@@ -199,7 +199,7 @@ discard block |
||
199 | 199 | $this->abandonPagedSearch(); |
200 | 200 | // openLDAP requires that we init a new Paged Search. Not needed by AD, |
201 | 201 | // but does not hurt either. |
202 | - $pagingSize = (int)$this->connection->ldapPagingSize; |
|
202 | + $pagingSize = (int) $this->connection->ldapPagingSize; |
|
203 | 203 | // 0 won't result in replies, small numbers may leave out groups |
204 | 204 | // (cf. #12306), 500 is default for paging and should work everywhere. |
205 | 205 | $maxResults = $pagingSize > 20 ? $pagingSize : 500; |
@@ -240,13 +240,13 @@ discard block |
||
240 | 240 | return $values; |
241 | 241 | } else { |
242 | 242 | $low = $result['rangeHigh'] + 1; |
243 | - $attrToRead = $result['attributeName'] . ';range=' . $low . '-*'; |
|
243 | + $attrToRead = $result['attributeName'].';range='.$low.'-*'; |
|
244 | 244 | $isRangeRequest = true; |
245 | 245 | } |
246 | 246 | } |
247 | 247 | } while ($isRangeRequest); |
248 | 248 | |
249 | - \OCP\Util::writeLog('user_ldap', 'Requested attribute ' . $attr . ' not found for ' . $dn, ILogger::DEBUG); |
|
249 | + \OCP\Util::writeLog('user_ldap', 'Requested attribute '.$attr.' not found for '.$dn, ILogger::DEBUG); |
|
250 | 250 | return false; |
251 | 251 | } |
252 | 252 | |
@@ -270,13 +270,13 @@ discard block |
||
270 | 270 | if (!$this->ldap->isResource($rr)) { |
271 | 271 | if ($attribute !== '') { |
272 | 272 | //do not throw this message on userExists check, irritates |
273 | - \OCP\Util::writeLog('user_ldap', 'readAttribute failed for DN ' . $dn, ILogger::DEBUG); |
|
273 | + \OCP\Util::writeLog('user_ldap', 'readAttribute failed for DN '.$dn, ILogger::DEBUG); |
|
274 | 274 | } |
275 | 275 | //in case an error occurs , e.g. object does not exist |
276 | 276 | return false; |
277 | 277 | } |
278 | 278 | if ($attribute === '' && ($filter === 'objectclass=*' || $this->invokeLDAPMethod('countEntries', $cr, $rr) === 1)) { |
279 | - \OCP\Util::writeLog('user_ldap', 'readAttribute: ' . $dn . ' found', ILogger::DEBUG); |
|
279 | + \OCP\Util::writeLog('user_ldap', 'readAttribute: '.$dn.' found', ILogger::DEBUG); |
|
280 | 280 | return true; |
281 | 281 | } |
282 | 282 | $er = $this->invokeLDAPMethod('firstEntry', $cr, $rr); |
@@ -356,7 +356,7 @@ discard block |
||
356 | 356 | * @throws \Exception |
357 | 357 | */ |
358 | 358 | public function setPassword($userDN, $password) { |
359 | - if ((int)$this->connection->turnOnPasswordChange !== 1) { |
|
359 | + if ((int) $this->connection->turnOnPasswordChange !== 1) { |
|
360 | 360 | throw new \Exception('LDAP password changes are disabled.'); |
361 | 361 | } |
362 | 362 | $cr = $this->connection->getConnectionResource(); |
@@ -370,7 +370,7 @@ discard block |
||
370 | 370 | return @$this->invokeLDAPMethod('exopPasswd', $cr, $userDN, '', $password) || |
371 | 371 | @$this->invokeLDAPMethod('modReplace', $cr, $userDN, $password); |
372 | 372 | } catch (ConstraintViolationException $e) { |
373 | - throw new HintException('Password change rejected.', \OC::$server->getL10N('user_ldap')->t('Password change rejected. Hint: ') . $e->getMessage(), $e->getCode()); |
|
373 | + throw new HintException('Password change rejected.', \OC::$server->getL10N('user_ldap')->t('Password change rejected. Hint: ').$e->getMessage(), $e->getCode()); |
|
374 | 374 | } |
375 | 375 | } |
376 | 376 | |
@@ -536,21 +536,21 @@ discard block |
||
536 | 536 | } |
537 | 537 | } else { |
538 | 538 | //If the UUID can't be detected something is foul. |
539 | - \OCP\Util::writeLog('user_ldap', 'Cannot determine UUID for ' . $fdn . '. Skipping.', ILogger::INFO); |
|
539 | + \OCP\Util::writeLog('user_ldap', 'Cannot determine UUID for '.$fdn.'. Skipping.', ILogger::INFO); |
|
540 | 540 | return false; |
541 | 541 | } |
542 | 542 | |
543 | 543 | if (is_null($ldapName)) { |
544 | 544 | $ldapName = $this->readAttribute($fdn, $nameAttribute, $filter); |
545 | 545 | if (!isset($ldapName[0]) && empty($ldapName[0])) { |
546 | - \OCP\Util::writeLog('user_ldap', 'No or empty name for ' . $fdn . ' with filter ' . $filter . '.', ILogger::DEBUG); |
|
546 | + \OCP\Util::writeLog('user_ldap', 'No or empty name for '.$fdn.' with filter '.$filter.'.', ILogger::DEBUG); |
|
547 | 547 | return false; |
548 | 548 | } |
549 | 549 | $ldapName = $ldapName[0]; |
550 | 550 | } |
551 | 551 | |
552 | 552 | if ($isUser) { |
553 | - $usernameAttribute = (string)$this->connection->ldapExpertUsernameAttr; |
|
553 | + $usernameAttribute = (string) $this->connection->ldapExpertUsernameAttr; |
|
554 | 554 | if ($usernameAttribute !== '') { |
555 | 555 | $username = $this->readAttribute($fdn, $usernameAttribute); |
556 | 556 | $username = $username[0]; |
@@ -602,7 +602,7 @@ discard block |
||
602 | 602 | } |
603 | 603 | |
604 | 604 | //if everything else did not help.. |
605 | - \OCP\Util::writeLog('user_ldap', 'Could not create unique name for ' . $fdn . '.', ILogger::INFO); |
|
605 | + \OCP\Util::writeLog('user_ldap', 'Could not create unique name for '.$fdn.'.', ILogger::INFO); |
|
606 | 606 | return false; |
607 | 607 | } |
608 | 608 | |
@@ -717,7 +717,7 @@ discard block |
||
717 | 717 | * @param string|false $home the home directory path |
718 | 718 | */ |
719 | 719 | public function cacheUserHome($ocName, $home) { |
720 | - $cacheKey = 'getHome' . $ocName; |
|
720 | + $cacheKey = 'getHome'.$ocName; |
|
721 | 721 | $this->connection->writeToCache($cacheKey, $home); |
722 | 722 | } |
723 | 723 | |
@@ -727,14 +727,14 @@ discard block |
||
727 | 727 | * @param string $ocName the internal Nextcloud username |
728 | 728 | */ |
729 | 729 | public function cacheUserExists($ocName) { |
730 | - $this->connection->writeToCache('userExists' . $ocName, true); |
|
730 | + $this->connection->writeToCache('userExists'.$ocName, true); |
|
731 | 731 | } |
732 | 732 | |
733 | 733 | /** |
734 | 734 | * caches a group as existing |
735 | 735 | */ |
736 | 736 | public function cacheGroupExists(string $gid): void { |
737 | - $this->connection->writeToCache('groupExists' . $gid, true); |
|
737 | + $this->connection->writeToCache('groupExists'.$gid, true); |
|
738 | 738 | } |
739 | 739 | |
740 | 740 | /** |
@@ -752,11 +752,11 @@ discard block |
||
752 | 752 | } |
753 | 753 | $displayName = $user->composeAndStoreDisplayName($displayName, $displayName2); |
754 | 754 | $cacheKeyTrunk = 'getDisplayName'; |
755 | - $this->connection->writeToCache($cacheKeyTrunk . $ocName, $displayName); |
|
755 | + $this->connection->writeToCache($cacheKeyTrunk.$ocName, $displayName); |
|
756 | 756 | } |
757 | 757 | |
758 | 758 | public function cacheGroupDisplayName(string $ncName, string $displayName): void { |
759 | - $cacheKey = 'group_getDisplayName' . $ncName; |
|
759 | + $cacheKey = 'group_getDisplayName'.$ncName; |
|
760 | 760 | $this->connection->writeToCache($cacheKey, $displayName); |
761 | 761 | } |
762 | 762 | |
@@ -774,7 +774,7 @@ discard block |
||
774 | 774 | //while loop is just a precaution. If a name is not generated within |
775 | 775 | //20 attempts, something else is very wrong. Avoids infinite loop. |
776 | 776 | while ($attempts < 20) { |
777 | - $altName = $name . '_' . rand(1000, 9999); |
|
777 | + $altName = $name.'_'.rand(1000, 9999); |
|
778 | 778 | if (!$this->ncUserManager->userExists($altName)) { |
779 | 779 | return $altName; |
780 | 780 | } |
@@ -803,9 +803,9 @@ discard block |
||
803 | 803 | } else { |
804 | 804 | natsort($usedNames); |
805 | 805 | $lastName = array_pop($usedNames); |
806 | - $lastNo = (int)substr($lastName, strrpos($lastName, '_') + 1); |
|
806 | + $lastNo = (int) substr($lastName, strrpos($lastName, '_') + 1); |
|
807 | 807 | } |
808 | - $altName = $name . '_' . (string)($lastNo + 1); |
|
808 | + $altName = $name.'_'.(string) ($lastNo + 1); |
|
809 | 809 | unset($usedNames); |
810 | 810 | |
811 | 811 | $attempts = 1; |
@@ -816,7 +816,7 @@ discard block |
||
816 | 816 | if (!\OC::$server->getGroupManager()->groupExists($altName)) { |
817 | 817 | return $altName; |
818 | 818 | } |
819 | - $altName = $name . '_' . ($lastNo + $attempts); |
|
819 | + $altName = $name.'_'.($lastNo + $attempts); |
|
820 | 820 | $attempts++; |
821 | 821 | } |
822 | 822 | return false; |
@@ -874,12 +874,12 @@ discard block |
||
874 | 874 | if (!$forceApplyAttributes) { |
875 | 875 | $isBackgroundJobModeAjax = $this->config |
876 | 876 | ->getAppValue('core', 'backgroundjobs_mode', 'ajax') === 'ajax'; |
877 | - $listOfDNs = array_reduce($ldapRecords, function ($listOfDNs, $entry) { |
|
877 | + $listOfDNs = array_reduce($ldapRecords, function($listOfDNs, $entry) { |
|
878 | 878 | $listOfDNs[] = $entry['dn'][0]; |
879 | 879 | return $listOfDNs; |
880 | 880 | }, []); |
881 | 881 | $idsByDn = $this->userMapper->getListOfIdsByDn($listOfDNs); |
882 | - $recordsToUpdate = array_filter($ldapRecords, function ($record) use ($isBackgroundJobModeAjax, $idsByDn) { |
|
882 | + $recordsToUpdate = array_filter($ldapRecords, function($record) use ($isBackgroundJobModeAjax, $idsByDn) { |
|
883 | 883 | $newlyMapped = false; |
884 | 884 | $uid = $idsByDn[$record['dn'][0]] ?? null; |
885 | 885 | if ($uid === null) { |
@@ -937,13 +937,13 @@ discard block |
||
937 | 937 | public function fetchListOfGroups($filter, $attr, $limit = null, $offset = null) { |
938 | 938 | $groupRecords = $this->searchGroups($filter, $attr, $limit, $offset); |
939 | 939 | |
940 | - $listOfDNs = array_reduce($groupRecords, function ($listOfDNs, $entry) { |
|
940 | + $listOfDNs = array_reduce($groupRecords, function($listOfDNs, $entry) { |
|
941 | 941 | $listOfDNs[] = $entry['dn'][0]; |
942 | 942 | return $listOfDNs; |
943 | 943 | }, []); |
944 | 944 | $idsByDn = $this->groupMapper->getListOfIdsByDn($listOfDNs); |
945 | 945 | |
946 | - array_walk($groupRecords, function ($record) use ($idsByDn) { |
|
946 | + array_walk($groupRecords, function($record) use ($idsByDn) { |
|
947 | 947 | $newlyMapped = false; |
948 | 948 | $gid = $uidsByDn[$record['dn'][0]] ?? null; |
949 | 949 | if ($gid === null) { |
@@ -966,7 +966,7 @@ discard block |
||
966 | 966 | if ($manyAttributes) { |
967 | 967 | return $list; |
968 | 968 | } else { |
969 | - $list = array_reduce($list, function ($carry, $item) { |
|
969 | + $list = array_reduce($list, function($carry, $item) { |
|
970 | 970 | $attribute = array_keys($item)[0]; |
971 | 971 | $carry[] = $item[$attribute][0]; |
972 | 972 | return $carry; |
@@ -1002,7 +1002,7 @@ discard block |
||
1002 | 1002 | $result = false; |
1003 | 1003 | foreach ($this->connection->ldapBaseUsers as $base) { |
1004 | 1004 | $count = $this->count($filter, [$base], $attr, $limit, $offset); |
1005 | - $result = is_int($count) ? (int)$result + $count : $result; |
|
1005 | + $result = is_int($count) ? (int) $result + $count : $result; |
|
1006 | 1006 | } |
1007 | 1007 | return $result; |
1008 | 1008 | } |
@@ -1041,7 +1041,7 @@ discard block |
||
1041 | 1041 | $result = false; |
1042 | 1042 | foreach ($this->connection->ldapBaseGroups as $base) { |
1043 | 1043 | $count = $this->count($filter, [$base], $attr, $limit, $offset); |
1044 | - $result = is_int($count) ? (int)$result + $count : $result; |
|
1044 | + $result = is_int($count) ? (int) $result + $count : $result; |
|
1045 | 1045 | } |
1046 | 1046 | return $result; |
1047 | 1047 | } |
@@ -1058,7 +1058,7 @@ discard block |
||
1058 | 1058 | $result = false; |
1059 | 1059 | foreach ($this->connection->ldapBase as $base) { |
1060 | 1060 | $count = $this->count('objectclass=*', [$base], ['dn'], $limit, $offset); |
1061 | - $result = is_int($count) ? (int)$result + $count : $result; |
|
1061 | + $result = is_int($count) ? (int) $result + $count : $result; |
|
1062 | 1062 | } |
1063 | 1063 | return $result; |
1064 | 1064 | } |
@@ -1084,7 +1084,7 @@ discard block |
||
1084 | 1084 | // php no longer supports call-time pass-by-reference |
1085 | 1085 | // thus cannot support controlPagedResultResponse as the third argument |
1086 | 1086 | // is a reference |
1087 | - $doMethod = function () use ($command, &$arguments) { |
|
1087 | + $doMethod = function() use ($command, &$arguments) { |
|
1088 | 1088 | if ($command == 'controlPagedResultResponse') { |
1089 | 1089 | throw new \InvalidArgumentException('Invoker does not support controlPagedResultResponse, call LDAP Wrapper directly instead.'); |
1090 | 1090 | } else { |
@@ -1143,13 +1143,13 @@ discard block |
||
1143 | 1143 | } |
1144 | 1144 | |
1145 | 1145 | //check whether paged search should be attempted |
1146 | - $pagedSearchOK = $this->initPagedSearch($filter, $base, $attr, (int)$limit, (int)$offset); |
|
1146 | + $pagedSearchOK = $this->initPagedSearch($filter, $base, $attr, (int) $limit, (int) $offset); |
|
1147 | 1147 | |
1148 | 1148 | $sr = $this->invokeLDAPMethod('search', $cr, $base, $filter, $attr); |
1149 | 1149 | // cannot use $cr anymore, might have changed in the previous call! |
1150 | 1150 | $error = $this->ldap->errno($this->connection->getConnectionResource()); |
1151 | 1151 | if (!$this->ldap->isResource($sr) || $error !== 0) { |
1152 | - \OCP\Util::writeLog('user_ldap', 'Attempt for Paging? ' . print_r($pagedSearchOK, true), ILogger::ERROR); |
|
1152 | + \OCP\Util::writeLog('user_ldap', 'Attempt for Paging? '.print_r($pagedSearchOK, true), ILogger::ERROR); |
|
1153 | 1153 | return false; |
1154 | 1154 | } |
1155 | 1155 | |
@@ -1193,7 +1193,7 @@ discard block |
||
1193 | 1193 | $this->pagedSearchedSuccessful = true; |
1194 | 1194 | } |
1195 | 1195 | } else { |
1196 | - if (!is_null($limit) && (int)$this->connection->ldapPagingSize !== 0) { |
|
1196 | + if (!is_null($limit) && (int) $this->connection->ldapPagingSize !== 0) { |
|
1197 | 1197 | \OC::$server->getLogger()->debug( |
1198 | 1198 | 'Paged search was not available', |
1199 | 1199 | ['app' => 'user_ldap'] |
@@ -1239,7 +1239,7 @@ discard block |
||
1239 | 1239 | $attr = [mb_strtolower($attr, 'UTF-8')]; |
1240 | 1240 | } |
1241 | 1241 | |
1242 | - $limitPerPage = (int)$this->connection->ldapPagingSize; |
|
1242 | + $limitPerPage = (int) $this->connection->ldapPagingSize; |
|
1243 | 1243 | if (!is_null($limit) && $limit < $limitPerPage && $limit > 0) { |
1244 | 1244 | $limitPerPage = $limit; |
1245 | 1245 | } |
@@ -1281,7 +1281,7 @@ discard block |
||
1281 | 1281 | * @throws ServerNotAvailableException |
1282 | 1282 | */ |
1283 | 1283 | private function countEntriesInSearchResults($sr): int { |
1284 | - return (int)$this->invokeLDAPMethod('countEntries', $this->connection->getConnectionResource(), $sr); |
|
1284 | + return (int) $this->invokeLDAPMethod('countEntries', $this->connection->getConnectionResource(), $sr); |
|
1285 | 1285 | } |
1286 | 1286 | |
1287 | 1287 | /** |
@@ -1297,7 +1297,7 @@ discard block |
||
1297 | 1297 | ?int $offset = null, |
1298 | 1298 | bool $skipHandling = false |
1299 | 1299 | ): array { |
1300 | - $limitPerPage = (int)$this->connection->ldapPagingSize; |
|
1300 | + $limitPerPage = (int) $this->connection->ldapPagingSize; |
|
1301 | 1301 | if (!is_null($limit) && $limit < $limitPerPage && $limit > 0) { |
1302 | 1302 | $limitPerPage = $limit; |
1303 | 1303 | } |
@@ -1389,7 +1389,7 @@ discard block |
||
1389 | 1389 | && !is_null($limit) |
1390 | 1390 | ) |
1391 | 1391 | ) { |
1392 | - $findings = array_slice($findings, (int)$offset, $limit); |
|
1392 | + $findings = array_slice($findings, (int) $offset, $limit); |
|
1393 | 1393 | } |
1394 | 1394 | return $findings; |
1395 | 1395 | } |
@@ -1441,7 +1441,7 @@ discard block |
||
1441 | 1441 | } |
1442 | 1442 | $search = ['*', '\\', '(', ')']; |
1443 | 1443 | $replace = ['\\*', '\\\\', '\\(', '\\)']; |
1444 | - return $asterisk . str_replace($search, $replace, $input); |
|
1444 | + return $asterisk.str_replace($search, $replace, $input); |
|
1445 | 1445 | } |
1446 | 1446 | |
1447 | 1447 | /** |
@@ -1473,10 +1473,10 @@ discard block |
||
1473 | 1473 | * @return string the combined filter |
1474 | 1474 | */ |
1475 | 1475 | private function combineFilter($filters, $operator) { |
1476 | - $combinedFilter = '(' . $operator; |
|
1476 | + $combinedFilter = '('.$operator; |
|
1477 | 1477 | foreach ($filters as $filter) { |
1478 | 1478 | if ($filter !== '' && $filter[0] !== '(') { |
1479 | - $filter = '(' . $filter . ')'; |
|
1479 | + $filter = '('.$filter.')'; |
|
1480 | 1480 | } |
1481 | 1481 | $combinedFilter .= $filter; |
1482 | 1482 | } |
@@ -1529,7 +1529,7 @@ discard block |
||
1529 | 1529 | //every word needs to appear at least once |
1530 | 1530 | $wordMatchOneAttrFilters = []; |
1531 | 1531 | foreach ($searchAttributes as $attr) { |
1532 | - $wordMatchOneAttrFilters[] = $attr . '=' . $word; |
|
1532 | + $wordMatchOneAttrFilters[] = $attr.'='.$word; |
|
1533 | 1533 | } |
1534 | 1534 | $wordFilters[] = $this->combineFilterWithOr($wordMatchOneAttrFilters); |
1535 | 1535 | } |
@@ -1561,14 +1561,14 @@ discard block |
||
1561 | 1561 | if ($fallbackAttribute === '') { |
1562 | 1562 | return ''; |
1563 | 1563 | } |
1564 | - $filter[] = $fallbackAttribute . '=' . $search; |
|
1564 | + $filter[] = $fallbackAttribute.'='.$search; |
|
1565 | 1565 | } else { |
1566 | 1566 | foreach ($searchAttributes as $attribute) { |
1567 | - $filter[] = $attribute . '=' . $search; |
|
1567 | + $filter[] = $attribute.'='.$search; |
|
1568 | 1568 | } |
1569 | 1569 | } |
1570 | 1570 | if (count($filter) === 1) { |
1571 | - return '(' . $filter[0] . ')'; |
|
1571 | + return '('.$filter[0].')'; |
|
1572 | 1572 | } |
1573 | 1573 | return $this->combineFilterWithOr($filter); |
1574 | 1574 | } |
@@ -1589,7 +1589,7 @@ discard block |
||
1589 | 1589 | if ($term === '') { |
1590 | 1590 | $result = '*'; |
1591 | 1591 | } elseif ($allowEnum !== 'no') { |
1592 | - $result = $term . '*'; |
|
1592 | + $result = $term.'*'; |
|
1593 | 1593 | } |
1594 | 1594 | return $result; |
1595 | 1595 | } |
@@ -1602,7 +1602,7 @@ discard block |
||
1602 | 1602 | public function getFilterForUserCount() { |
1603 | 1603 | $filter = $this->combineFilterWithAnd([ |
1604 | 1604 | $this->connection->ldapUserFilter, |
1605 | - $this->connection->ldapUserDisplayName . '=*' |
|
1605 | + $this->connection->ldapUserDisplayName.'=*' |
|
1606 | 1606 | ]); |
1607 | 1607 | |
1608 | 1608 | return $filter; |
@@ -1668,7 +1668,7 @@ discard block |
||
1668 | 1668 | $uuid = $this->formatGuid2ForFilterUser($uuid); |
1669 | 1669 | } |
1670 | 1670 | |
1671 | - $filter = $uuidAttr . '=' . $uuid; |
|
1671 | + $filter = $uuidAttr.'='.$uuid; |
|
1672 | 1672 | $result = $this->searchUsers($filter, ['dn'], 2); |
1673 | 1673 | if (is_array($result) && isset($result[0]) && isset($result[0]['dn']) && count($result) === 1) { |
1674 | 1674 | // we put the count into account to make sure that this is |
@@ -1798,8 +1798,8 @@ discard block |
||
1798 | 1798 | for ($k = 1; $k <= 2; ++$k) { |
1799 | 1799 | $hex_guid_to_guid_str .= substr($hex_guid, 16 - 2 * $k, 2); |
1800 | 1800 | } |
1801 | - $hex_guid_to_guid_str .= '-' . substr($hex_guid, 16, 4); |
|
1802 | - $hex_guid_to_guid_str .= '-' . substr($hex_guid, 20); |
|
1801 | + $hex_guid_to_guid_str .= '-'.substr($hex_guid, 16, 4); |
|
1802 | + $hex_guid_to_guid_str .= '-'.substr($hex_guid, 20); |
|
1803 | 1803 | |
1804 | 1804 | return strtoupper($hex_guid_to_guid_str); |
1805 | 1805 | } |
@@ -1833,7 +1833,7 @@ discard block |
||
1833 | 1833 | * user. Instead we write a log message. |
1834 | 1834 | */ |
1835 | 1835 | \OC::$server->getLogger()->info( |
1836 | - 'Passed string does not resemble a valid GUID. Known UUID ' . |
|
1836 | + 'Passed string does not resemble a valid GUID. Known UUID '. |
|
1837 | 1837 | '({uuid}) probably does not match UUID configuration.', |
1838 | 1838 | ['app' => 'user_ldap', 'uuid' => $guid] |
1839 | 1839 | ); |
@@ -1846,7 +1846,7 @@ discard block |
||
1846 | 1846 | } |
1847 | 1847 | for ($i = 0; $i < 5; $i++) { |
1848 | 1848 | $pairs = str_split($blocks[$i], 2); |
1849 | - $blocks[$i] = '\\' . implode('\\', $pairs); |
|
1849 | + $blocks[$i] = '\\'.implode('\\', $pairs); |
|
1850 | 1850 | } |
1851 | 1851 | return implode('', $blocks); |
1852 | 1852 | } |
@@ -1860,7 +1860,7 @@ discard block |
||
1860 | 1860 | */ |
1861 | 1861 | public function getSID($dn) { |
1862 | 1862 | $domainDN = $this->getDomainDNFromDN($dn); |
1863 | - $cacheKey = 'getSID-' . $domainDN; |
|
1863 | + $cacheKey = 'getSID-'.$domainDN; |
|
1864 | 1864 | $sid = $this->connection->getFromCache($cacheKey); |
1865 | 1865 | if (!is_null($sid)) { |
1866 | 1866 | return $sid; |
@@ -2053,7 +2053,7 @@ discard block |
||
2053 | 2053 | $this->abandonPagedSearch(); |
2054 | 2054 | // in case someone set it to 0 … use 500, otherwise no results will |
2055 | 2055 | // be returned. |
2056 | - $pageSize = (int)$this->connection->ldapPagingSize > 0 ? (int)$this->connection->ldapPagingSize : 500; |
|
2056 | + $pageSize = (int) $this->connection->ldapPagingSize > 0 ? (int) $this->connection->ldapPagingSize : 500; |
|
2057 | 2057 | $pagedSearchOK = $this->invokeLDAPMethod('controlPagedResult', |
2058 | 2058 | $this->connection->getConnectionResource(), |
2059 | 2059 | $pageSize, false); |