setConfiguration($config, $setParameters);
275
-		if(count($setParameters) > 0) {
275
+		if (count($setParameters) > 0) {
276 276
 			$this->configured = $this->validateConfiguration();
277 277
 		}
278 278
 
@@ -299,10 +299,10 @@  discard block
 block discarded – undo
299 299
 		$config = $this->configuration->getConfiguration();
300 300
 		$cta = $this->configuration->getConfigTranslationArray();
301 301
 		$result = array();
302
-		foreach($cta as $dbkey => $configkey) {
303
-			switch($configkey) {
302
+		foreach ($cta as $dbkey => $configkey) {
303
+			switch ($configkey) {
304 304
 				case 'homeFolderNamingRule':
305
-					if(strpos($config[$configkey], 'attr:') === 0) {
305
+					if (strpos($config[$configkey], 'attr:') === 0) {
306 306
 						$result[$dbkey] = substr($config[$configkey], 5);
307 307
 					} else {
308 308
 						$result[$dbkey] = '';
@@ -313,7 +313,7 @@  discard block
 block discarded – undo
313 313
 				case 'ldapBaseGroups':
314 314
 				case 'ldapAttributesForUserSearch':
315 315
 				case 'ldapAttributesForGroupSearch':
316
-					if(is_array($config[$configkey])) {
316
+					if (is_array($config[$configkey])) {
317 317
 						$result[$dbkey] = implode("\n", $config[$configkey]);
318 318
 						break;
319 319
 					} //else follows default
@@ -326,23 +326,23 @@  discard block
 block discarded – undo
326 326
 
327 327
 	private function doSoftValidation() {
328 328
 		//if User or Group Base are not set, take over Base DN setting
329
-		foreach(array('ldapBaseUsers', 'ldapBaseGroups') as $keyBase) {
329
+		foreach (array('ldapBaseUsers', 'ldapBaseGroups') as $keyBase) {
330 330
 			$val = $this->configuration->$keyBase;
331
-			if(empty($val)) {
331
+			if (empty($val)) {
332 332
 				$this->configuration->$keyBase = $this->configuration->ldapBase;
333 333
 			}
334 334
 		}
335 335
 
336
-		foreach(array('ldapExpertUUIDUserAttr'  => 'ldapUuidUserAttribute',
336
+		foreach (array('ldapExpertUUIDUserAttr'  => 'ldapUuidUserAttribute',
337 337
 					  'ldapExpertUUIDGroupAttr' => 'ldapUuidGroupAttribute')
338 338
 				as $expertSetting => $effectiveSetting) {
339 339
 			$uuidOverride = $this->configuration->$expertSetting;
340
-			if(!empty($uuidOverride)) {
340
+			if (!empty($uuidOverride)) {
341 341
 				$this->configuration->$effectiveSetting = $uuidOverride;
342 342
 			} else {
343 343
 				$uuidAttributes = array('auto', 'entryuuid', 'nsuniqueid',
344 344
 										'objectguid', 'guid', 'ipauniqueid');
345
-				if(!in_array($this->configuration->$effectiveSetting,
345
+				if (!in_array($this->configuration->$effectiveSetting,
346 346
 							$uuidAttributes)
347 347
 					&& (!is_null($this->configID))) {
348 348
 					$this->configuration->$effectiveSetting = 'auto';
@@ -364,14 +364,14 @@  discard block
 block discarded – undo
364 364
 		//make sure empty search attributes are saved as simple, empty array
365 365
 		$saKeys = array('ldapAttributesForUserSearch',
366 366
 						'ldapAttributesForGroupSearch');
367
-		foreach($saKeys as $key) {
367
+		foreach ($saKeys as $key) {
368 368
 			$val = $this->configuration->$key;
369
-			if(is_array($val) && count($val) === 1 && empty($val[0])) {
369
+			if (is_array($val) && count($val) === 1 && empty($val[0])) {
370 370
 				$this->configuration->$key = array();
371 371
 			}
372 372
 		}
373 373
 
374
-		if((stripos($this->configuration->ldapHost, 'ldaps://') === 0)
374
+		if ((stripos($this->configuration->ldapHost, 'ldaps://') === 0)
375 375
 			&& $this->configuration->ldapTLS) {
376 376
 			$this->configuration->ldapTLS = false;
377 377
 			\OCP\Util::writeLog('user_ldap',
@@ -392,10 +392,10 @@  discard block
 block discarded – undo
392 392
 		//options that shall not be empty
393 393
 		$options = array('ldapHost', 'ldapPort', 'ldapUserDisplayName',
394 394
 						 'ldapGroupDisplayName', 'ldapLoginFilter');
395
-		foreach($options as $key) {
395
+		foreach ($options as $key) {
396 396
 			$val = $this->configuration->$key;
397
-			if(empty($val)) {
398
-				switch($key) {
397
+			if (empty($val)) {
398
+				switch ($key) {
399 399
 					case 'ldapHost':
400 400
 						$subj = 'LDAP Host';
401 401
 						break;
@@ -426,7 +426,7 @@  discard block
 block discarded – undo
426 426
 		$agent = $this->configuration->ldapAgentName;
427 427
 		$pwd = $this->configuration->ldapAgentPassword;
428 428
 		if (
429
-			($agent === ''  && $pwd !== '')
429
+			($agent === '' && $pwd !== '')
430 430
 			|| ($agent !== '' && $pwd === '')
431 431
 		) {
432 432
 			\OCP\Util::writeLog('user_ldap',
@@ -441,14 +441,14 @@  discard block
 block discarded – undo
441 441
 		$baseUsers = $this->configuration->ldapBaseUsers;
442 442
 		$baseGroups = $this->configuration->ldapBaseGroups;
443 443
 
444
-		if(empty($base) && empty($baseUsers) && empty($baseGroups)) {
444
+		if (empty($base) && empty($baseUsers) && empty($baseGroups)) {
445 445
 			\OCP\Util::writeLog('user_ldap',
446 446
 								$errorStr.'Not a single Base DN given.',
447 447
 								\OCP\Util::WARN);
448 448
 			$configurationOK = false;
449 449
 		}
450 450
 
451
-		if(mb_strpos($this->configuration->ldapLoginFilter, '%uid', 0, 'UTF-8')
451
+		if (mb_strpos($this->configuration->ldapLoginFilter, '%uid', 0, 'UTF-8')
452 452
 		   === false) {
453 453
 			\OCP\Util::writeLog('user_ldap',
454 454
 								$errorStr.'login filter does not contain %uid '.
@@ -466,7 +466,7 @@  discard block
 block discarded – undo
466 466
 	 */
467 467
 	private function validateConfiguration() {
468 468
 
469
-		if($this->doNotValidate) {
469
+		if ($this->doNotValidate) {
470 470
 			//don't do a validation if it is a new configuration with pure
471 471
 			//default values. Will be allowed on changes via __set or
472 472
 			//setConfiguration
@@ -487,21 +487,21 @@  discard block
 block discarded – undo
487 487
 	 * Connects and Binds to LDAP
488 488
 	 */
489 489
 	private function establishConnection() {
490
-		if(!$this->configuration->ldapConfigurationActive) {
490
+		if (!$this->configuration->ldapConfigurationActive) {
491 491
 			return null;
492 492
 		}
493 493
 		static $phpLDAPinstalled = true;
494
-		if(!$phpLDAPinstalled) {
494
+		if (!$phpLDAPinstalled) {
495 495
 			return false;
496 496
 		}
497
-		if(!$this->ignoreValidation && !$this->configured) {
497
+		if (!$this->ignoreValidation && !$this->configured) {
498 498
 			\OCP\Util::writeLog('user_ldap',
499 499
 								'Configuration is invalid, cannot connect',
500 500
 								\OCP\Util::WARN);
501 501
 			return false;
502 502
 		}
503
-		if(!$this->ldapConnectionRes) {
504
-			if(!$this->ldap->areLDAPFunctionsAvailable()) {
503
+		if (!$this->ldapConnectionRes) {
504
+			if (!$this->ldap->areLDAPFunctionsAvailable()) {
505 505
 				$phpLDAPinstalled = false;
506 506
 				\OCP\Util::writeLog('user_ldap',
507 507
 									'function ldap_connect is not available. Make '.
@@ -510,8 +510,8 @@  discard block
 block discarded – undo
510 510
 
511 511
 				return false;
512 512
 			}
513
-			if($this->configuration->turnOffCertCheck) {
514
-				if(putenv('LDAPTLS_REQCERT=never')) {
513
+			if ($this->configuration->turnOffCertCheck) {
514
+				if (putenv('LDAPTLS_REQCERT=never')) {
515 515
 					\OCP\Util::writeLog('user_ldap',
516 516
 						'Turned off SSL certificate validation successfully.',
517 517
 						\OCP\Util::DEBUG);
@@ -534,24 +534,24 @@  discard block
 block discarded – undo
534 534
 					$error = $this->ldap->isResource($this->ldapConnectionRes) ?
535 535
 						$this->ldap->errno($this->ldapConnectionRes) : -1;
536 536
 				}
537
-				if($bindStatus === true) {
537
+				if ($bindStatus === true) {
538 538
 					return $bindStatus;
539 539
 				}
540 540
 			} catch (\OC\ServerNotAvailableException $e) {
541
-				if(trim($this->configuration->ldapBackupHost) === "") {
541
+				if (trim($this->configuration->ldapBackupHost) === "") {
542 542
 					throw $e;
543 543
 				}
544 544
 			}
545 545
 
546 546
 			//if LDAP server is not reachable, try the Backup (Replica!) Server
547
-			if(    $error !== 0
547
+			if ($error !== 0
548 548
 				|| $this->configuration->ldapOverrideMainServer
549 549
 				|| $this->getFromCache('overrideMainServer'))
550 550
 			{
551 551
 				$this->doConnect($this->configuration->ldapBackupHost,
552 552
 								 $this->configuration->ldapBackupPort);
553 553
 				$bindStatus = $this->bind();
554
-				if($bindStatus && $error === -1 && !$this->getFromCache('overrideMainServer')) {
554
+				if ($bindStatus && $error === -1 && !$this->getFromCache('overrideMainServer')) {
555 555
 					//when bind to backup server succeeded and failed to main server,
556 556
 					//skip contacting him until next cache refresh
557 557
 					$this->writeToCache('overrideMainServer', true);
@@ -573,9 +573,9 @@  discard block
 block discarded – undo
573 573
 			return false;
574 574
 		}
575 575
 		$this->ldapConnectionRes = $this->ldap->connect($host, $port);
576
-		if($this->ldap->setOption($this->ldapConnectionRes, LDAP_OPT_PROTOCOL_VERSION, 3)) {
577
-			if($this->ldap->setOption($this->ldapConnectionRes, LDAP_OPT_REFERRALS, 0)) {
578
-				if($this->configuration->ldapTLS) {
576
+		if ($this->ldap->setOption($this->ldapConnectionRes, LDAP_OPT_PROTOCOL_VERSION, 3)) {
577
+			if ($this->ldap->setOption($this->ldapConnectionRes, LDAP_OPT_REFERRALS, 0)) {
578
+				if ($this->configuration->ldapTLS) {
579 579
 					$this->ldap->startTls($this->ldapConnectionRes);
580 580
 				}
581 581
 			}
@@ -590,25 +590,25 @@  discard block
 block discarded – undo
590 590
 	 */
591 591
 	public function bind() {
592 592
 		static $getConnectionResourceAttempt = false;
593
-		if(!$this->configuration->ldapConfigurationActive) {
593
+		if (!$this->configuration->ldapConfigurationActive) {
594 594
 			return false;
595 595
 		}
596
-		if($getConnectionResourceAttempt) {
596
+		if ($getConnectionResourceAttempt) {
597 597
 			$getConnectionResourceAttempt = false;
598 598
 			return false;
599 599
 		}
600 600
 		$getConnectionResourceAttempt = true;
601 601
 		$cr = $this->getConnectionResource();
602 602
 		$getConnectionResourceAttempt = false;
603
-		if(!$this->ldap->isResource($cr)) {
603
+		if (!$this->ldap->isResource($cr)) {
604 604
 			return false;
605 605
 		}
606 606
 		$ldapLogin = @$this->ldap->bind($cr,
607 607
 										$this->configuration->ldapAgentName,
608 608
 										$this->configuration->ldapAgentPassword);
609
-		if(!$ldapLogin) {
609
+		if (!$ldapLogin) {
610 610
 			\OCP\Util::writeLog('user_ldap',
611
-				'Bind failed: ' . $this->ldap->errno($cr) . ': ' . $this->ldap->error($cr),
611
+				'Bind failed: '.$this->ldap->errno($cr).': '.$this->ldap->error($cr),
612 612
 				\OCP\Util::WARN);
613 613
 			$this->ldapConnectionRes = null;
614 614
 			return false;
Please login to merge, or discard this patch.
apps/user_ldap/lib/LDAPProvider.php 1 patch
Spacing   +8 added lines, -8 removed lines patch added patch discarded remove patch
@@ -47,7 +47,7 @@  discard block
 block discarded – undo
47 47
 		$this->logger = $serverContainer->getLogger();
48 48
 		$this->helper = $helper;
49 49
 		$this->deletedUsersIndex = $deletedUsersIndex;
50
-		foreach ($serverContainer->getUserManager()->getBackends() as $backend){
50
+		foreach ($serverContainer->getUserManager()->getBackends() as $backend) {
51 51
 			$this->logger->debug('instance '.get_class($backend).' backend.', ['app' => 'user_ldap']);
52 52
 			if ($backend instanceof IUserLDAP) {
53 53
 				$this->backend = $backend;
@@ -64,11 +64,11 @@  discard block
 block discarded – undo
64 64
 	 * @throws \Exception if translation was unsuccessful
65 65
 	 */
66 66
 	public function getUserDN($uid) {
67
-		if(!$this->backend->userExists($uid)){
67
+		if (!$this->backend->userExists($uid)) {
68 68
 			throw new \Exception('User id not found in LDAP');
69 69
 		}
70 70
 		$result = $this->backend->getLDAPAccess($uid)->username2dn($uid);
71
-		if(!$result){
71
+		if (!$result) {
72 72
 			throw new \Exception('Translation to LDAP DN unsuccessful');
73 73
 		}
74 74
 		return $result;
@@ -83,7 +83,7 @@  discard block
 block discarded – undo
83 83
 	 */
84 84
 	public function getUserName($dn) {
85 85
 		$result = $this->backend->dn2UserName($dn);
86
-		if(!$result){
86
+		if (!$result) {
87 87
 			throw new \Exception('Translation to internal user name unsuccessful');
88 88
 		}
89 89
 		return $result;
@@ -115,7 +115,7 @@  discard block
 block discarded – undo
115 115
 	 * @throws \Exception if user id was not found in LDAP
116 116
 	 */
117 117
 	public function getLDAPConnection($uid) {
118
-		if(!$this->backend->userExists($uid)){
118
+		if (!$this->backend->userExists($uid)) {
119 119
 			throw new \Exception('User id not found in LDAP');
120 120
 		}
121 121
 		return $this->backend->getNewLDAPConnection($uid);
@@ -128,7 +128,7 @@  discard block
 block discarded – undo
128 128
 	 * @throws \Exception if user id was not found in LDAP
129 129
 	 */
130 130
 	public function getLDAPBaseUsers($uid) {
131
-		if(!$this->backend->userExists($uid)){
131
+		if (!$this->backend->userExists($uid)) {
132 132
 			throw new \Exception('User id not found in LDAP');
133 133
 		}	
134 134
 		return $this->backend->getLDAPAccess($uid)->getConnection()->getConfiguration()['ldap_base_users'];
@@ -141,7 +141,7 @@  discard block
 block discarded – undo
141 141
 	 * @throws \Exception if user id was not found in LDAP
142 142
 	 */
143 143
 	public function getLDAPBaseGroups($uid) {
144
-		if(!$this->backend->userExists($uid)){
144
+		if (!$this->backend->userExists($uid)) {
145 145
 			throw new \Exception('User id not found in LDAP');
146 146
 		}
147 147
 		return $this->backend->getLDAPAccess($uid)->getConnection()->getConfiguration()['ldap_base_groups'];
@@ -153,7 +153,7 @@  discard block
 block discarded – undo
153 153
 	 * @throws \Exception if user id was not found in LDAP
154 154
 	 */
155 155
 	public function clearCache($uid) {
156
-		if(!$this->backend->userExists($uid)){
156
+		if (!$this->backend->userExists($uid)) {
157 157
 			throw new \Exception('User id not found in LDAP');
158 158
 		}
159 159
 		$this->backend->getLDAPAccess($uid)->getConnection()->clearCache();
Please login to merge, or discard this patch.
apps/user_ldap/lib/User_LDAP.php 1 patch
Spacing   +51 added lines, -51 removed lines patch added patch discarded remove patch
@@ -66,10 +66,10 @@  discard block
 block discarded – undo
66 66
 	 */
67 67
 	public function canChangeAvatar($uid) {
68 68
 		$user = $this->access->userManager->get($uid);
69
-		if(!$user instanceof User) {
69
+		if (!$user instanceof User) {
70 70
 			return false;
71 71
 		}
72
-		if($user->getAvatarImage() === false) {
72
+		if ($user->getAvatarImage() === false) {
73 73
 			return true;
74 74
 		}
75 75
 
@@ -85,14 +85,14 @@  discard block
 block discarded – undo
85 85
 	public function loginName2UserName($loginName) {
86 86
 		$cacheKey = 'loginName2UserName-'.$loginName;
87 87
 		$username = $this->access->connection->getFromCache($cacheKey);
88
-		if(!is_null($username)) {
88
+		if (!is_null($username)) {
89 89
 			return $username;
90 90
 		}
91 91
 
92 92
 		try {
93 93
 			$ldapRecord = $this->getLDAPUserByLoginName($loginName);
94 94
 			$user = $this->access->userManager->get($ldapRecord['dn'][0]);
95
-			if($user instanceof OfflineUser) {
95
+			if ($user instanceof OfflineUser) {
96 96
 				// this path is not really possible, however get() is documented
97 97
 				// to return User or OfflineUser so we are very defensive here.
98 98
 				$this->access->connection->writeToCache($cacheKey, false);
@@ -128,9 +128,9 @@  discard block
 block discarded – undo
128 128
 		//find out dn of the user name
129 129
 		$attrs = $this->access->userManager->getAttributes();
130 130
 		$users = $this->access->fetchUsersByLoginName($loginName, $attrs);
131
-		if(count($users) < 1) {
132
-			throw new NotOnLDAP('No user available for the given login name on ' .
133
-				$this->access->connection->ldapHost . ':' . $this->access->connection->ldapPort);
131
+		if (count($users) < 1) {
132
+			throw new NotOnLDAP('No user available for the given login name on '.
133
+				$this->access->connection->ldapHost.':'.$this->access->connection->ldapPort);
134 134
 		}
135 135
 		return $users[0];
136 136
 	}
@@ -145,8 +145,8 @@  discard block
 block discarded – undo
145 145
 	public function checkPassword($uid, $password) {
146 146
 		try {
147 147
 			$ldapRecord = $this->getLDAPUserByLoginName($uid);
148
-		} catch(NotOnLDAP $e) {
149
-			if($this->ocConfig->getSystemValue('loglevel', Util::WARN) === Util::DEBUG) {
148
+		} catch (NotOnLDAP $e) {
149
+			if ($this->ocConfig->getSystemValue('loglevel', Util::WARN) === Util::DEBUG) {
150 150
 				\OC::$server->getLogger()->logException($e, ['app' => 'user_ldap']);
151 151
 			}
152 152
 			return false;
@@ -154,16 +154,16 @@  discard block
 block discarded – undo
154 154
 		$dn = $ldapRecord['dn'][0];
155 155
 		$user = $this->access->userManager->get($dn);
156 156
 
157
-		if(!$user instanceof User) {
157
+		if (!$user instanceof User) {
158 158
 			Util::writeLog('user_ldap',
159
-				'LDAP Login: Could not get user object for DN ' . $dn .
159
+				'LDAP Login: Could not get user object for DN '.$dn.
160 160
 				'. Maybe the LDAP entry has no set display name attribute?',
161 161
 				Util::WARN);
162 162
 			return false;
163 163
 		}
164
-		if($user->getUsername() !== false) {
164
+		if ($user->getUsername() !== false) {
165 165
 			//are the credentials OK?
166
-			if(!$this->access->areCredentialsValid($dn, $password)) {
166
+			if (!$this->access->areCredentialsValid($dn, $password)) {
167 167
 				return false;
168 168
 			}
169 169
 
@@ -186,11 +186,11 @@  discard block
 block discarded – undo
186 186
 	public function setPassword($uid, $password) {
187 187
 		$user = $this->access->userManager->get($uid);
188 188
 
189
-		if(!$user instanceof User) {
190
-			throw new \Exception('LDAP setPassword: Could not get user object for uid ' . $uid .
189
+		if (!$user instanceof User) {
190
+			throw new \Exception('LDAP setPassword: Could not get user object for uid '.$uid.
191 191
 				'. Maybe the LDAP entry has no set display name attribute?');
192 192
 		}
193
-		if($user->getUsername() !== false) {
193
+		if ($user->getUsername() !== false) {
194 194
 			return $this->access->setPassword($user->getDN(), $password);
195 195
 		}
196 196
 
@@ -211,18 +211,18 @@  discard block
 block discarded – undo
211 211
 
212 212
 		//check if users are cached, if so return
213 213
 		$ldap_users = $this->access->connection->getFromCache($cachekey);
214
-		if(!is_null($ldap_users)) {
214
+		if (!is_null($ldap_users)) {
215 215
 			return $ldap_users;
216 216
 		}
217 217
 
218 218
 		// if we'd pass -1 to LDAP search, we'd end up in a Protocol
219 219
 		// error. With a limit of 0, we get 0 results. So we pass null.
220
-		if($limit <= 0) {
220
+		if ($limit <= 0) {
221 221
 			$limit = null;
222 222
 		}
223 223
 		$filter = $this->access->combineFilterWithAnd(array(
224 224
 			$this->access->connection->ldapUserFilter,
225
-			$this->access->connection->ldapUserDisplayName . '=*',
225
+			$this->access->connection->ldapUserDisplayName.'=*',
226 226
 			$this->access->getFilterPartForUserSearch($search)
227 227
 		));
228 228
 
@@ -235,7 +235,7 @@  discard block
 block discarded – undo
235 235
 			$this->access->userManager->getAttributes(true),
236 236
 			$limit, $offset);
237 237
 		$ldap_users = $this->access->ownCloudUserNames($ldap_users);
238
-		Util::writeLog('user_ldap', 'getUsers: '.count($ldap_users). ' Users found', Util::DEBUG);
238
+		Util::writeLog('user_ldap', 'getUsers: '.count($ldap_users).' Users found', Util::DEBUG);
239 239
 
240 240
 		$this->access->connection->writeToCache($cachekey, $ldap_users);
241 241
 		return $ldap_users;
@@ -251,29 +251,29 @@  discard block
 block discarded – undo
251 251
 	 * @throws \OC\ServerNotAvailableException
252 252
 	 */
253 253
 	public function userExistsOnLDAP($user) {
254
-		if(is_string($user)) {
254
+		if (is_string($user)) {
255 255
 			$user = $this->access->userManager->get($user);
256 256
 		}
257
-		if(is_null($user)) {
257
+		if (is_null($user)) {
258 258
 			return false;
259 259
 		}
260 260
 
261 261
 		$dn = $user->getDN();
262 262
 		//check if user really still exists by reading its entry
263
-		if(!is_array($this->access->readAttribute($dn, '', $this->access->connection->ldapUserFilter))) {
263
+		if (!is_array($this->access->readAttribute($dn, '', $this->access->connection->ldapUserFilter))) {
264 264
 			$lcr = $this->access->connection->getConnectionResource();
265
-			if(is_null($lcr)) {
266
-				throw new \Exception('No LDAP Connection to server ' . $this->access->connection->ldapHost);
265
+			if (is_null($lcr)) {
266
+				throw new \Exception('No LDAP Connection to server '.$this->access->connection->ldapHost);
267 267
 			}
268 268
 
269 269
 			try {
270 270
 				$uuid = $this->access->getUserMapper()->getUUIDByDN($dn);
271
-				if(!$uuid) {
271
+				if (!$uuid) {
272 272
 					return false;
273 273
 				}
274 274
 				$newDn = $this->access->getUserDnByUuid($uuid);
275 275
 				//check if renamed user is still valid by reapplying the ldap filter
276
-				if(!is_array($this->access->readAttribute($newDn, '', $this->access->connection->ldapUserFilter))) {
276
+				if (!is_array($this->access->readAttribute($newDn, '', $this->access->connection->ldapUserFilter))) {
277 277
 					return false;
278 278
 				}
279 279
 				$this->access->getUserMapper()->setDNbyUUID($newDn, $uuid);
@@ -283,7 +283,7 @@  discard block
 block discarded – undo
283 283
 			}
284 284
 		}
285 285
 
286
-		if($user instanceof OfflineUser) {
286
+		if ($user instanceof OfflineUser) {
287 287
 			$user->unmark();
288 288
 		}
289 289
 
@@ -298,18 +298,18 @@  discard block
 block discarded – undo
298 298
 	 */
299 299
 	public function userExists($uid) {
300 300
 		$userExists = $this->access->connection->getFromCache('userExists'.$uid);
301
-		if(!is_null($userExists)) {
302
-			return (bool)$userExists;
301
+		if (!is_null($userExists)) {
302
+			return (bool) $userExists;
303 303
 		}
304 304
 		//getting dn, if false the user does not exist. If dn, he may be mapped only, requires more checking.
305 305
 		$user = $this->access->userManager->get($uid);
306 306
 
307
-		if(is_null($user)) {
307
+		if (is_null($user)) {
308 308
 			Util::writeLog('user_ldap', 'No DN found for '.$uid.' on '.
309 309
 				$this->access->connection->ldapHost, Util::DEBUG);
310 310
 			$this->access->connection->writeToCache('userExists'.$uid, false);
311 311
 			return false;
312
-		} else if($user instanceof OfflineUser) {
312
+		} else if ($user instanceof OfflineUser) {
313 313
 			//express check for users marked as deleted. Returning true is
314 314
 			//necessary for cleanup
315 315
 			return true;
@@ -317,7 +317,7 @@  discard block
 block discarded – undo
317 317
 
318 318
 		$result = $this->userExistsOnLDAP($user);
319 319
 		$this->access->connection->writeToCache('userExists'.$uid, $result);
320
-		if($result === true) {
320
+		if ($result === true) {
321 321
 			$user->update();
322 322
 		}
323 323
 		return $result;
@@ -331,13 +331,13 @@  discard block
 block discarded – undo
331 331
 	*/
332 332
 	public function deleteUser($uid) {
333 333
 		$marked = $this->ocConfig->getUserValue($uid, 'user_ldap', 'isDeleted', 0);
334
-		if(intval($marked) === 0) {
334
+		if (intval($marked) === 0) {
335 335
 			\OC::$server->getLogger()->notice(
336
-				'User '.$uid . ' is not marked as deleted, not cleaning up.',
336
+				'User '.$uid.' is not marked as deleted, not cleaning up.',
337 337
 				array('app' => 'user_ldap'));
338 338
 			return false;
339 339
 		}
340
-		\OC::$server->getLogger()->info('Cleaning up after user ' . $uid,
340
+		\OC::$server->getLogger()->info('Cleaning up after user '.$uid,
341 341
 			array('app' => 'user_ldap'));
342 342
 
343 343
 		//Get Home Directory out of user preferences so we can return it later,
@@ -358,27 +358,27 @@  discard block
 block discarded – undo
358 358
 	 * @throws \Exception
359 359
 	 */
360 360
 	public function getHome($uid) {
361
-		if(isset($this->homesToKill[$uid]) && !empty($this->homesToKill[$uid])) {
361
+		if (isset($this->homesToKill[$uid]) && !empty($this->homesToKill[$uid])) {
362 362
 			//a deleted user who needs some clean up
363 363
 			return $this->homesToKill[$uid];
364 364
 		}
365 365
 
366 366
 		// user Exists check required as it is not done in user proxy!
367
-		if(!$this->userExists($uid)) {
367
+		if (!$this->userExists($uid)) {
368 368
 			return false;
369 369
 		}
370 370
 
371 371
 		$cacheKey = 'getHome'.$uid;
372 372
 		$path = $this->access->connection->getFromCache($cacheKey);
373
-		if(!is_null($path)) {
373
+		if (!is_null($path)) {
374 374
 			return $path;
375 375
 		}
376 376
 
377 377
 		$user = $this->access->userManager->get($uid);
378
-		if(is_null($user) || ($user instanceof OfflineUser && !$this->userExistsOnLDAP($user->getOCName()))) {
379
-			throw new NoUserException($uid . ' is not a valid user anymore');
378
+		if (is_null($user) || ($user instanceof OfflineUser && !$this->userExistsOnLDAP($user->getOCName()))) {
379
+			throw new NoUserException($uid.' is not a valid user anymore');
380 380
 		}
381
-		if($user instanceof OfflineUser) {
381
+		if ($user instanceof OfflineUser) {
382 382
 			// apparently this user survived the userExistsOnLDAP check,
383 383
 			// we request the user instance again in order to retrieve a User
384 384
 			// instance instead
@@ -396,12 +396,12 @@  discard block
 block discarded – undo
396 396
 	 * @return string|false display name
397 397
 	 */
398 398
 	public function getDisplayName($uid) {
399
-		if(!$this->userExists($uid)) {
399
+		if (!$this->userExists($uid)) {
400 400
 			return false;
401 401
 		}
402 402
 
403 403
 		$cacheKey = 'getDisplayName'.$uid;
404
-		if(!is_null($displayName = $this->access->connection->getFromCache($cacheKey))) {
404
+		if (!is_null($displayName = $this->access->connection->getFromCache($cacheKey))) {
405 405
 			return $displayName;
406 406
 		}
407 407
 
@@ -418,10 +418,10 @@  discard block
 block discarded – undo
418 418
 			$this->access->username2dn($uid),
419 419
 			$this->access->connection->ldapUserDisplayName);
420 420
 
421
-		if($displayName && (count($displayName) > 0)) {
421
+		if ($displayName && (count($displayName) > 0)) {
422 422
 			$displayName = $displayName[0];
423 423
 
424
-			if (is_array($displayName2)){
424
+			if (is_array($displayName2)) {
425 425
 				$displayName2 = count($displayName2) > 0 ? $displayName2[0] : '';
426 426
 			}
427 427
 
@@ -450,7 +450,7 @@  discard block
 block discarded – undo
450 450
 	 */
451 451
 	public function getDisplayNames($search = '', $limit = null, $offset = null) {
452 452
 		$cacheKey = 'getDisplayNames-'.$search.'-'.$limit.'-'.$offset;
453
-		if(!is_null($displayNames = $this->access->connection->getFromCache($cacheKey))) {
453
+		if (!is_null($displayNames = $this->access->connection->getFromCache($cacheKey))) {
454 454
 			return $displayNames;
455 455
 		}
456 456
 
@@ -472,12 +472,12 @@  discard block
 block discarded – undo
472 472
 	* compared with OC_USER_BACKEND_CREATE_USER etc.
473 473
 	*/
474 474
 	public function implementsActions($actions) {
475
-		return (bool)((Backend::CHECK_PASSWORD
475
+		return (bool) ((Backend::CHECK_PASSWORD
476 476
 			| Backend::GET_HOME
477 477
 			| Backend::GET_DISPLAYNAME
478 478
 			| Backend::PROVIDE_AVATAR
479 479
 			| Backend::COUNT_USERS
480
-			| ((intval($this->access->connection->turnOnPasswordChange) === 1)?(Backend::SET_PASSWORD):0))
480
+			| ((intval($this->access->connection->turnOnPasswordChange) === 1) ? (Backend::SET_PASSWORD) : 0))
481 481
 			& $actions);
482 482
 	}
483 483
 
@@ -496,7 +496,7 @@  discard block
 block discarded – undo
496 496
 	public function countUsers() {
497 497
 		$filter = $this->access->getFilterForUserCount();
498 498
 		$cacheKey = 'countUsers-'.$filter;
499
-		if(!is_null($entries = $this->access->connection->getFromCache($cacheKey))) {
499
+		if (!is_null($entries = $this->access->connection->getFromCache($cacheKey))) {
500 500
 			return $entries;
501 501
 		}
502 502
 		$entries = $this->access->countUsers($filter);
@@ -508,7 +508,7 @@  discard block
 block discarded – undo
508 508
 	 * Backend name to be shown in user management
509 509
 	 * @return string the name of the backend to be shown
510 510
 	 */
511
-	public function getBackendName(){
511
+	public function getBackendName() {
512 512
 		return 'LDAP';
513 513
 	}
514 514
 	
Please login to merge, or discard this patch.
apps/user_ldap/appinfo/routes.php 1 patch
Spacing   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -41,7 +41,7 @@
 block discarded – undo
41 41
 $application->registerRoutes($this, [
42 42
 	'ocs' => [
43 43
 		['name' => 'ConfigAPI#create', 'url' => '/api/v1/config', 'verb' => 'POST'],
44
-		['name' => 'ConfigAPI#show',   'url' => '/api/v1/config/{configID}', 'verb' => 'GET'],
44
+		['name' => 'ConfigAPI#show', 'url' => '/api/v1/config/{configID}', 'verb' => 'GET'],
45 45
 		['name' => 'ConfigAPI#modify', 'url' => '/api/v1/config/{configID}', 'verb' => 'PUT'],
46 46
 		['name' => 'ConfigAPI#delete', 'url' => '/api/v1/config/{configID}', 'verb' => 'DELETE'],
47 47
 	]
Please login to merge, or discard this patch.
apps/user_ldap/appinfo/install.php 1 patch
Spacing   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -22,7 +22,7 @@
 block discarded – undo
22 22
  *
23 23
  */
24 24
 $state = OCP\Config::getSystemValue('ldapIgnoreNamingRules', 'doSet');
25
-if($state === 'doSet') {
25
+if ($state === 'doSet') {
26 26
 	OCP\Config::setSystemValue('ldapIgnoreNamingRules', false);
27 27
 }
28 28
 
Please login to merge, or discard this patch.