@@ -370,18 +370,18 @@ discard block |
||
370 | 370 | private function findFileWithExtension($class, $ext) |
371 | 371 | { |
372 | 372 | // PSR-4 lookup |
373 | - $logicalPathPsr4 = strtr($class, '\\', DIRECTORY_SEPARATOR) . $ext; |
|
373 | + $logicalPathPsr4 = strtr($class, '\\', DIRECTORY_SEPARATOR).$ext; |
|
374 | 374 | |
375 | 375 | $first = $class[0]; |
376 | 376 | if (isset($this->prefixLengthsPsr4[$first])) { |
377 | 377 | $subPath = $class; |
378 | 378 | while (false !== $lastPos = strrpos($subPath, '\\')) { |
379 | 379 | $subPath = substr($subPath, 0, $lastPos); |
380 | - $search = $subPath . '\\'; |
|
380 | + $search = $subPath.'\\'; |
|
381 | 381 | if (isset($this->prefixDirsPsr4[$search])) { |
382 | - $pathEnd = DIRECTORY_SEPARATOR . substr($logicalPathPsr4, $lastPos + 1); |
|
382 | + $pathEnd = DIRECTORY_SEPARATOR.substr($logicalPathPsr4, $lastPos + 1); |
|
383 | 383 | foreach ($this->prefixDirsPsr4[$search] as $dir) { |
384 | - if (file_exists($file = $dir . $pathEnd)) { |
|
384 | + if (file_exists($file = $dir.$pathEnd)) { |
|
385 | 385 | return $file; |
386 | 386 | } |
387 | 387 | } |
@@ -391,7 +391,7 @@ discard block |
||
391 | 391 | |
392 | 392 | // PSR-4 fallback dirs |
393 | 393 | foreach ($this->fallbackDirsPsr4 as $dir) { |
394 | - if (file_exists($file = $dir . DIRECTORY_SEPARATOR . $logicalPathPsr4)) { |
|
394 | + if (file_exists($file = $dir.DIRECTORY_SEPARATOR.$logicalPathPsr4)) { |
|
395 | 395 | return $file; |
396 | 396 | } |
397 | 397 | } |
@@ -403,14 +403,14 @@ discard block |
||
403 | 403 | . strtr(substr($logicalPathPsr4, $pos + 1), '_', DIRECTORY_SEPARATOR); |
404 | 404 | } else { |
405 | 405 | // PEAR-like class name |
406 | - $logicalPathPsr0 = strtr($class, '_', DIRECTORY_SEPARATOR) . $ext; |
|
406 | + $logicalPathPsr0 = strtr($class, '_', DIRECTORY_SEPARATOR).$ext; |
|
407 | 407 | } |
408 | 408 | |
409 | 409 | if (isset($this->prefixesPsr0[$first])) { |
410 | 410 | foreach ($this->prefixesPsr0[$first] as $prefix => $dirs) { |
411 | 411 | if (0 === strpos($class, $prefix)) { |
412 | 412 | foreach ($dirs as $dir) { |
413 | - if (file_exists($file = $dir . DIRECTORY_SEPARATOR . $logicalPathPsr0)) { |
|
413 | + if (file_exists($file = $dir.DIRECTORY_SEPARATOR.$logicalPathPsr0)) { |
|
414 | 414 | return $file; |
415 | 415 | } |
416 | 416 | } |
@@ -420,7 +420,7 @@ discard block |
||
420 | 420 | |
421 | 421 | // PSR-0 fallback dirs |
422 | 422 | foreach ($this->fallbackDirsPsr0 as $dir) { |
423 | - if (file_exists($file = $dir . DIRECTORY_SEPARATOR . $logicalPathPsr0)) { |
|
423 | + if (file_exists($file = $dir.DIRECTORY_SEPARATOR.$logicalPathPsr0)) { |
|
424 | 424 | return $file; |
425 | 425 | } |
426 | 426 | } |
@@ -8,6 +8,6 @@ |
||
8 | 8 | </p> |
9 | 9 | <br /> |
10 | 10 | <p> |
11 | - <?php print_unescaped($l->t('Further information how to configure this can be found in the %1$sdocumentation%2$s.', ['<a href="' . $_['docUrl'] . '" target="blank">', '</a>'])); ?> |
|
11 | + <?php print_unescaped($l->t('Further information how to configure this can be found in the %1$sdocumentation%2$s.', ['<a href="'.$_['docUrl'].'" target="blank">', '</a>'])); ?> |
|
12 | 12 | </p> |
13 | 13 | </div> |
@@ -98,10 +98,10 @@ |
||
98 | 98 | if (empty($state->getEnforcedGroups())) { |
99 | 99 | $message = 'Two-factor authentication is enforced for all users'; |
100 | 100 | } else { |
101 | - $message = 'Two-factor authentication is enforced for members of the group(s) ' . implode(', ', $state->getEnforcedGroups()); |
|
101 | + $message = 'Two-factor authentication is enforced for members of the group(s) '.implode(', ', $state->getEnforcedGroups()); |
|
102 | 102 | } |
103 | 103 | if (!empty($state->getExcludedGroups())) { |
104 | - $message .= ', except members of ' . implode(', ', $state->getExcludedGroups()); |
|
104 | + $message .= ', except members of '.implode(', ', $state->getExcludedGroups()); |
|
105 | 105 | } |
106 | 106 | $output->writeln($message); |
107 | 107 | } |
@@ -74,12 +74,12 @@ discard block |
||
74 | 74 | ], |
75 | 75 | [ |
76 | 76 | 'privilege' => '{DAV:}read', |
77 | - 'principal' => $this->getOwner() . '/calendar-proxy-read', |
|
77 | + 'principal' => $this->getOwner().'/calendar-proxy-read', |
|
78 | 78 | 'protected' => true, |
79 | 79 | ], |
80 | 80 | [ |
81 | 81 | 'privilege' => '{DAV:}read', |
82 | - 'principal' => $this->getOwner() . '/calendar-proxy-write', |
|
82 | + 'principal' => $this->getOwner().'/calendar-proxy-write', |
|
83 | 83 | 'protected' => true, |
84 | 84 | ], |
85 | 85 | ]; |
@@ -94,23 +94,23 @@ discard block |
||
94 | 94 | if ($this->disableFreeBusy) { |
95 | 95 | return array_merge($commonAcl, [ |
96 | 96 | [ |
97 | - 'privilege' => '{' . CalDAVPlugin::NS_CALDAV . '}schedule-send-invite', |
|
97 | + 'privilege' => '{'.CalDAVPlugin::NS_CALDAV.'}schedule-send-invite', |
|
98 | 98 | 'principal' => $this->getOwner(), |
99 | 99 | 'protected' => true, |
100 | 100 | ], |
101 | 101 | [ |
102 | - 'privilege' => '{' . CalDAVPlugin::NS_CALDAV . '}schedule-send-invite', |
|
103 | - 'principal' => $this->getOwner() . '/calendar-proxy-write', |
|
102 | + 'privilege' => '{'.CalDAVPlugin::NS_CALDAV.'}schedule-send-invite', |
|
103 | + 'principal' => $this->getOwner().'/calendar-proxy-write', |
|
104 | 104 | 'protected' => true, |
105 | 105 | ], |
106 | 106 | [ |
107 | - 'privilege' => '{' . CalDAVPlugin::NS_CALDAV . '}schedule-send-reply', |
|
107 | + 'privilege' => '{'.CalDAVPlugin::NS_CALDAV.'}schedule-send-reply', |
|
108 | 108 | 'principal' => $this->getOwner(), |
109 | 109 | 'protected' => true, |
110 | 110 | ], |
111 | 111 | [ |
112 | - 'privilege' => '{' . CalDAVPlugin::NS_CALDAV . '}schedule-send-reply', |
|
113 | - 'principal' => $this->getOwner() . '/calendar-proxy-write', |
|
112 | + 'privilege' => '{'.CalDAVPlugin::NS_CALDAV.'}schedule-send-reply', |
|
113 | + 'principal' => $this->getOwner().'/calendar-proxy-write', |
|
114 | 114 | 'protected' => true, |
115 | 115 | ], |
116 | 116 | ]); |
@@ -118,13 +118,13 @@ discard block |
||
118 | 118 | |
119 | 119 | return array_merge($commonAcl, [ |
120 | 120 | [ |
121 | - 'privilege' => '{' . CalDAVPlugin::NS_CALDAV . '}schedule-send', |
|
121 | + 'privilege' => '{'.CalDAVPlugin::NS_CALDAV.'}schedule-send', |
|
122 | 122 | 'principal' => $this->getOwner(), |
123 | 123 | 'protected' => true, |
124 | 124 | ], |
125 | 125 | [ |
126 | - 'privilege' => '{' . CalDAVPlugin::NS_CALDAV . '}schedule-send', |
|
127 | - 'principal' => $this->getOwner() . '/calendar-proxy-write', |
|
126 | + 'privilege' => '{'.CalDAVPlugin::NS_CALDAV.'}schedule-send', |
|
127 | + 'principal' => $this->getOwner().'/calendar-proxy-write', |
|
128 | 128 | 'protected' => true, |
129 | 129 | ], |
130 | 130 | ]); |
@@ -67,7 +67,7 @@ |
||
67 | 67 | public function getChildren(): array { |
68 | 68 | $entries = $this->trashManager->listTrashRoot($this->user); |
69 | 69 | |
70 | - $children = array_map(function (ITrashItem $entry) { |
|
70 | + $children = array_map(function(ITrashItem $entry) { |
|
71 | 71 | if ($entry->getType() === FileInfo::TYPE_FOLDER) { |
72 | 72 | return new TrashFolder($this->trashManager, $entry); |
73 | 73 | } |
@@ -32,7 +32,7 @@ |
||
32 | 32 | public function getChildren(): array { |
33 | 33 | $entries = $this->trashManager->listTrashFolder($this->data); |
34 | 34 | |
35 | - $children = array_map(function (ITrashItem $entry) { |
|
35 | + $children = array_map(function(ITrashItem $entry) { |
|
36 | 36 | if ($entry->getType() === FileInfo::TYPE_FOLDER) { |
37 | 37 | return new TrashFolderFolder($this->trashManager, $entry); |
38 | 38 | } |
@@ -78,7 +78,7 @@ discard block |
||
78 | 78 | public function getChildren(): array { |
79 | 79 | $versions = $this->versionManager->getVersionsForFile($this->user, $this->file); |
80 | 80 | |
81 | - return array_map(function (IVersion $version) { |
|
81 | + return array_map(function(IVersion $version) { |
|
82 | 82 | return new VersionFile($version, $this->versionManager); |
83 | 83 | }, $versions); |
84 | 84 | } |
@@ -97,7 +97,7 @@ discard block |
||
97 | 97 | } |
98 | 98 | |
99 | 99 | public function getName(): string { |
100 | - return (string)$this->file->getId(); |
|
100 | + return (string) $this->file->getId(); |
|
101 | 101 | } |
102 | 102 | |
103 | 103 | public function setName($name) { |
@@ -89,8 +89,8 @@ |
||
89 | 89 | 'displayName' => $user->getDisplayName(), |
90 | 90 | 'uid' => $user->getUID(), |
91 | 91 | 'dn' => $user->getDN(), |
92 | - 'lastLogin' => $this->formatDate($user->getLastLogin(), '-', (bool)$input->getOption('short-date')), |
|
93 | - 'detectedOn' => $this->formatDate($user->getDetectedOn(), 'unknown', (bool)$input->getOption('short-date')), |
|
92 | + 'lastLogin' => $this->formatDate($user->getLastLogin(), '-', (bool) $input->getOption('short-date')), |
|
93 | + 'detectedOn' => $this->formatDate($user->getDetectedOn(), 'unknown', (bool) $input->getOption('short-date')), |
|
94 | 94 | 'homePath' => $user->getHomePath(), |
95 | 95 | 'sharer' => $user->getHasActiveShares() ? 'Y' : 'N', |
96 | 96 | ]; |
@@ -51,7 +51,7 @@ discard block |
||
51 | 51 | |
52 | 52 | |
53 | 53 | public function setName($name) { |
54 | - throw new Forbidden('Renaming ' . self::FILENAME . ' is forbidden'); |
|
54 | + throw new Forbidden('Renaming '.self::FILENAME.' is forbidden'); |
|
55 | 55 | } |
56 | 56 | |
57 | 57 | /** |
@@ -65,7 +65,7 @@ discard block |
||
65 | 65 | * @throws Forbidden |
66 | 66 | */ |
67 | 67 | public function delete() { |
68 | - throw new Forbidden(self::FILENAME . ' may not be deleted.'); |
|
68 | + throw new Forbidden(self::FILENAME.' may not be deleted.'); |
|
69 | 69 | } |
70 | 70 | |
71 | 71 | /** |
@@ -86,6 +86,6 @@ discard block |
||
86 | 86 | * @throws Forbidden |
87 | 87 | */ |
88 | 88 | public function propPatch(PropPatch $propPatch) { |
89 | - throw new Forbidden(self::FILENAME . '\'s properties may not be altered.'); |
|
89 | + throw new Forbidden(self::FILENAME.'\'s properties may not be altered.'); |
|
90 | 90 | } |
91 | 91 | } |