Passed
Push — master ( fffdc0...480b37 )
by Morris
36:25 queued 23:46
created
apps/user_ldap/lib/Access.php 1 patch
Spacing   +52 added lines, -52 removed lines patch added patch discarded remove patch
@@ -199,7 +199,7 @@  discard block
 block discarded – undo
199 199
 		$this->abandonPagedSearch();
200 200
 		// openLDAP requires that we init a new Paged Search. Not needed by AD,
201 201
 		// but does not hurt either.
202
-		$pagingSize = (int)$this->connection->ldapPagingSize;
202
+		$pagingSize = (int) $this->connection->ldapPagingSize;
203 203
 		// 0 won't result in replies, small numbers may leave out groups
204 204
 		// (cf. #12306), 500 is default for paging and should work everywhere.
205 205
 		$maxResults = $pagingSize > 20 ? $pagingSize : 500;
@@ -240,13 +240,13 @@  discard block
 block discarded – undo
240 240
 					return $values;
241 241
 				} else {
242 242
 					$low = $result['rangeHigh'] + 1;
243
-					$attrToRead = $result['attributeName'] . ';range=' . $low . '-*';
243
+					$attrToRead = $result['attributeName'].';range='.$low.'-*';
244 244
 					$isRangeRequest = true;
245 245
 				}
246 246
 			}
247 247
 		} while ($isRangeRequest);
248 248
 
249
-		\OCP\Util::writeLog('user_ldap', 'Requested attribute ' . $attr . ' not found for ' . $dn, ILogger::DEBUG);
249
+		\OCP\Util::writeLog('user_ldap', 'Requested attribute '.$attr.' not found for '.$dn, ILogger::DEBUG);
250 250
 		return false;
251 251
 	}
252 252
 
@@ -270,13 +270,13 @@  discard block
 block discarded – undo
270 270
 		if (!$this->ldap->isResource($rr)) {
271 271
 			if ($attribute !== '') {
272 272
 				//do not throw this message on userExists check, irritates
273
-				\OCP\Util::writeLog('user_ldap', 'readAttribute failed for DN ' . $dn, ILogger::DEBUG);
273
+				\OCP\Util::writeLog('user_ldap', 'readAttribute failed for DN '.$dn, ILogger::DEBUG);
274 274
 			}
275 275
 			//in case an error occurs , e.g. object does not exist
276 276
 			return false;
277 277
 		}
278 278
 		if ($attribute === '' && ($filter === 'objectclass=*' || $this->invokeLDAPMethod('countEntries', $cr, $rr) === 1)) {
279
-			\OCP\Util::writeLog('user_ldap', 'readAttribute: ' . $dn . ' found', ILogger::DEBUG);
279
+			\OCP\Util::writeLog('user_ldap', 'readAttribute: '.$dn.' found', ILogger::DEBUG);
280 280
 			return true;
281 281
 		}
282 282
 		$er = $this->invokeLDAPMethod('firstEntry', $cr, $rr);
@@ -356,7 +356,7 @@  discard block
 block discarded – undo
356 356
 	 * @throws \Exception
357 357
 	 */
358 358
 	public function setPassword($userDN, $password) {
359
-		if ((int)$this->connection->turnOnPasswordChange !== 1) {
359
+		if ((int) $this->connection->turnOnPasswordChange !== 1) {
360 360
 			throw new \Exception('LDAP password changes are disabled.');
361 361
 		}
362 362
 		$cr = $this->connection->getConnectionResource();
@@ -370,7 +370,7 @@  discard block
 block discarded – undo
370 370
 			return @$this->invokeLDAPMethod('exopPasswd', $cr, $userDN, '', $password) ||
371 371
 				@$this->invokeLDAPMethod('modReplace', $cr, $userDN, $password);
372 372
 		} catch (ConstraintViolationException $e) {
373
-			throw new HintException('Password change rejected.', \OC::$server->getL10N('user_ldap')->t('Password change rejected. Hint: ') . $e->getMessage(), $e->getCode());
373
+			throw new HintException('Password change rejected.', \OC::$server->getL10N('user_ldap')->t('Password change rejected. Hint: ').$e->getMessage(), $e->getCode());
374 374
 		}
375 375
 	}
376 376
 
@@ -536,21 +536,21 @@  discard block
 block discarded – undo
536 536
 			}
537 537
 		} else {
538 538
 			//If the UUID can't be detected something is foul.
539
-			\OCP\Util::writeLog('user_ldap', 'Cannot determine UUID for ' . $fdn . '. Skipping.', ILogger::INFO);
539
+			\OCP\Util::writeLog('user_ldap', 'Cannot determine UUID for '.$fdn.'. Skipping.', ILogger::INFO);
540 540
 			return false;
541 541
 		}
542 542
 
543 543
 		if (is_null($ldapName)) {
544 544
 			$ldapName = $this->readAttribute($fdn, $nameAttribute, $filter);
545 545
 			if (!isset($ldapName[0]) && empty($ldapName[0])) {
546
-				\OCP\Util::writeLog('user_ldap', 'No or empty name for ' . $fdn . ' with filter ' . $filter . '.', ILogger::DEBUG);
546
+				\OCP\Util::writeLog('user_ldap', 'No or empty name for '.$fdn.' with filter '.$filter.'.', ILogger::DEBUG);
547 547
 				return false;
548 548
 			}
549 549
 			$ldapName = $ldapName[0];
550 550
 		}
551 551
 
552 552
 		if ($isUser) {
553
-			$usernameAttribute = (string)$this->connection->ldapExpertUsernameAttr;
553
+			$usernameAttribute = (string) $this->connection->ldapExpertUsernameAttr;
554 554
 			if ($usernameAttribute !== '') {
555 555
 				$username = $this->readAttribute($fdn, $usernameAttribute);
556 556
 				$username = $username[0];
@@ -602,7 +602,7 @@  discard block
 block discarded – undo
602 602
 		}
603 603
 
604 604
 		//if everything else did not help..
605
-		\OCP\Util::writeLog('user_ldap', 'Could not create unique name for ' . $fdn . '.', ILogger::INFO);
605
+		\OCP\Util::writeLog('user_ldap', 'Could not create unique name for '.$fdn.'.', ILogger::INFO);
606 606
 		return false;
607 607
 	}
608 608
 
@@ -717,7 +717,7 @@  discard block
 block discarded – undo
717 717
 	 * @param string|false $home the home directory path
718 718
 	 */
719 719
 	public function cacheUserHome($ocName, $home) {
720
-		$cacheKey = 'getHome' . $ocName;
720
+		$cacheKey = 'getHome'.$ocName;
721 721
 		$this->connection->writeToCache($cacheKey, $home);
722 722
 	}
723 723
 
@@ -727,14 +727,14 @@  discard block
 block discarded – undo
727 727
 	 * @param string $ocName the internal Nextcloud username
728 728
 	 */
729 729
 	public function cacheUserExists($ocName) {
730
-		$this->connection->writeToCache('userExists' . $ocName, true);
730
+		$this->connection->writeToCache('userExists'.$ocName, true);
731 731
 	}
732 732
 
733 733
 	/**
734 734
 	 * caches a group as existing
735 735
 	 */
736 736
 	public function cacheGroupExists(string $gid): void {
737
-		$this->connection->writeToCache('groupExists' . $gid, true);
737
+		$this->connection->writeToCache('groupExists'.$gid, true);
738 738
 	}
739 739
 
740 740
 	/**
@@ -752,11 +752,11 @@  discard block
 block discarded – undo
752 752
 		}
753 753
 		$displayName = $user->composeAndStoreDisplayName($displayName, $displayName2);
754 754
 		$cacheKeyTrunk = 'getDisplayName';
755
-		$this->connection->writeToCache($cacheKeyTrunk . $ocName, $displayName);
755
+		$this->connection->writeToCache($cacheKeyTrunk.$ocName, $displayName);
756 756
 	}
757 757
 
758 758
 	public function cacheGroupDisplayName(string $ncName, string $displayName): void {
759
-		$cacheKey = 'group_getDisplayName' . $ncName;
759
+		$cacheKey = 'group_getDisplayName'.$ncName;
760 760
 		$this->connection->writeToCache($cacheKey, $displayName);
761 761
 	}
762 762
 
@@ -774,7 +774,7 @@  discard block
 block discarded – undo
774 774
 		//while loop is just a precaution. If a name is not generated within
775 775
 		//20 attempts, something else is very wrong. Avoids infinite loop.
776 776
 		while ($attempts < 20) {
777
-			$altName = $name . '_' . rand(1000, 9999);
777
+			$altName = $name.'_'.rand(1000, 9999);
778 778
 			if (!$this->ncUserManager->userExists($altName)) {
779 779
 				return $altName;
780 780
 			}
@@ -803,9 +803,9 @@  discard block
 block discarded – undo
803 803
 		} else {
804 804
 			natsort($usedNames);
805 805
 			$lastName = array_pop($usedNames);
806
-			$lastNo = (int)substr($lastName, strrpos($lastName, '_') + 1);
806
+			$lastNo = (int) substr($lastName, strrpos($lastName, '_') + 1);
807 807
 		}
808
-		$altName = $name . '_' . (string)($lastNo + 1);
808
+		$altName = $name.'_'.(string) ($lastNo + 1);
809 809
 		unset($usedNames);
810 810
 
811 811
 		$attempts = 1;
@@ -816,7 +816,7 @@  discard block
 block discarded – undo
816 816
 			if (!\OC::$server->getGroupManager()->groupExists($altName)) {
817 817
 				return $altName;
818 818
 			}
819
-			$altName = $name . '_' . ($lastNo + $attempts);
819
+			$altName = $name.'_'.($lastNo + $attempts);
820 820
 			$attempts++;
821 821
 		}
822 822
 		return false;
@@ -874,12 +874,12 @@  discard block
 block discarded – undo
874 874
 		if (!$forceApplyAttributes) {
875 875
 			$isBackgroundJobModeAjax = $this->config
876 876
 					->getAppValue('core', 'backgroundjobs_mode', 'ajax') === 'ajax';
877
-			$listOfDNs = array_reduce($ldapRecords, function ($listOfDNs, $entry) {
877
+			$listOfDNs = array_reduce($ldapRecords, function($listOfDNs, $entry) {
878 878
 				$listOfDNs[] = $entry['dn'][0];
879 879
 				return $listOfDNs;
880 880
 			}, []);
881 881
 			$idsByDn = $this->userMapper->getListOfIdsByDn($listOfDNs);
882
-			$recordsToUpdate = array_filter($ldapRecords, function ($record) use ($isBackgroundJobModeAjax, $idsByDn) {
882
+			$recordsToUpdate = array_filter($ldapRecords, function($record) use ($isBackgroundJobModeAjax, $idsByDn) {
883 883
 				$newlyMapped = false;
884 884
 				$uid = $idsByDn[$record['dn'][0]] ?? null;
885 885
 				if ($uid === null) {
@@ -937,13 +937,13 @@  discard block
 block discarded – undo
937 937
 	public function fetchListOfGroups($filter, $attr, $limit = null, $offset = null) {
938 938
 		$groupRecords = $this->searchGroups($filter, $attr, $limit, $offset);
939 939
 
940
-		$listOfDNs = array_reduce($groupRecords, function ($listOfDNs, $entry) {
940
+		$listOfDNs = array_reduce($groupRecords, function($listOfDNs, $entry) {
941 941
 			$listOfDNs[] = $entry['dn'][0];
942 942
 			return $listOfDNs;
943 943
 		}, []);
944 944
 		$idsByDn = $this->groupMapper->getListOfIdsByDn($listOfDNs);
945 945
 
946
-		array_walk($groupRecords, function ($record) use ($idsByDn) {
946
+		array_walk($groupRecords, function($record) use ($idsByDn) {
947 947
 			$newlyMapped = false;
948 948
 			$gid = $uidsByDn[$record['dn'][0]] ?? null;
949 949
 			if ($gid === null) {
@@ -966,7 +966,7 @@  discard block
 block discarded – undo
966 966
 			if ($manyAttributes) {
967 967
 				return $list;
968 968
 			} else {
969
-				$list = array_reduce($list, function ($carry, $item) {
969
+				$list = array_reduce($list, function($carry, $item) {
970 970
 					$attribute = array_keys($item)[0];
971 971
 					$carry[] = $item[$attribute][0];
972 972
 					return $carry;
@@ -1002,7 +1002,7 @@  discard block
 block discarded – undo
1002 1002
 		$result = false;
1003 1003
 		foreach ($this->connection->ldapBaseUsers as $base) {
1004 1004
 			$count = $this->count($filter, [$base], $attr, $limit, $offset);
1005
-			$result = is_int($count) ? (int)$result + $count : $result;
1005
+			$result = is_int($count) ? (int) $result + $count : $result;
1006 1006
 		}
1007 1007
 		return $result;
1008 1008
 	}
@@ -1041,7 +1041,7 @@  discard block
 block discarded – undo
1041 1041
 		$result = false;
1042 1042
 		foreach ($this->connection->ldapBaseGroups as $base) {
1043 1043
 			$count = $this->count($filter, [$base], $attr, $limit, $offset);
1044
-			$result = is_int($count) ? (int)$result + $count : $result;
1044
+			$result = is_int($count) ? (int) $result + $count : $result;
1045 1045
 		}
1046 1046
 		return $result;
1047 1047
 	}
@@ -1058,7 +1058,7 @@  discard block
 block discarded – undo
1058 1058
 		$result = false;
1059 1059
 		foreach ($this->connection->ldapBase as $base) {
1060 1060
 			$count = $this->count('objectclass=*', [$base], ['dn'], $limit, $offset);
1061
-			$result = is_int($count) ? (int)$result + $count : $result;
1061
+			$result = is_int($count) ? (int) $result + $count : $result;
1062 1062
 		}
1063 1063
 		return $result;
1064 1064
 	}
@@ -1084,7 +1084,7 @@  discard block
 block discarded – undo
1084 1084
 		// php no longer supports call-time pass-by-reference
1085 1085
 		// thus cannot support controlPagedResultResponse as the third argument
1086 1086
 		// is a reference
1087
-		$doMethod = function () use ($command, &$arguments) {
1087
+		$doMethod = function() use ($command, &$arguments) {
1088 1088
 			if ($command == 'controlPagedResultResponse') {
1089 1089
 				throw new \InvalidArgumentException('Invoker does not support controlPagedResultResponse, call LDAP Wrapper directly instead.');
1090 1090
 			} else {
@@ -1143,13 +1143,13 @@  discard block
 block discarded – undo
1143 1143
 		}
1144 1144
 
1145 1145
 		//check whether paged search should be attempted
1146
-		$pagedSearchOK = $this->initPagedSearch($filter, $base, $attr, (int)$limit, (int)$offset);
1146
+		$pagedSearchOK = $this->initPagedSearch($filter, $base, $attr, (int) $limit, (int) $offset);
1147 1147
 
1148 1148
 		$sr = $this->invokeLDAPMethod('search', $cr, $base, $filter, $attr);
1149 1149
 		// cannot use $cr anymore, might have changed in the previous call!
1150 1150
 		$error = $this->ldap->errno($this->connection->getConnectionResource());
1151 1151
 		if (!$this->ldap->isResource($sr) || $error !== 0) {
1152
-			\OCP\Util::writeLog('user_ldap', 'Attempt for Paging?  ' . print_r($pagedSearchOK, true), ILogger::ERROR);
1152
+			\OCP\Util::writeLog('user_ldap', 'Attempt for Paging?  '.print_r($pagedSearchOK, true), ILogger::ERROR);
1153 1153
 			return false;
1154 1154
 		}
1155 1155
 
@@ -1193,7 +1193,7 @@  discard block
 block discarded – undo
1193 1193
 				$this->pagedSearchedSuccessful = true;
1194 1194
 			}
1195 1195
 		} else {
1196
-			if (!is_null($limit) && (int)$this->connection->ldapPagingSize !== 0) {
1196
+			if (!is_null($limit) && (int) $this->connection->ldapPagingSize !== 0) {
1197 1197
 				\OC::$server->getLogger()->debug(
1198 1198
 					'Paged search was not available',
1199 1199
 					['app' => 'user_ldap']
@@ -1239,7 +1239,7 @@  discard block
 block discarded – undo
1239 1239
 			$attr = [mb_strtolower($attr, 'UTF-8')];
1240 1240
 		}
1241 1241
 
1242
-		$limitPerPage = (int)$this->connection->ldapPagingSize;
1242
+		$limitPerPage = (int) $this->connection->ldapPagingSize;
1243 1243
 		if (!is_null($limit) && $limit < $limitPerPage && $limit > 0) {
1244 1244
 			$limitPerPage = $limit;
1245 1245
 		}
@@ -1281,7 +1281,7 @@  discard block
 block discarded – undo
1281 1281
 	 * @throws ServerNotAvailableException
1282 1282
 	 */
1283 1283
 	private function countEntriesInSearchResults($sr): int {
1284
-		return (int)$this->invokeLDAPMethod('countEntries', $this->connection->getConnectionResource(), $sr);
1284
+		return (int) $this->invokeLDAPMethod('countEntries', $this->connection->getConnectionResource(), $sr);
1285 1285
 	}
1286 1286
 
1287 1287
 	/**
@@ -1297,7 +1297,7 @@  discard block
 block discarded – undo
1297 1297
 		?int $offset = null,
1298 1298
 		bool $skipHandling = false
1299 1299
 	): array {
1300
-		$limitPerPage = (int)$this->connection->ldapPagingSize;
1300
+		$limitPerPage = (int) $this->connection->ldapPagingSize;
1301 1301
 		if (!is_null($limit) && $limit < $limitPerPage && $limit > 0) {
1302 1302
 			$limitPerPage = $limit;
1303 1303
 		}
@@ -1389,7 +1389,7 @@  discard block
 block discarded – undo
1389 1389
 				&& !is_null($limit)
1390 1390
 			)
1391 1391
 		) {
1392
-			$findings = array_slice($findings, (int)$offset, $limit);
1392
+			$findings = array_slice($findings, (int) $offset, $limit);
1393 1393
 		}
1394 1394
 		return $findings;
1395 1395
 	}
@@ -1441,7 +1441,7 @@  discard block
 block discarded – undo
1441 1441
 		}
1442 1442
 		$search = ['*', '\\', '(', ')'];
1443 1443
 		$replace = ['\\*', '\\\\', '\\(', '\\)'];
1444
-		return $asterisk . str_replace($search, $replace, $input);
1444
+		return $asterisk.str_replace($search, $replace, $input);
1445 1445
 	}
1446 1446
 
1447 1447
 	/**
@@ -1473,10 +1473,10 @@  discard block
 block discarded – undo
1473 1473
 	 * @return string the combined filter
1474 1474
 	 */
1475 1475
 	private function combineFilter($filters, $operator) {
1476
-		$combinedFilter = '(' . $operator;
1476
+		$combinedFilter = '('.$operator;
1477 1477
 		foreach ($filters as $filter) {
1478 1478
 			if ($filter !== '' && $filter[0] !== '(') {
1479
-				$filter = '(' . $filter . ')';
1479
+				$filter = '('.$filter.')';
1480 1480
 			}
1481 1481
 			$combinedFilter .= $filter;
1482 1482
 		}
@@ -1529,7 +1529,7 @@  discard block
 block discarded – undo
1529 1529
 			//every word needs to appear at least once
1530 1530
 			$wordMatchOneAttrFilters = [];
1531 1531
 			foreach ($searchAttributes as $attr) {
1532
-				$wordMatchOneAttrFilters[] = $attr . '=' . $word;
1532
+				$wordMatchOneAttrFilters[] = $attr.'='.$word;
1533 1533
 			}
1534 1534
 			$wordFilters[] = $this->combineFilterWithOr($wordMatchOneAttrFilters);
1535 1535
 		}
@@ -1561,14 +1561,14 @@  discard block
 block discarded – undo
1561 1561
 			if ($fallbackAttribute === '') {
1562 1562
 				return '';
1563 1563
 			}
1564
-			$filter[] = $fallbackAttribute . '=' . $search;
1564
+			$filter[] = $fallbackAttribute.'='.$search;
1565 1565
 		} else {
1566 1566
 			foreach ($searchAttributes as $attribute) {
1567
-				$filter[] = $attribute . '=' . $search;
1567
+				$filter[] = $attribute.'='.$search;
1568 1568
 			}
1569 1569
 		}
1570 1570
 		if (count($filter) === 1) {
1571
-			return '(' . $filter[0] . ')';
1571
+			return '('.$filter[0].')';
1572 1572
 		}
1573 1573
 		return $this->combineFilterWithOr($filter);
1574 1574
 	}
@@ -1589,7 +1589,7 @@  discard block
 block discarded – undo
1589 1589
 		if ($term === '') {
1590 1590
 			$result = '*';
1591 1591
 		} elseif ($allowEnum !== 'no') {
1592
-			$result = $term . '*';
1592
+			$result = $term.'*';
1593 1593
 		}
1594 1594
 		return $result;
1595 1595
 	}
@@ -1602,7 +1602,7 @@  discard block
 block discarded – undo
1602 1602
 	public function getFilterForUserCount() {
1603 1603
 		$filter = $this->combineFilterWithAnd([
1604 1604
 			$this->connection->ldapUserFilter,
1605
-			$this->connection->ldapUserDisplayName . '=*'
1605
+			$this->connection->ldapUserDisplayName.'=*'
1606 1606
 		]);
1607 1607
 
1608 1608
 		return $filter;
@@ -1668,7 +1668,7 @@  discard block
 block discarded – undo
1668 1668
 			$uuid = $this->formatGuid2ForFilterUser($uuid);
1669 1669
 		}
1670 1670
 
1671
-		$filter = $uuidAttr . '=' . $uuid;
1671
+		$filter = $uuidAttr.'='.$uuid;
1672 1672
 		$result = $this->searchUsers($filter, ['dn'], 2);
1673 1673
 		if (is_array($result) && isset($result[0]) && isset($result[0]['dn']) && count($result) === 1) {
1674 1674
 			// we put the count into account to make sure that this is
@@ -1798,8 +1798,8 @@  discard block
 block discarded – undo
1798 1798
 		for ($k = 1; $k <= 2; ++$k) {
1799 1799
 			$hex_guid_to_guid_str .= substr($hex_guid, 16 - 2 * $k, 2);
1800 1800
 		}
1801
-		$hex_guid_to_guid_str .= '-' . substr($hex_guid, 16, 4);
1802
-		$hex_guid_to_guid_str .= '-' . substr($hex_guid, 20);
1801
+		$hex_guid_to_guid_str .= '-'.substr($hex_guid, 16, 4);
1802
+		$hex_guid_to_guid_str .= '-'.substr($hex_guid, 20);
1803 1803
 
1804 1804
 		return strtoupper($hex_guid_to_guid_str);
1805 1805
 	}
@@ -1833,7 +1833,7 @@  discard block
 block discarded – undo
1833 1833
 			 * user. Instead we write a log message.
1834 1834
 			 */
1835 1835
 			\OC::$server->getLogger()->info(
1836
-				'Passed string does not resemble a valid GUID. Known UUID ' .
1836
+				'Passed string does not resemble a valid GUID. Known UUID '.
1837 1837
 				'({uuid}) probably does not match UUID configuration.',
1838 1838
 				['app' => 'user_ldap', 'uuid' => $guid]
1839 1839
 			);
@@ -1846,7 +1846,7 @@  discard block
 block discarded – undo
1846 1846
 		}
1847 1847
 		for ($i = 0; $i < 5; $i++) {
1848 1848
 			$pairs = str_split($blocks[$i], 2);
1849
-			$blocks[$i] = '\\' . implode('\\', $pairs);
1849
+			$blocks[$i] = '\\'.implode('\\', $pairs);
1850 1850
 		}
1851 1851
 		return implode('', $blocks);
1852 1852
 	}
@@ -1860,7 +1860,7 @@  discard block
 block discarded – undo
1860 1860
 	 */
1861 1861
 	public function getSID($dn) {
1862 1862
 		$domainDN = $this->getDomainDNFromDN($dn);
1863
-		$cacheKey = 'getSID-' . $domainDN;
1863
+		$cacheKey = 'getSID-'.$domainDN;
1864 1864
 		$sid = $this->connection->getFromCache($cacheKey);
1865 1865
 		if (!is_null($sid)) {
1866 1866
 			return $sid;
@@ -2053,7 +2053,7 @@  discard block
 block discarded – undo
2053 2053
 			$this->abandonPagedSearch();
2054 2054
 			// in case someone set it to 0 … use 500, otherwise no results will
2055 2055
 			// be returned.
2056
-			$pageSize = (int)$this->connection->ldapPagingSize > 0 ? (int)$this->connection->ldapPagingSize : 500;
2056
+			$pageSize = (int) $this->connection->ldapPagingSize > 0 ? (int) $this->connection->ldapPagingSize : 500;
2057 2057
 			$pagedSearchOK = $this->invokeLDAPMethod('controlPagedResult',
2058 2058
 				$this->connection->getConnectionResource(),
2059 2059
 				$pageSize, false);
Please login to merge, or discard this patch.