@@ -34,16 +34,16 @@ |
||
| 34 | 34 | $subject = (string)$_POST['ldap_clear_mapping']; |
| 35 | 35 | $mapping = null; |
| 36 | 36 | if($subject === 'user') { |
| 37 | - $mapping = new UserMapping(\OC::$server->getDatabaseConnection()); |
|
| 37 | + $mapping = new UserMapping(\OC::$server->getDatabaseConnection()); |
|
| 38 | 38 | } else if($subject === 'group') { |
| 39 | - $mapping = new GroupMapping(\OC::$server->getDatabaseConnection()); |
|
| 39 | + $mapping = new GroupMapping(\OC::$server->getDatabaseConnection()); |
|
| 40 | 40 | } |
| 41 | 41 | try { |
| 42 | - if(is_null($mapping) || !$mapping->clear()) { |
|
| 43 | - $l = \OC::$server->getL10N('user_ldap'); |
|
| 44 | - throw new \Exception($l->t('Failed to clear the mappings.')); |
|
| 45 | - } |
|
| 46 | - OCP\JSON::success(); |
|
| 42 | + if(is_null($mapping) || !$mapping->clear()) { |
|
| 43 | + $l = \OC::$server->getL10N('user_ldap'); |
|
| 44 | + throw new \Exception($l->t('Failed to clear the mappings.')); |
|
| 45 | + } |
|
| 46 | + OCP\JSON::success(); |
|
| 47 | 47 | } catch (\Exception $e) { |
| 48 | - OCP\JSON::error(array('message' => $e->getMessage())); |
|
| 48 | + OCP\JSON::error(array('message' => $e->getMessage())); |
|
| 49 | 49 | } |
@@ -31,15 +31,15 @@ |
||
| 31 | 31 | OCP\JSON::checkAppEnabled('user_ldap'); |
| 32 | 32 | OCP\JSON::callCheck(); |
| 33 | 33 | |
| 34 | -$subject = (string)$_POST['ldap_clear_mapping']; |
|
| 34 | +$subject = (string) $_POST['ldap_clear_mapping']; |
|
| 35 | 35 | $mapping = null; |
| 36 | -if($subject === 'user') { |
|
| 36 | +if ($subject === 'user') { |
|
| 37 | 37 | $mapping = new UserMapping(\OC::$server->getDatabaseConnection()); |
| 38 | -} else if($subject === 'group') { |
|
| 38 | +} else if ($subject === 'group') { |
|
| 39 | 39 | $mapping = new GroupMapping(\OC::$server->getDatabaseConnection()); |
| 40 | 40 | } |
| 41 | 41 | try { |
| 42 | - if(is_null($mapping) || !$mapping->clear()) { |
|
| 42 | + if (is_null($mapping) || !$mapping->clear()) { |
|
| 43 | 43 | $l = \OC::$server->getL10N('user_ldap'); |
| 44 | 44 | throw new \Exception($l->t('Failed to clear the mappings.')); |
| 45 | 45 | } |
@@ -34,7 +34,7 @@ |
||
| 34 | 34 | $connection = new \OCA\User_LDAP\Connection($ldapWrapper, $prefix); |
| 35 | 35 | $configuration = $connection->getConfiguration(); |
| 36 | 36 | if (isset($configuration['ldap_agent_password']) && $configuration['ldap_agent_password'] !== '') { |
| 37 | - // hide password |
|
| 38 | - $configuration['ldap_agent_password'] = '**PASSWORD SET**'; |
|
| 37 | + // hide password |
|
| 38 | + $configuration['ldap_agent_password'] = '**PASSWORD SET**'; |
|
| 39 | 39 | } |
| 40 | 40 | OCP\JSON::success(array('configuration' => $configuration)); |
@@ -29,7 +29,7 @@ |
||
| 29 | 29 | OCP\JSON::checkAppEnabled('user_ldap'); |
| 30 | 30 | OCP\JSON::callCheck(); |
| 31 | 31 | |
| 32 | -$prefix = (string)$_POST['ldap_serverconfig_chooser']; |
|
| 32 | +$prefix = (string) $_POST['ldap_serverconfig_chooser']; |
|
| 33 | 33 | $ldapWrapper = new OCA\User_LDAP\LDAP(); |
| 34 | 34 | $connection = new \OCA\User_LDAP\Connection($ldapWrapper, $prefix); |
| 35 | 35 | $configuration = $connection->getConfiguration(); |
@@ -36,11 +36,11 @@ |
||
| 36 | 36 | // only legacy checkboxes (Advanced and Expert tab) need to be handled here, |
| 37 | 37 | // the Wizard-like tabs handle it on their own |
| 38 | 38 | $chkboxes = array('ldap_configuration_active', 'ldap_override_main_server', |
| 39 | - 'ldap_turn_off_cert_check'); |
|
| 39 | + 'ldap_turn_off_cert_check'); |
|
| 40 | 40 | foreach($chkboxes as $boxid) { |
| 41 | - if(!isset($_POST[$boxid])) { |
|
| 42 | - $_POST[$boxid] = 0; |
|
| 43 | - } |
|
| 41 | + if(!isset($_POST[$boxid])) { |
|
| 42 | + $_POST[$boxid] = 0; |
|
| 43 | + } |
|
| 44 | 44 | } |
| 45 | 45 | |
| 46 | 46 | $ldapWrapper = new OCA\User_LDAP\LDAP(); |
@@ -30,15 +30,15 @@ |
||
| 30 | 30 | OCP\JSON::checkAppEnabled('user_ldap'); |
| 31 | 31 | OCP\JSON::callCheck(); |
| 32 | 32 | |
| 33 | -$prefix = (string)$_POST['ldap_serverconfig_chooser']; |
|
| 33 | +$prefix = (string) $_POST['ldap_serverconfig_chooser']; |
|
| 34 | 34 | |
| 35 | 35 | // Checkboxes are not submitted, when they are unchecked. Set them manually. |
| 36 | 36 | // only legacy checkboxes (Advanced and Expert tab) need to be handled here, |
| 37 | 37 | // the Wizard-like tabs handle it on their own |
| 38 | 38 | $chkboxes = array('ldap_configuration_active', 'ldap_override_main_server', |
| 39 | 39 | 'ldap_turn_off_cert_check'); |
| 40 | -foreach($chkboxes as $boxid) { |
|
| 41 | - if(!isset($_POST[$boxid])) { |
|
| 40 | +foreach ($chkboxes as $boxid) { |
|
| 41 | + if (!isset($_POST[$boxid])) { |
|
| 42 | 42 | $_POST[$boxid] = 0; |
| 43 | 43 | } |
| 44 | 44 | } |
@@ -34,8 +34,8 @@ |
||
| 34 | 34 | $prefix = (string)$_POST['ldap_serverconfig_chooser']; |
| 35 | 35 | $helper = new \OCA\User_LDAP\Helper(\OC::$server->getConfig()); |
| 36 | 36 | if($helper->deleteServerConfiguration($prefix)) { |
| 37 | - OCP\JSON::success(); |
|
| 37 | + OCP\JSON::success(); |
|
| 38 | 38 | } else { |
| 39 | - $l = \OC::$server->getL10N('user_ldap'); |
|
| 40 | - OCP\JSON::error(array('message' => $l->t('Failed to delete the server configuration'))); |
|
| 39 | + $l = \OC::$server->getL10N('user_ldap'); |
|
| 40 | + OCP\JSON::error(array('message' => $l->t('Failed to delete the server configuration'))); |
|
| 41 | 41 | } |
@@ -31,9 +31,9 @@ |
||
| 31 | 31 | OCP\JSON::checkAppEnabled('user_ldap'); |
| 32 | 32 | OCP\JSON::callCheck(); |
| 33 | 33 | |
| 34 | -$prefix = (string)$_POST['ldap_serverconfig_chooser']; |
|
| 34 | +$prefix = (string) $_POST['ldap_serverconfig_chooser']; |
|
| 35 | 35 | $helper = new \OCA\User_LDAP\Helper(\OC::$server->getConfig()); |
| 36 | -if($helper->deleteServerConfiguration($prefix)) { |
|
| 36 | +if ($helper->deleteServerConfiguration($prefix)) { |
|
| 37 | 37 | OCP\JSON::success(); |
| 38 | 38 | } else { |
| 39 | 39 | $l = \OC::$server->getL10N('user_ldap'); |
@@ -32,16 +32,16 @@ discard block |
||
| 32 | 32 | |
| 33 | 33 | $l = \OC::$server->getL10N('user_ldap'); |
| 34 | 34 | |
| 35 | -if(!isset($_POST['action'])) { |
|
| 35 | +if (!isset($_POST['action'])) { |
|
| 36 | 36 | \OCP\JSON::error(array('message' => $l->t('No action specified'))); |
| 37 | 37 | } |
| 38 | -$action = (string)$_POST['action']; |
|
| 38 | +$action = (string) $_POST['action']; |
|
| 39 | 39 | |
| 40 | 40 | |
| 41 | -if(!isset($_POST['ldap_serverconfig_chooser'])) { |
|
| 41 | +if (!isset($_POST['ldap_serverconfig_chooser'])) { |
|
| 42 | 42 | \OCP\JSON::error(array('message' => $l->t('No configuration specified'))); |
| 43 | 43 | } |
| 44 | -$prefix = (string)$_POST['ldap_serverconfig_chooser']; |
|
| 44 | +$prefix = (string) $_POST['ldap_serverconfig_chooser']; |
|
| 45 | 45 | |
| 46 | 46 | $ldapWrapper = new \OCA\User_LDAP\LDAP(); |
| 47 | 47 | $configuration = new \OCA\User_LDAP\Configuration($prefix); |
@@ -66,7 +66,7 @@ discard block |
||
| 66 | 66 | |
| 67 | 67 | $wizard = new \OCA\User_LDAP\Wizard($configuration, $ldapWrapper, $access); |
| 68 | 68 | |
| 69 | -switch($action) { |
|
| 69 | +switch ($action) { |
|
| 70 | 70 | case 'guessPortAndTLS': |
| 71 | 71 | case 'guessBaseDN': |
| 72 | 72 | case 'detectEmailAttribute': |
@@ -85,7 +85,7 @@ discard block |
||
| 85 | 85 | case 'countInBaseDN': |
| 86 | 86 | try { |
| 87 | 87 | $result = $wizard->$action(); |
| 88 | - if($result !== false) { |
|
| 88 | + if ($result !== false) { |
|
| 89 | 89 | OCP\JSON::success($result->getResultArray()); |
| 90 | 90 | exit; |
| 91 | 91 | } |
@@ -101,7 +101,7 @@ discard block |
||
| 101 | 101 | try { |
| 102 | 102 | $loginName = $_POST['ldap_test_loginname']; |
| 103 | 103 | $result = $wizard->$action($loginName); |
| 104 | - if($result !== false) { |
|
| 104 | + if ($result !== false) { |
|
| 105 | 105 | OCP\JSON::success($result->getResultArray()); |
| 106 | 106 | exit; |
| 107 | 107 | } |
@@ -117,14 +117,14 @@ discard block |
||
| 117 | 117 | case 'save': |
| 118 | 118 | $key = isset($_POST['cfgkey']) ? $_POST['cfgkey'] : false; |
| 119 | 119 | $val = isset($_POST['cfgval']) ? $_POST['cfgval'] : null; |
| 120 | - if($key === false || is_null($val)) { |
|
| 120 | + if ($key === false || is_null($val)) { |
|
| 121 | 121 | \OCP\JSON::error(array('message' => $l->t('No data specified'))); |
| 122 | 122 | exit; |
| 123 | 123 | } |
| 124 | 124 | $cfg = array($key => $val); |
| 125 | 125 | $setParameters = array(); |
| 126 | 126 | $configuration->setConfiguration($cfg, $setParameters); |
| 127 | - if(!in_array($key, $setParameters)) { |
|
| 127 | + if (!in_array($key, $setParameters)) { |
|
| 128 | 128 | \OCP\JSON::error(array('message' => $l->t($key. |
| 129 | 129 | ' Could not set configuration %s', $setParameters[0]))); |
| 130 | 130 | exit; |
@@ -33,13 +33,13 @@ discard block |
||
| 33 | 33 | $l = \OC::$server->getL10N('user_ldap'); |
| 34 | 34 | |
| 35 | 35 | if(!isset($_POST['action'])) { |
| 36 | - \OCP\JSON::error(array('message' => $l->t('No action specified'))); |
|
| 36 | + \OCP\JSON::error(array('message' => $l->t('No action specified'))); |
|
| 37 | 37 | } |
| 38 | 38 | $action = (string)$_POST['action']; |
| 39 | 39 | |
| 40 | 40 | |
| 41 | 41 | if(!isset($_POST['ldap_serverconfig_chooser'])) { |
| 42 | - \OCP\JSON::error(array('message' => $l->t('No configuration specified'))); |
|
| 42 | + \OCP\JSON::error(array('message' => $l->t('No configuration specified'))); |
|
| 43 | 43 | } |
| 44 | 44 | $prefix = (string)$_POST['ldap_serverconfig_chooser']; |
| 45 | 45 | |
@@ -52,91 +52,91 @@ discard block |
||
| 52 | 52 | $con->setIgnoreValidation(true); |
| 53 | 53 | |
| 54 | 54 | $userManager = new \OCA\User_LDAP\User\Manager( |
| 55 | - \OC::$server->getConfig(), |
|
| 56 | - new \OCA\User_LDAP\FilesystemHelper(), |
|
| 57 | - new \OCA\User_LDAP\LogWrapper(), |
|
| 58 | - \OC::$server->getAvatarManager(), |
|
| 59 | - new \OCP\Image(), |
|
| 60 | - \OC::$server->getDatabaseConnection(), |
|
| 61 | - \OC::$server->getUserManager(), |
|
| 62 | - \OC::$server->getNotificationManager()); |
|
| 55 | + \OC::$server->getConfig(), |
|
| 56 | + new \OCA\User_LDAP\FilesystemHelper(), |
|
| 57 | + new \OCA\User_LDAP\LogWrapper(), |
|
| 58 | + \OC::$server->getAvatarManager(), |
|
| 59 | + new \OCP\Image(), |
|
| 60 | + \OC::$server->getDatabaseConnection(), |
|
| 61 | + \OC::$server->getUserManager(), |
|
| 62 | + \OC::$server->getNotificationManager()); |
|
| 63 | 63 | |
| 64 | 64 | $access = new \OCA\User_LDAP\Access($con, $ldapWrapper, $userManager, new \OCA\User_LDAP\Helper( |
| 65 | - \OC::$server->getConfig() |
|
| 65 | + \OC::$server->getConfig() |
|
| 66 | 66 | )); |
| 67 | 67 | |
| 68 | 68 | $wizard = new \OCA\User_LDAP\Wizard($configuration, $ldapWrapper, $access); |
| 69 | 69 | |
| 70 | 70 | switch($action) { |
| 71 | - case 'guessPortAndTLS': |
|
| 72 | - case 'guessBaseDN': |
|
| 73 | - case 'detectEmailAttribute': |
|
| 74 | - case 'detectUserDisplayNameAttribute': |
|
| 75 | - case 'determineGroupMemberAssoc': |
|
| 76 | - case 'determineUserObjectClasses': |
|
| 77 | - case 'determineGroupObjectClasses': |
|
| 78 | - case 'determineGroupsForUsers': |
|
| 79 | - case 'determineGroupsForGroups': |
|
| 80 | - case 'determineAttributes': |
|
| 81 | - case 'getUserListFilter': |
|
| 82 | - case 'getUserLoginFilter': |
|
| 83 | - case 'getGroupFilter': |
|
| 84 | - case 'countUsers': |
|
| 85 | - case 'countGroups': |
|
| 86 | - case 'countInBaseDN': |
|
| 87 | - try { |
|
| 88 | - $result = $wizard->$action(); |
|
| 89 | - if($result !== false) { |
|
| 90 | - OCP\JSON::success($result->getResultArray()); |
|
| 91 | - exit; |
|
| 92 | - } |
|
| 93 | - } catch (\Exception $e) { |
|
| 94 | - \OCP\JSON::error(array('message' => $e->getMessage(), 'code' => $e->getCode())); |
|
| 95 | - exit; |
|
| 96 | - } |
|
| 97 | - \OCP\JSON::error(); |
|
| 98 | - exit; |
|
| 99 | - break; |
|
| 71 | + case 'guessPortAndTLS': |
|
| 72 | + case 'guessBaseDN': |
|
| 73 | + case 'detectEmailAttribute': |
|
| 74 | + case 'detectUserDisplayNameAttribute': |
|
| 75 | + case 'determineGroupMemberAssoc': |
|
| 76 | + case 'determineUserObjectClasses': |
|
| 77 | + case 'determineGroupObjectClasses': |
|
| 78 | + case 'determineGroupsForUsers': |
|
| 79 | + case 'determineGroupsForGroups': |
|
| 80 | + case 'determineAttributes': |
|
| 81 | + case 'getUserListFilter': |
|
| 82 | + case 'getUserLoginFilter': |
|
| 83 | + case 'getGroupFilter': |
|
| 84 | + case 'countUsers': |
|
| 85 | + case 'countGroups': |
|
| 86 | + case 'countInBaseDN': |
|
| 87 | + try { |
|
| 88 | + $result = $wizard->$action(); |
|
| 89 | + if($result !== false) { |
|
| 90 | + OCP\JSON::success($result->getResultArray()); |
|
| 91 | + exit; |
|
| 92 | + } |
|
| 93 | + } catch (\Exception $e) { |
|
| 94 | + \OCP\JSON::error(array('message' => $e->getMessage(), 'code' => $e->getCode())); |
|
| 95 | + exit; |
|
| 96 | + } |
|
| 97 | + \OCP\JSON::error(); |
|
| 98 | + exit; |
|
| 99 | + break; |
|
| 100 | 100 | |
| 101 | - case 'testLoginName': { |
|
| 102 | - try { |
|
| 103 | - $loginName = $_POST['ldap_test_loginname']; |
|
| 104 | - $result = $wizard->$action($loginName); |
|
| 105 | - if($result !== false) { |
|
| 106 | - OCP\JSON::success($result->getResultArray()); |
|
| 107 | - exit; |
|
| 108 | - } |
|
| 109 | - } catch (\Exception $e) { |
|
| 110 | - \OCP\JSON::error(array('message' => $e->getMessage())); |
|
| 111 | - exit; |
|
| 112 | - } |
|
| 113 | - \OCP\JSON::error(); |
|
| 114 | - exit; |
|
| 115 | - break; |
|
| 116 | - } |
|
| 101 | + case 'testLoginName': { |
|
| 102 | + try { |
|
| 103 | + $loginName = $_POST['ldap_test_loginname']; |
|
| 104 | + $result = $wizard->$action($loginName); |
|
| 105 | + if($result !== false) { |
|
| 106 | + OCP\JSON::success($result->getResultArray()); |
|
| 107 | + exit; |
|
| 108 | + } |
|
| 109 | + } catch (\Exception $e) { |
|
| 110 | + \OCP\JSON::error(array('message' => $e->getMessage())); |
|
| 111 | + exit; |
|
| 112 | + } |
|
| 113 | + \OCP\JSON::error(); |
|
| 114 | + exit; |
|
| 115 | + break; |
|
| 116 | + } |
|
| 117 | 117 | |
| 118 | - case 'save': |
|
| 119 | - $key = isset($_POST['cfgkey']) ? $_POST['cfgkey'] : false; |
|
| 120 | - $val = isset($_POST['cfgval']) ? $_POST['cfgval'] : null; |
|
| 121 | - if($key === false || is_null($val)) { |
|
| 122 | - \OCP\JSON::error(array('message' => $l->t('No data specified'))); |
|
| 123 | - exit; |
|
| 124 | - } |
|
| 125 | - $cfg = array($key => $val); |
|
| 126 | - $setParameters = array(); |
|
| 127 | - $configuration->setConfiguration($cfg, $setParameters); |
|
| 128 | - if(!in_array($key, $setParameters)) { |
|
| 129 | - \OCP\JSON::error(array('message' => $l->t($key. |
|
| 130 | - ' Could not set configuration %s', $setParameters[0]))); |
|
| 131 | - exit; |
|
| 132 | - } |
|
| 133 | - $configuration->saveConfiguration(); |
|
| 134 | - //clear the cache on save |
|
| 135 | - $connection = new \OCA\User_LDAP\Connection($ldapWrapper, $prefix); |
|
| 136 | - $connection->clearCache(); |
|
| 137 | - OCP\JSON::success(); |
|
| 138 | - break; |
|
| 139 | - default: |
|
| 140 | - \OCP\JSON::error(array('message' => $l->t('Action does not exist'))); |
|
| 141 | - break; |
|
| 118 | + case 'save': |
|
| 119 | + $key = isset($_POST['cfgkey']) ? $_POST['cfgkey'] : false; |
|
| 120 | + $val = isset($_POST['cfgval']) ? $_POST['cfgval'] : null; |
|
| 121 | + if($key === false || is_null($val)) { |
|
| 122 | + \OCP\JSON::error(array('message' => $l->t('No data specified'))); |
|
| 123 | + exit; |
|
| 124 | + } |
|
| 125 | + $cfg = array($key => $val); |
|
| 126 | + $setParameters = array(); |
|
| 127 | + $configuration->setConfiguration($cfg, $setParameters); |
|
| 128 | + if(!in_array($key, $setParameters)) { |
|
| 129 | + \OCP\JSON::error(array('message' => $l->t($key. |
|
| 130 | + ' Could not set configuration %s', $setParameters[0]))); |
|
| 131 | + exit; |
|
| 132 | + } |
|
| 133 | + $configuration->saveConfiguration(); |
|
| 134 | + //clear the cache on save |
|
| 135 | + $connection = new \OCA\User_LDAP\Connection($ldapWrapper, $prefix); |
|
| 136 | + $connection->clearCache(); |
|
| 137 | + OCP\JSON::success(); |
|
| 138 | + break; |
|
| 139 | + default: |
|
| 140 | + \OCP\JSON::error(array('message' => $l->t('Action does not exist'))); |
|
| 141 | + break; |
|
| 142 | 142 | } |
@@ -38,12 +38,12 @@ |
||
| 38 | 38 | |
| 39 | 39 | $newConfig = new \OCA\User_LDAP\Configuration($nk, false); |
| 40 | 40 | if(isset($_POST['copyConfig'])) { |
| 41 | - $originalConfig = new \OCA\User_LDAP\Configuration($_POST['copyConfig']); |
|
| 42 | - $newConfig->setConfiguration($originalConfig->getConfiguration()); |
|
| 41 | + $originalConfig = new \OCA\User_LDAP\Configuration($_POST['copyConfig']); |
|
| 42 | + $newConfig->setConfiguration($originalConfig->getConfiguration()); |
|
| 43 | 43 | } else { |
| 44 | - $configuration = new \OCA\User_LDAP\Configuration($nk, false); |
|
| 45 | - $newConfig->setConfiguration($configuration->getDefaults()); |
|
| 46 | - $resultData['defaults'] = $configuration->getDefaults(); |
|
| 44 | + $configuration = new \OCA\User_LDAP\Configuration($nk, false); |
|
| 45 | + $newConfig->setConfiguration($configuration->getDefaults()); |
|
| 46 | + $resultData['defaults'] = $configuration->getDefaults(); |
|
| 47 | 47 | } |
| 48 | 48 | $newConfig->saveConfiguration(); |
| 49 | 49 | |
@@ -32,12 +32,12 @@ |
||
| 32 | 32 | sort($serverConnections); |
| 33 | 33 | $lk = array_pop($serverConnections); |
| 34 | 34 | $ln = intval(str_replace('s', '', $lk)); |
| 35 | -$nk = 's'.str_pad($ln+1, 2, '0', STR_PAD_LEFT); |
|
| 35 | +$nk = 's'.str_pad($ln + 1, 2, '0', STR_PAD_LEFT); |
|
| 36 | 36 | |
| 37 | 37 | $resultData = array('configPrefix' => $nk); |
| 38 | 38 | |
| 39 | 39 | $newConfig = new \OCA\User_LDAP\Configuration($nk, false); |
| 40 | -if(isset($_POST['copyConfig'])) { |
|
| 40 | +if (isset($_POST['copyConfig'])) { |
|
| 41 | 41 | $originalConfig = new \OCA\User_LDAP\Configuration($_POST['copyConfig']); |
| 42 | 42 | $newConfig->setConfiguration($originalConfig->getConfiguration()); |
| 43 | 43 | } else { |
@@ -29,12 +29,12 @@ |
||
| 29 | 29 | */ |
| 30 | 30 | class GroupMapping extends AbstractMapping { |
| 31 | 31 | |
| 32 | - /** |
|
| 33 | - * returns the DB table name which holds the mappings |
|
| 34 | - * @return string |
|
| 35 | - */ |
|
| 36 | - protected function getTableName() { |
|
| 37 | - return '*PREFIX*ldap_group_mapping'; |
|
| 38 | - } |
|
| 32 | + /** |
|
| 33 | + * returns the DB table name which holds the mappings |
|
| 34 | + * @return string |
|
| 35 | + */ |
|
| 36 | + protected function getTableName() { |
|
| 37 | + return '*PREFIX*ldap_group_mapping'; |
|
| 38 | + } |
|
| 39 | 39 | |
| 40 | 40 | } |
@@ -29,12 +29,12 @@ |
||
| 29 | 29 | */ |
| 30 | 30 | class UserMapping extends AbstractMapping { |
| 31 | 31 | |
| 32 | - /** |
|
| 33 | - * returns the DB table name which holds the mappings |
|
| 34 | - * @return string |
|
| 35 | - */ |
|
| 36 | - protected function getTableName() { |
|
| 37 | - return '*PREFIX*ldap_user_mapping'; |
|
| 38 | - } |
|
| 32 | + /** |
|
| 33 | + * returns the DB table name which holds the mappings |
|
| 34 | + * @return string |
|
| 35 | + */ |
|
| 36 | + protected function getTableName() { |
|
| 37 | + return '*PREFIX*ldap_user_mapping'; |
|
| 38 | + } |
|
| 39 | 39 | |
| 40 | 40 | } |
@@ -29,252 +29,252 @@ |
||
| 29 | 29 | * @package OCA\User_LDAP\Mapping |
| 30 | 30 | */ |
| 31 | 31 | abstract class AbstractMapping { |
| 32 | - /** |
|
| 33 | - * @var \OCP\IDBConnection $dbc |
|
| 34 | - */ |
|
| 35 | - protected $dbc; |
|
| 32 | + /** |
|
| 33 | + * @var \OCP\IDBConnection $dbc |
|
| 34 | + */ |
|
| 35 | + protected $dbc; |
|
| 36 | 36 | |
| 37 | - /** |
|
| 38 | - * returns the DB table name which holds the mappings |
|
| 39 | - * @return string |
|
| 40 | - */ |
|
| 41 | - abstract protected function getTableName(); |
|
| 37 | + /** |
|
| 38 | + * returns the DB table name which holds the mappings |
|
| 39 | + * @return string |
|
| 40 | + */ |
|
| 41 | + abstract protected function getTableName(); |
|
| 42 | 42 | |
| 43 | - /** |
|
| 44 | - * @param \OCP\IDBConnection $dbc |
|
| 45 | - */ |
|
| 46 | - public function __construct(\OCP\IDBConnection $dbc) { |
|
| 47 | - $this->dbc = $dbc; |
|
| 48 | - } |
|
| 43 | + /** |
|
| 44 | + * @param \OCP\IDBConnection $dbc |
|
| 45 | + */ |
|
| 46 | + public function __construct(\OCP\IDBConnection $dbc) { |
|
| 47 | + $this->dbc = $dbc; |
|
| 48 | + } |
|
| 49 | 49 | |
| 50 | - /** |
|
| 51 | - * checks whether a provided string represents an existing table col |
|
| 52 | - * @param string $col |
|
| 53 | - * @return bool |
|
| 54 | - */ |
|
| 55 | - public function isColNameValid($col) { |
|
| 56 | - switch($col) { |
|
| 57 | - case 'ldap_dn': |
|
| 58 | - case 'owncloud_name': |
|
| 59 | - case 'directory_uuid': |
|
| 60 | - return true; |
|
| 61 | - default: |
|
| 62 | - return false; |
|
| 63 | - } |
|
| 64 | - } |
|
| 50 | + /** |
|
| 51 | + * checks whether a provided string represents an existing table col |
|
| 52 | + * @param string $col |
|
| 53 | + * @return bool |
|
| 54 | + */ |
|
| 55 | + public function isColNameValid($col) { |
|
| 56 | + switch($col) { |
|
| 57 | + case 'ldap_dn': |
|
| 58 | + case 'owncloud_name': |
|
| 59 | + case 'directory_uuid': |
|
| 60 | + return true; |
|
| 61 | + default: |
|
| 62 | + return false; |
|
| 63 | + } |
|
| 64 | + } |
|
| 65 | 65 | |
| 66 | - /** |
|
| 67 | - * Gets the value of one column based on a provided value of another column |
|
| 68 | - * @param string $fetchCol |
|
| 69 | - * @param string $compareCol |
|
| 70 | - * @param string $search |
|
| 71 | - * @throws \Exception |
|
| 72 | - * @return string|false |
|
| 73 | - */ |
|
| 74 | - protected function getXbyY($fetchCol, $compareCol, $search) { |
|
| 75 | - if(!$this->isColNameValid($fetchCol)) { |
|
| 76 | - //this is used internally only, but we don't want to risk |
|
| 77 | - //having SQL injection at all. |
|
| 78 | - throw new \Exception('Invalid Column Name'); |
|
| 79 | - } |
|
| 80 | - $query = $this->dbc->prepare(' |
|
| 66 | + /** |
|
| 67 | + * Gets the value of one column based on a provided value of another column |
|
| 68 | + * @param string $fetchCol |
|
| 69 | + * @param string $compareCol |
|
| 70 | + * @param string $search |
|
| 71 | + * @throws \Exception |
|
| 72 | + * @return string|false |
|
| 73 | + */ |
|
| 74 | + protected function getXbyY($fetchCol, $compareCol, $search) { |
|
| 75 | + if(!$this->isColNameValid($fetchCol)) { |
|
| 76 | + //this is used internally only, but we don't want to risk |
|
| 77 | + //having SQL injection at all. |
|
| 78 | + throw new \Exception('Invalid Column Name'); |
|
| 79 | + } |
|
| 80 | + $query = $this->dbc->prepare(' |
|
| 81 | 81 | SELECT `' . $fetchCol . '` |
| 82 | 82 | FROM `'. $this->getTableName() .'` |
| 83 | 83 | WHERE `' . $compareCol . '` = ? |
| 84 | 84 | '); |
| 85 | 85 | |
| 86 | - $res = $query->execute(array($search)); |
|
| 87 | - if($res !== false) { |
|
| 88 | - return $query->fetchColumn(); |
|
| 89 | - } |
|
| 86 | + $res = $query->execute(array($search)); |
|
| 87 | + if($res !== false) { |
|
| 88 | + return $query->fetchColumn(); |
|
| 89 | + } |
|
| 90 | 90 | |
| 91 | - return false; |
|
| 92 | - } |
|
| 91 | + return false; |
|
| 92 | + } |
|
| 93 | 93 | |
| 94 | - /** |
|
| 95 | - * Performs a DELETE or UPDATE query to the database. |
|
| 96 | - * @param \Doctrine\DBAL\Driver\Statement $query |
|
| 97 | - * @param array $parameters |
|
| 98 | - * @return bool true if at least one row was modified, false otherwise |
|
| 99 | - */ |
|
| 100 | - protected function modify($query, $parameters) { |
|
| 101 | - $result = $query->execute($parameters); |
|
| 102 | - return ($result === true && $query->rowCount() > 0); |
|
| 103 | - } |
|
| 94 | + /** |
|
| 95 | + * Performs a DELETE or UPDATE query to the database. |
|
| 96 | + * @param \Doctrine\DBAL\Driver\Statement $query |
|
| 97 | + * @param array $parameters |
|
| 98 | + * @return bool true if at least one row was modified, false otherwise |
|
| 99 | + */ |
|
| 100 | + protected function modify($query, $parameters) { |
|
| 101 | + $result = $query->execute($parameters); |
|
| 102 | + return ($result === true && $query->rowCount() > 0); |
|
| 103 | + } |
|
| 104 | 104 | |
| 105 | - /** |
|
| 106 | - * Gets the LDAP DN based on the provided name. |
|
| 107 | - * Replaces Access::ocname2dn |
|
| 108 | - * @param string $name |
|
| 109 | - * @return string|false |
|
| 110 | - */ |
|
| 111 | - public function getDNByName($name) { |
|
| 112 | - return $this->getXbyY('ldap_dn', 'owncloud_name', $name); |
|
| 113 | - } |
|
| 105 | + /** |
|
| 106 | + * Gets the LDAP DN based on the provided name. |
|
| 107 | + * Replaces Access::ocname2dn |
|
| 108 | + * @param string $name |
|
| 109 | + * @return string|false |
|
| 110 | + */ |
|
| 111 | + public function getDNByName($name) { |
|
| 112 | + return $this->getXbyY('ldap_dn', 'owncloud_name', $name); |
|
| 113 | + } |
|
| 114 | 114 | |
| 115 | - /** |
|
| 116 | - * Updates the DN based on the given UUID |
|
| 117 | - * @param string $fdn |
|
| 118 | - * @param string $uuid |
|
| 119 | - * @return bool |
|
| 120 | - */ |
|
| 121 | - public function setDNbyUUID($fdn, $uuid) { |
|
| 122 | - $query = $this->dbc->prepare(' |
|
| 115 | + /** |
|
| 116 | + * Updates the DN based on the given UUID |
|
| 117 | + * @param string $fdn |
|
| 118 | + * @param string $uuid |
|
| 119 | + * @return bool |
|
| 120 | + */ |
|
| 121 | + public function setDNbyUUID($fdn, $uuid) { |
|
| 122 | + $query = $this->dbc->prepare(' |
|
| 123 | 123 | UPDATE `' . $this->getTableName() . '` |
| 124 | 124 | SET `ldap_dn` = ? |
| 125 | 125 | WHERE `directory_uuid` = ? |
| 126 | 126 | '); |
| 127 | 127 | |
| 128 | - return $this->modify($query, array($fdn, $uuid)); |
|
| 129 | - } |
|
| 128 | + return $this->modify($query, array($fdn, $uuid)); |
|
| 129 | + } |
|
| 130 | 130 | |
| 131 | - /** |
|
| 132 | - * Updates the UUID based on the given DN |
|
| 133 | - * |
|
| 134 | - * required by Migration/UUIDFix |
|
| 135 | - * |
|
| 136 | - * @param $uuid |
|
| 137 | - * @param $fdn |
|
| 138 | - * @return bool |
|
| 139 | - */ |
|
| 140 | - public function setUUIDbyDN($uuid, $fdn) { |
|
| 141 | - $query = $this->dbc->prepare(' |
|
| 131 | + /** |
|
| 132 | + * Updates the UUID based on the given DN |
|
| 133 | + * |
|
| 134 | + * required by Migration/UUIDFix |
|
| 135 | + * |
|
| 136 | + * @param $uuid |
|
| 137 | + * @param $fdn |
|
| 138 | + * @return bool |
|
| 139 | + */ |
|
| 140 | + public function setUUIDbyDN($uuid, $fdn) { |
|
| 141 | + $query = $this->dbc->prepare(' |
|
| 142 | 142 | UPDATE `' . $this->getTableName() . '` |
| 143 | 143 | SET `directory_uuid` = ? |
| 144 | 144 | WHERE `ldap_dn` = ? |
| 145 | 145 | '); |
| 146 | 146 | |
| 147 | - return $this->modify($query, [$uuid, $fdn]); |
|
| 148 | - } |
|
| 147 | + return $this->modify($query, [$uuid, $fdn]); |
|
| 148 | + } |
|
| 149 | 149 | |
| 150 | - /** |
|
| 151 | - * Gets the name based on the provided LDAP DN. |
|
| 152 | - * @param string $fdn |
|
| 153 | - * @return string|false |
|
| 154 | - */ |
|
| 155 | - public function getNameByDN($fdn) { |
|
| 156 | - return $this->getXbyY('owncloud_name', 'ldap_dn', $fdn); |
|
| 157 | - } |
|
| 150 | + /** |
|
| 151 | + * Gets the name based on the provided LDAP DN. |
|
| 152 | + * @param string $fdn |
|
| 153 | + * @return string|false |
|
| 154 | + */ |
|
| 155 | + public function getNameByDN($fdn) { |
|
| 156 | + return $this->getXbyY('owncloud_name', 'ldap_dn', $fdn); |
|
| 157 | + } |
|
| 158 | 158 | |
| 159 | - /** |
|
| 160 | - * Searches mapped names by the giving string in the name column |
|
| 161 | - * @param string $search |
|
| 162 | - * @param string $prefixMatch |
|
| 163 | - * @param string $postfixMatch |
|
| 164 | - * @return string[] |
|
| 165 | - */ |
|
| 166 | - public function getNamesBySearch($search, $prefixMatch = "", $postfixMatch = "") { |
|
| 167 | - $query = $this->dbc->prepare(' |
|
| 159 | + /** |
|
| 160 | + * Searches mapped names by the giving string in the name column |
|
| 161 | + * @param string $search |
|
| 162 | + * @param string $prefixMatch |
|
| 163 | + * @param string $postfixMatch |
|
| 164 | + * @return string[] |
|
| 165 | + */ |
|
| 166 | + public function getNamesBySearch($search, $prefixMatch = "", $postfixMatch = "") { |
|
| 167 | + $query = $this->dbc->prepare(' |
|
| 168 | 168 | SELECT `owncloud_name` |
| 169 | 169 | FROM `'. $this->getTableName() .'` |
| 170 | 170 | WHERE `owncloud_name` LIKE ? |
| 171 | 171 | '); |
| 172 | 172 | |
| 173 | - $res = $query->execute(array($prefixMatch.$this->dbc->escapeLikeParameter($search).$postfixMatch)); |
|
| 174 | - $names = array(); |
|
| 175 | - if($res !== false) { |
|
| 176 | - while($row = $query->fetch()) { |
|
| 177 | - $names[] = $row['owncloud_name']; |
|
| 178 | - } |
|
| 179 | - } |
|
| 180 | - return $names; |
|
| 181 | - } |
|
| 173 | + $res = $query->execute(array($prefixMatch.$this->dbc->escapeLikeParameter($search).$postfixMatch)); |
|
| 174 | + $names = array(); |
|
| 175 | + if($res !== false) { |
|
| 176 | + while($row = $query->fetch()) { |
|
| 177 | + $names[] = $row['owncloud_name']; |
|
| 178 | + } |
|
| 179 | + } |
|
| 180 | + return $names; |
|
| 181 | + } |
|
| 182 | 182 | |
| 183 | - /** |
|
| 184 | - * Gets the name based on the provided LDAP UUID. |
|
| 185 | - * @param string $uuid |
|
| 186 | - * @return string|false |
|
| 187 | - */ |
|
| 188 | - public function getNameByUUID($uuid) { |
|
| 189 | - return $this->getXbyY('owncloud_name', 'directory_uuid', $uuid); |
|
| 190 | - } |
|
| 183 | + /** |
|
| 184 | + * Gets the name based on the provided LDAP UUID. |
|
| 185 | + * @param string $uuid |
|
| 186 | + * @return string|false |
|
| 187 | + */ |
|
| 188 | + public function getNameByUUID($uuid) { |
|
| 189 | + return $this->getXbyY('owncloud_name', 'directory_uuid', $uuid); |
|
| 190 | + } |
|
| 191 | 191 | |
| 192 | - /** |
|
| 193 | - * Gets the UUID based on the provided LDAP DN |
|
| 194 | - * @param string $dn |
|
| 195 | - * @return false|string |
|
| 196 | - * @throws \Exception |
|
| 197 | - */ |
|
| 198 | - public function getUUIDByDN($dn) { |
|
| 199 | - return $this->getXbyY('directory_uuid', 'ldap_dn', $dn); |
|
| 200 | - } |
|
| 192 | + /** |
|
| 193 | + * Gets the UUID based on the provided LDAP DN |
|
| 194 | + * @param string $dn |
|
| 195 | + * @return false|string |
|
| 196 | + * @throws \Exception |
|
| 197 | + */ |
|
| 198 | + public function getUUIDByDN($dn) { |
|
| 199 | + return $this->getXbyY('directory_uuid', 'ldap_dn', $dn); |
|
| 200 | + } |
|
| 201 | 201 | |
| 202 | - /** |
|
| 203 | - * gets a piece of the mapping list |
|
| 204 | - * @param int $offset |
|
| 205 | - * @param int $limit |
|
| 206 | - * @return array |
|
| 207 | - */ |
|
| 208 | - public function getList($offset = null, $limit = null) { |
|
| 209 | - $query = $this->dbc->prepare(' |
|
| 202 | + /** |
|
| 203 | + * gets a piece of the mapping list |
|
| 204 | + * @param int $offset |
|
| 205 | + * @param int $limit |
|
| 206 | + * @return array |
|
| 207 | + */ |
|
| 208 | + public function getList($offset = null, $limit = null) { |
|
| 209 | + $query = $this->dbc->prepare(' |
|
| 210 | 210 | SELECT |
| 211 | 211 | `ldap_dn` AS `dn`, |
| 212 | 212 | `owncloud_name` AS `name`, |
| 213 | 213 | `directory_uuid` AS `uuid` |
| 214 | 214 | FROM `' . $this->getTableName() . '`', |
| 215 | - $limit, |
|
| 216 | - $offset |
|
| 217 | - ); |
|
| 215 | + $limit, |
|
| 216 | + $offset |
|
| 217 | + ); |
|
| 218 | 218 | |
| 219 | - $query->execute(); |
|
| 220 | - return $query->fetchAll(); |
|
| 221 | - } |
|
| 219 | + $query->execute(); |
|
| 220 | + return $query->fetchAll(); |
|
| 221 | + } |
|
| 222 | 222 | |
| 223 | - /** |
|
| 224 | - * attempts to map the given entry |
|
| 225 | - * @param string $fdn fully distinguished name (from LDAP) |
|
| 226 | - * @param string $name |
|
| 227 | - * @param string $uuid a unique identifier as used in LDAP |
|
| 228 | - * @return bool |
|
| 229 | - */ |
|
| 230 | - public function map($fdn, $name, $uuid) { |
|
| 231 | - if(mb_strlen($fdn) > 255) { |
|
| 232 | - \OC::$server->getLogger()->error( |
|
| 233 | - 'Cannot map, because the DN exceeds 255 characters: {dn}', |
|
| 234 | - [ |
|
| 235 | - 'app' => 'user_ldap', |
|
| 236 | - 'dn' => $fdn, |
|
| 237 | - ] |
|
| 238 | - ); |
|
| 239 | - return false; |
|
| 240 | - } |
|
| 223 | + /** |
|
| 224 | + * attempts to map the given entry |
|
| 225 | + * @param string $fdn fully distinguished name (from LDAP) |
|
| 226 | + * @param string $name |
|
| 227 | + * @param string $uuid a unique identifier as used in LDAP |
|
| 228 | + * @return bool |
|
| 229 | + */ |
|
| 230 | + public function map($fdn, $name, $uuid) { |
|
| 231 | + if(mb_strlen($fdn) > 255) { |
|
| 232 | + \OC::$server->getLogger()->error( |
|
| 233 | + 'Cannot map, because the DN exceeds 255 characters: {dn}', |
|
| 234 | + [ |
|
| 235 | + 'app' => 'user_ldap', |
|
| 236 | + 'dn' => $fdn, |
|
| 237 | + ] |
|
| 238 | + ); |
|
| 239 | + return false; |
|
| 240 | + } |
|
| 241 | 241 | |
| 242 | - $row = array( |
|
| 243 | - 'ldap_dn' => $fdn, |
|
| 244 | - 'owncloud_name' => $name, |
|
| 245 | - 'directory_uuid' => $uuid |
|
| 246 | - ); |
|
| 242 | + $row = array( |
|
| 243 | + 'ldap_dn' => $fdn, |
|
| 244 | + 'owncloud_name' => $name, |
|
| 245 | + 'directory_uuid' => $uuid |
|
| 246 | + ); |
|
| 247 | 247 | |
| 248 | - try { |
|
| 249 | - $result = $this->dbc->insertIfNotExist($this->getTableName(), $row); |
|
| 250 | - // insertIfNotExist returns values as int |
|
| 251 | - return (bool)$result; |
|
| 252 | - } catch (\Exception $e) { |
|
| 253 | - return false; |
|
| 254 | - } |
|
| 255 | - } |
|
| 248 | + try { |
|
| 249 | + $result = $this->dbc->insertIfNotExist($this->getTableName(), $row); |
|
| 250 | + // insertIfNotExist returns values as int |
|
| 251 | + return (bool)$result; |
|
| 252 | + } catch (\Exception $e) { |
|
| 253 | + return false; |
|
| 254 | + } |
|
| 255 | + } |
|
| 256 | 256 | |
| 257 | - /** |
|
| 258 | - * removes a mapping based on the owncloud_name of the entry |
|
| 259 | - * @param string $name |
|
| 260 | - * @return bool |
|
| 261 | - */ |
|
| 262 | - public function unmap($name) { |
|
| 263 | - $query = $this->dbc->prepare(' |
|
| 257 | + /** |
|
| 258 | + * removes a mapping based on the owncloud_name of the entry |
|
| 259 | + * @param string $name |
|
| 260 | + * @return bool |
|
| 261 | + */ |
|
| 262 | + public function unmap($name) { |
|
| 263 | + $query = $this->dbc->prepare(' |
|
| 264 | 264 | DELETE FROM `'. $this->getTableName() .'` |
| 265 | 265 | WHERE `owncloud_name` = ?'); |
| 266 | 266 | |
| 267 | - return $this->modify($query, array($name)); |
|
| 268 | - } |
|
| 267 | + return $this->modify($query, array($name)); |
|
| 268 | + } |
|
| 269 | 269 | |
| 270 | - /** |
|
| 271 | - * Truncate's the mapping table |
|
| 272 | - * @return bool |
|
| 273 | - */ |
|
| 274 | - public function clear() { |
|
| 275 | - $sql = $this->dbc |
|
| 276 | - ->getDatabasePlatform() |
|
| 277 | - ->getTruncateTableSQL('`' . $this->getTableName() . '`'); |
|
| 278 | - return $this->dbc->prepare($sql)->execute(); |
|
| 279 | - } |
|
| 270 | + /** |
|
| 271 | + * Truncate's the mapping table |
|
| 272 | + * @return bool |
|
| 273 | + */ |
|
| 274 | + public function clear() { |
|
| 275 | + $sql = $this->dbc |
|
| 276 | + ->getDatabasePlatform() |
|
| 277 | + ->getTruncateTableSQL('`' . $this->getTableName() . '`'); |
|
| 278 | + return $this->dbc->prepare($sql)->execute(); |
|
| 279 | + } |
|
| 280 | 280 | } |
@@ -53,7 +53,7 @@ discard block |
||
| 53 | 53 | * @return bool |
| 54 | 54 | */ |
| 55 | 55 | public function isColNameValid($col) { |
| 56 | - switch($col) { |
|
| 56 | + switch ($col) { |
|
| 57 | 57 | case 'ldap_dn': |
| 58 | 58 | case 'owncloud_name': |
| 59 | 59 | case 'directory_uuid': |
@@ -72,19 +72,19 @@ discard block |
||
| 72 | 72 | * @return string|false |
| 73 | 73 | */ |
| 74 | 74 | protected function getXbyY($fetchCol, $compareCol, $search) { |
| 75 | - if(!$this->isColNameValid($fetchCol)) { |
|
| 75 | + if (!$this->isColNameValid($fetchCol)) { |
|
| 76 | 76 | //this is used internally only, but we don't want to risk |
| 77 | 77 | //having SQL injection at all. |
| 78 | 78 | throw new \Exception('Invalid Column Name'); |
| 79 | 79 | } |
| 80 | 80 | $query = $this->dbc->prepare(' |
| 81 | - SELECT `' . $fetchCol . '` |
|
| 82 | - FROM `'. $this->getTableName() .'` |
|
| 83 | - WHERE `' . $compareCol . '` = ? |
|
| 81 | + SELECT `' . $fetchCol.'` |
|
| 82 | + FROM `'. $this->getTableName().'` |
|
| 83 | + WHERE `' . $compareCol.'` = ? |
|
| 84 | 84 | '); |
| 85 | 85 | |
| 86 | 86 | $res = $query->execute(array($search)); |
| 87 | - if($res !== false) { |
|
| 87 | + if ($res !== false) { |
|
| 88 | 88 | return $query->fetchColumn(); |
| 89 | 89 | } |
| 90 | 90 | |
@@ -120,7 +120,7 @@ discard block |
||
| 120 | 120 | */ |
| 121 | 121 | public function setDNbyUUID($fdn, $uuid) { |
| 122 | 122 | $query = $this->dbc->prepare(' |
| 123 | - UPDATE `' . $this->getTableName() . '` |
|
| 123 | + UPDATE `' . $this->getTableName().'` |
|
| 124 | 124 | SET `ldap_dn` = ? |
| 125 | 125 | WHERE `directory_uuid` = ? |
| 126 | 126 | '); |
@@ -139,7 +139,7 @@ discard block |
||
| 139 | 139 | */ |
| 140 | 140 | public function setUUIDbyDN($uuid, $fdn) { |
| 141 | 141 | $query = $this->dbc->prepare(' |
| 142 | - UPDATE `' . $this->getTableName() . '` |
|
| 142 | + UPDATE `' . $this->getTableName().'` |
|
| 143 | 143 | SET `directory_uuid` = ? |
| 144 | 144 | WHERE `ldap_dn` = ? |
| 145 | 145 | '); |
@@ -166,14 +166,14 @@ discard block |
||
| 166 | 166 | public function getNamesBySearch($search, $prefixMatch = "", $postfixMatch = "") { |
| 167 | 167 | $query = $this->dbc->prepare(' |
| 168 | 168 | SELECT `owncloud_name` |
| 169 | - FROM `'. $this->getTableName() .'` |
|
| 169 | + FROM `'. $this->getTableName().'` |
|
| 170 | 170 | WHERE `owncloud_name` LIKE ? |
| 171 | 171 | '); |
| 172 | 172 | |
| 173 | 173 | $res = $query->execute(array($prefixMatch.$this->dbc->escapeLikeParameter($search).$postfixMatch)); |
| 174 | 174 | $names = array(); |
| 175 | - if($res !== false) { |
|
| 176 | - while($row = $query->fetch()) { |
|
| 175 | + if ($res !== false) { |
|
| 176 | + while ($row = $query->fetch()) { |
|
| 177 | 177 | $names[] = $row['owncloud_name']; |
| 178 | 178 | } |
| 179 | 179 | } |
@@ -211,7 +211,7 @@ discard block |
||
| 211 | 211 | `ldap_dn` AS `dn`, |
| 212 | 212 | `owncloud_name` AS `name`, |
| 213 | 213 | `directory_uuid` AS `uuid` |
| 214 | - FROM `' . $this->getTableName() . '`', |
|
| 214 | + FROM `' . $this->getTableName().'`', |
|
| 215 | 215 | $limit, |
| 216 | 216 | $offset |
| 217 | 217 | ); |
@@ -228,7 +228,7 @@ discard block |
||
| 228 | 228 | * @return bool |
| 229 | 229 | */ |
| 230 | 230 | public function map($fdn, $name, $uuid) { |
| 231 | - if(mb_strlen($fdn) > 255) { |
|
| 231 | + if (mb_strlen($fdn) > 255) { |
|
| 232 | 232 | \OC::$server->getLogger()->error( |
| 233 | 233 | 'Cannot map, because the DN exceeds 255 characters: {dn}', |
| 234 | 234 | [ |
@@ -248,7 +248,7 @@ discard block |
||
| 248 | 248 | try { |
| 249 | 249 | $result = $this->dbc->insertIfNotExist($this->getTableName(), $row); |
| 250 | 250 | // insertIfNotExist returns values as int |
| 251 | - return (bool)$result; |
|
| 251 | + return (bool) $result; |
|
| 252 | 252 | } catch (\Exception $e) { |
| 253 | 253 | return false; |
| 254 | 254 | } |
@@ -261,7 +261,7 @@ discard block |
||
| 261 | 261 | */ |
| 262 | 262 | public function unmap($name) { |
| 263 | 263 | $query = $this->dbc->prepare(' |
| 264 | - DELETE FROM `'. $this->getTableName() .'` |
|
| 264 | + DELETE FROM `'. $this->getTableName().'` |
|
| 265 | 265 | WHERE `owncloud_name` = ?'); |
| 266 | 266 | |
| 267 | 267 | return $this->modify($query, array($name)); |
@@ -274,7 +274,7 @@ discard block |
||
| 274 | 274 | public function clear() { |
| 275 | 275 | $sql = $this->dbc |
| 276 | 276 | ->getDatabasePlatform() |
| 277 | - ->getTruncateTableSQL('`' . $this->getTableName() . '`'); |
|
| 277 | + ->getTruncateTableSQL('`'.$this->getTableName().'`'); |
|
| 278 | 278 | return $this->dbc->prepare($sql)->execute(); |
| 279 | 279 | } |
| 280 | 280 | } |