@@ -31,56 +31,56 @@ |
||
31 | 31 | |
32 | 32 | class Admin implements ISettings { |
33 | 33 | |
34 | - /** @var IniGetWrapper */ |
|
35 | - private $iniWrapper; |
|
34 | + /** @var IniGetWrapper */ |
|
35 | + private $iniWrapper; |
|
36 | 36 | |
37 | - /** @var IRequest */ |
|
38 | - private $request; |
|
37 | + /** @var IRequest */ |
|
38 | + private $request; |
|
39 | 39 | |
40 | - public function __construct(IniGetWrapper $iniWrapper, IRequest $request) { |
|
41 | - $this->iniWrapper = $iniWrapper; |
|
42 | - $this->request = $request; |
|
43 | - } |
|
40 | + public function __construct(IniGetWrapper $iniWrapper, IRequest $request) { |
|
41 | + $this->iniWrapper = $iniWrapper; |
|
42 | + $this->request = $request; |
|
43 | + } |
|
44 | 44 | |
45 | - /** |
|
46 | - * @return TemplateResponse |
|
47 | - */ |
|
48 | - public function getForm() { |
|
49 | - $htaccessWorking = (getenv('htaccessWorking') == 'true'); |
|
50 | - $htaccessWritable = is_writable(\OC::$SERVERROOT.'/.htaccess'); |
|
51 | - $userIniWritable = is_writable(\OC::$SERVERROOT.'/.user.ini'); |
|
45 | + /** |
|
46 | + * @return TemplateResponse |
|
47 | + */ |
|
48 | + public function getForm() { |
|
49 | + $htaccessWorking = (getenv('htaccessWorking') == 'true'); |
|
50 | + $htaccessWritable = is_writable(\OC::$SERVERROOT.'/.htaccess'); |
|
51 | + $userIniWritable = is_writable(\OC::$SERVERROOT.'/.user.ini'); |
|
52 | 52 | |
53 | - $upload_max_filesize = $this->iniWrapper->getBytes('upload_max_filesize'); |
|
54 | - $post_max_size = $this->iniWrapper->getBytes('post_max_size'); |
|
55 | - $maxUploadFilesize = Util::humanFileSize(min($upload_max_filesize, $post_max_size)); |
|
53 | + $upload_max_filesize = $this->iniWrapper->getBytes('upload_max_filesize'); |
|
54 | + $post_max_size = $this->iniWrapper->getBytes('post_max_size'); |
|
55 | + $maxUploadFilesize = Util::humanFileSize(min($upload_max_filesize, $post_max_size)); |
|
56 | 56 | |
57 | - $parameters = [ |
|
58 | - 'uploadChangable' => (($htaccessWorking and $htaccessWritable) or $userIniWritable ), |
|
59 | - 'uploadMaxFilesize' => $maxUploadFilesize, |
|
60 | - // max possible makes only sense on a 32 bit system |
|
61 | - 'displayMaxPossibleUploadSize' => PHP_INT_SIZE === 4, |
|
62 | - 'maxPossibleUploadSize' => Util::humanFileSize(PHP_INT_MAX), |
|
63 | - ]; |
|
57 | + $parameters = [ |
|
58 | + 'uploadChangable' => (($htaccessWorking and $htaccessWritable) or $userIniWritable ), |
|
59 | + 'uploadMaxFilesize' => $maxUploadFilesize, |
|
60 | + // max possible makes only sense on a 32 bit system |
|
61 | + 'displayMaxPossibleUploadSize' => PHP_INT_SIZE === 4, |
|
62 | + 'maxPossibleUploadSize' => Util::humanFileSize(PHP_INT_MAX), |
|
63 | + ]; |
|
64 | 64 | |
65 | - return new TemplateResponse('files', 'admin', $parameters, ''); |
|
66 | - } |
|
65 | + return new TemplateResponse('files', 'admin', $parameters, ''); |
|
66 | + } |
|
67 | 67 | |
68 | - /** |
|
69 | - * @return string the section ID, e.g. 'sharing' |
|
70 | - */ |
|
71 | - public function getSection() { |
|
72 | - return 'additional'; |
|
73 | - } |
|
68 | + /** |
|
69 | + * @return string the section ID, e.g. 'sharing' |
|
70 | + */ |
|
71 | + public function getSection() { |
|
72 | + return 'additional'; |
|
73 | + } |
|
74 | 74 | |
75 | - /** |
|
76 | - * @return int whether the form should be rather on the top or bottom of |
|
77 | - * the admin section. The forms are arranged in ascending order of the |
|
78 | - * priority values. It is required to return a value between 0 and 100. |
|
79 | - * |
|
80 | - * E.g.: 70 |
|
81 | - */ |
|
82 | - public function getPriority() { |
|
83 | - return 5; |
|
84 | - } |
|
75 | + /** |
|
76 | + * @return int whether the form should be rather on the top or bottom of |
|
77 | + * the admin section. The forms are arranged in ascending order of the |
|
78 | + * priority values. It is required to return a value between 0 and 100. |
|
79 | + * |
|
80 | + * E.g.: 70 |
|
81 | + */ |
|
82 | + public function getPriority() { |
|
83 | + return 5; |
|
84 | + } |
|
85 | 85 | |
86 | 86 | } |
@@ -30,11 +30,11 @@ |
||
30 | 30 | $filename = $_GET["file"]; |
31 | 31 | |
32 | 32 | if(!\OC\Files\Filesystem::file_exists($filename)) { |
33 | - header("HTTP/1.0 404 Not Found"); |
|
34 | - $tmpl = new OCP\Template( '', '404', 'guest' ); |
|
35 | - $tmpl->assign('file', $filename); |
|
36 | - $tmpl->printPage(); |
|
37 | - exit; |
|
33 | + header("HTTP/1.0 404 Not Found"); |
|
34 | + $tmpl = new OCP\Template( '', '404', 'guest' ); |
|
35 | + $tmpl->assign('file', $filename); |
|
36 | + $tmpl->printPage(); |
|
37 | + exit; |
|
38 | 38 | } |
39 | 39 | |
40 | 40 | $ftype=\OC::$server->getMimeTypeDetector()->getSecureMimeType(\OC\Files\Filesystem::getMimeType( $filename )); |
@@ -51,48 +51,48 @@ |
||
51 | 51 | * @param \OCP\IDBConnection $conn |
52 | 52 | */ |
53 | 53 | function owncloud_reset_encrypted_flag(\OCP\IDBConnection $conn) { |
54 | - $conn->executeUpdate('UPDATE `*PREFIX*filecache` SET `encrypted` = 0 WHERE `encrypted` = 1'); |
|
54 | + $conn->executeUpdate('UPDATE `*PREFIX*filecache` SET `encrypted` = 0 WHERE `encrypted` = 1'); |
|
55 | 55 | } |
56 | 56 | |
57 | 57 | // Current version of ownCloud before the update is 8.1.0 or 8.2.0.(0-2) |
58 | 58 | if ($installedVersion === '1.1.9' && ( |
59 | - // 8.1.0.x |
|
60 | - (((int) $ocVersion[0]) === 8 && ((int) $ocVersion[1]) === 1 && ((int) $ocVersion[2]) === 0) |
|
61 | - || |
|
62 | - // < 8.2.0.3 |
|
63 | - (((int) $ocVersion[0]) === 8 && ((int) $ocVersion[1]) === 2 && ((int) $ocVersion[2]) === 0 && ((int) $ocVersion[3]) < 3) |
|
64 | - )) { |
|
59 | + // 8.1.0.x |
|
60 | + (((int) $ocVersion[0]) === 8 && ((int) $ocVersion[1]) === 1 && ((int) $ocVersion[2]) === 0) |
|
61 | + || |
|
62 | + // < 8.2.0.3 |
|
63 | + (((int) $ocVersion[0]) === 8 && ((int) $ocVersion[1]) === 2 && ((int) $ocVersion[2]) === 0 && ((int) $ocVersion[3]) < 3) |
|
64 | + )) { |
|
65 | 65 | |
66 | - // Encryption is not enabled |
|
67 | - if (!\OC::$server->getEncryptionManager()->isEnabled()) { |
|
68 | - $conn = \OC::$server->getDatabaseConnection(); |
|
66 | + // Encryption is not enabled |
|
67 | + if (!\OC::$server->getEncryptionManager()->isEnabled()) { |
|
68 | + $conn = \OC::$server->getDatabaseConnection(); |
|
69 | 69 | |
70 | - // Old encryption is not known in app config |
|
71 | - $oldEncryption = \OC::$server->getConfig()->getAppKeys('files_encryption'); |
|
72 | - if (empty($oldEncryption)) { |
|
73 | - owncloud_reset_encrypted_flag($conn); |
|
74 | - } else { |
|
75 | - $query = $conn->prepare('SELECT * FROM `*PREFIX*filecache` WHERE `encrypted` = 1 AND `unencrypted_size` > 0', 1); |
|
76 | - $query->execute(); |
|
77 | - $empty = $query->fetch(); |
|
70 | + // Old encryption is not known in app config |
|
71 | + $oldEncryption = \OC::$server->getConfig()->getAppKeys('files_encryption'); |
|
72 | + if (empty($oldEncryption)) { |
|
73 | + owncloud_reset_encrypted_flag($conn); |
|
74 | + } else { |
|
75 | + $query = $conn->prepare('SELECT * FROM `*PREFIX*filecache` WHERE `encrypted` = 1 AND `unencrypted_size` > 0', 1); |
|
76 | + $query->execute(); |
|
77 | + $empty = $query->fetch(); |
|
78 | 78 | |
79 | - if (empty($empty)) { |
|
80 | - owncloud_reset_encrypted_flag($conn); |
|
81 | - } else { |
|
82 | - /** |
|
83 | - * Sorry in case you are a false positive, but we are not 100% that |
|
84 | - * you don't have any encrypted files anymore, so we can not reset |
|
85 | - * the value safely |
|
86 | - */ |
|
87 | - \OC::$server->getLogger()->warning( |
|
88 | - 'If you have a problem with files not being accessible and ' |
|
89 | - . 'you are not using encryption, please have a look at the following' |
|
90 | - . 'issue: {issue}', |
|
91 | - [ |
|
92 | - 'issue' => 'https://github.com/owncloud/core/issues/17846', |
|
93 | - ] |
|
94 | - ); |
|
95 | - } |
|
96 | - } |
|
97 | - } |
|
79 | + if (empty($empty)) { |
|
80 | + owncloud_reset_encrypted_flag($conn); |
|
81 | + } else { |
|
82 | + /** |
|
83 | + * Sorry in case you are a false positive, but we are not 100% that |
|
84 | + * you don't have any encrypted files anymore, so we can not reset |
|
85 | + * the value safely |
|
86 | + */ |
|
87 | + \OC::$server->getLogger()->warning( |
|
88 | + 'If you have a problem with files not being accessible and ' |
|
89 | + . 'you are not using encryption, please have a look at the following' |
|
90 | + . 'issue: {issue}', |
|
91 | + [ |
|
92 | + 'issue' => 'https://github.com/owncloud/core/issues/17846', |
|
93 | + ] |
|
94 | + ); |
|
95 | + } |
|
96 | + } |
|
97 | + } |
|
98 | 98 | } |
@@ -5,46 +5,46 @@ discard block |
||
5 | 5 | vendor_style('user_ldap', 'ui-multiselect/jquery.multiselect'); |
6 | 6 | |
7 | 7 | script('user_ldap', [ |
8 | - 'wizard/controller', |
|
9 | - 'wizard/configModel', |
|
10 | - 'wizard/view', |
|
11 | - 'wizard/wizardObject', |
|
12 | - 'wizard/wizardTabGeneric', |
|
13 | - 'wizard/wizardTabElementary', |
|
14 | - 'wizard/wizardTabAbstractFilter', |
|
15 | - 'wizard/wizardTabUserFilter', |
|
16 | - 'wizard/wizardTabLoginFilter', |
|
17 | - 'wizard/wizardTabGroupFilter', |
|
18 | - 'wizard/wizardTabAdvanced', |
|
19 | - 'wizard/wizardTabExpert', |
|
20 | - 'wizard/wizardDetectorQueue', |
|
21 | - 'wizard/wizardDetectorGeneric', |
|
22 | - 'wizard/wizardDetectorPort', |
|
23 | - 'wizard/wizardDetectorBaseDN', |
|
24 | - 'wizard/wizardDetectorFeatureAbstract', |
|
25 | - 'wizard/wizardDetectorUserObjectClasses', |
|
26 | - 'wizard/wizardDetectorGroupObjectClasses', |
|
27 | - 'wizard/wizardDetectorGroupsForUsers', |
|
28 | - 'wizard/wizardDetectorGroupsForGroups', |
|
29 | - 'wizard/wizardDetectorSimpleRequestAbstract', |
|
30 | - 'wizard/wizardDetectorFilterUser', |
|
31 | - 'wizard/wizardDetectorFilterLogin', |
|
32 | - 'wizard/wizardDetectorFilterGroup', |
|
33 | - 'wizard/wizardDetectorUserCount', |
|
34 | - 'wizard/wizardDetectorGroupCount', |
|
35 | - 'wizard/wizardDetectorEmailAttribute', |
|
36 | - 'wizard/wizardDetectorUserDisplayNameAttribute', |
|
37 | - 'wizard/wizardDetectorUserGroupAssociation', |
|
38 | - 'wizard/wizardDetectorAvailableAttributes', |
|
39 | - 'wizard/wizardDetectorTestAbstract', |
|
40 | - 'wizard/wizardDetectorTestLoginName', |
|
41 | - 'wizard/wizardDetectorTestBaseDN', |
|
42 | - 'wizard/wizardDetectorTestConfiguration', |
|
43 | - 'wizard/wizardDetectorClearUserMappings', |
|
44 | - 'wizard/wizardDetectorClearGroupMappings', |
|
45 | - 'wizard/wizardFilterOnType', |
|
46 | - 'wizard/wizardFilterOnTypeFactory', |
|
47 | - 'wizard/wizard' |
|
8 | + 'wizard/controller', |
|
9 | + 'wizard/configModel', |
|
10 | + 'wizard/view', |
|
11 | + 'wizard/wizardObject', |
|
12 | + 'wizard/wizardTabGeneric', |
|
13 | + 'wizard/wizardTabElementary', |
|
14 | + 'wizard/wizardTabAbstractFilter', |
|
15 | + 'wizard/wizardTabUserFilter', |
|
16 | + 'wizard/wizardTabLoginFilter', |
|
17 | + 'wizard/wizardTabGroupFilter', |
|
18 | + 'wizard/wizardTabAdvanced', |
|
19 | + 'wizard/wizardTabExpert', |
|
20 | + 'wizard/wizardDetectorQueue', |
|
21 | + 'wizard/wizardDetectorGeneric', |
|
22 | + 'wizard/wizardDetectorPort', |
|
23 | + 'wizard/wizardDetectorBaseDN', |
|
24 | + 'wizard/wizardDetectorFeatureAbstract', |
|
25 | + 'wizard/wizardDetectorUserObjectClasses', |
|
26 | + 'wizard/wizardDetectorGroupObjectClasses', |
|
27 | + 'wizard/wizardDetectorGroupsForUsers', |
|
28 | + 'wizard/wizardDetectorGroupsForGroups', |
|
29 | + 'wizard/wizardDetectorSimpleRequestAbstract', |
|
30 | + 'wizard/wizardDetectorFilterUser', |
|
31 | + 'wizard/wizardDetectorFilterLogin', |
|
32 | + 'wizard/wizardDetectorFilterGroup', |
|
33 | + 'wizard/wizardDetectorUserCount', |
|
34 | + 'wizard/wizardDetectorGroupCount', |
|
35 | + 'wizard/wizardDetectorEmailAttribute', |
|
36 | + 'wizard/wizardDetectorUserDisplayNameAttribute', |
|
37 | + 'wizard/wizardDetectorUserGroupAssociation', |
|
38 | + 'wizard/wizardDetectorAvailableAttributes', |
|
39 | + 'wizard/wizardDetectorTestAbstract', |
|
40 | + 'wizard/wizardDetectorTestLoginName', |
|
41 | + 'wizard/wizardDetectorTestBaseDN', |
|
42 | + 'wizard/wizardDetectorTestConfiguration', |
|
43 | + 'wizard/wizardDetectorClearUserMappings', |
|
44 | + 'wizard/wizardDetectorClearGroupMappings', |
|
45 | + 'wizard/wizardFilterOnType', |
|
46 | + 'wizard/wizardFilterOnTypeFactory', |
|
47 | + 'wizard/wizard' |
|
48 | 48 | ]); |
49 | 49 | |
50 | 50 | style('user_ldap', 'settings'); |
@@ -67,12 +67,12 @@ discard block |
||
67 | 67 | <li class="ldapSettingsTabs"><a href="#ldapSettings-1"><?php p($l->t('Advanced'));?></a></li> |
68 | 68 | </ul> |
69 | 69 | <?php if(OCP\App::isEnabled('user_webdavauth')) { |
70 | - print_unescaped('<p class="ldapwarning">'.$l->t('<b>Warning:</b> Apps user_ldap and user_webdavauth are incompatible. You may experience unexpected behavior. Please ask your system administrator to disable one of them.').'</p>'); |
|
71 | - } |
|
72 | - if(!function_exists('ldap_connect')) { |
|
73 | - print_unescaped('<p class="ldapwarning">'.$l->t('<b>Warning:</b> The PHP LDAP module is not installed, the backend will not work. Please ask your system administrator to install it.').'</p>'); |
|
74 | - } |
|
75 | - ?> |
|
70 | + print_unescaped('<p class="ldapwarning">'.$l->t('<b>Warning:</b> Apps user_ldap and user_webdavauth are incompatible. You may experience unexpected behavior. Please ask your system administrator to disable one of them.').'</p>'); |
|
71 | + } |
|
72 | + if(!function_exists('ldap_connect')) { |
|
73 | + print_unescaped('<p class="ldapwarning">'.$l->t('<b>Warning:</b> The PHP LDAP module is not installed, the backend will not work. Please ask your system administrator to install it.').'</p>'); |
|
74 | + } |
|
75 | + ?> |
|
76 | 76 | <?php require_once(__DIR__ . '/part.wizard-server.php'); ?> |
77 | 77 | <?php require_once(__DIR__ . '/part.wizard-userfilter.php'); ?> |
78 | 78 | <?php require_once(__DIR__ . '/part.wizard-loginfilter.php'); ?> |
@@ -9,19 +9,19 @@ |
||
9 | 9 | <p> |
10 | 10 | <select id="ldap_serverconfig_chooser" name="ldap_serverconfig_chooser"> |
11 | 11 | <?php if(count($_['serverConfigurationPrefixes']) === 0 ) { |
12 | - ?> |
|
12 | + ?> |
|
13 | 13 | <option value="" selected><?php p($l->t('1. Server'));?></option>'); |
14 | 14 | <?php |
15 | - } else { |
|
16 | - $i = 1; |
|
17 | - $sel = ' selected'; |
|
18 | - foreach($_['serverConfigurationPrefixes'] as $prefix) { |
|
19 | - ?> |
|
15 | + } else { |
|
16 | + $i = 1; |
|
17 | + $sel = ' selected'; |
|
18 | + foreach($_['serverConfigurationPrefixes'] as $prefix) { |
|
19 | + ?> |
|
20 | 20 | <option value="<?php p($prefix); ?>"<?php p($sel); $sel = ''; ?>><?php p($l->t('%s. Server:', array($i++)));?> <?php p(' '.$_['serverConfigurationHosts'][$prefix]); ?></option> |
21 | 21 | <?php |
22 | - } |
|
23 | - } |
|
24 | - ?> |
|
22 | + } |
|
23 | + } |
|
24 | + ?> |
|
25 | 25 | </select> |
26 | 26 | <button type="button" id="ldap_action_add_configuration" |
27 | 27 | name="ldap_action_add_configuration" class="icon-add icon-default-style" |
@@ -34,16 +34,16 @@ |
||
34 | 34 | $subject = (string)$_POST['ldap_clear_mapping']; |
35 | 35 | $mapping = null; |
36 | 36 | if($subject === 'user') { |
37 | - $mapping = new UserMapping(\OC::$server->getDatabaseConnection()); |
|
37 | + $mapping = new UserMapping(\OC::$server->getDatabaseConnection()); |
|
38 | 38 | } else if($subject === 'group') { |
39 | - $mapping = new GroupMapping(\OC::$server->getDatabaseConnection()); |
|
39 | + $mapping = new GroupMapping(\OC::$server->getDatabaseConnection()); |
|
40 | 40 | } |
41 | 41 | try { |
42 | - if(is_null($mapping) || !$mapping->clear()) { |
|
43 | - $l = \OC::$server->getL10N('user_ldap'); |
|
44 | - throw new \Exception($l->t('Failed to clear the mappings.')); |
|
45 | - } |
|
46 | - OCP\JSON::success(); |
|
42 | + if(is_null($mapping) || !$mapping->clear()) { |
|
43 | + $l = \OC::$server->getL10N('user_ldap'); |
|
44 | + throw new \Exception($l->t('Failed to clear the mappings.')); |
|
45 | + } |
|
46 | + OCP\JSON::success(); |
|
47 | 47 | } catch (\Exception $e) { |
48 | - OCP\JSON::error(array('message' => $e->getMessage())); |
|
48 | + OCP\JSON::error(array('message' => $e->getMessage())); |
|
49 | 49 | } |
@@ -36,11 +36,11 @@ |
||
36 | 36 | // only legacy checkboxes (Advanced and Expert tab) need to be handled here, |
37 | 37 | // the Wizard-like tabs handle it on their own |
38 | 38 | $chkboxes = array('ldap_configuration_active', 'ldap_override_main_server', |
39 | - 'ldap_turn_off_cert_check'); |
|
39 | + 'ldap_turn_off_cert_check'); |
|
40 | 40 | foreach($chkboxes as $boxid) { |
41 | - if(!isset($_POST[$boxid])) { |
|
42 | - $_POST[$boxid] = 0; |
|
43 | - } |
|
41 | + if(!isset($_POST[$boxid])) { |
|
42 | + $_POST[$boxid] = 0; |
|
43 | + } |
|
44 | 44 | } |
45 | 45 | |
46 | 46 | $ldapWrapper = new OCA\User_LDAP\LDAP(); |
@@ -38,12 +38,12 @@ |
||
38 | 38 | |
39 | 39 | $newConfig = new \OCA\User_LDAP\Configuration($nk, false); |
40 | 40 | if(isset($_POST['copyConfig'])) { |
41 | - $originalConfig = new \OCA\User_LDAP\Configuration($_POST['copyConfig']); |
|
42 | - $newConfig->setConfiguration($originalConfig->getConfiguration()); |
|
41 | + $originalConfig = new \OCA\User_LDAP\Configuration($_POST['copyConfig']); |
|
42 | + $newConfig->setConfiguration($originalConfig->getConfiguration()); |
|
43 | 43 | } else { |
44 | - $configuration = new \OCA\User_LDAP\Configuration($nk, false); |
|
45 | - $newConfig->setConfiguration($configuration->getDefaults()); |
|
46 | - $resultData['defaults'] = $configuration->getDefaults(); |
|
44 | + $configuration = new \OCA\User_LDAP\Configuration($nk, false); |
|
45 | + $newConfig->setConfiguration($configuration->getDefaults()); |
|
46 | + $resultData['defaults'] = $configuration->getDefaults(); |
|
47 | 47 | } |
48 | 48 | $newConfig->saveConfiguration(); |
49 | 49 |
@@ -29,12 +29,12 @@ |
||
29 | 29 | */ |
30 | 30 | class GroupMapping extends AbstractMapping { |
31 | 31 | |
32 | - /** |
|
33 | - * returns the DB table name which holds the mappings |
|
34 | - * @return string |
|
35 | - */ |
|
36 | - protected function getTableName() { |
|
37 | - return '*PREFIX*ldap_group_mapping'; |
|
38 | - } |
|
32 | + /** |
|
33 | + * returns the DB table name which holds the mappings |
|
34 | + * @return string |
|
35 | + */ |
|
36 | + protected function getTableName() { |
|
37 | + return '*PREFIX*ldap_group_mapping'; |
|
38 | + } |
|
39 | 39 | |
40 | 40 | } |