@@ -51,7 +51,7 @@ discard block |
||
51 | 51 | /** @var bool */ |
52 | 52 | private $canPurgeToSaveSpace; |
53 | 53 | |
54 | - public function __construct(IConfig $config,ITimeFactory $timeFactory) { |
|
54 | + public function __construct(IConfig $config, ITimeFactory $timeFactory) { |
|
55 | 55 | $this->timeFactory = $timeFactory; |
56 | 56 | $this->setRetentionObligation($config->getSystemValue('trashbin_retention_obligation', 'auto')); |
57 | 57 | } |
@@ -150,13 +150,13 @@ discard block |
||
150 | 150 | $this->canPurgeToSaveSpace = true; |
151 | 151 | } elseif ($minValue !== 'auto' && $maxValue === 'auto') { |
152 | 152 | // Keep for X days but delete anytime if space needed |
153 | - $this->minAge = (int)$minValue; |
|
153 | + $this->minAge = (int) $minValue; |
|
154 | 154 | $this->maxAge = self::NO_OBLIGATION; |
155 | 155 | $this->canPurgeToSaveSpace = true; |
156 | 156 | } elseif ($minValue === 'auto' && $maxValue !== 'auto') { |
157 | 157 | // Delete anytime if space needed, Delete all older than max automatically |
158 | 158 | $this->minAge = self::NO_OBLIGATION; |
159 | - $this->maxAge = (int)$maxValue; |
|
159 | + $this->maxAge = (int) $maxValue; |
|
160 | 160 | $this->canPurgeToSaveSpace = true; |
161 | 161 | } elseif ($minValue !== 'auto' && $maxValue !== 'auto') { |
162 | 162 | // Delete all older than max OR older than min if space needed |
@@ -166,8 +166,8 @@ discard block |
||
166 | 166 | $maxValue = $minValue; |
167 | 167 | } |
168 | 168 | |
169 | - $this->minAge = (int)$minValue; |
|
170 | - $this->maxAge = (int)$maxValue; |
|
169 | + $this->minAge = (int) $minValue; |
|
170 | + $this->maxAge = (int) $maxValue; |
|
171 | 171 | $this->canPurgeToSaveSpace = false; |
172 | 172 | } |
173 | 173 | } |
@@ -112,7 +112,7 @@ discard block |
||
112 | 112 | $activity->setApp('systemtags') |
113 | 113 | ->setType('systemtags') |
114 | 114 | ->setAuthor($actor) |
115 | - ->setObject('systemtag', (int)$tag->getId(), $tag->getName()); |
|
115 | + ->setObject('systemtag', (int) $tag->getId(), $tag->getName()); |
|
116 | 116 | if ($event->getEvent() === ManagerEvent::EVENT_CREATE) { |
117 | 117 | $activity->setSubject(Provider::CREATE_TAG, [ |
118 | 118 | $actor, |
@@ -204,7 +204,7 @@ discard block |
||
204 | 204 | ->setObject($event->getObjectType(), (int) $event->getObjectId()); |
205 | 205 | |
206 | 206 | foreach ($users as $user => $path) { |
207 | - $user = (string)$user; // numerical ids could be ints which are not accepted everywhere |
|
207 | + $user = (string) $user; // numerical ids could be ints which are not accepted everywhere |
|
208 | 208 | $activity->setAffectedUser($user); |
209 | 209 | |
210 | 210 | foreach ($tags as $tag) { |
@@ -140,7 +140,7 @@ discard block |
||
140 | 140 | $this->recoveryKeyId = $this->config->getAppValue('encryption', |
141 | 141 | 'recoveryKeyId'); |
142 | 142 | if (empty($this->recoveryKeyId)) { |
143 | - $this->recoveryKeyId = 'recoveryKey_' . substr(md5(time()), 0, 8); |
|
143 | + $this->recoveryKeyId = 'recoveryKey_'.substr(md5(time()), 0, 8); |
|
144 | 144 | $this->config->setAppValue('encryption', |
145 | 145 | 'recoveryKeyId', |
146 | 146 | $this->recoveryKeyId); |
@@ -149,14 +149,14 @@ discard block |
||
149 | 149 | $this->publicShareKeyId = $this->config->getAppValue('encryption', |
150 | 150 | 'publicShareKeyId'); |
151 | 151 | if (empty($this->publicShareKeyId)) { |
152 | - $this->publicShareKeyId = 'pubShare_' . substr(md5(time()), 0, 8); |
|
152 | + $this->publicShareKeyId = 'pubShare_'.substr(md5(time()), 0, 8); |
|
153 | 153 | $this->config->setAppValue('encryption', 'publicShareKeyId', $this->publicShareKeyId); |
154 | 154 | } |
155 | 155 | |
156 | 156 | $this->masterKeyId = $this->config->getAppValue('encryption', |
157 | 157 | 'masterKeyId'); |
158 | 158 | if (empty($this->masterKeyId)) { |
159 | - $this->masterKeyId = 'master_' . substr(md5(time()), 0, 8); |
|
159 | + $this->masterKeyId = 'master_'.substr(md5(time()), 0, 8); |
|
160 | 160 | $this->config->setAppValue('encryption', 'masterKeyId', $this->masterKeyId); |
161 | 161 | } |
162 | 162 | |
@@ -176,13 +176,13 @@ discard block |
||
176 | 176 | |
177 | 177 | // Save public key |
178 | 178 | $this->keyStorage->setSystemUserKey( |
179 | - $this->publicShareKeyId . '.' . $this->publicKeyId, $keyPair['publicKey'], |
|
179 | + $this->publicShareKeyId.'.'.$this->publicKeyId, $keyPair['publicKey'], |
|
180 | 180 | Encryption::ID); |
181 | 181 | |
182 | 182 | // Encrypt private key empty passphrase |
183 | 183 | $encryptedKey = $this->crypt->encryptPrivateKey($keyPair['privateKey'], ''); |
184 | 184 | $header = $this->crypt->generateHeader(); |
185 | - $this->setSystemPrivateKey($this->publicShareKeyId, $header . $encryptedKey); |
|
185 | + $this->setSystemPrivateKey($this->publicShareKeyId, $header.$encryptedKey); |
|
186 | 186 | } catch (\Throwable $e) { |
187 | 187 | $this->lockingProvider->releaseLock('encryption-generateSharedKey', ILockingProvider::LOCK_EXCLUSIVE); |
188 | 188 | throw $e; |
@@ -212,13 +212,13 @@ discard block |
||
212 | 212 | |
213 | 213 | // Save public key |
214 | 214 | $this->keyStorage->setSystemUserKey( |
215 | - $this->masterKeyId . '.' . $this->publicKeyId, $keyPair['publicKey'], |
|
215 | + $this->masterKeyId.'.'.$this->publicKeyId, $keyPair['publicKey'], |
|
216 | 216 | Encryption::ID); |
217 | 217 | |
218 | 218 | // Encrypt private key with system password |
219 | 219 | $encryptedKey = $this->crypt->encryptPrivateKey($keyPair['privateKey'], $this->getMasterKeyPassword(), $this->masterKeyId); |
220 | 220 | $header = $this->crypt->generateHeader(); |
221 | - $this->setSystemPrivateKey($this->masterKeyId, $header . $encryptedKey); |
|
221 | + $this->setSystemPrivateKey($this->masterKeyId, $header.$encryptedKey); |
|
222 | 222 | } catch (\Throwable $e) { |
223 | 223 | $this->lockingProvider->releaseLock('encryption-generateMasterKey', ILockingProvider::LOCK_EXCLUSIVE); |
224 | 224 | throw $e; |
@@ -256,7 +256,7 @@ discard block |
||
256 | 256 | * @return string |
257 | 257 | */ |
258 | 258 | public function getRecoveryKey() { |
259 | - return $this->keyStorage->getSystemUserKey($this->recoveryKeyId . '.' . $this->publicKeyId, Encryption::ID); |
|
259 | + return $this->keyStorage->getSystemUserKey($this->recoveryKeyId.'.'.$this->publicKeyId, Encryption::ID); |
|
260 | 260 | } |
261 | 261 | |
262 | 262 | /** |
@@ -273,7 +273,7 @@ discard block |
||
273 | 273 | * @return bool |
274 | 274 | */ |
275 | 275 | public function checkRecoveryPassword($password) { |
276 | - $recoveryKey = $this->keyStorage->getSystemUserKey($this->recoveryKeyId . '.' . $this->privateKeyId, Encryption::ID); |
|
276 | + $recoveryKey = $this->keyStorage->getSystemUserKey($this->recoveryKeyId.'.'.$this->privateKeyId, Encryption::ID); |
|
277 | 277 | $decryptedRecoveryKey = $this->crypt->decryptPrivateKey($recoveryKey, $password); |
278 | 278 | |
279 | 279 | if ($decryptedRecoveryKey) { |
@@ -297,7 +297,7 @@ discard block |
||
297 | 297 | $header = $this->crypt->generateHeader(); |
298 | 298 | |
299 | 299 | if ($encryptedKey) { |
300 | - $this->setPrivateKey($uid, $header . $encryptedKey); |
|
300 | + $this->setPrivateKey($uid, $header.$encryptedKey); |
|
301 | 301 | return true; |
302 | 302 | } |
303 | 303 | return false; |
@@ -311,7 +311,7 @@ discard block |
||
311 | 311 | public function setRecoveryKey($password, $keyPair) { |
312 | 312 | // Save Public Key |
313 | 313 | $this->keyStorage->setSystemUserKey($this->getRecoveryKeyId(). |
314 | - '.' . $this->publicKeyId, |
|
314 | + '.'.$this->publicKeyId, |
|
315 | 315 | $keyPair['publicKey'], |
316 | 316 | Encryption::ID); |
317 | 317 | |
@@ -319,7 +319,7 @@ discard block |
||
319 | 319 | $header = $this->crypt->generateHeader(); |
320 | 320 | |
321 | 321 | if ($encryptedKey) { |
322 | - $this->setSystemPrivateKey($this->getRecoveryKeyId(), $header . $encryptedKey); |
|
322 | + $this->setSystemPrivateKey($this->getRecoveryKeyId(), $header.$encryptedKey); |
|
323 | 323 | return true; |
324 | 324 | } |
325 | 325 | return false; |
@@ -379,7 +379,7 @@ discard block |
||
379 | 379 | * @return boolean |
380 | 380 | */ |
381 | 381 | public function setShareKey($path, $uid, $key) { |
382 | - $keyId = $uid . '.' . $this->shareKeyId; |
|
382 | + $keyId = $uid.'.'.$this->shareKeyId; |
|
383 | 383 | return $this->keyStorage->setFileKey($path, $keyId, $key, Encryption::ID); |
384 | 384 | } |
385 | 385 | |
@@ -408,7 +408,7 @@ discard block |
||
408 | 408 | return false; |
409 | 409 | } catch (\Exception $e) { |
410 | 410 | $this->log->logException($e, [ |
411 | - 'message' => 'Could not decrypt the private key from user "' . $uid . '"" during login. Assume password change on the user back-end.', |
|
411 | + 'message' => 'Could not decrypt the private key from user "'.$uid.'"" during login. Assume password change on the user back-end.', |
|
412 | 412 | 'level' => ILogger::WARN, |
413 | 413 | 'app' => 'encryption', |
414 | 414 | ]); |
@@ -469,7 +469,7 @@ discard block |
||
469 | 469 | // use public share key for public links |
470 | 470 | $uid = $this->getPublicShareKeyId(); |
471 | 471 | $shareKey = $this->getShareKey($path, $uid); |
472 | - $privateKey = $this->keyStorage->getSystemUserKey($this->publicShareKeyId . '.' . $this->privateKeyId, Encryption::ID); |
|
472 | + $privateKey = $this->keyStorage->getSystemUserKey($this->publicShareKeyId.'.'.$this->privateKeyId, Encryption::ID); |
|
473 | 473 | $privateKey = $this->crypt->decryptPrivateKey($privateKey); |
474 | 474 | } else { |
475 | 475 | $shareKey = $this->getShareKey($path, $uid); |
@@ -539,7 +539,7 @@ discard block |
||
539 | 539 | public function deleteShareKey($path, $keyId) { |
540 | 540 | return $this->keyStorage->deleteFileKey( |
541 | 541 | $path, |
542 | - $keyId . '.' . $this->shareKeyId, |
|
542 | + $keyId.'.'.$this->shareKeyId, |
|
543 | 543 | Encryption::ID); |
544 | 544 | } |
545 | 545 | |
@@ -550,7 +550,7 @@ discard block |
||
550 | 550 | * @return mixed |
551 | 551 | */ |
552 | 552 | public function getShareKey($path, $uid) { |
553 | - $keyId = $uid . '.' . $this->shareKeyId; |
|
553 | + $keyId = $uid.'.'.$this->shareKeyId; |
|
554 | 554 | return $this->keyStorage->getFileKey($path, $keyId, Encryption::ID); |
555 | 555 | } |
556 | 556 | |
@@ -612,7 +612,7 @@ discard block |
||
612 | 612 | * @return string |
613 | 613 | */ |
614 | 614 | public function getPublicShareKey() { |
615 | - return $this->keyStorage->getSystemUserKey($this->publicShareKeyId . '.' . $this->publicKeyId, Encryption::ID); |
|
615 | + return $this->keyStorage->getSystemUserKey($this->publicShareKeyId.'.'.$this->publicKeyId, Encryption::ID); |
|
616 | 616 | } |
617 | 617 | |
618 | 618 | /** |
@@ -681,7 +681,7 @@ discard block |
||
681 | 681 | * @return string returns openssl key |
682 | 682 | */ |
683 | 683 | public function getSystemPrivateKey($keyId) { |
684 | - return $this->keyStorage->getSystemUserKey($keyId . '.' . $this->privateKeyId, Encryption::ID); |
|
684 | + return $this->keyStorage->getSystemUserKey($keyId.'.'.$this->privateKeyId, Encryption::ID); |
|
685 | 685 | } |
686 | 686 | |
687 | 687 | /** |
@@ -691,7 +691,7 @@ discard block |
||
691 | 691 | */ |
692 | 692 | public function setSystemPrivateKey($keyId, $key) { |
693 | 693 | return $this->keyStorage->setSystemUserKey( |
694 | - $keyId . '.' . $this->privateKeyId, |
|
694 | + $keyId.'.'.$this->privateKeyId, |
|
695 | 695 | $key, |
696 | 696 | Encryption::ID); |
697 | 697 | } |
@@ -752,7 +752,7 @@ discard block |
||
752 | 752 | * @return string |
753 | 753 | */ |
754 | 754 | public function getPublicMasterKey() { |
755 | - return $this->keyStorage->getSystemUserKey($this->masterKeyId . '.' . $this->publicKeyId, Encryption::ID); |
|
755 | + return $this->keyStorage->getSystemUserKey($this->masterKeyId.'.'.$this->publicKeyId, Encryption::ID); |
|
756 | 756 | } |
757 | 757 | |
758 | 758 | /** |
@@ -761,6 +761,6 @@ discard block |
||
761 | 761 | * @return string |
762 | 762 | */ |
763 | 763 | public function getPrivateMasterKey() { |
764 | - return $this->keyStorage->getSystemUserKey($this->masterKeyId . '.' . $this->privateKeyId, Encryption::ID); |
|
764 | + return $this->keyStorage->getSystemUserKey($this->masterKeyId.'.'.$this->privateKeyId, Encryption::ID); |
|
765 | 765 | } |
766 | 766 | } |
@@ -33,7 +33,7 @@ |
||
33 | 33 | $serverConnections = $helper->getServerConfigurationPrefixes(); |
34 | 34 | sort($serverConnections); |
35 | 35 | $lk = array_pop($serverConnections); |
36 | -$ln = (int)str_replace('s', '', $lk); |
|
36 | +$ln = (int) str_replace('s', '', $lk); |
|
37 | 37 | $nk = 's'.str_pad($ln + 1, 2, '0', STR_PAD_LEFT); |
38 | 38 | |
39 | 39 | $resultData = ['configPrefix' => $nk]; |
@@ -112,8 +112,8 @@ discard block |
||
112 | 112 | $configPrefixes = $helper->getServerConfigurationPrefixes(true); |
113 | 113 | $ldapWrapper = new LDAP(); |
114 | 114 | |
115 | - $offset = (int)$input->getOption('offset'); |
|
116 | - $limit = (int)$input->getOption('limit'); |
|
115 | + $offset = (int) $input->getOption('offset'); |
|
116 | + $limit = (int) $input->getOption('limit'); |
|
117 | 117 | $this->validateOffsetAndLimit($offset, $limit); |
118 | 118 | |
119 | 119 | if ($input->getOption('group')) { |
@@ -140,7 +140,7 @@ discard block |
||
140 | 140 | |
141 | 141 | $result = $proxy->$getMethod($input->getArgument('search'), $limit, $offset); |
142 | 142 | foreach ($result as $id => $name) { |
143 | - $line = $name . ($printID ? ' ('.$id.')' : ''); |
|
143 | + $line = $name.($printID ? ' ('.$id.')' : ''); |
|
144 | 144 | $output->writeln($line); |
145 | 145 | } |
146 | 146 | return 0; |
@@ -73,7 +73,7 @@ |
||
73 | 73 | } |
74 | 74 | |
75 | 75 | $providers = $this->registry->getProviderStates($user); |
76 | - $state2fa = array_reduce($providers, function (bool $carry, bool $state) { |
|
76 | + $state2fa = array_reduce($providers, function(bool $carry, bool $state) { |
|
77 | 77 | return $carry || $state; |
78 | 78 | }, false); |
79 | 79 |
@@ -66,7 +66,7 @@ discard block |
||
66 | 66 | $input = $host; |
67 | 67 | if (strpos($host, '://') === false) { |
68 | 68 | // add a protocol to fix parse_url behavior with ipv6 |
69 | - $host = 'http://' . $host; |
|
69 | + $host = 'http://'.$host; |
|
70 | 70 | } |
71 | 71 | |
72 | 72 | $parsed = parse_url($host); |
@@ -110,8 +110,8 @@ discard block |
||
110 | 110 | $this->root |
111 | 111 | = isset($params['root']) ? $this->cleanPath($params['root']) : '/'; |
112 | 112 | |
113 | - $this->root = '/' . ltrim($this->root, '/'); |
|
114 | - $this->root = rtrim($this->root, '/') . '/'; |
|
113 | + $this->root = '/'.ltrim($this->root, '/'); |
|
114 | + $this->root = rtrim($this->root, '/').'/'; |
|
115 | 115 | } |
116 | 116 | |
117 | 117 | /** |
@@ -170,14 +170,14 @@ discard block |
||
170 | 170 | * {@inheritdoc} |
171 | 171 | */ |
172 | 172 | public function getId() { |
173 | - $id = 'sftp::' . $this->user . '@' . $this->host; |
|
173 | + $id = 'sftp::'.$this->user.'@'.$this->host; |
|
174 | 174 | if ($this->port !== 22) { |
175 | - $id .= ':' . $this->port; |
|
175 | + $id .= ':'.$this->port; |
|
176 | 176 | } |
177 | 177 | // note: this will double the root slash, |
178 | 178 | // we should not change it to keep compatible with |
179 | 179 | // old storage ids |
180 | - $id .= '/' . $this->root; |
|
180 | + $id .= '/'.$this->root; |
|
181 | 181 | return $id; |
182 | 182 | } |
183 | 183 | |
@@ -207,7 +207,7 @@ discard block |
||
207 | 207 | * @return string |
208 | 208 | */ |
209 | 209 | private function absPath($path) { |
210 | - return $this->root . $this->cleanPath($path); |
|
210 | + return $this->root.$this->cleanPath($path); |
|
211 | 211 | } |
212 | 212 | |
213 | 213 | /** |
@@ -217,8 +217,8 @@ discard block |
||
217 | 217 | try { |
218 | 218 | $storage_view = \OCP\Files::getStorage('files_external'); |
219 | 219 | if ($storage_view) { |
220 | - return \OC::$server->getConfig()->getSystemValue('datadirectory', \OC::$SERVERROOT . '/data') . |
|
221 | - $storage_view->getAbsolutePath('') . |
|
220 | + return \OC::$server->getConfig()->getSystemValue('datadirectory', \OC::$SERVERROOT.'/data'). |
|
221 | + $storage_view->getAbsolutePath(''). |
|
222 | 222 | 'ssh_hostKeys'; |
223 | 223 | } |
224 | 224 | } catch (\Exception $e) { |
@@ -236,7 +236,7 @@ discard block |
||
236 | 236 | if ($keyPath && file_exists($keyPath)) { |
237 | 237 | $fp = fopen($keyPath, 'w'); |
238 | 238 | foreach ($keys as $host => $key) { |
239 | - fwrite($fp, $host . '::' . $key . "\n"); |
|
239 | + fwrite($fp, $host.'::'.$key."\n"); |
|
240 | 240 | } |
241 | 241 | fclose($fp); |
242 | 242 | return true; |
@@ -308,7 +308,7 @@ discard block |
||
308 | 308 | return false; |
309 | 309 | } |
310 | 310 | |
311 | - $id = md5('sftp:' . $path); |
|
311 | + $id = md5('sftp:'.$path); |
|
312 | 312 | $dirStream = []; |
313 | 313 | foreach ($list as $file) { |
314 | 314 | if ($file !== '.' && $file !== '..') { |
@@ -375,13 +375,13 @@ discard block |
||
375 | 375 | } |
376 | 376 | SFTPReadStream::register(); |
377 | 377 | $context = stream_context_create(['sftp' => ['session' => $this->getConnection()]]); |
378 | - $handle = fopen('sftpread://' . trim($absPath, '/'), 'r', false, $context); |
|
378 | + $handle = fopen('sftpread://'.trim($absPath, '/'), 'r', false, $context); |
|
379 | 379 | return RetryWrapper::wrap($handle); |
380 | 380 | case 'w': |
381 | 381 | case 'wb': |
382 | 382 | SFTPWriteStream::register(); |
383 | 383 | $context = stream_context_create(['sftp' => ['session' => $this->getConnection()]]); |
384 | - return fopen('sftpwrite://' . trim($absPath, '/'), 'w', false, $context); |
|
384 | + return fopen('sftpwrite://'.trim($absPath, '/'), 'w', false, $context); |
|
385 | 385 | case 'a': |
386 | 386 | case 'ab': |
387 | 387 | case 'r+': |
@@ -470,7 +470,7 @@ discard block |
||
470 | 470 | // Do not pass the password here. We want to use the Net_SFTP object |
471 | 471 | // supplied via stream context or fail. We only supply username and |
472 | 472 | // hostname because this might show up in logs (they are not used). |
473 | - $url = 'sftp://' . urlencode($this->user) . '@' . $this->host . ':' . $this->port . $this->root . $path; |
|
473 | + $url = 'sftp://'.urlencode($this->user).'@'.$this->host.':'.$this->port.$this->root.$path; |
|
474 | 474 | return $url; |
475 | 475 | } |
476 | 476 | } |
@@ -77,7 +77,7 @@ discard block |
||
77 | 77 | /** |
78 | 78 | * Controllers |
79 | 79 | */ |
80 | - $context->registerService('APIController', function (ContainerInterface $c) { |
|
80 | + $context->registerService('APIController', function(ContainerInterface $c) { |
|
81 | 81 | /** @var IServerContainer $server */ |
82 | 82 | $server = $c->get(IServerContainer::class); |
83 | 83 | |
@@ -96,7 +96,7 @@ discard block |
||
96 | 96 | /** |
97 | 97 | * Services |
98 | 98 | */ |
99 | - $context->registerService(TagService::class, function (ContainerInterface $c) { |
|
99 | + $context->registerService(TagService::class, function(ContainerInterface $c) { |
|
100 | 100 | /** @var IServerContainer $server */ |
101 | 101 | $server = $c->get(IServerContainer::class); |
102 | 102 | |
@@ -150,7 +150,7 @@ discard block |
||
150 | 150 | } |
151 | 151 | |
152 | 152 | private function registerNavigation(IL10N $l10n): void { |
153 | - \OCA\Files\App::getNavigationManager()->add(function () use ($l10n) { |
|
153 | + \OCA\Files\App::getNavigationManager()->add(function() use ($l10n) { |
|
154 | 154 | return [ |
155 | 155 | 'id' => 'files', |
156 | 156 | 'appname' => 'files', |
@@ -159,7 +159,7 @@ discard block |
||
159 | 159 | 'name' => $l10n->t('All files') |
160 | 160 | ]; |
161 | 161 | }); |
162 | - \OCA\Files\App::getNavigationManager()->add(function () use ($l10n) { |
|
162 | + \OCA\Files\App::getNavigationManager()->add(function() use ($l10n) { |
|
163 | 163 | return [ |
164 | 164 | 'id' => 'recent', |
165 | 165 | 'appname' => 'files', |
@@ -168,7 +168,7 @@ discard block |
||
168 | 168 | 'name' => $l10n->t('Recent') |
169 | 169 | ]; |
170 | 170 | }); |
171 | - \OCA\Files\App::getNavigationManager()->add(function () use ($l10n) { |
|
171 | + \OCA\Files\App::getNavigationManager()->add(function() use ($l10n) { |
|
172 | 172 | return [ |
173 | 173 | 'id' => 'favorites', |
174 | 174 | 'appname' => 'files', |
@@ -63,7 +63,7 @@ |
||
63 | 63 | public function findAll(?int $limit = null, ?int $offset = null): DataResponse { |
64 | 64 | $allStatuses = $this->service->findAll($limit, $offset); |
65 | 65 | |
66 | - return new DataResponse(array_map(function ($userStatus) { |
|
66 | + return new DataResponse(array_map(function($userStatus) { |
|
67 | 67 | return $this->formatStatus($userStatus); |
68 | 68 | }, $allStatuses)); |
69 | 69 | } |