Completed
Pull Request — master (#5623)
by Thomas
16:49
created
apps/workflowengine/appinfo/routes.php 1 patch
Indentation   +7 added lines, -7 removed lines patch added patch discarded remove patch
@@ -20,11 +20,11 @@
 block discarded – undo
20 20
  */
21 21
 
22 22
 return [
23
-	'routes' => [
24
-		['name' => 'flowOperations#getOperations', 'url' => '/operations', 'verb' => 'GET'],
25
-		['name' => 'flowOperations#addOperation', 'url' => '/operations', 'verb' => 'POST'],
26
-		['name' => 'flowOperations#updateOperation', 'url' => '/operations/{id}', 'verb' => 'PUT'],
27
-		['name' => 'flowOperations#deleteOperation', 'url' => '/operations/{id}', 'verb' => 'DELETE'],
28
-		['name' => 'requestTime#getTimezones', 'url' => '/timezones', 'verb' => 'GET'],
29
-	]
23
+    'routes' => [
24
+        ['name' => 'flowOperations#getOperations', 'url' => '/operations', 'verb' => 'GET'],
25
+        ['name' => 'flowOperations#addOperation', 'url' => '/operations', 'verb' => 'POST'],
26
+        ['name' => 'flowOperations#updateOperation', 'url' => '/operations/{id}', 'verb' => 'PUT'],
27
+        ['name' => 'flowOperations#deleteOperation', 'url' => '/operations/{id}', 'verb' => 'DELETE'],
28
+        ['name' => 'requestTime#getTimezones', 'url' => '/timezones', 'verb' => 'GET'],
29
+    ]
30 30
 ];
Please login to merge, or discard this patch.
apps/testing/locking/fakedblockingprovider.php 1 patch
Indentation   +34 added lines, -34 removed lines patch added patch discarded remove patch
@@ -27,44 +27,44 @@
 block discarded – undo
27 27
 use OCP\ILogger;
28 28
 
29 29
 class FakeDBLockingProvider extends \OC\Lock\DBLockingProvider {
30
-	// Lock for 10 hours just to be sure
31
-	const TTL = 36000;
30
+    // Lock for 10 hours just to be sure
31
+    const TTL = 36000;
32 32
 
33
-	/**
34
-	 * Need a new child, because parent::connection is private instead of protected...
35
-	 * @var IDBConnection
36
-	 */
37
-	protected $db;
33
+    /**
34
+     * Need a new child, because parent::connection is private instead of protected...
35
+     * @var IDBConnection
36
+     */
37
+    protected $db;
38 38
 
39
-	/**
40
-	 * @param \OCP\IDBConnection $connection
41
-	 * @param \OCP\ILogger $logger
42
-	 * @param \OCP\AppFramework\Utility\ITimeFactory $timeFactory
43
-	 */
44
-	public function __construct(IDBConnection $connection, ILogger $logger, ITimeFactory $timeFactory) {
45
-		parent::__construct($connection, $logger, $timeFactory);
46
-		$this->db = $connection;
47
-	}
39
+    /**
40
+     * @param \OCP\IDBConnection $connection
41
+     * @param \OCP\ILogger $logger
42
+     * @param \OCP\AppFramework\Utility\ITimeFactory $timeFactory
43
+     */
44
+    public function __construct(IDBConnection $connection, ILogger $logger, ITimeFactory $timeFactory) {
45
+        parent::__construct($connection, $logger, $timeFactory);
46
+        $this->db = $connection;
47
+    }
48 48
 
49 49
 
50
-	/**
51
-	 * @param string $path
52
-	 * @param int $type self::LOCK_SHARED or self::LOCK_EXCLUSIVE
53
-	 */
54
-	public function releaseLock($path, $type) {
55
-		// we DONT keep shared locks till the end of the request
56
-		if ($type === self::LOCK_SHARED) {
57
-			$this->db->executeUpdate(
58
-				'UPDATE `*PREFIX*file_locks` SET `lock` = 0 WHERE `key` = ? AND `lock` = 1',
59
-				[$path]
60
-			);
61
-		}
50
+    /**
51
+     * @param string $path
52
+     * @param int $type self::LOCK_SHARED or self::LOCK_EXCLUSIVE
53
+     */
54
+    public function releaseLock($path, $type) {
55
+        // we DONT keep shared locks till the end of the request
56
+        if ($type === self::LOCK_SHARED) {
57
+            $this->db->executeUpdate(
58
+                'UPDATE `*PREFIX*file_locks` SET `lock` = 0 WHERE `key` = ? AND `lock` = 1',
59
+                [$path]
60
+            );
61
+        }
62 62
 
63
-		parent::releaseLock($path, $type);
64
-	}
63
+        parent::releaseLock($path, $type);
64
+    }
65 65
 
66
-	public function __destruct() {
67
-		// Prevent cleaning up at the end of the live time.
68
-		// parent::__destruct();
69
-	}
66
+    public function __destruct() {
67
+        // Prevent cleaning up at the end of the live time.
68
+        // parent::__destruct();
69
+    }
70 70
 }
Please login to merge, or discard this patch.
apps/testing/locking/provisioning.php 1 patch
Indentation   +190 added lines, -190 removed lines patch added patch discarded remove patch
@@ -35,194 +35,194 @@
 block discarded – undo
35 35
 
36 36
 class Provisioning {
37 37
 
38
-	/** @var ILockingProvider */
39
-	protected $lockingProvider;
40
-
41
-	/** @var IDBConnection */
42
-	protected $connection;
43
-
44
-	/** @var IConfig */
45
-	protected $config;
46
-
47
-	/** @var IRequest */
48
-	protected $request;
49
-
50
-	/**
51
-	 * @param ILockingProvider $lockingProvider
52
-	 * @param IDBConnection $connection
53
-	 * @param IConfig $config
54
-	 * @param IRequest $request
55
-	 */
56
-	public function __construct(ILockingProvider $lockingProvider, IDBConnection $connection, IConfig $config, IRequest $request) {
57
-		$this->lockingProvider = $lockingProvider;
58
-		$this->connection = $connection;
59
-		$this->config = $config;
60
-		$this->request = $request;
61
-	}
62
-
63
-	/**
64
-	 * @return ILockingProvider
65
-	 */
66
-	protected function getLockingProvider() {
67
-		if ($this->lockingProvider instanceof DBLockingProvider) {
68
-			return \OC::$server->query('OCA\Testing\Locking\FakeDBLockingProvider');
69
-		} else {
70
-			throw new \RuntimeException('Lock provisioning is only possible using the DBLockingProvider');
71
-		}
72
-	}
73
-
74
-	/**
75
-	 * @param array $parameters
76
-	 * @return int
77
-	 */
78
-	protected function getType($parameters) {
79
-		return isset($parameters['type']) ? (int) $parameters['type'] : 0;
80
-	}
81
-
82
-	/**
83
-	 * @param array $parameters
84
-	 * @return int
85
-	 */
86
-	protected function getPath($parameters) {
87
-		$node = \OC::$server->getRootFolder()
88
-			->getUserFolder($parameters['user'])
89
-			->get($this->request->getParam('path'));
90
-		return 'files/' . md5($node->getStorage()->getId() . '::' . trim($node->getInternalPath(), '/'));
91
-	}
92
-
93
-	/**
94
-	 * @return \OC_OCS_Result
95
-	 */
96
-	public function isLockingEnabled() {
97
-		try {
98
-			$this->getLockingProvider();
99
-			return new \OC_OCS_Result(null, 100);
100
-		} catch (\RuntimeException $e) {
101
-			return new \OC_OCS_Result(null, Http::STATUS_NOT_IMPLEMENTED, $e->getMessage());
102
-		}
103
-	}
104
-
105
-	/**
106
-	 * @param array $parameters
107
-	 * @return \OC_OCS_Result
108
-	 */
109
-	public function acquireLock(array $parameters) {
110
-		try {
111
-			$path = $this->getPath($parameters);
112
-		} catch (NoUserException $e) {
113
-			return new \OC_OCS_Result(null, Http::STATUS_NOT_FOUND, 'User not found');
114
-		} catch (NotFoundException $e) {
115
-			return new \OC_OCS_Result(null, Http::STATUS_NOT_FOUND, 'Path not found');
116
-		}
117
-		$type = $this->getType($parameters);
118
-
119
-		$lockingProvider = $this->getLockingProvider();
120
-
121
-		try {
122
-			$lockingProvider->acquireLock($path, $type);
123
-			$this->config->setAppValue('testing', 'locking_' . $path, $type);
124
-			return new \OC_OCS_Result(null, 100);
125
-		} catch (LockedException $e) {
126
-			return new \OC_OCS_Result(null, Http::STATUS_LOCKED);
127
-		}
128
-	}
129
-
130
-	/**
131
-	 * @param array $parameters
132
-	 * @return \OC_OCS_Result
133
-	 */
134
-	public function changeLock(array $parameters) {
135
-		try {
136
-			$path = $this->getPath($parameters);
137
-		} catch (NoUserException $e) {
138
-			return new \OC_OCS_Result(null, Http::STATUS_NOT_FOUND, 'User not found');
139
-		} catch (NotFoundException $e) {
140
-			return new \OC_OCS_Result(null, Http::STATUS_NOT_FOUND, 'Path not found');
141
-		}
142
-		$type = $this->getType($parameters);
143
-
144
-		$lockingProvider = $this->getLockingProvider();
145
-
146
-		try {
147
-			$lockingProvider->changeLock($path, $type);
148
-			$this->config->setAppValue('testing', 'locking_' . $path, $type);
149
-			return new \OC_OCS_Result(null, 100);
150
-		} catch (LockedException $e) {
151
-			return new \OC_OCS_Result(null, Http::STATUS_LOCKED);
152
-		}
153
-	}
154
-
155
-	/**
156
-	 * @param array $parameters
157
-	 * @return \OC_OCS_Result
158
-	 */
159
-	public function releaseLock(array $parameters) {
160
-		try {
161
-			$path = $this->getPath($parameters);
162
-		} catch (NoUserException $e) {
163
-			return new \OC_OCS_Result(null, Http::STATUS_NOT_FOUND, 'User not found');
164
-		} catch (NotFoundException $e) {
165
-			return new \OC_OCS_Result(null, Http::STATUS_NOT_FOUND, 'Path not found');
166
-		}
167
-		$type = $this->getType($parameters);
168
-
169
-		$lockingProvider = $this->getLockingProvider();
170
-
171
-		try {
172
-			$lockingProvider->releaseLock($path, $type);
173
-			$this->config->deleteAppValue('testing', 'locking_' . $path);
174
-			return new \OC_OCS_Result(null, 100);
175
-		} catch (LockedException $e) {
176
-			return new \OC_OCS_Result(null, Http::STATUS_LOCKED);
177
-		}
178
-	}
179
-
180
-	/**
181
-	 * @param array $parameters
182
-	 * @return \OC_OCS_Result
183
-	 */
184
-	public function isLocked(array $parameters) {
185
-		try {
186
-			$path = $this->getPath($parameters);
187
-		} catch (NoUserException $e) {
188
-			return new \OC_OCS_Result(null, Http::STATUS_NOT_FOUND, 'User not found');
189
-		} catch (NotFoundException $e) {
190
-			return new \OC_OCS_Result(null, Http::STATUS_NOT_FOUND, 'Path not found');
191
-		}
192
-		$type = $this->getType($parameters);
193
-
194
-		$lockingProvider = $this->getLockingProvider();
195
-
196
-		if ($lockingProvider->isLocked($path, $type)) {
197
-			return new \OC_OCS_Result(null, 100);
198
-		}
199
-
200
-		return new \OC_OCS_Result(null, Http::STATUS_LOCKED);
201
-	}
202
-
203
-	/**
204
-	 * @param array $parameters
205
-	 * @return \OC_OCS_Result
206
-	 */
207
-	public function releaseAll(array $parameters) {
208
-		$type = $this->getType($parameters);
209
-
210
-		$lockingProvider = $this->getLockingProvider();
211
-
212
-		foreach ($this->config->getAppKeys('testing') as $lock) {
213
-			if (strpos($lock, 'locking_') === 0) {
214
-				$path = substr($lock, strlen('locking_'));
215
-
216
-				if ($type === ILockingProvider::LOCK_EXCLUSIVE && $this->config->getAppValue('testing', $lock) == ILockingProvider::LOCK_EXCLUSIVE) {
217
-					$lockingProvider->releaseLock($path, $this->config->getAppValue('testing', $lock));
218
-				} else if ($type === ILockingProvider::LOCK_SHARED && $this->config->getAppValue('testing', $lock) == ILockingProvider::LOCK_SHARED) {
219
-					$lockingProvider->releaseLock($path, $this->config->getAppValue('testing', $lock));
220
-				} else {
221
-					$lockingProvider->releaseLock($path, $this->config->getAppValue('testing', $lock));
222
-				}
223
-			}
224
-		}
225
-
226
-		return new \OC_OCS_Result(null, 100);
227
-	}
38
+    /** @var ILockingProvider */
39
+    protected $lockingProvider;
40
+
41
+    /** @var IDBConnection */
42
+    protected $connection;
43
+
44
+    /** @var IConfig */
45
+    protected $config;
46
+
47
+    /** @var IRequest */
48
+    protected $request;
49
+
50
+    /**
51
+     * @param ILockingProvider $lockingProvider
52
+     * @param IDBConnection $connection
53
+     * @param IConfig $config
54
+     * @param IRequest $request
55
+     */
56
+    public function __construct(ILockingProvider $lockingProvider, IDBConnection $connection, IConfig $config, IRequest $request) {
57
+        $this->lockingProvider = $lockingProvider;
58
+        $this->connection = $connection;
59
+        $this->config = $config;
60
+        $this->request = $request;
61
+    }
62
+
63
+    /**
64
+     * @return ILockingProvider
65
+     */
66
+    protected function getLockingProvider() {
67
+        if ($this->lockingProvider instanceof DBLockingProvider) {
68
+            return \OC::$server->query('OCA\Testing\Locking\FakeDBLockingProvider');
69
+        } else {
70
+            throw new \RuntimeException('Lock provisioning is only possible using the DBLockingProvider');
71
+        }
72
+    }
73
+
74
+    /**
75
+     * @param array $parameters
76
+     * @return int
77
+     */
78
+    protected function getType($parameters) {
79
+        return isset($parameters['type']) ? (int) $parameters['type'] : 0;
80
+    }
81
+
82
+    /**
83
+     * @param array $parameters
84
+     * @return int
85
+     */
86
+    protected function getPath($parameters) {
87
+        $node = \OC::$server->getRootFolder()
88
+            ->getUserFolder($parameters['user'])
89
+            ->get($this->request->getParam('path'));
90
+        return 'files/' . md5($node->getStorage()->getId() . '::' . trim($node->getInternalPath(), '/'));
91
+    }
92
+
93
+    /**
94
+     * @return \OC_OCS_Result
95
+     */
96
+    public function isLockingEnabled() {
97
+        try {
98
+            $this->getLockingProvider();
99
+            return new \OC_OCS_Result(null, 100);
100
+        } catch (\RuntimeException $e) {
101
+            return new \OC_OCS_Result(null, Http::STATUS_NOT_IMPLEMENTED, $e->getMessage());
102
+        }
103
+    }
104
+
105
+    /**
106
+     * @param array $parameters
107
+     * @return \OC_OCS_Result
108
+     */
109
+    public function acquireLock(array $parameters) {
110
+        try {
111
+            $path = $this->getPath($parameters);
112
+        } catch (NoUserException $e) {
113
+            return new \OC_OCS_Result(null, Http::STATUS_NOT_FOUND, 'User not found');
114
+        } catch (NotFoundException $e) {
115
+            return new \OC_OCS_Result(null, Http::STATUS_NOT_FOUND, 'Path not found');
116
+        }
117
+        $type = $this->getType($parameters);
118
+
119
+        $lockingProvider = $this->getLockingProvider();
120
+
121
+        try {
122
+            $lockingProvider->acquireLock($path, $type);
123
+            $this->config->setAppValue('testing', 'locking_' . $path, $type);
124
+            return new \OC_OCS_Result(null, 100);
125
+        } catch (LockedException $e) {
126
+            return new \OC_OCS_Result(null, Http::STATUS_LOCKED);
127
+        }
128
+    }
129
+
130
+    /**
131
+     * @param array $parameters
132
+     * @return \OC_OCS_Result
133
+     */
134
+    public function changeLock(array $parameters) {
135
+        try {
136
+            $path = $this->getPath($parameters);
137
+        } catch (NoUserException $e) {
138
+            return new \OC_OCS_Result(null, Http::STATUS_NOT_FOUND, 'User not found');
139
+        } catch (NotFoundException $e) {
140
+            return new \OC_OCS_Result(null, Http::STATUS_NOT_FOUND, 'Path not found');
141
+        }
142
+        $type = $this->getType($parameters);
143
+
144
+        $lockingProvider = $this->getLockingProvider();
145
+
146
+        try {
147
+            $lockingProvider->changeLock($path, $type);
148
+            $this->config->setAppValue('testing', 'locking_' . $path, $type);
149
+            return new \OC_OCS_Result(null, 100);
150
+        } catch (LockedException $e) {
151
+            return new \OC_OCS_Result(null, Http::STATUS_LOCKED);
152
+        }
153
+    }
154
+
155
+    /**
156
+     * @param array $parameters
157
+     * @return \OC_OCS_Result
158
+     */
159
+    public function releaseLock(array $parameters) {
160
+        try {
161
+            $path = $this->getPath($parameters);
162
+        } catch (NoUserException $e) {
163
+            return new \OC_OCS_Result(null, Http::STATUS_NOT_FOUND, 'User not found');
164
+        } catch (NotFoundException $e) {
165
+            return new \OC_OCS_Result(null, Http::STATUS_NOT_FOUND, 'Path not found');
166
+        }
167
+        $type = $this->getType($parameters);
168
+
169
+        $lockingProvider = $this->getLockingProvider();
170
+
171
+        try {
172
+            $lockingProvider->releaseLock($path, $type);
173
+            $this->config->deleteAppValue('testing', 'locking_' . $path);
174
+            return new \OC_OCS_Result(null, 100);
175
+        } catch (LockedException $e) {
176
+            return new \OC_OCS_Result(null, Http::STATUS_LOCKED);
177
+        }
178
+    }
179
+
180
+    /**
181
+     * @param array $parameters
182
+     * @return \OC_OCS_Result
183
+     */
184
+    public function isLocked(array $parameters) {
185
+        try {
186
+            $path = $this->getPath($parameters);
187
+        } catch (NoUserException $e) {
188
+            return new \OC_OCS_Result(null, Http::STATUS_NOT_FOUND, 'User not found');
189
+        } catch (NotFoundException $e) {
190
+            return new \OC_OCS_Result(null, Http::STATUS_NOT_FOUND, 'Path not found');
191
+        }
192
+        $type = $this->getType($parameters);
193
+
194
+        $lockingProvider = $this->getLockingProvider();
195
+
196
+        if ($lockingProvider->isLocked($path, $type)) {
197
+            return new \OC_OCS_Result(null, 100);
198
+        }
199
+
200
+        return new \OC_OCS_Result(null, Http::STATUS_LOCKED);
201
+    }
202
+
203
+    /**
204
+     * @param array $parameters
205
+     * @return \OC_OCS_Result
206
+     */
207
+    public function releaseAll(array $parameters) {
208
+        $type = $this->getType($parameters);
209
+
210
+        $lockingProvider = $this->getLockingProvider();
211
+
212
+        foreach ($this->config->getAppKeys('testing') as $lock) {
213
+            if (strpos($lock, 'locking_') === 0) {
214
+                $path = substr($lock, strlen('locking_'));
215
+
216
+                if ($type === ILockingProvider::LOCK_EXCLUSIVE && $this->config->getAppValue('testing', $lock) == ILockingProvider::LOCK_EXCLUSIVE) {
217
+                    $lockingProvider->releaseLock($path, $this->config->getAppValue('testing', $lock));
218
+                } else if ($type === ILockingProvider::LOCK_SHARED && $this->config->getAppValue('testing', $lock) == ILockingProvider::LOCK_SHARED) {
219
+                    $lockingProvider->releaseLock($path, $this->config->getAppValue('testing', $lock));
220
+                } else {
221
+                    $lockingProvider->releaseLock($path, $this->config->getAppValue('testing', $lock));
222
+                }
223
+            }
224
+        }
225
+
226
+        return new \OC_OCS_Result(null, 100);
227
+    }
228 228
 }
Please login to merge, or discard this patch.
apps/testing/lib/Config.php 1 patch
Indentation   +33 added lines, -33 removed lines patch added patch discarded remove patch
@@ -27,45 +27,45 @@
 block discarded – undo
27 27
 
28 28
 class Config {
29 29
 
30
-	/** @var IConfig */
31
-	private $config;
30
+    /** @var IConfig */
31
+    private $config;
32 32
 
33
-	/** @var IRequest */
34
-	private $request;
33
+    /** @var IRequest */
34
+    private $request;
35 35
 
36
-	/**
37
-	 * @param IConfig $config
38
-	 * @param IRequest $request
39
-	 */
40
-	public function __construct(IConfig $config, IRequest $request) {
41
-		$this->config = $config;
42
-		$this->request = $request;
43
-	}
36
+    /**
37
+     * @param IConfig $config
38
+     * @param IRequest $request
39
+     */
40
+    public function __construct(IConfig $config, IRequest $request) {
41
+        $this->config = $config;
42
+        $this->request = $request;
43
+    }
44 44
 
45
-	/**
46
-	 * @param array $parameters
47
-	 * @return \OC_OCS_Result
48
-	 */
49
-	public function setAppValue($parameters) {
50
-		$app = $parameters['appid'];
51
-		$configKey = $parameters['configkey'];
45
+    /**
46
+     * @param array $parameters
47
+     * @return \OC_OCS_Result
48
+     */
49
+    public function setAppValue($parameters) {
50
+        $app = $parameters['appid'];
51
+        $configKey = $parameters['configkey'];
52 52
 
53
-		$value = $this->request->getParam('value');
54
-		$this->config->setAppValue($app, $configKey, $value);
53
+        $value = $this->request->getParam('value');
54
+        $this->config->setAppValue($app, $configKey, $value);
55 55
 
56
-		return new \OC_OCS_Result();
57
-	}
56
+        return new \OC_OCS_Result();
57
+    }
58 58
 
59
-	/**
60
-	 * @param array $parameters
61
-	 * @return \OC_OCS_Result
62
-	 */
63
-	public function deleteAppValue($parameters) {
64
-		$app = $parameters['appid'];
65
-		$configKey = $parameters['configkey'];
59
+    /**
60
+     * @param array $parameters
61
+     * @return \OC_OCS_Result
62
+     */
63
+    public function deleteAppValue($parameters) {
64
+        $app = $parameters['appid'];
65
+        $configKey = $parameters['configkey'];
66 66
 
67
-		$this->config->deleteAppValue($app, $configKey);
67
+        $this->config->deleteAppValue($app, $configKey);
68 68
 
69
-		return new \OC_OCS_Result();
70
-	}
69
+        return new \OC_OCS_Result();
70
+    }
71 71
 }
Please login to merge, or discard this patch.
apps/testing/lib/Application.php 1 patch
Indentation   +12 added lines, -12 removed lines patch added patch discarded remove patch
@@ -25,18 +25,18 @@
 block discarded – undo
25 25
 use OCA\Testing\AlternativeHomeUserBackend;
26 26
 
27 27
 class Application extends App {
28
-	public function __construct (array $urlParams = array()) {
29
-		$appName = 'testing';
30
-		parent::__construct($appName, $urlParams);
28
+    public function __construct (array $urlParams = array()) {
29
+        $appName = 'testing';
30
+        parent::__construct($appName, $urlParams);
31 31
 
32
-		$c = $this->getContainer();
33
-		$config = $c->getServer()->getConfig();
34
-		if ($config->getAppValue($appName, 'enable_alt_user_backend', 'no') === 'yes') {
35
-			$userManager = $c->getServer()->getUserManager();
32
+        $c = $this->getContainer();
33
+        $config = $c->getServer()->getConfig();
34
+        if ($config->getAppValue($appName, 'enable_alt_user_backend', 'no') === 'yes') {
35
+            $userManager = $c->getServer()->getUserManager();
36 36
 
37
-			// replace all user backends with this one
38
-			$userManager->clearBackends();
39
-			$userManager->registerBackend($c->query(AlternativeHomeUserBackend::class));
40
-		}
41
-	}
37
+            // replace all user backends with this one
38
+            $userManager->clearBackends();
39
+            $userManager->registerBackend($c->query(AlternativeHomeUserBackend::class));
40
+        }
41
+    }
42 42
 }
Please login to merge, or discard this patch.
apps/testing/lib/AlternativeHomeUserBackend.php 1 patch
Indentation   +18 added lines, -18 removed lines patch added patch discarded remove patch
@@ -34,23 +34,23 @@
 block discarded – undo
34 34
  *	]
35 35
  */
36 36
 class AlternativeHomeUserBackend extends \OC\User\Database {
37
-	public function __construct() {
38
-		parent::__construct();
39
-	}
40
-	/**
41
-	 * get the user's home directory
42
-	 * @param string $uid the username
43
-	 * @return string|false
44
-	 */
45
-	public function getHome($uid) {
46
-		if ($this->userExists($uid)) {
47
-			// workaround to avoid killing the admin
48
-			if ($uid !== 'admin') {
49
-				$uid = md5($uid);
50
-			}
51
-			return \OC::$server->getConfig()->getSystemValue('datadirectory', \OC::$SERVERROOT . '/data') . '/' . $uid;
52
-		}
37
+    public function __construct() {
38
+        parent::__construct();
39
+    }
40
+    /**
41
+     * get the user's home directory
42
+     * @param string $uid the username
43
+     * @return string|false
44
+     */
45
+    public function getHome($uid) {
46
+        if ($this->userExists($uid)) {
47
+            // workaround to avoid killing the admin
48
+            if ($uid !== 'admin') {
49
+                $uid = md5($uid);
50
+            }
51
+            return \OC::$server->getConfig()->getSystemValue('datadirectory', \OC::$SERVERROOT . '/data') . '/' . $uid;
52
+        }
53 53
 
54
-		return false;
55
-	}
54
+        return false;
55
+    }
56 56
 }
Please login to merge, or discard this patch.
apps/federatedfilesharing/lib/Notifier.php 1 patch
Indentation   +193 added lines, -193 removed lines patch added patch discarded remove patch
@@ -34,197 +34,197 @@
 block discarded – undo
34 34
 use OCP\Notification\INotifier;
35 35
 
36 36
 class Notifier implements INotifier {
37
-	/** @var IFactory */
38
-	protected $factory;
39
-	/** @var IManager */
40
-	protected $contactsManager;
41
-	/** @var IURLGenerator */
42
-	protected $url;
43
-	/** @var array */
44
-	protected $federatedContacts;
45
-	/** @var ICloudIdManager */
46
-	protected $cloudIdManager;
47
-
48
-	/**
49
-	 * @param IFactory $factory
50
-	 * @param IManager $contactsManager
51
-	 * @param IURLGenerator $url
52
-	 * @param ICloudIdManager $cloudIdManager
53
-	 */
54
-	public function __construct(IFactory $factory, IManager $contactsManager, IURLGenerator $url, ICloudIdManager $cloudIdManager) {
55
-		$this->factory = $factory;
56
-		$this->contactsManager = $contactsManager;
57
-		$this->url = $url;
58
-		$this->cloudIdManager = $cloudIdManager;
59
-	}
60
-
61
-	/**
62
-	 * @param INotification $notification
63
-	 * @param string $languageCode The code of the language that should be used to prepare the notification
64
-	 * @return INotification
65
-	 * @throws \InvalidArgumentException
66
-	 */
67
-	public function prepare(INotification $notification, $languageCode) {
68
-		if ($notification->getApp() !== 'files_sharing') {
69
-			// Not my app => throw
70
-			throw new \InvalidArgumentException();
71
-		}
72
-
73
-		// Read the language from the notification
74
-		$l = $this->factory->get('files_sharing', $languageCode);
75
-
76
-		switch ($notification->getSubject()) {
77
-			// Deal with known subjects
78
-			case 'remote_share':
79
-				$notification->setIcon($this->url->getAbsoluteURL($this->url->imagePath('core', 'actions/share.svg')));
80
-
81
-				$params = $notification->getSubjectParameters();
82
-				if ($params[0] !== $params[1] && $params[1] !== null) {
83
-					$notification->setParsedSubject(
84
-						$l->t('You received "%3$s" as a remote share from %1$s (on behalf of %2$s)', $params)
85
-					);
86
-					$notification->setRichSubject(
87
-						$l->t('You received {share} as a remote share from {user} (on behalf of {behalf})'),
88
-						[
89
-							'share' => [
90
-								'type' => 'pending-federated-share',
91
-								'id' => $notification->getObjectId(),
92
-								'name' => $params[2],
93
-							],
94
-							'user' => $this->createRemoteUser($params[0]),
95
-							'behalf' => $this->createRemoteUser($params[1]),
96
-						]
97
-					);
98
-				} else {
99
-					$notification->setParsedSubject(
100
-						$l->t('You received "%3$s" as a remote share from %1$s', $params)
101
-					);
102
-					$notification->setRichSubject(
103
-						$l->t('You received {share} as a remote share from {user}'),
104
-						[
105
-							'share' => [
106
-								'type' => 'pending-federated-share',
107
-								'id' => $notification->getObjectId(),
108
-								'name' => $params[2],
109
-							],
110
-							'user' => $this->createRemoteUser($params[0]),
111
-						]
112
-					);
113
-				}
114
-
115
-				// Deal with the actions for a known subject
116
-				foreach ($notification->getActions() as $action) {
117
-					switch ($action->getLabel()) {
118
-						case 'accept':
119
-							$action->setParsedLabel(
120
-								(string) $l->t('Accept')
121
-							)
122
-							->setPrimary(true);
123
-							break;
124
-
125
-						case 'decline':
126
-							$action->setParsedLabel(
127
-								(string) $l->t('Decline')
128
-							);
129
-							break;
130
-					}
131
-
132
-					$notification->addParsedAction($action);
133
-				}
134
-				return $notification;
135
-
136
-			default:
137
-				// Unknown subject => Unknown notification => throw
138
-				throw new \InvalidArgumentException();
139
-		}
140
-	}
141
-
142
-	/**
143
-	 * @param string $cloudId
144
-	 * @return array
145
-	 */
146
-	protected function createRemoteUser($cloudId) {
147
-		$displayName = $cloudId;
148
-		try {
149
-			$resolvedId = $this->cloudIdManager->resolveCloudId($cloudId);
150
-			$displayName = $this->getDisplayName($resolvedId);
151
-			$user = $resolvedId->getUser();
152
-			$server = $resolvedId->getRemote();
153
-		} catch (HintException $e) {
154
-			$user = $cloudId;
155
-			$server = '';
156
-		}
157
-
158
-		return [
159
-			'type' => 'user',
160
-			'id' => $user,
161
-			'name' => $displayName,
162
-			'server' => $server,
163
-		];
164
-	}
165
-
166
-	/**
167
-	 * Try to find the user in the contacts
168
-	 *
169
-	 * @param ICloudId $cloudId
170
-	 * @return string
171
-	 */
172
-	protected function getDisplayName(ICloudId $cloudId) {
173
-		$server = $cloudId->getRemote();
174
-		$user = $cloudId->getUser();
175
-		if (strpos($server, 'http://') === 0) {
176
-			$server = substr($server, strlen('http://'));
177
-		} else if (strpos($server, 'https://') === 0) {
178
-			$server = substr($server, strlen('https://'));
179
-		}
180
-
181
-		try {
182
-			return $this->getDisplayNameFromContact($cloudId->getId());
183
-		} catch (\OutOfBoundsException $e) {
184
-		}
185
-
186
-		try {
187
-			$this->getDisplayNameFromContact($user . '@http://' . $server);
188
-		} catch (\OutOfBoundsException $e) {
189
-		}
190
-
191
-		try {
192
-			$this->getDisplayNameFromContact($user . '@https://' . $server);
193
-		} catch (\OutOfBoundsException $e) {
194
-		}
195
-
196
-		return $cloudId->getId();
197
-	}
198
-
199
-	/**
200
-	 * Try to find the user in the contacts
201
-	 *
202
-	 * @param string $federatedCloudId
203
-	 * @return string
204
-	 * @throws \OutOfBoundsException when there is no contact for the id
205
-	 */
206
-	protected function getDisplayNameFromContact($federatedCloudId) {
207
-		if (isset($this->federatedContacts[$federatedCloudId])) {
208
-			if ($this->federatedContacts[$federatedCloudId] !== '') {
209
-				return $this->federatedContacts[$federatedCloudId];
210
-			} else {
211
-				throw new \OutOfBoundsException('No contact found for federated cloud id');
212
-			}
213
-		}
214
-
215
-		$addressBookEntries = $this->contactsManager->search($federatedCloudId, ['CLOUD']);
216
-		foreach ($addressBookEntries as $entry) {
217
-			if (isset($entry['CLOUD'])) {
218
-				foreach ($entry['CLOUD'] as $cloudID) {
219
-					if ($cloudID === $federatedCloudId) {
220
-						$this->federatedContacts[$federatedCloudId] = $entry['FN'];
221
-						return $entry['FN'];
222
-					}
223
-				}
224
-			}
225
-		}
226
-
227
-		$this->federatedContacts[$federatedCloudId] = '';
228
-		throw new \OutOfBoundsException('No contact found for federated cloud id');
229
-	}
37
+    /** @var IFactory */
38
+    protected $factory;
39
+    /** @var IManager */
40
+    protected $contactsManager;
41
+    /** @var IURLGenerator */
42
+    protected $url;
43
+    /** @var array */
44
+    protected $federatedContacts;
45
+    /** @var ICloudIdManager */
46
+    protected $cloudIdManager;
47
+
48
+    /**
49
+     * @param IFactory $factory
50
+     * @param IManager $contactsManager
51
+     * @param IURLGenerator $url
52
+     * @param ICloudIdManager $cloudIdManager
53
+     */
54
+    public function __construct(IFactory $factory, IManager $contactsManager, IURLGenerator $url, ICloudIdManager $cloudIdManager) {
55
+        $this->factory = $factory;
56
+        $this->contactsManager = $contactsManager;
57
+        $this->url = $url;
58
+        $this->cloudIdManager = $cloudIdManager;
59
+    }
60
+
61
+    /**
62
+     * @param INotification $notification
63
+     * @param string $languageCode The code of the language that should be used to prepare the notification
64
+     * @return INotification
65
+     * @throws \InvalidArgumentException
66
+     */
67
+    public function prepare(INotification $notification, $languageCode) {
68
+        if ($notification->getApp() !== 'files_sharing') {
69
+            // Not my app => throw
70
+            throw new \InvalidArgumentException();
71
+        }
72
+
73
+        // Read the language from the notification
74
+        $l = $this->factory->get('files_sharing', $languageCode);
75
+
76
+        switch ($notification->getSubject()) {
77
+            // Deal with known subjects
78
+            case 'remote_share':
79
+                $notification->setIcon($this->url->getAbsoluteURL($this->url->imagePath('core', 'actions/share.svg')));
80
+
81
+                $params = $notification->getSubjectParameters();
82
+                if ($params[0] !== $params[1] && $params[1] !== null) {
83
+                    $notification->setParsedSubject(
84
+                        $l->t('You received "%3$s" as a remote share from %1$s (on behalf of %2$s)', $params)
85
+                    );
86
+                    $notification->setRichSubject(
87
+                        $l->t('You received {share} as a remote share from {user} (on behalf of {behalf})'),
88
+                        [
89
+                            'share' => [
90
+                                'type' => 'pending-federated-share',
91
+                                'id' => $notification->getObjectId(),
92
+                                'name' => $params[2],
93
+                            ],
94
+                            'user' => $this->createRemoteUser($params[0]),
95
+                            'behalf' => $this->createRemoteUser($params[1]),
96
+                        ]
97
+                    );
98
+                } else {
99
+                    $notification->setParsedSubject(
100
+                        $l->t('You received "%3$s" as a remote share from %1$s', $params)
101
+                    );
102
+                    $notification->setRichSubject(
103
+                        $l->t('You received {share} as a remote share from {user}'),
104
+                        [
105
+                            'share' => [
106
+                                'type' => 'pending-federated-share',
107
+                                'id' => $notification->getObjectId(),
108
+                                'name' => $params[2],
109
+                            ],
110
+                            'user' => $this->createRemoteUser($params[0]),
111
+                        ]
112
+                    );
113
+                }
114
+
115
+                // Deal with the actions for a known subject
116
+                foreach ($notification->getActions() as $action) {
117
+                    switch ($action->getLabel()) {
118
+                        case 'accept':
119
+                            $action->setParsedLabel(
120
+                                (string) $l->t('Accept')
121
+                            )
122
+                            ->setPrimary(true);
123
+                            break;
124
+
125
+                        case 'decline':
126
+                            $action->setParsedLabel(
127
+                                (string) $l->t('Decline')
128
+                            );
129
+                            break;
130
+                    }
131
+
132
+                    $notification->addParsedAction($action);
133
+                }
134
+                return $notification;
135
+
136
+            default:
137
+                // Unknown subject => Unknown notification => throw
138
+                throw new \InvalidArgumentException();
139
+        }
140
+    }
141
+
142
+    /**
143
+     * @param string $cloudId
144
+     * @return array
145
+     */
146
+    protected function createRemoteUser($cloudId) {
147
+        $displayName = $cloudId;
148
+        try {
149
+            $resolvedId = $this->cloudIdManager->resolveCloudId($cloudId);
150
+            $displayName = $this->getDisplayName($resolvedId);
151
+            $user = $resolvedId->getUser();
152
+            $server = $resolvedId->getRemote();
153
+        } catch (HintException $e) {
154
+            $user = $cloudId;
155
+            $server = '';
156
+        }
157
+
158
+        return [
159
+            'type' => 'user',
160
+            'id' => $user,
161
+            'name' => $displayName,
162
+            'server' => $server,
163
+        ];
164
+    }
165
+
166
+    /**
167
+     * Try to find the user in the contacts
168
+     *
169
+     * @param ICloudId $cloudId
170
+     * @return string
171
+     */
172
+    protected function getDisplayName(ICloudId $cloudId) {
173
+        $server = $cloudId->getRemote();
174
+        $user = $cloudId->getUser();
175
+        if (strpos($server, 'http://') === 0) {
176
+            $server = substr($server, strlen('http://'));
177
+        } else if (strpos($server, 'https://') === 0) {
178
+            $server = substr($server, strlen('https://'));
179
+        }
180
+
181
+        try {
182
+            return $this->getDisplayNameFromContact($cloudId->getId());
183
+        } catch (\OutOfBoundsException $e) {
184
+        }
185
+
186
+        try {
187
+            $this->getDisplayNameFromContact($user . '@http://' . $server);
188
+        } catch (\OutOfBoundsException $e) {
189
+        }
190
+
191
+        try {
192
+            $this->getDisplayNameFromContact($user . '@https://' . $server);
193
+        } catch (\OutOfBoundsException $e) {
194
+        }
195
+
196
+        return $cloudId->getId();
197
+    }
198
+
199
+    /**
200
+     * Try to find the user in the contacts
201
+     *
202
+     * @param string $federatedCloudId
203
+     * @return string
204
+     * @throws \OutOfBoundsException when there is no contact for the id
205
+     */
206
+    protected function getDisplayNameFromContact($federatedCloudId) {
207
+        if (isset($this->federatedContacts[$federatedCloudId])) {
208
+            if ($this->federatedContacts[$federatedCloudId] !== '') {
209
+                return $this->federatedContacts[$federatedCloudId];
210
+            } else {
211
+                throw new \OutOfBoundsException('No contact found for federated cloud id');
212
+            }
213
+        }
214
+
215
+        $addressBookEntries = $this->contactsManager->search($federatedCloudId, ['CLOUD']);
216
+        foreach ($addressBookEntries as $entry) {
217
+            if (isset($entry['CLOUD'])) {
218
+                foreach ($entry['CLOUD'] as $cloudID) {
219
+                    if ($cloudID === $federatedCloudId) {
220
+                        $this->federatedContacts[$federatedCloudId] = $entry['FN'];
221
+                        return $entry['FN'];
222
+                    }
223
+                }
224
+            }
225
+        }
226
+
227
+        $this->federatedContacts[$federatedCloudId] = '';
228
+        throw new \OutOfBoundsException('No contact found for federated cloud id');
229
+    }
230 230
 }
Please login to merge, or discard this patch.
apps/federatedfilesharing/lib/TokenHandler.php 1 patch
Indentation   +25 added lines, -25 removed lines patch added patch discarded remove patch
@@ -33,30 +33,30 @@
 block discarded – undo
33 33
  */
34 34
 class TokenHandler {
35 35
 
36
-	const TOKEN_LENGTH = 15;
37
-
38
-	/** @var ISecureRandom */
39
-	private $secureRandom;
40
-
41
-	/**
42
-	 * TokenHandler constructor.
43
-	 *
44
-	 * @param ISecureRandom $secureRandom
45
-	 */
46
-	public function __construct(ISecureRandom $secureRandom) {
47
-		$this->secureRandom = $secureRandom;
48
-	}
49
-
50
-	/**
51
-	 * generate to token used to authenticate federated shares
52
-	 *
53
-	 * @return string
54
-	 */
55
-	public function generateToken() {
56
-		$token = $this->secureRandom->generate(
57
-			self::TOKEN_LENGTH,
58
-			ISecureRandom::CHAR_LOWER . ISecureRandom::CHAR_UPPER . ISecureRandom::CHAR_DIGITS);
59
-		return $token;
60
-	}
36
+    const TOKEN_LENGTH = 15;
37
+
38
+    /** @var ISecureRandom */
39
+    private $secureRandom;
40
+
41
+    /**
42
+     * TokenHandler constructor.
43
+     *
44
+     * @param ISecureRandom $secureRandom
45
+     */
46
+    public function __construct(ISecureRandom $secureRandom) {
47
+        $this->secureRandom = $secureRandom;
48
+    }
49
+
50
+    /**
51
+     * generate to token used to authenticate federated shares
52
+     *
53
+     * @return string
54
+     */
55
+    public function generateToken() {
56
+        $token = $this->secureRandom->generate(
57
+            self::TOKEN_LENGTH,
58
+            ISecureRandom::CHAR_LOWER . ISecureRandom::CHAR_UPPER . ISecureRandom::CHAR_DIGITS);
59
+        return $token;
60
+    }
61 61
 
62 62
 }
Please login to merge, or discard this patch.
apps/federatedfilesharing/lib/AddressHandler.php 1 patch
Indentation   +118 added lines, -118 removed lines patch added patch discarded remove patch
@@ -33,122 +33,122 @@
 block discarded – undo
33 33
  */
34 34
 class AddressHandler {
35 35
 
36
-	/** @var IL10N */
37
-	private $l;
38
-
39
-	/** @var IURLGenerator */
40
-	private $urlGenerator;
41
-
42
-	/** @var ICloudIdManager */
43
-	private $cloudIdManager;
44
-
45
-	/**
46
-	 * AddressHandler constructor.
47
-	 *
48
-	 * @param IURLGenerator $urlGenerator
49
-	 * @param IL10N $il10n
50
-	 * @param ICloudIdManager $cloudIdManager
51
-	 */
52
-	public function __construct(
53
-		IURLGenerator $urlGenerator,
54
-		IL10N $il10n,
55
-		ICloudIdManager $cloudIdManager
56
-	) {
57
-		$this->l = $il10n;
58
-		$this->urlGenerator = $urlGenerator;
59
-		$this->cloudIdManager = $cloudIdManager;
60
-	}
61
-
62
-	/**
63
-	 * split user and remote from federated cloud id
64
-	 *
65
-	 * @param string $address federated share address
66
-	 * @return array [user, remoteURL]
67
-	 * @throws HintException
68
-	 */
69
-	public function splitUserRemote($address) {
70
-		try {
71
-			$cloudId = $this->cloudIdManager->resolveCloudId($address);
72
-			return [$cloudId->getUser(), $cloudId->getRemote()];
73
-		} catch (\InvalidArgumentException $e) {
74
-			$hint = $this->l->t('Invalid Federated Cloud ID');
75
-			throw new HintException('Invalid Federated Cloud ID', $hint, 0, $e);
76
-		}
77
-	}
78
-
79
-	/**
80
-	 * generate remote URL part of federated ID
81
-	 *
82
-	 * @return string url of the current server
83
-	 */
84
-	public function generateRemoteURL() {
85
-		$url = $this->urlGenerator->getAbsoluteURL('/');
86
-		return $url;
87
-	}
88
-
89
-	/**
90
-	 * check if two federated cloud IDs refer to the same user
91
-	 *
92
-	 * @param string $user1
93
-	 * @param string $server1
94
-	 * @param string $user2
95
-	 * @param string $server2
96
-	 * @return bool true if both users and servers are the same
97
-	 */
98
-	public function compareAddresses($user1, $server1, $user2, $server2) {
99
-		$normalizedServer1 = strtolower($this->removeProtocolFromUrl($server1));
100
-		$normalizedServer2 = strtolower($this->removeProtocolFromUrl($server2));
101
-
102
-		if (rtrim($normalizedServer1, '/') === rtrim($normalizedServer2, '/')) {
103
-			// FIXME this should be a method in the user management instead
104
-			\OCP\Util::emitHook(
105
-				'\OCA\Files_Sharing\API\Server2Server',
106
-				'preLoginNameUsedAsUserName',
107
-				array('uid' => &$user1)
108
-			);
109
-			\OCP\Util::emitHook(
110
-				'\OCA\Files_Sharing\API\Server2Server',
111
-				'preLoginNameUsedAsUserName',
112
-				array('uid' => &$user2)
113
-			);
114
-
115
-			if ($user1 === $user2) {
116
-				return true;
117
-			}
118
-		}
119
-
120
-		return false;
121
-	}
122
-
123
-	/**
124
-	 * remove protocol from URL
125
-	 *
126
-	 * @param string $url
127
-	 * @return string
128
-	 */
129
-	public function removeProtocolFromUrl($url) {
130
-		if (strpos($url, 'https://') === 0) {
131
-			return substr($url, strlen('https://'));
132
-		} else if (strpos($url, 'http://') === 0) {
133
-			return substr($url, strlen('http://'));
134
-		}
135
-
136
-		return $url;
137
-	}
138
-
139
-	/**
140
-	 * check if the url contain the protocol (http or https)
141
-	 *
142
-	 * @param string $url
143
-	 * @return bool
144
-	 */
145
-	public function urlContainProtocol($url) {
146
-		if (strpos($url, 'https://') === 0 ||
147
-			strpos($url, 'http://') === 0) {
148
-
149
-			return true;
150
-		}
151
-
152
-		return false;
153
-	}
36
+    /** @var IL10N */
37
+    private $l;
38
+
39
+    /** @var IURLGenerator */
40
+    private $urlGenerator;
41
+
42
+    /** @var ICloudIdManager */
43
+    private $cloudIdManager;
44
+
45
+    /**
46
+     * AddressHandler constructor.
47
+     *
48
+     * @param IURLGenerator $urlGenerator
49
+     * @param IL10N $il10n
50
+     * @param ICloudIdManager $cloudIdManager
51
+     */
52
+    public function __construct(
53
+        IURLGenerator $urlGenerator,
54
+        IL10N $il10n,
55
+        ICloudIdManager $cloudIdManager
56
+    ) {
57
+        $this->l = $il10n;
58
+        $this->urlGenerator = $urlGenerator;
59
+        $this->cloudIdManager = $cloudIdManager;
60
+    }
61
+
62
+    /**
63
+     * split user and remote from federated cloud id
64
+     *
65
+     * @param string $address federated share address
66
+     * @return array [user, remoteURL]
67
+     * @throws HintException
68
+     */
69
+    public function splitUserRemote($address) {
70
+        try {
71
+            $cloudId = $this->cloudIdManager->resolveCloudId($address);
72
+            return [$cloudId->getUser(), $cloudId->getRemote()];
73
+        } catch (\InvalidArgumentException $e) {
74
+            $hint = $this->l->t('Invalid Federated Cloud ID');
75
+            throw new HintException('Invalid Federated Cloud ID', $hint, 0, $e);
76
+        }
77
+    }
78
+
79
+    /**
80
+     * generate remote URL part of federated ID
81
+     *
82
+     * @return string url of the current server
83
+     */
84
+    public function generateRemoteURL() {
85
+        $url = $this->urlGenerator->getAbsoluteURL('/');
86
+        return $url;
87
+    }
88
+
89
+    /**
90
+     * check if two federated cloud IDs refer to the same user
91
+     *
92
+     * @param string $user1
93
+     * @param string $server1
94
+     * @param string $user2
95
+     * @param string $server2
96
+     * @return bool true if both users and servers are the same
97
+     */
98
+    public function compareAddresses($user1, $server1, $user2, $server2) {
99
+        $normalizedServer1 = strtolower($this->removeProtocolFromUrl($server1));
100
+        $normalizedServer2 = strtolower($this->removeProtocolFromUrl($server2));
101
+
102
+        if (rtrim($normalizedServer1, '/') === rtrim($normalizedServer2, '/')) {
103
+            // FIXME this should be a method in the user management instead
104
+            \OCP\Util::emitHook(
105
+                '\OCA\Files_Sharing\API\Server2Server',
106
+                'preLoginNameUsedAsUserName',
107
+                array('uid' => &$user1)
108
+            );
109
+            \OCP\Util::emitHook(
110
+                '\OCA\Files_Sharing\API\Server2Server',
111
+                'preLoginNameUsedAsUserName',
112
+                array('uid' => &$user2)
113
+            );
114
+
115
+            if ($user1 === $user2) {
116
+                return true;
117
+            }
118
+        }
119
+
120
+        return false;
121
+    }
122
+
123
+    /**
124
+     * remove protocol from URL
125
+     *
126
+     * @param string $url
127
+     * @return string
128
+     */
129
+    public function removeProtocolFromUrl($url) {
130
+        if (strpos($url, 'https://') === 0) {
131
+            return substr($url, strlen('https://'));
132
+        } else if (strpos($url, 'http://') === 0) {
133
+            return substr($url, strlen('http://'));
134
+        }
135
+
136
+        return $url;
137
+    }
138
+
139
+    /**
140
+     * check if the url contain the protocol (http or https)
141
+     *
142
+     * @param string $url
143
+     * @return bool
144
+     */
145
+    public function urlContainProtocol($url) {
146
+        if (strpos($url, 'https://') === 0 ||
147
+            strpos($url, 'http://') === 0) {
148
+
149
+            return true;
150
+        }
151
+
152
+        return false;
153
+    }
154 154
 }
Please login to merge, or discard this patch.