@@ -142,17 +142,17 @@ discard block |
||
| 142 | 142 | |
| 143 | 143 | // security checks |
| 144 | 144 | $isPublicPage = $this->reflector->hasAnnotation('PublicPage'); |
| 145 | - if(!$isPublicPage) { |
|
| 146 | - if(!$this->isLoggedIn) { |
|
| 145 | + if (!$isPublicPage) { |
|
| 146 | + if (!$this->isLoggedIn) { |
|
| 147 | 147 | throw new NotLoggedInException(); |
| 148 | 148 | } |
| 149 | 149 | |
| 150 | - if($this->reflector->hasAnnotation('SubAdminRequired') |
|
| 150 | + if ($this->reflector->hasAnnotation('SubAdminRequired') |
|
| 151 | 151 | && !$this->isSubAdmin |
| 152 | 152 | && !$this->isAdminUser) { |
| 153 | 153 | throw new NotAdminException($this->l10n->t('Logged in user must be an admin or sub admin')); |
| 154 | 154 | } |
| 155 | - if(!$this->reflector->hasAnnotation('SubAdminRequired') |
|
| 155 | + if (!$this->reflector->hasAnnotation('SubAdminRequired') |
|
| 156 | 156 | && !$this->reflector->hasAnnotation('NoAdminRequired') |
| 157 | 157 | && !$this->isAdminUser) { |
| 158 | 158 | throw new NotAdminException($this->l10n->t('Logged in user must be an admin')); |
@@ -160,14 +160,14 @@ discard block |
||
| 160 | 160 | } |
| 161 | 161 | |
| 162 | 162 | // Check for strict cookie requirement |
| 163 | - if($this->reflector->hasAnnotation('StrictCookieRequired') || !$this->reflector->hasAnnotation('NoCSRFRequired')) { |
|
| 164 | - if(!$this->request->passesStrictCookieCheck()) { |
|
| 163 | + if ($this->reflector->hasAnnotation('StrictCookieRequired') || !$this->reflector->hasAnnotation('NoCSRFRequired')) { |
|
| 164 | + if (!$this->request->passesStrictCookieCheck()) { |
|
| 165 | 165 | throw new StrictCookieMissingException(); |
| 166 | 166 | } |
| 167 | 167 | } |
| 168 | 168 | // CSRF check - also registers the CSRF token since the session may be closed later |
| 169 | 169 | Util::callRegister(); |
| 170 | - if(!$this->reflector->hasAnnotation('NoCSRFRequired')) { |
|
| 170 | + if (!$this->reflector->hasAnnotation('NoCSRFRequired')) { |
|
| 171 | 171 | /* |
| 172 | 172 | * Only allow the CSRF check to fail on OCS Requests. This kind of |
| 173 | 173 | * hacks around that we have no full token auth in place yet and we |
@@ -176,7 +176,7 @@ discard block |
||
| 176 | 176 | * Additionally we allow Bearer authenticated requests to pass on OCS routes. |
| 177 | 177 | * This allows oauth apps (e.g. moodle) to use the OCS endpoints |
| 178 | 178 | */ |
| 179 | - if(!$this->request->passesCSRFCheck() && !( |
|
| 179 | + if (!$this->request->passesCSRFCheck() && !( |
|
| 180 | 180 | $controller instanceof OCSController && ( |
| 181 | 181 | $this->request->getHeader('OCS-APIREQUEST') === 'true' || |
| 182 | 182 | strpos($this->request->getHeader('Authorization'), 'Bearer ') === 0 |
@@ -222,7 +222,7 @@ discard block |
||
| 222 | 222 | $defaultPolicy = $this->contentSecurityPolicyManager->getDefaultPolicy(); |
| 223 | 223 | $defaultPolicy = $this->contentSecurityPolicyManager->mergePolicies($defaultPolicy, $policy); |
| 224 | 224 | |
| 225 | - if($this->cspNonceManager->browserSupportsCspV3()) { |
|
| 225 | + if ($this->cspNonceManager->browserSupportsCspV3()) { |
|
| 226 | 226 | $defaultPolicy->useJsNonce($this->csrfTokenManager->getToken()->getEncryptedValue()); |
| 227 | 227 | } |
| 228 | 228 | |
@@ -242,17 +242,17 @@ discard block |
||
| 242 | 242 | * @return Response a Response object or null in case that the exception could not be handled |
| 243 | 243 | */ |
| 244 | 244 | public function afterException($controller, $methodName, \Exception $exception): Response { |
| 245 | - if($exception instanceof SecurityException) { |
|
| 246 | - if($exception instanceof StrictCookieMissingException) { |
|
| 245 | + if ($exception instanceof SecurityException) { |
|
| 246 | + if ($exception instanceof StrictCookieMissingException) { |
|
| 247 | 247 | return new RedirectResponse(\OC::$WEBROOT); |
| 248 | 248 | } |
| 249 | - if (stripos($this->request->getHeader('Accept'),'html') === false) { |
|
| 249 | + if (stripos($this->request->getHeader('Accept'), 'html') === false) { |
|
| 250 | 250 | $response = new JSONResponse( |
| 251 | 251 | ['message' => $exception->getMessage()], |
| 252 | 252 | $exception->getCode() |
| 253 | 253 | ); |
| 254 | 254 | } else { |
| 255 | - if($exception instanceof NotLoggedInException) { |
|
| 255 | + if ($exception instanceof NotLoggedInException) { |
|
| 256 | 256 | $params = []; |
| 257 | 257 | if (isset($this->request->server['REQUEST_URI'])) { |
| 258 | 258 | $params['redirect_url'] = $this->request->server['REQUEST_URI']; |
@@ -34,7 +34,7 @@ discard block |
||
| 34 | 34 | use OCP\Settings\IIconSection; |
| 35 | 35 | use OCP\Settings\ISettings; |
| 36 | 36 | |
| 37 | -trait CommonSettingsTrait { |
|
| 37 | +trait CommonSettingsTrait { |
|
| 38 | 38 | |
| 39 | 39 | /** @var ISettingsManager */ |
| 40 | 40 | private $settingsManager; |
@@ -81,11 +81,11 @@ discard block |
||
| 81 | 81 | protected function formatSections($sections, $currentSection, $type, $currentType, bool $subAdminOnly = false) { |
| 82 | 82 | $templateParameters = []; |
| 83 | 83 | /** @var \OCP\Settings\ISection[] $prioritizedSections */ |
| 84 | - foreach($sections as $prioritizedSections) { |
|
| 84 | + foreach ($sections as $prioritizedSections) { |
|
| 85 | 85 | foreach ($prioritizedSections as $section) { |
| 86 | - if($type === 'admin') { |
|
| 86 | + if ($type === 'admin') { |
|
| 87 | 87 | $settings = $this->settingsManager->getAdminSettings($section->getID(), $subAdminOnly); |
| 88 | - } else if($type === 'personal') { |
|
| 88 | + } else if ($type === 'personal') { |
|
| 89 | 89 | $settings = $this->settingsManager->getPersonalSettings($section->getID()); |
| 90 | 90 | } |
| 91 | 91 | if (empty($settings) && !($section->getID() === 'additional' && count(\OC_App::getForms('admin')) > 0)) { |
@@ -84,7 +84,7 @@ discard block |
||
| 84 | 84 | ); |
| 85 | 85 | $formatted = $this->formatSettings($settings); |
| 86 | 86 | // Do not show legacy forms for sub admins |
| 87 | - if($section === 'additional' && !$isSubAdmin) { |
|
| 87 | + if ($section === 'additional' && !$isSubAdmin) { |
|
| 88 | 88 | $formatted['content'] .= $this->getLegacyForms(); |
| 89 | 89 | } |
| 90 | 90 | return $formatted; |
@@ -96,9 +96,9 @@ discard block |
||
| 96 | 96 | private function getLegacyForms() { |
| 97 | 97 | $forms = \OC_App::getForms('admin'); |
| 98 | 98 | |
| 99 | - $forms = array_map(function ($form) { |
|
| 99 | + $forms = array_map(function($form) { |
|
| 100 | 100 | if (preg_match('%(<h2(?P<class>[^>]*)>.*?</h2>)%i', $form, $regs)) { |
| 101 | - $sectionName = str_replace('<h2' . $regs['class'] . '>', '', $regs[0]); |
|
| 101 | + $sectionName = str_replace('<h2'.$regs['class'].'>', '', $regs[0]); |
|
| 102 | 102 | $sectionName = str_replace('</h2>', '', $sectionName); |
| 103 | 103 | $anchor = strtolower($sectionName); |
| 104 | 104 | $anchor = str_replace(' ', '-', $anchor); |