@@ -55,7 +55,7 @@ |
||
55 | 55 | |
56 | 56 | $infos = $this->getMigrationsInfos($ms); |
57 | 57 | foreach ($infos as $key => $value) { |
58 | - $output->writeln(" <comment>>></comment> $key: " . str_repeat(' ', 50 - strlen($key)) . $value); |
|
58 | + $output->writeln(" <comment>>></comment> $key: ".str_repeat(' ', 50 - strlen($key)).$value); |
|
59 | 59 | } |
60 | 60 | } |
61 | 61 |
@@ -32,7 +32,7 @@ discard block |
||
32 | 32 | private function quoteKeys(array $data) { |
33 | 33 | $return = []; |
34 | 34 | $c = $this->getDatabasePlatform()->getIdentifierQuoteCharacter(); |
35 | - foreach($data as $key => $value) { |
|
35 | + foreach ($data as $key => $value) { |
|
36 | 36 | if ($key[0] !== $c) { |
37 | 37 | $return[$this->quoteIdentifier($key)] = $value; |
38 | 38 | } else { |
@@ -82,10 +82,10 @@ discard block |
||
82 | 82 | * @param string $table table name without the prefix |
83 | 83 | */ |
84 | 84 | public function dropTable($table) { |
85 | - $table = $this->tablePrefix . trim($table); |
|
85 | + $table = $this->tablePrefix.trim($table); |
|
86 | 86 | $table = $this->quoteIdentifier($table); |
87 | 87 | $schema = $this->getSchemaManager(); |
88 | - if($schema->tablesExist(array($table))) { |
|
88 | + if ($schema->tablesExist(array($table))) { |
|
89 | 89 | $schema->dropTable($table); |
90 | 90 | } |
91 | 91 | } |
@@ -96,8 +96,8 @@ discard block |
||
96 | 96 | * @param string $table table name without the prefix |
97 | 97 | * @return bool |
98 | 98 | */ |
99 | - public function tableExists($table){ |
|
100 | - $table = $this->tablePrefix . trim($table); |
|
99 | + public function tableExists($table) { |
|
100 | + $table = $this->tablePrefix.trim($table); |
|
101 | 101 | $table = $this->quoteIdentifier($table); |
102 | 102 | $schema = $this->getSchemaManager(); |
103 | 103 | return $schema->tablesExist(array($table)); |
@@ -80,7 +80,7 @@ discard block |
||
80 | 80 | * @throws \Doctrine\DBAL\Schema\SchemaException |
81 | 81 | */ |
82 | 82 | public function getTable($tableName) { |
83 | - return $this->schema->getTable($this->connection->getPrefix() . $tableName); |
|
83 | + return $this->schema->getTable($this->connection->getPrefix().$tableName); |
|
84 | 84 | } |
85 | 85 | |
86 | 86 | /** |
@@ -91,7 +91,7 @@ discard block |
||
91 | 91 | * @return boolean |
92 | 92 | */ |
93 | 93 | public function hasTable($tableName) { |
94 | - return $this->schema->hasTable($this->connection->getPrefix() . $tableName); |
|
94 | + return $this->schema->hasTable($this->connection->getPrefix().$tableName); |
|
95 | 95 | } |
96 | 96 | |
97 | 97 | /** |
@@ -101,7 +101,7 @@ discard block |
||
101 | 101 | * @return \Doctrine\DBAL\Schema\Table |
102 | 102 | */ |
103 | 103 | public function createTable($tableName) { |
104 | - return $this->schema->createTable($this->connection->getPrefix() . $tableName); |
|
104 | + return $this->schema->createTable($this->connection->getPrefix().$tableName); |
|
105 | 105 | } |
106 | 106 | |
107 | 107 | /** |
@@ -125,7 +125,7 @@ discard block |
||
125 | 125 | */ |
126 | 126 | public function dropTable($tableName) { |
127 | 127 | $this->tablesToDelete[$tableName] = true; |
128 | - return $this->schema->dropTable($this->connection->getPrefix() . $tableName); |
|
128 | + return $this->schema->dropTable($this->connection->getPrefix().$tableName); |
|
129 | 129 | } |
130 | 130 | |
131 | 131 | /** |
@@ -110,7 +110,7 @@ discard block |
||
110 | 110 | } |
111 | 111 | |
112 | 112 | public function getACL() { |
113 | - $acl = [ |
|
113 | + $acl = [ |
|
114 | 114 | [ |
115 | 115 | 'privilege' => '{DAV:}read', |
116 | 116 | 'principal' => $this->getOwner(), |
@@ -131,7 +131,7 @@ discard block |
||
131 | 131 | } |
132 | 132 | |
133 | 133 | if ($this->getOwner() !== parent::getOwner()) { |
134 | - $acl[] = [ |
|
134 | + $acl[] = [ |
|
135 | 135 | 'privilege' => '{DAV:}read', |
136 | 136 | 'principal' => parent::getOwner(), |
137 | 137 | 'protected' => true, |
@@ -178,7 +178,7 @@ discard block |
||
178 | 178 | public function delete() { |
179 | 179 | if (isset($this->calendarInfo['{http://owncloud.org/ns}owner-principal']) && |
180 | 180 | $this->calendarInfo['{http://owncloud.org/ns}owner-principal'] !== $this->calendarInfo['principaluri']) { |
181 | - $principal = 'principal:' . parent::getOwner(); |
|
181 | + $principal = 'principal:'.parent::getOwner(); |
|
182 | 182 | $shares = $this->caldavBackend->getShares($this->getResourceId()); |
183 | 183 | $shares = array_filter($shares, function($share) use ($principal){ |
184 | 184 | return $share['href'] === $principal; |
@@ -267,7 +267,7 @@ discard block |
||
267 | 267 | |
268 | 268 | $uris = $this->caldavBackend->calendarQuery($this->calendarInfo['id'], $filters); |
269 | 269 | if ($this->isShared()) { |
270 | - return array_filter($uris, function ($uri) { |
|
270 | + return array_filter($uris, function($uri) { |
|
271 | 271 | return $this->childExists($uri); |
272 | 272 | }); |
273 | 273 | } |
@@ -109,7 +109,7 @@ discard block |
||
109 | 109 | protected function renderScript($appName, $scriptName) { |
110 | 110 | $content = ''; |
111 | 111 | $appPath = \OC_App::getAppPath($appName); |
112 | - $scriptPath = $appPath . '/' . $scriptName; |
|
112 | + $scriptPath = $appPath.'/'.$scriptName; |
|
113 | 113 | if (file_exists($scriptPath)) { |
114 | 114 | // TODO: sanitize path / script name ? |
115 | 115 | ob_start(); |
@@ -204,7 +204,7 @@ discard block |
||
204 | 204 | $this->eventDispatcher->dispatch('OCA\Files::loadAdditionalScripts', $event); |
205 | 205 | |
206 | 206 | $params = []; |
207 | - $params['usedSpacePercent'] = (int)$storageInfo['relative']; |
|
207 | + $params['usedSpacePercent'] = (int) $storageInfo['relative']; |
|
208 | 208 | $params['owner'] = $storageInfo['owner']; |
209 | 209 | $params['ownerDisplayName'] = $storageInfo['ownerDisplayName']; |
210 | 210 | $params['isPublic'] = false; |
@@ -245,7 +245,7 @@ discard block |
||
245 | 245 | $params = []; |
246 | 246 | |
247 | 247 | if (empty($files) && $this->appManager->isEnabledForUser('files_trashbin')) { |
248 | - $baseFolder = $this->rootFolder->get($uid . '/files_trashbin/files/'); |
|
248 | + $baseFolder = $this->rootFolder->get($uid.'/files_trashbin/files/'); |
|
249 | 249 | $files = $baseFolder->getById($fileId); |
250 | 250 | $params['view'] = 'trashbin'; |
251 | 251 | } |
@@ -96,7 +96,7 @@ discard block |
||
96 | 96 | $this->config = $config; |
97 | 97 | |
98 | 98 | $this->excludedPaths[] = 'files_encryption'; |
99 | - $this->excludedPaths[] = 'appdata_' . $config->getSystemValue('instanceid', null); |
|
99 | + $this->excludedPaths[] = 'appdata_'.$config->getSystemValue('instanceid', null); |
|
100 | 100 | $this->excludedPaths[] = 'files_external'; |
101 | 101 | } |
102 | 102 | |
@@ -136,12 +136,12 @@ discard block |
||
136 | 136 | * @throws EncryptionHeaderKeyExistsException if header key is already in use |
137 | 137 | */ |
138 | 138 | public function createHeader(array $headerData, IEncryptionModule $encryptionModule) { |
139 | - $header = self::HEADER_START . ':' . self::HEADER_ENCRYPTION_MODULE_KEY . ':' . $encryptionModule->getId() . ':'; |
|
139 | + $header = self::HEADER_START.':'.self::HEADER_ENCRYPTION_MODULE_KEY.':'.$encryptionModule->getId().':'; |
|
140 | 140 | foreach ($headerData as $key => $value) { |
141 | 141 | if (in_array($key, $this->ocHeaderKeys)) { |
142 | 142 | throw new EncryptionHeaderKeyExistsException($key); |
143 | 143 | } |
144 | - $header .= $key . ':' . $value . ':'; |
|
144 | + $header .= $key.':'.$value.':'; |
|
145 | 145 | } |
146 | 146 | $header .= self::HEADER_END; |
147 | 147 | |
@@ -172,7 +172,7 @@ discard block |
||
172 | 172 | if ($c->getType() === 'dir') { |
173 | 173 | $dirList[] = $c->getPath(); |
174 | 174 | } else { |
175 | - $result[] = $c->getPath(); |
|
175 | + $result[] = $c->getPath(); |
|
176 | 176 | } |
177 | 177 | } |
178 | 178 | |
@@ -249,15 +249,15 @@ discard block |
||
249 | 249 | public function stripPartialFileExtension($path) { |
250 | 250 | $extension = pathinfo($path, PATHINFO_EXTENSION); |
251 | 251 | |
252 | - if ( $extension === 'part') { |
|
252 | + if ($extension === 'part') { |
|
253 | 253 | |
254 | 254 | $newLength = strlen($path) - 5; // 5 = strlen(".part") |
255 | 255 | $fPath = substr($path, 0, $newLength); |
256 | 256 | |
257 | 257 | // if path also contains a transaction id, we remove it too |
258 | 258 | $extension = pathinfo($fPath, PATHINFO_EXTENSION); |
259 | - if(substr($extension, 0, 12) === 'ocTransferId') { // 12 = strlen("ocTransferId") |
|
260 | - $newLength = strlen($fPath) - strlen($extension) -1; |
|
259 | + if (substr($extension, 0, 12) === 'ocTransferId') { // 12 = strlen("ocTransferId") |
|
260 | + $newLength = strlen($fPath) - strlen($extension) - 1; |
|
261 | 261 | $fPath = substr($fPath, 0, $newLength); |
262 | 262 | } |
263 | 263 | return $fPath; |
@@ -301,7 +301,7 @@ discard block |
||
301 | 301 | if (\OCP\App::isEnabled("files_external")) { |
302 | 302 | $mounts = \OC_Mount_Config::getSystemMountPoints(); |
303 | 303 | foreach ($mounts as $mount) { |
304 | - if (strpos($path, '/files/' . $mount['mountpoint']) === 0) { |
|
304 | + if (strpos($path, '/files/'.$mount['mountpoint']) === 0) { |
|
305 | 305 | if ($this->isMountPointApplicableToUser($mount, $uid)) { |
306 | 306 | return true; |
307 | 307 | } |
@@ -114,18 +114,18 @@ discard block |
||
114 | 114 | * @param int $remoteId |
115 | 115 | * @return Mount|null |
116 | 116 | */ |
117 | - public function addShare($remote, $token, $password, $name, $owner, $accepted=false, $user = null, $remoteId = -1) { |
|
117 | + public function addShare($remote, $token, $password, $name, $owner, $accepted = false, $user = null, $remoteId = -1) { |
|
118 | 118 | |
119 | 119 | $user = $user ? $user : $this->uid; |
120 | 120 | $accepted = $accepted ? 1 : 0; |
121 | - $name = Filesystem::normalizePath('/' . $name); |
|
121 | + $name = Filesystem::normalizePath('/'.$name); |
|
122 | 122 | |
123 | 123 | if (!$accepted) { |
124 | 124 | // To avoid conflicts with the mount point generation later, |
125 | 125 | // we only use a temporary mount point name here. The real |
126 | 126 | // mount point name will be generated when accepting the share, |
127 | 127 | // using the original share item name. |
128 | - $tmpMountPointName = '{{TemporaryMountPointName#' . $name . '}}'; |
|
128 | + $tmpMountPointName = '{{TemporaryMountPointName#'.$name.'}}'; |
|
129 | 129 | $mountPoint = $tmpMountPointName; |
130 | 130 | $hash = md5($tmpMountPointName); |
131 | 131 | $data = [ |
@@ -144,7 +144,7 @@ discard block |
||
144 | 144 | $i = 1; |
145 | 145 | while (!$this->connection->insertIfNotExist('*PREFIX*share_external', $data, ['user', 'mountpoint_hash'])) { |
146 | 146 | // The external share already exists for the user |
147 | - $data['mountpoint'] = $tmpMountPointName . '-' . $i; |
|
147 | + $data['mountpoint'] = $tmpMountPointName.'-'.$i; |
|
148 | 148 | $data['mountpoint_hash'] = md5($data['mountpoint']); |
149 | 149 | $i++; |
150 | 150 | } |
@@ -152,7 +152,7 @@ discard block |
||
152 | 152 | } |
153 | 153 | |
154 | 154 | $mountPoint = Files::buildNotExistingFileName('/', $name); |
155 | - $mountPoint = Filesystem::normalizePath('/' . $mountPoint); |
|
155 | + $mountPoint = Filesystem::normalizePath('/'.$mountPoint); |
|
156 | 156 | $hash = md5($mountPoint); |
157 | 157 | |
158 | 158 | $query = $this->connection->prepare(' |
@@ -271,7 +271,7 @@ discard block |
||
271 | 271 | $federationEndpoints = $this->discoveryService->discover($remote, 'FEDERATED_SHARING'); |
272 | 272 | $endpoint = isset($federationEndpoints['share']) ? $federationEndpoints['share'] : '/ocs/v2.php/cloud/shares'; |
273 | 273 | |
274 | - $url = rtrim($remote, '/') . $endpoint . '/' . $remoteId . '/' . $feedback . '?format=' . \OCP\Share::RESPONSE_FORMAT; |
|
274 | + $url = rtrim($remote, '/').$endpoint.'/'.$remoteId.'/'.$feedback.'?format='.\OCP\Share::RESPONSE_FORMAT; |
|
275 | 275 | $fields = array('token' => $token); |
276 | 276 | |
277 | 277 | $client = $this->clientService->newClient(); |
@@ -300,13 +300,13 @@ discard block |
||
300 | 300 | * @return string |
301 | 301 | */ |
302 | 302 | protected function stripPath($path) { |
303 | - $prefix = '/' . $this->uid . '/files'; |
|
303 | + $prefix = '/'.$this->uid.'/files'; |
|
304 | 304 | return rtrim(substr($path, strlen($prefix)), '/'); |
305 | 305 | } |
306 | 306 | |
307 | 307 | public function getMount($data) { |
308 | 308 | $data['manager'] = $this; |
309 | - $mountPoint = '/' . $this->uid . '/files' . $data['mountpoint']; |
|
309 | + $mountPoint = '/'.$this->uid.'/files'.$data['mountpoint']; |
|
310 | 310 | $data['mountpoint'] = $mountPoint; |
311 | 311 | $data['certificateManager'] = \OC::$server->getCertificateManager($this->uid); |
312 | 312 | return new Mount(self::STORAGE, $mountPoint, $data, $this, $this->storageLoader); |
@@ -346,7 +346,7 @@ discard block |
||
346 | 346 | WHERE `mountpoint_hash` = ? |
347 | 347 | AND `user` = ? |
348 | 348 | '); |
349 | - $result = (bool)$query->execute(array($target, $targetHash, $sourceHash, $this->uid)); |
|
349 | + $result = (bool) $query->execute(array($target, $targetHash, $sourceHash, $this->uid)); |
|
350 | 350 | |
351 | 351 | return $result; |
352 | 352 | } |
@@ -376,9 +376,9 @@ discard block |
||
376 | 376 | WHERE `mountpoint_hash` = ? |
377 | 377 | AND `user` = ? |
378 | 378 | '); |
379 | - $result = (bool)$query->execute(array($hash, $this->uid)); |
|
379 | + $result = (bool) $query->execute(array($hash, $this->uid)); |
|
380 | 380 | |
381 | - if($result) { |
|
381 | + if ($result) { |
|
382 | 382 | $this->removeReShares($id); |
383 | 383 | } |
384 | 384 | |
@@ -399,7 +399,7 @@ discard block |
||
399 | 399 | |
400 | 400 | |
401 | 401 | $query->delete('federated_reshares') |
402 | - ->where($query->expr()->in('share_id', $query->createFunction('(' . $select . ')'))); |
|
402 | + ->where($query->expr()->in('share_id', $query->createFunction('('.$select.')'))); |
|
403 | 403 | $query->execute(); |
404 | 404 | |
405 | 405 | $deleteReShares = $this->connection->getQueryBuilder(); |
@@ -423,7 +423,7 @@ discard block |
||
423 | 423 | |
424 | 424 | if ($result) { |
425 | 425 | $shares = $getShare->fetchAll(); |
426 | - foreach($shares as $share) { |
|
426 | + foreach ($shares as $share) { |
|
427 | 427 | $this->sendFeedbackToRemote($share['remote'], $share['share_token'], $share['remote_id'], 'decline'); |
428 | 428 | } |
429 | 429 | } |
@@ -432,7 +432,7 @@ discard block |
||
432 | 432 | DELETE FROM `*PREFIX*share_external` |
433 | 433 | WHERE `user` = ? |
434 | 434 | '); |
435 | - return (bool)$query->execute(array($uid)); |
|
435 | + return (bool) $query->execute(array($uid)); |
|
436 | 436 | } |
437 | 437 | |
438 | 438 | /** |
@@ -362,7 +362,7 @@ discard block |
||
362 | 362 | if ($email !== '' && !$this->mailer->validateMailAddress($email)) { |
363 | 363 | return new DataResponse( |
364 | 364 | [ |
365 | - 'message' => (string)$this->l10n->t('Invalid mail address') |
|
365 | + 'message' => (string) $this->l10n->t('Invalid mail address') |
|
366 | 366 | ], |
367 | 367 | Http::STATUS_UNPROCESSABLE_ENTITY |
368 | 368 | ); |
@@ -398,7 +398,7 @@ discard block |
||
398 | 398 | if ($this->userManager->userExists($username)) { |
399 | 399 | return new DataResponse( |
400 | 400 | [ |
401 | - 'message' => (string)$this->l10n->t('A user with that name already exists.') |
|
401 | + 'message' => (string) $this->l10n->t('A user with that name already exists.') |
|
402 | 402 | ], |
403 | 403 | Http::STATUS_CONFLICT |
404 | 404 | ); |
@@ -409,7 +409,7 @@ discard block |
||
409 | 409 | if ($email === '') { |
410 | 410 | return new DataResponse( |
411 | 411 | [ |
412 | - 'message' => (string)$this->l10n->t('To send a password link to the user an email address is required.') |
|
412 | + 'message' => (string) $this->l10n->t('To send a password link to the user an email address is required.') |
|
413 | 413 | ], |
414 | 414 | Http::STATUS_UNPROCESSABLE_ENTITY |
415 | 415 | ); |
@@ -428,7 +428,7 @@ discard block |
||
428 | 428 | } |
429 | 429 | return new DataResponse( |
430 | 430 | [ |
431 | - 'message' => (string)$message, |
|
431 | + 'message' => (string) $message, |
|
432 | 432 | ], |
433 | 433 | Http::STATUS_FORBIDDEN |
434 | 434 | ); |
@@ -454,7 +454,7 @@ discard block |
||
454 | 454 | $emailTemplate = $this->newUserMailHelper->generateTemplate($user, $generatePasswordResetToken); |
455 | 455 | $this->newUserMailHelper->sendMail($user, $emailTemplate); |
456 | 456 | } catch (\Exception $e) { |
457 | - $this->log->error("Can't send new user mail to $email: " . $e->getMessage(), ['app' => 'settings']); |
|
457 | + $this->log->error("Can't send new user mail to $email: ".$e->getMessage(), ['app' => 'settings']); |
|
458 | 458 | } |
459 | 459 | } |
460 | 460 | // fetch users groups |
@@ -468,7 +468,7 @@ discard block |
||
468 | 468 | |
469 | 469 | return new DataResponse( |
470 | 470 | [ |
471 | - 'message' => (string)$this->l10n->t('Unable to create user.') |
|
471 | + 'message' => (string) $this->l10n->t('Unable to create user.') |
|
472 | 472 | ], |
473 | 473 | Http::STATUS_FORBIDDEN |
474 | 474 | ); |
@@ -491,7 +491,7 @@ discard block |
||
491 | 491 | [ |
492 | 492 | 'status' => 'error', |
493 | 493 | 'data' => [ |
494 | - 'message' => (string)$this->l10n->t('Unable to delete user.') |
|
494 | + 'message' => (string) $this->l10n->t('Unable to delete user.') |
|
495 | 495 | ] |
496 | 496 | ], |
497 | 497 | Http::STATUS_FORBIDDEN |
@@ -503,7 +503,7 @@ discard block |
||
503 | 503 | [ |
504 | 504 | 'status' => 'error', |
505 | 505 | 'data' => [ |
506 | - 'message' => (string)$this->l10n->t('Authentication error') |
|
506 | + 'message' => (string) $this->l10n->t('Authentication error') |
|
507 | 507 | ] |
508 | 508 | ], |
509 | 509 | Http::STATUS_FORBIDDEN |
@@ -528,7 +528,7 @@ discard block |
||
528 | 528 | [ |
529 | 529 | 'status' => 'error', |
530 | 530 | 'data' => [ |
531 | - 'message' => (string)$this->l10n->t('Unable to delete user.') |
|
531 | + 'message' => (string) $this->l10n->t('Unable to delete user.') |
|
532 | 532 | ] |
533 | 533 | ], |
534 | 534 | Http::STATUS_FORBIDDEN |
@@ -543,11 +543,11 @@ discard block |
||
543 | 543 | * @return DataResponse |
544 | 544 | */ |
545 | 545 | public function setEnabled($id, $enabled) { |
546 | - $enabled = (bool)$enabled; |
|
546 | + $enabled = (bool) $enabled; |
|
547 | 547 | if ($enabled) { |
548 | - $errorMsgGeneral = (string)$this->l10n->t('Error while enabling user.'); |
|
548 | + $errorMsgGeneral = (string) $this->l10n->t('Error while enabling user.'); |
|
549 | 549 | } else { |
550 | - $errorMsgGeneral = (string)$this->l10n->t('Error while disabling user.'); |
|
550 | + $errorMsgGeneral = (string) $this->l10n->t('Error while disabling user.'); |
|
551 | 551 | } |
552 | 552 | |
553 | 553 | $userId = $this->userSession->getUser()->getUID(); |
@@ -570,7 +570,7 @@ discard block |
||
570 | 570 | [ |
571 | 571 | 'status' => 'error', |
572 | 572 | 'data' => [ |
573 | - 'message' => (string)$this->l10n->t('Authentication error') |
|
573 | + 'message' => (string) $this->l10n->t('Authentication error') |
|
574 | 574 | ] |
575 | 575 | ], |
576 | 576 | Http::STATUS_FORBIDDEN |
@@ -622,11 +622,11 @@ discard block |
||
622 | 622 | |
623 | 623 | $accountData = $this->accountManager->getUser($user); |
624 | 624 | $cloudId = $user->getCloudId(); |
625 | - $message = "Use my Federated Cloud ID to share with me: " . $cloudId; |
|
625 | + $message = "Use my Federated Cloud ID to share with me: ".$cloudId; |
|
626 | 626 | $signature = $this->signMessage($user, $message); |
627 | 627 | |
628 | - $code = $message . ' ' . $signature; |
|
629 | - $codeMd5 = $message . ' ' . md5($signature); |
|
628 | + $code = $message.' '.$signature; |
|
629 | + $codeMd5 = $message.' '.md5($signature); |
|
630 | 630 | |
631 | 631 | switch ($account) { |
632 | 632 | case 'verify-twitter': |
@@ -731,7 +731,7 @@ discard block |
||
731 | 731 | [ |
732 | 732 | 'status' => 'error', |
733 | 733 | 'data' => [ |
734 | - 'message' => (string)$this->l10n->t('Invalid mail address') |
|
734 | + 'message' => (string) $this->l10n->t('Invalid mail address') |
|
735 | 735 | ] |
736 | 736 | ], |
737 | 737 | Http::STATUS_UNPROCESSABLE_ENTITY |
@@ -775,7 +775,7 @@ discard block |
||
775 | 775 | 'websiteScope' => $data[AccountManager::PROPERTY_WEBSITE]['scope'], |
776 | 776 | 'address' => $data[AccountManager::PROPERTY_ADDRESS]['value'], |
777 | 777 | 'addressScope' => $data[AccountManager::PROPERTY_ADDRESS]['scope'], |
778 | - 'message' => (string)$this->l10n->t('Settings saved') |
|
778 | + 'message' => (string) $this->l10n->t('Settings saved') |
|
779 | 779 | ] |
780 | 780 | ], |
781 | 781 | Http::STATUS_OK |
@@ -946,7 +946,7 @@ discard block |
||
946 | 946 | [ |
947 | 947 | 'status' => 'error', |
948 | 948 | 'data' => [ |
949 | - 'message' => (string)$this->l10n->t('Forbidden') |
|
949 | + 'message' => (string) $this->l10n->t('Forbidden') |
|
950 | 950 | ] |
951 | 951 | ], |
952 | 952 | Http::STATUS_FORBIDDEN |
@@ -958,7 +958,7 @@ discard block |
||
958 | 958 | [ |
959 | 959 | 'status' => 'error', |
960 | 960 | 'data' => [ |
961 | - 'message' => (string)$this->l10n->t('Invalid mail address') |
|
961 | + 'message' => (string) $this->l10n->t('Invalid mail address') |
|
962 | 962 | ] |
963 | 963 | ], |
964 | 964 | Http::STATUS_UNPROCESSABLE_ENTITY |
@@ -970,7 +970,7 @@ discard block |
||
970 | 970 | [ |
971 | 971 | 'status' => 'error', |
972 | 972 | 'data' => [ |
973 | - 'message' => (string)$this->l10n->t('Invalid user') |
|
973 | + 'message' => (string) $this->l10n->t('Invalid user') |
|
974 | 974 | ] |
975 | 975 | ], |
976 | 976 | Http::STATUS_UNPROCESSABLE_ENTITY |
@@ -983,7 +983,7 @@ discard block |
||
983 | 983 | [ |
984 | 984 | 'status' => 'error', |
985 | 985 | 'data' => [ |
986 | - 'message' => (string)$this->l10n->t('Unable to change mail address') |
|
986 | + 'message' => (string) $this->l10n->t('Unable to change mail address') |
|
987 | 987 | ] |
988 | 988 | ], |
989 | 989 | Http::STATUS_FORBIDDEN |
@@ -1001,7 +1001,7 @@ discard block |
||
1001 | 1001 | 'data' => [ |
1002 | 1002 | 'username' => $id, |
1003 | 1003 | 'mailAddress' => $mailAddress, |
1004 | - 'message' => (string)$this->l10n->t('Email saved') |
|
1004 | + 'message' => (string) $this->l10n->t('Email saved') |
|
1005 | 1005 | ] |
1006 | 1006 | ], |
1007 | 1007 | Http::STATUS_OK |
@@ -168,12 +168,12 @@ |
||
168 | 168 | */ |
169 | 169 | private function invoke($functionName, array $parameters = [], $silence = false) { |
170 | 170 | try { |
171 | - if($silence) { |
|
171 | + if ($silence) { |
|
172 | 172 | return @call_user_func_array($functionName, $parameters); |
173 | 173 | } else { |
174 | 174 | return call_user_func_array($functionName, $parameters); |
175 | 175 | } |
176 | - } catch(\Error $e) { |
|
176 | + } catch (\Error $e) { |
|
177 | 177 | $this->trapError($e->getCode(), $e->getMessage()); |
178 | 178 | } |
179 | 179 | } |