@@ -338,6 +338,9 @@ discard block |
||
338 | 338 | } |
339 | 339 | } |
340 | 340 | |
341 | + /** |
|
342 | + * @param string $root |
|
343 | + */ |
|
341 | 344 | static public function init($user, $root) { |
342 | 345 | if (self::$defaultInstance) { |
343 | 346 | return false; |
@@ -521,7 +524,7 @@ discard block |
||
521 | 524 | /** |
522 | 525 | * mount an \OC\Files\Storage\Storage in our virtual filesystem |
523 | 526 | * |
524 | - * @param \OC\Files\Storage\Storage|string $class |
|
527 | + * @param string $class |
|
525 | 528 | * @param array $arguments |
526 | 529 | * @param string $mountpoint |
527 | 530 | */ |
@@ -653,6 +656,9 @@ discard block |
||
653 | 656 | return self::$defaultInstance->is_dir($path); |
654 | 657 | } |
655 | 658 | |
659 | + /** |
|
660 | + * @param string $path |
|
661 | + */ |
|
656 | 662 | static public function is_file($path) { |
657 | 663 | return self::$defaultInstance->is_file($path); |
658 | 664 | } |
@@ -665,6 +671,9 @@ discard block |
||
665 | 671 | return self::$defaultInstance->filetype($path); |
666 | 672 | } |
667 | 673 | |
674 | + /** |
|
675 | + * @param string $path |
|
676 | + */ |
|
668 | 677 | static public function filesize($path) { |
669 | 678 | return self::$defaultInstance->filesize($path); |
670 | 679 | } |
@@ -677,6 +686,9 @@ discard block |
||
677 | 686 | return self::$defaultInstance->isCreatable($path); |
678 | 687 | } |
679 | 688 | |
689 | + /** |
|
690 | + * @param string $path |
|
691 | + */ |
|
680 | 692 | static public function isReadable($path) { |
681 | 693 | return self::$defaultInstance->isReadable($path); |
682 | 694 | } |
@@ -689,6 +701,9 @@ discard block |
||
689 | 701 | return self::$defaultInstance->isDeletable($path); |
690 | 702 | } |
691 | 703 | |
704 | + /** |
|
705 | + * @param string $path |
|
706 | + */ |
|
692 | 707 | static public function isSharable($path) { |
693 | 708 | return self::$defaultInstance->isSharable($path); |
694 | 709 | } |
@@ -706,6 +721,7 @@ discard block |
||
706 | 721 | } |
707 | 722 | |
708 | 723 | /** |
724 | + * @param string $path |
|
709 | 725 | * @return string |
710 | 726 | */ |
711 | 727 | static public function file_get_contents($path) { |
@@ -728,6 +744,10 @@ discard block |
||
728 | 744 | return self::$defaultInstance->copy($path1, $path2); |
729 | 745 | } |
730 | 746 | |
747 | + /** |
|
748 | + * @param string $path |
|
749 | + * @param string $mode |
|
750 | + */ |
|
731 | 751 | static public function fopen($path, $mode) { |
732 | 752 | return self::$defaultInstance->fopen($path, $mode); |
733 | 753 | } |
@@ -743,6 +763,9 @@ discard block |
||
743 | 763 | return self::$defaultInstance->fromTmpFile($tmpFile, $path); |
744 | 764 | } |
745 | 765 | |
766 | + /** |
|
767 | + * @param string $path |
|
768 | + */ |
|
746 | 769 | static public function getMimeType($path) { |
747 | 770 | return self::$defaultInstance->getMimeType($path); |
748 | 771 | } |
@@ -755,6 +778,9 @@ discard block |
||
755 | 778 | return self::$defaultInstance->free_space($path); |
756 | 779 | } |
757 | 780 | |
781 | + /** |
|
782 | + * @param string $query |
|
783 | + */ |
|
758 | 784 | static public function search($query) { |
759 | 785 | return self::$defaultInstance->search($query); |
760 | 786 | } |
@@ -868,7 +894,7 @@ discard block |
||
868 | 894 | * @param string $path |
869 | 895 | * @param boolean $includeMountPoints whether to add mountpoint sizes, |
870 | 896 | * defaults to true |
871 | - * @return \OC\Files\FileInfo|bool False if file does not exist |
|
897 | + * @return \OCP\Files\FileInfo|null False if file does not exist |
|
872 | 898 | */ |
873 | 899 | public static function getFileInfo($path, $includeMountPoints = true) { |
874 | 900 | return self::$defaultInstance->getFileInfo($path, $includeMountPoints); |
@@ -89,6 +89,9 @@ |
||
89 | 89 | $this->user = $user; |
90 | 90 | } |
91 | 91 | |
92 | + /** |
|
93 | + * @param string $tagId |
|
94 | + */ |
|
92 | 95 | function createFile($tagId, $data = null) { |
93 | 96 | try { |
94 | 97 | $tags = $this->tagManager->getTagsByIds([$tagId]); |
@@ -273,6 +273,10 @@ discard block |
||
273 | 273 | return '/^' . preg_quote($this->config->getSystemValue('dbtableprefix', 'oc_')) . '/'; |
274 | 274 | } |
275 | 275 | |
276 | + /** |
|
277 | + * @param integer $step |
|
278 | + * @param integer $max |
|
279 | + */ |
|
276 | 280 | protected function emit($sql, $step, $max) { |
277 | 281 | if ($this->noEmit) { |
278 | 282 | return; |
@@ -283,6 +287,10 @@ discard block |
||
283 | 287 | $this->dispatcher->dispatch('\OC\DB\Migrator::executeSql', new GenericEvent($sql, [$step+1, $max])); |
284 | 288 | } |
285 | 289 | |
290 | + /** |
|
291 | + * @param integer $step |
|
292 | + * @param integer $max |
|
293 | + */ |
|
286 | 294 | private function emitCheckStep($tableName, $step, $max) { |
287 | 295 | if(is_null($this->dispatcher)) { |
288 | 296 | return; |
@@ -300,7 +300,7 @@ discard block |
||
300 | 300 | * @param IRequest $request |
301 | 301 | * @throws LoginException |
302 | 302 | * @throws PasswordLoginForbiddenException |
303 | - * @return boolean |
|
303 | + * @return boolean|null |
|
304 | 304 | */ |
305 | 305 | public function logClientIn($user, $password, IRequest $request) { |
306 | 306 | $isTokenPassword = $this->isTokenPassword($password); |
@@ -340,6 +340,9 @@ discard block |
||
340 | 340 | return $this->config->getSystemValue('token_auth_enforced', false); |
341 | 341 | } |
342 | 342 | |
343 | + /** |
|
344 | + * @param string $username |
|
345 | + */ |
|
343 | 346 | protected function isTwoFactorEnforced($username) { |
344 | 347 | Util::emitHook( |
345 | 348 | '\OCA\Files_Sharing\API\Server2Server', |
@@ -103,6 +103,7 @@ discard block |
||
103 | 103 | |
104 | 104 | /** |
105 | 105 | * Chceks if the ownCloud server can connect to a specific URL using both HTTPS and HTTP |
106 | + * @param string $sitename |
|
106 | 107 | * @return bool |
107 | 108 | */ |
108 | 109 | private function isSiteReachable($sitename) { |
@@ -285,7 +286,7 @@ discard block |
||
285 | 286 | |
286 | 287 | /** |
287 | 288 | * @NoCSRFRequired |
288 | - * @return DataResponse |
|
289 | + * @return DataDisplayResponse |
|
289 | 290 | */ |
290 | 291 | public function getFailedIntegrityCheckFiles() { |
291 | 292 | if(!$this->checker->isCodeCheckEnforced()) { |
@@ -219,7 +219,7 @@ |
||
219 | 219 | * @param array $groupSharesById |
220 | 220 | * @param array $subShares |
221 | 221 | * |
222 | - * @return true if the share is valid, false if it needs repair |
|
222 | + * @return boolean if the share is valid, false if it needs repair |
|
223 | 223 | */ |
224 | 224 | private function isThisShareValid($groupSharesById, $subShares) { |
225 | 225 | $foundTargets = []; |
@@ -1104,7 +1104,7 @@ |
||
1104 | 1104 | } |
1105 | 1105 | |
1106 | 1106 | /** |
1107 | - * @param array $reqs |
|
1107 | + * @param string[] $reqs |
|
1108 | 1108 | * @return bool |
1109 | 1109 | */ |
1110 | 1110 | private function checkRequirements($reqs) { |
@@ -71,7 +71,7 @@ discard block |
||
71 | 71 | |
72 | 72 | /** |
73 | 73 | * @param array $entry |
74 | - * @return array |
|
74 | + * @return string |
|
75 | 75 | */ |
76 | 76 | protected function formatCacheEntry($entry) { |
77 | 77 | if (isset($entry['path'])) { |
@@ -190,6 +190,9 @@ discard block |
||
190 | 190 | return $this->cache->getStatus($this->getSourcePath($file)); |
191 | 191 | } |
192 | 192 | |
193 | + /** |
|
194 | + * @param \OCP\Files\Cache\ICacheEntry[] $results |
|
195 | + */ |
|
193 | 196 | private function formatSearchResults($results) { |
194 | 197 | $results = array_filter($results, array($this, 'filterCacheEntry')); |
195 | 198 | $results = array_values($results); |
@@ -53,7 +53,7 @@ |
||
53 | 53 | * Wrapper around file_put_contents($filename, $data) |
54 | 54 | * |
55 | 55 | * @param string $filename |
56 | - * @param $data |
|
56 | + * @param string $data |
|
57 | 57 | * @return int|false |
58 | 58 | */ |
59 | 59 | public function file_put_contents($filename, $data) { |