@@ -39,31 +39,31 @@ |
||
39 | 39 | */ |
40 | 40 | class SessionCredentials extends AuthMechanism { |
41 | 41 | |
42 | - /** @var CredentialsStore */ |
|
43 | - private $credentialsStore; |
|
42 | + /** @var CredentialsStore */ |
|
43 | + private $credentialsStore; |
|
44 | 44 | |
45 | - public function __construct(IL10N $l, CredentialsStore $credentialsStore) { |
|
46 | - $this->credentialsStore = $credentialsStore; |
|
45 | + public function __construct(IL10N $l, CredentialsStore $credentialsStore) { |
|
46 | + $this->credentialsStore = $credentialsStore; |
|
47 | 47 | |
48 | - $this->setIdentifier('password::sessioncredentials') |
|
49 | - ->setScheme(self::SCHEME_PASSWORD) |
|
50 | - ->setText($l->t('Log-in credentials, save in session')) |
|
51 | - ->addParameters([]); |
|
52 | - } |
|
48 | + $this->setIdentifier('password::sessioncredentials') |
|
49 | + ->setScheme(self::SCHEME_PASSWORD) |
|
50 | + ->setText($l->t('Log-in credentials, save in session')) |
|
51 | + ->addParameters([]); |
|
52 | + } |
|
53 | 53 | |
54 | - public function manipulateStorageConfig(StorageConfig &$storage, IUser $user = null) { |
|
55 | - try { |
|
56 | - $credentials = $this->credentialsStore->getLoginCredentials(); |
|
57 | - } catch (CredentialsUnavailableException $e) { |
|
58 | - throw new InsufficientDataForMeaningfulAnswerException('No session credentials saved'); |
|
59 | - } |
|
54 | + public function manipulateStorageConfig(StorageConfig &$storage, IUser $user = null) { |
|
55 | + try { |
|
56 | + $credentials = $this->credentialsStore->getLoginCredentials(); |
|
57 | + } catch (CredentialsUnavailableException $e) { |
|
58 | + throw new InsufficientDataForMeaningfulAnswerException('No session credentials saved'); |
|
59 | + } |
|
60 | 60 | |
61 | - $storage->setBackendOption('user', $credentials->getLoginName()); |
|
62 | - $storage->setBackendOption('password', $credentials->getPassword()); |
|
63 | - } |
|
61 | + $storage->setBackendOption('user', $credentials->getLoginName()); |
|
62 | + $storage->setBackendOption('password', $credentials->getPassword()); |
|
63 | + } |
|
64 | 64 | |
65 | - public function wrapStorage(Storage $storage) { |
|
66 | - return new SessionStorageWrapper(['storage' => $storage]); |
|
67 | - } |
|
65 | + public function wrapStorage(Storage $storage) { |
|
66 | + return new SessionStorageWrapper(['storage' => $storage]); |
|
67 | + } |
|
68 | 68 | |
69 | 69 | } |
@@ -51,7 +51,7 @@ |
||
51 | 51 | ->addParameters([]); |
52 | 52 | } |
53 | 53 | |
54 | - public function manipulateStorageConfig(StorageConfig &$storage, IUser $user = null) { |
|
54 | + public function manipulateStorageConfig(StorageConfig & $storage, IUser $user = null) { |
|
55 | 55 | try { |
56 | 56 | $credentials = $this->credentialsStore->getLoginCredentials(); |
57 | 57 | } catch (CredentialsUnavailableException $e) { |
@@ -70,7 +70,7 @@ |
||
70 | 70 | ]); |
71 | 71 | } |
72 | 72 | |
73 | - public function manipulateStorageConfig(StorageConfig &$storage, IUser $user = null) { |
|
73 | + public function manipulateStorageConfig(StorageConfig & $storage, IUser $user = null) { |
|
74 | 74 | if ($storage->getType() === StorageConfig::MOUNT_TYPE_ADMIN) { |
75 | 75 | $uid = ''; |
76 | 76 | } elseif (is_null($user)) { |
@@ -36,53 +36,53 @@ |
||
36 | 36 | * Global Username and Password |
37 | 37 | */ |
38 | 38 | class GlobalAuth extends AuthMechanism { |
39 | - public const CREDENTIALS_IDENTIFIER = 'password::global'; |
|
39 | + public const CREDENTIALS_IDENTIFIER = 'password::global'; |
|
40 | 40 | |
41 | - /** @var ICredentialsManager */ |
|
42 | - protected $credentialsManager; |
|
41 | + /** @var ICredentialsManager */ |
|
42 | + protected $credentialsManager; |
|
43 | 43 | |
44 | - public function __construct(IL10N $l, ICredentialsManager $credentialsManager) { |
|
45 | - $this->credentialsManager = $credentialsManager; |
|
44 | + public function __construct(IL10N $l, ICredentialsManager $credentialsManager) { |
|
45 | + $this->credentialsManager = $credentialsManager; |
|
46 | 46 | |
47 | - $this |
|
48 | - ->setIdentifier('password::global') |
|
49 | - ->setVisibility(BackendService::VISIBILITY_DEFAULT) |
|
50 | - ->setScheme(self::SCHEME_PASSWORD) |
|
51 | - ->setText($l->t('Global credentials')); |
|
52 | - } |
|
47 | + $this |
|
48 | + ->setIdentifier('password::global') |
|
49 | + ->setVisibility(BackendService::VISIBILITY_DEFAULT) |
|
50 | + ->setScheme(self::SCHEME_PASSWORD) |
|
51 | + ->setText($l->t('Global credentials')); |
|
52 | + } |
|
53 | 53 | |
54 | - public function getAuth($uid) { |
|
55 | - $auth = $this->credentialsManager->retrieve($uid, self::CREDENTIALS_IDENTIFIER); |
|
56 | - if (!is_array($auth)) { |
|
57 | - return [ |
|
58 | - 'user' => '', |
|
59 | - 'password' => '' |
|
60 | - ]; |
|
61 | - } else { |
|
62 | - return $auth; |
|
63 | - } |
|
64 | - } |
|
54 | + public function getAuth($uid) { |
|
55 | + $auth = $this->credentialsManager->retrieve($uid, self::CREDENTIALS_IDENTIFIER); |
|
56 | + if (!is_array($auth)) { |
|
57 | + return [ |
|
58 | + 'user' => '', |
|
59 | + 'password' => '' |
|
60 | + ]; |
|
61 | + } else { |
|
62 | + return $auth; |
|
63 | + } |
|
64 | + } |
|
65 | 65 | |
66 | - public function saveAuth($uid, $user, $password) { |
|
67 | - $this->credentialsManager->store($uid, self::CREDENTIALS_IDENTIFIER, [ |
|
68 | - 'user' => $user, |
|
69 | - 'password' => $password |
|
70 | - ]); |
|
71 | - } |
|
66 | + public function saveAuth($uid, $user, $password) { |
|
67 | + $this->credentialsManager->store($uid, self::CREDENTIALS_IDENTIFIER, [ |
|
68 | + 'user' => $user, |
|
69 | + 'password' => $password |
|
70 | + ]); |
|
71 | + } |
|
72 | 72 | |
73 | - public function manipulateStorageConfig(StorageConfig &$storage, IUser $user = null) { |
|
74 | - if ($storage->getType() === StorageConfig::MOUNT_TYPE_ADMIN) { |
|
75 | - $uid = ''; |
|
76 | - } elseif (is_null($user)) { |
|
77 | - throw new InsufficientDataForMeaningfulAnswerException('No credentials saved'); |
|
78 | - } else { |
|
79 | - $uid = $user->getUID(); |
|
80 | - } |
|
81 | - $credentials = $this->credentialsManager->retrieve($uid, self::CREDENTIALS_IDENTIFIER); |
|
73 | + public function manipulateStorageConfig(StorageConfig &$storage, IUser $user = null) { |
|
74 | + if ($storage->getType() === StorageConfig::MOUNT_TYPE_ADMIN) { |
|
75 | + $uid = ''; |
|
76 | + } elseif (is_null($user)) { |
|
77 | + throw new InsufficientDataForMeaningfulAnswerException('No credentials saved'); |
|
78 | + } else { |
|
79 | + $uid = $user->getUID(); |
|
80 | + } |
|
81 | + $credentials = $this->credentialsManager->retrieve($uid, self::CREDENTIALS_IDENTIFIER); |
|
82 | 82 | |
83 | - if (is_array($credentials)) { |
|
84 | - $storage->setBackendOption('user', $credentials['user']); |
|
85 | - $storage->setBackendOption('password', $credentials['password']); |
|
86 | - } |
|
87 | - } |
|
83 | + if (is_array($credentials)) { |
|
84 | + $storage->setBackendOption('user', $credentials['user']); |
|
85 | + $storage->setBackendOption('password', $credentials['password']); |
|
86 | + } |
|
87 | + } |
|
88 | 88 | } |
@@ -28,10 +28,10 @@ |
||
28 | 28 | * For auth mechanisms where the user needs to provide credentials |
29 | 29 | */ |
30 | 30 | interface IUserProvided { |
31 | - /** |
|
32 | - * @param IUser $user the user for which to save the user provided options |
|
33 | - * @param int $mountId the mount id to save the options for |
|
34 | - * @param array $options the user provided options |
|
35 | - */ |
|
36 | - public function saveBackendOptions(IUser $user, $mountId, array $options); |
|
31 | + /** |
|
32 | + * @param IUser $user the user for which to save the user provided options |
|
33 | + * @param int $mountId the mount id to save the options for |
|
34 | + * @param array $options the user provided options |
|
35 | + */ |
|
36 | + public function saveBackendOptions(IUser $user, $mountId, array $options); |
|
37 | 37 | } |
@@ -57,7 +57,7 @@ |
||
57 | 57 | ; |
58 | 58 | } |
59 | 59 | |
60 | - public function manipulateStorageConfig(StorageConfig &$storage, IUser $user = null) { |
|
60 | + public function manipulateStorageConfig(StorageConfig & $storage, IUser $user = null) { |
|
61 | 61 | $auth = new RSACrypt(); |
62 | 62 | $auth->setPassword($this->config->getSystemValue('secret', '')); |
63 | 63 | if (!$auth->loadKey($storage->getBackendOption('private_key'))) { |
@@ -36,54 +36,54 @@ |
||
36 | 36 | */ |
37 | 37 | class RSA extends AuthMechanism { |
38 | 38 | |
39 | - /** @var IConfig */ |
|
40 | - private $config; |
|
39 | + /** @var IConfig */ |
|
40 | + private $config; |
|
41 | 41 | |
42 | - public function __construct(IL10N $l, IConfig $config) { |
|
43 | - $this->config = $config; |
|
42 | + public function __construct(IL10N $l, IConfig $config) { |
|
43 | + $this->config = $config; |
|
44 | 44 | |
45 | - $this |
|
46 | - ->setIdentifier('publickey::rsa') |
|
47 | - ->setScheme(self::SCHEME_PUBLICKEY) |
|
48 | - ->setText($l->t('RSA public key')) |
|
49 | - ->addParameters([ |
|
50 | - new DefinitionParameter('user', $l->t('Username')), |
|
51 | - new DefinitionParameter('public_key', $l->t('Public key')), |
|
52 | - (new DefinitionParameter('private_key', 'private_key')) |
|
53 | - ->setType(DefinitionParameter::VALUE_HIDDEN), |
|
54 | - ]) |
|
55 | - ->addCustomJs('public_key') |
|
56 | - ; |
|
57 | - } |
|
45 | + $this |
|
46 | + ->setIdentifier('publickey::rsa') |
|
47 | + ->setScheme(self::SCHEME_PUBLICKEY) |
|
48 | + ->setText($l->t('RSA public key')) |
|
49 | + ->addParameters([ |
|
50 | + new DefinitionParameter('user', $l->t('Username')), |
|
51 | + new DefinitionParameter('public_key', $l->t('Public key')), |
|
52 | + (new DefinitionParameter('private_key', 'private_key')) |
|
53 | + ->setType(DefinitionParameter::VALUE_HIDDEN), |
|
54 | + ]) |
|
55 | + ->addCustomJs('public_key') |
|
56 | + ; |
|
57 | + } |
|
58 | 58 | |
59 | - public function manipulateStorageConfig(StorageConfig &$storage, IUser $user = null) { |
|
60 | - $auth = new RSACrypt(); |
|
61 | - $auth->setPassword($this->config->getSystemValue('secret', '')); |
|
62 | - if (!$auth->loadKey($storage->getBackendOption('private_key'))) { |
|
63 | - // Add fallback routine for a time where secret was not enforced to be exists |
|
64 | - $auth->setPassword(''); |
|
65 | - if (!$auth->loadKey($storage->getBackendOption('private_key'))) { |
|
66 | - throw new \RuntimeException('unable to load private key'); |
|
67 | - } |
|
68 | - } |
|
69 | - $storage->setBackendOption('public_key_auth', $auth); |
|
70 | - } |
|
59 | + public function manipulateStorageConfig(StorageConfig &$storage, IUser $user = null) { |
|
60 | + $auth = new RSACrypt(); |
|
61 | + $auth->setPassword($this->config->getSystemValue('secret', '')); |
|
62 | + if (!$auth->loadKey($storage->getBackendOption('private_key'))) { |
|
63 | + // Add fallback routine for a time where secret was not enforced to be exists |
|
64 | + $auth->setPassword(''); |
|
65 | + if (!$auth->loadKey($storage->getBackendOption('private_key'))) { |
|
66 | + throw new \RuntimeException('unable to load private key'); |
|
67 | + } |
|
68 | + } |
|
69 | + $storage->setBackendOption('public_key_auth', $auth); |
|
70 | + } |
|
71 | 71 | |
72 | - /** |
|
73 | - * Generate a keypair |
|
74 | - * |
|
75 | - * @param int $keyLenth |
|
76 | - * @return array ['privatekey' => $privateKey, 'publickey' => $publicKey] |
|
77 | - */ |
|
78 | - public function createKey($keyLength) { |
|
79 | - $rsa = new RSACrypt(); |
|
80 | - $rsa->setPublicKeyFormat(RSACrypt::PUBLIC_FORMAT_OPENSSH); |
|
81 | - $rsa->setPassword($this->config->getSystemValue('secret', '')); |
|
72 | + /** |
|
73 | + * Generate a keypair |
|
74 | + * |
|
75 | + * @param int $keyLenth |
|
76 | + * @return array ['privatekey' => $privateKey, 'publickey' => $publicKey] |
|
77 | + */ |
|
78 | + public function createKey($keyLength) { |
|
79 | + $rsa = new RSACrypt(); |
|
80 | + $rsa->setPublicKeyFormat(RSACrypt::PUBLIC_FORMAT_OPENSSH); |
|
81 | + $rsa->setPassword($this->config->getSystemValue('secret', '')); |
|
82 | 82 | |
83 | - if ($keyLength !== 1024 && $keyLength !== 2048 && $keyLength !== 4096) { |
|
84 | - $keyLength = 1024; |
|
85 | - } |
|
83 | + if ($keyLength !== 1024 && $keyLength !== 2048 && $keyLength !== 4096) { |
|
84 | + $keyLength = 1024; |
|
85 | + } |
|
86 | 86 | |
87 | - return $rsa->createKey($keyLength); |
|
88 | - } |
|
87 | + return $rsa->createKey($keyLength); |
|
88 | + } |
|
89 | 89 | } |
@@ -30,10 +30,10 @@ |
||
30 | 30 | */ |
31 | 31 | interface IBackendProvider { |
32 | 32 | |
33 | - /** |
|
34 | - * @since 9.1.0 |
|
35 | - * @return Backend[] |
|
36 | - */ |
|
37 | - public function getBackends(); |
|
33 | + /** |
|
34 | + * @since 9.1.0 |
|
35 | + * @return Backend[] |
|
36 | + */ |
|
37 | + public function getBackends(); |
|
38 | 38 | |
39 | 39 | } |
@@ -30,10 +30,10 @@ |
||
30 | 30 | */ |
31 | 31 | interface IAuthMechanismProvider { |
32 | 32 | |
33 | - /** |
|
34 | - * @since 9.1.0 |
|
35 | - * @return AuthMechanism[] |
|
36 | - */ |
|
37 | - public function getAuthMechanisms(); |
|
33 | + /** |
|
34 | + * @since 9.1.0 |
|
35 | + * @return AuthMechanism[] |
|
36 | + */ |
|
37 | + public function getAuthMechanisms(); |
|
38 | 38 | |
39 | 39 | } |
@@ -31,14 +31,14 @@ |
||
31 | 31 | */ |
32 | 32 | class SessionStorageWrapper extends PermissionsMask { |
33 | 33 | |
34 | - /** |
|
35 | - * @param array $arguments ['storage' => $storage] |
|
36 | - */ |
|
37 | - public function __construct($arguments) { |
|
38 | - // disable sharing permission |
|
39 | - $arguments['mask'] = Constants::PERMISSION_ALL & ~Constants::PERMISSION_SHARE; |
|
40 | - parent::__construct($arguments); |
|
41 | - } |
|
34 | + /** |
|
35 | + * @param array $arguments ['storage' => $storage] |
|
36 | + */ |
|
37 | + public function __construct($arguments) { |
|
38 | + // disable sharing permission |
|
39 | + $arguments['mask'] = Constants::PERMISSION_ALL & ~Constants::PERMISSION_SHARE; |
|
40 | + parent::__construct($arguments); |
|
41 | + } |
|
42 | 42 | |
43 | 43 | } |
44 | 44 |
@@ -47,10 +47,10 @@ |
||
47 | 47 | return false; |
48 | 48 | } |
49 | 49 | while (($file = readdir($dh)) !== false) { |
50 | - if ($this->is_dir($path . '/' . $file)) { |
|
51 | - $this->rmdir($path . '/' . $file); |
|
50 | + if ($this->is_dir($path.'/'.$file)) { |
|
51 | + $this->rmdir($path.'/'.$file); |
|
52 | 52 | } else { |
53 | - $this->unlink($path . '/' . $file); |
|
53 | + $this->unlink($path.'/'.$file); |
|
54 | 54 | } |
55 | 55 | } |
56 | 56 | $url = $this->constructUrl($path); |
@@ -28,100 +28,100 @@ |
||
28 | 28 | |
29 | 29 | abstract class StreamWrapper extends \OC\Files\Storage\Common { |
30 | 30 | |
31 | - /** |
|
32 | - * @param string $path |
|
33 | - * @return string|null |
|
34 | - */ |
|
35 | - abstract public function constructUrl($path); |
|
31 | + /** |
|
32 | + * @param string $path |
|
33 | + * @return string|null |
|
34 | + */ |
|
35 | + abstract public function constructUrl($path); |
|
36 | 36 | |
37 | - public function mkdir($path) { |
|
38 | - return mkdir($this->constructUrl($path)); |
|
39 | - } |
|
37 | + public function mkdir($path) { |
|
38 | + return mkdir($this->constructUrl($path)); |
|
39 | + } |
|
40 | 40 | |
41 | - public function rmdir($path) { |
|
42 | - if ($this->is_dir($path) && $this->isDeletable($path)) { |
|
43 | - $dh = $this->opendir($path); |
|
44 | - if (!is_resource($dh)) { |
|
45 | - return false; |
|
46 | - } |
|
47 | - while (($file = readdir($dh)) !== false) { |
|
48 | - if ($this->is_dir($path . '/' . $file)) { |
|
49 | - $this->rmdir($path . '/' . $file); |
|
50 | - } else { |
|
51 | - $this->unlink($path . '/' . $file); |
|
52 | - } |
|
53 | - } |
|
54 | - $url = $this->constructUrl($path); |
|
55 | - $success = rmdir($url); |
|
56 | - clearstatcache(false, $url); |
|
57 | - return $success; |
|
58 | - } else { |
|
59 | - return false; |
|
60 | - } |
|
61 | - } |
|
41 | + public function rmdir($path) { |
|
42 | + if ($this->is_dir($path) && $this->isDeletable($path)) { |
|
43 | + $dh = $this->opendir($path); |
|
44 | + if (!is_resource($dh)) { |
|
45 | + return false; |
|
46 | + } |
|
47 | + while (($file = readdir($dh)) !== false) { |
|
48 | + if ($this->is_dir($path . '/' . $file)) { |
|
49 | + $this->rmdir($path . '/' . $file); |
|
50 | + } else { |
|
51 | + $this->unlink($path . '/' . $file); |
|
52 | + } |
|
53 | + } |
|
54 | + $url = $this->constructUrl($path); |
|
55 | + $success = rmdir($url); |
|
56 | + clearstatcache(false, $url); |
|
57 | + return $success; |
|
58 | + } else { |
|
59 | + return false; |
|
60 | + } |
|
61 | + } |
|
62 | 62 | |
63 | - public function opendir($path) { |
|
64 | - return opendir($this->constructUrl($path)); |
|
65 | - } |
|
63 | + public function opendir($path) { |
|
64 | + return opendir($this->constructUrl($path)); |
|
65 | + } |
|
66 | 66 | |
67 | - public function filetype($path) { |
|
68 | - return @filetype($this->constructUrl($path)); |
|
69 | - } |
|
67 | + public function filetype($path) { |
|
68 | + return @filetype($this->constructUrl($path)); |
|
69 | + } |
|
70 | 70 | |
71 | - public function file_exists($path) { |
|
72 | - return file_exists($this->constructUrl($path)); |
|
73 | - } |
|
71 | + public function file_exists($path) { |
|
72 | + return file_exists($this->constructUrl($path)); |
|
73 | + } |
|
74 | 74 | |
75 | - public function unlink($path) { |
|
76 | - $url = $this->constructUrl($path); |
|
77 | - $success = unlink($url); |
|
78 | - // normally unlink() is supposed to do this implicitly, |
|
79 | - // but doing it anyway just to be sure |
|
80 | - clearstatcache(false, $url); |
|
81 | - return $success; |
|
82 | - } |
|
75 | + public function unlink($path) { |
|
76 | + $url = $this->constructUrl($path); |
|
77 | + $success = unlink($url); |
|
78 | + // normally unlink() is supposed to do this implicitly, |
|
79 | + // but doing it anyway just to be sure |
|
80 | + clearstatcache(false, $url); |
|
81 | + return $success; |
|
82 | + } |
|
83 | 83 | |
84 | - public function fopen($path, $mode) { |
|
85 | - return fopen($this->constructUrl($path), $mode); |
|
86 | - } |
|
84 | + public function fopen($path, $mode) { |
|
85 | + return fopen($this->constructUrl($path), $mode); |
|
86 | + } |
|
87 | 87 | |
88 | - public function touch($path, $mtime = null) { |
|
89 | - if ($this->file_exists($path)) { |
|
90 | - if (is_null($mtime)) { |
|
91 | - $fh = $this->fopen($path, 'a'); |
|
92 | - fwrite($fh, ''); |
|
93 | - fclose($fh); |
|
88 | + public function touch($path, $mtime = null) { |
|
89 | + if ($this->file_exists($path)) { |
|
90 | + if (is_null($mtime)) { |
|
91 | + $fh = $this->fopen($path, 'a'); |
|
92 | + fwrite($fh, ''); |
|
93 | + fclose($fh); |
|
94 | 94 | |
95 | - return true; |
|
96 | - } else { |
|
97 | - return false; //not supported |
|
98 | - } |
|
99 | - } else { |
|
100 | - $this->file_put_contents($path, ''); |
|
101 | - return true; |
|
102 | - } |
|
103 | - } |
|
95 | + return true; |
|
96 | + } else { |
|
97 | + return false; //not supported |
|
98 | + } |
|
99 | + } else { |
|
100 | + $this->file_put_contents($path, ''); |
|
101 | + return true; |
|
102 | + } |
|
103 | + } |
|
104 | 104 | |
105 | - /** |
|
106 | - * @param string $path |
|
107 | - * @param string $target |
|
108 | - */ |
|
109 | - public function getFile($path, $target) { |
|
110 | - return copy($this->constructUrl($path), $target); |
|
111 | - } |
|
105 | + /** |
|
106 | + * @param string $path |
|
107 | + * @param string $target |
|
108 | + */ |
|
109 | + public function getFile($path, $target) { |
|
110 | + return copy($this->constructUrl($path), $target); |
|
111 | + } |
|
112 | 112 | |
113 | - /** |
|
114 | - * @param string $target |
|
115 | - */ |
|
116 | - public function uploadFile($path, $target) { |
|
117 | - return copy($path, $this->constructUrl($target)); |
|
118 | - } |
|
113 | + /** |
|
114 | + * @param string $target |
|
115 | + */ |
|
116 | + public function uploadFile($path, $target) { |
|
117 | + return copy($path, $this->constructUrl($target)); |
|
118 | + } |
|
119 | 119 | |
120 | - public function rename($source, $target) { |
|
121 | - return rename($this->constructUrl($source), $this->constructUrl($target)); |
|
122 | - } |
|
120 | + public function rename($source, $target) { |
|
121 | + return rename($this->constructUrl($source), $this->constructUrl($target)); |
|
122 | + } |
|
123 | 123 | |
124 | - public function stat($path) { |
|
125 | - return stat($this->constructUrl($path)); |
|
126 | - } |
|
124 | + public function stat($path) { |
|
125 | + return stat($this->constructUrl($path)); |
|
126 | + } |
|
127 | 127 | } |
@@ -43,28 +43,28 @@ |
||
43 | 43 | */ |
44 | 44 | trait StorageModifierTrait { |
45 | 45 | |
46 | - /** |
|
47 | - * Modify a StorageConfig parameters |
|
48 | - * |
|
49 | - * @param StorageConfig $storage |
|
50 | - * @param IUser $user User the storage is being used as |
|
51 | - * @throws InsufficientDataForMeaningfulAnswerException |
|
52 | - * @throws StorageNotAvailableException |
|
53 | - */ |
|
54 | - public function manipulateStorageConfig(StorageConfig &$storage, IUser $user = null) { |
|
55 | - } |
|
46 | + /** |
|
47 | + * Modify a StorageConfig parameters |
|
48 | + * |
|
49 | + * @param StorageConfig $storage |
|
50 | + * @param IUser $user User the storage is being used as |
|
51 | + * @throws InsufficientDataForMeaningfulAnswerException |
|
52 | + * @throws StorageNotAvailableException |
|
53 | + */ |
|
54 | + public function manipulateStorageConfig(StorageConfig &$storage, IUser $user = null) { |
|
55 | + } |
|
56 | 56 | |
57 | - /** |
|
58 | - * Wrap a Storage if necessary |
|
59 | - * |
|
60 | - * @param Storage $storage |
|
61 | - * @return Storage |
|
62 | - * @throws InsufficientDataForMeaningfulAnswerException |
|
63 | - * @throws StorageNotAvailableException |
|
64 | - */ |
|
65 | - public function wrapStorage(Storage $storage) { |
|
66 | - return $storage; |
|
67 | - } |
|
57 | + /** |
|
58 | + * Wrap a Storage if necessary |
|
59 | + * |
|
60 | + * @param Storage $storage |
|
61 | + * @return Storage |
|
62 | + * @throws InsufficientDataForMeaningfulAnswerException |
|
63 | + * @throws StorageNotAvailableException |
|
64 | + */ |
|
65 | + public function wrapStorage(Storage $storage) { |
|
66 | + return $storage; |
|
67 | + } |
|
68 | 68 | |
69 | 69 | } |
70 | 70 |
@@ -51,7 +51,7 @@ |
||
51 | 51 | * @throws InsufficientDataForMeaningfulAnswerException |
52 | 52 | * @throws StorageNotAvailableException |
53 | 53 | */ |
54 | - public function manipulateStorageConfig(StorageConfig &$storage, IUser $user = null) { |
|
54 | + public function manipulateStorageConfig(StorageConfig & $storage, IUser $user = null) { |
|
55 | 55 | } |
56 | 56 | |
57 | 57 | /** |