@@ -132,7 +132,7 @@ discard block |
||
| 132 | 132 | * @param string $stream |
| 133 | 133 | * @see http://www.php.net/manual/en/reserved.variables.php |
| 134 | 134 | */ |
| 135 | - public function __construct(array $vars= [], |
|
| 135 | + public function __construct(array $vars = [], |
|
| 136 | 136 | ISecureRandom $secureRandom = null, |
| 137 | 137 | IConfig $config, |
| 138 | 138 | CsrfTokenManager $csrfTokenManager = null, |
@@ -143,11 +143,11 @@ discard block |
||
| 143 | 143 | $this->config = $config; |
| 144 | 144 | $this->csrfTokenManager = $csrfTokenManager; |
| 145 | 145 | |
| 146 | - if(!array_key_exists('method', $vars)) { |
|
| 146 | + if (!array_key_exists('method', $vars)) { |
|
| 147 | 147 | $vars['method'] = 'GET'; |
| 148 | 148 | } |
| 149 | 149 | |
| 150 | - foreach($this->allowedKeys as $name) { |
|
| 150 | + foreach ($this->allowedKeys as $name) { |
|
| 151 | 151 | $this->items[$name] = isset($vars[$name]) |
| 152 | 152 | ? $vars[$name] |
| 153 | 153 | : []; |
@@ -257,12 +257,12 @@ discard block |
||
| 257 | 257 | * @return mixed|null |
| 258 | 258 | */ |
| 259 | 259 | public function __get($name) { |
| 260 | - switch($name) { |
|
| 260 | + switch ($name) { |
|
| 261 | 261 | case 'put': |
| 262 | 262 | case 'patch': |
| 263 | 263 | case 'get': |
| 264 | 264 | case 'post': |
| 265 | - if($this->method !== strtoupper($name)) { |
|
| 265 | + if ($this->method !== strtoupper($name)) { |
|
| 266 | 266 | throw new \LogicException(sprintf('%s cannot be accessed in a %s request.', $name, $this->method)); |
| 267 | 267 | } |
| 268 | 268 | return $this->getContent(); |
@@ -313,9 +313,9 @@ discard block |
||
| 313 | 313 | */ |
| 314 | 314 | public function getHeader(string $name): string { |
| 315 | 315 | |
| 316 | - $name = strtoupper(str_replace('-', '_',$name)); |
|
| 317 | - if (isset($this->server['HTTP_' . $name])) { |
|
| 318 | - return $this->server['HTTP_' . $name]; |
|
| 316 | + $name = strtoupper(str_replace('-', '_', $name)); |
|
| 317 | + if (isset($this->server['HTTP_'.$name])) { |
|
| 318 | + return $this->server['HTTP_'.$name]; |
|
| 319 | 319 | } |
| 320 | 320 | |
| 321 | 321 | // There's a few headers that seem to end up in the top-level |
@@ -445,21 +445,21 @@ discard block |
||
| 445 | 445 | // 'application/json' must be decoded manually. |
| 446 | 446 | if (strpos($this->getHeader('Content-Type'), 'application/json') !== false) { |
| 447 | 447 | $params = json_decode(file_get_contents($this->inputStream), true); |
| 448 | - if($params !== null && \count($params) > 0) { |
|
| 448 | + if ($params !== null && \count($params) > 0) { |
|
| 449 | 449 | $this->items['params'] = $params; |
| 450 | - if($this->method === 'POST') { |
|
| 450 | + if ($this->method === 'POST') { |
|
| 451 | 451 | $this->items['post'] = $params; |
| 452 | 452 | } |
| 453 | 453 | } |
| 454 | 454 | |
| 455 | 455 | // Handle application/x-www-form-urlencoded for methods other than GET |
| 456 | 456 | // or post correctly |
| 457 | - } elseif($this->method !== 'GET' |
|
| 457 | + } elseif ($this->method !== 'GET' |
|
| 458 | 458 | && $this->method !== 'POST' |
| 459 | 459 | && strpos($this->getHeader('Content-Type'), 'application/x-www-form-urlencoded') !== false) { |
| 460 | 460 | |
| 461 | 461 | parse_str(file_get_contents($this->inputStream), $params); |
| 462 | - if(\is_array($params)) { |
|
| 462 | + if (\is_array($params)) { |
|
| 463 | 463 | $this->items['params'] = $params; |
| 464 | 464 | } |
| 465 | 465 | } |
@@ -476,11 +476,11 @@ discard block |
||
| 476 | 476 | * @return bool true if CSRF check passed |
| 477 | 477 | */ |
| 478 | 478 | public function passesCSRFCheck(): bool { |
| 479 | - if($this->csrfTokenManager === null) { |
|
| 479 | + if ($this->csrfTokenManager === null) { |
|
| 480 | 480 | return false; |
| 481 | 481 | } |
| 482 | 482 | |
| 483 | - if(!$this->passesStrictCookieCheck()) { |
|
| 483 | + if (!$this->passesStrictCookieCheck()) { |
|
| 484 | 484 | return false; |
| 485 | 485 | } |
| 486 | 486 | |
@@ -508,7 +508,7 @@ discard block |
||
| 508 | 508 | if ($this->getHeader('OCS-APIREQUEST')) { |
| 509 | 509 | return false; |
| 510 | 510 | } |
| 511 | - if($this->getCookie(session_name()) === null && $this->getCookie('nc_token') === null) { |
|
| 511 | + if ($this->getCookie(session_name()) === null && $this->getCookie('nc_token') === null) { |
|
| 512 | 512 | return false; |
| 513 | 513 | } |
| 514 | 514 | |
@@ -533,7 +533,7 @@ discard block |
||
| 533 | 533 | protected function getProtectedCookieName(string $name): string { |
| 534 | 534 | $cookieParams = $this->getCookieParams(); |
| 535 | 535 | $prefix = ''; |
| 536 | - if($cookieParams['secure'] === true && $cookieParams['path'] === '/') { |
|
| 536 | + if ($cookieParams['secure'] === true && $cookieParams['path'] === '/') { |
|
| 537 | 537 | $prefix = '__Host-'; |
| 538 | 538 | } |
| 539 | 539 | |
@@ -548,12 +548,12 @@ discard block |
||
| 548 | 548 | * @since 9.1.0 |
| 549 | 549 | */ |
| 550 | 550 | public function passesStrictCookieCheck(): bool { |
| 551 | - if(!$this->cookieCheckRequired()) { |
|
| 551 | + if (!$this->cookieCheckRequired()) { |
|
| 552 | 552 | return true; |
| 553 | 553 | } |
| 554 | 554 | |
| 555 | 555 | $cookieName = $this->getProtectedCookieName('nc_sameSiteCookiestrict'); |
| 556 | - if($this->getCookie($cookieName) === 'true' |
|
| 556 | + if ($this->getCookie($cookieName) === 'true' |
|
| 557 | 557 | && $this->passesLaxCookieCheck()) { |
| 558 | 558 | return true; |
| 559 | 559 | } |
@@ -568,12 +568,12 @@ discard block |
||
| 568 | 568 | * @since 9.1.0 |
| 569 | 569 | */ |
| 570 | 570 | public function passesLaxCookieCheck(): bool { |
| 571 | - if(!$this->cookieCheckRequired()) { |
|
| 571 | + if (!$this->cookieCheckRequired()) { |
|
| 572 | 572 | return true; |
| 573 | 573 | } |
| 574 | 574 | |
| 575 | 575 | $cookieName = $this->getProtectedCookieName('nc_sameSiteCookielax'); |
| 576 | - if($this->getCookie($cookieName) === 'true') { |
|
| 576 | + if ($this->getCookie($cookieName) === 'true') { |
|
| 577 | 577 | return true; |
| 578 | 578 | } |
| 579 | 579 | return false; |
@@ -586,12 +586,12 @@ discard block |
||
| 586 | 586 | * @return string |
| 587 | 587 | */ |
| 588 | 588 | public function getId(): string { |
| 589 | - if(isset($this->server['UNIQUE_ID'])) { |
|
| 589 | + if (isset($this->server['UNIQUE_ID'])) { |
|
| 590 | 590 | return $this->server['UNIQUE_ID']; |
| 591 | 591 | } |
| 592 | 592 | |
| 593 | - if(empty($this->requestId)) { |
|
| 594 | - $validChars = ISecureRandom::CHAR_UPPER . ISecureRandom::CHAR_LOWER . ISecureRandom::CHAR_DIGITS; |
|
| 593 | + if (empty($this->requestId)) { |
|
| 594 | + $validChars = ISecureRandom::CHAR_UPPER.ISecureRandom::CHAR_LOWER.ISecureRandom::CHAR_DIGITS; |
|
| 595 | 595 | $this->requestId = $this->secureRandom->generate(20, $validChars); |
| 596 | 596 | } |
| 597 | 597 | |
@@ -647,15 +647,15 @@ discard block |
||
| 647 | 647 | $remoteAddress = isset($this->server['REMOTE_ADDR']) ? $this->server['REMOTE_ADDR'] : ''; |
| 648 | 648 | $trustedProxies = $this->config->getSystemValue('trusted_proxies', []); |
| 649 | 649 | |
| 650 | - if(\is_array($trustedProxies) && $this->isTrustedProxy($trustedProxies, $remoteAddress)) { |
|
| 650 | + if (\is_array($trustedProxies) && $this->isTrustedProxy($trustedProxies, $remoteAddress)) { |
|
| 651 | 651 | $forwardedForHeaders = $this->config->getSystemValue('forwarded_for_headers', [ |
| 652 | 652 | 'HTTP_X_FORWARDED_FOR' |
| 653 | 653 | // only have one default, so we cannot ship an insecure product out of the box |
| 654 | 654 | ]); |
| 655 | 655 | |
| 656 | - foreach($forwardedForHeaders as $header) { |
|
| 657 | - if(isset($this->server[$header])) { |
|
| 658 | - foreach(explode(',', $this->server[$header]) as $IP) { |
|
| 656 | + foreach ($forwardedForHeaders as $header) { |
|
| 657 | + if (isset($this->server[$header])) { |
|
| 658 | + foreach (explode(',', $this->server[$header]) as $IP) { |
|
| 659 | 659 | $IP = trim($IP); |
| 660 | 660 | if (filter_var($IP, FILTER_VALIDATE_IP) !== false) { |
| 661 | 661 | return $IP; |
@@ -674,7 +674,7 @@ discard block |
||
| 674 | 674 | * @return bool |
| 675 | 675 | */ |
| 676 | 676 | private function isOverwriteCondition(string $type = ''): bool { |
| 677 | - $regex = '/' . $this->config->getSystemValue('overwritecondaddr', '') . '/'; |
|
| 677 | + $regex = '/'.$this->config->getSystemValue('overwritecondaddr', '').'/'; |
|
| 678 | 678 | $remoteAddr = isset($this->server['REMOTE_ADDR']) ? $this->server['REMOTE_ADDR'] : ''; |
| 679 | 679 | return $regex === '//' || preg_match($regex, $remoteAddr) === 1 |
| 680 | 680 | || $type !== 'protocol'; |
@@ -686,7 +686,7 @@ discard block |
||
| 686 | 686 | * @return string Server protocol (http or https) |
| 687 | 687 | */ |
| 688 | 688 | public function getServerProtocol(): string { |
| 689 | - if($this->config->getSystemValue('overwriteprotocol') !== '' |
|
| 689 | + if ($this->config->getSystemValue('overwriteprotocol') !== '' |
|
| 690 | 690 | && $this->isOverwriteCondition('protocol')) { |
| 691 | 691 | return $this->config->getSystemValue('overwriteprotocol'); |
| 692 | 692 | } |
@@ -732,7 +732,7 @@ discard block |
||
| 732 | 732 | 'HTTP/2', |
| 733 | 733 | ]; |
| 734 | 734 | |
| 735 | - if(\in_array($claimedProtocol, $validProtocols, true)) { |
|
| 735 | + if (\in_array($claimedProtocol, $validProtocols, true)) { |
|
| 736 | 736 | return $claimedProtocol; |
| 737 | 737 | } |
| 738 | 738 | |
@@ -746,8 +746,8 @@ discard block |
||
| 746 | 746 | */ |
| 747 | 747 | public function getRequestUri(): string { |
| 748 | 748 | $uri = isset($this->server['REQUEST_URI']) ? $this->server['REQUEST_URI'] : ''; |
| 749 | - if($this->config->getSystemValue('overwritewebroot') !== '' && $this->isOverwriteCondition()) { |
|
| 750 | - $uri = $this->getScriptName() . substr($uri, \strlen($this->server['SCRIPT_NAME'])); |
|
| 749 | + if ($this->config->getSystemValue('overwritewebroot') !== '' && $this->isOverwriteCondition()) { |
|
| 750 | + $uri = $this->getScriptName().substr($uri, \strlen($this->server['SCRIPT_NAME'])); |
|
| 751 | 751 | } |
| 752 | 752 | return $uri; |
| 753 | 753 | } |
@@ -761,7 +761,7 @@ discard block |
||
| 761 | 761 | $requestUri = isset($this->server['REQUEST_URI']) ? $this->server['REQUEST_URI'] : ''; |
| 762 | 762 | // remove too many leading slashes - can be caused by reverse proxy configuration |
| 763 | 763 | if (strpos($requestUri, '/') === 0) { |
| 764 | - $requestUri = '/' . ltrim($requestUri, '/'); |
|
| 764 | + $requestUri = '/'.ltrim($requestUri, '/'); |
|
| 765 | 765 | } |
| 766 | 766 | |
| 767 | 767 | $requestUri = preg_replace('%/{2,}%', '/', $requestUri); |
@@ -778,7 +778,7 @@ discard block |
||
| 778 | 778 | // FIXME: Sabre does not really belong here |
| 779 | 779 | list($path, $name) = \Sabre\Uri\split($scriptName); |
| 780 | 780 | if (!empty($path)) { |
| 781 | - if($path === $pathInfo || strpos($pathInfo, $path.'/') === 0) { |
|
| 781 | + if ($path === $pathInfo || strpos($pathInfo, $path.'/') === 0) { |
|
| 782 | 782 | $pathInfo = substr($pathInfo, \strlen($path)); |
| 783 | 783 | } else { |
| 784 | 784 | throw new \Exception("The requested uri($requestUri) cannot be processed by the script '$scriptName')"); |
@@ -794,7 +794,7 @@ discard block |
||
| 794 | 794 | if ($name !== '' && strpos($pathInfo, $name) === 0) { |
| 795 | 795 | $pathInfo = substr($pathInfo, \strlen($name)); |
| 796 | 796 | } |
| 797 | - if($pathInfo === false || $pathInfo === '/'){ |
|
| 797 | + if ($pathInfo === false || $pathInfo === '/') { |
|
| 798 | 798 | return ''; |
| 799 | 799 | } else { |
| 800 | 800 | return $pathInfo; |
@@ -812,7 +812,7 @@ discard block |
||
| 812 | 812 | $pathInfo = rawurldecode($pathInfo); |
| 813 | 813 | $encoding = mb_detect_encoding($pathInfo, ['UTF-8', 'ISO-8859-1']); |
| 814 | 814 | |
| 815 | - switch($encoding) { |
|
| 815 | + switch ($encoding) { |
|
| 816 | 816 | case 'ISO-8859-1' : |
| 817 | 817 | $pathInfo = utf8_encode($pathInfo); |
| 818 | 818 | } |
@@ -828,12 +828,12 @@ discard block |
||
| 828 | 828 | */ |
| 829 | 829 | public function getScriptName(): string { |
| 830 | 830 | $name = $this->server['SCRIPT_NAME']; |
| 831 | - $overwriteWebRoot = $this->config->getSystemValue('overwritewebroot'); |
|
| 831 | + $overwriteWebRoot = $this->config->getSystemValue('overwritewebroot'); |
|
| 832 | 832 | if ($overwriteWebRoot !== '' && $this->isOverwriteCondition()) { |
| 833 | 833 | // FIXME: This code is untestable due to __DIR__, also that hardcoded path is really dangerous |
| 834 | 834 | $serverRoot = str_replace('\\', '/', substr(__DIR__, 0, -\strlen('lib/private/appframework/http/'))); |
| 835 | 835 | $suburi = str_replace('\\', '/', substr(realpath($this->server['SCRIPT_FILENAME']), \strlen($serverRoot))); |
| 836 | - $name = '/' . ltrim($overwriteWebRoot . $suburi, '/'); |
|
| 836 | + $name = '/'.ltrim($overwriteWebRoot.$suburi, '/'); |
|
| 837 | 837 | } |
| 838 | 838 | return $name; |
| 839 | 839 | } |
@@ -903,7 +903,7 @@ discard block |
||
| 903 | 903 | return $host; |
| 904 | 904 | } else { |
| 905 | 905 | $trustedList = $this->config->getSystemValue('trusted_domains', []); |
| 906 | - if(!empty($trustedList)) { |
|
| 906 | + if (!empty($trustedList)) { |
|
| 907 | 907 | return $trustedList[0]; |
| 908 | 908 | } else { |
| 909 | 909 | return ''; |
@@ -918,7 +918,7 @@ discard block |
||
| 918 | 918 | * isn't met |
| 919 | 919 | */ |
| 920 | 920 | private function getOverwriteHost() { |
| 921 | - if($this->config->getSystemValue('overwritehost') !== '' && $this->isOverwriteCondition()) { |
|
| 921 | + if ($this->config->getSystemValue('overwritehost') !== '' && $this->isOverwriteCondition()) { |
|
| 922 | 922 | return $this->config->getSystemValue('overwritehost'); |
| 923 | 923 | } |
| 924 | 924 | return null; |