@@ -103,9 +103,9 @@ discard block |
||
103 | 103 | $this->dui->markUser($uid); |
104 | 104 | $output->writeln('The user does not exists on LDAP anymore.'); |
105 | 105 | $output->writeln('Clean up the user\'s remnants by: ./occ user:delete "' |
106 | - . $uid . '"'); |
|
106 | + . $uid.'"'); |
|
107 | 107 | } catch (\Exception $e) { |
108 | - $output->writeln('<error>' . $e->getMessage(). '</error>'); |
|
108 | + $output->writeln('<error>'.$e->getMessage().'</error>'); |
|
109 | 109 | } |
110 | 110 | } |
111 | 111 | |
@@ -150,12 +150,12 @@ discard block |
||
150 | 150 | $avatarAttributes = $access->getConnection()->resolveRule('avatar'); |
151 | 151 | $result = $access->search('objectclass=*', $user->getDN(), $attrs, 1, 0); |
152 | 152 | foreach ($result[0] as $attribute => $valueSet) { |
153 | - $output->writeln(' ' . $attribute . ': '); |
|
153 | + $output->writeln(' '.$attribute.': '); |
|
154 | 154 | foreach ($valueSet as $value) { |
155 | 155 | if (in_array($attribute, $avatarAttributes)) { |
156 | 156 | $value = '{ImageData}'; |
157 | 157 | } |
158 | - $output->writeln(' ' . $value); |
|
158 | + $output->writeln(' '.$value); |
|
159 | 159 | } |
160 | 160 | } |
161 | 161 | $access->batchApplyUserAttributes($result); |
@@ -188,7 +188,7 @@ discard block |
||
188 | 188 | return; |
189 | 189 | } |
190 | 190 | $this->config->setUserValue($this->getUsername(), 'user_ldap', 'isDeleted', '1'); |
191 | - $this->config->setUserValue($this->getUsername(), 'user_ldap', 'foundDeleted', (string)time()); |
|
191 | + $this->config->setUserValue($this->getUsername(), 'user_ldap', 'foundDeleted', (string) time()); |
|
192 | 192 | } |
193 | 193 | |
194 | 194 | /** |
@@ -212,11 +212,11 @@ discard block |
||
212 | 212 | $displayName = $displayName2 = ''; |
213 | 213 | $attr = strtolower($this->connection->ldapUserDisplayName); |
214 | 214 | if (isset($ldapEntry[$attr])) { |
215 | - $displayName = (string)$ldapEntry[$attr][0]; |
|
215 | + $displayName = (string) $ldapEntry[$attr][0]; |
|
216 | 216 | } |
217 | 217 | $attr = strtolower($this->connection->ldapUserDisplayName2); |
218 | 218 | if (isset($ldapEntry[$attr])) { |
219 | - $displayName2 = (string)$ldapEntry[$attr][0]; |
|
219 | + $displayName2 = (string) $ldapEntry[$attr][0]; |
|
220 | 220 | } |
221 | 221 | if ($displayName !== '') { |
222 | 222 | $this->composeAndStoreDisplayName($displayName, $displayName2); |
@@ -308,7 +308,7 @@ discard block |
||
308 | 308 | * @throws \Exception |
309 | 309 | */ |
310 | 310 | public function getHomePath($valueFromLDAP = null) { |
311 | - $path = (string)$valueFromLDAP; |
|
311 | + $path = (string) $valueFromLDAP; |
|
312 | 312 | $attr = null; |
313 | 313 | |
314 | 314 | if (is_null($valueFromLDAP) |
@@ -330,7 +330,7 @@ discard block |
||
330 | 330 | && $path[1] === ':' && ('\\' === $path[2] || '/' === $path[2])) |
331 | 331 | ) { |
332 | 332 | $path = $this->config->getSystemValue('datadirectory', |
333 | - \OC::$SERVERROOT.'/data') . '/' . $path; |
|
333 | + \OC::$SERVERROOT.'/data').'/'.$path; |
|
334 | 334 | } |
335 | 335 | //we need it to store it in the DB as well in case a user gets |
336 | 336 | //deleted so we can clean up afterwards |
@@ -344,7 +344,7 @@ discard block |
||
344 | 344 | && $this->config->getAppValue('user_ldap', 'enforce_home_folder_naming_rule', true) |
345 | 345 | ) { |
346 | 346 | // a naming rule attribute is defined, but it doesn't exist for that LDAP user |
347 | - throw new \Exception('Home dir attribute can\'t be read from LDAP for uid: ' . $this->getUsername()); |
|
347 | + throw new \Exception('Home dir attribute can\'t be read from LDAP for uid: '.$this->getUsername()); |
|
348 | 348 | } |
349 | 349 | |
350 | 350 | //false will apply default behaviour as defined and done by OC_User |
@@ -415,7 +415,7 @@ discard block |
||
415 | 415 | $lastChecked = $this->config->getUserValue($this->uid, 'user_ldap', |
416 | 416 | self::USER_PREFKEY_LASTREFRESH, 0); |
417 | 417 | |
418 | - if ((time() - (int)$lastChecked) < (int)$this->config->getAppValue('user_ldap', 'updateAttributesInterval', 86400)) { |
|
418 | + if ((time() - (int) $lastChecked) < (int) $this->config->getAppValue('user_ldap', 'updateAttributesInterval', 86400)) { |
|
419 | 419 | return false; |
420 | 420 | } |
421 | 421 | return true; |
@@ -440,9 +440,9 @@ discard block |
||
440 | 440 | * @return string the effective display name |
441 | 441 | */ |
442 | 442 | public function composeAndStoreDisplayName($displayName, $displayName2 = '') { |
443 | - $displayName2 = (string)$displayName2; |
|
443 | + $displayName2 = (string) $displayName2; |
|
444 | 444 | if ($displayName2 !== '') { |
445 | - $displayName .= ' (' . $displayName2 . ')'; |
|
445 | + $displayName .= ' ('.$displayName2.')'; |
|
446 | 446 | } |
447 | 447 | $oldName = $this->config->getUserValue($this->uid, 'user_ldap', 'displayName', null); |
448 | 448 | if ($oldName !== $displayName) { |
@@ -489,20 +489,20 @@ discard block |
||
489 | 489 | if ($this->wasRefreshed('email')) { |
490 | 490 | return; |
491 | 491 | } |
492 | - $email = (string)$valueFromLDAP; |
|
492 | + $email = (string) $valueFromLDAP; |
|
493 | 493 | if (is_null($valueFromLDAP)) { |
494 | 494 | $emailAttribute = $this->connection->ldapEmailAttribute; |
495 | 495 | if ($emailAttribute !== '') { |
496 | 496 | $aEmail = $this->access->readAttribute($this->dn, $emailAttribute); |
497 | 497 | if (is_array($aEmail) && (count($aEmail) > 0)) { |
498 | - $email = (string)$aEmail[0]; |
|
498 | + $email = (string) $aEmail[0]; |
|
499 | 499 | } |
500 | 500 | } |
501 | 501 | } |
502 | 502 | if ($email !== '') { |
503 | 503 | $user = $this->userManager->get($this->uid); |
504 | 504 | if (!is_null($user)) { |
505 | - $currentEmail = (string)$user->getEMailAddress(); |
|
505 | + $currentEmail = (string) $user->getEMailAddress(); |
|
506 | 506 | if ($currentEmail !== $email) { |
507 | 507 | $user->setEMailAddress($email); |
508 | 508 | } |
@@ -547,19 +547,19 @@ discard block |
||
547 | 547 | if ($aQuota && (count($aQuota) > 0) && $this->verifyQuotaValue($aQuota[0])) { |
548 | 548 | $quota = $aQuota[0]; |
549 | 549 | } elseif (is_array($aQuota) && isset($aQuota[0])) { |
550 | - $this->log->log('no suitable LDAP quota found for user ' . $this->uid . ': [' . $aQuota[0] . ']', ILogger::DEBUG); |
|
550 | + $this->log->log('no suitable LDAP quota found for user '.$this->uid.': ['.$aQuota[0].']', ILogger::DEBUG); |
|
551 | 551 | } |
552 | 552 | } elseif ($this->verifyQuotaValue($valueFromLDAP)) { |
553 | 553 | $quota = $valueFromLDAP; |
554 | 554 | } else { |
555 | - $this->log->log('no suitable LDAP quota found for user ' . $this->uid . ': [' . $valueFromLDAP . ']', ILogger::DEBUG); |
|
555 | + $this->log->log('no suitable LDAP quota found for user '.$this->uid.': ['.$valueFromLDAP.']', ILogger::DEBUG); |
|
556 | 556 | } |
557 | 557 | |
558 | 558 | if ($quota === false && $this->verifyQuotaValue($defaultQuota)) { |
559 | 559 | // quota not found using the LDAP attribute (or not parseable). Try the default quota |
560 | 560 | $quota = $defaultQuota; |
561 | 561 | } elseif ($quota === false) { |
562 | - $this->log->log('no suitable default quota found for user ' . $this->uid . ': [' . $defaultQuota . ']', ILogger::DEBUG); |
|
562 | + $this->log->log('no suitable default quota found for user '.$this->uid.': ['.$defaultQuota.']', ILogger::DEBUG); |
|
563 | 563 | return; |
564 | 564 | } |
565 | 565 | |
@@ -567,7 +567,7 @@ discard block |
||
567 | 567 | if ($targetUser instanceof IUser) { |
568 | 568 | $targetUser->setQuota($quota); |
569 | 569 | } else { |
570 | - $this->log->log('trying to set a quota for user ' . $this->uid . ' but the user is missing', ILogger::INFO); |
|
570 | + $this->log->log('trying to set a quota for user '.$this->uid.' but the user is missing', ILogger::INFO); |
|
571 | 571 | } |
572 | 572 | } |
573 | 573 | |
@@ -649,7 +649,7 @@ discard block |
||
649 | 649 | return true; |
650 | 650 | } catch (\Exception $e) { |
651 | 651 | \OC::$server->getLogger()->logException($e, [ |
652 | - 'message' => 'Could not set avatar for ' . $this->dn, |
|
652 | + 'message' => 'Could not set avatar for '.$this->dn, |
|
653 | 653 | 'level' => ILogger::INFO, |
654 | 654 | 'app' => 'user_ldap', |
655 | 655 | ]); |
@@ -705,8 +705,8 @@ discard block |
||
705 | 705 | */ |
706 | 706 | public function handlePasswordExpiry($params) { |
707 | 707 | $ppolicyDN = $this->connection->ldapDefaultPPolicyDN; |
708 | - if (empty($ppolicyDN) || ((int)$this->connection->turnOnPasswordChange !== 1)) { |
|
709 | - return;//password expiry handling disabled |
|
708 | + if (empty($ppolicyDN) || ((int) $this->connection->turnOnPasswordChange !== 1)) { |
|
709 | + return; //password expiry handling disabled |
|
710 | 710 | } |
711 | 711 | $uid = $params['uid']; |
712 | 712 | if (isset($uid) && $uid === $this->getUsername()) { |
@@ -716,7 +716,7 @@ discard block |
||
716 | 716 | if (array_key_exists('pwdpolicysubentry', $result[0])) { |
717 | 717 | $pwdPolicySubentry = $result[0]['pwdpolicysubentry']; |
718 | 718 | if ($pwdPolicySubentry && (count($pwdPolicySubentry) > 0)) { |
719 | - $ppolicyDN = $pwdPolicySubentry[0];//custom ppolicy DN |
|
719 | + $ppolicyDN = $pwdPolicySubentry[0]; //custom ppolicy DN |
|
720 | 720 | } |
721 | 721 | } |
722 | 722 | |
@@ -725,7 +725,7 @@ discard block |
||
725 | 725 | $pwdChangedTime = array_key_exists('pwdchangedtime', $result[0]) ? $result[0]['pwdchangedtime'] : []; |
726 | 726 | |
727 | 727 | //retrieve relevant password policy attributes |
728 | - $cacheKey = 'ppolicyAttributes' . $ppolicyDN; |
|
728 | + $cacheKey = 'ppolicyAttributes'.$ppolicyDN; |
|
729 | 729 | $result = $this->connection->getFromCache($cacheKey); |
730 | 730 | if (is_null($result)) { |
731 | 731 | $result = $this->access->search('objectclass=*', $ppolicyDN, ['pwdgraceauthnlimit', 'pwdmaxage', 'pwdexpirewarning']); |
@@ -739,7 +739,7 @@ discard block |
||
739 | 739 | //handle grace login |
740 | 740 | if (!empty($pwdGraceUseTime)) { //was this a grace login? |
741 | 741 | if (!empty($pwdGraceAuthNLimit) |
742 | - && count($pwdGraceUseTime) < (int)$pwdGraceAuthNLimit[0]) { //at least one more grace login available? |
|
742 | + && count($pwdGraceUseTime) < (int) $pwdGraceAuthNLimit[0]) { //at least one more grace login available? |
|
743 | 743 | $this->config->setUserValue($uid, 'user_ldap', 'needsPasswordReset', 'true'); |
744 | 744 | header('Location: '.\OC::$server->getURLGenerator()->linkToRouteAbsolute( |
745 | 745 | 'user_ldap.renewPassword.showRenewPasswordForm', ['user' => $uid])); |
@@ -760,8 +760,8 @@ discard block |
||
760 | 760 | if (!empty($pwdChangedTime)) { |
761 | 761 | if (!empty($pwdMaxAge) |
762 | 762 | && !empty($pwdExpireWarning)) { |
763 | - $pwdMaxAgeInt = (int)$pwdMaxAge[0]; |
|
764 | - $pwdExpireWarningInt = (int)$pwdExpireWarning[0]; |
|
763 | + $pwdMaxAgeInt = (int) $pwdMaxAge[0]; |
|
764 | + $pwdExpireWarningInt = (int) $pwdExpireWarning[0]; |
|
765 | 765 | if ($pwdMaxAgeInt > 0 && $pwdExpireWarningInt > 0) { |
766 | 766 | $pwdChangedTimeDt = \DateTime::createFromFormat('YmdHisZ', $pwdChangedTime[0]); |
767 | 767 | $pwdChangedTimeDt->add(new \DateInterval('PT'.$pwdMaxAgeInt.'S')); |
@@ -45,7 +45,7 @@ discard block |
||
45 | 45 | protected $pagedResultsAdapter; |
46 | 46 | |
47 | 47 | public function __construct() { |
48 | - if(version_compare(PHP_VERSION, '7.3', '<') === true) { |
|
48 | + if (version_compare(PHP_VERSION, '7.3', '<') === true) { |
|
49 | 49 | $this->pagedResultsAdapter = new Php54(); |
50 | 50 | } else { |
51 | 51 | $this->pagedResultsAdapter = new Php73(); |
@@ -69,11 +69,11 @@ discard block |
||
69 | 69 | */ |
70 | 70 | public function connect($host, $port) { |
71 | 71 | if (strpos($host, '://') === false) { |
72 | - $host = 'ldap://' . $host; |
|
72 | + $host = 'ldap://'.$host; |
|
73 | 73 | } |
74 | 74 | if (strpos($host, ':', strpos($host, '://') + 1) === false) { |
75 | 75 | //ldap_connect ignores port parameter when URLs are passed |
76 | - $host .= ':' . $port; |
|
76 | + $host .= ':'.$port; |
|
77 | 77 | } |
78 | 78 | return $this->invokeLDAPMethod('connect', $host); |
79 | 79 | } |
@@ -103,7 +103,7 @@ discard block |
||
103 | 103 | public function controlPagedResult($link, $pageSize, $isCritical) { |
104 | 104 | $fn = $this->pagedResultsAdapter->getRequestCallFunc(); |
105 | 105 | $this->pagedResultsAdapter->setRequestParameters($link, $pageSize, $isCritical); |
106 | - if($fn === null) { |
|
106 | + if ($fn === null) { |
|
107 | 107 | return true; |
108 | 108 | } |
109 | 109 | |
@@ -221,7 +221,7 @@ discard block |
||
221 | 221 | * @throws \Exception |
222 | 222 | */ |
223 | 223 | public function search($link, $baseDN, $filter, $attr, $attrsOnly = 0, $limit = 0) { |
224 | - $oldHandler = set_error_handler(function ($no, $message, $file, $line) use (&$oldHandler) { |
|
224 | + $oldHandler = set_error_handler(function($no, $message, $file, $line) use (&$oldHandler) { |
|
225 | 225 | if (strpos($message, 'Partial search results returned: Sizelimit exceeded') !== false) { |
226 | 226 | return true; |
227 | 227 | } |
@@ -334,7 +334,7 @@ discard block |
||
334 | 334 | */ |
335 | 335 | protected function invokeLDAPMethod() { |
336 | 336 | $arguments = func_get_args(); |
337 | - $func = 'ldap_' . array_shift($arguments); |
|
337 | + $func = 'ldap_'.array_shift($arguments); |
|
338 | 338 | if (function_exists($func)) { |
339 | 339 | $this->preFunctionCall($func, $arguments); |
340 | 340 | $result = call_user_func_array($func, $arguments); |
@@ -368,7 +368,7 @@ discard block |
||
368 | 368 | if ($errorCode === 0) { |
369 | 369 | return; |
370 | 370 | } |
371 | - $errorMsg = ldap_error($resource); |
|
371 | + $errorMsg = ldap_error($resource); |
|
372 | 372 | |
373 | 373 | if ($this->curFunc === 'ldap_get_entries' |
374 | 374 | && $errorCode === -4) { |
@@ -386,7 +386,7 @@ discard block |
||
386 | 386 | throw new \Exception('LDAP Operations error', $errorCode); |
387 | 387 | } elseif ($errorCode === 19) { |
388 | 388 | ldap_get_option($this->curArgs[0], LDAP_OPT_ERROR_STRING, $extended_error); |
389 | - throw new ConstraintViolationException(!empty($extended_error)?$extended_error:$errorMsg, $errorCode); |
|
389 | + throw new ConstraintViolationException(!empty($extended_error) ? $extended_error : $errorMsg, $errorCode); |
|
390 | 390 | } else { |
391 | 391 | \OC::$server->getLogger()->debug('LDAP error {message} ({code}) after calling {func}', [ |
392 | 392 | 'app' => 'user_ldap', |
@@ -27,10 +27,10 @@ |
||
27 | 27 | |
28 | 28 | trait TLinkId { |
29 | 29 | public function getLinkId($link) { |
30 | - if(is_resource($link)) { |
|
31 | - return (int)$link; |
|
32 | - } else if(is_array($link) && isset($link[0]) && is_resource($link[0])) { |
|
33 | - return (int)$link[0]; |
|
30 | + if (is_resource($link)) { |
|
31 | + return (int) $link; |
|
32 | + } else if (is_array($link) && isset($link[0]) && is_resource($link[0])) { |
|
33 | + return (int) $link[0]; |
|
34 | 34 | } |
35 | 35 | throw new \RuntimeException('No resource provided'); |
36 | 36 | } |
@@ -48,7 +48,7 @@ discard block |
||
48 | 48 | |
49 | 49 | public function getResponseCallArgs(array $originalArgs): array { |
50 | 50 | $linkId = $this->getLinkId($originalArgs[0]); |
51 | - if(!isset($this->linkData[$linkId])) { |
|
51 | + if (!isset($this->linkData[$linkId])) { |
|
52 | 52 | throw new \LogicException('There should be a request before the response'); |
53 | 53 | } |
54 | 54 | $this->linkData[$linkId]['responseArgs'] = &$originalArgs; |
@@ -68,7 +68,7 @@ discard block |
||
68 | 68 | public function setRequestParameters($link, int $pageSize, bool $isCritical): void { |
69 | 69 | $linkId = $this->getLinkId($link); |
70 | 70 | |
71 | - if($pageSize === 0 || !isset($this->linkData[$linkId]['cookie'])) { |
|
71 | + if ($pageSize === 0 || !isset($this->linkData[$linkId]['cookie'])) { |
|
72 | 72 | // abandons a previous paged search |
73 | 73 | $this->linkData[$linkId]['cookie'] = ''; |
74 | 74 | } |
@@ -100,7 +100,7 @@ discard block |
||
100 | 100 | int $limit |
101 | 101 | ): void { |
102 | 102 | $linkId = $this->getLinkId($link); |
103 | - if(!isset($this->linkData[$linkId])) { |
|
103 | + if (!isset($this->linkData[$linkId])) { |
|
104 | 104 | $this->linkData[$linkId] = []; |
105 | 105 | } |
106 | 106 | $this->linkData[$linkId]['searchArgs'] = func_get_args(); |
@@ -113,7 +113,7 @@ discard block |
||
113 | 113 | |
114 | 114 | public function setReadArgs($link, string $baseDN, string $filter, array $attr): void { |
115 | 115 | $linkId = $this->getLinkId($link); |
116 | - if(!isset($this->linkData[$linkId])) { |
|
116 | + if (!isset($this->linkData[$linkId])) { |
|
117 | 117 | $this->linkData[$linkId] = []; |
118 | 118 | } |
119 | 119 | $this->linkData[$linkId]['readArgs'] = func_get_args(); |
@@ -50,7 +50,7 @@ discard block |
||
50 | 50 | $link = array_shift($originalArgs); |
51 | 51 | $linkId = $this->getLinkId($link); |
52 | 52 | |
53 | - if(!isset($this->linkData[$linkId])) { |
|
53 | + if (!isset($this->linkData[$linkId])) { |
|
54 | 54 | $this->linkData[$linkId] = []; |
55 | 55 | } |
56 | 56 | |
@@ -85,7 +85,7 @@ discard block |
||
85 | 85 | |
86 | 86 | public function setRequestParameters($link, int $pageSize, bool $isCritical): void { |
87 | 87 | $linkId = $this->getLinkId($link); |
88 | - if(!isset($this->linkData[$linkId])) { |
|
88 | + if (!isset($this->linkData[$linkId])) { |
|
89 | 89 | $this->linkData[$linkId] = []; |
90 | 90 | } |
91 | 91 | $this->linkData[$linkId]['requestArgs'] = []; |
@@ -112,7 +112,7 @@ discard block |
||
112 | 112 | int $limit |
113 | 113 | ): void { |
114 | 114 | $linkId = $this->getLinkId($link); |
115 | - if(!isset($this->linkData[$linkId])) { |
|
115 | + if (!isset($this->linkData[$linkId])) { |
|
116 | 116 | $this->linkData[$linkId] = []; |
117 | 117 | } |
118 | 118 | |
@@ -127,7 +127,7 @@ discard block |
||
127 | 127 | |
128 | 128 | public function setReadArgs($link, string $baseDN, string $filter, array $attr): void { |
129 | 129 | $linkId = $this->getLinkId($link); |
130 | - if(!isset($this->linkData[$linkId])) { |
|
130 | + if (!isset($this->linkData[$linkId])) { |
|
131 | 131 | $this->linkData[$linkId] = []; |
132 | 132 | } |
133 | 133 | |
@@ -143,7 +143,7 @@ discard block |
||
143 | 143 | } |
144 | 144 | |
145 | 145 | protected function preparePagesResultsArgs(int $linkId, string $methodKey): void { |
146 | - if(!isset($this->linkData[$linkId]['requestArgs'])) { |
|
146 | + if (!isset($this->linkData[$linkId]['requestArgs'])) { |
|
147 | 147 | return; |
148 | 148 | } |
149 | 149 |
@@ -196,7 +196,7 @@ discard block |
||
196 | 196 | $this->abandonPagedSearch(); |
197 | 197 | // openLDAP requires that we init a new Paged Search. Not needed by AD, |
198 | 198 | // but does not hurt either. |
199 | - $pagingSize = (int)$this->connection->ldapPagingSize; |
|
199 | + $pagingSize = (int) $this->connection->ldapPagingSize; |
|
200 | 200 | // 0 won't result in replies, small numbers may leave out groups |
201 | 201 | // (cf. #12306), 500 is default for paging and should work everywhere. |
202 | 202 | $maxResults = $pagingSize > 20 ? $pagingSize : 500; |
@@ -226,7 +226,7 @@ discard block |
||
226 | 226 | $result = $this->extractRangeData($result, $attr); |
227 | 227 | if (!empty($result)) { |
228 | 228 | $normalizedResult = $this->extractAttributeValuesFromResult( |
229 | - [ $attr => $result['values'] ], |
|
229 | + [$attr => $result['values']], |
|
230 | 230 | $attr |
231 | 231 | ); |
232 | 232 | $values = array_merge($values, $normalizedResult); |
@@ -236,8 +236,8 @@ discard block |
||
236 | 236 | // no more results left |
237 | 237 | return $values; |
238 | 238 | } else { |
239 | - $low = $result['rangeHigh'] + 1; |
|
240 | - $attrToRead = $result['attributeName'] . ';range=' . $low . '-*'; |
|
239 | + $low = $result['rangeHigh'] + 1; |
|
240 | + $attrToRead = $result['attributeName'].';range='.$low.'-*'; |
|
241 | 241 | $isRangeRequest = true; |
242 | 242 | } |
243 | 243 | } |
@@ -267,13 +267,13 @@ discard block |
||
267 | 267 | if (!$this->ldap->isResource($rr)) { |
268 | 268 | if ($attribute !== '') { |
269 | 269 | //do not throw this message on userExists check, irritates |
270 | - \OCP\Util::writeLog('user_ldap', 'readAttribute failed for DN ' . $dn, ILogger::DEBUG); |
|
270 | + \OCP\Util::writeLog('user_ldap', 'readAttribute failed for DN '.$dn, ILogger::DEBUG); |
|
271 | 271 | } |
272 | 272 | //in case an error occurs , e.g. object does not exist |
273 | 273 | return false; |
274 | 274 | } |
275 | 275 | if ($attribute === '' && ($filter === 'objectclass=*' || $this->invokeLDAPMethod('countEntries', $cr, $rr) === 1)) { |
276 | - \OCP\Util::writeLog('user_ldap', 'readAttribute: ' . $dn . ' found', ILogger::DEBUG); |
|
276 | + \OCP\Util::writeLog('user_ldap', 'readAttribute: '.$dn.' found', ILogger::DEBUG); |
|
277 | 277 | return true; |
278 | 278 | } |
279 | 279 | $er = $this->invokeLDAPMethod('firstEntry', $cr, $rr); |
@@ -300,7 +300,7 @@ discard block |
||
300 | 300 | $values = []; |
301 | 301 | if (isset($result[$attribute]) && $result[$attribute]['count'] > 0) { |
302 | 302 | $lowercaseAttribute = strtolower($attribute); |
303 | - for ($i=0;$i<$result[$attribute]['count'];$i++) { |
|
303 | + for ($i = 0; $i < $result[$attribute]['count']; $i++) { |
|
304 | 304 | if ($this->resemblesDN($attribute)) { |
305 | 305 | $values[] = $this->helper->sanitizeDN($result[$attribute][$i]); |
306 | 306 | } elseif ($lowercaseAttribute === 'objectguid' || $lowercaseAttribute === 'guid') { |
@@ -353,7 +353,7 @@ discard block |
||
353 | 353 | * @throws \Exception |
354 | 354 | */ |
355 | 355 | public function setPassword($userDN, $password) { |
356 | - if ((int)$this->connection->turnOnPasswordChange !== 1) { |
|
356 | + if ((int) $this->connection->turnOnPasswordChange !== 1) { |
|
357 | 357 | throw new \Exception('LDAP password changes are disabled.'); |
358 | 358 | } |
359 | 359 | $cr = $this->connection->getConnectionResource(); |
@@ -581,7 +581,7 @@ discard block |
||
581 | 581 | } |
582 | 582 | |
583 | 583 | if ($isUser) { |
584 | - $usernameAttribute = (string)$this->connection->ldapExpertUsernameAttr; |
|
584 | + $usernameAttribute = (string) $this->connection->ldapExpertUsernameAttr; |
|
585 | 585 | if ($usernameAttribute !== '') { |
586 | 586 | $username = $this->readAttribute($fdn, $usernameAttribute); |
587 | 587 | $username = $username[0]; |
@@ -785,7 +785,7 @@ discard block |
||
785 | 785 | } |
786 | 786 | |
787 | 787 | public function cacheGroupDisplayName(string $ncName, string $displayName): void { |
788 | - $cacheKey = 'group_getDisplayName' . $ncName; |
|
788 | + $cacheKey = 'group_getDisplayName'.$ncName; |
|
789 | 789 | $this->connection->writeToCache($cacheKey, $displayName); |
790 | 790 | } |
791 | 791 | |
@@ -802,7 +802,7 @@ discard block |
||
802 | 802 | //while loop is just a precaution. If a name is not generated within |
803 | 803 | //20 attempts, something else is very wrong. Avoids infinite loop. |
804 | 804 | while ($attempts < 20) { |
805 | - $altName = $name . '_' . rand(1000,9999); |
|
805 | + $altName = $name.'_'.rand(1000, 9999); |
|
806 | 806 | if (!$this->ncUserManager->userExists($altName)) { |
807 | 807 | return $altName; |
808 | 808 | } |
@@ -830,9 +830,9 @@ discard block |
||
830 | 830 | } else { |
831 | 831 | natsort($usedNames); |
832 | 832 | $lastName = array_pop($usedNames); |
833 | - $lastNo = (int)substr($lastName, strrpos($lastName, '_') + 1); |
|
833 | + $lastNo = (int) substr($lastName, strrpos($lastName, '_') + 1); |
|
834 | 834 | } |
835 | - $altName = $name.'_'. (string)($lastNo+1); |
|
835 | + $altName = $name.'_'.(string) ($lastNo + 1); |
|
836 | 836 | unset($usedNames); |
837 | 837 | |
838 | 838 | $attempts = 1; |
@@ -843,7 +843,7 @@ discard block |
||
843 | 843 | if (!\OC::$server->getGroupManager()->groupExists($altName)) { |
844 | 844 | return $altName; |
845 | 845 | } |
846 | - $altName = $name . '_' . ($lastNo + $attempts); |
|
846 | + $altName = $name.'_'.($lastNo + $attempts); |
|
847 | 847 | $attempts++; |
848 | 848 | } |
849 | 849 | return false; |
@@ -910,7 +910,7 @@ discard block |
||
910 | 910 | if (!$forceApplyAttributes) { |
911 | 911 | $isBackgroundJobModeAjax = $this->config |
912 | 912 | ->getAppValue('core', 'backgroundjobs_mode', 'ajax') === 'ajax'; |
913 | - $recordsToUpdate = array_filter($ldapRecords, function ($record) use ($isBackgroundJobModeAjax) { |
|
913 | + $recordsToUpdate = array_filter($ldapRecords, function($record) use ($isBackgroundJobModeAjax) { |
|
914 | 914 | $newlyMapped = false; |
915 | 915 | $uid = $this->dn2ocname($record['dn'][0], null, true, $newlyMapped, $record); |
916 | 916 | if (is_string($uid)) { |
@@ -938,7 +938,7 @@ discard block |
||
938 | 938 | // displayName is obligatory |
939 | 939 | continue; |
940 | 940 | } |
941 | - $ocName = $this->dn2ocname($userRecord['dn'][0], null, true); |
|
941 | + $ocName = $this->dn2ocname($userRecord['dn'][0], null, true); |
|
942 | 942 | if ($ocName === false) { |
943 | 943 | continue; |
944 | 944 | } |
@@ -964,7 +964,7 @@ discard block |
||
964 | 964 | */ |
965 | 965 | public function fetchListOfGroups($filter, $attr, $limit = null, $offset = null) { |
966 | 966 | $groupRecords = $this->searchGroups($filter, $attr, $limit, $offset); |
967 | - array_walk($groupRecords, function ($record) { |
|
967 | + array_walk($groupRecords, function($record) { |
|
968 | 968 | $newlyMapped = false; |
969 | 969 | $gid = $this->dn2ocname($record['dn'][0], null, false, $newlyMapped, $record); |
970 | 970 | if (!$newlyMapped && is_string($gid)) { |
@@ -984,7 +984,7 @@ discard block |
||
984 | 984 | if ($manyAttributes) { |
985 | 985 | return $list; |
986 | 986 | } else { |
987 | - $list = array_reduce($list, function ($carry, $item) { |
|
987 | + $list = array_reduce($list, function($carry, $item) { |
|
988 | 988 | $attribute = array_keys($item)[0]; |
989 | 989 | $carry[] = $item[$attribute][0]; |
990 | 990 | return $carry; |
@@ -1029,7 +1029,7 @@ discard block |
||
1029 | 1029 | $result = false; |
1030 | 1030 | foreach ($this->connection->ldapBaseUsers as $base) { |
1031 | 1031 | $count = $this->count($filter, [$base], $attr, $limit, $offset); |
1032 | - $result = is_int($count) ? (int)$result + $count : $result; |
|
1032 | + $result = is_int($count) ? (int) $result + $count : $result; |
|
1033 | 1033 | } |
1034 | 1034 | return $result; |
1035 | 1035 | } |
@@ -1068,7 +1068,7 @@ discard block |
||
1068 | 1068 | $result = false; |
1069 | 1069 | foreach ($this->connection->ldapBaseGroups as $base) { |
1070 | 1070 | $count = $this->count($filter, [$base], $attr, $limit, $offset); |
1071 | - $result = is_int($count) ? (int)$result + $count : $result; |
|
1071 | + $result = is_int($count) ? (int) $result + $count : $result; |
|
1072 | 1072 | } |
1073 | 1073 | return $result; |
1074 | 1074 | } |
@@ -1085,7 +1085,7 @@ discard block |
||
1085 | 1085 | $result = false; |
1086 | 1086 | foreach ($this->connection->ldapBase as $base) { |
1087 | 1087 | $count = $this->count('objectclass=*', [$base], ['dn'], $limit, $offset); |
1088 | - $result = is_int($count) ? (int)$result + $count : $result; |
|
1088 | + $result = is_int($count) ? (int) $result + $count : $result; |
|
1089 | 1089 | } |
1090 | 1090 | return $result; |
1091 | 1091 | } |
@@ -1110,7 +1110,7 @@ discard block |
||
1110 | 1110 | // php no longer supports call-time pass-by-reference |
1111 | 1111 | // thus cannot support controlPagedResultResponse as the third argument |
1112 | 1112 | // is a reference |
1113 | - $doMethod = function () use ($command, &$arguments) { |
|
1113 | + $doMethod = function() use ($command, &$arguments) { |
|
1114 | 1114 | if ($command == 'controlPagedResultResponse') { |
1115 | 1115 | throw new \InvalidArgumentException('Invoker does not support controlPagedResultResponse, call LDAP Wrapper directly instead.'); |
1116 | 1116 | } else { |
@@ -1169,12 +1169,12 @@ discard block |
||
1169 | 1169 | } |
1170 | 1170 | |
1171 | 1171 | //check whether paged search should be attempted |
1172 | - $pagedSearchOK = $this->initPagedSearch($filter, $base, $attr, (int)$limit, (int)$offset); |
|
1172 | + $pagedSearchOK = $this->initPagedSearch($filter, $base, $attr, (int) $limit, (int) $offset); |
|
1173 | 1173 | |
1174 | 1174 | $sr = $this->invokeLDAPMethod('search', $cr, $base, $filter, $attr); |
1175 | 1175 | // cannot use $cr anymore, might have changed in the previous call! |
1176 | 1176 | $error = $this->ldap->errno($this->connection->getConnectionResource()); |
1177 | - if(!$this->ldap->isResource($sr) || $error !== 0) { |
|
1177 | + if (!$this->ldap->isResource($sr) || $error !== 0) { |
|
1178 | 1178 | \OCP\Util::writeLog('user_ldap', 'Attempt for Paging? '.print_r($pagedSearchOK, true), ILogger::ERROR); |
1179 | 1179 | return false; |
1180 | 1180 | } |
@@ -1204,7 +1204,7 @@ discard block |
||
1204 | 1204 | $cookie = null; |
1205 | 1205 | if ($pagedSearchOK) { |
1206 | 1206 | $cr = $this->connection->getConnectionResource(); |
1207 | - if($this->ldap->controlPagedResultResponse($cr, $sr, $cookie)) { |
|
1207 | + if ($this->ldap->controlPagedResultResponse($cr, $sr, $cookie)) { |
|
1208 | 1208 | $this->lastCookie = $cookie; |
1209 | 1209 | } |
1210 | 1210 | |
@@ -1215,14 +1215,14 @@ discard block |
||
1215 | 1215 | // if count is bigger, then the server does not support |
1216 | 1216 | // paged search. Instead, he did a normal search. We set a |
1217 | 1217 | // flag here, so the callee knows how to deal with it. |
1218 | - if($foundItems <= $limit) { |
|
1218 | + if ($foundItems <= $limit) { |
|
1219 | 1219 | $this->pagedSearchedSuccessful = true; |
1220 | 1220 | } |
1221 | 1221 | } else { |
1222 | - if (!is_null($limit) && (int)$this->connection->ldapPagingSize !== 0) { |
|
1222 | + if (!is_null($limit) && (int) $this->connection->ldapPagingSize !== 0) { |
|
1223 | 1223 | \OC::$server->getLogger()->debug( |
1224 | 1224 | 'Paged search was not available', |
1225 | - [ 'app' => 'user_ldap' ] |
|
1225 | + ['app' => 'user_ldap'] |
|
1226 | 1226 | ); |
1227 | 1227 | } |
1228 | 1228 | } |
@@ -1261,11 +1261,11 @@ discard block |
||
1261 | 1261 | 'filter' => $filter |
1262 | 1262 | ]); |
1263 | 1263 | |
1264 | - if(!is_null($attr) && !is_array($attr)) { |
|
1264 | + if (!is_null($attr) && !is_array($attr)) { |
|
1265 | 1265 | $attr = array(mb_strtolower($attr, 'UTF-8')); |
1266 | 1266 | } |
1267 | 1267 | |
1268 | - $limitPerPage = (int)$this->connection->ldapPagingSize; |
|
1268 | + $limitPerPage = (int) $this->connection->ldapPagingSize; |
|
1269 | 1269 | if (!is_null($limit) && $limit < $limitPerPage && $limit > 0) { |
1270 | 1270 | $limitPerPage = $limit; |
1271 | 1271 | } |
@@ -1274,7 +1274,7 @@ discard block |
||
1274 | 1274 | $count = null; |
1275 | 1275 | $this->connection->getConnectionResource(); |
1276 | 1276 | |
1277 | - foreach($bases as $base) { |
|
1277 | + foreach ($bases as $base) { |
|
1278 | 1278 | do { |
1279 | 1279 | $search = $this->executeSearch($filter, $base, $attr, $limitPerPage, $offset); |
1280 | 1280 | if ($search === false) { |
@@ -1307,7 +1307,7 @@ discard block |
||
1307 | 1307 | * @throws ServerNotAvailableException |
1308 | 1308 | */ |
1309 | 1309 | private function countEntriesInSearchResults($sr): int { |
1310 | - return (int)$this->invokeLDAPMethod('countEntries', $this->connection->getConnectionResource(), $sr); |
|
1310 | + return (int) $this->invokeLDAPMethod('countEntries', $this->connection->getConnectionResource(), $sr); |
|
1311 | 1311 | } |
1312 | 1312 | |
1313 | 1313 | /** |
@@ -1323,12 +1323,12 @@ discard block |
||
1323 | 1323 | ?int $offset = null, |
1324 | 1324 | bool $skipHandling = false |
1325 | 1325 | ): array { |
1326 | - $limitPerPage = (int)$this->connection->ldapPagingSize; |
|
1326 | + $limitPerPage = (int) $this->connection->ldapPagingSize; |
|
1327 | 1327 | if (!is_null($limit) && $limit < $limitPerPage && $limit > 0) { |
1328 | 1328 | $limitPerPage = $limit; |
1329 | 1329 | } |
1330 | 1330 | |
1331 | - if(!is_null($attr) && !is_array($attr)) { |
|
1331 | + if (!is_null($attr) && !is_array($attr)) { |
|
1332 | 1332 | $attr = [mb_strtolower($attr, 'UTF-8')]; |
1333 | 1333 | } |
1334 | 1334 | |
@@ -1415,7 +1415,7 @@ discard block |
||
1415 | 1415 | && !is_null($limit) |
1416 | 1416 | ) |
1417 | 1417 | ) { |
1418 | - $findings = array_slice($findings, (int)$offset, $limit); |
|
1418 | + $findings = array_slice($findings, (int) $offset, $limit); |
|
1419 | 1419 | } |
1420 | 1420 | return $findings; |
1421 | 1421 | } |
@@ -1466,7 +1466,7 @@ discard block |
||
1466 | 1466 | } |
1467 | 1467 | $search = ['*', '\\', '(', ')']; |
1468 | 1468 | $replace = ['\\*', '\\\\', '\\(', '\\)']; |
1469 | - return $asterisk . str_replace($search, $replace, $input); |
|
1469 | + return $asterisk.str_replace($search, $replace, $input); |
|
1470 | 1470 | } |
1471 | 1471 | |
1472 | 1472 | /** |
@@ -1500,9 +1500,9 @@ discard block |
||
1500 | 1500 | if ($filter !== '' && $filter[0] !== '(') { |
1501 | 1501 | $filter = '('.$filter.')'; |
1502 | 1502 | } |
1503 | - $combinedFilter.=$filter; |
|
1503 | + $combinedFilter .= $filter; |
|
1504 | 1504 | } |
1505 | - $combinedFilter.=')'; |
|
1505 | + $combinedFilter .= ')'; |
|
1506 | 1506 | return $combinedFilter; |
1507 | 1507 | } |
1508 | 1508 | |
@@ -1548,7 +1548,7 @@ discard block |
||
1548 | 1548 | //every word needs to appear at least once |
1549 | 1549 | $wordMatchOneAttrFilters = []; |
1550 | 1550 | foreach ($searchAttributes as $attr) { |
1551 | - $wordMatchOneAttrFilters[] = $attr . '=' . $word; |
|
1551 | + $wordMatchOneAttrFilters[] = $attr.'='.$word; |
|
1552 | 1552 | } |
1553 | 1553 | $wordFilters[] = $this->combineFilterWithOr($wordMatchOneAttrFilters); |
1554 | 1554 | } |
@@ -1583,10 +1583,10 @@ discard block |
||
1583 | 1583 | if ($fallbackAttribute === '') { |
1584 | 1584 | return ''; |
1585 | 1585 | } |
1586 | - $filter[] = $fallbackAttribute . '=' . $search; |
|
1586 | + $filter[] = $fallbackAttribute.'='.$search; |
|
1587 | 1587 | } else { |
1588 | 1588 | foreach ($searchAttributes as $attribute) { |
1589 | - $filter[] = $attribute . '=' . $search; |
|
1589 | + $filter[] = $attribute.'='.$search; |
|
1590 | 1590 | } |
1591 | 1591 | } |
1592 | 1592 | if (count($filter) === 1) { |
@@ -1610,7 +1610,7 @@ discard block |
||
1610 | 1610 | if ($term === '') { |
1611 | 1611 | $result = '*'; |
1612 | 1612 | } elseif ($allowEnum !== 'no') { |
1613 | - $result = $term . '*'; |
|
1613 | + $result = $term.'*'; |
|
1614 | 1614 | } |
1615 | 1615 | return $result; |
1616 | 1616 | } |
@@ -1622,7 +1622,7 @@ discard block |
||
1622 | 1622 | public function getFilterForUserCount() { |
1623 | 1623 | $filter = $this->combineFilterWithAnd([ |
1624 | 1624 | $this->connection->ldapUserFilter, |
1625 | - $this->connection->ldapUserDisplayName . '=*' |
|
1625 | + $this->connection->ldapUserDisplayName.'=*' |
|
1626 | 1626 | ]); |
1627 | 1627 | |
1628 | 1628 | return $filter; |
@@ -1671,7 +1671,7 @@ discard block |
||
1671 | 1671 | break; |
1672 | 1672 | } |
1673 | 1673 | } |
1674 | - if(!isset($hasFound) || !$hasFound) { |
|
1674 | + if (!isset($hasFound) || !$hasFound) { |
|
1675 | 1675 | throw new \Exception('Cannot determine UUID attribute'); |
1676 | 1676 | } |
1677 | 1677 | } else { |
@@ -1688,7 +1688,7 @@ discard block |
||
1688 | 1688 | $uuid = $this->formatGuid2ForFilterUser($uuid); |
1689 | 1689 | } |
1690 | 1690 | |
1691 | - $filter = $uuidAttr . '=' . $uuid; |
|
1691 | + $filter = $uuidAttr.'='.$uuid; |
|
1692 | 1692 | $result = $this->searchUsers($filter, ['dn'], 2); |
1693 | 1693 | if (is_array($result) && isset($result[0]) && isset($result[0]['dn']) && count($result) === 1) { |
1694 | 1694 | // we put the count into account to make sure that this is |
@@ -1817,8 +1817,8 @@ discard block |
||
1817 | 1817 | for ($k = 1; $k <= 2; ++$k) { |
1818 | 1818 | $hex_guid_to_guid_str .= substr($hex_guid, 16 - 2 * $k, 2); |
1819 | 1819 | } |
1820 | - $hex_guid_to_guid_str .= '-' . substr($hex_guid, 16, 4); |
|
1821 | - $hex_guid_to_guid_str .= '-' . substr($hex_guid, 20); |
|
1820 | + $hex_guid_to_guid_str .= '-'.substr($hex_guid, 16, 4); |
|
1821 | + $hex_guid_to_guid_str .= '-'.substr($hex_guid, 20); |
|
1822 | 1822 | |
1823 | 1823 | return strtoupper($hex_guid_to_guid_str); |
1824 | 1824 | } |
@@ -1852,20 +1852,20 @@ discard block |
||
1852 | 1852 | * user. Instead we write a log message. |
1853 | 1853 | */ |
1854 | 1854 | \OC::$server->getLogger()->info( |
1855 | - 'Passed string does not resemble a valid GUID. Known UUID ' . |
|
1855 | + 'Passed string does not resemble a valid GUID. Known UUID '. |
|
1856 | 1856 | '({uuid}) probably does not match UUID configuration.', |
1857 | - [ 'app' => 'user_ldap', 'uuid' => $guid ] |
|
1857 | + ['app' => 'user_ldap', 'uuid' => $guid] |
|
1858 | 1858 | ); |
1859 | 1859 | return $guid; |
1860 | 1860 | } |
1861 | - for ($i=0; $i < 3; $i++) { |
|
1861 | + for ($i = 0; $i < 3; $i++) { |
|
1862 | 1862 | $pairs = str_split($blocks[$i], 2); |
1863 | 1863 | $pairs = array_reverse($pairs); |
1864 | 1864 | $blocks[$i] = implode('', $pairs); |
1865 | 1865 | } |
1866 | - for ($i=0; $i < 5; $i++) { |
|
1866 | + for ($i = 0; $i < 5; $i++) { |
|
1867 | 1867 | $pairs = str_split($blocks[$i], 2); |
1868 | - $blocks[$i] = '\\' . implode('\\', $pairs); |
|
1868 | + $blocks[$i] = '\\'.implode('\\', $pairs); |
|
1869 | 1869 | } |
1870 | 1870 | return implode('', $blocks); |
1871 | 1871 | } |
@@ -1946,7 +1946,7 @@ discard block |
||
1946 | 1946 | |
1947 | 1947 | foreach ($bases as $base) { |
1948 | 1948 | $belongsToBase = true; |
1949 | - if (mb_strripos($dn, $base, 0, 'UTF-8') !== (mb_strlen($dn, 'UTF-8')-mb_strlen($base, 'UTF-8'))) { |
|
1949 | + if (mb_strripos($dn, $base, 0, 'UTF-8') !== (mb_strlen($dn, 'UTF-8') - mb_strlen($base, 'UTF-8'))) { |
|
1950 | 1950 | $belongsToBase = false; |
1951 | 1951 | } |
1952 | 1952 | if ($belongsToBase) { |
@@ -1962,7 +1962,7 @@ discard block |
||
1962 | 1962 | * @throws ServerNotAvailableException |
1963 | 1963 | */ |
1964 | 1964 | private function abandonPagedSearch() { |
1965 | - if($this->lastCookie === '') { |
|
1965 | + if ($this->lastCookie === '') { |
|
1966 | 1966 | return; |
1967 | 1967 | } |
1968 | 1968 | $cr = $this->connection->getConnectionResource(); |
@@ -2033,14 +2033,14 @@ discard block |
||
2033 | 2033 | ] |
2034 | 2034 | ); |
2035 | 2035 | //get the cookie from the search for the previous search, required by LDAP |
2036 | - if(empty($this->lastCookie) && $this->lastCookie !== "0" && ($offset > 0)) { |
|
2036 | + if (empty($this->lastCookie) && $this->lastCookie !== "0" && ($offset > 0)) { |
|
2037 | 2037 | // no cookie known from a potential previous search. We need |
2038 | 2038 | // to start from 0 to come to the desired page. cookie value |
2039 | 2039 | // of '0' is valid, because 389ds |
2040 | 2040 | $reOffset = ($offset - $limit) < 0 ? 0 : $offset - $limit; |
2041 | 2041 | $this->search($filter, $base, $attr, $limit, $reOffset, true); |
2042 | 2042 | } |
2043 | - if($this->lastCookie !== '' && $offset === 0) { |
|
2043 | + if ($this->lastCookie !== '' && $offset === 0) { |
|
2044 | 2044 | //since offset = 0, this is a new search. We abandon other searches that might be ongoing. |
2045 | 2045 | $this->abandonPagedSearch(); |
2046 | 2046 | } |
@@ -2048,7 +2048,7 @@ discard block |
||
2048 | 2048 | 'controlPagedResult', $this->connection->getConnectionResource(), $limit, false |
2049 | 2049 | ); |
2050 | 2050 | if ($pagedSearchOK) { |
2051 | - \OC::$server->getLogger()->debug('Ready for a paged search',['app' => 'user_ldap']); |
|
2051 | + \OC::$server->getLogger()->debug('Ready for a paged search', ['app' => 'user_ldap']); |
|
2052 | 2052 | } |
2053 | 2053 | /* ++ Fixing RHDS searches with pages with zero results ++ |
2054 | 2054 | * We coudn't get paged searches working with our RHDS for login ($limit = 0), |
@@ -2063,7 +2063,7 @@ discard block |
||
2063 | 2063 | $this->abandonPagedSearch(); |
2064 | 2064 | // in case someone set it to 0 … use 500, otherwise no results will |
2065 | 2065 | // be returned. |
2066 | - $pageSize = (int)$this->connection->ldapPagingSize > 0 ? (int)$this->connection->ldapPagingSize : 500; |
|
2066 | + $pageSize = (int) $this->connection->ldapPagingSize > 0 ? (int) $this->connection->ldapPagingSize : 500; |
|
2067 | 2067 | $pagedSearchOK = $this->invokeLDAPMethod('controlPagedResult', |
2068 | 2068 | $this->connection->getConnectionResource(), |
2069 | 2069 | $pageSize, false); |
@@ -6,67 +6,67 @@ |
||
6 | 6 | $baseDir = $vendorDir; |
7 | 7 | |
8 | 8 | return array( |
9 | - 'OCA\\User_LDAP\\Access' => $baseDir . '/../lib/Access.php', |
|
10 | - 'OCA\\User_LDAP\\AccessFactory' => $baseDir . '/../lib/AccessFactory.php', |
|
11 | - 'OCA\\User_LDAP\\AppInfo\\Application' => $baseDir . '/../lib/AppInfo/Application.php', |
|
12 | - 'OCA\\User_LDAP\\BackendUtility' => $baseDir . '/../lib/BackendUtility.php', |
|
13 | - 'OCA\\User_LDAP\\Command\\CheckUser' => $baseDir . '/../lib/Command/CheckUser.php', |
|
14 | - 'OCA\\User_LDAP\\Command\\CreateEmptyConfig' => $baseDir . '/../lib/Command/CreateEmptyConfig.php', |
|
15 | - 'OCA\\User_LDAP\\Command\\DeleteConfig' => $baseDir . '/../lib/Command/DeleteConfig.php', |
|
16 | - 'OCA\\User_LDAP\\Command\\Search' => $baseDir . '/../lib/Command/Search.php', |
|
17 | - 'OCA\\User_LDAP\\Command\\SetConfig' => $baseDir . '/../lib/Command/SetConfig.php', |
|
18 | - 'OCA\\User_LDAP\\Command\\ShowConfig' => $baseDir . '/../lib/Command/ShowConfig.php', |
|
19 | - 'OCA\\User_LDAP\\Command\\ShowRemnants' => $baseDir . '/../lib/Command/ShowRemnants.php', |
|
20 | - 'OCA\\User_LDAP\\Command\\TestConfig' => $baseDir . '/../lib/Command/TestConfig.php', |
|
21 | - 'OCA\\User_LDAP\\Configuration' => $baseDir . '/../lib/Configuration.php', |
|
22 | - 'OCA\\User_LDAP\\Connection' => $baseDir . '/../lib/Connection.php', |
|
23 | - 'OCA\\User_LDAP\\ConnectionFactory' => $baseDir . '/../lib/ConnectionFactory.php', |
|
24 | - 'OCA\\User_LDAP\\Controller\\ConfigAPIController' => $baseDir . '/../lib/Controller/ConfigAPIController.php', |
|
25 | - 'OCA\\User_LDAP\\Controller\\RenewPasswordController' => $baseDir . '/../lib/Controller/RenewPasswordController.php', |
|
26 | - 'OCA\\User_LDAP\\Exceptions\\AttributeNotSet' => $baseDir . '/../lib/Exceptions/AttributeNotSet.php', |
|
27 | - 'OCA\\User_LDAP\\Exceptions\\ConstraintViolationException' => $baseDir . '/../lib/Exceptions/ConstraintViolationException.php', |
|
28 | - 'OCA\\User_LDAP\\Exceptions\\NotOnLDAP' => $baseDir . '/../lib/Exceptions/NotOnLDAP.php', |
|
29 | - 'OCA\\User_LDAP\\FilesystemHelper' => $baseDir . '/../lib/FilesystemHelper.php', |
|
30 | - 'OCA\\User_LDAP\\GroupPluginManager' => $baseDir . '/../lib/GroupPluginManager.php', |
|
31 | - 'OCA\\User_LDAP\\Group_LDAP' => $baseDir . '/../lib/Group_LDAP.php', |
|
32 | - 'OCA\\User_LDAP\\Group_Proxy' => $baseDir . '/../lib/Group_Proxy.php', |
|
33 | - 'OCA\\User_LDAP\\Handler\\ExtStorageConfigHandler' => $baseDir . '/../lib/Handler/ExtStorageConfigHandler.php', |
|
34 | - 'OCA\\User_LDAP\\Helper' => $baseDir . '/../lib/Helper.php', |
|
35 | - 'OCA\\User_LDAP\\IGroupLDAP' => $baseDir . '/../lib/IGroupLDAP.php', |
|
36 | - 'OCA\\User_LDAP\\ILDAPGroupPlugin' => $baseDir . '/../lib/ILDAPGroupPlugin.php', |
|
37 | - 'OCA\\User_LDAP\\ILDAPUserPlugin' => $baseDir . '/../lib/ILDAPUserPlugin.php', |
|
38 | - 'OCA\\User_LDAP\\ILDAPWrapper' => $baseDir . '/../lib/ILDAPWrapper.php', |
|
39 | - 'OCA\\User_LDAP\\IUserLDAP' => $baseDir . '/../lib/IUserLDAP.php', |
|
40 | - 'OCA\\User_LDAP\\Jobs\\CleanUp' => $baseDir . '/../lib/Jobs/CleanUp.php', |
|
41 | - 'OCA\\User_LDAP\\Jobs\\Sync' => $baseDir . '/../lib/Jobs/Sync.php', |
|
42 | - 'OCA\\User_LDAP\\Jobs\\UpdateGroups' => $baseDir . '/../lib/Jobs/UpdateGroups.php', |
|
43 | - 'OCA\\User_LDAP\\LDAP' => $baseDir . '/../lib/LDAP.php', |
|
44 | - 'OCA\\User_LDAP\\LDAPProvider' => $baseDir . '/../lib/LDAPProvider.php', |
|
45 | - 'OCA\\User_LDAP\\LDAPProviderFactory' => $baseDir . '/../lib/LDAPProviderFactory.php', |
|
46 | - 'OCA\\User_LDAP\\LDAPUtility' => $baseDir . '/../lib/LDAPUtility.php', |
|
47 | - 'OCA\\User_LDAP\\LogWrapper' => $baseDir . '/../lib/LogWrapper.php', |
|
48 | - 'OCA\\User_LDAP\\Mapping\\AbstractMapping' => $baseDir . '/../lib/Mapping/AbstractMapping.php', |
|
49 | - 'OCA\\User_LDAP\\Mapping\\GroupMapping' => $baseDir . '/../lib/Mapping/GroupMapping.php', |
|
50 | - 'OCA\\User_LDAP\\Mapping\\UserMapping' => $baseDir . '/../lib/Mapping/UserMapping.php', |
|
51 | - 'OCA\\User_LDAP\\Migration\\UUIDFix' => $baseDir . '/../lib/Migration/UUIDFix.php', |
|
52 | - 'OCA\\User_LDAP\\Migration\\UUIDFixGroup' => $baseDir . '/../lib/Migration/UUIDFixGroup.php', |
|
53 | - 'OCA\\User_LDAP\\Migration\\UUIDFixInsert' => $baseDir . '/../lib/Migration/UUIDFixInsert.php', |
|
54 | - 'OCA\\User_LDAP\\Migration\\UUIDFixUser' => $baseDir . '/../lib/Migration/UUIDFixUser.php', |
|
55 | - 'OCA\\User_LDAP\\Notification\\Notifier' => $baseDir . '/../lib/Notification/Notifier.php', |
|
56 | - 'OCA\\User_LDAP\\PagedResults\\IAdapter' => $baseDir . '/../lib/PagedResults/IAdapter.php', |
|
57 | - 'OCA\\User_LDAP\\PagedResults\\Php54' => $baseDir . '/../lib/PagedResults/Php54.php', |
|
58 | - 'OCA\\User_LDAP\\PagedResults\\Php73' => $baseDir . '/../lib/PagedResults/Php73.php', |
|
59 | - 'OCA\\User_LDAP\\PagedResults\\TLinkId' => $baseDir . '/../lib/PagedResults/TLinkId.php', |
|
60 | - 'OCA\\User_LDAP\\Proxy' => $baseDir . '/../lib/Proxy.php', |
|
61 | - 'OCA\\User_LDAP\\Settings\\Admin' => $baseDir . '/../lib/Settings/Admin.php', |
|
62 | - 'OCA\\User_LDAP\\Settings\\Section' => $baseDir . '/../lib/Settings/Section.php', |
|
63 | - 'OCA\\User_LDAP\\UserPluginManager' => $baseDir . '/../lib/UserPluginManager.php', |
|
64 | - 'OCA\\User_LDAP\\User\\DeletedUsersIndex' => $baseDir . '/../lib/User/DeletedUsersIndex.php', |
|
65 | - 'OCA\\User_LDAP\\User\\Manager' => $baseDir . '/../lib/User/Manager.php', |
|
66 | - 'OCA\\User_LDAP\\User\\OfflineUser' => $baseDir . '/../lib/User/OfflineUser.php', |
|
67 | - 'OCA\\User_LDAP\\User\\User' => $baseDir . '/../lib/User/User.php', |
|
68 | - 'OCA\\User_LDAP\\User_LDAP' => $baseDir . '/../lib/User_LDAP.php', |
|
69 | - 'OCA\\User_LDAP\\User_Proxy' => $baseDir . '/../lib/User_Proxy.php', |
|
70 | - 'OCA\\User_LDAP\\Wizard' => $baseDir . '/../lib/Wizard.php', |
|
71 | - 'OCA\\User_LDAP\\WizardResult' => $baseDir . '/../lib/WizardResult.php', |
|
9 | + 'OCA\\User_LDAP\\Access' => $baseDir.'/../lib/Access.php', |
|
10 | + 'OCA\\User_LDAP\\AccessFactory' => $baseDir.'/../lib/AccessFactory.php', |
|
11 | + 'OCA\\User_LDAP\\AppInfo\\Application' => $baseDir.'/../lib/AppInfo/Application.php', |
|
12 | + 'OCA\\User_LDAP\\BackendUtility' => $baseDir.'/../lib/BackendUtility.php', |
|
13 | + 'OCA\\User_LDAP\\Command\\CheckUser' => $baseDir.'/../lib/Command/CheckUser.php', |
|
14 | + 'OCA\\User_LDAP\\Command\\CreateEmptyConfig' => $baseDir.'/../lib/Command/CreateEmptyConfig.php', |
|
15 | + 'OCA\\User_LDAP\\Command\\DeleteConfig' => $baseDir.'/../lib/Command/DeleteConfig.php', |
|
16 | + 'OCA\\User_LDAP\\Command\\Search' => $baseDir.'/../lib/Command/Search.php', |
|
17 | + 'OCA\\User_LDAP\\Command\\SetConfig' => $baseDir.'/../lib/Command/SetConfig.php', |
|
18 | + 'OCA\\User_LDAP\\Command\\ShowConfig' => $baseDir.'/../lib/Command/ShowConfig.php', |
|
19 | + 'OCA\\User_LDAP\\Command\\ShowRemnants' => $baseDir.'/../lib/Command/ShowRemnants.php', |
|
20 | + 'OCA\\User_LDAP\\Command\\TestConfig' => $baseDir.'/../lib/Command/TestConfig.php', |
|
21 | + 'OCA\\User_LDAP\\Configuration' => $baseDir.'/../lib/Configuration.php', |
|
22 | + 'OCA\\User_LDAP\\Connection' => $baseDir.'/../lib/Connection.php', |
|
23 | + 'OCA\\User_LDAP\\ConnectionFactory' => $baseDir.'/../lib/ConnectionFactory.php', |
|
24 | + 'OCA\\User_LDAP\\Controller\\ConfigAPIController' => $baseDir.'/../lib/Controller/ConfigAPIController.php', |
|
25 | + 'OCA\\User_LDAP\\Controller\\RenewPasswordController' => $baseDir.'/../lib/Controller/RenewPasswordController.php', |
|
26 | + 'OCA\\User_LDAP\\Exceptions\\AttributeNotSet' => $baseDir.'/../lib/Exceptions/AttributeNotSet.php', |
|
27 | + 'OCA\\User_LDAP\\Exceptions\\ConstraintViolationException' => $baseDir.'/../lib/Exceptions/ConstraintViolationException.php', |
|
28 | + 'OCA\\User_LDAP\\Exceptions\\NotOnLDAP' => $baseDir.'/../lib/Exceptions/NotOnLDAP.php', |
|
29 | + 'OCA\\User_LDAP\\FilesystemHelper' => $baseDir.'/../lib/FilesystemHelper.php', |
|
30 | + 'OCA\\User_LDAP\\GroupPluginManager' => $baseDir.'/../lib/GroupPluginManager.php', |
|
31 | + 'OCA\\User_LDAP\\Group_LDAP' => $baseDir.'/../lib/Group_LDAP.php', |
|
32 | + 'OCA\\User_LDAP\\Group_Proxy' => $baseDir.'/../lib/Group_Proxy.php', |
|
33 | + 'OCA\\User_LDAP\\Handler\\ExtStorageConfigHandler' => $baseDir.'/../lib/Handler/ExtStorageConfigHandler.php', |
|
34 | + 'OCA\\User_LDAP\\Helper' => $baseDir.'/../lib/Helper.php', |
|
35 | + 'OCA\\User_LDAP\\IGroupLDAP' => $baseDir.'/../lib/IGroupLDAP.php', |
|
36 | + 'OCA\\User_LDAP\\ILDAPGroupPlugin' => $baseDir.'/../lib/ILDAPGroupPlugin.php', |
|
37 | + 'OCA\\User_LDAP\\ILDAPUserPlugin' => $baseDir.'/../lib/ILDAPUserPlugin.php', |
|
38 | + 'OCA\\User_LDAP\\ILDAPWrapper' => $baseDir.'/../lib/ILDAPWrapper.php', |
|
39 | + 'OCA\\User_LDAP\\IUserLDAP' => $baseDir.'/../lib/IUserLDAP.php', |
|
40 | + 'OCA\\User_LDAP\\Jobs\\CleanUp' => $baseDir.'/../lib/Jobs/CleanUp.php', |
|
41 | + 'OCA\\User_LDAP\\Jobs\\Sync' => $baseDir.'/../lib/Jobs/Sync.php', |
|
42 | + 'OCA\\User_LDAP\\Jobs\\UpdateGroups' => $baseDir.'/../lib/Jobs/UpdateGroups.php', |
|
43 | + 'OCA\\User_LDAP\\LDAP' => $baseDir.'/../lib/LDAP.php', |
|
44 | + 'OCA\\User_LDAP\\LDAPProvider' => $baseDir.'/../lib/LDAPProvider.php', |
|
45 | + 'OCA\\User_LDAP\\LDAPProviderFactory' => $baseDir.'/../lib/LDAPProviderFactory.php', |
|
46 | + 'OCA\\User_LDAP\\LDAPUtility' => $baseDir.'/../lib/LDAPUtility.php', |
|
47 | + 'OCA\\User_LDAP\\LogWrapper' => $baseDir.'/../lib/LogWrapper.php', |
|
48 | + 'OCA\\User_LDAP\\Mapping\\AbstractMapping' => $baseDir.'/../lib/Mapping/AbstractMapping.php', |
|
49 | + 'OCA\\User_LDAP\\Mapping\\GroupMapping' => $baseDir.'/../lib/Mapping/GroupMapping.php', |
|
50 | + 'OCA\\User_LDAP\\Mapping\\UserMapping' => $baseDir.'/../lib/Mapping/UserMapping.php', |
|
51 | + 'OCA\\User_LDAP\\Migration\\UUIDFix' => $baseDir.'/../lib/Migration/UUIDFix.php', |
|
52 | + 'OCA\\User_LDAP\\Migration\\UUIDFixGroup' => $baseDir.'/../lib/Migration/UUIDFixGroup.php', |
|
53 | + 'OCA\\User_LDAP\\Migration\\UUIDFixInsert' => $baseDir.'/../lib/Migration/UUIDFixInsert.php', |
|
54 | + 'OCA\\User_LDAP\\Migration\\UUIDFixUser' => $baseDir.'/../lib/Migration/UUIDFixUser.php', |
|
55 | + 'OCA\\User_LDAP\\Notification\\Notifier' => $baseDir.'/../lib/Notification/Notifier.php', |
|
56 | + 'OCA\\User_LDAP\\PagedResults\\IAdapter' => $baseDir.'/../lib/PagedResults/IAdapter.php', |
|
57 | + 'OCA\\User_LDAP\\PagedResults\\Php54' => $baseDir.'/../lib/PagedResults/Php54.php', |
|
58 | + 'OCA\\User_LDAP\\PagedResults\\Php73' => $baseDir.'/../lib/PagedResults/Php73.php', |
|
59 | + 'OCA\\User_LDAP\\PagedResults\\TLinkId' => $baseDir.'/../lib/PagedResults/TLinkId.php', |
|
60 | + 'OCA\\User_LDAP\\Proxy' => $baseDir.'/../lib/Proxy.php', |
|
61 | + 'OCA\\User_LDAP\\Settings\\Admin' => $baseDir.'/../lib/Settings/Admin.php', |
|
62 | + 'OCA\\User_LDAP\\Settings\\Section' => $baseDir.'/../lib/Settings/Section.php', |
|
63 | + 'OCA\\User_LDAP\\UserPluginManager' => $baseDir.'/../lib/UserPluginManager.php', |
|
64 | + 'OCA\\User_LDAP\\User\\DeletedUsersIndex' => $baseDir.'/../lib/User/DeletedUsersIndex.php', |
|
65 | + 'OCA\\User_LDAP\\User\\Manager' => $baseDir.'/../lib/User/Manager.php', |
|
66 | + 'OCA\\User_LDAP\\User\\OfflineUser' => $baseDir.'/../lib/User/OfflineUser.php', |
|
67 | + 'OCA\\User_LDAP\\User\\User' => $baseDir.'/../lib/User/User.php', |
|
68 | + 'OCA\\User_LDAP\\User_LDAP' => $baseDir.'/../lib/User_LDAP.php', |
|
69 | + 'OCA\\User_LDAP\\User_Proxy' => $baseDir.'/../lib/User_Proxy.php', |
|
70 | + 'OCA\\User_LDAP\\Wizard' => $baseDir.'/../lib/Wizard.php', |
|
71 | + 'OCA\\User_LDAP\\WizardResult' => $baseDir.'/../lib/WizardResult.php', |
|
72 | 72 | ); |
@@ -6,89 +6,89 @@ |
||
6 | 6 | |
7 | 7 | class ComposerStaticInitUser_LDAP |
8 | 8 | { |
9 | - public static $prefixLengthsPsr4 = array ( |
|
9 | + public static $prefixLengthsPsr4 = array( |
|
10 | 10 | 'O' => |
11 | - array ( |
|
11 | + array( |
|
12 | 12 | 'OCA\\User_LDAP\\' => 14, |
13 | 13 | ), |
14 | 14 | ); |
15 | 15 | |
16 | - public static $prefixDirsPsr4 = array ( |
|
16 | + public static $prefixDirsPsr4 = array( |
|
17 | 17 | 'OCA\\User_LDAP\\' => |
18 | - array ( |
|
19 | - 0 => __DIR__ . '/..' . '/../lib', |
|
18 | + array( |
|
19 | + 0 => __DIR__.'/..'.'/../lib', |
|
20 | 20 | ), |
21 | 21 | ); |
22 | 22 | |
23 | - public static $classMap = array ( |
|
24 | - 'OCA\\User_LDAP\\Access' => __DIR__ . '/..' . '/../lib/Access.php', |
|
25 | - 'OCA\\User_LDAP\\AccessFactory' => __DIR__ . '/..' . '/../lib/AccessFactory.php', |
|
26 | - 'OCA\\User_LDAP\\AppInfo\\Application' => __DIR__ . '/..' . '/../lib/AppInfo/Application.php', |
|
27 | - 'OCA\\User_LDAP\\BackendUtility' => __DIR__ . '/..' . '/../lib/BackendUtility.php', |
|
28 | - 'OCA\\User_LDAP\\Command\\CheckUser' => __DIR__ . '/..' . '/../lib/Command/CheckUser.php', |
|
29 | - 'OCA\\User_LDAP\\Command\\CreateEmptyConfig' => __DIR__ . '/..' . '/../lib/Command/CreateEmptyConfig.php', |
|
30 | - 'OCA\\User_LDAP\\Command\\DeleteConfig' => __DIR__ . '/..' . '/../lib/Command/DeleteConfig.php', |
|
31 | - 'OCA\\User_LDAP\\Command\\Search' => __DIR__ . '/..' . '/../lib/Command/Search.php', |
|
32 | - 'OCA\\User_LDAP\\Command\\SetConfig' => __DIR__ . '/..' . '/../lib/Command/SetConfig.php', |
|
33 | - 'OCA\\User_LDAP\\Command\\ShowConfig' => __DIR__ . '/..' . '/../lib/Command/ShowConfig.php', |
|
34 | - 'OCA\\User_LDAP\\Command\\ShowRemnants' => __DIR__ . '/..' . '/../lib/Command/ShowRemnants.php', |
|
35 | - 'OCA\\User_LDAP\\Command\\TestConfig' => __DIR__ . '/..' . '/../lib/Command/TestConfig.php', |
|
36 | - 'OCA\\User_LDAP\\Configuration' => __DIR__ . '/..' . '/../lib/Configuration.php', |
|
37 | - 'OCA\\User_LDAP\\Connection' => __DIR__ . '/..' . '/../lib/Connection.php', |
|
38 | - 'OCA\\User_LDAP\\ConnectionFactory' => __DIR__ . '/..' . '/../lib/ConnectionFactory.php', |
|
39 | - 'OCA\\User_LDAP\\Controller\\ConfigAPIController' => __DIR__ . '/..' . '/../lib/Controller/ConfigAPIController.php', |
|
40 | - 'OCA\\User_LDAP\\Controller\\RenewPasswordController' => __DIR__ . '/..' . '/../lib/Controller/RenewPasswordController.php', |
|
41 | - 'OCA\\User_LDAP\\Exceptions\\AttributeNotSet' => __DIR__ . '/..' . '/../lib/Exceptions/AttributeNotSet.php', |
|
42 | - 'OCA\\User_LDAP\\Exceptions\\ConstraintViolationException' => __DIR__ . '/..' . '/../lib/Exceptions/ConstraintViolationException.php', |
|
43 | - 'OCA\\User_LDAP\\Exceptions\\NotOnLDAP' => __DIR__ . '/..' . '/../lib/Exceptions/NotOnLDAP.php', |
|
44 | - 'OCA\\User_LDAP\\FilesystemHelper' => __DIR__ . '/..' . '/../lib/FilesystemHelper.php', |
|
45 | - 'OCA\\User_LDAP\\GroupPluginManager' => __DIR__ . '/..' . '/../lib/GroupPluginManager.php', |
|
46 | - 'OCA\\User_LDAP\\Group_LDAP' => __DIR__ . '/..' . '/../lib/Group_LDAP.php', |
|
47 | - 'OCA\\User_LDAP\\Group_Proxy' => __DIR__ . '/..' . '/../lib/Group_Proxy.php', |
|
48 | - 'OCA\\User_LDAP\\Handler\\ExtStorageConfigHandler' => __DIR__ . '/..' . '/../lib/Handler/ExtStorageConfigHandler.php', |
|
49 | - 'OCA\\User_LDAP\\Helper' => __DIR__ . '/..' . '/../lib/Helper.php', |
|
50 | - 'OCA\\User_LDAP\\IGroupLDAP' => __DIR__ . '/..' . '/../lib/IGroupLDAP.php', |
|
51 | - 'OCA\\User_LDAP\\ILDAPGroupPlugin' => __DIR__ . '/..' . '/../lib/ILDAPGroupPlugin.php', |
|
52 | - 'OCA\\User_LDAP\\ILDAPUserPlugin' => __DIR__ . '/..' . '/../lib/ILDAPUserPlugin.php', |
|
53 | - 'OCA\\User_LDAP\\ILDAPWrapper' => __DIR__ . '/..' . '/../lib/ILDAPWrapper.php', |
|
54 | - 'OCA\\User_LDAP\\IUserLDAP' => __DIR__ . '/..' . '/../lib/IUserLDAP.php', |
|
55 | - 'OCA\\User_LDAP\\Jobs\\CleanUp' => __DIR__ . '/..' . '/../lib/Jobs/CleanUp.php', |
|
56 | - 'OCA\\User_LDAP\\Jobs\\Sync' => __DIR__ . '/..' . '/../lib/Jobs/Sync.php', |
|
57 | - 'OCA\\User_LDAP\\Jobs\\UpdateGroups' => __DIR__ . '/..' . '/../lib/Jobs/UpdateGroups.php', |
|
58 | - 'OCA\\User_LDAP\\LDAP' => __DIR__ . '/..' . '/../lib/LDAP.php', |
|
59 | - 'OCA\\User_LDAP\\LDAPProvider' => __DIR__ . '/..' . '/../lib/LDAPProvider.php', |
|
60 | - 'OCA\\User_LDAP\\LDAPProviderFactory' => __DIR__ . '/..' . '/../lib/LDAPProviderFactory.php', |
|
61 | - 'OCA\\User_LDAP\\LDAPUtility' => __DIR__ . '/..' . '/../lib/LDAPUtility.php', |
|
62 | - 'OCA\\User_LDAP\\LogWrapper' => __DIR__ . '/..' . '/../lib/LogWrapper.php', |
|
63 | - 'OCA\\User_LDAP\\Mapping\\AbstractMapping' => __DIR__ . '/..' . '/../lib/Mapping/AbstractMapping.php', |
|
64 | - 'OCA\\User_LDAP\\Mapping\\GroupMapping' => __DIR__ . '/..' . '/../lib/Mapping/GroupMapping.php', |
|
65 | - 'OCA\\User_LDAP\\Mapping\\UserMapping' => __DIR__ . '/..' . '/../lib/Mapping/UserMapping.php', |
|
66 | - 'OCA\\User_LDAP\\Migration\\UUIDFix' => __DIR__ . '/..' . '/../lib/Migration/UUIDFix.php', |
|
67 | - 'OCA\\User_LDAP\\Migration\\UUIDFixGroup' => __DIR__ . '/..' . '/../lib/Migration/UUIDFixGroup.php', |
|
68 | - 'OCA\\User_LDAP\\Migration\\UUIDFixInsert' => __DIR__ . '/..' . '/../lib/Migration/UUIDFixInsert.php', |
|
69 | - 'OCA\\User_LDAP\\Migration\\UUIDFixUser' => __DIR__ . '/..' . '/../lib/Migration/UUIDFixUser.php', |
|
70 | - 'OCA\\User_LDAP\\Notification\\Notifier' => __DIR__ . '/..' . '/../lib/Notification/Notifier.php', |
|
71 | - 'OCA\\User_LDAP\\PagedResults\\IAdapter' => __DIR__ . '/..' . '/../lib/PagedResults/IAdapter.php', |
|
72 | - 'OCA\\User_LDAP\\PagedResults\\Php54' => __DIR__ . '/..' . '/../lib/PagedResults/Php54.php', |
|
73 | - 'OCA\\User_LDAP\\PagedResults\\Php73' => __DIR__ . '/..' . '/../lib/PagedResults/Php73.php', |
|
74 | - 'OCA\\User_LDAP\\PagedResults\\TLinkId' => __DIR__ . '/..' . '/../lib/PagedResults/TLinkId.php', |
|
75 | - 'OCA\\User_LDAP\\Proxy' => __DIR__ . '/..' . '/../lib/Proxy.php', |
|
76 | - 'OCA\\User_LDAP\\Settings\\Admin' => __DIR__ . '/..' . '/../lib/Settings/Admin.php', |
|
77 | - 'OCA\\User_LDAP\\Settings\\Section' => __DIR__ . '/..' . '/../lib/Settings/Section.php', |
|
78 | - 'OCA\\User_LDAP\\UserPluginManager' => __DIR__ . '/..' . '/../lib/UserPluginManager.php', |
|
79 | - 'OCA\\User_LDAP\\User\\DeletedUsersIndex' => __DIR__ . '/..' . '/../lib/User/DeletedUsersIndex.php', |
|
80 | - 'OCA\\User_LDAP\\User\\Manager' => __DIR__ . '/..' . '/../lib/User/Manager.php', |
|
81 | - 'OCA\\User_LDAP\\User\\OfflineUser' => __DIR__ . '/..' . '/../lib/User/OfflineUser.php', |
|
82 | - 'OCA\\User_LDAP\\User\\User' => __DIR__ . '/..' . '/../lib/User/User.php', |
|
83 | - 'OCA\\User_LDAP\\User_LDAP' => __DIR__ . '/..' . '/../lib/User_LDAP.php', |
|
84 | - 'OCA\\User_LDAP\\User_Proxy' => __DIR__ . '/..' . '/../lib/User_Proxy.php', |
|
85 | - 'OCA\\User_LDAP\\Wizard' => __DIR__ . '/..' . '/../lib/Wizard.php', |
|
86 | - 'OCA\\User_LDAP\\WizardResult' => __DIR__ . '/..' . '/../lib/WizardResult.php', |
|
23 | + public static $classMap = array( |
|
24 | + 'OCA\\User_LDAP\\Access' => __DIR__.'/..'.'/../lib/Access.php', |
|
25 | + 'OCA\\User_LDAP\\AccessFactory' => __DIR__.'/..'.'/../lib/AccessFactory.php', |
|
26 | + 'OCA\\User_LDAP\\AppInfo\\Application' => __DIR__.'/..'.'/../lib/AppInfo/Application.php', |
|
27 | + 'OCA\\User_LDAP\\BackendUtility' => __DIR__.'/..'.'/../lib/BackendUtility.php', |
|
28 | + 'OCA\\User_LDAP\\Command\\CheckUser' => __DIR__.'/..'.'/../lib/Command/CheckUser.php', |
|
29 | + 'OCA\\User_LDAP\\Command\\CreateEmptyConfig' => __DIR__.'/..'.'/../lib/Command/CreateEmptyConfig.php', |
|
30 | + 'OCA\\User_LDAP\\Command\\DeleteConfig' => __DIR__.'/..'.'/../lib/Command/DeleteConfig.php', |
|
31 | + 'OCA\\User_LDAP\\Command\\Search' => __DIR__.'/..'.'/../lib/Command/Search.php', |
|
32 | + 'OCA\\User_LDAP\\Command\\SetConfig' => __DIR__.'/..'.'/../lib/Command/SetConfig.php', |
|
33 | + 'OCA\\User_LDAP\\Command\\ShowConfig' => __DIR__.'/..'.'/../lib/Command/ShowConfig.php', |
|
34 | + 'OCA\\User_LDAP\\Command\\ShowRemnants' => __DIR__.'/..'.'/../lib/Command/ShowRemnants.php', |
|
35 | + 'OCA\\User_LDAP\\Command\\TestConfig' => __DIR__.'/..'.'/../lib/Command/TestConfig.php', |
|
36 | + 'OCA\\User_LDAP\\Configuration' => __DIR__.'/..'.'/../lib/Configuration.php', |
|
37 | + 'OCA\\User_LDAP\\Connection' => __DIR__.'/..'.'/../lib/Connection.php', |
|
38 | + 'OCA\\User_LDAP\\ConnectionFactory' => __DIR__.'/..'.'/../lib/ConnectionFactory.php', |
|
39 | + 'OCA\\User_LDAP\\Controller\\ConfigAPIController' => __DIR__.'/..'.'/../lib/Controller/ConfigAPIController.php', |
|
40 | + 'OCA\\User_LDAP\\Controller\\RenewPasswordController' => __DIR__.'/..'.'/../lib/Controller/RenewPasswordController.php', |
|
41 | + 'OCA\\User_LDAP\\Exceptions\\AttributeNotSet' => __DIR__.'/..'.'/../lib/Exceptions/AttributeNotSet.php', |
|
42 | + 'OCA\\User_LDAP\\Exceptions\\ConstraintViolationException' => __DIR__.'/..'.'/../lib/Exceptions/ConstraintViolationException.php', |
|
43 | + 'OCA\\User_LDAP\\Exceptions\\NotOnLDAP' => __DIR__.'/..'.'/../lib/Exceptions/NotOnLDAP.php', |
|
44 | + 'OCA\\User_LDAP\\FilesystemHelper' => __DIR__.'/..'.'/../lib/FilesystemHelper.php', |
|
45 | + 'OCA\\User_LDAP\\GroupPluginManager' => __DIR__.'/..'.'/../lib/GroupPluginManager.php', |
|
46 | + 'OCA\\User_LDAP\\Group_LDAP' => __DIR__.'/..'.'/../lib/Group_LDAP.php', |
|
47 | + 'OCA\\User_LDAP\\Group_Proxy' => __DIR__.'/..'.'/../lib/Group_Proxy.php', |
|
48 | + 'OCA\\User_LDAP\\Handler\\ExtStorageConfigHandler' => __DIR__.'/..'.'/../lib/Handler/ExtStorageConfigHandler.php', |
|
49 | + 'OCA\\User_LDAP\\Helper' => __DIR__.'/..'.'/../lib/Helper.php', |
|
50 | + 'OCA\\User_LDAP\\IGroupLDAP' => __DIR__.'/..'.'/../lib/IGroupLDAP.php', |
|
51 | + 'OCA\\User_LDAP\\ILDAPGroupPlugin' => __DIR__.'/..'.'/../lib/ILDAPGroupPlugin.php', |
|
52 | + 'OCA\\User_LDAP\\ILDAPUserPlugin' => __DIR__.'/..'.'/../lib/ILDAPUserPlugin.php', |
|
53 | + 'OCA\\User_LDAP\\ILDAPWrapper' => __DIR__.'/..'.'/../lib/ILDAPWrapper.php', |
|
54 | + 'OCA\\User_LDAP\\IUserLDAP' => __DIR__.'/..'.'/../lib/IUserLDAP.php', |
|
55 | + 'OCA\\User_LDAP\\Jobs\\CleanUp' => __DIR__.'/..'.'/../lib/Jobs/CleanUp.php', |
|
56 | + 'OCA\\User_LDAP\\Jobs\\Sync' => __DIR__.'/..'.'/../lib/Jobs/Sync.php', |
|
57 | + 'OCA\\User_LDAP\\Jobs\\UpdateGroups' => __DIR__.'/..'.'/../lib/Jobs/UpdateGroups.php', |
|
58 | + 'OCA\\User_LDAP\\LDAP' => __DIR__.'/..'.'/../lib/LDAP.php', |
|
59 | + 'OCA\\User_LDAP\\LDAPProvider' => __DIR__.'/..'.'/../lib/LDAPProvider.php', |
|
60 | + 'OCA\\User_LDAP\\LDAPProviderFactory' => __DIR__.'/..'.'/../lib/LDAPProviderFactory.php', |
|
61 | + 'OCA\\User_LDAP\\LDAPUtility' => __DIR__.'/..'.'/../lib/LDAPUtility.php', |
|
62 | + 'OCA\\User_LDAP\\LogWrapper' => __DIR__.'/..'.'/../lib/LogWrapper.php', |
|
63 | + 'OCA\\User_LDAP\\Mapping\\AbstractMapping' => __DIR__.'/..'.'/../lib/Mapping/AbstractMapping.php', |
|
64 | + 'OCA\\User_LDAP\\Mapping\\GroupMapping' => __DIR__.'/..'.'/../lib/Mapping/GroupMapping.php', |
|
65 | + 'OCA\\User_LDAP\\Mapping\\UserMapping' => __DIR__.'/..'.'/../lib/Mapping/UserMapping.php', |
|
66 | + 'OCA\\User_LDAP\\Migration\\UUIDFix' => __DIR__.'/..'.'/../lib/Migration/UUIDFix.php', |
|
67 | + 'OCA\\User_LDAP\\Migration\\UUIDFixGroup' => __DIR__.'/..'.'/../lib/Migration/UUIDFixGroup.php', |
|
68 | + 'OCA\\User_LDAP\\Migration\\UUIDFixInsert' => __DIR__.'/..'.'/../lib/Migration/UUIDFixInsert.php', |
|
69 | + 'OCA\\User_LDAP\\Migration\\UUIDFixUser' => __DIR__.'/..'.'/../lib/Migration/UUIDFixUser.php', |
|
70 | + 'OCA\\User_LDAP\\Notification\\Notifier' => __DIR__.'/..'.'/../lib/Notification/Notifier.php', |
|
71 | + 'OCA\\User_LDAP\\PagedResults\\IAdapter' => __DIR__.'/..'.'/../lib/PagedResults/IAdapter.php', |
|
72 | + 'OCA\\User_LDAP\\PagedResults\\Php54' => __DIR__.'/..'.'/../lib/PagedResults/Php54.php', |
|
73 | + 'OCA\\User_LDAP\\PagedResults\\Php73' => __DIR__.'/..'.'/../lib/PagedResults/Php73.php', |
|
74 | + 'OCA\\User_LDAP\\PagedResults\\TLinkId' => __DIR__.'/..'.'/../lib/PagedResults/TLinkId.php', |
|
75 | + 'OCA\\User_LDAP\\Proxy' => __DIR__.'/..'.'/../lib/Proxy.php', |
|
76 | + 'OCA\\User_LDAP\\Settings\\Admin' => __DIR__.'/..'.'/../lib/Settings/Admin.php', |
|
77 | + 'OCA\\User_LDAP\\Settings\\Section' => __DIR__.'/..'.'/../lib/Settings/Section.php', |
|
78 | + 'OCA\\User_LDAP\\UserPluginManager' => __DIR__.'/..'.'/../lib/UserPluginManager.php', |
|
79 | + 'OCA\\User_LDAP\\User\\DeletedUsersIndex' => __DIR__.'/..'.'/../lib/User/DeletedUsersIndex.php', |
|
80 | + 'OCA\\User_LDAP\\User\\Manager' => __DIR__.'/..'.'/../lib/User/Manager.php', |
|
81 | + 'OCA\\User_LDAP\\User\\OfflineUser' => __DIR__.'/..'.'/../lib/User/OfflineUser.php', |
|
82 | + 'OCA\\User_LDAP\\User\\User' => __DIR__.'/..'.'/../lib/User/User.php', |
|
83 | + 'OCA\\User_LDAP\\User_LDAP' => __DIR__.'/..'.'/../lib/User_LDAP.php', |
|
84 | + 'OCA\\User_LDAP\\User_Proxy' => __DIR__.'/..'.'/../lib/User_Proxy.php', |
|
85 | + 'OCA\\User_LDAP\\Wizard' => __DIR__.'/..'.'/../lib/Wizard.php', |
|
86 | + 'OCA\\User_LDAP\\WizardResult' => __DIR__.'/..'.'/../lib/WizardResult.php', |
|
87 | 87 | ); |
88 | 88 | |
89 | 89 | public static function getInitializer(ClassLoader $loader) |
90 | 90 | { |
91 | - return \Closure::bind(function () use ($loader) { |
|
91 | + return \Closure::bind(function() use ($loader) { |
|
92 | 92 | $loader->prefixLengthsPsr4 = ComposerStaticInitUser_LDAP::$prefixLengthsPsr4; |
93 | 93 | $loader->prefixDirsPsr4 = ComposerStaticInitUser_LDAP::$prefixDirsPsr4; |
94 | 94 | $loader->classMap = ComposerStaticInitUser_LDAP::$classMap; |