Completed
Push — master ( 809bbe...f2de5c )
by
unknown
49:25 queued 20:26
created
lib/private/Encryption/Exceptions/EncryptionHeaderToLargeException.php 1 patch
Indentation   +3 added lines, -3 removed lines patch added patch discarded remove patch
@@ -27,7 +27,7 @@
 block discarded – undo
27 27
 use OCP\Encryption\Exceptions\GenericEncryptionException;
28 28
 
29 29
 class EncryptionHeaderToLargeException extends GenericEncryptionException {
30
-	public function __construct() {
31
-		parent::__construct('max header size exceeded');
32
-	}
30
+    public function __construct() {
31
+        parent::__construct('max header size exceeded');
32
+    }
33 33
 }
Please login to merge, or discard this patch.
lib/private/Encryption/File.php 2 patches
Spacing   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -73,7 +73,7 @@
 block discarded – undo
73 73
 		// always add owner to the list of users with access to the file
74 74
 		$userIds = [$owner];
75 75
 
76
-		if (!$this->util->isFile($owner . '/' . $ownerPath)) {
76
+		if (!$this->util->isFile($owner.'/'.$ownerPath)) {
77 77
 			return ['users' => $userIds, 'public' => false];
78 78
 		}
79 79
 
Please login to merge, or discard this patch.
Indentation   +94 added lines, -94 removed lines patch added patch discarded remove patch
@@ -15,98 +15,98 @@
 block discarded – undo
15 15
 use OCP\Share\IManager;
16 16
 
17 17
 class File implements \OCP\Encryption\IFile {
18
-	protected Util $util;
19
-	private IRootFolder $rootFolder;
20
-	private IManager $shareManager;
21
-
22
-	/**
23
-	 * Cache results of already checked folders
24
-	 * @var CappedMemoryCache<array>
25
-	 */
26
-	protected CappedMemoryCache $cache;
27
-	private ?IAppManager $appManager = null;
28
-
29
-	public function __construct(Util $util,
30
-		IRootFolder $rootFolder,
31
-		IManager $shareManager) {
32
-		$this->util = $util;
33
-		$this->cache = new CappedMemoryCache();
34
-		$this->rootFolder = $rootFolder;
35
-		$this->shareManager = $shareManager;
36
-	}
37
-
38
-	public function getAppManager(): IAppManager {
39
-		// Lazy evaluate app manager as it initialize the db too early otherwise
40
-		if ($this->appManager) {
41
-			return $this->appManager;
42
-		}
43
-		$this->appManager = \OCP\Server::get(IAppManager::class);
44
-		return $this->appManager;
45
-	}
46
-
47
-	/**
48
-	 * Get list of users with access to the file
49
-	 *
50
-	 * @param string $path to the file
51
-	 * @return array{users: string[], public: bool}
52
-	 */
53
-	public function getAccessList($path) {
54
-		// Make sure that a share key is generated for the owner too
55
-		[$owner, $ownerPath] = $this->util->getUidAndFilename($path);
56
-
57
-		// always add owner to the list of users with access to the file
58
-		$userIds = [$owner];
59
-
60
-		if (!$this->util->isFile($owner . '/' . $ownerPath)) {
61
-			return ['users' => $userIds, 'public' => false];
62
-		}
63
-
64
-		$ownerPath = substr($ownerPath, strlen('/files'));
65
-		$userFolder = $this->rootFolder->getUserFolder($owner);
66
-		try {
67
-			$file = $userFolder->get($ownerPath);
68
-		} catch (NotFoundException $e) {
69
-			$file = null;
70
-		}
71
-		$ownerPath = $this->util->stripPartialFileExtension($ownerPath);
72
-
73
-		// first get the shares for the parent and cache the result so that we don't
74
-		// need to check all parents for every file
75
-		$parent = dirname($ownerPath);
76
-		$parentNode = $userFolder->get($parent);
77
-		if (isset($this->cache[$parent])) {
78
-			$resultForParents = $this->cache[$parent];
79
-		} else {
80
-			$resultForParents = $this->shareManager->getAccessList($parentNode);
81
-			$this->cache[$parent] = $resultForParents;
82
-		}
83
-		$userIds = array_merge($userIds, $resultForParents['users']);
84
-		$public = $resultForParents['public'] || $resultForParents['remote'];
85
-
86
-
87
-		// Find out who, if anyone, is sharing the file
88
-		if ($file !== null) {
89
-			$resultForFile = $this->shareManager->getAccessList($file, false);
90
-			$userIds = array_merge($userIds, $resultForFile['users']);
91
-			$public = $resultForFile['public'] || $resultForFile['remote'] || $public;
92
-		}
93
-
94
-		// check if it is a group mount
95
-		if ($this->getAppManager()->isEnabledForUser('files_external')) {
96
-			/** @var GlobalStoragesService $storageService */
97
-			$storageService = \OC::$server->get(GlobalStoragesService::class);
98
-			$storages = $storageService->getAllStorages();
99
-			foreach ($storages as $storage) {
100
-				if ($storage->getMountPoint() == substr($ownerPath, 0, strlen($storage->getMountPoint()))) {
101
-					$mountedFor = $this->util->getUserWithAccessToMountPoint($storage->getApplicableUsers(), $storage->getApplicableGroups());
102
-					$userIds = array_merge($userIds, $mountedFor);
103
-				}
104
-			}
105
-		}
106
-
107
-		// Remove duplicate UIDs
108
-		$uniqueUserIds = array_unique($userIds);
109
-
110
-		return ['users' => $uniqueUserIds, 'public' => $public];
111
-	}
18
+    protected Util $util;
19
+    private IRootFolder $rootFolder;
20
+    private IManager $shareManager;
21
+
22
+    /**
23
+     * Cache results of already checked folders
24
+     * @var CappedMemoryCache<array>
25
+     */
26
+    protected CappedMemoryCache $cache;
27
+    private ?IAppManager $appManager = null;
28
+
29
+    public function __construct(Util $util,
30
+        IRootFolder $rootFolder,
31
+        IManager $shareManager) {
32
+        $this->util = $util;
33
+        $this->cache = new CappedMemoryCache();
34
+        $this->rootFolder = $rootFolder;
35
+        $this->shareManager = $shareManager;
36
+    }
37
+
38
+    public function getAppManager(): IAppManager {
39
+        // Lazy evaluate app manager as it initialize the db too early otherwise
40
+        if ($this->appManager) {
41
+            return $this->appManager;
42
+        }
43
+        $this->appManager = \OCP\Server::get(IAppManager::class);
44
+        return $this->appManager;
45
+    }
46
+
47
+    /**
48
+     * Get list of users with access to the file
49
+     *
50
+     * @param string $path to the file
51
+     * @return array{users: string[], public: bool}
52
+     */
53
+    public function getAccessList($path) {
54
+        // Make sure that a share key is generated for the owner too
55
+        [$owner, $ownerPath] = $this->util->getUidAndFilename($path);
56
+
57
+        // always add owner to the list of users with access to the file
58
+        $userIds = [$owner];
59
+
60
+        if (!$this->util->isFile($owner . '/' . $ownerPath)) {
61
+            return ['users' => $userIds, 'public' => false];
62
+        }
63
+
64
+        $ownerPath = substr($ownerPath, strlen('/files'));
65
+        $userFolder = $this->rootFolder->getUserFolder($owner);
66
+        try {
67
+            $file = $userFolder->get($ownerPath);
68
+        } catch (NotFoundException $e) {
69
+            $file = null;
70
+        }
71
+        $ownerPath = $this->util->stripPartialFileExtension($ownerPath);
72
+
73
+        // first get the shares for the parent and cache the result so that we don't
74
+        // need to check all parents for every file
75
+        $parent = dirname($ownerPath);
76
+        $parentNode = $userFolder->get($parent);
77
+        if (isset($this->cache[$parent])) {
78
+            $resultForParents = $this->cache[$parent];
79
+        } else {
80
+            $resultForParents = $this->shareManager->getAccessList($parentNode);
81
+            $this->cache[$parent] = $resultForParents;
82
+        }
83
+        $userIds = array_merge($userIds, $resultForParents['users']);
84
+        $public = $resultForParents['public'] || $resultForParents['remote'];
85
+
86
+
87
+        // Find out who, if anyone, is sharing the file
88
+        if ($file !== null) {
89
+            $resultForFile = $this->shareManager->getAccessList($file, false);
90
+            $userIds = array_merge($userIds, $resultForFile['users']);
91
+            $public = $resultForFile['public'] || $resultForFile['remote'] || $public;
92
+        }
93
+
94
+        // check if it is a group mount
95
+        if ($this->getAppManager()->isEnabledForUser('files_external')) {
96
+            /** @var GlobalStoragesService $storageService */
97
+            $storageService = \OC::$server->get(GlobalStoragesService::class);
98
+            $storages = $storageService->getAllStorages();
99
+            foreach ($storages as $storage) {
100
+                if ($storage->getMountPoint() == substr($ownerPath, 0, strlen($storage->getMountPoint()))) {
101
+                    $mountedFor = $this->util->getUserWithAccessToMountPoint($storage->getApplicableUsers(), $storage->getApplicableGroups());
102
+                    $userIds = array_merge($userIds, $mountedFor);
103
+                }
104
+            }
105
+        }
106
+
107
+        // Remove duplicate UIDs
108
+        $uniqueUserIds = array_unique($userIds);
109
+
110
+        return ['users' => $uniqueUserIds, 'public' => $public];
111
+    }
112 112
 }
Please login to merge, or discard this patch.
Middleware/Security/Exceptions/StrictCookieMissingException.php 1 patch
Indentation   +3 added lines, -3 removed lines patch added patch discarded remove patch
@@ -32,7 +32,7 @@
 block discarded – undo
32 32
  * @package OC\AppFramework\Middleware\Security\Exceptions
33 33
  */
34 34
 class StrictCookieMissingException extends SecurityException {
35
-	public function __construct() {
36
-		parent::__construct('Strict Cookie has not been found in request.', Http::STATUS_PRECONDITION_FAILED);
37
-	}
35
+    public function __construct() {
36
+        parent::__construct('Strict Cookie has not been found in request.', Http::STATUS_PRECONDITION_FAILED);
37
+    }
38 38
 }
Please login to merge, or discard this patch.
apps/dav/lib/Comments/RootCollection.php 2 patches
Spacing   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -147,7 +147,7 @@
 block discarded – undo
147 147
 		if (isset($this->entityTypeCollections[$name])) {
148 148
 			return $this->entityTypeCollections[$name];
149 149
 		}
150
-		throw new NotFound('Entity type "' . $name . '" not found."');
150
+		throw new NotFound('Entity type "'.$name.'" not found."');
151 151
 	}
152 152
 
153 153
 	/**
Please login to merge, or discard this patch.
Indentation   +147 added lines, -147 removed lines patch added patch discarded remove patch
@@ -19,151 +19,151 @@
 block discarded – undo
19 19
 use Sabre\DAV\ICollection;
20 20
 
21 21
 class RootCollection implements ICollection {
22
-	/** @var EntityTypeCollection[]|null */
23
-	private ?array $entityTypeCollections = null;
24
-	protected string $name = 'comments';
25
-
26
-	public function __construct(
27
-		protected ICommentsManager $commentsManager,
28
-		protected IUserManager $userManager,
29
-		protected IUserSession $userSession,
30
-		protected IEventDispatcher $dispatcher,
31
-		protected LoggerInterface $logger,
32
-	) {
33
-	}
34
-
35
-	/**
36
-	 * initializes the collection. At this point of time, we need the logged in
37
-	 * user. Since it is not the case when the instance is created, we cannot
38
-	 * have this in the constructor.
39
-	 *
40
-	 * @throws NotAuthenticated
41
-	 */
42
-	protected function initCollections() {
43
-		if ($this->entityTypeCollections !== null) {
44
-			return;
45
-		}
46
-		$user = $this->userSession->getUser();
47
-		if (is_null($user)) {
48
-			throw new NotAuthenticated();
49
-		}
50
-
51
-		$event = new CommentsEntityEvent();
52
-		$this->dispatcher->dispatchTyped($event);
53
-		$this->dispatcher->dispatch(CommentsEntityEvent::EVENT_ENTITY, $event);
54
-
55
-		$this->entityTypeCollections = [];
56
-		foreach ($event->getEntityCollections() as $entity => $entityExistsFunction) {
57
-			$this->entityTypeCollections[$entity] = new EntityTypeCollection(
58
-				$entity,
59
-				$this->commentsManager,
60
-				$this->userManager,
61
-				$this->userSession,
62
-				$this->logger,
63
-				$entityExistsFunction
64
-			);
65
-		}
66
-	}
67
-
68
-	/**
69
-	 * Creates a new file in the directory
70
-	 *
71
-	 * @param string $name Name of the file
72
-	 * @param resource|string $data Initial payload
73
-	 * @return null|string
74
-	 * @throws Forbidden
75
-	 */
76
-	public function createFile($name, $data = null) {
77
-		throw new Forbidden('Cannot create comments by id');
78
-	}
79
-
80
-	/**
81
-	 * Creates a new subdirectory
82
-	 *
83
-	 * @param string $name
84
-	 * @throws Forbidden
85
-	 */
86
-	public function createDirectory($name) {
87
-		throw new Forbidden('Permission denied to create collections');
88
-	}
89
-
90
-	/**
91
-	 * Returns a specific child node, referenced by its name
92
-	 *
93
-	 * This method must throw Sabre\DAV\Exception\NotFound if the node does not
94
-	 * exist.
95
-	 *
96
-	 * @param string $name
97
-	 * @return \Sabre\DAV\INode
98
-	 * @throws NotFound
99
-	 */
100
-	public function getChild($name) {
101
-		$this->initCollections();
102
-		if (isset($this->entityTypeCollections[$name])) {
103
-			return $this->entityTypeCollections[$name];
104
-		}
105
-		throw new NotFound('Entity type "' . $name . '" not found."');
106
-	}
107
-
108
-	/**
109
-	 * Returns an array with all the child nodes
110
-	 *
111
-	 * @return \Sabre\DAV\INode[]
112
-	 */
113
-	public function getChildren() {
114
-		$this->initCollections();
115
-		assert(!is_null($this->entityTypeCollections));
116
-		return $this->entityTypeCollections;
117
-	}
118
-
119
-	/**
120
-	 * Checks if a child-node with the specified name exists
121
-	 *
122
-	 * @param string $name
123
-	 * @return bool
124
-	 */
125
-	public function childExists($name) {
126
-		$this->initCollections();
127
-		assert(!is_null($this->entityTypeCollections));
128
-		return isset($this->entityTypeCollections[$name]);
129
-	}
130
-
131
-	/**
132
-	 * Deleted the current node
133
-	 *
134
-	 * @throws Forbidden
135
-	 */
136
-	public function delete() {
137
-		throw new Forbidden('Permission denied to delete this collection');
138
-	}
139
-
140
-	/**
141
-	 * Returns the name of the node.
142
-	 *
143
-	 * This is used to generate the url.
144
-	 *
145
-	 * @return string
146
-	 */
147
-	public function getName() {
148
-		return $this->name;
149
-	}
150
-
151
-	/**
152
-	 * Renames the node
153
-	 *
154
-	 * @param string $name The new name
155
-	 * @throws Forbidden
156
-	 */
157
-	public function setName($name) {
158
-		throw new Forbidden('Permission denied to rename this collection');
159
-	}
160
-
161
-	/**
162
-	 * Returns the last modification time, as a unix timestamp
163
-	 *
164
-	 * @return ?int
165
-	 */
166
-	public function getLastModified() {
167
-		return null;
168
-	}
22
+    /** @var EntityTypeCollection[]|null */
23
+    private ?array $entityTypeCollections = null;
24
+    protected string $name = 'comments';
25
+
26
+    public function __construct(
27
+        protected ICommentsManager $commentsManager,
28
+        protected IUserManager $userManager,
29
+        protected IUserSession $userSession,
30
+        protected IEventDispatcher $dispatcher,
31
+        protected LoggerInterface $logger,
32
+    ) {
33
+    }
34
+
35
+    /**
36
+     * initializes the collection. At this point of time, we need the logged in
37
+     * user. Since it is not the case when the instance is created, we cannot
38
+     * have this in the constructor.
39
+     *
40
+     * @throws NotAuthenticated
41
+     */
42
+    protected function initCollections() {
43
+        if ($this->entityTypeCollections !== null) {
44
+            return;
45
+        }
46
+        $user = $this->userSession->getUser();
47
+        if (is_null($user)) {
48
+            throw new NotAuthenticated();
49
+        }
50
+
51
+        $event = new CommentsEntityEvent();
52
+        $this->dispatcher->dispatchTyped($event);
53
+        $this->dispatcher->dispatch(CommentsEntityEvent::EVENT_ENTITY, $event);
54
+
55
+        $this->entityTypeCollections = [];
56
+        foreach ($event->getEntityCollections() as $entity => $entityExistsFunction) {
57
+            $this->entityTypeCollections[$entity] = new EntityTypeCollection(
58
+                $entity,
59
+                $this->commentsManager,
60
+                $this->userManager,
61
+                $this->userSession,
62
+                $this->logger,
63
+                $entityExistsFunction
64
+            );
65
+        }
66
+    }
67
+
68
+    /**
69
+     * Creates a new file in the directory
70
+     *
71
+     * @param string $name Name of the file
72
+     * @param resource|string $data Initial payload
73
+     * @return null|string
74
+     * @throws Forbidden
75
+     */
76
+    public function createFile($name, $data = null) {
77
+        throw new Forbidden('Cannot create comments by id');
78
+    }
79
+
80
+    /**
81
+     * Creates a new subdirectory
82
+     *
83
+     * @param string $name
84
+     * @throws Forbidden
85
+     */
86
+    public function createDirectory($name) {
87
+        throw new Forbidden('Permission denied to create collections');
88
+    }
89
+
90
+    /**
91
+     * Returns a specific child node, referenced by its name
92
+     *
93
+     * This method must throw Sabre\DAV\Exception\NotFound if the node does not
94
+     * exist.
95
+     *
96
+     * @param string $name
97
+     * @return \Sabre\DAV\INode
98
+     * @throws NotFound
99
+     */
100
+    public function getChild($name) {
101
+        $this->initCollections();
102
+        if (isset($this->entityTypeCollections[$name])) {
103
+            return $this->entityTypeCollections[$name];
104
+        }
105
+        throw new NotFound('Entity type "' . $name . '" not found."');
106
+    }
107
+
108
+    /**
109
+     * Returns an array with all the child nodes
110
+     *
111
+     * @return \Sabre\DAV\INode[]
112
+     */
113
+    public function getChildren() {
114
+        $this->initCollections();
115
+        assert(!is_null($this->entityTypeCollections));
116
+        return $this->entityTypeCollections;
117
+    }
118
+
119
+    /**
120
+     * Checks if a child-node with the specified name exists
121
+     *
122
+     * @param string $name
123
+     * @return bool
124
+     */
125
+    public function childExists($name) {
126
+        $this->initCollections();
127
+        assert(!is_null($this->entityTypeCollections));
128
+        return isset($this->entityTypeCollections[$name]);
129
+    }
130
+
131
+    /**
132
+     * Deleted the current node
133
+     *
134
+     * @throws Forbidden
135
+     */
136
+    public function delete() {
137
+        throw new Forbidden('Permission denied to delete this collection');
138
+    }
139
+
140
+    /**
141
+     * Returns the name of the node.
142
+     *
143
+     * This is used to generate the url.
144
+     *
145
+     * @return string
146
+     */
147
+    public function getName() {
148
+        return $this->name;
149
+    }
150
+
151
+    /**
152
+     * Renames the node
153
+     *
154
+     * @param string $name The new name
155
+     * @throws Forbidden
156
+     */
157
+    public function setName($name) {
158
+        throw new Forbidden('Permission denied to rename this collection');
159
+    }
160
+
161
+    /**
162
+     * Returns the last modification time, as a unix timestamp
163
+     *
164
+     * @return ?int
165
+     */
166
+    public function getLastModified() {
167
+        return null;
168
+    }
169 169
 }
Please login to merge, or discard this patch.
apps/dav/lib/CardDAV/Xml/Groups.php 2 patches
Spacing   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -39,7 +39,7 @@
 block discarded – undo
39 39
 
40 40
 	public function xmlSerialize(Writer $writer) {
41 41
 		foreach ($this->groups as $group) {
42
-			$writer->writeElement('{' . self::NS_OWNCLOUD . '}group', $group);
42
+			$writer->writeElement('{'.self::NS_OWNCLOUD.'}group', $group);
43 43
 		}
44 44
 	}
45 45
 }
Please login to merge, or discard this patch.
Indentation   +13 added lines, -13 removed lines patch added patch discarded remove patch
@@ -11,19 +11,19 @@
 block discarded – undo
11 11
 use Sabre\Xml\XmlSerializable;
12 12
 
13 13
 class Groups implements XmlSerializable {
14
-	public const NS_OWNCLOUD = 'http://owncloud.org/ns';
14
+    public const NS_OWNCLOUD = 'http://owncloud.org/ns';
15 15
 
16
-	/**
17
-	 * @param list<string> $groups
18
-	 */
19
-	public function __construct(
20
-		private array $groups,
21
-	) {
22
-	}
16
+    /**
17
+     * @param list<string> $groups
18
+     */
19
+    public function __construct(
20
+        private array $groups,
21
+    ) {
22
+    }
23 23
 
24
-	public function xmlSerialize(Writer $writer) {
25
-		foreach ($this->groups as $group) {
26
-			$writer->writeElement('{' . self::NS_OWNCLOUD . '}group', $group);
27
-		}
28
-	}
24
+    public function xmlSerialize(Writer $writer) {
25
+        foreach ($this->groups as $group) {
26
+            $writer->writeElement('{' . self::NS_OWNCLOUD . '}group', $group);
27
+        }
28
+    }
29 29
 }
Please login to merge, or discard this patch.
apps/dav/lib/DAV/Sharing/Xml/Invite.php 2 patches
Spacing   +12 added lines, -12 removed lines patch added patch discarded remove patch
@@ -116,42 +116,42 @@
 block discarded – undo
116 116
 	 * @return void
117 117
 	 */
118 118
 	public function xmlSerialize(Writer $writer) {
119
-		$cs = '{' . Plugin::NS_OWNCLOUD . '}';
119
+		$cs = '{'.Plugin::NS_OWNCLOUD.'}';
120 120
 
121 121
 		if (!is_null($this->organizer)) {
122
-			$writer->startElement($cs . 'organizer');
122
+			$writer->startElement($cs.'organizer');
123 123
 			$writer->writeElement('{DAV:}href', $this->organizer['href']);
124 124
 
125 125
 			if (isset($this->organizer['commonName']) && $this->organizer['commonName']) {
126
-				$writer->writeElement($cs . 'common-name', $this->organizer['commonName']);
126
+				$writer->writeElement($cs.'common-name', $this->organizer['commonName']);
127 127
 			}
128 128
 			if (isset($this->organizer['firstName']) && $this->organizer['firstName']) {
129
-				$writer->writeElement($cs . 'first-name', $this->organizer['firstName']);
129
+				$writer->writeElement($cs.'first-name', $this->organizer['firstName']);
130 130
 			}
131 131
 			if (isset($this->organizer['lastName']) && $this->organizer['lastName']) {
132
-				$writer->writeElement($cs . 'last-name', $this->organizer['lastName']);
132
+				$writer->writeElement($cs.'last-name', $this->organizer['lastName']);
133 133
 			}
134 134
 			$writer->endElement(); // organizer
135 135
 		}
136 136
 
137 137
 		foreach ($this->users as $user) {
138
-			$writer->startElement($cs . 'user');
138
+			$writer->startElement($cs.'user');
139 139
 			$writer->writeElement('{DAV:}href', $user['href']);
140 140
 			if (isset($user['commonName']) && $user['commonName']) {
141
-				$writer->writeElement($cs . 'common-name', $user['commonName']);
141
+				$writer->writeElement($cs.'common-name', $user['commonName']);
142 142
 			}
143
-			$writer->writeElement($cs . 'invite-accepted');
143
+			$writer->writeElement($cs.'invite-accepted');
144 144
 
145
-			$writer->startElement($cs . 'access');
145
+			$writer->startElement($cs.'access');
146 146
 			if ($user['readOnly']) {
147
-				$writer->writeElement($cs . 'read');
147
+				$writer->writeElement($cs.'read');
148 148
 			} else {
149
-				$writer->writeElement($cs . 'read-write');
149
+				$writer->writeElement($cs.'read-write');
150 150
 			}
151 151
 			$writer->endElement(); // access
152 152
 
153 153
 			if (isset($user['summary']) && $user['summary']) {
154
-				$writer->writeElement($cs . 'summary', $user['summary']);
154
+				$writer->writeElement($cs.'summary', $user['summary']);
155 155
 			}
156 156
 
157 157
 			$writer->endElement(); //user
Please login to merge, or discard this patch.
Indentation   +101 added lines, -101 removed lines patch added patch discarded remove patch
@@ -26,113 +26,113 @@
 block discarded – undo
26 26
  */
27 27
 class Invite implements XmlSerializable {
28 28
 
29
-	/**
30
-	 * Creates the property.
31
-	 *
32
-	 * Users is an array. Each element of the array has the following
33
-	 * properties:
34
-	 *
35
-	 *   * href - Often a mailto: address
36
-	 *   * commonName - Optional, for example a first and lastname for a user.
37
-	 *   * status - One of the SharingPlugin::STATUS_* constants.
38
-	 *   * readOnly - true or false
39
-	 *   * summary - Optional, description of the share
40
-	 *
41
-	 * The organizer key is optional to specify. It's only useful when a
42
-	 * 'sharee' requests the sharing information.
43
-	 *
44
-	 * The organizer may have the following properties:
45
-	 *   * href - Often a mailto: address.
46
-	 *   * commonName - Optional human-readable name.
47
-	 *   * firstName - Optional first name.
48
-	 *   * lastName - Optional last name.
49
-	 *
50
-	 * If you wonder why these two structures are so different, I guess a
51
-	 * valid answer is that the current spec is still a draft.
52
-	 *
53
-	 * @param array $users
54
-	 */
55
-	public function __construct(
56
-		/**
57
-		 * The list of users a calendar has been shared to.
58
-		 */
59
-		protected array $users,
60
-		/**
61
-		 * The organizer contains information about the person who shared the
62
-		 * object.
63
-		 */
64
-		protected ?array $organizer = null,
65
-	) {
66
-	}
29
+    /**
30
+     * Creates the property.
31
+     *
32
+     * Users is an array. Each element of the array has the following
33
+     * properties:
34
+     *
35
+     *   * href - Often a mailto: address
36
+     *   * commonName - Optional, for example a first and lastname for a user.
37
+     *   * status - One of the SharingPlugin::STATUS_* constants.
38
+     *   * readOnly - true or false
39
+     *   * summary - Optional, description of the share
40
+     *
41
+     * The organizer key is optional to specify. It's only useful when a
42
+     * 'sharee' requests the sharing information.
43
+     *
44
+     * The organizer may have the following properties:
45
+     *   * href - Often a mailto: address.
46
+     *   * commonName - Optional human-readable name.
47
+     *   * firstName - Optional first name.
48
+     *   * lastName - Optional last name.
49
+     *
50
+     * If you wonder why these two structures are so different, I guess a
51
+     * valid answer is that the current spec is still a draft.
52
+     *
53
+     * @param array $users
54
+     */
55
+    public function __construct(
56
+        /**
57
+         * The list of users a calendar has been shared to.
58
+         */
59
+        protected array $users,
60
+        /**
61
+         * The organizer contains information about the person who shared the
62
+         * object.
63
+         */
64
+        protected ?array $organizer = null,
65
+    ) {
66
+    }
67 67
 
68
-	/**
69
-	 * Returns the list of users, as it was passed to the constructor.
70
-	 *
71
-	 * @return array
72
-	 */
73
-	public function getValue() {
74
-		return $this->users;
75
-	}
68
+    /**
69
+     * Returns the list of users, as it was passed to the constructor.
70
+     *
71
+     * @return array
72
+     */
73
+    public function getValue() {
74
+        return $this->users;
75
+    }
76 76
 
77
-	/**
78
-	 * The xmlSerialize method is called during xml writing.
79
-	 *
80
-	 * Use the $writer argument to write its own xml serialization.
81
-	 *
82
-	 * An important note: do _not_ create a parent element. Any element
83
-	 * implementing XmlSerializble should only ever write what's considered
84
-	 * its 'inner xml'.
85
-	 *
86
-	 * The parent of the current element is responsible for writing a
87
-	 * containing element.
88
-	 *
89
-	 * This allows serializers to be re-used for different element names.
90
-	 *
91
-	 * If you are opening new elements, you must also close them again.
92
-	 *
93
-	 * @param Writer $writer
94
-	 * @return void
95
-	 */
96
-	public function xmlSerialize(Writer $writer) {
97
-		$cs = '{' . Plugin::NS_OWNCLOUD . '}';
77
+    /**
78
+     * The xmlSerialize method is called during xml writing.
79
+     *
80
+     * Use the $writer argument to write its own xml serialization.
81
+     *
82
+     * An important note: do _not_ create a parent element. Any element
83
+     * implementing XmlSerializble should only ever write what's considered
84
+     * its 'inner xml'.
85
+     *
86
+     * The parent of the current element is responsible for writing a
87
+     * containing element.
88
+     *
89
+     * This allows serializers to be re-used for different element names.
90
+     *
91
+     * If you are opening new elements, you must also close them again.
92
+     *
93
+     * @param Writer $writer
94
+     * @return void
95
+     */
96
+    public function xmlSerialize(Writer $writer) {
97
+        $cs = '{' . Plugin::NS_OWNCLOUD . '}';
98 98
 
99
-		if (!is_null($this->organizer)) {
100
-			$writer->startElement($cs . 'organizer');
101
-			$writer->writeElement('{DAV:}href', $this->organizer['href']);
99
+        if (!is_null($this->organizer)) {
100
+            $writer->startElement($cs . 'organizer');
101
+            $writer->writeElement('{DAV:}href', $this->organizer['href']);
102 102
 
103
-			if (isset($this->organizer['commonName']) && $this->organizer['commonName']) {
104
-				$writer->writeElement($cs . 'common-name', $this->organizer['commonName']);
105
-			}
106
-			if (isset($this->organizer['firstName']) && $this->organizer['firstName']) {
107
-				$writer->writeElement($cs . 'first-name', $this->organizer['firstName']);
108
-			}
109
-			if (isset($this->organizer['lastName']) && $this->organizer['lastName']) {
110
-				$writer->writeElement($cs . 'last-name', $this->organizer['lastName']);
111
-			}
112
-			$writer->endElement(); // organizer
113
-		}
103
+            if (isset($this->organizer['commonName']) && $this->organizer['commonName']) {
104
+                $writer->writeElement($cs . 'common-name', $this->organizer['commonName']);
105
+            }
106
+            if (isset($this->organizer['firstName']) && $this->organizer['firstName']) {
107
+                $writer->writeElement($cs . 'first-name', $this->organizer['firstName']);
108
+            }
109
+            if (isset($this->organizer['lastName']) && $this->organizer['lastName']) {
110
+                $writer->writeElement($cs . 'last-name', $this->organizer['lastName']);
111
+            }
112
+            $writer->endElement(); // organizer
113
+        }
114 114
 
115
-		foreach ($this->users as $user) {
116
-			$writer->startElement($cs . 'user');
117
-			$writer->writeElement('{DAV:}href', $user['href']);
118
-			if (isset($user['commonName']) && $user['commonName']) {
119
-				$writer->writeElement($cs . 'common-name', $user['commonName']);
120
-			}
121
-			$writer->writeElement($cs . 'invite-accepted');
115
+        foreach ($this->users as $user) {
116
+            $writer->startElement($cs . 'user');
117
+            $writer->writeElement('{DAV:}href', $user['href']);
118
+            if (isset($user['commonName']) && $user['commonName']) {
119
+                $writer->writeElement($cs . 'common-name', $user['commonName']);
120
+            }
121
+            $writer->writeElement($cs . 'invite-accepted');
122 122
 
123
-			$writer->startElement($cs . 'access');
124
-			if ($user['readOnly']) {
125
-				$writer->writeElement($cs . 'read');
126
-			} else {
127
-				$writer->writeElement($cs . 'read-write');
128
-			}
129
-			$writer->endElement(); // access
123
+            $writer->startElement($cs . 'access');
124
+            if ($user['readOnly']) {
125
+                $writer->writeElement($cs . 'read');
126
+            } else {
127
+                $writer->writeElement($cs . 'read-write');
128
+            }
129
+            $writer->endElement(); // access
130 130
 
131
-			if (isset($user['summary']) && $user['summary']) {
132
-				$writer->writeElement($cs . 'summary', $user['summary']);
133
-			}
131
+            if (isset($user['summary']) && $user['summary']) {
132
+                $writer->writeElement($cs . 'summary', $user['summary']);
133
+            }
134 134
 
135
-			$writer->endElement(); //user
136
-		}
137
-	}
135
+            $writer->endElement(); //user
136
+        }
137
+    }
138 138
 }
Please login to merge, or discard this patch.
apps/dav/lib/Connector/Sabre/BearerAuth.php 2 patches
Spacing   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -63,7 +63,7 @@
 block discarded – undo
63 63
 	private function setupUserFs($userId) {
64 64
 		\OC_Util::setupFS($userId);
65 65
 		$this->session->close();
66
-		return $this->principalPrefix . $userId;
66
+		return $this->principalPrefix.$userId;
67 67
 	}
68 68
 
69 69
 	/**
Please login to merge, or discard this patch.
Indentation   +47 added lines, -47 removed lines patch added patch discarded remove patch
@@ -16,57 +16,57 @@
 block discarded – undo
16 16
 use Sabre\HTTP\ResponseInterface;
17 17
 
18 18
 class BearerAuth extends AbstractBearer {
19
-	public function __construct(
20
-		private IUserSession $userSession,
21
-		private ISession $session,
22
-		private IRequest $request,
23
-		private IConfig $config,
24
-		private string $principalPrefix = 'principals/users/',
25
-	) {
26
-		// setup realm
27
-		$defaults = new Defaults();
28
-		$this->realm = $defaults->getName() ?: 'Nextcloud';
29
-	}
19
+    public function __construct(
20
+        private IUserSession $userSession,
21
+        private ISession $session,
22
+        private IRequest $request,
23
+        private IConfig $config,
24
+        private string $principalPrefix = 'principals/users/',
25
+    ) {
26
+        // setup realm
27
+        $defaults = new Defaults();
28
+        $this->realm = $defaults->getName() ?: 'Nextcloud';
29
+    }
30 30
 
31
-	private function setupUserFs($userId) {
32
-		\OC_Util::setupFS($userId);
33
-		$this->session->close();
34
-		return $this->principalPrefix . $userId;
35
-	}
31
+    private function setupUserFs($userId) {
32
+        \OC_Util::setupFS($userId);
33
+        $this->session->close();
34
+        return $this->principalPrefix . $userId;
35
+    }
36 36
 
37
-	/**
38
-	 * {@inheritdoc}
39
-	 */
40
-	public function validateBearerToken($bearerToken) {
41
-		\OC_Util::setupFS();
37
+    /**
38
+     * {@inheritdoc}
39
+     */
40
+    public function validateBearerToken($bearerToken) {
41
+        \OC_Util::setupFS();
42 42
 
43
-		if (!$this->userSession->isLoggedIn()) {
44
-			$this->userSession->tryTokenLogin($this->request);
45
-		}
46
-		if ($this->userSession->isLoggedIn()) {
47
-			return $this->setupUserFs($this->userSession->getUser()->getUID());
48
-		}
43
+        if (!$this->userSession->isLoggedIn()) {
44
+            $this->userSession->tryTokenLogin($this->request);
45
+        }
46
+        if ($this->userSession->isLoggedIn()) {
47
+            return $this->setupUserFs($this->userSession->getUser()->getUID());
48
+        }
49 49
 
50
-		return false;
51
-	}
50
+        return false;
51
+    }
52 52
 
53
-	/**
54
-	 * \Sabre\DAV\Auth\Backend\AbstractBearer::challenge sets an WWW-Authenticate
55
-	 * header which some DAV clients can't handle. Thus we override this function
56
-	 * and make it simply return a 401.
57
-	 *
58
-	 * @param RequestInterface $request
59
-	 * @param ResponseInterface $response
60
-	 */
61
-	public function challenge(RequestInterface $request, ResponseInterface $response): void {
62
-		// Legacy ownCloud clients still authenticate via OAuth2
63
-		$enableOcClients = $this->config->getSystemValueBool('oauth2.enable_oc_clients', false);
64
-		$userAgent = $request->getHeader('User-Agent');
65
-		if ($enableOcClients && $userAgent !== null && str_contains($userAgent, 'mirall')) {
66
-			parent::challenge($request, $response);
67
-			return;
68
-		}
53
+    /**
54
+     * \Sabre\DAV\Auth\Backend\AbstractBearer::challenge sets an WWW-Authenticate
55
+     * header which some DAV clients can't handle. Thus we override this function
56
+     * and make it simply return a 401.
57
+     *
58
+     * @param RequestInterface $request
59
+     * @param ResponseInterface $response
60
+     */
61
+    public function challenge(RequestInterface $request, ResponseInterface $response): void {
62
+        // Legacy ownCloud clients still authenticate via OAuth2
63
+        $enableOcClients = $this->config->getSystemValueBool('oauth2.enable_oc_clients', false);
64
+        $userAgent = $request->getHeader('User-Agent');
65
+        if ($enableOcClients && $userAgent !== null && str_contains($userAgent, 'mirall')) {
66
+            parent::challenge($request, $response);
67
+            return;
68
+        }
69 69
 
70
-		$response->setStatus(Http::STATUS_UNAUTHORIZED);
71
-	}
70
+        $response->setStatus(Http::STATUS_UNAUTHORIZED);
71
+    }
72 72
 }
Please login to merge, or discard this patch.
apps/dav/lib/Connector/Sabre/Exception/UnsupportedMediaType.php 1 patch
Indentation   +8 added lines, -8 removed lines patch added patch discarded remove patch
@@ -31,12 +31,12 @@
 block discarded – undo
31 31
  */
32 32
 class UnsupportedMediaType extends \Sabre\DAV\Exception {
33 33
 
34
-	/**
35
-	 * Returns the HTTP status code for this exception
36
-	 *
37
-	 * @return int
38
-	 */
39
-	public function getHTTPCode() {
40
-		return 415;
41
-	}
34
+    /**
35
+     * Returns the HTTP status code for this exception
36
+     *
37
+     * @return int
38
+     */
39
+    public function getHTTPCode() {
40
+        return 415;
41
+    }
42 42
 }
Please login to merge, or discard this patch.
apps/dav/lib/Connector/Sabre/Exception/EntityTooLarge.php 1 patch
Indentation   +8 added lines, -8 removed lines patch added patch discarded remove patch
@@ -31,12 +31,12 @@
 block discarded – undo
31 31
  */
32 32
 class EntityTooLarge extends \Sabre\DAV\Exception {
33 33
 
34
-	/**
35
-	 * Returns the HTTP status code for this exception
36
-	 *
37
-	 * @return int
38
-	 */
39
-	public function getHTTPCode() {
40
-		return 413;
41
-	}
34
+    /**
35
+     * Returns the HTTP status code for this exception
36
+     *
37
+     * @return int
38
+     */
39
+    public function getHTTPCode() {
40
+        return 413;
41
+    }
42 42
 }
Please login to merge, or discard this patch.