Passed
Push — master ( 350d02...42b98d )
by Joas
23:24 queued 09:28
created
lib/public/Authentication/TwoFactorAuth/IProvidesIcons.php 1 patch
Indentation   +16 added lines, -16 removed lines patch added patch discarded remove patch
@@ -34,22 +34,22 @@
 block discarded – undo
34 34
  */
35 35
 interface IProvidesIcons extends IProvider {
36 36
 
37
-	/**
38
-	 * Get the path to the light (white) icon of this provider
39
-	 *
40
-	 * @return String
41
-	 *
42
-	 * @since 15.0.0
43
-	 */
44
-	public function getLightIcon(): String;
37
+    /**
38
+     * Get the path to the light (white) icon of this provider
39
+     *
40
+     * @return String
41
+     *
42
+     * @since 15.0.0
43
+     */
44
+    public function getLightIcon(): String;
45 45
 
46
-	/**
47
-	 * Get the path to the dark (black) icon of this provider
48
-	 *
49
-	 * @return String
50
-	 *
51
-	 * @since 15.0.0
52
-	 */
53
-	public function getDarkIcon(): String;
46
+    /**
47
+     * Get the path to the dark (black) icon of this provider
48
+     *
49
+     * @return String
50
+     *
51
+     * @since 15.0.0
52
+     */
53
+    public function getDarkIcon(): String;
54 54
 
55 55
 }
Please login to merge, or discard this patch.
apps/twofactor_backupcodes/lib/Migration/CheckBackupCodes.php 1 patch
Indentation   +11 added lines, -11 removed lines patch added patch discarded remove patch
@@ -30,19 +30,19 @@
 block discarded – undo
30 30
 
31 31
 class CheckBackupCodes implements IRepairStep {
32 32
 
33
-	/** @var IJobList */
34
-	private $jobList;
33
+    /** @var IJobList */
34
+    private $jobList;
35 35
 
36
-	public function __construct(IJobList $jobList) {
37
-		$this->jobList = $jobList;
38
-	}
36
+    public function __construct(IJobList $jobList) {
37
+        $this->jobList = $jobList;
38
+    }
39 39
 
40
-	public function getName(): string {
41
-		return 'Add background job to check for backup codes';
42
-	}
40
+    public function getName(): string {
41
+        return 'Add background job to check for backup codes';
42
+    }
43 43
 
44
-	public function run(IOutput $output) {
45
-		$this->jobList->add(\OCA\TwoFactorBackupCodes\BackgroundJob\CheckBackupCodes::class);
46
-	}
44
+    public function run(IOutput $output) {
45
+        $this->jobList->add(\OCA\TwoFactorBackupCodes\BackgroundJob\CheckBackupCodes::class);
46
+    }
47 47
 
48 48
 }
Please login to merge, or discard this patch.
lib/private/Setup/Sqlite.php 2 patches
Spacing   +2 added lines, -2 removed lines patch added patch discarded remove patch
@@ -64,10 +64,10 @@
 block discarded – undo
64 64
 	public function setupDatabase($username) {
65 65
 		$datadir = $this->config->getValue(
66 66
 			'datadirectory',
67
-			\OC::$SERVERROOT . '/data'
67
+			\OC::$SERVERROOT.'/data'
68 68
 		);
69 69
 
70
-		$sqliteFile = $datadir . '/' . $this->dbName . 'db';
70
+		$sqliteFile = $datadir.'/'.$this->dbName.'db';
71 71
 		if (file_exists($sqliteFile)) {
72 72
 			unlink($sqliteFile);
73 73
 		}
Please login to merge, or discard this patch.
Indentation   +29 added lines, -29 removed lines patch added patch discarded remove patch
@@ -26,14 +26,14 @@  discard block
 block discarded – undo
26 26
 use OC\DB\ConnectionFactory;
27 27
 
28 28
 class Sqlite extends AbstractDatabase {
29
-	public $dbprettyname = 'Sqlite';
29
+    public $dbprettyname = 'Sqlite';
30 30
 
31
-	public function validate($config) {
32
-		return [];
33
-	}
31
+    public function validate($config) {
32
+        return [];
33
+    }
34 34
 
35
-	public function initialize($config) {
36
-		/*
35
+    public function initialize($config) {
36
+        /*
37 37
 		 * Web: When using web based installer its not possible to set dbname
38 38
 		 * or dbtableprefix. Defaults used from ConnectionFactory and dbtype = 'sqlite'
39 39
 		 * is written to config.php.
@@ -44,32 +44,32 @@  discard block
 block discarded – undo
44 44
 		 * in connection factory configuration is obtained from config.php.
45 45
 		 */
46 46
 
47
-		$this->dbName = empty($config['dbname'])
48
-			? ConnectionFactory::DEFAULT_DBNAME
49
-			: $config['dbname'];
47
+        $this->dbName = empty($config['dbname'])
48
+            ? ConnectionFactory::DEFAULT_DBNAME
49
+            : $config['dbname'];
50 50
 
51
-		$this->tablePrefix = empty($config['dbtableprefix'])
52
-			? ConnectionFactory::DEFAULT_DBTABLEPREFIX
53
-			: $config['dbtableprefix'];
51
+        $this->tablePrefix = empty($config['dbtableprefix'])
52
+            ? ConnectionFactory::DEFAULT_DBTABLEPREFIX
53
+            : $config['dbtableprefix'];
54 54
 
55
-		if ($this->dbName !== ConnectionFactory::DEFAULT_DBNAME) {
56
-			$this->config->setValue('dbname', $this->dbName);
57
-		}
55
+        if ($this->dbName !== ConnectionFactory::DEFAULT_DBNAME) {
56
+            $this->config->setValue('dbname', $this->dbName);
57
+        }
58 58
 
59
-		if ($this->tablePrefix !== ConnectionFactory::DEFAULT_DBTABLEPREFIX) {
60
-			$this->config->setValue('dbtableprefix', $this->tablePrefix);
61
-		}
62
-	}
59
+        if ($this->tablePrefix !== ConnectionFactory::DEFAULT_DBTABLEPREFIX) {
60
+            $this->config->setValue('dbtableprefix', $this->tablePrefix);
61
+        }
62
+    }
63 63
 
64
-	public function setupDatabase($username) {
65
-		$datadir = $this->config->getValue(
66
-			'datadirectory',
67
-			\OC::$SERVERROOT . '/data'
68
-		);
64
+    public function setupDatabase($username) {
65
+        $datadir = $this->config->getValue(
66
+            'datadirectory',
67
+            \OC::$SERVERROOT . '/data'
68
+        );
69 69
 
70
-		$sqliteFile = $datadir . '/' . $this->dbName . 'db';
71
-		if (file_exists($sqliteFile)) {
72
-			unlink($sqliteFile);
73
-		}
74
-	}
70
+        $sqliteFile = $datadir . '/' . $this->dbName . 'db';
71
+        if (file_exists($sqliteFile)) {
72
+            unlink($sqliteFile);
73
+        }
74
+    }
75 75
 }
Please login to merge, or discard this patch.
lib/public/Authentication/TwoFactorAuth/IPersonalProviderSettings.php 1 patch
Indentation   +6 added lines, -6 removed lines patch added patch discarded remove patch
@@ -33,11 +33,11 @@
 block discarded – undo
33 33
  */
34 34
 interface IPersonalProviderSettings {
35 35
 
36
-	/**
37
-	 * @return Template
38
-	 *
39
-	 * @since 15.0.0
40
-	 */
41
-	public function getBody(): Template;
36
+    /**
37
+     * @return Template
38
+     *
39
+     * @since 15.0.0
40
+     */
41
+    public function getBody(): Template;
42 42
 
43 43
 }
Please login to merge, or discard this patch.
lib/public/Authentication/TwoFactorAuth/IProvidesPersonalSettings.php 1 patch
Indentation   +8 added lines, -8 removed lines patch added patch discarded remove patch
@@ -35,13 +35,13 @@
 block discarded – undo
35 35
  */
36 36
 interface IProvidesPersonalSettings extends IProvider {
37 37
 
38
-	/**
39
-	 * @param IUser $user
40
-	 *
41
-	 * @return IPersonalProviderSettings
42
-	 *
43
-	 * @since 15.0.0
44
-	 */
45
-	public function getPersonalSettings(IUser $user): IPersonalProviderSettings;
38
+    /**
39
+     * @param IUser $user
40
+     *
41
+     * @return IPersonalProviderSettings
42
+     *
43
+     * @since 15.0.0
44
+     */
45
+    public function getPersonalSettings(IUser $user): IPersonalProviderSettings;
46 46
 
47 47
 }
Please login to merge, or discard this patch.
lib/public/Federation/Exceptions/ProviderAlreadyExistsException.php 2 patches
Indentation   +14 added lines, -14 removed lines patch added patch discarded remove patch
@@ -32,19 +32,19 @@
 block discarded – undo
32 32
  */
33 33
 class ProviderAlreadyExistsException extends HintException {
34 34
 
35
-	/**
36
-	 * ProviderAlreadyExistsException constructor.
37
-	 *
38
-	 * @since 14.0.0
39
-	 *
40
-	 * @param string $newProviderId cloud federation provider ID of the new provider
41
-	 * @param string $existingProviderName name of cloud federation provider which already use the same ID
42
-	 */
43
-	public function __construct($newProviderId, $existingProviderName) {
44
-		$l = \OC::$server->getL10N('federation');
45
-		$message = 'ID "' . $newProviderId . '" already used by cloud federation provider "' . $existingProviderName . '"';
46
-		$hint = $l->t('ID "%1$s" already used by cloud federation provider "%2$s"', [$newProviderId, $existingProviderName]);
47
-		parent::__construct($message, $hint);
48
-	}
35
+    /**
36
+     * ProviderAlreadyExistsException constructor.
37
+     *
38
+     * @since 14.0.0
39
+     *
40
+     * @param string $newProviderId cloud federation provider ID of the new provider
41
+     * @param string $existingProviderName name of cloud federation provider which already use the same ID
42
+     */
43
+    public function __construct($newProviderId, $existingProviderName) {
44
+        $l = \OC::$server->getL10N('federation');
45
+        $message = 'ID "' . $newProviderId . '" already used by cloud federation provider "' . $existingProviderName . '"';
46
+        $hint = $l->t('ID "%1$s" already used by cloud federation provider "%2$s"', [$newProviderId, $existingProviderName]);
47
+        parent::__construct($message, $hint);
48
+    }
49 49
 
50 50
 }
Please login to merge, or discard this patch.
Spacing   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -42,7 +42,7 @@
 block discarded – undo
42 42
 	 */
43 43
 	public function __construct($newProviderId, $existingProviderName) {
44 44
 		$l = \OC::$server->getL10N('federation');
45
-		$message = 'ID "' . $newProviderId . '" already used by cloud federation provider "' . $existingProviderName . '"';
45
+		$message = 'ID "'.$newProviderId.'" already used by cloud federation provider "'.$existingProviderName.'"';
46 46
 		$hint = $l->t('ID "%1$s" already used by cloud federation provider "%2$s"', [$newProviderId, $existingProviderName]);
47 47
 		parent::__construct($message, $hint);
48 48
 	}
Please login to merge, or discard this patch.
core/templates/untrustedDomain.php 1 patch
Spacing   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -8,6 +8,6 @@
 block discarded – undo
8 8
 	</p>
9 9
 	<br />
10 10
 	<p>
11
-		<?php print_unescaped($l->t('Further information how to configure this can be found in the %1$sdocumentation%2$s.', ['<a href="' . $_['docUrl'] . '" target="blank">', '</a>'])); ?>
11
+		<?php print_unescaped($l->t('Further information how to configure this can be found in the %1$sdocumentation%2$s.', ['<a href="'.$_['docUrl'].'" target="blank">', '</a>'])); ?>
12 12
 	</p>
13 13
 </div>
Please login to merge, or discard this patch.
lib/public/AppFramework/Utility/ITimeFactory.php 1 patch
Indentation   +12 added lines, -12 removed lines patch added patch discarded remove patch
@@ -31,18 +31,18 @@
 block discarded – undo
31 31
  */
32 32
 interface ITimeFactory {
33 33
 
34
-	/**
35
-	 * @return int the result of a call to time()
36
-	 * @since 8.0.0
37
-	 */
38
-	public function getTime(): int;
34
+    /**
35
+     * @return int the result of a call to time()
36
+     * @since 8.0.0
37
+     */
38
+    public function getTime(): int;
39 39
 
40
-	/**
41
-	 * @param string $time
42
-	 * @param \DateTimeZone $timezone
43
-	 * @return \DateTime
44
-	 * @since 15.0.0
45
-	 */
46
-	public function getDateTime(string $time = 'now', \DateTimeZone $timezone = null): \DateTime;
40
+    /**
41
+     * @param string $time
42
+     * @param \DateTimeZone $timezone
43
+     * @return \DateTime
44
+     * @since 15.0.0
45
+     */
46
+    public function getDateTime(string $time = 'now', \DateTimeZone $timezone = null): \DateTime;
47 47
 
48 48
 }
Please login to merge, or discard this patch.
core/Command/TwoFactorAuth/Enforce.php 2 patches
Spacing   +2 added lines, -2 removed lines patch added patch discarded remove patch
@@ -98,10 +98,10 @@
 block discarded – undo
98 98
 		if (empty($state->getEnforcedGroups())) {
99 99
 			$message = 'Two-factor authentication is enforced for all users';
100 100
 		} else {
101
-			$message = 'Two-factor authentication is enforced for members of the group(s) ' . implode(', ', $state->getEnforcedGroups());
101
+			$message = 'Two-factor authentication is enforced for members of the group(s) '.implode(', ', $state->getEnforcedGroups());
102 102
 		}
103 103
 		if (!empty($state->getExcludedGroups())) {
104
-			$message .= ', except members of ' . implode(', ', $state->getExcludedGroups());
104
+			$message .= ', except members of '.implode(', ', $state->getExcludedGroups());
105 105
 		}
106 106
 		$output->writeln($message);
107 107
 	}
Please login to merge, or discard this patch.
Indentation   +70 added lines, -70 removed lines patch added patch discarded remove patch
@@ -36,81 +36,81 @@
 block discarded – undo
36 36
 
37 37
 class Enforce extends Command {
38 38
 
39
-	/** @var MandatoryTwoFactor */
40
-	private $mandatoryTwoFactor;
39
+    /** @var MandatoryTwoFactor */
40
+    private $mandatoryTwoFactor;
41 41
 
42
-	public function __construct(MandatoryTwoFactor $mandatoryTwoFactor) {
43
-		parent::__construct();
42
+    public function __construct(MandatoryTwoFactor $mandatoryTwoFactor) {
43
+        parent::__construct();
44 44
 
45
-		$this->mandatoryTwoFactor = $mandatoryTwoFactor;
46
-	}
45
+        $this->mandatoryTwoFactor = $mandatoryTwoFactor;
46
+    }
47 47
 
48
-	protected function configure() {
49
-		$this->setName('twofactorauth:enforce');
50
-		$this->setDescription('Enabled/disable enforced two-factor authentication');
51
-		$this->addOption(
52
-			'on',
53
-			null,
54
-			InputOption::VALUE_NONE,
55
-			'enforce two-factor authentication'
56
-		);
57
-		$this->addOption(
58
-			'off',
59
-			null,
60
-			InputOption::VALUE_NONE,
61
-			'don\'t enforce two-factor authenticaton'
62
-		);
63
-		$this->addOption(
64
-			'group',
65
-			null,
66
-			InputOption::VALUE_OPTIONAL | InputOption::VALUE_IS_ARRAY,
67
-			'enforce only for the given group(s)'
68
-		);
69
-		$this->addOption(
70
-			'exclude',
71
-			null,
72
-			InputOption::VALUE_OPTIONAL | InputOption::VALUE_IS_ARRAY,
73
-			'exclude mandatory two-factor auth for the given group(s)'
74
-		);
75
-	}
48
+    protected function configure() {
49
+        $this->setName('twofactorauth:enforce');
50
+        $this->setDescription('Enabled/disable enforced two-factor authentication');
51
+        $this->addOption(
52
+            'on',
53
+            null,
54
+            InputOption::VALUE_NONE,
55
+            'enforce two-factor authentication'
56
+        );
57
+        $this->addOption(
58
+            'off',
59
+            null,
60
+            InputOption::VALUE_NONE,
61
+            'don\'t enforce two-factor authenticaton'
62
+        );
63
+        $this->addOption(
64
+            'group',
65
+            null,
66
+            InputOption::VALUE_OPTIONAL | InputOption::VALUE_IS_ARRAY,
67
+            'enforce only for the given group(s)'
68
+        );
69
+        $this->addOption(
70
+            'exclude',
71
+            null,
72
+            InputOption::VALUE_OPTIONAL | InputOption::VALUE_IS_ARRAY,
73
+            'exclude mandatory two-factor auth for the given group(s)'
74
+        );
75
+    }
76 76
 
77
-	protected function execute(InputInterface $input, OutputInterface $output): int {
78
-		if ($input->getOption('on')) {
79
-			$enforcedGroups = $input->getOption('group');
80
-			$excludedGroups = $input->getOption('exclude');
81
-			$this->mandatoryTwoFactor->setState(new EnforcementState(true, $enforcedGroups, $excludedGroups));
82
-		} elseif ($input->getOption('off')) {
83
-			$this->mandatoryTwoFactor->setState(new EnforcementState(false));
84
-		}
77
+    protected function execute(InputInterface $input, OutputInterface $output): int {
78
+        if ($input->getOption('on')) {
79
+            $enforcedGroups = $input->getOption('group');
80
+            $excludedGroups = $input->getOption('exclude');
81
+            $this->mandatoryTwoFactor->setState(new EnforcementState(true, $enforcedGroups, $excludedGroups));
82
+        } elseif ($input->getOption('off')) {
83
+            $this->mandatoryTwoFactor->setState(new EnforcementState(false));
84
+        }
85 85
 
86
-		$state = $this->mandatoryTwoFactor->getState();
87
-		if ($state->isEnforced()) {
88
-			$this->writeEnforced($output, $state);
89
-		} else {
90
-			$this->writeNotEnforced($output);
91
-		}
92
-		return 0;
93
-	}
86
+        $state = $this->mandatoryTwoFactor->getState();
87
+        if ($state->isEnforced()) {
88
+            $this->writeEnforced($output, $state);
89
+        } else {
90
+            $this->writeNotEnforced($output);
91
+        }
92
+        return 0;
93
+    }
94 94
 
95
-	/**
96
-	 * @param OutputInterface $output
97
-	 */
98
-	protected function writeEnforced(OutputInterface $output, EnforcementState $state) {
99
-		if (empty($state->getEnforcedGroups())) {
100
-			$message = 'Two-factor authentication is enforced for all users';
101
-		} else {
102
-			$message = 'Two-factor authentication is enforced for members of the group(s) ' . implode(', ', $state->getEnforcedGroups());
103
-		}
104
-		if (!empty($state->getExcludedGroups())) {
105
-			$message .= ', except members of ' . implode(', ', $state->getExcludedGroups());
106
-		}
107
-		$output->writeln($message);
108
-	}
95
+    /**
96
+     * @param OutputInterface $output
97
+     */
98
+    protected function writeEnforced(OutputInterface $output, EnforcementState $state) {
99
+        if (empty($state->getEnforcedGroups())) {
100
+            $message = 'Two-factor authentication is enforced for all users';
101
+        } else {
102
+            $message = 'Two-factor authentication is enforced for members of the group(s) ' . implode(', ', $state->getEnforcedGroups());
103
+        }
104
+        if (!empty($state->getExcludedGroups())) {
105
+            $message .= ', except members of ' . implode(', ', $state->getExcludedGroups());
106
+        }
107
+        $output->writeln($message);
108
+    }
109 109
 
110
-	/**
111
-	 * @param OutputInterface $output
112
-	 */
113
-	protected function writeNotEnforced(OutputInterface $output) {
114
-		$output->writeln('Two-factor authentication is not enforced');
115
-	}
110
+    /**
111
+     * @param OutputInterface $output
112
+     */
113
+    protected function writeNotEnforced(OutputInterface $output) {
114
+        $output->writeln('Two-factor authentication is not enforced');
115
+    }
116 116
 }
Please login to merge, or discard this patch.