Completed
Push — master ( 2a9e00...6994a2 )
by Morris
19:38 queued 06:50
created
apps/user_ldap/templates/renewpassword.php 1 patch
Indentation   +2 added lines, -2 removed lines patch added patch discarded remove patch
@@ -1,10 +1,10 @@
 block discarded – undo
1 1
 <?php /** @var $l OC_L10N */ ?>
2 2
 <?php
3 3
 script('core', [
4
-	'jquery-showpassword',
4
+    'jquery-showpassword',
5 5
 ]);
6 6
 script('user_ldap', [
7
-	'renewPassword',
7
+    'renewPassword',
8 8
 ]);
9 9
 style('user_ldap', 'renewPassword');
10 10
 \OC_Util::addVendorScript('strengthify/jquery.strengthify');
Please login to merge, or discard this patch.
core/Command/Encryption/DecryptAll.php 1 patch
Indentation   +135 added lines, -135 removed lines patch added patch discarded remove patch
@@ -38,139 +38,139 @@
 block discarded – undo
38 38
 
39 39
 class DecryptAll extends Command {
40 40
 
41
-	/** @var IManager */
42
-	protected $encryptionManager;
43
-
44
-	/** @var  IAppManager */
45
-	protected $appManager;
46
-
47
-	/** @var IConfig */
48
-	protected $config;
49
-
50
-	/** @var  QuestionHelper */
51
-	protected $questionHelper;
52
-
53
-	/** @var bool */
54
-	protected $wasTrashbinEnabled;
55
-
56
-	/** @var  bool */
57
-	protected $wasMaintenanceModeEnabled;
58
-
59
-	/** @var \OC\Encryption\DecryptAll */
60
-	protected $decryptAll;
61
-
62
-	/**
63
-	 * @param IManager $encryptionManager
64
-	 * @param IAppManager $appManager
65
-	 * @param IConfig $config
66
-	 * @param \OC\Encryption\DecryptAll $decryptAll
67
-	 * @param QuestionHelper $questionHelper
68
-	 */
69
-	public function __construct(
70
-		IManager $encryptionManager,
71
-		IAppManager $appManager,
72
-		IConfig $config,
73
-		\OC\Encryption\DecryptAll $decryptAll,
74
-		QuestionHelper $questionHelper
75
-	) {
76
-		parent::__construct();
77
-
78
-		$this->appManager = $appManager;
79
-		$this->encryptionManager = $encryptionManager;
80
-		$this->config = $config;
81
-		$this->decryptAll = $decryptAll;
82
-		$this->questionHelper = $questionHelper;
83
-	}
84
-
85
-	/**
86
-	 * Set maintenance mode and disable the trashbin app
87
-	 */
88
-	protected function forceMaintenanceAndTrashbin() {
89
-		$this->wasTrashbinEnabled = $this->appManager->isEnabledForUser('files_trashbin');
90
-		$this->wasMaintenanceModeEnabled = $this->config->getSystemValue('maintenance', false);
91
-		$this->config->setSystemValue('maintenance', true);
92
-		$this->appManager->disableApp('files_trashbin');
93
-	}
94
-
95
-	/**
96
-	 * Reset the maintenance mode and re-enable the trashbin app
97
-	 */
98
-	protected function resetMaintenanceAndTrashbin() {
99
-		$this->config->setSystemValue('maintenance', $this->wasMaintenanceModeEnabled);
100
-		if ($this->wasTrashbinEnabled) {
101
-			$this->appManager->enableApp('files_trashbin');
102
-		}
103
-	}
104
-
105
-	protected function configure() {
106
-		parent::configure();
107
-
108
-		$this->setName('encryption:decrypt-all');
109
-		$this->setDescription('Disable server-side encryption and decrypt all files');
110
-		$this->setHelp(
111
-			'This will disable server-side encryption and decrypt all files for '
112
-			. 'all users if it is supported by your encryption module. '
113
-			. 'Please make sure that no user access his files during this process!'
114
-		);
115
-		$this->addArgument(
116
-			'user',
117
-			InputArgument::OPTIONAL,
118
-			'user for which you want to decrypt all files (optional)',
119
-			''
120
-		);
121
-	}
122
-
123
-	protected function execute(InputInterface $input, OutputInterface $output) {
124
-
125
-		try {
126
-			if ($this->encryptionManager->isEnabled() === true) {
127
-				$output->write('Disable server side encryption... ');
128
-				$this->config->setAppValue('core', 'encryption_enabled', 'no');
129
-				$output->writeln('done.');
130
-			} else {
131
-				$output->writeln('Server side encryption not enabled. Nothing to do.');
132
-				return;
133
-			}
134
-
135
-			$uid = $input->getArgument('user');
136
-			if ($uid === '') {
137
-				$message = 'your Nextcloud';
138
-			} else {
139
-				$message = "$uid's account";
140
-			}
141
-
142
-			$output->writeln("\n");
143
-			$output->writeln("You are about to start to decrypt all files stored in $message.");
144
-			$output->writeln('It will depend on the encryption module and your setup if this is possible.');
145
-			$output->writeln('Depending on the number and size of your files this can take some time');
146
-			$output->writeln('Please make sure that no user access his files during this process!');
147
-			$output->writeln('');
148
-			$question = new ConfirmationQuestion('Do you really want to continue? (y/n) ', false);
149
-			if ($this->questionHelper->ask($input, $output, $question)) {
150
-				$this->forceMaintenanceAndTrashbin();
151
-				$user = $input->getArgument('user');
152
-				$result = $this->decryptAll->decryptAll($input, $output, $user);
153
-				if ($result === false) {
154
-					$output->writeln(' aborted.');
155
-					$output->writeln('Server side encryption remains enabled');
156
-					$this->config->setAppValue('core', 'encryption_enabled', 'yes');
157
-				} else if ($uid !== '') {
158
-					$output->writeln('Server side encryption remains enabled');
159
-					$this->config->setAppValue('core', 'encryption_enabled', 'yes');
160
-				}
161
-				$this->resetMaintenanceAndTrashbin();
162
-			} else {
163
-				$output->write('Enable server side encryption... ');
164
-				$this->config->setAppValue('core', 'encryption_enabled', 'yes');
165
-				$output->writeln('done.');
166
-				$output->writeln('aborted');
167
-			}
168
-		} catch (\Exception $e) {
169
-			// enable server side encryption again if something went wrong
170
-			$this->config->setAppValue('core', 'encryption_enabled', 'yes');
171
-			$this->resetMaintenanceAndTrashbin();
172
-			throw $e;
173
-		}
174
-
175
-	}
41
+    /** @var IManager */
42
+    protected $encryptionManager;
43
+
44
+    /** @var  IAppManager */
45
+    protected $appManager;
46
+
47
+    /** @var IConfig */
48
+    protected $config;
49
+
50
+    /** @var  QuestionHelper */
51
+    protected $questionHelper;
52
+
53
+    /** @var bool */
54
+    protected $wasTrashbinEnabled;
55
+
56
+    /** @var  bool */
57
+    protected $wasMaintenanceModeEnabled;
58
+
59
+    /** @var \OC\Encryption\DecryptAll */
60
+    protected $decryptAll;
61
+
62
+    /**
63
+     * @param IManager $encryptionManager
64
+     * @param IAppManager $appManager
65
+     * @param IConfig $config
66
+     * @param \OC\Encryption\DecryptAll $decryptAll
67
+     * @param QuestionHelper $questionHelper
68
+     */
69
+    public function __construct(
70
+        IManager $encryptionManager,
71
+        IAppManager $appManager,
72
+        IConfig $config,
73
+        \OC\Encryption\DecryptAll $decryptAll,
74
+        QuestionHelper $questionHelper
75
+    ) {
76
+        parent::__construct();
77
+
78
+        $this->appManager = $appManager;
79
+        $this->encryptionManager = $encryptionManager;
80
+        $this->config = $config;
81
+        $this->decryptAll = $decryptAll;
82
+        $this->questionHelper = $questionHelper;
83
+    }
84
+
85
+    /**
86
+     * Set maintenance mode and disable the trashbin app
87
+     */
88
+    protected function forceMaintenanceAndTrashbin() {
89
+        $this->wasTrashbinEnabled = $this->appManager->isEnabledForUser('files_trashbin');
90
+        $this->wasMaintenanceModeEnabled = $this->config->getSystemValue('maintenance', false);
91
+        $this->config->setSystemValue('maintenance', true);
92
+        $this->appManager->disableApp('files_trashbin');
93
+    }
94
+
95
+    /**
96
+     * Reset the maintenance mode and re-enable the trashbin app
97
+     */
98
+    protected function resetMaintenanceAndTrashbin() {
99
+        $this->config->setSystemValue('maintenance', $this->wasMaintenanceModeEnabled);
100
+        if ($this->wasTrashbinEnabled) {
101
+            $this->appManager->enableApp('files_trashbin');
102
+        }
103
+    }
104
+
105
+    protected function configure() {
106
+        parent::configure();
107
+
108
+        $this->setName('encryption:decrypt-all');
109
+        $this->setDescription('Disable server-side encryption and decrypt all files');
110
+        $this->setHelp(
111
+            'This will disable server-side encryption and decrypt all files for '
112
+            . 'all users if it is supported by your encryption module. '
113
+            . 'Please make sure that no user access his files during this process!'
114
+        );
115
+        $this->addArgument(
116
+            'user',
117
+            InputArgument::OPTIONAL,
118
+            'user for which you want to decrypt all files (optional)',
119
+            ''
120
+        );
121
+    }
122
+
123
+    protected function execute(InputInterface $input, OutputInterface $output) {
124
+
125
+        try {
126
+            if ($this->encryptionManager->isEnabled() === true) {
127
+                $output->write('Disable server side encryption... ');
128
+                $this->config->setAppValue('core', 'encryption_enabled', 'no');
129
+                $output->writeln('done.');
130
+            } else {
131
+                $output->writeln('Server side encryption not enabled. Nothing to do.');
132
+                return;
133
+            }
134
+
135
+            $uid = $input->getArgument('user');
136
+            if ($uid === '') {
137
+                $message = 'your Nextcloud';
138
+            } else {
139
+                $message = "$uid's account";
140
+            }
141
+
142
+            $output->writeln("\n");
143
+            $output->writeln("You are about to start to decrypt all files stored in $message.");
144
+            $output->writeln('It will depend on the encryption module and your setup if this is possible.');
145
+            $output->writeln('Depending on the number and size of your files this can take some time');
146
+            $output->writeln('Please make sure that no user access his files during this process!');
147
+            $output->writeln('');
148
+            $question = new ConfirmationQuestion('Do you really want to continue? (y/n) ', false);
149
+            if ($this->questionHelper->ask($input, $output, $question)) {
150
+                $this->forceMaintenanceAndTrashbin();
151
+                $user = $input->getArgument('user');
152
+                $result = $this->decryptAll->decryptAll($input, $output, $user);
153
+                if ($result === false) {
154
+                    $output->writeln(' aborted.');
155
+                    $output->writeln('Server side encryption remains enabled');
156
+                    $this->config->setAppValue('core', 'encryption_enabled', 'yes');
157
+                } else if ($uid !== '') {
158
+                    $output->writeln('Server side encryption remains enabled');
159
+                    $this->config->setAppValue('core', 'encryption_enabled', 'yes');
160
+                }
161
+                $this->resetMaintenanceAndTrashbin();
162
+            } else {
163
+                $output->write('Enable server side encryption... ');
164
+                $this->config->setAppValue('core', 'encryption_enabled', 'yes');
165
+                $output->writeln('done.');
166
+                $output->writeln('aborted');
167
+            }
168
+        } catch (\Exception $e) {
169
+            // enable server side encryption again if something went wrong
170
+            $this->config->setAppValue('core', 'encryption_enabled', 'yes');
171
+            $this->resetMaintenanceAndTrashbin();
172
+            throw $e;
173
+        }
174
+
175
+    }
176 176
 }
Please login to merge, or discard this patch.
apps/dav/lib/DAV/GroupPrincipalBackend.php 1 patch
Indentation   +168 added lines, -168 removed lines patch added patch discarded remove patch
@@ -30,172 +30,172 @@
 block discarded – undo
30 30
 
31 31
 class GroupPrincipalBackend implements BackendInterface {
32 32
 
33
-	const PRINCIPAL_PREFIX = 'principals/groups';
34
-
35
-	/** @var IGroupManager */
36
-	private $groupManager;
37
-
38
-	/**
39
-	 * @param IGroupManager $IGroupManager
40
-	 */
41
-	public function __construct(IGroupManager $IGroupManager) {
42
-		$this->groupManager = $IGroupManager;
43
-	}
44
-
45
-	/**
46
-	 * Returns a list of principals based on a prefix.
47
-	 *
48
-	 * This prefix will often contain something like 'principals'. You are only
49
-	 * expected to return principals that are in this base path.
50
-	 *
51
-	 * You are expected to return at least a 'uri' for every user, you can
52
-	 * return any additional properties if you wish so. Common properties are:
53
-	 *   {DAV:}displayname
54
-	 *
55
-	 * @param string $prefixPath
56
-	 * @return string[]
57
-	 */
58
-	public function getPrincipalsByPrefix($prefixPath) {
59
-		$principals = [];
60
-
61
-		if ($prefixPath === self::PRINCIPAL_PREFIX) {
62
-			foreach($this->groupManager->search('') as $user) {
63
-				$principals[] = $this->groupToPrincipal($user);
64
-			}
65
-		}
66
-
67
-		return $principals;
68
-	}
69
-
70
-	/**
71
-	 * Returns a specific principal, specified by it's path.
72
-	 * The returned structure should be the exact same as from
73
-	 * getPrincipalsByPrefix.
74
-	 *
75
-	 * @param string $path
76
-	 * @return array
77
-	 */
78
-	public function getPrincipalByPath($path) {
79
-		$elements = explode('/', $path,  3);
80
-		if ($elements[0] !== 'principals') {
81
-			return null;
82
-		}
83
-		if ($elements[1] !== 'groups') {
84
-			return null;
85
-		}
86
-		$name = urldecode($elements[2]);
87
-		$group = $this->groupManager->get($name);
88
-
89
-		if (!is_null($group)) {
90
-			return $this->groupToPrincipal($group);
91
-		}
92
-
93
-		return null;
94
-	}
95
-
96
-	/**
97
-	 * Returns the list of members for a group-principal
98
-	 *
99
-	 * @param string $principal
100
-	 * @return string[]
101
-	 * @throws Exception
102
-	 */
103
-	public function getGroupMemberSet($principal) {
104
-		$elements = explode('/', $principal);
105
-		if ($elements[0] !== 'principals') {
106
-			return [];
107
-		}
108
-		if ($elements[1] !== 'groups') {
109
-			return [];
110
-		}
111
-		$name = $elements[2];
112
-		$group = $this->groupManager->get($name);
113
-
114
-		if (is_null($group)) {
115
-			return [];
116
-		}
117
-
118
-		return array_map(function($user) {
119
-			return $this->userToPrincipal($user);
120
-		}, $group->getUsers());
121
-	}
122
-
123
-	/**
124
-	 * Returns the list of groups a principal is a member of
125
-	 *
126
-	 * @param string $principal
127
-	 * @return array
128
-	 * @throws Exception
129
-	 */
130
-	public function getGroupMembership($principal) {
131
-		return [];
132
-	}
133
-
134
-	/**
135
-	 * Updates the list of group members for a group principal.
136
-	 *
137
-	 * The principals should be passed as a list of uri's.
138
-	 *
139
-	 * @param string $principal
140
-	 * @param string[] $members
141
-	 * @throws Exception
142
-	 */
143
-	public function setGroupMemberSet($principal, array $members) {
144
-		throw new Exception('Setting members of the group is not supported yet');
145
-	}
146
-
147
-	/**
148
-	 * @param string $path
149
-	 * @param PropPatch $propPatch
150
-	 * @return int
151
-	 */
152
-	function updatePrincipal($path, PropPatch $propPatch) {
153
-		return 0;
154
-	}
155
-
156
-	/**
157
-	 * @param string $prefixPath
158
-	 * @param array $searchProperties
159
-	 * @param string $test
160
-	 * @return array
161
-	 */
162
-	function searchPrincipals($prefixPath, array $searchProperties, $test = 'allof') {
163
-		return [];
164
-	}
165
-
166
-	/**
167
-	 * @param string $uri
168
-	 * @param string $principalPrefix
169
-	 * @return string
170
-	 */
171
-	function findByUri($uri, $principalPrefix) {
172
-		return '';
173
-	}
174
-
175
-	/**
176
-	 * @param IGroup $group
177
-	 * @return array
178
-	 */
179
-	protected function groupToPrincipal($group) {
180
-		$groupId = $group->getGID();
181
-		$principal = [
182
-			'uri' => 'principals/groups/' . urlencode($groupId),
183
-			'{DAV:}displayname' => $groupId,
184
-		];
185
-
186
-		return $principal;
187
-	}
188
-
189
-	/**
190
-	 * @param IUser $user
191
-	 * @return array
192
-	 */
193
-	protected function userToPrincipal($user) {
194
-		$principal = [
195
-			'uri' => 'principals/users/' . $user->getUID(),
196
-			'{DAV:}displayname' => $user->getDisplayName(),
197
-		];
198
-
199
-		return $principal;
200
-	}
33
+    const PRINCIPAL_PREFIX = 'principals/groups';
34
+
35
+    /** @var IGroupManager */
36
+    private $groupManager;
37
+
38
+    /**
39
+     * @param IGroupManager $IGroupManager
40
+     */
41
+    public function __construct(IGroupManager $IGroupManager) {
42
+        $this->groupManager = $IGroupManager;
43
+    }
44
+
45
+    /**
46
+     * Returns a list of principals based on a prefix.
47
+     *
48
+     * This prefix will often contain something like 'principals'. You are only
49
+     * expected to return principals that are in this base path.
50
+     *
51
+     * You are expected to return at least a 'uri' for every user, you can
52
+     * return any additional properties if you wish so. Common properties are:
53
+     *   {DAV:}displayname
54
+     *
55
+     * @param string $prefixPath
56
+     * @return string[]
57
+     */
58
+    public function getPrincipalsByPrefix($prefixPath) {
59
+        $principals = [];
60
+
61
+        if ($prefixPath === self::PRINCIPAL_PREFIX) {
62
+            foreach($this->groupManager->search('') as $user) {
63
+                $principals[] = $this->groupToPrincipal($user);
64
+            }
65
+        }
66
+
67
+        return $principals;
68
+    }
69
+
70
+    /**
71
+     * Returns a specific principal, specified by it's path.
72
+     * The returned structure should be the exact same as from
73
+     * getPrincipalsByPrefix.
74
+     *
75
+     * @param string $path
76
+     * @return array
77
+     */
78
+    public function getPrincipalByPath($path) {
79
+        $elements = explode('/', $path,  3);
80
+        if ($elements[0] !== 'principals') {
81
+            return null;
82
+        }
83
+        if ($elements[1] !== 'groups') {
84
+            return null;
85
+        }
86
+        $name = urldecode($elements[2]);
87
+        $group = $this->groupManager->get($name);
88
+
89
+        if (!is_null($group)) {
90
+            return $this->groupToPrincipal($group);
91
+        }
92
+
93
+        return null;
94
+    }
95
+
96
+    /**
97
+     * Returns the list of members for a group-principal
98
+     *
99
+     * @param string $principal
100
+     * @return string[]
101
+     * @throws Exception
102
+     */
103
+    public function getGroupMemberSet($principal) {
104
+        $elements = explode('/', $principal);
105
+        if ($elements[0] !== 'principals') {
106
+            return [];
107
+        }
108
+        if ($elements[1] !== 'groups') {
109
+            return [];
110
+        }
111
+        $name = $elements[2];
112
+        $group = $this->groupManager->get($name);
113
+
114
+        if (is_null($group)) {
115
+            return [];
116
+        }
117
+
118
+        return array_map(function($user) {
119
+            return $this->userToPrincipal($user);
120
+        }, $group->getUsers());
121
+    }
122
+
123
+    /**
124
+     * Returns the list of groups a principal is a member of
125
+     *
126
+     * @param string $principal
127
+     * @return array
128
+     * @throws Exception
129
+     */
130
+    public function getGroupMembership($principal) {
131
+        return [];
132
+    }
133
+
134
+    /**
135
+     * Updates the list of group members for a group principal.
136
+     *
137
+     * The principals should be passed as a list of uri's.
138
+     *
139
+     * @param string $principal
140
+     * @param string[] $members
141
+     * @throws Exception
142
+     */
143
+    public function setGroupMemberSet($principal, array $members) {
144
+        throw new Exception('Setting members of the group is not supported yet');
145
+    }
146
+
147
+    /**
148
+     * @param string $path
149
+     * @param PropPatch $propPatch
150
+     * @return int
151
+     */
152
+    function updatePrincipal($path, PropPatch $propPatch) {
153
+        return 0;
154
+    }
155
+
156
+    /**
157
+     * @param string $prefixPath
158
+     * @param array $searchProperties
159
+     * @param string $test
160
+     * @return array
161
+     */
162
+    function searchPrincipals($prefixPath, array $searchProperties, $test = 'allof') {
163
+        return [];
164
+    }
165
+
166
+    /**
167
+     * @param string $uri
168
+     * @param string $principalPrefix
169
+     * @return string
170
+     */
171
+    function findByUri($uri, $principalPrefix) {
172
+        return '';
173
+    }
174
+
175
+    /**
176
+     * @param IGroup $group
177
+     * @return array
178
+     */
179
+    protected function groupToPrincipal($group) {
180
+        $groupId = $group->getGID();
181
+        $principal = [
182
+            'uri' => 'principals/groups/' . urlencode($groupId),
183
+            '{DAV:}displayname' => $groupId,
184
+        ];
185
+
186
+        return $principal;
187
+    }
188
+
189
+    /**
190
+     * @param IUser $user
191
+     * @return array
192
+     */
193
+    protected function userToPrincipal($user) {
194
+        $principal = [
195
+            'uri' => 'principals/users/' . $user->getUID(),
196
+            '{DAV:}displayname' => $user->getDisplayName(),
197
+        ];
198
+
199
+        return $principal;
200
+    }
201 201
 }
Please login to merge, or discard this patch.
apps/dav/lib/Connector/Sabre/FakeLockerPlugin.php 1 patch
Indentation   +99 added lines, -99 removed lines patch added patch discarded remove patch
@@ -45,114 +45,114 @@
 block discarded – undo
45 45
  * @package OCA\DAV\Connector\Sabre
46 46
  */
47 47
 class FakeLockerPlugin extends ServerPlugin {
48
-	/** @var \Sabre\DAV\Server */
49
-	private $server;
48
+    /** @var \Sabre\DAV\Server */
49
+    private $server;
50 50
 
51
-	/** {@inheritDoc} */
52
-	public function initialize(\Sabre\DAV\Server $server) {
53
-		$this->server = $server;
54
-		$this->server->on('method:LOCK', [$this, 'fakeLockProvider'], 1);
55
-		$this->server->on('method:UNLOCK', [$this, 'fakeUnlockProvider'], 1);
56
-		$server->on('propFind', [$this, 'propFind']);
57
-		$server->on('validateTokens', [$this, 'validateTokens']);
58
-	}
51
+    /** {@inheritDoc} */
52
+    public function initialize(\Sabre\DAV\Server $server) {
53
+        $this->server = $server;
54
+        $this->server->on('method:LOCK', [$this, 'fakeLockProvider'], 1);
55
+        $this->server->on('method:UNLOCK', [$this, 'fakeUnlockProvider'], 1);
56
+        $server->on('propFind', [$this, 'propFind']);
57
+        $server->on('validateTokens', [$this, 'validateTokens']);
58
+    }
59 59
 
60
-	/**
61
-	 * Indicate that we support LOCK and UNLOCK
62
-	 *
63
-	 * @param string $path
64
-	 * @return string[]
65
-	 */
66
-	public function getHTTPMethods($path) {
67
-		return [
68
-			'LOCK',
69
-			'UNLOCK',
70
-		];
71
-	}
60
+    /**
61
+     * Indicate that we support LOCK and UNLOCK
62
+     *
63
+     * @param string $path
64
+     * @return string[]
65
+     */
66
+    public function getHTTPMethods($path) {
67
+        return [
68
+            'LOCK',
69
+            'UNLOCK',
70
+        ];
71
+    }
72 72
 
73
-	/**
74
-	 * Indicate that we support locking
75
-	 *
76
-	 * @return integer[]
77
-	 */
78
-	function getFeatures() {
79
-		return [2];
80
-	}
73
+    /**
74
+     * Indicate that we support locking
75
+     *
76
+     * @return integer[]
77
+     */
78
+    function getFeatures() {
79
+        return [2];
80
+    }
81 81
 
82
-	/**
83
-	 * Return some dummy response for PROPFIND requests with regard to locking
84
-	 *
85
-	 * @param PropFind $propFind
86
-	 * @param INode $node
87
-	 * @return void
88
-	 */
89
-	function propFind(PropFind $propFind, INode $node) {
90
-		$propFind->handle('{DAV:}supportedlock', function() {
91
-			return new SupportedLock(true);
92
-		});
93
-		$propFind->handle('{DAV:}lockdiscovery', function() use ($propFind) {
94
-			return new LockDiscovery([]);
95
-		});
96
-	}
82
+    /**
83
+     * Return some dummy response for PROPFIND requests with regard to locking
84
+     *
85
+     * @param PropFind $propFind
86
+     * @param INode $node
87
+     * @return void
88
+     */
89
+    function propFind(PropFind $propFind, INode $node) {
90
+        $propFind->handle('{DAV:}supportedlock', function() {
91
+            return new SupportedLock(true);
92
+        });
93
+        $propFind->handle('{DAV:}lockdiscovery', function() use ($propFind) {
94
+            return new LockDiscovery([]);
95
+        });
96
+    }
97 97
 
98
-	/**
99
-	 * Mark a locking token always as valid
100
-	 *
101
-	 * @param RequestInterface $request
102
-	 * @param array $conditions
103
-	 */
104
-	public function validateTokens(RequestInterface $request, &$conditions) {
105
-		foreach($conditions as &$fileCondition) {
106
-			if(isset($fileCondition['tokens'])) {
107
-				foreach($fileCondition['tokens'] as &$token) {
108
-					if(isset($token['token'])) {
109
-						if(substr($token['token'], 0, 16) === 'opaquelocktoken:') {
110
-							$token['validToken'] = true;
111
-						}
112
-					}
113
-				}
114
-			}
115
-		}
116
-	}
98
+    /**
99
+     * Mark a locking token always as valid
100
+     *
101
+     * @param RequestInterface $request
102
+     * @param array $conditions
103
+     */
104
+    public function validateTokens(RequestInterface $request, &$conditions) {
105
+        foreach($conditions as &$fileCondition) {
106
+            if(isset($fileCondition['tokens'])) {
107
+                foreach($fileCondition['tokens'] as &$token) {
108
+                    if(isset($token['token'])) {
109
+                        if(substr($token['token'], 0, 16) === 'opaquelocktoken:') {
110
+                            $token['validToken'] = true;
111
+                        }
112
+                    }
113
+                }
114
+            }
115
+        }
116
+    }
117 117
 
118
-	/**
119
-	 * Fakes a successful LOCK
120
-	 *
121
-	 * @param RequestInterface $request
122
-	 * @param ResponseInterface $response
123
-	 * @return bool
124
-	 */
125
-	public function fakeLockProvider(RequestInterface $request,
126
-									 ResponseInterface $response) {
118
+    /**
119
+     * Fakes a successful LOCK
120
+     *
121
+     * @param RequestInterface $request
122
+     * @param ResponseInterface $response
123
+     * @return bool
124
+     */
125
+    public function fakeLockProvider(RequestInterface $request,
126
+                                        ResponseInterface $response) {
127 127
 
128
-		$lockInfo = new LockInfo();
129
-		$lockInfo->token = md5($request->getPath());
130
-		$lockInfo->uri = $request->getPath();
131
-		$lockInfo->depth = \Sabre\DAV\Server::DEPTH_INFINITY;
132
-		$lockInfo->timeout = 1800;
128
+        $lockInfo = new LockInfo();
129
+        $lockInfo->token = md5($request->getPath());
130
+        $lockInfo->uri = $request->getPath();
131
+        $lockInfo->depth = \Sabre\DAV\Server::DEPTH_INFINITY;
132
+        $lockInfo->timeout = 1800;
133 133
 
134
-		$body = $this->server->xml->write('{DAV:}prop', [
135
-				'{DAV:}lockdiscovery' =>
136
-						new LockDiscovery([$lockInfo])
137
-		]);
134
+        $body = $this->server->xml->write('{DAV:}prop', [
135
+                '{DAV:}lockdiscovery' =>
136
+                        new LockDiscovery([$lockInfo])
137
+        ]);
138 138
 
139
-		$response->setStatus(200);
140
-		$response->setBody($body);
139
+        $response->setStatus(200);
140
+        $response->setBody($body);
141 141
 
142
-		return false;
143
-	}
142
+        return false;
143
+    }
144 144
 
145
-	/**
146
-	 * Fakes a successful LOCK
147
-	 *
148
-	 * @param RequestInterface $request
149
-	 * @param ResponseInterface $response
150
-	 * @return bool
151
-	 */
152
-	public function fakeUnlockProvider(RequestInterface $request,
153
-									 ResponseInterface $response) {
154
-		$response->setStatus(204);
155
-		$response->setHeader('Content-Length', '0');
156
-		return false;
157
-	}
145
+    /**
146
+     * Fakes a successful LOCK
147
+     *
148
+     * @param RequestInterface $request
149
+     * @param ResponseInterface $response
150
+     * @return bool
151
+     */
152
+    public function fakeUnlockProvider(RequestInterface $request,
153
+                                        ResponseInterface $response) {
154
+        $response->setStatus(204);
155
+        $response->setHeader('Content-Length', '0');
156
+        return false;
157
+    }
158 158
 }
Please login to merge, or discard this patch.
lib/public/Files/Search/ISearchQuery.php 1 patch
Indentation   +33 added lines, -33 removed lines patch added patch discarded remove patch
@@ -27,41 +27,41 @@
 block discarded – undo
27 27
  * @since 12.0.0
28 28
  */
29 29
 interface ISearchQuery {
30
-	/**
31
-	 * @return ISearchOperator
32
-	 * @since 12.0.0
33
-	 */
34
-	public function getSearchOperation();
30
+    /**
31
+     * @return ISearchOperator
32
+     * @since 12.0.0
33
+     */
34
+    public function getSearchOperation();
35 35
 
36
-	/**
37
-	 * Get the maximum number of results to return
38
-	 *
39
-	 * @return integer
40
-	 * @since 12.0.0
41
-	 */
42
-	public function getLimit();
36
+    /**
37
+     * Get the maximum number of results to return
38
+     *
39
+     * @return integer
40
+     * @since 12.0.0
41
+     */
42
+    public function getLimit();
43 43
 
44
-	/**
45
-	 * Get the offset for returned results
46
-	 *
47
-	 * @return integer
48
-	 * @since 12.0.0
49
-	 */
50
-	public function getOffset();
44
+    /**
45
+     * Get the offset for returned results
46
+     *
47
+     * @return integer
48
+     * @since 12.0.0
49
+     */
50
+    public function getOffset();
51 51
 
52
-	/**
53
-	 * The fields and directions to order by
54
-	 *
55
-	 * @return ISearchOrder[]
56
-	 * @since 12.0.0
57
-	 */
58
-	public function getOrder();
52
+    /**
53
+     * The fields and directions to order by
54
+     *
55
+     * @return ISearchOrder[]
56
+     * @since 12.0.0
57
+     */
58
+    public function getOrder();
59 59
 
60
-	/**
61
-	 * The user that issued the search
62
-	 *
63
-	 * @return IUser
64
-	 * @since 12.0.0
65
-	 */
66
-	public function getUser();
60
+    /**
61
+     * The user that issued the search
62
+     *
63
+     * @return IUser
64
+     * @since 12.0.0
65
+     */
66
+    public function getUser();
67 67
 }
Please login to merge, or discard this patch.
lib/private/Files/Search/SearchQuery.php 1 patch
Indentation   +56 added lines, -56 removed lines patch added patch discarded remove patch
@@ -27,66 +27,66 @@
 block discarded – undo
27 27
 use OCP\IUser;
28 28
 
29 29
 class SearchQuery implements ISearchQuery {
30
-	/** @var  ISearchOperator */
31
-	private $searchOperation;
32
-	/** @var  integer */
33
-	private $limit;
34
-	/** @var  integer */
35
-	private $offset;
36
-	/** @var  ISearchOrder[] */
37
-	private $order;
38
-	/** @var IUser */
39
-	private $user;
30
+    /** @var  ISearchOperator */
31
+    private $searchOperation;
32
+    /** @var  integer */
33
+    private $limit;
34
+    /** @var  integer */
35
+    private $offset;
36
+    /** @var  ISearchOrder[] */
37
+    private $order;
38
+    /** @var IUser */
39
+    private $user;
40 40
 
41
-	/**
42
-	 * SearchQuery constructor.
43
-	 *
44
-	 * @param ISearchOperator $searchOperation
45
-	 * @param int $limit
46
-	 * @param int $offset
47
-	 * @param array $order
48
-	 * @param IUser $user
49
-	 */
50
-	public function __construct(ISearchOperator $searchOperation, $limit, $offset, array $order, IUser $user) {
51
-		$this->searchOperation = $searchOperation;
52
-		$this->limit = $limit;
53
-		$this->offset = $offset;
54
-		$this->order = $order;
55
-		$this->user = $user;
56
-	}
41
+    /**
42
+     * SearchQuery constructor.
43
+     *
44
+     * @param ISearchOperator $searchOperation
45
+     * @param int $limit
46
+     * @param int $offset
47
+     * @param array $order
48
+     * @param IUser $user
49
+     */
50
+    public function __construct(ISearchOperator $searchOperation, $limit, $offset, array $order, IUser $user) {
51
+        $this->searchOperation = $searchOperation;
52
+        $this->limit = $limit;
53
+        $this->offset = $offset;
54
+        $this->order = $order;
55
+        $this->user = $user;
56
+    }
57 57
 
58
-	/**
59
-	 * @return ISearchOperator
60
-	 */
61
-	public function getSearchOperation() {
62
-		return $this->searchOperation;
63
-	}
58
+    /**
59
+     * @return ISearchOperator
60
+     */
61
+    public function getSearchOperation() {
62
+        return $this->searchOperation;
63
+    }
64 64
 
65
-	/**
66
-	 * @return int
67
-	 */
68
-	public function getLimit() {
69
-		return $this->limit;
70
-	}
65
+    /**
66
+     * @return int
67
+     */
68
+    public function getLimit() {
69
+        return $this->limit;
70
+    }
71 71
 
72
-	/**
73
-	 * @return int
74
-	 */
75
-	public function getOffset() {
76
-		return $this->offset;
77
-	}
72
+    /**
73
+     * @return int
74
+     */
75
+    public function getOffset() {
76
+        return $this->offset;
77
+    }
78 78
 
79
-	/**
80
-	 * @return ISearchOrder[]
81
-	 */
82
-	public function getOrder() {
83
-		return $this->order;
84
-	}
79
+    /**
80
+     * @return ISearchOrder[]
81
+     */
82
+    public function getOrder() {
83
+        return $this->order;
84
+    }
85 85
 
86
-	/**
87
-	 * @return IUser
88
-	 */
89
-	public function getUser() {
90
-		return $this->user;
91
-	}
86
+    /**
87
+     * @return IUser
88
+     */
89
+    public function getUser() {
90
+        return $this->user;
91
+    }
92 92
 }
Please login to merge, or discard this patch.
lib/private/OCS/Provider.php 1 patch
Indentation   +81 added lines, -81 removed lines patch added patch discarded remove patch
@@ -24,92 +24,92 @@
 block discarded – undo
24 24
 namespace OC\OCS;
25 25
 
26 26
 class Provider extends \OCP\AppFramework\Controller {
27
-	/** @var \OCP\App\IAppManager */
28
-	private $appManager;
27
+    /** @var \OCP\App\IAppManager */
28
+    private $appManager;
29 29
 
30
-	/**
31
-	 * @param string $appName
32
-	 * @param \OCP\IRequest $request
33
-	 * @param \OCP\App\IAppManager $appManager
34
-	 */
35
-	public function __construct($appName,
36
-								\OCP\IRequest $request,
37
-								\OCP\App\IAppManager $appManager) {
38
-		parent::__construct($appName, $request);
39
-		$this->appManager = $appManager;
40
-	}
30
+    /**
31
+     * @param string $appName
32
+     * @param \OCP\IRequest $request
33
+     * @param \OCP\App\IAppManager $appManager
34
+     */
35
+    public function __construct($appName,
36
+                                \OCP\IRequest $request,
37
+                                \OCP\App\IAppManager $appManager) {
38
+        parent::__construct($appName, $request);
39
+        $this->appManager = $appManager;
40
+    }
41 41
 
42
-	/**
43
-	 * @return \OCP\AppFramework\Http\JSONResponse
44
-	 */
45
-	public function buildProviderList() {
46
-		$services = [
47
-			'PRIVATE_DATA' => [
48
-				'version' => 1,
49
-				'endpoints' => [
50
-					'store' => '/ocs/v2.php/privatedata/setattribute',
51
-					'read' => '/ocs/v2.php/privatedata/getattribute',
52
-					'delete' => '/ocs/v2.php/privatedata/deleteattribute',
53
-				],
54
-			],
55
-		];
42
+    /**
43
+     * @return \OCP\AppFramework\Http\JSONResponse
44
+     */
45
+    public function buildProviderList() {
46
+        $services = [
47
+            'PRIVATE_DATA' => [
48
+                'version' => 1,
49
+                'endpoints' => [
50
+                    'store' => '/ocs/v2.php/privatedata/setattribute',
51
+                    'read' => '/ocs/v2.php/privatedata/getattribute',
52
+                    'delete' => '/ocs/v2.php/privatedata/deleteattribute',
53
+                ],
54
+            ],
55
+        ];
56 56
 
57
-		if($this->appManager->isEnabledForUser('files_sharing')) {
58
-			$services['SHARING'] = [
59
-				'version' => 1,
60
-				'endpoints' => [
61
-					'share' => '/ocs/v2.php/apps/files_sharing/api/v1/shares',
62
-				],
63
-			];
64
-			$services['FEDERATED_SHARING'] = [
65
-				'version' => 1,
66
-				'endpoints' => [
67
-					'share' => '/ocs/v2.php/cloud/shares',
68
-					'webdav' => '/public.php/webdav/',
69
-				],
70
-			];
71
-		}
57
+        if($this->appManager->isEnabledForUser('files_sharing')) {
58
+            $services['SHARING'] = [
59
+                'version' => 1,
60
+                'endpoints' => [
61
+                    'share' => '/ocs/v2.php/apps/files_sharing/api/v1/shares',
62
+                ],
63
+            ];
64
+            $services['FEDERATED_SHARING'] = [
65
+                'version' => 1,
66
+                'endpoints' => [
67
+                    'share' => '/ocs/v2.php/cloud/shares',
68
+                    'webdav' => '/public.php/webdav/',
69
+                ],
70
+            ];
71
+        }
72 72
 
73
-		if ($this->appManager->isEnabledForUser('federation')) {
74
-			if (isset($services['FEDERATED_SHARING'])) {
75
-				$services['FEDERATED_SHARING']['endpoints']['shared-secret'] = '/ocs/v2.php/cloud/shared-secret';
76
-				$services['FEDERATED_SHARING']['endpoints']['system-address-book'] = '/remote.php/dav/addressbooks/system/system/system';
77
-				$services['FEDERATED_SHARING']['endpoints']['carddav-user'] = 'system';
78
-			} else {
79
-				$services['FEDERATED_SHARING'] = [
80
-					'version' => 1,
81
-					'endpoints' => [
82
-						'shared-secret' => '/ocs/v2.php/cloud/shared-secret',
83
-						'system-address-book' => '/remote.php/dav/addressbooks/system/system/system',
84
-						'carddav-user' => 'system'
85
-					],
86
-				];
87
-			}
88
-		}
73
+        if ($this->appManager->isEnabledForUser('federation')) {
74
+            if (isset($services['FEDERATED_SHARING'])) {
75
+                $services['FEDERATED_SHARING']['endpoints']['shared-secret'] = '/ocs/v2.php/cloud/shared-secret';
76
+                $services['FEDERATED_SHARING']['endpoints']['system-address-book'] = '/remote.php/dav/addressbooks/system/system/system';
77
+                $services['FEDERATED_SHARING']['endpoints']['carddav-user'] = 'system';
78
+            } else {
79
+                $services['FEDERATED_SHARING'] = [
80
+                    'version' => 1,
81
+                    'endpoints' => [
82
+                        'shared-secret' => '/ocs/v2.php/cloud/shared-secret',
83
+                        'system-address-book' => '/remote.php/dav/addressbooks/system/system/system',
84
+                        'carddav-user' => 'system'
85
+                    ],
86
+                ];
87
+            }
88
+        }
89 89
 
90
-		if($this->appManager->isEnabledForUser('activity')) {
91
-			$services['ACTIVITY'] = [
92
-				'version' => 1,
93
-				'endpoints' => [
94
-					'list' => '/ocs/v2.php/cloud/activity',
95
-				],
96
-			];
97
-		}
90
+        if($this->appManager->isEnabledForUser('activity')) {
91
+            $services['ACTIVITY'] = [
92
+                'version' => 1,
93
+                'endpoints' => [
94
+                    'list' => '/ocs/v2.php/cloud/activity',
95
+                ],
96
+            ];
97
+        }
98 98
 
99
-		if($this->appManager->isEnabledForUser('provisioning_api')) {
100
-			$services['PROVISIONING'] = [
101
-				'version' => 1,
102
-				'endpoints' => [
103
-					'user' => '/ocs/v2.php/cloud/users',
104
-					'groups' => '/ocs/v2.php/cloud/groups',
105
-					'apps' => '/ocs/v2.php/cloud/apps',
106
-				],
107
-			];
108
-		}
99
+        if($this->appManager->isEnabledForUser('provisioning_api')) {
100
+            $services['PROVISIONING'] = [
101
+                'version' => 1,
102
+                'endpoints' => [
103
+                    'user' => '/ocs/v2.php/cloud/users',
104
+                    'groups' => '/ocs/v2.php/cloud/groups',
105
+                    'apps' => '/ocs/v2.php/cloud/apps',
106
+                ],
107
+            ];
108
+        }
109 109
 
110
-		return new \OCP\AppFramework\Http\JSONResponse([
111
-			'version' => 2,
112
-			'services' => $services,
113
-		]);
114
-	}
110
+        return new \OCP\AppFramework\Http\JSONResponse([
111
+            'version' => 2,
112
+            'services' => $services,
113
+        ]);
114
+    }
115 115
 }
Please login to merge, or discard this patch.
lib/private/Preview/MP3.php 1 patch
Indentation   +28 added lines, -28 removed lines patch added patch discarded remove patch
@@ -29,38 +29,38 @@
 block discarded – undo
29 29
 use ID3Parser\ID3Parser;
30 30
 
31 31
 class MP3 extends Provider {
32
-	/**
33
-	 * {@inheritDoc}
34
-	 */
35
-	public function getMimeType() {
36
-		return '/audio\/mpeg/';
37
-	}
32
+    /**
33
+     * {@inheritDoc}
34
+     */
35
+    public function getMimeType() {
36
+        return '/audio\/mpeg/';
37
+    }
38 38
 
39
-	/**
40
-	 * {@inheritDoc}
41
-	 */
42
-	public function getThumbnail($path, $maxX, $maxY, $scalingup, $fileview) {
43
-		$getID3 = new ID3Parser();
39
+    /**
40
+     * {@inheritDoc}
41
+     */
42
+    public function getThumbnail($path, $maxX, $maxY, $scalingup, $fileview) {
43
+        $getID3 = new ID3Parser();
44 44
 
45
-		$tmpPath = $fileview->toTmpFile($path);
46
-		$tags = $getID3->analyze($tmpPath);
47
-		unlink($tmpPath);
48
-		$picture = isset($tags['id3v2']['APIC'][0]['data']) ? $tags['id3v2']['APIC'][0]['data'] : null;
49
-		if(is_null($picture) && isset($tags['id3v2']['PIC'][0]['data'])) {
50
-			$picture = $tags['id3v2']['PIC'][0]['data'];
51
-		}
45
+        $tmpPath = $fileview->toTmpFile($path);
46
+        $tags = $getID3->analyze($tmpPath);
47
+        unlink($tmpPath);
48
+        $picture = isset($tags['id3v2']['APIC'][0]['data']) ? $tags['id3v2']['APIC'][0]['data'] : null;
49
+        if(is_null($picture) && isset($tags['id3v2']['PIC'][0]['data'])) {
50
+            $picture = $tags['id3v2']['PIC'][0]['data'];
51
+        }
52 52
 
53
-		if(!is_null($picture)) {
54
-			$image = new \OC_Image();
55
-			$image->loadFromData($picture);
53
+        if(!is_null($picture)) {
54
+            $image = new \OC_Image();
55
+            $image->loadFromData($picture);
56 56
 
57
-			if ($image->valid()) {
58
-				$image->scaleDownToFit($maxX, $maxY);
57
+            if ($image->valid()) {
58
+                $image->scaleDownToFit($maxX, $maxY);
59 59
 
60
-				return $image;
61
-			}
62
-		}
60
+                return $image;
61
+            }
62
+        }
63 63
 
64
-		return false;
65
-	}
64
+        return false;
65
+    }
66 66
 }
Please login to merge, or discard this patch.
apps/federatedfilesharing/appinfo/routes.php 1 patch
Indentation   +14 added lines, -14 removed lines patch added patch discarded remove patch
@@ -23,18 +23,18 @@
 block discarded – undo
23 23
  */
24 24
 
25 25
 return [
26
-	'routes' => [
27
-		['name' => 'MountPublicLink#createFederatedShare', 'url' => '/createFederatedShare', 'verb' => 'POST'],
28
-		['name' => 'MountPublicLink#askForFederatedShare', 'url' => '/askForFederatedShare', 'verb' => 'POST'],
29
-	],
30
-	'ocs' => [
31
-		['root' => '/cloud', 'name' => 'RequestHandler#createShare', 'url' => '/shares', 'verb' => 'POST'],
32
-		['root' => '/cloud', 'name' => 'RequestHandler#reShare', 'url' => '/shares/{id}/reshare', 'verb' => 'POST'],
33
-		['root' => '/cloud', 'name' => 'RequestHandler#updatePermissions', 'url' => '/shares/{id}/permissions', 'verb' => 'POST'],
34
-		['root' => '/cloud', 'name' => 'RequestHandler#acceptShare', 'url' => '/shares/{id}/accept', 'verb' => 'POST'],
35
-		['root' => '/cloud', 'name' => 'RequestHandler#declineShare', 'url' => '/shares/{id}/decline', 'verb' => 'POST'],
36
-		['root' => '/cloud', 'name' => 'RequestHandler#unshare', 'url' => '/shares/{id}/unshare', 'verb' => 'POST'],
37
-		['root' => '/cloud', 'name' => 'RequestHandler#revoke', 'url' => '/shares/{id}/revoke', 'verb' => 'POST'],
38
-		['root' => '/cloud', 'name' => 'RequestHandler#move', 'url' => '/shares/{id}/move', 'verb' => 'POST'],
39
-	],
26
+    'routes' => [
27
+        ['name' => 'MountPublicLink#createFederatedShare', 'url' => '/createFederatedShare', 'verb' => 'POST'],
28
+        ['name' => 'MountPublicLink#askForFederatedShare', 'url' => '/askForFederatedShare', 'verb' => 'POST'],
29
+    ],
30
+    'ocs' => [
31
+        ['root' => '/cloud', 'name' => 'RequestHandler#createShare', 'url' => '/shares', 'verb' => 'POST'],
32
+        ['root' => '/cloud', 'name' => 'RequestHandler#reShare', 'url' => '/shares/{id}/reshare', 'verb' => 'POST'],
33
+        ['root' => '/cloud', 'name' => 'RequestHandler#updatePermissions', 'url' => '/shares/{id}/permissions', 'verb' => 'POST'],
34
+        ['root' => '/cloud', 'name' => 'RequestHandler#acceptShare', 'url' => '/shares/{id}/accept', 'verb' => 'POST'],
35
+        ['root' => '/cloud', 'name' => 'RequestHandler#declineShare', 'url' => '/shares/{id}/decline', 'verb' => 'POST'],
36
+        ['root' => '/cloud', 'name' => 'RequestHandler#unshare', 'url' => '/shares/{id}/unshare', 'verb' => 'POST'],
37
+        ['root' => '/cloud', 'name' => 'RequestHandler#revoke', 'url' => '/shares/{id}/revoke', 'verb' => 'POST'],
38
+        ['root' => '/cloud', 'name' => 'RequestHandler#move', 'url' => '/shares/{id}/move', 'verb' => 'POST'],
39
+    ],
40 40
 ];
Please login to merge, or discard this patch.