@@ -103,9 +103,9 @@ discard block |
||
| 103 | 103 | $this->dui->markUser($uid); |
| 104 | 104 | $output->writeln('The user does not exists on LDAP anymore.'); |
| 105 | 105 | $output->writeln('Clean up the user\'s remnants by: ./occ user:delete "' |
| 106 | - . $uid . '"'); |
|
| 106 | + . $uid.'"'); |
|
| 107 | 107 | } catch (\Exception $e) { |
| 108 | - $output->writeln('<error>' . $e->getMessage(). '</error>'); |
|
| 108 | + $output->writeln('<error>'.$e->getMessage().'</error>'); |
|
| 109 | 109 | } |
| 110 | 110 | } |
| 111 | 111 | |
@@ -150,12 +150,12 @@ discard block |
||
| 150 | 150 | $avatarAttributes = $access->getConnection()->resolveRule('avatar'); |
| 151 | 151 | $result = $access->search('objectclass=*', $user->getDN(), $attrs, 1, 0); |
| 152 | 152 | foreach ($result[0] as $attribute => $valueSet) { |
| 153 | - $output->writeln(' ' . $attribute . ': '); |
|
| 153 | + $output->writeln(' '.$attribute.': '); |
|
| 154 | 154 | foreach ($valueSet as $value) { |
| 155 | 155 | if (in_array($attribute, $avatarAttributes)) { |
| 156 | 156 | $value = '{ImageData}'; |
| 157 | 157 | } |
| 158 | - $output->writeln(' ' . $value); |
|
| 158 | + $output->writeln(' '.$value); |
|
| 159 | 159 | } |
| 160 | 160 | } |
| 161 | 161 | $access->batchApplyUserAttributes($result); |
@@ -188,7 +188,7 @@ discard block |
||
| 188 | 188 | return; |
| 189 | 189 | } |
| 190 | 190 | $this->config->setUserValue($this->getUsername(), 'user_ldap', 'isDeleted', '1'); |
| 191 | - $this->config->setUserValue($this->getUsername(), 'user_ldap', 'foundDeleted', (string)time()); |
|
| 191 | + $this->config->setUserValue($this->getUsername(), 'user_ldap', 'foundDeleted', (string) time()); |
|
| 192 | 192 | } |
| 193 | 193 | |
| 194 | 194 | /** |
@@ -212,11 +212,11 @@ discard block |
||
| 212 | 212 | $displayName = $displayName2 = ''; |
| 213 | 213 | $attr = strtolower($this->connection->ldapUserDisplayName); |
| 214 | 214 | if (isset($ldapEntry[$attr])) { |
| 215 | - $displayName = (string)$ldapEntry[$attr][0]; |
|
| 215 | + $displayName = (string) $ldapEntry[$attr][0]; |
|
| 216 | 216 | } |
| 217 | 217 | $attr = strtolower($this->connection->ldapUserDisplayName2); |
| 218 | 218 | if (isset($ldapEntry[$attr])) { |
| 219 | - $displayName2 = (string)$ldapEntry[$attr][0]; |
|
| 219 | + $displayName2 = (string) $ldapEntry[$attr][0]; |
|
| 220 | 220 | } |
| 221 | 221 | if ($displayName !== '') { |
| 222 | 222 | $this->composeAndStoreDisplayName($displayName, $displayName2); |
@@ -308,7 +308,7 @@ discard block |
||
| 308 | 308 | * @throws \Exception |
| 309 | 309 | */ |
| 310 | 310 | public function getHomePath($valueFromLDAP = null) { |
| 311 | - $path = (string)$valueFromLDAP; |
|
| 311 | + $path = (string) $valueFromLDAP; |
|
| 312 | 312 | $attr = null; |
| 313 | 313 | |
| 314 | 314 | if (is_null($valueFromLDAP) |
@@ -330,7 +330,7 @@ discard block |
||
| 330 | 330 | && $path[1] === ':' && ('\\' === $path[2] || '/' === $path[2])) |
| 331 | 331 | ) { |
| 332 | 332 | $path = $this->config->getSystemValue('datadirectory', |
| 333 | - \OC::$SERVERROOT.'/data') . '/' . $path; |
|
| 333 | + \OC::$SERVERROOT.'/data').'/'.$path; |
|
| 334 | 334 | } |
| 335 | 335 | //we need it to store it in the DB as well in case a user gets |
| 336 | 336 | //deleted so we can clean up afterwards |
@@ -344,7 +344,7 @@ discard block |
||
| 344 | 344 | && $this->config->getAppValue('user_ldap', 'enforce_home_folder_naming_rule', true) |
| 345 | 345 | ) { |
| 346 | 346 | // a naming rule attribute is defined, but it doesn't exist for that LDAP user |
| 347 | - throw new \Exception('Home dir attribute can\'t be read from LDAP for uid: ' . $this->getUsername()); |
|
| 347 | + throw new \Exception('Home dir attribute can\'t be read from LDAP for uid: '.$this->getUsername()); |
|
| 348 | 348 | } |
| 349 | 349 | |
| 350 | 350 | //false will apply default behaviour as defined and done by OC_User |
@@ -415,7 +415,7 @@ discard block |
||
| 415 | 415 | $lastChecked = $this->config->getUserValue($this->uid, 'user_ldap', |
| 416 | 416 | self::USER_PREFKEY_LASTREFRESH, 0); |
| 417 | 417 | |
| 418 | - if ((time() - (int)$lastChecked) < (int)$this->config->getAppValue('user_ldap', 'updateAttributesInterval', 86400)) { |
|
| 418 | + if ((time() - (int) $lastChecked) < (int) $this->config->getAppValue('user_ldap', 'updateAttributesInterval', 86400)) { |
|
| 419 | 419 | return false; |
| 420 | 420 | } |
| 421 | 421 | return true; |
@@ -440,9 +440,9 @@ discard block |
||
| 440 | 440 | * @return string the effective display name |
| 441 | 441 | */ |
| 442 | 442 | public function composeAndStoreDisplayName($displayName, $displayName2 = '') { |
| 443 | - $displayName2 = (string)$displayName2; |
|
| 443 | + $displayName2 = (string) $displayName2; |
|
| 444 | 444 | if ($displayName2 !== '') { |
| 445 | - $displayName .= ' (' . $displayName2 . ')'; |
|
| 445 | + $displayName .= ' ('.$displayName2.')'; |
|
| 446 | 446 | } |
| 447 | 447 | $oldName = $this->config->getUserValue($this->uid, 'user_ldap', 'displayName', null); |
| 448 | 448 | if ($oldName !== $displayName) { |
@@ -489,20 +489,20 @@ discard block |
||
| 489 | 489 | if ($this->wasRefreshed('email')) { |
| 490 | 490 | return; |
| 491 | 491 | } |
| 492 | - $email = (string)$valueFromLDAP; |
|
| 492 | + $email = (string) $valueFromLDAP; |
|
| 493 | 493 | if (is_null($valueFromLDAP)) { |
| 494 | 494 | $emailAttribute = $this->connection->ldapEmailAttribute; |
| 495 | 495 | if ($emailAttribute !== '') { |
| 496 | 496 | $aEmail = $this->access->readAttribute($this->dn, $emailAttribute); |
| 497 | 497 | if (is_array($aEmail) && (count($aEmail) > 0)) { |
| 498 | - $email = (string)$aEmail[0]; |
|
| 498 | + $email = (string) $aEmail[0]; |
|
| 499 | 499 | } |
| 500 | 500 | } |
| 501 | 501 | } |
| 502 | 502 | if ($email !== '') { |
| 503 | 503 | $user = $this->userManager->get($this->uid); |
| 504 | 504 | if (!is_null($user)) { |
| 505 | - $currentEmail = (string)$user->getEMailAddress(); |
|
| 505 | + $currentEmail = (string) $user->getEMailAddress(); |
|
| 506 | 506 | if ($currentEmail !== $email) { |
| 507 | 507 | $user->setEMailAddress($email); |
| 508 | 508 | } |
@@ -547,19 +547,19 @@ discard block |
||
| 547 | 547 | if ($aQuota && (count($aQuota) > 0) && $this->verifyQuotaValue($aQuota[0])) { |
| 548 | 548 | $quota = $aQuota[0]; |
| 549 | 549 | } elseif (is_array($aQuota) && isset($aQuota[0])) { |
| 550 | - $this->log->log('no suitable LDAP quota found for user ' . $this->uid . ': [' . $aQuota[0] . ']', ILogger::DEBUG); |
|
| 550 | + $this->log->log('no suitable LDAP quota found for user '.$this->uid.': ['.$aQuota[0].']', ILogger::DEBUG); |
|
| 551 | 551 | } |
| 552 | 552 | } elseif ($this->verifyQuotaValue($valueFromLDAP)) { |
| 553 | 553 | $quota = $valueFromLDAP; |
| 554 | 554 | } else { |
| 555 | - $this->log->log('no suitable LDAP quota found for user ' . $this->uid . ': [' . $valueFromLDAP . ']', ILogger::DEBUG); |
|
| 555 | + $this->log->log('no suitable LDAP quota found for user '.$this->uid.': ['.$valueFromLDAP.']', ILogger::DEBUG); |
|
| 556 | 556 | } |
| 557 | 557 | |
| 558 | 558 | if ($quota === false && $this->verifyQuotaValue($defaultQuota)) { |
| 559 | 559 | // quota not found using the LDAP attribute (or not parseable). Try the default quota |
| 560 | 560 | $quota = $defaultQuota; |
| 561 | 561 | } elseif ($quota === false) { |
| 562 | - $this->log->log('no suitable default quota found for user ' . $this->uid . ': [' . $defaultQuota . ']', ILogger::DEBUG); |
|
| 562 | + $this->log->log('no suitable default quota found for user '.$this->uid.': ['.$defaultQuota.']', ILogger::DEBUG); |
|
| 563 | 563 | return; |
| 564 | 564 | } |
| 565 | 565 | |
@@ -567,7 +567,7 @@ discard block |
||
| 567 | 567 | if ($targetUser instanceof IUser) { |
| 568 | 568 | $targetUser->setQuota($quota); |
| 569 | 569 | } else { |
| 570 | - $this->log->log('trying to set a quota for user ' . $this->uid . ' but the user is missing', ILogger::INFO); |
|
| 570 | + $this->log->log('trying to set a quota for user '.$this->uid.' but the user is missing', ILogger::INFO); |
|
| 571 | 571 | } |
| 572 | 572 | } |
| 573 | 573 | |
@@ -649,7 +649,7 @@ discard block |
||
| 649 | 649 | return true; |
| 650 | 650 | } catch (\Exception $e) { |
| 651 | 651 | \OC::$server->getLogger()->logException($e, [ |
| 652 | - 'message' => 'Could not set avatar for ' . $this->dn, |
|
| 652 | + 'message' => 'Could not set avatar for '.$this->dn, |
|
| 653 | 653 | 'level' => ILogger::INFO, |
| 654 | 654 | 'app' => 'user_ldap', |
| 655 | 655 | ]); |
@@ -705,8 +705,8 @@ discard block |
||
| 705 | 705 | */ |
| 706 | 706 | public function handlePasswordExpiry($params) { |
| 707 | 707 | $ppolicyDN = $this->connection->ldapDefaultPPolicyDN; |
| 708 | - if (empty($ppolicyDN) || ((int)$this->connection->turnOnPasswordChange !== 1)) { |
|
| 709 | - return;//password expiry handling disabled |
|
| 708 | + if (empty($ppolicyDN) || ((int) $this->connection->turnOnPasswordChange !== 1)) { |
|
| 709 | + return; //password expiry handling disabled |
|
| 710 | 710 | } |
| 711 | 711 | $uid = $params['uid']; |
| 712 | 712 | if (isset($uid) && $uid === $this->getUsername()) { |
@@ -716,7 +716,7 @@ discard block |
||
| 716 | 716 | if (array_key_exists('pwdpolicysubentry', $result[0])) { |
| 717 | 717 | $pwdPolicySubentry = $result[0]['pwdpolicysubentry']; |
| 718 | 718 | if ($pwdPolicySubentry && (count($pwdPolicySubentry) > 0)) { |
| 719 | - $ppolicyDN = $pwdPolicySubentry[0];//custom ppolicy DN |
|
| 719 | + $ppolicyDN = $pwdPolicySubentry[0]; //custom ppolicy DN |
|
| 720 | 720 | } |
| 721 | 721 | } |
| 722 | 722 | |
@@ -725,7 +725,7 @@ discard block |
||
| 725 | 725 | $pwdChangedTime = array_key_exists('pwdchangedtime', $result[0]) ? $result[0]['pwdchangedtime'] : []; |
| 726 | 726 | |
| 727 | 727 | //retrieve relevant password policy attributes |
| 728 | - $cacheKey = 'ppolicyAttributes' . $ppolicyDN; |
|
| 728 | + $cacheKey = 'ppolicyAttributes'.$ppolicyDN; |
|
| 729 | 729 | $result = $this->connection->getFromCache($cacheKey); |
| 730 | 730 | if (is_null($result)) { |
| 731 | 731 | $result = $this->access->search('objectclass=*', $ppolicyDN, ['pwdgraceauthnlimit', 'pwdmaxage', 'pwdexpirewarning']); |
@@ -739,7 +739,7 @@ discard block |
||
| 739 | 739 | //handle grace login |
| 740 | 740 | if (!empty($pwdGraceUseTime)) { //was this a grace login? |
| 741 | 741 | if (!empty($pwdGraceAuthNLimit) |
| 742 | - && count($pwdGraceUseTime) < (int)$pwdGraceAuthNLimit[0]) { //at least one more grace login available? |
|
| 742 | + && count($pwdGraceUseTime) < (int) $pwdGraceAuthNLimit[0]) { //at least one more grace login available? |
|
| 743 | 743 | $this->config->setUserValue($uid, 'user_ldap', 'needsPasswordReset', 'true'); |
| 744 | 744 | header('Location: '.\OC::$server->getURLGenerator()->linkToRouteAbsolute( |
| 745 | 745 | 'user_ldap.renewPassword.showRenewPasswordForm', ['user' => $uid])); |
@@ -760,8 +760,8 @@ discard block |
||
| 760 | 760 | if (!empty($pwdChangedTime)) { |
| 761 | 761 | if (!empty($pwdMaxAge) |
| 762 | 762 | && !empty($pwdExpireWarning)) { |
| 763 | - $pwdMaxAgeInt = (int)$pwdMaxAge[0]; |
|
| 764 | - $pwdExpireWarningInt = (int)$pwdExpireWarning[0]; |
|
| 763 | + $pwdMaxAgeInt = (int) $pwdMaxAge[0]; |
|
| 764 | + $pwdExpireWarningInt = (int) $pwdExpireWarning[0]; |
|
| 765 | 765 | if ($pwdMaxAgeInt > 0 && $pwdExpireWarningInt > 0) { |
| 766 | 766 | $pwdChangedTimeDt = \DateTime::createFromFormat('YmdHisZ', $pwdChangedTime[0]); |
| 767 | 767 | $pwdChangedTimeDt->add(new \DateInterval('PT'.$pwdMaxAgeInt.'S')); |
@@ -45,7 +45,7 @@ discard block |
||
| 45 | 45 | protected $pagedResultsAdapter; |
| 46 | 46 | |
| 47 | 47 | public function __construct() { |
| 48 | - if(version_compare(PHP_VERSION, '7.3', '<') === true) { |
|
| 48 | + if (version_compare(PHP_VERSION, '7.3', '<') === true) { |
|
| 49 | 49 | $this->pagedResultsAdapter = new Php54(); |
| 50 | 50 | } else { |
| 51 | 51 | $this->pagedResultsAdapter = new Php73(); |
@@ -69,11 +69,11 @@ discard block |
||
| 69 | 69 | */ |
| 70 | 70 | public function connect($host, $port) { |
| 71 | 71 | if (strpos($host, '://') === false) { |
| 72 | - $host = 'ldap://' . $host; |
|
| 72 | + $host = 'ldap://'.$host; |
|
| 73 | 73 | } |
| 74 | 74 | if (strpos($host, ':', strpos($host, '://') + 1) === false) { |
| 75 | 75 | //ldap_connect ignores port parameter when URLs are passed |
| 76 | - $host .= ':' . $port; |
|
| 76 | + $host .= ':'.$port; |
|
| 77 | 77 | } |
| 78 | 78 | return $this->invokeLDAPMethod('connect', $host); |
| 79 | 79 | } |
@@ -103,7 +103,7 @@ discard block |
||
| 103 | 103 | public function controlPagedResult($link, $pageSize, $isCritical) { |
| 104 | 104 | $fn = $this->pagedResultsAdapter->getRequestCallFunc(); |
| 105 | 105 | $this->pagedResultsAdapter->setRequestParameters($link, $pageSize, $isCritical); |
| 106 | - if($fn === null) { |
|
| 106 | + if ($fn === null) { |
|
| 107 | 107 | return true; |
| 108 | 108 | } |
| 109 | 109 | |
@@ -221,7 +221,7 @@ discard block |
||
| 221 | 221 | * @throws \Exception |
| 222 | 222 | */ |
| 223 | 223 | public function search($link, $baseDN, $filter, $attr, $attrsOnly = 0, $limit = 0) { |
| 224 | - $oldHandler = set_error_handler(function ($no, $message, $file, $line) use (&$oldHandler) { |
|
| 224 | + $oldHandler = set_error_handler(function($no, $message, $file, $line) use (&$oldHandler) { |
|
| 225 | 225 | if (strpos($message, 'Partial search results returned: Sizelimit exceeded') !== false) { |
| 226 | 226 | return true; |
| 227 | 227 | } |
@@ -334,7 +334,7 @@ discard block |
||
| 334 | 334 | */ |
| 335 | 335 | protected function invokeLDAPMethod() { |
| 336 | 336 | $arguments = func_get_args(); |
| 337 | - $func = 'ldap_' . array_shift($arguments); |
|
| 337 | + $func = 'ldap_'.array_shift($arguments); |
|
| 338 | 338 | if (function_exists($func)) { |
| 339 | 339 | $this->preFunctionCall($func, $arguments); |
| 340 | 340 | $result = call_user_func_array($func, $arguments); |
@@ -368,7 +368,7 @@ discard block |
||
| 368 | 368 | if ($errorCode === 0) { |
| 369 | 369 | return; |
| 370 | 370 | } |
| 371 | - $errorMsg = ldap_error($resource); |
|
| 371 | + $errorMsg = ldap_error($resource); |
|
| 372 | 372 | |
| 373 | 373 | if ($this->curFunc === 'ldap_get_entries' |
| 374 | 374 | && $errorCode === -4) { |
@@ -386,7 +386,7 @@ discard block |
||
| 386 | 386 | throw new \Exception('LDAP Operations error', $errorCode); |
| 387 | 387 | } elseif ($errorCode === 19) { |
| 388 | 388 | ldap_get_option($this->curArgs[0], LDAP_OPT_ERROR_STRING, $extended_error); |
| 389 | - throw new ConstraintViolationException(!empty($extended_error)?$extended_error:$errorMsg, $errorCode); |
|
| 389 | + throw new ConstraintViolationException(!empty($extended_error) ? $extended_error : $errorMsg, $errorCode); |
|
| 390 | 390 | } else { |
| 391 | 391 | \OC::$server->getLogger()->debug('LDAP error {message} ({code}) after calling {func}', [ |
| 392 | 392 | 'app' => 'user_ldap', |
@@ -27,10 +27,10 @@ |
||
| 27 | 27 | |
| 28 | 28 | trait TLinkId { |
| 29 | 29 | public function getLinkId($link) { |
| 30 | - if(is_resource($link)) { |
|
| 31 | - return (int)$link; |
|
| 32 | - } else if(is_array($link) && isset($link[0]) && is_resource($link[0])) { |
|
| 33 | - return (int)$link[0]; |
|
| 30 | + if (is_resource($link)) { |
|
| 31 | + return (int) $link; |
|
| 32 | + } else if (is_array($link) && isset($link[0]) && is_resource($link[0])) { |
|
| 33 | + return (int) $link[0]; |
|
| 34 | 34 | } |
| 35 | 35 | throw new \RuntimeException('No resource provided'); |
| 36 | 36 | } |
@@ -48,7 +48,7 @@ discard block |
||
| 48 | 48 | |
| 49 | 49 | public function getResponseCallArgs(array $originalArgs): array { |
| 50 | 50 | $linkId = $this->getLinkId($originalArgs[0]); |
| 51 | - if(!isset($this->linkData[$linkId])) { |
|
| 51 | + if (!isset($this->linkData[$linkId])) { |
|
| 52 | 52 | throw new \LogicException('There should be a request before the response'); |
| 53 | 53 | } |
| 54 | 54 | $this->linkData[$linkId]['responseArgs'] = &$originalArgs; |
@@ -68,7 +68,7 @@ discard block |
||
| 68 | 68 | public function setRequestParameters($link, int $pageSize, bool $isCritical): void { |
| 69 | 69 | $linkId = $this->getLinkId($link); |
| 70 | 70 | |
| 71 | - if($pageSize === 0 || !isset($this->linkData[$linkId]['cookie'])) { |
|
| 71 | + if ($pageSize === 0 || !isset($this->linkData[$linkId]['cookie'])) { |
|
| 72 | 72 | // abandons a previous paged search |
| 73 | 73 | $this->linkData[$linkId]['cookie'] = ''; |
| 74 | 74 | } |
@@ -100,7 +100,7 @@ discard block |
||
| 100 | 100 | int $limit |
| 101 | 101 | ): void { |
| 102 | 102 | $linkId = $this->getLinkId($link); |
| 103 | - if(!isset($this->linkData[$linkId])) { |
|
| 103 | + if (!isset($this->linkData[$linkId])) { |
|
| 104 | 104 | $this->linkData[$linkId] = []; |
| 105 | 105 | } |
| 106 | 106 | $this->linkData[$linkId]['searchArgs'] = func_get_args(); |
@@ -113,7 +113,7 @@ discard block |
||
| 113 | 113 | |
| 114 | 114 | public function setReadArgs($link, string $baseDN, string $filter, array $attr): void { |
| 115 | 115 | $linkId = $this->getLinkId($link); |
| 116 | - if(!isset($this->linkData[$linkId])) { |
|
| 116 | + if (!isset($this->linkData[$linkId])) { |
|
| 117 | 117 | $this->linkData[$linkId] = []; |
| 118 | 118 | } |
| 119 | 119 | $this->linkData[$linkId]['readArgs'] = func_get_args(); |
@@ -50,7 +50,7 @@ discard block |
||
| 50 | 50 | $link = array_shift($originalArgs); |
| 51 | 51 | $linkId = $this->getLinkId($link); |
| 52 | 52 | |
| 53 | - if(!isset($this->linkData[$linkId])) { |
|
| 53 | + if (!isset($this->linkData[$linkId])) { |
|
| 54 | 54 | $this->linkData[$linkId] = []; |
| 55 | 55 | } |
| 56 | 56 | |
@@ -85,7 +85,7 @@ discard block |
||
| 85 | 85 | |
| 86 | 86 | public function setRequestParameters($link, int $pageSize, bool $isCritical): void { |
| 87 | 87 | $linkId = $this->getLinkId($link); |
| 88 | - if(!isset($this->linkData[$linkId])) { |
|
| 88 | + if (!isset($this->linkData[$linkId])) { |
|
| 89 | 89 | $this->linkData[$linkId] = []; |
| 90 | 90 | } |
| 91 | 91 | $this->linkData[$linkId]['requestArgs'] = []; |
@@ -112,7 +112,7 @@ discard block |
||
| 112 | 112 | int $limit |
| 113 | 113 | ): void { |
| 114 | 114 | $linkId = $this->getLinkId($link); |
| 115 | - if(!isset($this->linkData[$linkId])) { |
|
| 115 | + if (!isset($this->linkData[$linkId])) { |
|
| 116 | 116 | $this->linkData[$linkId] = []; |
| 117 | 117 | } |
| 118 | 118 | |
@@ -127,7 +127,7 @@ discard block |
||
| 127 | 127 | |
| 128 | 128 | public function setReadArgs($link, string $baseDN, string $filter, array $attr): void { |
| 129 | 129 | $linkId = $this->getLinkId($link); |
| 130 | - if(!isset($this->linkData[$linkId])) { |
|
| 130 | + if (!isset($this->linkData[$linkId])) { |
|
| 131 | 131 | $this->linkData[$linkId] = []; |
| 132 | 132 | } |
| 133 | 133 | |
@@ -143,7 +143,7 @@ discard block |
||
| 143 | 143 | } |
| 144 | 144 | |
| 145 | 145 | protected function preparePagesResultsArgs(int $linkId, string $methodKey): void { |
| 146 | - if(!isset($this->linkData[$linkId]['requestArgs'])) { |
|
| 146 | + if (!isset($this->linkData[$linkId]['requestArgs'])) { |
|
| 147 | 147 | return; |
| 148 | 148 | } |
| 149 | 149 | |
@@ -196,7 +196,7 @@ discard block |
||
| 196 | 196 | $this->abandonPagedSearch(); |
| 197 | 197 | // openLDAP requires that we init a new Paged Search. Not needed by AD, |
| 198 | 198 | // but does not hurt either. |
| 199 | - $pagingSize = (int)$this->connection->ldapPagingSize; |
|
| 199 | + $pagingSize = (int) $this->connection->ldapPagingSize; |
|
| 200 | 200 | // 0 won't result in replies, small numbers may leave out groups |
| 201 | 201 | // (cf. #12306), 500 is default for paging and should work everywhere. |
| 202 | 202 | $maxResults = $pagingSize > 20 ? $pagingSize : 500; |
@@ -226,7 +226,7 @@ discard block |
||
| 226 | 226 | $result = $this->extractRangeData($result, $attr); |
| 227 | 227 | if (!empty($result)) { |
| 228 | 228 | $normalizedResult = $this->extractAttributeValuesFromResult( |
| 229 | - [ $attr => $result['values'] ], |
|
| 229 | + [$attr => $result['values']], |
|
| 230 | 230 | $attr |
| 231 | 231 | ); |
| 232 | 232 | $values = array_merge($values, $normalizedResult); |
@@ -236,8 +236,8 @@ discard block |
||
| 236 | 236 | // no more results left |
| 237 | 237 | return $values; |
| 238 | 238 | } else { |
| 239 | - $low = $result['rangeHigh'] + 1; |
|
| 240 | - $attrToRead = $result['attributeName'] . ';range=' . $low . '-*'; |
|
| 239 | + $low = $result['rangeHigh'] + 1; |
|
| 240 | + $attrToRead = $result['attributeName'].';range='.$low.'-*'; |
|
| 241 | 241 | $isRangeRequest = true; |
| 242 | 242 | } |
| 243 | 243 | } |
@@ -267,13 +267,13 @@ discard block |
||
| 267 | 267 | if (!$this->ldap->isResource($rr)) { |
| 268 | 268 | if ($attribute !== '') { |
| 269 | 269 | //do not throw this message on userExists check, irritates |
| 270 | - \OCP\Util::writeLog('user_ldap', 'readAttribute failed for DN ' . $dn, ILogger::DEBUG); |
|
| 270 | + \OCP\Util::writeLog('user_ldap', 'readAttribute failed for DN '.$dn, ILogger::DEBUG); |
|
| 271 | 271 | } |
| 272 | 272 | //in case an error occurs , e.g. object does not exist |
| 273 | 273 | return false; |
| 274 | 274 | } |
| 275 | 275 | if ($attribute === '' && ($filter === 'objectclass=*' || $this->invokeLDAPMethod('countEntries', $cr, $rr) === 1)) { |
| 276 | - \OCP\Util::writeLog('user_ldap', 'readAttribute: ' . $dn . ' found', ILogger::DEBUG); |
|
| 276 | + \OCP\Util::writeLog('user_ldap', 'readAttribute: '.$dn.' found', ILogger::DEBUG); |
|
| 277 | 277 | return true; |
| 278 | 278 | } |
| 279 | 279 | $er = $this->invokeLDAPMethod('firstEntry', $cr, $rr); |
@@ -300,7 +300,7 @@ discard block |
||
| 300 | 300 | $values = []; |
| 301 | 301 | if (isset($result[$attribute]) && $result[$attribute]['count'] > 0) { |
| 302 | 302 | $lowercaseAttribute = strtolower($attribute); |
| 303 | - for ($i=0;$i<$result[$attribute]['count'];$i++) { |
|
| 303 | + for ($i = 0; $i < $result[$attribute]['count']; $i++) { |
|
| 304 | 304 | if ($this->resemblesDN($attribute)) { |
| 305 | 305 | $values[] = $this->helper->sanitizeDN($result[$attribute][$i]); |
| 306 | 306 | } elseif ($lowercaseAttribute === 'objectguid' || $lowercaseAttribute === 'guid') { |
@@ -353,7 +353,7 @@ discard block |
||
| 353 | 353 | * @throws \Exception |
| 354 | 354 | */ |
| 355 | 355 | public function setPassword($userDN, $password) { |
| 356 | - if ((int)$this->connection->turnOnPasswordChange !== 1) { |
|
| 356 | + if ((int) $this->connection->turnOnPasswordChange !== 1) { |
|
| 357 | 357 | throw new \Exception('LDAP password changes are disabled.'); |
| 358 | 358 | } |
| 359 | 359 | $cr = $this->connection->getConnectionResource(); |
@@ -581,7 +581,7 @@ discard block |
||
| 581 | 581 | } |
| 582 | 582 | |
| 583 | 583 | if ($isUser) { |
| 584 | - $usernameAttribute = (string)$this->connection->ldapExpertUsernameAttr; |
|
| 584 | + $usernameAttribute = (string) $this->connection->ldapExpertUsernameAttr; |
|
| 585 | 585 | if ($usernameAttribute !== '') { |
| 586 | 586 | $username = $this->readAttribute($fdn, $usernameAttribute); |
| 587 | 587 | $username = $username[0]; |
@@ -785,7 +785,7 @@ discard block |
||
| 785 | 785 | } |
| 786 | 786 | |
| 787 | 787 | public function cacheGroupDisplayName(string $ncName, string $displayName): void { |
| 788 | - $cacheKey = 'group_getDisplayName' . $ncName; |
|
| 788 | + $cacheKey = 'group_getDisplayName'.$ncName; |
|
| 789 | 789 | $this->connection->writeToCache($cacheKey, $displayName); |
| 790 | 790 | } |
| 791 | 791 | |
@@ -802,7 +802,7 @@ discard block |
||
| 802 | 802 | //while loop is just a precaution. If a name is not generated within |
| 803 | 803 | //20 attempts, something else is very wrong. Avoids infinite loop. |
| 804 | 804 | while ($attempts < 20) { |
| 805 | - $altName = $name . '_' . rand(1000,9999); |
|
| 805 | + $altName = $name.'_'.rand(1000, 9999); |
|
| 806 | 806 | if (!$this->ncUserManager->userExists($altName)) { |
| 807 | 807 | return $altName; |
| 808 | 808 | } |
@@ -830,9 +830,9 @@ discard block |
||
| 830 | 830 | } else { |
| 831 | 831 | natsort($usedNames); |
| 832 | 832 | $lastName = array_pop($usedNames); |
| 833 | - $lastNo = (int)substr($lastName, strrpos($lastName, '_') + 1); |
|
| 833 | + $lastNo = (int) substr($lastName, strrpos($lastName, '_') + 1); |
|
| 834 | 834 | } |
| 835 | - $altName = $name.'_'. (string)($lastNo+1); |
|
| 835 | + $altName = $name.'_'.(string) ($lastNo + 1); |
|
| 836 | 836 | unset($usedNames); |
| 837 | 837 | |
| 838 | 838 | $attempts = 1; |
@@ -843,7 +843,7 @@ discard block |
||
| 843 | 843 | if (!\OC::$server->getGroupManager()->groupExists($altName)) { |
| 844 | 844 | return $altName; |
| 845 | 845 | } |
| 846 | - $altName = $name . '_' . ($lastNo + $attempts); |
|
| 846 | + $altName = $name.'_'.($lastNo + $attempts); |
|
| 847 | 847 | $attempts++; |
| 848 | 848 | } |
| 849 | 849 | return false; |
@@ -910,7 +910,7 @@ discard block |
||
| 910 | 910 | if (!$forceApplyAttributes) { |
| 911 | 911 | $isBackgroundJobModeAjax = $this->config |
| 912 | 912 | ->getAppValue('core', 'backgroundjobs_mode', 'ajax') === 'ajax'; |
| 913 | - $recordsToUpdate = array_filter($ldapRecords, function ($record) use ($isBackgroundJobModeAjax) { |
|
| 913 | + $recordsToUpdate = array_filter($ldapRecords, function($record) use ($isBackgroundJobModeAjax) { |
|
| 914 | 914 | $newlyMapped = false; |
| 915 | 915 | $uid = $this->dn2ocname($record['dn'][0], null, true, $newlyMapped, $record); |
| 916 | 916 | if (is_string($uid)) { |
@@ -938,7 +938,7 @@ discard block |
||
| 938 | 938 | // displayName is obligatory |
| 939 | 939 | continue; |
| 940 | 940 | } |
| 941 | - $ocName = $this->dn2ocname($userRecord['dn'][0], null, true); |
|
| 941 | + $ocName = $this->dn2ocname($userRecord['dn'][0], null, true); |
|
| 942 | 942 | if ($ocName === false) { |
| 943 | 943 | continue; |
| 944 | 944 | } |
@@ -964,7 +964,7 @@ discard block |
||
| 964 | 964 | */ |
| 965 | 965 | public function fetchListOfGroups($filter, $attr, $limit = null, $offset = null) { |
| 966 | 966 | $groupRecords = $this->searchGroups($filter, $attr, $limit, $offset); |
| 967 | - array_walk($groupRecords, function ($record) { |
|
| 967 | + array_walk($groupRecords, function($record) { |
|
| 968 | 968 | $newlyMapped = false; |
| 969 | 969 | $gid = $this->dn2ocname($record['dn'][0], null, false, $newlyMapped, $record); |
| 970 | 970 | if (!$newlyMapped && is_string($gid)) { |
@@ -984,7 +984,7 @@ discard block |
||
| 984 | 984 | if ($manyAttributes) { |
| 985 | 985 | return $list; |
| 986 | 986 | } else { |
| 987 | - $list = array_reduce($list, function ($carry, $item) { |
|
| 987 | + $list = array_reduce($list, function($carry, $item) { |
|
| 988 | 988 | $attribute = array_keys($item)[0]; |
| 989 | 989 | $carry[] = $item[$attribute][0]; |
| 990 | 990 | return $carry; |
@@ -1029,7 +1029,7 @@ discard block |
||
| 1029 | 1029 | $result = false; |
| 1030 | 1030 | foreach ($this->connection->ldapBaseUsers as $base) { |
| 1031 | 1031 | $count = $this->count($filter, [$base], $attr, $limit, $offset); |
| 1032 | - $result = is_int($count) ? (int)$result + $count : $result; |
|
| 1032 | + $result = is_int($count) ? (int) $result + $count : $result; |
|
| 1033 | 1033 | } |
| 1034 | 1034 | return $result; |
| 1035 | 1035 | } |
@@ -1068,7 +1068,7 @@ discard block |
||
| 1068 | 1068 | $result = false; |
| 1069 | 1069 | foreach ($this->connection->ldapBaseGroups as $base) { |
| 1070 | 1070 | $count = $this->count($filter, [$base], $attr, $limit, $offset); |
| 1071 | - $result = is_int($count) ? (int)$result + $count : $result; |
|
| 1071 | + $result = is_int($count) ? (int) $result + $count : $result; |
|
| 1072 | 1072 | } |
| 1073 | 1073 | return $result; |
| 1074 | 1074 | } |
@@ -1085,7 +1085,7 @@ discard block |
||
| 1085 | 1085 | $result = false; |
| 1086 | 1086 | foreach ($this->connection->ldapBase as $base) { |
| 1087 | 1087 | $count = $this->count('objectclass=*', [$base], ['dn'], $limit, $offset); |
| 1088 | - $result = is_int($count) ? (int)$result + $count : $result; |
|
| 1088 | + $result = is_int($count) ? (int) $result + $count : $result; |
|
| 1089 | 1089 | } |
| 1090 | 1090 | return $result; |
| 1091 | 1091 | } |
@@ -1110,7 +1110,7 @@ discard block |
||
| 1110 | 1110 | // php no longer supports call-time pass-by-reference |
| 1111 | 1111 | // thus cannot support controlPagedResultResponse as the third argument |
| 1112 | 1112 | // is a reference |
| 1113 | - $doMethod = function () use ($command, &$arguments) { |
|
| 1113 | + $doMethod = function() use ($command, &$arguments) { |
|
| 1114 | 1114 | if ($command == 'controlPagedResultResponse') { |
| 1115 | 1115 | throw new \InvalidArgumentException('Invoker does not support controlPagedResultResponse, call LDAP Wrapper directly instead.'); |
| 1116 | 1116 | } else { |
@@ -1169,12 +1169,12 @@ discard block |
||
| 1169 | 1169 | } |
| 1170 | 1170 | |
| 1171 | 1171 | //check whether paged search should be attempted |
| 1172 | - $pagedSearchOK = $this->initPagedSearch($filter, $base, $attr, (int)$limit, (int)$offset); |
|
| 1172 | + $pagedSearchOK = $this->initPagedSearch($filter, $base, $attr, (int) $limit, (int) $offset); |
|
| 1173 | 1173 | |
| 1174 | 1174 | $sr = $this->invokeLDAPMethod('search', $cr, $base, $filter, $attr); |
| 1175 | 1175 | // cannot use $cr anymore, might have changed in the previous call! |
| 1176 | 1176 | $error = $this->ldap->errno($this->connection->getConnectionResource()); |
| 1177 | - if(!$this->ldap->isResource($sr) || $error !== 0) { |
|
| 1177 | + if (!$this->ldap->isResource($sr) || $error !== 0) { |
|
| 1178 | 1178 | \OCP\Util::writeLog('user_ldap', 'Attempt for Paging? '.print_r($pagedSearchOK, true), ILogger::ERROR); |
| 1179 | 1179 | return false; |
| 1180 | 1180 | } |
@@ -1204,7 +1204,7 @@ discard block |
||
| 1204 | 1204 | $cookie = null; |
| 1205 | 1205 | if ($pagedSearchOK) { |
| 1206 | 1206 | $cr = $this->connection->getConnectionResource(); |
| 1207 | - if($this->ldap->controlPagedResultResponse($cr, $sr, $cookie)) { |
|
| 1207 | + if ($this->ldap->controlPagedResultResponse($cr, $sr, $cookie)) { |
|
| 1208 | 1208 | $this->lastCookie = $cookie; |
| 1209 | 1209 | } |
| 1210 | 1210 | |
@@ -1215,14 +1215,14 @@ discard block |
||
| 1215 | 1215 | // if count is bigger, then the server does not support |
| 1216 | 1216 | // paged search. Instead, he did a normal search. We set a |
| 1217 | 1217 | // flag here, so the callee knows how to deal with it. |
| 1218 | - if($foundItems <= $limit) { |
|
| 1218 | + if ($foundItems <= $limit) { |
|
| 1219 | 1219 | $this->pagedSearchedSuccessful = true; |
| 1220 | 1220 | } |
| 1221 | 1221 | } else { |
| 1222 | - if (!is_null($limit) && (int)$this->connection->ldapPagingSize !== 0) { |
|
| 1222 | + if (!is_null($limit) && (int) $this->connection->ldapPagingSize !== 0) { |
|
| 1223 | 1223 | \OC::$server->getLogger()->debug( |
| 1224 | 1224 | 'Paged search was not available', |
| 1225 | - [ 'app' => 'user_ldap' ] |
|
| 1225 | + ['app' => 'user_ldap'] |
|
| 1226 | 1226 | ); |
| 1227 | 1227 | } |
| 1228 | 1228 | } |
@@ -1261,11 +1261,11 @@ discard block |
||
| 1261 | 1261 | 'filter' => $filter |
| 1262 | 1262 | ]); |
| 1263 | 1263 | |
| 1264 | - if(!is_null($attr) && !is_array($attr)) { |
|
| 1264 | + if (!is_null($attr) && !is_array($attr)) { |
|
| 1265 | 1265 | $attr = array(mb_strtolower($attr, 'UTF-8')); |
| 1266 | 1266 | } |
| 1267 | 1267 | |
| 1268 | - $limitPerPage = (int)$this->connection->ldapPagingSize; |
|
| 1268 | + $limitPerPage = (int) $this->connection->ldapPagingSize; |
|
| 1269 | 1269 | if (!is_null($limit) && $limit < $limitPerPage && $limit > 0) { |
| 1270 | 1270 | $limitPerPage = $limit; |
| 1271 | 1271 | } |
@@ -1274,7 +1274,7 @@ discard block |
||
| 1274 | 1274 | $count = null; |
| 1275 | 1275 | $this->connection->getConnectionResource(); |
| 1276 | 1276 | |
| 1277 | - foreach($bases as $base) { |
|
| 1277 | + foreach ($bases as $base) { |
|
| 1278 | 1278 | do { |
| 1279 | 1279 | $search = $this->executeSearch($filter, $base, $attr, $limitPerPage, $offset); |
| 1280 | 1280 | if ($search === false) { |
@@ -1307,7 +1307,7 @@ discard block |
||
| 1307 | 1307 | * @throws ServerNotAvailableException |
| 1308 | 1308 | */ |
| 1309 | 1309 | private function countEntriesInSearchResults($sr): int { |
| 1310 | - return (int)$this->invokeLDAPMethod('countEntries', $this->connection->getConnectionResource(), $sr); |
|
| 1310 | + return (int) $this->invokeLDAPMethod('countEntries', $this->connection->getConnectionResource(), $sr); |
|
| 1311 | 1311 | } |
| 1312 | 1312 | |
| 1313 | 1313 | /** |
@@ -1323,12 +1323,12 @@ discard block |
||
| 1323 | 1323 | ?int $offset = null, |
| 1324 | 1324 | bool $skipHandling = false |
| 1325 | 1325 | ): array { |
| 1326 | - $limitPerPage = (int)$this->connection->ldapPagingSize; |
|
| 1326 | + $limitPerPage = (int) $this->connection->ldapPagingSize; |
|
| 1327 | 1327 | if (!is_null($limit) && $limit < $limitPerPage && $limit > 0) { |
| 1328 | 1328 | $limitPerPage = $limit; |
| 1329 | 1329 | } |
| 1330 | 1330 | |
| 1331 | - if(!is_null($attr) && !is_array($attr)) { |
|
| 1331 | + if (!is_null($attr) && !is_array($attr)) { |
|
| 1332 | 1332 | $attr = [mb_strtolower($attr, 'UTF-8')]; |
| 1333 | 1333 | } |
| 1334 | 1334 | |
@@ -1415,7 +1415,7 @@ discard block |
||
| 1415 | 1415 | && !is_null($limit) |
| 1416 | 1416 | ) |
| 1417 | 1417 | ) { |
| 1418 | - $findings = array_slice($findings, (int)$offset, $limit); |
|
| 1418 | + $findings = array_slice($findings, (int) $offset, $limit); |
|
| 1419 | 1419 | } |
| 1420 | 1420 | return $findings; |
| 1421 | 1421 | } |
@@ -1466,7 +1466,7 @@ discard block |
||
| 1466 | 1466 | } |
| 1467 | 1467 | $search = ['*', '\\', '(', ')']; |
| 1468 | 1468 | $replace = ['\\*', '\\\\', '\\(', '\\)']; |
| 1469 | - return $asterisk . str_replace($search, $replace, $input); |
|
| 1469 | + return $asterisk.str_replace($search, $replace, $input); |
|
| 1470 | 1470 | } |
| 1471 | 1471 | |
| 1472 | 1472 | /** |
@@ -1500,9 +1500,9 @@ discard block |
||
| 1500 | 1500 | if ($filter !== '' && $filter[0] !== '(') { |
| 1501 | 1501 | $filter = '('.$filter.')'; |
| 1502 | 1502 | } |
| 1503 | - $combinedFilter.=$filter; |
|
| 1503 | + $combinedFilter .= $filter; |
|
| 1504 | 1504 | } |
| 1505 | - $combinedFilter.=')'; |
|
| 1505 | + $combinedFilter .= ')'; |
|
| 1506 | 1506 | return $combinedFilter; |
| 1507 | 1507 | } |
| 1508 | 1508 | |
@@ -1548,7 +1548,7 @@ discard block |
||
| 1548 | 1548 | //every word needs to appear at least once |
| 1549 | 1549 | $wordMatchOneAttrFilters = []; |
| 1550 | 1550 | foreach ($searchAttributes as $attr) { |
| 1551 | - $wordMatchOneAttrFilters[] = $attr . '=' . $word; |
|
| 1551 | + $wordMatchOneAttrFilters[] = $attr.'='.$word; |
|
| 1552 | 1552 | } |
| 1553 | 1553 | $wordFilters[] = $this->combineFilterWithOr($wordMatchOneAttrFilters); |
| 1554 | 1554 | } |
@@ -1583,10 +1583,10 @@ discard block |
||
| 1583 | 1583 | if ($fallbackAttribute === '') { |
| 1584 | 1584 | return ''; |
| 1585 | 1585 | } |
| 1586 | - $filter[] = $fallbackAttribute . '=' . $search; |
|
| 1586 | + $filter[] = $fallbackAttribute.'='.$search; |
|
| 1587 | 1587 | } else { |
| 1588 | 1588 | foreach ($searchAttributes as $attribute) { |
| 1589 | - $filter[] = $attribute . '=' . $search; |
|
| 1589 | + $filter[] = $attribute.'='.$search; |
|
| 1590 | 1590 | } |
| 1591 | 1591 | } |
| 1592 | 1592 | if (count($filter) === 1) { |
@@ -1610,7 +1610,7 @@ discard block |
||
| 1610 | 1610 | if ($term === '') { |
| 1611 | 1611 | $result = '*'; |
| 1612 | 1612 | } elseif ($allowEnum !== 'no') { |
| 1613 | - $result = $term . '*'; |
|
| 1613 | + $result = $term.'*'; |
|
| 1614 | 1614 | } |
| 1615 | 1615 | return $result; |
| 1616 | 1616 | } |
@@ -1622,7 +1622,7 @@ discard block |
||
| 1622 | 1622 | public function getFilterForUserCount() { |
| 1623 | 1623 | $filter = $this->combineFilterWithAnd([ |
| 1624 | 1624 | $this->connection->ldapUserFilter, |
| 1625 | - $this->connection->ldapUserDisplayName . '=*' |
|
| 1625 | + $this->connection->ldapUserDisplayName.'=*' |
|
| 1626 | 1626 | ]); |
| 1627 | 1627 | |
| 1628 | 1628 | return $filter; |
@@ -1671,7 +1671,7 @@ discard block |
||
| 1671 | 1671 | break; |
| 1672 | 1672 | } |
| 1673 | 1673 | } |
| 1674 | - if(!isset($hasFound) || !$hasFound) { |
|
| 1674 | + if (!isset($hasFound) || !$hasFound) { |
|
| 1675 | 1675 | throw new \Exception('Cannot determine UUID attribute'); |
| 1676 | 1676 | } |
| 1677 | 1677 | } else { |
@@ -1688,7 +1688,7 @@ discard block |
||
| 1688 | 1688 | $uuid = $this->formatGuid2ForFilterUser($uuid); |
| 1689 | 1689 | } |
| 1690 | 1690 | |
| 1691 | - $filter = $uuidAttr . '=' . $uuid; |
|
| 1691 | + $filter = $uuidAttr.'='.$uuid; |
|
| 1692 | 1692 | $result = $this->searchUsers($filter, ['dn'], 2); |
| 1693 | 1693 | if (is_array($result) && isset($result[0]) && isset($result[0]['dn']) && count($result) === 1) { |
| 1694 | 1694 | // we put the count into account to make sure that this is |
@@ -1817,8 +1817,8 @@ discard block |
||
| 1817 | 1817 | for ($k = 1; $k <= 2; ++$k) { |
| 1818 | 1818 | $hex_guid_to_guid_str .= substr($hex_guid, 16 - 2 * $k, 2); |
| 1819 | 1819 | } |
| 1820 | - $hex_guid_to_guid_str .= '-' . substr($hex_guid, 16, 4); |
|
| 1821 | - $hex_guid_to_guid_str .= '-' . substr($hex_guid, 20); |
|
| 1820 | + $hex_guid_to_guid_str .= '-'.substr($hex_guid, 16, 4); |
|
| 1821 | + $hex_guid_to_guid_str .= '-'.substr($hex_guid, 20); |
|
| 1822 | 1822 | |
| 1823 | 1823 | return strtoupper($hex_guid_to_guid_str); |
| 1824 | 1824 | } |
@@ -1852,20 +1852,20 @@ discard block |
||
| 1852 | 1852 | * user. Instead we write a log message. |
| 1853 | 1853 | */ |
| 1854 | 1854 | \OC::$server->getLogger()->info( |
| 1855 | - 'Passed string does not resemble a valid GUID. Known UUID ' . |
|
| 1855 | + 'Passed string does not resemble a valid GUID. Known UUID '. |
|
| 1856 | 1856 | '({uuid}) probably does not match UUID configuration.', |
| 1857 | - [ 'app' => 'user_ldap', 'uuid' => $guid ] |
|
| 1857 | + ['app' => 'user_ldap', 'uuid' => $guid] |
|
| 1858 | 1858 | ); |
| 1859 | 1859 | return $guid; |
| 1860 | 1860 | } |
| 1861 | - for ($i=0; $i < 3; $i++) { |
|
| 1861 | + for ($i = 0; $i < 3; $i++) { |
|
| 1862 | 1862 | $pairs = str_split($blocks[$i], 2); |
| 1863 | 1863 | $pairs = array_reverse($pairs); |
| 1864 | 1864 | $blocks[$i] = implode('', $pairs); |
| 1865 | 1865 | } |
| 1866 | - for ($i=0; $i < 5; $i++) { |
|
| 1866 | + for ($i = 0; $i < 5; $i++) { |
|
| 1867 | 1867 | $pairs = str_split($blocks[$i], 2); |
| 1868 | - $blocks[$i] = '\\' . implode('\\', $pairs); |
|
| 1868 | + $blocks[$i] = '\\'.implode('\\', $pairs); |
|
| 1869 | 1869 | } |
| 1870 | 1870 | return implode('', $blocks); |
| 1871 | 1871 | } |
@@ -1946,7 +1946,7 @@ discard block |
||
| 1946 | 1946 | |
| 1947 | 1947 | foreach ($bases as $base) { |
| 1948 | 1948 | $belongsToBase = true; |
| 1949 | - if (mb_strripos($dn, $base, 0, 'UTF-8') !== (mb_strlen($dn, 'UTF-8')-mb_strlen($base, 'UTF-8'))) { |
|
| 1949 | + if (mb_strripos($dn, $base, 0, 'UTF-8') !== (mb_strlen($dn, 'UTF-8') - mb_strlen($base, 'UTF-8'))) { |
|
| 1950 | 1950 | $belongsToBase = false; |
| 1951 | 1951 | } |
| 1952 | 1952 | if ($belongsToBase) { |
@@ -1962,7 +1962,7 @@ discard block |
||
| 1962 | 1962 | * @throws ServerNotAvailableException |
| 1963 | 1963 | */ |
| 1964 | 1964 | private function abandonPagedSearch() { |
| 1965 | - if($this->lastCookie === '') { |
|
| 1965 | + if ($this->lastCookie === '') { |
|
| 1966 | 1966 | return; |
| 1967 | 1967 | } |
| 1968 | 1968 | $cr = $this->connection->getConnectionResource(); |
@@ -2033,14 +2033,14 @@ discard block |
||
| 2033 | 2033 | ] |
| 2034 | 2034 | ); |
| 2035 | 2035 | //get the cookie from the search for the previous search, required by LDAP |
| 2036 | - if(empty($this->lastCookie) && $this->lastCookie !== "0" && ($offset > 0)) { |
|
| 2036 | + if (empty($this->lastCookie) && $this->lastCookie !== "0" && ($offset > 0)) { |
|
| 2037 | 2037 | // no cookie known from a potential previous search. We need |
| 2038 | 2038 | // to start from 0 to come to the desired page. cookie value |
| 2039 | 2039 | // of '0' is valid, because 389ds |
| 2040 | 2040 | $reOffset = ($offset - $limit) < 0 ? 0 : $offset - $limit; |
| 2041 | 2041 | $this->search($filter, $base, $attr, $limit, $reOffset, true); |
| 2042 | 2042 | } |
| 2043 | - if($this->lastCookie !== '' && $offset === 0) { |
|
| 2043 | + if ($this->lastCookie !== '' && $offset === 0) { |
|
| 2044 | 2044 | //since offset = 0, this is a new search. We abandon other searches that might be ongoing. |
| 2045 | 2045 | $this->abandonPagedSearch(); |
| 2046 | 2046 | } |
@@ -2048,7 +2048,7 @@ discard block |
||
| 2048 | 2048 | 'controlPagedResult', $this->connection->getConnectionResource(), $limit, false |
| 2049 | 2049 | ); |
| 2050 | 2050 | if ($pagedSearchOK) { |
| 2051 | - \OC::$server->getLogger()->debug('Ready for a paged search',['app' => 'user_ldap']); |
|
| 2051 | + \OC::$server->getLogger()->debug('Ready for a paged search', ['app' => 'user_ldap']); |
|
| 2052 | 2052 | } |
| 2053 | 2053 | /* ++ Fixing RHDS searches with pages with zero results ++ |
| 2054 | 2054 | * We coudn't get paged searches working with our RHDS for login ($limit = 0), |
@@ -2063,7 +2063,7 @@ discard block |
||
| 2063 | 2063 | $this->abandonPagedSearch(); |
| 2064 | 2064 | // in case someone set it to 0 … use 500, otherwise no results will |
| 2065 | 2065 | // be returned. |
| 2066 | - $pageSize = (int)$this->connection->ldapPagingSize > 0 ? (int)$this->connection->ldapPagingSize : 500; |
|
| 2066 | + $pageSize = (int) $this->connection->ldapPagingSize > 0 ? (int) $this->connection->ldapPagingSize : 500; |
|
| 2067 | 2067 | $pagedSearchOK = $this->invokeLDAPMethod('controlPagedResult', |
| 2068 | 2068 | $this->connection->getConnectionResource(), |
| 2069 | 2069 | $pageSize, false); |
@@ -6,67 +6,67 @@ |
||
| 6 | 6 | $baseDir = $vendorDir; |
| 7 | 7 | |
| 8 | 8 | return array( |
| 9 | - 'OCA\\User_LDAP\\Access' => $baseDir . '/../lib/Access.php', |
|
| 10 | - 'OCA\\User_LDAP\\AccessFactory' => $baseDir . '/../lib/AccessFactory.php', |
|
| 11 | - 'OCA\\User_LDAP\\AppInfo\\Application' => $baseDir . '/../lib/AppInfo/Application.php', |
|
| 12 | - 'OCA\\User_LDAP\\BackendUtility' => $baseDir . '/../lib/BackendUtility.php', |
|
| 13 | - 'OCA\\User_LDAP\\Command\\CheckUser' => $baseDir . '/../lib/Command/CheckUser.php', |
|
| 14 | - 'OCA\\User_LDAP\\Command\\CreateEmptyConfig' => $baseDir . '/../lib/Command/CreateEmptyConfig.php', |
|
| 15 | - 'OCA\\User_LDAP\\Command\\DeleteConfig' => $baseDir . '/../lib/Command/DeleteConfig.php', |
|
| 16 | - 'OCA\\User_LDAP\\Command\\Search' => $baseDir . '/../lib/Command/Search.php', |
|
| 17 | - 'OCA\\User_LDAP\\Command\\SetConfig' => $baseDir . '/../lib/Command/SetConfig.php', |
|
| 18 | - 'OCA\\User_LDAP\\Command\\ShowConfig' => $baseDir . '/../lib/Command/ShowConfig.php', |
|
| 19 | - 'OCA\\User_LDAP\\Command\\ShowRemnants' => $baseDir . '/../lib/Command/ShowRemnants.php', |
|
| 20 | - 'OCA\\User_LDAP\\Command\\TestConfig' => $baseDir . '/../lib/Command/TestConfig.php', |
|
| 21 | - 'OCA\\User_LDAP\\Configuration' => $baseDir . '/../lib/Configuration.php', |
|
| 22 | - 'OCA\\User_LDAP\\Connection' => $baseDir . '/../lib/Connection.php', |
|
| 23 | - 'OCA\\User_LDAP\\ConnectionFactory' => $baseDir . '/../lib/ConnectionFactory.php', |
|
| 24 | - 'OCA\\User_LDAP\\Controller\\ConfigAPIController' => $baseDir . '/../lib/Controller/ConfigAPIController.php', |
|
| 25 | - 'OCA\\User_LDAP\\Controller\\RenewPasswordController' => $baseDir . '/../lib/Controller/RenewPasswordController.php', |
|
| 26 | - 'OCA\\User_LDAP\\Exceptions\\AttributeNotSet' => $baseDir . '/../lib/Exceptions/AttributeNotSet.php', |
|
| 27 | - 'OCA\\User_LDAP\\Exceptions\\ConstraintViolationException' => $baseDir . '/../lib/Exceptions/ConstraintViolationException.php', |
|
| 28 | - 'OCA\\User_LDAP\\Exceptions\\NotOnLDAP' => $baseDir . '/../lib/Exceptions/NotOnLDAP.php', |
|
| 29 | - 'OCA\\User_LDAP\\FilesystemHelper' => $baseDir . '/../lib/FilesystemHelper.php', |
|
| 30 | - 'OCA\\User_LDAP\\GroupPluginManager' => $baseDir . '/../lib/GroupPluginManager.php', |
|
| 31 | - 'OCA\\User_LDAP\\Group_LDAP' => $baseDir . '/../lib/Group_LDAP.php', |
|
| 32 | - 'OCA\\User_LDAP\\Group_Proxy' => $baseDir . '/../lib/Group_Proxy.php', |
|
| 33 | - 'OCA\\User_LDAP\\Handler\\ExtStorageConfigHandler' => $baseDir . '/../lib/Handler/ExtStorageConfigHandler.php', |
|
| 34 | - 'OCA\\User_LDAP\\Helper' => $baseDir . '/../lib/Helper.php', |
|
| 35 | - 'OCA\\User_LDAP\\IGroupLDAP' => $baseDir . '/../lib/IGroupLDAP.php', |
|
| 36 | - 'OCA\\User_LDAP\\ILDAPGroupPlugin' => $baseDir . '/../lib/ILDAPGroupPlugin.php', |
|
| 37 | - 'OCA\\User_LDAP\\ILDAPUserPlugin' => $baseDir . '/../lib/ILDAPUserPlugin.php', |
|
| 38 | - 'OCA\\User_LDAP\\ILDAPWrapper' => $baseDir . '/../lib/ILDAPWrapper.php', |
|
| 39 | - 'OCA\\User_LDAP\\IUserLDAP' => $baseDir . '/../lib/IUserLDAP.php', |
|
| 40 | - 'OCA\\User_LDAP\\Jobs\\CleanUp' => $baseDir . '/../lib/Jobs/CleanUp.php', |
|
| 41 | - 'OCA\\User_LDAP\\Jobs\\Sync' => $baseDir . '/../lib/Jobs/Sync.php', |
|
| 42 | - 'OCA\\User_LDAP\\Jobs\\UpdateGroups' => $baseDir . '/../lib/Jobs/UpdateGroups.php', |
|
| 43 | - 'OCA\\User_LDAP\\LDAP' => $baseDir . '/../lib/LDAP.php', |
|
| 44 | - 'OCA\\User_LDAP\\LDAPProvider' => $baseDir . '/../lib/LDAPProvider.php', |
|
| 45 | - 'OCA\\User_LDAP\\LDAPProviderFactory' => $baseDir . '/../lib/LDAPProviderFactory.php', |
|
| 46 | - 'OCA\\User_LDAP\\LDAPUtility' => $baseDir . '/../lib/LDAPUtility.php', |
|
| 47 | - 'OCA\\User_LDAP\\LogWrapper' => $baseDir . '/../lib/LogWrapper.php', |
|
| 48 | - 'OCA\\User_LDAP\\Mapping\\AbstractMapping' => $baseDir . '/../lib/Mapping/AbstractMapping.php', |
|
| 49 | - 'OCA\\User_LDAP\\Mapping\\GroupMapping' => $baseDir . '/../lib/Mapping/GroupMapping.php', |
|
| 50 | - 'OCA\\User_LDAP\\Mapping\\UserMapping' => $baseDir . '/../lib/Mapping/UserMapping.php', |
|
| 51 | - 'OCA\\User_LDAP\\Migration\\UUIDFix' => $baseDir . '/../lib/Migration/UUIDFix.php', |
|
| 52 | - 'OCA\\User_LDAP\\Migration\\UUIDFixGroup' => $baseDir . '/../lib/Migration/UUIDFixGroup.php', |
|
| 53 | - 'OCA\\User_LDAP\\Migration\\UUIDFixInsert' => $baseDir . '/../lib/Migration/UUIDFixInsert.php', |
|
| 54 | - 'OCA\\User_LDAP\\Migration\\UUIDFixUser' => $baseDir . '/../lib/Migration/UUIDFixUser.php', |
|
| 55 | - 'OCA\\User_LDAP\\Notification\\Notifier' => $baseDir . '/../lib/Notification/Notifier.php', |
|
| 56 | - 'OCA\\User_LDAP\\PagedResults\\IAdapter' => $baseDir . '/../lib/PagedResults/IAdapter.php', |
|
| 57 | - 'OCA\\User_LDAP\\PagedResults\\Php54' => $baseDir . '/../lib/PagedResults/Php54.php', |
|
| 58 | - 'OCA\\User_LDAP\\PagedResults\\Php73' => $baseDir . '/../lib/PagedResults/Php73.php', |
|
| 59 | - 'OCA\\User_LDAP\\PagedResults\\TLinkId' => $baseDir . '/../lib/PagedResults/TLinkId.php', |
|
| 60 | - 'OCA\\User_LDAP\\Proxy' => $baseDir . '/../lib/Proxy.php', |
|
| 61 | - 'OCA\\User_LDAP\\Settings\\Admin' => $baseDir . '/../lib/Settings/Admin.php', |
|
| 62 | - 'OCA\\User_LDAP\\Settings\\Section' => $baseDir . '/../lib/Settings/Section.php', |
|
| 63 | - 'OCA\\User_LDAP\\UserPluginManager' => $baseDir . '/../lib/UserPluginManager.php', |
|
| 64 | - 'OCA\\User_LDAP\\User\\DeletedUsersIndex' => $baseDir . '/../lib/User/DeletedUsersIndex.php', |
|
| 65 | - 'OCA\\User_LDAP\\User\\Manager' => $baseDir . '/../lib/User/Manager.php', |
|
| 66 | - 'OCA\\User_LDAP\\User\\OfflineUser' => $baseDir . '/../lib/User/OfflineUser.php', |
|
| 67 | - 'OCA\\User_LDAP\\User\\User' => $baseDir . '/../lib/User/User.php', |
|
| 68 | - 'OCA\\User_LDAP\\User_LDAP' => $baseDir . '/../lib/User_LDAP.php', |
|
| 69 | - 'OCA\\User_LDAP\\User_Proxy' => $baseDir . '/../lib/User_Proxy.php', |
|
| 70 | - 'OCA\\User_LDAP\\Wizard' => $baseDir . '/../lib/Wizard.php', |
|
| 71 | - 'OCA\\User_LDAP\\WizardResult' => $baseDir . '/../lib/WizardResult.php', |
|
| 9 | + 'OCA\\User_LDAP\\Access' => $baseDir.'/../lib/Access.php', |
|
| 10 | + 'OCA\\User_LDAP\\AccessFactory' => $baseDir.'/../lib/AccessFactory.php', |
|
| 11 | + 'OCA\\User_LDAP\\AppInfo\\Application' => $baseDir.'/../lib/AppInfo/Application.php', |
|
| 12 | + 'OCA\\User_LDAP\\BackendUtility' => $baseDir.'/../lib/BackendUtility.php', |
|
| 13 | + 'OCA\\User_LDAP\\Command\\CheckUser' => $baseDir.'/../lib/Command/CheckUser.php', |
|
| 14 | + 'OCA\\User_LDAP\\Command\\CreateEmptyConfig' => $baseDir.'/../lib/Command/CreateEmptyConfig.php', |
|
| 15 | + 'OCA\\User_LDAP\\Command\\DeleteConfig' => $baseDir.'/../lib/Command/DeleteConfig.php', |
|
| 16 | + 'OCA\\User_LDAP\\Command\\Search' => $baseDir.'/../lib/Command/Search.php', |
|
| 17 | + 'OCA\\User_LDAP\\Command\\SetConfig' => $baseDir.'/../lib/Command/SetConfig.php', |
|
| 18 | + 'OCA\\User_LDAP\\Command\\ShowConfig' => $baseDir.'/../lib/Command/ShowConfig.php', |
|
| 19 | + 'OCA\\User_LDAP\\Command\\ShowRemnants' => $baseDir.'/../lib/Command/ShowRemnants.php', |
|
| 20 | + 'OCA\\User_LDAP\\Command\\TestConfig' => $baseDir.'/../lib/Command/TestConfig.php', |
|
| 21 | + 'OCA\\User_LDAP\\Configuration' => $baseDir.'/../lib/Configuration.php', |
|
| 22 | + 'OCA\\User_LDAP\\Connection' => $baseDir.'/../lib/Connection.php', |
|
| 23 | + 'OCA\\User_LDAP\\ConnectionFactory' => $baseDir.'/../lib/ConnectionFactory.php', |
|
| 24 | + 'OCA\\User_LDAP\\Controller\\ConfigAPIController' => $baseDir.'/../lib/Controller/ConfigAPIController.php', |
|
| 25 | + 'OCA\\User_LDAP\\Controller\\RenewPasswordController' => $baseDir.'/../lib/Controller/RenewPasswordController.php', |
|
| 26 | + 'OCA\\User_LDAP\\Exceptions\\AttributeNotSet' => $baseDir.'/../lib/Exceptions/AttributeNotSet.php', |
|
| 27 | + 'OCA\\User_LDAP\\Exceptions\\ConstraintViolationException' => $baseDir.'/../lib/Exceptions/ConstraintViolationException.php', |
|
| 28 | + 'OCA\\User_LDAP\\Exceptions\\NotOnLDAP' => $baseDir.'/../lib/Exceptions/NotOnLDAP.php', |
|
| 29 | + 'OCA\\User_LDAP\\FilesystemHelper' => $baseDir.'/../lib/FilesystemHelper.php', |
|
| 30 | + 'OCA\\User_LDAP\\GroupPluginManager' => $baseDir.'/../lib/GroupPluginManager.php', |
|
| 31 | + 'OCA\\User_LDAP\\Group_LDAP' => $baseDir.'/../lib/Group_LDAP.php', |
|
| 32 | + 'OCA\\User_LDAP\\Group_Proxy' => $baseDir.'/../lib/Group_Proxy.php', |
|
| 33 | + 'OCA\\User_LDAP\\Handler\\ExtStorageConfigHandler' => $baseDir.'/../lib/Handler/ExtStorageConfigHandler.php', |
|
| 34 | + 'OCA\\User_LDAP\\Helper' => $baseDir.'/../lib/Helper.php', |
|
| 35 | + 'OCA\\User_LDAP\\IGroupLDAP' => $baseDir.'/../lib/IGroupLDAP.php', |
|
| 36 | + 'OCA\\User_LDAP\\ILDAPGroupPlugin' => $baseDir.'/../lib/ILDAPGroupPlugin.php', |
|
| 37 | + 'OCA\\User_LDAP\\ILDAPUserPlugin' => $baseDir.'/../lib/ILDAPUserPlugin.php', |
|
| 38 | + 'OCA\\User_LDAP\\ILDAPWrapper' => $baseDir.'/../lib/ILDAPWrapper.php', |
|
| 39 | + 'OCA\\User_LDAP\\IUserLDAP' => $baseDir.'/../lib/IUserLDAP.php', |
|
| 40 | + 'OCA\\User_LDAP\\Jobs\\CleanUp' => $baseDir.'/../lib/Jobs/CleanUp.php', |
|
| 41 | + 'OCA\\User_LDAP\\Jobs\\Sync' => $baseDir.'/../lib/Jobs/Sync.php', |
|
| 42 | + 'OCA\\User_LDAP\\Jobs\\UpdateGroups' => $baseDir.'/../lib/Jobs/UpdateGroups.php', |
|
| 43 | + 'OCA\\User_LDAP\\LDAP' => $baseDir.'/../lib/LDAP.php', |
|
| 44 | + 'OCA\\User_LDAP\\LDAPProvider' => $baseDir.'/../lib/LDAPProvider.php', |
|
| 45 | + 'OCA\\User_LDAP\\LDAPProviderFactory' => $baseDir.'/../lib/LDAPProviderFactory.php', |
|
| 46 | + 'OCA\\User_LDAP\\LDAPUtility' => $baseDir.'/../lib/LDAPUtility.php', |
|
| 47 | + 'OCA\\User_LDAP\\LogWrapper' => $baseDir.'/../lib/LogWrapper.php', |
|
| 48 | + 'OCA\\User_LDAP\\Mapping\\AbstractMapping' => $baseDir.'/../lib/Mapping/AbstractMapping.php', |
|
| 49 | + 'OCA\\User_LDAP\\Mapping\\GroupMapping' => $baseDir.'/../lib/Mapping/GroupMapping.php', |
|
| 50 | + 'OCA\\User_LDAP\\Mapping\\UserMapping' => $baseDir.'/../lib/Mapping/UserMapping.php', |
|
| 51 | + 'OCA\\User_LDAP\\Migration\\UUIDFix' => $baseDir.'/../lib/Migration/UUIDFix.php', |
|
| 52 | + 'OCA\\User_LDAP\\Migration\\UUIDFixGroup' => $baseDir.'/../lib/Migration/UUIDFixGroup.php', |
|
| 53 | + 'OCA\\User_LDAP\\Migration\\UUIDFixInsert' => $baseDir.'/../lib/Migration/UUIDFixInsert.php', |
|
| 54 | + 'OCA\\User_LDAP\\Migration\\UUIDFixUser' => $baseDir.'/../lib/Migration/UUIDFixUser.php', |
|
| 55 | + 'OCA\\User_LDAP\\Notification\\Notifier' => $baseDir.'/../lib/Notification/Notifier.php', |
|
| 56 | + 'OCA\\User_LDAP\\PagedResults\\IAdapter' => $baseDir.'/../lib/PagedResults/IAdapter.php', |
|
| 57 | + 'OCA\\User_LDAP\\PagedResults\\Php54' => $baseDir.'/../lib/PagedResults/Php54.php', |
|
| 58 | + 'OCA\\User_LDAP\\PagedResults\\Php73' => $baseDir.'/../lib/PagedResults/Php73.php', |
|
| 59 | + 'OCA\\User_LDAP\\PagedResults\\TLinkId' => $baseDir.'/../lib/PagedResults/TLinkId.php', |
|
| 60 | + 'OCA\\User_LDAP\\Proxy' => $baseDir.'/../lib/Proxy.php', |
|
| 61 | + 'OCA\\User_LDAP\\Settings\\Admin' => $baseDir.'/../lib/Settings/Admin.php', |
|
| 62 | + 'OCA\\User_LDAP\\Settings\\Section' => $baseDir.'/../lib/Settings/Section.php', |
|
| 63 | + 'OCA\\User_LDAP\\UserPluginManager' => $baseDir.'/../lib/UserPluginManager.php', |
|
| 64 | + 'OCA\\User_LDAP\\User\\DeletedUsersIndex' => $baseDir.'/../lib/User/DeletedUsersIndex.php', |
|
| 65 | + 'OCA\\User_LDAP\\User\\Manager' => $baseDir.'/../lib/User/Manager.php', |
|
| 66 | + 'OCA\\User_LDAP\\User\\OfflineUser' => $baseDir.'/../lib/User/OfflineUser.php', |
|
| 67 | + 'OCA\\User_LDAP\\User\\User' => $baseDir.'/../lib/User/User.php', |
|
| 68 | + 'OCA\\User_LDAP\\User_LDAP' => $baseDir.'/../lib/User_LDAP.php', |
|
| 69 | + 'OCA\\User_LDAP\\User_Proxy' => $baseDir.'/../lib/User_Proxy.php', |
|
| 70 | + 'OCA\\User_LDAP\\Wizard' => $baseDir.'/../lib/Wizard.php', |
|
| 71 | + 'OCA\\User_LDAP\\WizardResult' => $baseDir.'/../lib/WizardResult.php', |
|
| 72 | 72 | ); |
@@ -6,89 +6,89 @@ |
||
| 6 | 6 | |
| 7 | 7 | class ComposerStaticInitUser_LDAP |
| 8 | 8 | { |
| 9 | - public static $prefixLengthsPsr4 = array ( |
|
| 9 | + public static $prefixLengthsPsr4 = array( |
|
| 10 | 10 | 'O' => |
| 11 | - array ( |
|
| 11 | + array( |
|
| 12 | 12 | 'OCA\\User_LDAP\\' => 14, |
| 13 | 13 | ), |
| 14 | 14 | ); |
| 15 | 15 | |
| 16 | - public static $prefixDirsPsr4 = array ( |
|
| 16 | + public static $prefixDirsPsr4 = array( |
|
| 17 | 17 | 'OCA\\User_LDAP\\' => |
| 18 | - array ( |
|
| 19 | - 0 => __DIR__ . '/..' . '/../lib', |
|
| 18 | + array( |
|
| 19 | + 0 => __DIR__.'/..'.'/../lib', |
|
| 20 | 20 | ), |
| 21 | 21 | ); |
| 22 | 22 | |
| 23 | - public static $classMap = array ( |
|
| 24 | - 'OCA\\User_LDAP\\Access' => __DIR__ . '/..' . '/../lib/Access.php', |
|
| 25 | - 'OCA\\User_LDAP\\AccessFactory' => __DIR__ . '/..' . '/../lib/AccessFactory.php', |
|
| 26 | - 'OCA\\User_LDAP\\AppInfo\\Application' => __DIR__ . '/..' . '/../lib/AppInfo/Application.php', |
|
| 27 | - 'OCA\\User_LDAP\\BackendUtility' => __DIR__ . '/..' . '/../lib/BackendUtility.php', |
|
| 28 | - 'OCA\\User_LDAP\\Command\\CheckUser' => __DIR__ . '/..' . '/../lib/Command/CheckUser.php', |
|
| 29 | - 'OCA\\User_LDAP\\Command\\CreateEmptyConfig' => __DIR__ . '/..' . '/../lib/Command/CreateEmptyConfig.php', |
|
| 30 | - 'OCA\\User_LDAP\\Command\\DeleteConfig' => __DIR__ . '/..' . '/../lib/Command/DeleteConfig.php', |
|
| 31 | - 'OCA\\User_LDAP\\Command\\Search' => __DIR__ . '/..' . '/../lib/Command/Search.php', |
|
| 32 | - 'OCA\\User_LDAP\\Command\\SetConfig' => __DIR__ . '/..' . '/../lib/Command/SetConfig.php', |
|
| 33 | - 'OCA\\User_LDAP\\Command\\ShowConfig' => __DIR__ . '/..' . '/../lib/Command/ShowConfig.php', |
|
| 34 | - 'OCA\\User_LDAP\\Command\\ShowRemnants' => __DIR__ . '/..' . '/../lib/Command/ShowRemnants.php', |
|
| 35 | - 'OCA\\User_LDAP\\Command\\TestConfig' => __DIR__ . '/..' . '/../lib/Command/TestConfig.php', |
|
| 36 | - 'OCA\\User_LDAP\\Configuration' => __DIR__ . '/..' . '/../lib/Configuration.php', |
|
| 37 | - 'OCA\\User_LDAP\\Connection' => __DIR__ . '/..' . '/../lib/Connection.php', |
|
| 38 | - 'OCA\\User_LDAP\\ConnectionFactory' => __DIR__ . '/..' . '/../lib/ConnectionFactory.php', |
|
| 39 | - 'OCA\\User_LDAP\\Controller\\ConfigAPIController' => __DIR__ . '/..' . '/../lib/Controller/ConfigAPIController.php', |
|
| 40 | - 'OCA\\User_LDAP\\Controller\\RenewPasswordController' => __DIR__ . '/..' . '/../lib/Controller/RenewPasswordController.php', |
|
| 41 | - 'OCA\\User_LDAP\\Exceptions\\AttributeNotSet' => __DIR__ . '/..' . '/../lib/Exceptions/AttributeNotSet.php', |
|
| 42 | - 'OCA\\User_LDAP\\Exceptions\\ConstraintViolationException' => __DIR__ . '/..' . '/../lib/Exceptions/ConstraintViolationException.php', |
|
| 43 | - 'OCA\\User_LDAP\\Exceptions\\NotOnLDAP' => __DIR__ . '/..' . '/../lib/Exceptions/NotOnLDAP.php', |
|
| 44 | - 'OCA\\User_LDAP\\FilesystemHelper' => __DIR__ . '/..' . '/../lib/FilesystemHelper.php', |
|
| 45 | - 'OCA\\User_LDAP\\GroupPluginManager' => __DIR__ . '/..' . '/../lib/GroupPluginManager.php', |
|
| 46 | - 'OCA\\User_LDAP\\Group_LDAP' => __DIR__ . '/..' . '/../lib/Group_LDAP.php', |
|
| 47 | - 'OCA\\User_LDAP\\Group_Proxy' => __DIR__ . '/..' . '/../lib/Group_Proxy.php', |
|
| 48 | - 'OCA\\User_LDAP\\Handler\\ExtStorageConfigHandler' => __DIR__ . '/..' . '/../lib/Handler/ExtStorageConfigHandler.php', |
|
| 49 | - 'OCA\\User_LDAP\\Helper' => __DIR__ . '/..' . '/../lib/Helper.php', |
|
| 50 | - 'OCA\\User_LDAP\\IGroupLDAP' => __DIR__ . '/..' . '/../lib/IGroupLDAP.php', |
|
| 51 | - 'OCA\\User_LDAP\\ILDAPGroupPlugin' => __DIR__ . '/..' . '/../lib/ILDAPGroupPlugin.php', |
|
| 52 | - 'OCA\\User_LDAP\\ILDAPUserPlugin' => __DIR__ . '/..' . '/../lib/ILDAPUserPlugin.php', |
|
| 53 | - 'OCA\\User_LDAP\\ILDAPWrapper' => __DIR__ . '/..' . '/../lib/ILDAPWrapper.php', |
|
| 54 | - 'OCA\\User_LDAP\\IUserLDAP' => __DIR__ . '/..' . '/../lib/IUserLDAP.php', |
|
| 55 | - 'OCA\\User_LDAP\\Jobs\\CleanUp' => __DIR__ . '/..' . '/../lib/Jobs/CleanUp.php', |
|
| 56 | - 'OCA\\User_LDAP\\Jobs\\Sync' => __DIR__ . '/..' . '/../lib/Jobs/Sync.php', |
|
| 57 | - 'OCA\\User_LDAP\\Jobs\\UpdateGroups' => __DIR__ . '/..' . '/../lib/Jobs/UpdateGroups.php', |
|
| 58 | - 'OCA\\User_LDAP\\LDAP' => __DIR__ . '/..' . '/../lib/LDAP.php', |
|
| 59 | - 'OCA\\User_LDAP\\LDAPProvider' => __DIR__ . '/..' . '/../lib/LDAPProvider.php', |
|
| 60 | - 'OCA\\User_LDAP\\LDAPProviderFactory' => __DIR__ . '/..' . '/../lib/LDAPProviderFactory.php', |
|
| 61 | - 'OCA\\User_LDAP\\LDAPUtility' => __DIR__ . '/..' . '/../lib/LDAPUtility.php', |
|
| 62 | - 'OCA\\User_LDAP\\LogWrapper' => __DIR__ . '/..' . '/../lib/LogWrapper.php', |
|
| 63 | - 'OCA\\User_LDAP\\Mapping\\AbstractMapping' => __DIR__ . '/..' . '/../lib/Mapping/AbstractMapping.php', |
|
| 64 | - 'OCA\\User_LDAP\\Mapping\\GroupMapping' => __DIR__ . '/..' . '/../lib/Mapping/GroupMapping.php', |
|
| 65 | - 'OCA\\User_LDAP\\Mapping\\UserMapping' => __DIR__ . '/..' . '/../lib/Mapping/UserMapping.php', |
|
| 66 | - 'OCA\\User_LDAP\\Migration\\UUIDFix' => __DIR__ . '/..' . '/../lib/Migration/UUIDFix.php', |
|
| 67 | - 'OCA\\User_LDAP\\Migration\\UUIDFixGroup' => __DIR__ . '/..' . '/../lib/Migration/UUIDFixGroup.php', |
|
| 68 | - 'OCA\\User_LDAP\\Migration\\UUIDFixInsert' => __DIR__ . '/..' . '/../lib/Migration/UUIDFixInsert.php', |
|
| 69 | - 'OCA\\User_LDAP\\Migration\\UUIDFixUser' => __DIR__ . '/..' . '/../lib/Migration/UUIDFixUser.php', |
|
| 70 | - 'OCA\\User_LDAP\\Notification\\Notifier' => __DIR__ . '/..' . '/../lib/Notification/Notifier.php', |
|
| 71 | - 'OCA\\User_LDAP\\PagedResults\\IAdapter' => __DIR__ . '/..' . '/../lib/PagedResults/IAdapter.php', |
|
| 72 | - 'OCA\\User_LDAP\\PagedResults\\Php54' => __DIR__ . '/..' . '/../lib/PagedResults/Php54.php', |
|
| 73 | - 'OCA\\User_LDAP\\PagedResults\\Php73' => __DIR__ . '/..' . '/../lib/PagedResults/Php73.php', |
|
| 74 | - 'OCA\\User_LDAP\\PagedResults\\TLinkId' => __DIR__ . '/..' . '/../lib/PagedResults/TLinkId.php', |
|
| 75 | - 'OCA\\User_LDAP\\Proxy' => __DIR__ . '/..' . '/../lib/Proxy.php', |
|
| 76 | - 'OCA\\User_LDAP\\Settings\\Admin' => __DIR__ . '/..' . '/../lib/Settings/Admin.php', |
|
| 77 | - 'OCA\\User_LDAP\\Settings\\Section' => __DIR__ . '/..' . '/../lib/Settings/Section.php', |
|
| 78 | - 'OCA\\User_LDAP\\UserPluginManager' => __DIR__ . '/..' . '/../lib/UserPluginManager.php', |
|
| 79 | - 'OCA\\User_LDAP\\User\\DeletedUsersIndex' => __DIR__ . '/..' . '/../lib/User/DeletedUsersIndex.php', |
|
| 80 | - 'OCA\\User_LDAP\\User\\Manager' => __DIR__ . '/..' . '/../lib/User/Manager.php', |
|
| 81 | - 'OCA\\User_LDAP\\User\\OfflineUser' => __DIR__ . '/..' . '/../lib/User/OfflineUser.php', |
|
| 82 | - 'OCA\\User_LDAP\\User\\User' => __DIR__ . '/..' . '/../lib/User/User.php', |
|
| 83 | - 'OCA\\User_LDAP\\User_LDAP' => __DIR__ . '/..' . '/../lib/User_LDAP.php', |
|
| 84 | - 'OCA\\User_LDAP\\User_Proxy' => __DIR__ . '/..' . '/../lib/User_Proxy.php', |
|
| 85 | - 'OCA\\User_LDAP\\Wizard' => __DIR__ . '/..' . '/../lib/Wizard.php', |
|
| 86 | - 'OCA\\User_LDAP\\WizardResult' => __DIR__ . '/..' . '/../lib/WizardResult.php', |
|
| 23 | + public static $classMap = array( |
|
| 24 | + 'OCA\\User_LDAP\\Access' => __DIR__.'/..'.'/../lib/Access.php', |
|
| 25 | + 'OCA\\User_LDAP\\AccessFactory' => __DIR__.'/..'.'/../lib/AccessFactory.php', |
|
| 26 | + 'OCA\\User_LDAP\\AppInfo\\Application' => __DIR__.'/..'.'/../lib/AppInfo/Application.php', |
|
| 27 | + 'OCA\\User_LDAP\\BackendUtility' => __DIR__.'/..'.'/../lib/BackendUtility.php', |
|
| 28 | + 'OCA\\User_LDAP\\Command\\CheckUser' => __DIR__.'/..'.'/../lib/Command/CheckUser.php', |
|
| 29 | + 'OCA\\User_LDAP\\Command\\CreateEmptyConfig' => __DIR__.'/..'.'/../lib/Command/CreateEmptyConfig.php', |
|
| 30 | + 'OCA\\User_LDAP\\Command\\DeleteConfig' => __DIR__.'/..'.'/../lib/Command/DeleteConfig.php', |
|
| 31 | + 'OCA\\User_LDAP\\Command\\Search' => __DIR__.'/..'.'/../lib/Command/Search.php', |
|
| 32 | + 'OCA\\User_LDAP\\Command\\SetConfig' => __DIR__.'/..'.'/../lib/Command/SetConfig.php', |
|
| 33 | + 'OCA\\User_LDAP\\Command\\ShowConfig' => __DIR__.'/..'.'/../lib/Command/ShowConfig.php', |
|
| 34 | + 'OCA\\User_LDAP\\Command\\ShowRemnants' => __DIR__.'/..'.'/../lib/Command/ShowRemnants.php', |
|
| 35 | + 'OCA\\User_LDAP\\Command\\TestConfig' => __DIR__.'/..'.'/../lib/Command/TestConfig.php', |
|
| 36 | + 'OCA\\User_LDAP\\Configuration' => __DIR__.'/..'.'/../lib/Configuration.php', |
|
| 37 | + 'OCA\\User_LDAP\\Connection' => __DIR__.'/..'.'/../lib/Connection.php', |
|
| 38 | + 'OCA\\User_LDAP\\ConnectionFactory' => __DIR__.'/..'.'/../lib/ConnectionFactory.php', |
|
| 39 | + 'OCA\\User_LDAP\\Controller\\ConfigAPIController' => __DIR__.'/..'.'/../lib/Controller/ConfigAPIController.php', |
|
| 40 | + 'OCA\\User_LDAP\\Controller\\RenewPasswordController' => __DIR__.'/..'.'/../lib/Controller/RenewPasswordController.php', |
|
| 41 | + 'OCA\\User_LDAP\\Exceptions\\AttributeNotSet' => __DIR__.'/..'.'/../lib/Exceptions/AttributeNotSet.php', |
|
| 42 | + 'OCA\\User_LDAP\\Exceptions\\ConstraintViolationException' => __DIR__.'/..'.'/../lib/Exceptions/ConstraintViolationException.php', |
|
| 43 | + 'OCA\\User_LDAP\\Exceptions\\NotOnLDAP' => __DIR__.'/..'.'/../lib/Exceptions/NotOnLDAP.php', |
|
| 44 | + 'OCA\\User_LDAP\\FilesystemHelper' => __DIR__.'/..'.'/../lib/FilesystemHelper.php', |
|
| 45 | + 'OCA\\User_LDAP\\GroupPluginManager' => __DIR__.'/..'.'/../lib/GroupPluginManager.php', |
|
| 46 | + 'OCA\\User_LDAP\\Group_LDAP' => __DIR__.'/..'.'/../lib/Group_LDAP.php', |
|
| 47 | + 'OCA\\User_LDAP\\Group_Proxy' => __DIR__.'/..'.'/../lib/Group_Proxy.php', |
|
| 48 | + 'OCA\\User_LDAP\\Handler\\ExtStorageConfigHandler' => __DIR__.'/..'.'/../lib/Handler/ExtStorageConfigHandler.php', |
|
| 49 | + 'OCA\\User_LDAP\\Helper' => __DIR__.'/..'.'/../lib/Helper.php', |
|
| 50 | + 'OCA\\User_LDAP\\IGroupLDAP' => __DIR__.'/..'.'/../lib/IGroupLDAP.php', |
|
| 51 | + 'OCA\\User_LDAP\\ILDAPGroupPlugin' => __DIR__.'/..'.'/../lib/ILDAPGroupPlugin.php', |
|
| 52 | + 'OCA\\User_LDAP\\ILDAPUserPlugin' => __DIR__.'/..'.'/../lib/ILDAPUserPlugin.php', |
|
| 53 | + 'OCA\\User_LDAP\\ILDAPWrapper' => __DIR__.'/..'.'/../lib/ILDAPWrapper.php', |
|
| 54 | + 'OCA\\User_LDAP\\IUserLDAP' => __DIR__.'/..'.'/../lib/IUserLDAP.php', |
|
| 55 | + 'OCA\\User_LDAP\\Jobs\\CleanUp' => __DIR__.'/..'.'/../lib/Jobs/CleanUp.php', |
|
| 56 | + 'OCA\\User_LDAP\\Jobs\\Sync' => __DIR__.'/..'.'/../lib/Jobs/Sync.php', |
|
| 57 | + 'OCA\\User_LDAP\\Jobs\\UpdateGroups' => __DIR__.'/..'.'/../lib/Jobs/UpdateGroups.php', |
|
| 58 | + 'OCA\\User_LDAP\\LDAP' => __DIR__.'/..'.'/../lib/LDAP.php', |
|
| 59 | + 'OCA\\User_LDAP\\LDAPProvider' => __DIR__.'/..'.'/../lib/LDAPProvider.php', |
|
| 60 | + 'OCA\\User_LDAP\\LDAPProviderFactory' => __DIR__.'/..'.'/../lib/LDAPProviderFactory.php', |
|
| 61 | + 'OCA\\User_LDAP\\LDAPUtility' => __DIR__.'/..'.'/../lib/LDAPUtility.php', |
|
| 62 | + 'OCA\\User_LDAP\\LogWrapper' => __DIR__.'/..'.'/../lib/LogWrapper.php', |
|
| 63 | + 'OCA\\User_LDAP\\Mapping\\AbstractMapping' => __DIR__.'/..'.'/../lib/Mapping/AbstractMapping.php', |
|
| 64 | + 'OCA\\User_LDAP\\Mapping\\GroupMapping' => __DIR__.'/..'.'/../lib/Mapping/GroupMapping.php', |
|
| 65 | + 'OCA\\User_LDAP\\Mapping\\UserMapping' => __DIR__.'/..'.'/../lib/Mapping/UserMapping.php', |
|
| 66 | + 'OCA\\User_LDAP\\Migration\\UUIDFix' => __DIR__.'/..'.'/../lib/Migration/UUIDFix.php', |
|
| 67 | + 'OCA\\User_LDAP\\Migration\\UUIDFixGroup' => __DIR__.'/..'.'/../lib/Migration/UUIDFixGroup.php', |
|
| 68 | + 'OCA\\User_LDAP\\Migration\\UUIDFixInsert' => __DIR__.'/..'.'/../lib/Migration/UUIDFixInsert.php', |
|
| 69 | + 'OCA\\User_LDAP\\Migration\\UUIDFixUser' => __DIR__.'/..'.'/../lib/Migration/UUIDFixUser.php', |
|
| 70 | + 'OCA\\User_LDAP\\Notification\\Notifier' => __DIR__.'/..'.'/../lib/Notification/Notifier.php', |
|
| 71 | + 'OCA\\User_LDAP\\PagedResults\\IAdapter' => __DIR__.'/..'.'/../lib/PagedResults/IAdapter.php', |
|
| 72 | + 'OCA\\User_LDAP\\PagedResults\\Php54' => __DIR__.'/..'.'/../lib/PagedResults/Php54.php', |
|
| 73 | + 'OCA\\User_LDAP\\PagedResults\\Php73' => __DIR__.'/..'.'/../lib/PagedResults/Php73.php', |
|
| 74 | + 'OCA\\User_LDAP\\PagedResults\\TLinkId' => __DIR__.'/..'.'/../lib/PagedResults/TLinkId.php', |
|
| 75 | + 'OCA\\User_LDAP\\Proxy' => __DIR__.'/..'.'/../lib/Proxy.php', |
|
| 76 | + 'OCA\\User_LDAP\\Settings\\Admin' => __DIR__.'/..'.'/../lib/Settings/Admin.php', |
|
| 77 | + 'OCA\\User_LDAP\\Settings\\Section' => __DIR__.'/..'.'/../lib/Settings/Section.php', |
|
| 78 | + 'OCA\\User_LDAP\\UserPluginManager' => __DIR__.'/..'.'/../lib/UserPluginManager.php', |
|
| 79 | + 'OCA\\User_LDAP\\User\\DeletedUsersIndex' => __DIR__.'/..'.'/../lib/User/DeletedUsersIndex.php', |
|
| 80 | + 'OCA\\User_LDAP\\User\\Manager' => __DIR__.'/..'.'/../lib/User/Manager.php', |
|
| 81 | + 'OCA\\User_LDAP\\User\\OfflineUser' => __DIR__.'/..'.'/../lib/User/OfflineUser.php', |
|
| 82 | + 'OCA\\User_LDAP\\User\\User' => __DIR__.'/..'.'/../lib/User/User.php', |
|
| 83 | + 'OCA\\User_LDAP\\User_LDAP' => __DIR__.'/..'.'/../lib/User_LDAP.php', |
|
| 84 | + 'OCA\\User_LDAP\\User_Proxy' => __DIR__.'/..'.'/../lib/User_Proxy.php', |
|
| 85 | + 'OCA\\User_LDAP\\Wizard' => __DIR__.'/..'.'/../lib/Wizard.php', |
|
| 86 | + 'OCA\\User_LDAP\\WizardResult' => __DIR__.'/..'.'/../lib/WizardResult.php', |
|
| 87 | 87 | ); |
| 88 | 88 | |
| 89 | 89 | public static function getInitializer(ClassLoader $loader) |
| 90 | 90 | { |
| 91 | - return \Closure::bind(function () use ($loader) { |
|
| 91 | + return \Closure::bind(function() use ($loader) { |
|
| 92 | 92 | $loader->prefixLengthsPsr4 = ComposerStaticInitUser_LDAP::$prefixLengthsPsr4; |
| 93 | 93 | $loader->prefixDirsPsr4 = ComposerStaticInitUser_LDAP::$prefixDirsPsr4; |
| 94 | 94 | $loader->classMap = ComposerStaticInitUser_LDAP::$classMap; |