@@ -133,7 +133,7 @@ discard block |
||
| 133 | 133 | if ($node instanceof SystemTagsObjectMappingCollection) { |
| 134 | 134 | // also add to collection |
| 135 | 135 | $node->createFile($tag->getId()); |
| 136 | - $url = $request->getBaseUrl() . 'systemtags/'; |
|
| 136 | + $url = $request->getBaseUrl().'systemtags/'; |
|
| 137 | 137 | } else { |
| 138 | 138 | $url = $request->getUrl(); |
| 139 | 139 | } |
@@ -142,7 +142,7 @@ discard block |
||
| 142 | 142 | $url .= '/'; |
| 143 | 143 | } |
| 144 | 144 | |
| 145 | - $response->setHeader('Content-Location', $url . $tag->getId()); |
|
| 145 | + $response->setHeader('Content-Location', $url.$tag->getId()); |
|
| 146 | 146 | |
| 147 | 147 | // created |
| 148 | 148 | $response->setStatus(201); |
@@ -177,11 +177,11 @@ discard block |
||
| 177 | 177 | $userAssignable = true; |
| 178 | 178 | |
| 179 | 179 | if (isset($data['userVisible'])) { |
| 180 | - $userVisible = (bool)$data['userVisible']; |
|
| 180 | + $userVisible = (bool) $data['userVisible']; |
|
| 181 | 181 | } |
| 182 | 182 | |
| 183 | 183 | if (isset($data['userAssignable'])) { |
| 184 | - $userAssignable = (bool)$data['userAssignable']; |
|
| 184 | + $userAssignable = (bool) $data['userAssignable']; |
|
| 185 | 185 | } |
| 186 | 186 | |
| 187 | 187 | $groups = []; |
@@ -224,29 +224,29 @@ discard block |
||
| 224 | 224 | return; |
| 225 | 225 | } |
| 226 | 226 | |
| 227 | - $propFind->handle(self::ID_PROPERTYNAME, function () use ($node) { |
|
| 227 | + $propFind->handle(self::ID_PROPERTYNAME, function() use ($node) { |
|
| 228 | 228 | return $node->getSystemTag()->getId(); |
| 229 | 229 | }); |
| 230 | 230 | |
| 231 | - $propFind->handle(self::DISPLAYNAME_PROPERTYNAME, function () use ($node) { |
|
| 231 | + $propFind->handle(self::DISPLAYNAME_PROPERTYNAME, function() use ($node) { |
|
| 232 | 232 | return $node->getSystemTag()->getName(); |
| 233 | 233 | }); |
| 234 | 234 | |
| 235 | - $propFind->handle(self::USERVISIBLE_PROPERTYNAME, function () use ($node) { |
|
| 235 | + $propFind->handle(self::USERVISIBLE_PROPERTYNAME, function() use ($node) { |
|
| 236 | 236 | return $node->getSystemTag()->isUserVisible() ? 'true' : 'false'; |
| 237 | 237 | }); |
| 238 | 238 | |
| 239 | - $propFind->handle(self::USERASSIGNABLE_PROPERTYNAME, function () use ($node) { |
|
| 239 | + $propFind->handle(self::USERASSIGNABLE_PROPERTYNAME, function() use ($node) { |
|
| 240 | 240 | // this is the tag's inherent property "is user assignable" |
| 241 | 241 | return $node->getSystemTag()->isUserAssignable() ? 'true' : 'false'; |
| 242 | 242 | }); |
| 243 | 243 | |
| 244 | - $propFind->handle(self::CANASSIGN_PROPERTYNAME, function () use ($node) { |
|
| 244 | + $propFind->handle(self::CANASSIGN_PROPERTYNAME, function() use ($node) { |
|
| 245 | 245 | // this is the effective permission for the current user |
| 246 | 246 | return $this->tagManager->canUserAssignTag($node->getSystemTag(), $this->userSession->getUser()) ? 'true' : 'false'; |
| 247 | 247 | }); |
| 248 | 248 | |
| 249 | - $propFind->handle(self::GROUPS_PROPERTYNAME, function () use ($node) { |
|
| 249 | + $propFind->handle(self::GROUPS_PROPERTYNAME, function() use ($node) { |
|
| 250 | 250 | if (!$this->groupManager->isAdmin($this->userSession->getUser()->getUID())) { |
| 251 | 251 | // property only available for admins |
| 252 | 252 | throw new Forbidden(); |
@@ -279,7 +279,7 @@ discard block |
||
| 279 | 279 | self::USERVISIBLE_PROPERTYNAME, |
| 280 | 280 | self::USERASSIGNABLE_PROPERTYNAME, |
| 281 | 281 | self::GROUPS_PROPERTYNAME, |
| 282 | - ], function ($props) use ($node) { |
|
| 282 | + ], function($props) use ($node) { |
|
| 283 | 283 | $tag = $node->getSystemTag(); |
| 284 | 284 | $name = $tag->getName(); |
| 285 | 285 | $userVisible = $tag->isUserVisible(); |
@@ -39,7 +39,7 @@ |
||
| 39 | 39 | } |
| 40 | 40 | |
| 41 | 41 | public function createDirectory($name) { |
| 42 | - throw new Forbidden('Permission denied to create file (filename ' . $name . ')'); |
|
| 42 | + throw new Forbidden('Permission denied to create file (filename '.$name.')'); |
|
| 43 | 43 | } |
| 44 | 44 | |
| 45 | 45 | public function getChild($name) { |
@@ -84,7 +84,7 @@ |
||
| 84 | 84 | */ |
| 85 | 85 | public function getSize() { |
| 86 | 86 | $children = $this->root->getChildren(); |
| 87 | - $sizes = array_map(function ($node) { |
|
| 87 | + $sizes = array_map(function($node) { |
|
| 88 | 88 | /** @var IFile $node */ |
| 89 | 89 | return $node->getSize(); |
| 90 | 90 | }, $children); |
@@ -62,7 +62,7 @@ |
||
| 62 | 62 | |
| 63 | 63 | $requestUri = \OC::$server->getRequest()->getRequestUri(); |
| 64 | 64 | |
| 65 | -$server = $serverFactory->createServer($baseuri, $requestUri, $authPlugin, function () { |
|
| 65 | +$server = $serverFactory->createServer($baseuri, $requestUri, $authPlugin, function() { |
|
| 66 | 66 | // use the view for the logged in user |
| 67 | 67 | return \OC\Files\Filesystem::getView(); |
| 68 | 68 | }); |
@@ -55,8 +55,8 @@ |
||
| 55 | 55 | $logger = \OC::$server->getLogger(); |
| 56 | 56 | |
| 57 | 57 | $sql = |
| 58 | - 'DELETE FROM `*PREFIX*share` ' . |
|
| 59 | - 'WHERE `item_type` in (\'file\', \'folder\') ' . |
|
| 58 | + 'DELETE FROM `*PREFIX*share` '. |
|
| 59 | + 'WHERE `item_type` in (\'file\', \'folder\') '. |
|
| 60 | 60 | 'AND NOT EXISTS (SELECT `fileid` FROM `*PREFIX*filecache` WHERE `file_source` = `fileid`)'; |
| 61 | 61 | |
| 62 | 62 | $deletedEntries = $connection->executeUpdate($sql); |
@@ -100,7 +100,7 @@ discard block |
||
| 100 | 100 | */ |
| 101 | 101 | protected function getPath($user, $path) { |
| 102 | 102 | $node = $this->rootFolder->getUserFolder($user)->get($path); |
| 103 | - return 'files/' . md5($node->getStorage()->getId() . '::' . trim($node->getInternalPath(), '/')); |
|
| 103 | + return 'files/'.md5($node->getStorage()->getId().'::'.trim($node->getInternalPath(), '/')); |
|
| 104 | 104 | } |
| 105 | 105 | |
| 106 | 106 | /** |
@@ -136,7 +136,7 @@ discard block |
||
| 136 | 136 | |
| 137 | 137 | try { |
| 138 | 138 | $lockingProvider->acquireLock($path, $type); |
| 139 | - $this->config->setAppValue('testing', 'locking_' . $path, $type); |
|
| 139 | + $this->config->setAppValue('testing', 'locking_'.$path, $type); |
|
| 140 | 140 | return new DataResponse(); |
| 141 | 141 | } catch (LockedException $e) { |
| 142 | 142 | throw new OCSException('', Http::STATUS_LOCKED, $e); |
@@ -163,7 +163,7 @@ discard block |
||
| 163 | 163 | |
| 164 | 164 | try { |
| 165 | 165 | $lockingProvider->changeLock($path, $type); |
| 166 | - $this->config->setAppValue('testing', 'locking_' . $path, $type); |
|
| 166 | + $this->config->setAppValue('testing', 'locking_'.$path, $type); |
|
| 167 | 167 | return new DataResponse(); |
| 168 | 168 | } catch (LockedException $e) { |
| 169 | 169 | throw new OCSException('', Http::STATUS_LOCKED, $e); |
@@ -190,7 +190,7 @@ discard block |
||
| 190 | 190 | |
| 191 | 191 | try { |
| 192 | 192 | $lockingProvider->releaseLock($path, $type); |
| 193 | - $this->config->deleteAppValue('testing', 'locking_' . $path); |
|
| 193 | + $this->config->deleteAppValue('testing', 'locking_'.$path); |
|
| 194 | 194 | return new DataResponse(); |
| 195 | 195 | } catch (LockedException $e) { |
| 196 | 196 | throw new OCSException('', Http::STATUS_LOCKED, $e); |
@@ -233,9 +233,9 @@ discard block |
||
| 233 | 233 | if (strpos($lock, 'locking_') === 0) { |
| 234 | 234 | $path = substr($lock, strlen('locking_')); |
| 235 | 235 | |
| 236 | - if ($type === ILockingProvider::LOCK_EXCLUSIVE && (int)$this->config->getAppValue('testing', $lock) === ILockingProvider::LOCK_EXCLUSIVE) { |
|
| 236 | + if ($type === ILockingProvider::LOCK_EXCLUSIVE && (int) $this->config->getAppValue('testing', $lock) === ILockingProvider::LOCK_EXCLUSIVE) { |
|
| 237 | 237 | $lockingProvider->releaseLock($path, $this->config->getAppValue('testing', $lock)); |
| 238 | - } elseif ($type === ILockingProvider::LOCK_SHARED && (int)$this->config->getAppValue('testing', $lock) === ILockingProvider::LOCK_SHARED) { |
|
| 238 | + } elseif ($type === ILockingProvider::LOCK_SHARED && (int) $this->config->getAppValue('testing', $lock) === ILockingProvider::LOCK_SHARED) { |
|
| 239 | 239 | $lockingProvider->releaseLock($path, $this->config->getAppValue('testing', $lock)); |
| 240 | 240 | } else { |
| 241 | 241 | $lockingProvider->releaseLock($path, $this->config->getAppValue('testing', $lock)); |
@@ -220,7 +220,7 @@ discard block |
||
| 220 | 220 | if (isset($parameters[$key])) { |
| 221 | 221 | switch ($parameters[$key]->getType()) { |
| 222 | 222 | case \OCA\Files_External\Lib\DefinitionParameter::VALUE_BOOLEAN: |
| 223 | - $value = (bool)$value; |
|
| 223 | + $value = (bool) $value; |
|
| 224 | 224 | break; |
| 225 | 225 | } |
| 226 | 226 | $backendOptions[$key] = $value; |
@@ -426,7 +426,7 @@ discard block |
||
| 426 | 426 | $result['statusMessage'] = $this->statusMessage; |
| 427 | 427 | } |
| 428 | 428 | $result['userProvided'] = $this->authMechanism instanceof IUserProvided; |
| 429 | - $result['type'] = ($this->getType() === self::MOUNT_TYPE_PERSONAl) ? 'personal': 'system'; |
|
| 429 | + $result['type'] = ($this->getType() === self::MOUNT_TYPE_PERSONAl) ? 'personal' : 'system'; |
|
| 430 | 430 | return $result; |
| 431 | 431 | } |
| 432 | 432 | } |
@@ -50,7 +50,7 @@ |
||
| 50 | 50 | ->setFlag(DefinitionParameter::FLAG_OPTIONAL), |
| 51 | 51 | ]) |
| 52 | 52 | ->addAuthScheme(AuthMechanism::SCHEME_OPENSTACK) |
| 53 | - ->setLegacyAuthMechanismCallback(function (array $params) use ($openstackAuth, $rackspaceAuth) { |
|
| 53 | + ->setLegacyAuthMechanismCallback(function(array $params) use ($openstackAuth, $rackspaceAuth) { |
|
| 54 | 54 | if (isset($params['options']['key']) && $params['options']['key']) { |
| 55 | 55 | return $rackspaceAuth; |
| 56 | 56 | } |
@@ -134,7 +134,7 @@ discard block |
||
| 134 | 134 | */ |
| 135 | 135 | public function requestSharedSecret($url, $token) { |
| 136 | 136 | if ($this->trustedServers->isTrustedServer($url) === false) { |
| 137 | - $this->logger->error('remote server not trusted (' . $url . ') while requesting shared secret', ['app' => 'federation']); |
|
| 137 | + $this->logger->error('remote server not trusted ('.$url.') while requesting shared secret', ['app' => 'federation']); |
|
| 138 | 138 | throw new OCSForbiddenException(); |
| 139 | 139 | } |
| 140 | 140 | |
@@ -143,7 +143,7 @@ discard block |
||
| 143 | 143 | $localToken = $this->dbHandler->getToken($url); |
| 144 | 144 | if (strcmp($localToken, $token) > 0) { |
| 145 | 145 | $this->logger->info( |
| 146 | - 'remote server (' . $url . ') presented lower token. We will initiate the exchange of the shared secret.', |
|
| 146 | + 'remote server ('.$url.') presented lower token. We will initiate the exchange of the shared secret.', |
|
| 147 | 147 | ['app' => 'federation'] |
| 148 | 148 | ); |
| 149 | 149 | throw new OCSForbiddenException(); |
@@ -183,14 +183,14 @@ discard block |
||
| 183 | 183 | */ |
| 184 | 184 | public function getSharedSecret($url, $token) { |
| 185 | 185 | if ($this->trustedServers->isTrustedServer($url) === false) { |
| 186 | - $this->logger->error('remote server not trusted (' . $url . ') while getting shared secret', ['app' => 'federation']); |
|
| 186 | + $this->logger->error('remote server not trusted ('.$url.') while getting shared secret', ['app' => 'federation']); |
|
| 187 | 187 | throw new OCSForbiddenException(); |
| 188 | 188 | } |
| 189 | 189 | |
| 190 | 190 | if ($this->isValidToken($url, $token) === false) { |
| 191 | 191 | $expectedToken = $this->dbHandler->getToken($url); |
| 192 | 192 | $this->logger->error( |
| 193 | - 'remote server (' . $url . ') didn\'t send a valid token (got "' . $token . '" but expected "'. $expectedToken . '") while getting shared secret', |
|
| 193 | + 'remote server ('.$url.') didn\'t send a valid token (got "'.$token.'" but expected "'.$expectedToken.'") while getting shared secret', |
|
| 194 | 194 | ['app' => 'federation'] |
| 195 | 195 | ); |
| 196 | 196 | throw new OCSForbiddenException(); |