@@ -60,7 +60,7 @@ discard block |
||
| 60 | 60 | if ($instanceId === null) { |
| 61 | 61 | throw new \RuntimeException('no instance id!'); |
| 62 | 62 | } |
| 63 | - $this->identityProofDir = 'appdata_' . $instanceId . '/identityproof/'; |
|
| 63 | + $this->identityProofDir = 'appdata_'.$instanceId.'/identityproof/'; |
|
| 64 | 64 | } |
| 65 | 65 | |
| 66 | 66 | /** |
@@ -85,7 +85,7 @@ discard block |
||
| 85 | 85 | $versionFromBeforeUpdate = $this->config->getSystemValue('version', '0.0.0'); |
| 86 | 86 | if (version_compare($versionFromBeforeUpdate, '12.0.1.5', '<=')) { |
| 87 | 87 | $count = $this->repair(); |
| 88 | - $output->info('Repaired ' . $count . ' folders'); |
|
| 88 | + $output->info('Repaired '.$count.' folders'); |
|
| 89 | 89 | } |
| 90 | 90 | } |
| 91 | 91 | |
@@ -100,8 +100,8 @@ discard block |
||
| 100 | 100 | /** @var ISimpleFolder $folder */ |
| 101 | 101 | foreach ($dirListing as $folder) { |
| 102 | 102 | $name = $folder->getName(); |
| 103 | - $node = $this->rootFolder->get($this->identityProofDir . $name); |
|
| 104 | - $node->move($this->identityProofDir . 'user-' . $name); |
|
| 103 | + $node = $this->rootFolder->get($this->identityProofDir.$name); |
|
| 104 | + $node->move($this->identityProofDir.'user-'.$name); |
|
| 105 | 105 | $count++; |
| 106 | 106 | } |
| 107 | 107 | |
@@ -75,7 +75,7 @@ discard block |
||
| 75 | 75 | $this->doFind($resource); |
| 76 | 76 | } catch (ResourceNotFoundException $e) { |
| 77 | 77 | $resourceApp = substr($resource, 0, strpos($resource, '/')); |
| 78 | - $this->logger->debug('Could not find resource file "' . $e->getResourcePath() . '"', ['app' => $resourceApp]); |
|
| 78 | + $this->logger->debug('Could not find resource file "'.$e->getResourcePath().'"', ['app' => $resourceApp]); |
|
| 79 | 79 | } |
| 80 | 80 | } |
| 81 | 81 | if (!empty($this->theme)) { |
@@ -84,7 +84,7 @@ discard block |
||
| 84 | 84 | $this->doFindTheme($resource); |
| 85 | 85 | } catch (ResourceNotFoundException $e) { |
| 86 | 86 | $resourceApp = substr($resource, 0, strpos($resource, '/')); |
| 87 | - $this->logger->debug('Could not find resource file in theme "' . $e->getResourcePath() . '"', ['app' => $resourceApp]); |
|
| 87 | + $this->logger->debug('Could not find resource file in theme "'.$e->getResourcePath().'"', ['app' => $resourceApp]); |
|
| 88 | 88 | } |
| 89 | 89 | } |
| 90 | 90 | } |
@@ -185,7 +185,7 @@ discard block |
||
| 185 | 185 | } |
| 186 | 186 | $this->resources[] = array($root, $webRoot, $file); |
| 187 | 187 | |
| 188 | - if ($throw && !is_file($root . '/' . $file)) { |
|
| 188 | + if ($throw && !is_file($root.'/'.$file)) { |
|
| 189 | 189 | throw new ResourceNotFoundException($file, $webRoot); |
| 190 | 190 | } |
| 191 | 191 | } |
@@ -68,7 +68,7 @@ discard block |
||
| 68 | 68 | public function __construct(Configuration $configuration, ILDAPWrapper $ldap, Access $access) { |
| 69 | 69 | parent::__construct($ldap); |
| 70 | 70 | $this->configuration = $configuration; |
| 71 | - if(is_null(Wizard::$l)) { |
|
| 71 | + if (is_null(Wizard::$l)) { |
|
| 72 | 72 | Wizard::$l = \OC::$server->getL10N('user_ldap'); |
| 73 | 73 | } |
| 74 | 74 | $this->access = $access; |
@@ -76,7 +76,7 @@ discard block |
||
| 76 | 76 | } |
| 77 | 77 | |
| 78 | 78 | public function __destruct() { |
| 79 | - if($this->result->hasChanges()) { |
|
| 79 | + if ($this->result->hasChanges()) { |
|
| 80 | 80 | $this->configuration->saveConfiguration(); |
| 81 | 81 | } |
| 82 | 82 | } |
@@ -91,18 +91,18 @@ discard block |
||
| 91 | 91 | */ |
| 92 | 92 | public function countEntries($filter, $type) { |
| 93 | 93 | $reqs = array('ldapHost', 'ldapPort', 'ldapBase'); |
| 94 | - if($type === 'users') { |
|
| 94 | + if ($type === 'users') { |
|
| 95 | 95 | $reqs[] = 'ldapUserFilter'; |
| 96 | 96 | } |
| 97 | - if(!$this->checkRequirements($reqs)) { |
|
| 97 | + if (!$this->checkRequirements($reqs)) { |
|
| 98 | 98 | throw new \Exception('Requirements not met', 400); |
| 99 | 99 | } |
| 100 | 100 | |
| 101 | 101 | $attr = array('dn'); // default |
| 102 | 102 | $limit = 1001; |
| 103 | - if($type === 'groups') { |
|
| 104 | - $result = $this->access->countGroups($filter, $attr, $limit); |
|
| 105 | - } else if($type === 'users') { |
|
| 103 | + if ($type === 'groups') { |
|
| 104 | + $result = $this->access->countGroups($filter, $attr, $limit); |
|
| 105 | + } else if ($type === 'users') { |
|
| 106 | 106 | $result = $this->access->countUsers($filter, $attr, $limit); |
| 107 | 107 | } else if ($type === 'objects') { |
| 108 | 108 | $result = $this->access->countObjects($limit); |
@@ -122,7 +122,7 @@ discard block |
||
| 122 | 122 | */ |
| 123 | 123 | private function formatCountResult($count) { |
| 124 | 124 | $formatted = ($count !== false) ? $count : 0; |
| 125 | - if($formatted > 1000) { |
|
| 125 | + if ($formatted > 1000) { |
|
| 126 | 126 | $formatted = '> 1000'; |
| 127 | 127 | } |
| 128 | 128 | return $formatted; |
@@ -131,7 +131,7 @@ discard block |
||
| 131 | 131 | public function countGroups() { |
| 132 | 132 | $filter = $this->configuration->ldapGroupFilter; |
| 133 | 133 | |
| 134 | - if(empty($filter)) { |
|
| 134 | + if (empty($filter)) { |
|
| 135 | 135 | $output = self::$l->n('%s group found', '%s groups found', 0, array(0)); |
| 136 | 136 | $this->result->addChange('ldap_group_count', $output); |
| 137 | 137 | return $this->result; |
@@ -141,7 +141,7 @@ discard block |
||
| 141 | 141 | $groupsTotal = $this->formatCountResult($this->countEntries($filter, 'groups')); |
| 142 | 142 | } catch (\Exception $e) { |
| 143 | 143 | //400 can be ignored, 500 is forwarded |
| 144 | - if($e->getCode() === 500) { |
|
| 144 | + if ($e->getCode() === 500) { |
|
| 145 | 145 | throw $e; |
| 146 | 146 | } |
| 147 | 147 | return false; |
@@ -173,7 +173,7 @@ discard block |
||
| 173 | 173 | public function countInBaseDN() { |
| 174 | 174 | // we don't need to provide a filter in this case |
| 175 | 175 | $total = $this->countEntries(null, 'objects'); |
| 176 | - if($total === false) { |
|
| 176 | + if ($total === false) { |
|
| 177 | 177 | throw new \Exception('invalid results received'); |
| 178 | 178 | } |
| 179 | 179 | $this->result->addChange('ldap_test_base', $total); |
@@ -187,7 +187,7 @@ discard block |
||
| 187 | 187 | * @return int|bool |
| 188 | 188 | */ |
| 189 | 189 | public function countUsersWithAttribute($attr, $existsCheck = false) { |
| 190 | - if(!$this->checkRequirements(array('ldapHost', |
|
| 190 | + if (!$this->checkRequirements(array('ldapHost', |
|
| 191 | 191 | 'ldapPort', |
| 192 | 192 | 'ldapBase', |
| 193 | 193 | 'ldapUserFilter', |
@@ -197,7 +197,7 @@ discard block |
||
| 197 | 197 | |
| 198 | 198 | $filter = $this->access->combineFilterWithAnd(array( |
| 199 | 199 | $this->configuration->ldapUserFilter, |
| 200 | - $attr . '=*' |
|
| 200 | + $attr.'=*' |
|
| 201 | 201 | )); |
| 202 | 202 | |
| 203 | 203 | $limit = ($existsCheck === false) ? null : 1; |
@@ -212,7 +212,7 @@ discard block |
||
| 212 | 212 | * @throws \Exception |
| 213 | 213 | */ |
| 214 | 214 | public function detectUserDisplayNameAttribute() { |
| 215 | - if(!$this->checkRequirements(array('ldapHost', |
|
| 215 | + if (!$this->checkRequirements(array('ldapHost', |
|
| 216 | 216 | 'ldapPort', |
| 217 | 217 | 'ldapBase', |
| 218 | 218 | 'ldapUserFilter', |
@@ -225,7 +225,7 @@ discard block |
||
| 225 | 225 | // most likely not the default value with upper case N, |
| 226 | 226 | // verify it still produces a result |
| 227 | 227 | $count = intval($this->countUsersWithAttribute($attr, true)); |
| 228 | - if($count > 0) { |
|
| 228 | + if ($count > 0) { |
|
| 229 | 229 | //no change, but we sent it back to make sure the user interface |
| 230 | 230 | //is still correct, even if the ajax call was cancelled meanwhile |
| 231 | 231 | $this->result->addChange('ldap_display_name', $attr); |
@@ -238,7 +238,7 @@ discard block |
||
| 238 | 238 | foreach ($displayNameAttrs as $attr) { |
| 239 | 239 | $count = intval($this->countUsersWithAttribute($attr, true)); |
| 240 | 240 | |
| 241 | - if($count > 0) { |
|
| 241 | + if ($count > 0) { |
|
| 242 | 242 | $this->applyFind('ldap_display_name', $attr); |
| 243 | 243 | return $this->result; |
| 244 | 244 | } |
@@ -254,7 +254,7 @@ discard block |
||
| 254 | 254 | * @return WizardResult|bool |
| 255 | 255 | */ |
| 256 | 256 | public function detectEmailAttribute() { |
| 257 | - if(!$this->checkRequirements(array('ldapHost', |
|
| 257 | + if (!$this->checkRequirements(array('ldapHost', |
|
| 258 | 258 | 'ldapPort', |
| 259 | 259 | 'ldapBase', |
| 260 | 260 | 'ldapUserFilter', |
@@ -265,7 +265,7 @@ discard block |
||
| 265 | 265 | $attr = $this->configuration->ldapEmailAttribute; |
| 266 | 266 | if ($attr !== '') { |
| 267 | 267 | $count = intval($this->countUsersWithAttribute($attr, true)); |
| 268 | - if($count > 0) { |
|
| 268 | + if ($count > 0) { |
|
| 269 | 269 | return false; |
| 270 | 270 | } |
| 271 | 271 | $writeLog = true; |
@@ -276,19 +276,19 @@ discard block |
||
| 276 | 276 | $emailAttributes = array('mail', 'mailPrimaryAddress'); |
| 277 | 277 | $winner = ''; |
| 278 | 278 | $maxUsers = 0; |
| 279 | - foreach($emailAttributes as $attr) { |
|
| 279 | + foreach ($emailAttributes as $attr) { |
|
| 280 | 280 | $count = $this->countUsersWithAttribute($attr); |
| 281 | - if($count > $maxUsers) { |
|
| 281 | + if ($count > $maxUsers) { |
|
| 282 | 282 | $maxUsers = $count; |
| 283 | 283 | $winner = $attr; |
| 284 | 284 | } |
| 285 | 285 | } |
| 286 | 286 | |
| 287 | - if($winner !== '') { |
|
| 287 | + if ($winner !== '') { |
|
| 288 | 288 | $this->applyFind('ldap_email_attr', $winner); |
| 289 | - if($writeLog) { |
|
| 290 | - \OCP\Util::writeLog('user_ldap', 'The mail attribute has ' . |
|
| 291 | - 'automatically been reset, because the original value ' . |
|
| 289 | + if ($writeLog) { |
|
| 290 | + \OCP\Util::writeLog('user_ldap', 'The mail attribute has '. |
|
| 291 | + 'automatically been reset, because the original value '. |
|
| 292 | 292 | 'did not return any results.', \OCP\Util::INFO); |
| 293 | 293 | } |
| 294 | 294 | } |
@@ -301,7 +301,7 @@ discard block |
||
| 301 | 301 | * @throws \Exception |
| 302 | 302 | */ |
| 303 | 303 | public function determineAttributes() { |
| 304 | - if(!$this->checkRequirements(array('ldapHost', |
|
| 304 | + if (!$this->checkRequirements(array('ldapHost', |
|
| 305 | 305 | 'ldapPort', |
| 306 | 306 | 'ldapBase', |
| 307 | 307 | 'ldapUserFilter', |
@@ -317,7 +317,7 @@ discard block |
||
| 317 | 317 | $this->result->addOptions('ldap_loginfilter_attributes', $attributes); |
| 318 | 318 | |
| 319 | 319 | $selected = $this->configuration->ldapLoginFilterAttributes; |
| 320 | - if(is_array($selected) && !empty($selected)) { |
|
| 320 | + if (is_array($selected) && !empty($selected)) { |
|
| 321 | 321 | $this->result->addChange('ldap_loginfilter_attributes', $selected); |
| 322 | 322 | } |
| 323 | 323 | |
@@ -330,7 +330,7 @@ discard block |
||
| 330 | 330 | * @throws \Exception |
| 331 | 331 | */ |
| 332 | 332 | private function getUserAttributes() { |
| 333 | - if(!$this->checkRequirements(array('ldapHost', |
|
| 333 | + if (!$this->checkRequirements(array('ldapHost', |
|
| 334 | 334 | 'ldapPort', |
| 335 | 335 | 'ldapBase', |
| 336 | 336 | 'ldapUserFilter', |
@@ -338,20 +338,20 @@ discard block |
||
| 338 | 338 | return false; |
| 339 | 339 | } |
| 340 | 340 | $cr = $this->getConnection(); |
| 341 | - if(!$cr) { |
|
| 341 | + if (!$cr) { |
|
| 342 | 342 | throw new \Exception('Could not connect to LDAP'); |
| 343 | 343 | } |
| 344 | 344 | |
| 345 | 345 | $base = $this->configuration->ldapBase[0]; |
| 346 | 346 | $filter = $this->configuration->ldapUserFilter; |
| 347 | 347 | $rr = $this->ldap->search($cr, $base, $filter, array(), 1, 1); |
| 348 | - if(!$this->ldap->isResource($rr)) { |
|
| 348 | + if (!$this->ldap->isResource($rr)) { |
|
| 349 | 349 | return false; |
| 350 | 350 | } |
| 351 | 351 | $er = $this->ldap->firstEntry($cr, $rr); |
| 352 | 352 | $attributes = $this->ldap->getAttributes($cr, $er); |
| 353 | 353 | $pureAttributes = array(); |
| 354 | - for($i = 0; $i < $attributes['count']; $i++) { |
|
| 354 | + for ($i = 0; $i < $attributes['count']; $i++) { |
|
| 355 | 355 | $pureAttributes[] = $attributes[$i]; |
| 356 | 356 | } |
| 357 | 357 | |
@@ -386,23 +386,23 @@ discard block |
||
| 386 | 386 | * @throws \Exception |
| 387 | 387 | */ |
| 388 | 388 | private function determineGroups($dbKey, $confKey, $testMemberOf = true) { |
| 389 | - if(!$this->checkRequirements(array('ldapHost', |
|
| 389 | + if (!$this->checkRequirements(array('ldapHost', |
|
| 390 | 390 | 'ldapPort', |
| 391 | 391 | 'ldapBase', |
| 392 | 392 | ))) { |
| 393 | 393 | return false; |
| 394 | 394 | } |
| 395 | 395 | $cr = $this->getConnection(); |
| 396 | - if(!$cr) { |
|
| 396 | + if (!$cr) { |
|
| 397 | 397 | throw new \Exception('Could not connect to LDAP'); |
| 398 | 398 | } |
| 399 | 399 | |
| 400 | 400 | $this->fetchGroups($dbKey, $confKey); |
| 401 | 401 | |
| 402 | - if($testMemberOf) { |
|
| 402 | + if ($testMemberOf) { |
|
| 403 | 403 | $this->configuration->hasMemberOfFilterSupport = $this->testMemberOf(); |
| 404 | 404 | $this->result->markChange(); |
| 405 | - if(!$this->configuration->hasMemberOfFilterSupport) { |
|
| 405 | + if (!$this->configuration->hasMemberOfFilterSupport) { |
|
| 406 | 406 | throw new \Exception('memberOf is not supported by the server'); |
| 407 | 407 | } |
| 408 | 408 | } |
@@ -422,7 +422,7 @@ discard block |
||
| 422 | 422 | $obclasses = array('posixGroup', 'group', 'zimbraDistributionList', 'groupOfNames', 'groupOfUniqueNames'); |
| 423 | 423 | |
| 424 | 424 | $filterParts = array(); |
| 425 | - foreach($obclasses as $obclass) { |
|
| 425 | + foreach ($obclasses as $obclass) { |
|
| 426 | 426 | $filterParts[] = 'objectclass='.$obclass; |
| 427 | 427 | } |
| 428 | 428 | //we filter for everything |
@@ -439,8 +439,8 @@ discard block |
||
| 439 | 439 | // we need to request dn additionally here, otherwise memberOf |
| 440 | 440 | // detection will fail later |
| 441 | 441 | $result = $this->access->searchGroups($filter, array('cn', 'dn'), $limit, $offset); |
| 442 | - foreach($result as $item) { |
|
| 443 | - if(!isset($item['cn']) && !is_array($item['cn']) && !isset($item['cn'][0])) { |
|
| 442 | + foreach ($result as $item) { |
|
| 443 | + if (!isset($item['cn']) && !is_array($item['cn']) && !isset($item['cn'][0])) { |
|
| 444 | 444 | // just in case - no issue known |
| 445 | 445 | continue; |
| 446 | 446 | } |
@@ -450,7 +450,7 @@ discard block |
||
| 450 | 450 | $offset += $limit; |
| 451 | 451 | } while ($this->access->hasMoreResults()); |
| 452 | 452 | |
| 453 | - if(count($groupNames) > 0) { |
|
| 453 | + if (count($groupNames) > 0) { |
|
| 454 | 454 | natsort($groupNames); |
| 455 | 455 | $this->result->addOptions($dbKey, array_values($groupNames)); |
| 456 | 456 | } else { |
@@ -458,7 +458,7 @@ discard block |
||
| 458 | 458 | } |
| 459 | 459 | |
| 460 | 460 | $setFeatures = $this->configuration->$confKey; |
| 461 | - if(is_array($setFeatures) && !empty($setFeatures)) { |
|
| 461 | + if (is_array($setFeatures) && !empty($setFeatures)) { |
|
| 462 | 462 | //something is already configured? pre-select it. |
| 463 | 463 | $this->result->addChange($dbKey, $setFeatures); |
| 464 | 464 | } |
@@ -466,14 +466,14 @@ discard block |
||
| 466 | 466 | } |
| 467 | 467 | |
| 468 | 468 | public function determineGroupMemberAssoc() { |
| 469 | - if(!$this->checkRequirements(array('ldapHost', |
|
| 469 | + if (!$this->checkRequirements(array('ldapHost', |
|
| 470 | 470 | 'ldapPort', |
| 471 | 471 | 'ldapGroupFilter', |
| 472 | 472 | ))) { |
| 473 | 473 | return false; |
| 474 | 474 | } |
| 475 | 475 | $attribute = $this->detectGroupMemberAssoc(); |
| 476 | - if($attribute === false) { |
|
| 476 | + if ($attribute === false) { |
|
| 477 | 477 | return false; |
| 478 | 478 | } |
| 479 | 479 | $this->configuration->setConfiguration(array('ldapGroupMemberAssocAttr' => $attribute)); |
@@ -488,14 +488,14 @@ discard block |
||
| 488 | 488 | * @throws \Exception |
| 489 | 489 | */ |
| 490 | 490 | public function determineGroupObjectClasses() { |
| 491 | - if(!$this->checkRequirements(array('ldapHost', |
|
| 491 | + if (!$this->checkRequirements(array('ldapHost', |
|
| 492 | 492 | 'ldapPort', |
| 493 | 493 | 'ldapBase', |
| 494 | 494 | ))) { |
| 495 | 495 | return false; |
| 496 | 496 | } |
| 497 | 497 | $cr = $this->getConnection(); |
| 498 | - if(!$cr) { |
|
| 498 | + if (!$cr) { |
|
| 499 | 499 | throw new \Exception('Could not connect to LDAP'); |
| 500 | 500 | } |
| 501 | 501 | |
@@ -515,14 +515,14 @@ discard block |
||
| 515 | 515 | * @throws \Exception |
| 516 | 516 | */ |
| 517 | 517 | public function determineUserObjectClasses() { |
| 518 | - if(!$this->checkRequirements(array('ldapHost', |
|
| 518 | + if (!$this->checkRequirements(array('ldapHost', |
|
| 519 | 519 | 'ldapPort', |
| 520 | 520 | 'ldapBase', |
| 521 | 521 | ))) { |
| 522 | 522 | return false; |
| 523 | 523 | } |
| 524 | 524 | $cr = $this->getConnection(); |
| 525 | - if(!$cr) { |
|
| 525 | + if (!$cr) { |
|
| 526 | 526 | throw new \Exception('Could not connect to LDAP'); |
| 527 | 527 | } |
| 528 | 528 | |
@@ -545,7 +545,7 @@ discard block |
||
| 545 | 545 | * @throws \Exception |
| 546 | 546 | */ |
| 547 | 547 | public function getGroupFilter() { |
| 548 | - if(!$this->checkRequirements(array('ldapHost', |
|
| 548 | + if (!$this->checkRequirements(array('ldapHost', |
|
| 549 | 549 | 'ldapPort', |
| 550 | 550 | 'ldapBase', |
| 551 | 551 | ))) { |
@@ -569,7 +569,7 @@ discard block |
||
| 569 | 569 | * @throws \Exception |
| 570 | 570 | */ |
| 571 | 571 | public function getUserListFilter() { |
| 572 | - if(!$this->checkRequirements(array('ldapHost', |
|
| 572 | + if (!$this->checkRequirements(array('ldapHost', |
|
| 573 | 573 | 'ldapPort', |
| 574 | 574 | 'ldapBase', |
| 575 | 575 | ))) { |
@@ -582,7 +582,7 @@ discard block |
||
| 582 | 582 | $this->applyFind('ldap_display_name', $d['ldap_display_name']); |
| 583 | 583 | } |
| 584 | 584 | $filter = $this->composeLdapFilter(self::LFILTER_USER_LIST); |
| 585 | - if(!$filter) { |
|
| 585 | + if (!$filter) { |
|
| 586 | 586 | throw new \Exception('Cannot create filter'); |
| 587 | 587 | } |
| 588 | 588 | |
@@ -595,7 +595,7 @@ discard block |
||
| 595 | 595 | * @throws \Exception |
| 596 | 596 | */ |
| 597 | 597 | public function getUserLoginFilter() { |
| 598 | - if(!$this->checkRequirements(array('ldapHost', |
|
| 598 | + if (!$this->checkRequirements(array('ldapHost', |
|
| 599 | 599 | 'ldapPort', |
| 600 | 600 | 'ldapBase', |
| 601 | 601 | 'ldapUserFilter', |
@@ -604,7 +604,7 @@ discard block |
||
| 604 | 604 | } |
| 605 | 605 | |
| 606 | 606 | $filter = $this->composeLdapFilter(self::LFILTER_LOGIN); |
| 607 | - if(!$filter) { |
|
| 607 | + if (!$filter) { |
|
| 608 | 608 | throw new \Exception('Cannot create filter'); |
| 609 | 609 | } |
| 610 | 610 | |
@@ -618,7 +618,7 @@ discard block |
||
| 618 | 618 | * @throws \Exception |
| 619 | 619 | */ |
| 620 | 620 | public function testLoginName($loginName) { |
| 621 | - if(!$this->checkRequirements(array('ldapHost', |
|
| 621 | + if (!$this->checkRequirements(array('ldapHost', |
|
| 622 | 622 | 'ldapPort', |
| 623 | 623 | 'ldapBase', |
| 624 | 624 | 'ldapLoginFilter', |
@@ -627,17 +627,17 @@ discard block |
||
| 627 | 627 | } |
| 628 | 628 | |
| 629 | 629 | $cr = $this->access->connection->getConnectionResource(); |
| 630 | - if(!$this->ldap->isResource($cr)) { |
|
| 630 | + if (!$this->ldap->isResource($cr)) { |
|
| 631 | 631 | throw new \Exception('connection error'); |
| 632 | 632 | } |
| 633 | 633 | |
| 634 | - if(mb_strpos($this->access->connection->ldapLoginFilter, '%uid', 0, 'UTF-8') |
|
| 634 | + if (mb_strpos($this->access->connection->ldapLoginFilter, '%uid', 0, 'UTF-8') |
|
| 635 | 635 | === false) { |
| 636 | 636 | throw new \Exception('missing placeholder'); |
| 637 | 637 | } |
| 638 | 638 | |
| 639 | 639 | $users = $this->access->countUsersByLoginName($loginName); |
| 640 | - if($this->ldap->errno($cr) !== 0) { |
|
| 640 | + if ($this->ldap->errno($cr) !== 0) { |
|
| 641 | 641 | throw new \Exception($this->ldap->error($cr)); |
| 642 | 642 | } |
| 643 | 643 | $filter = str_replace('%uid', $loginName, $this->access->connection->ldapLoginFilter); |
@@ -652,22 +652,22 @@ discard block |
||
| 652 | 652 | * @throws \Exception |
| 653 | 653 | */ |
| 654 | 654 | public function guessPortAndTLS() { |
| 655 | - if(!$this->checkRequirements(array('ldapHost', |
|
| 655 | + if (!$this->checkRequirements(array('ldapHost', |
|
| 656 | 656 | ))) { |
| 657 | 657 | return false; |
| 658 | 658 | } |
| 659 | 659 | $this->checkHost(); |
| 660 | 660 | $portSettings = $this->getPortSettingsToTry(); |
| 661 | 661 | |
| 662 | - if(!is_array($portSettings)) { |
|
| 662 | + if (!is_array($portSettings)) { |
|
| 663 | 663 | throw new \Exception(print_r($portSettings, true)); |
| 664 | 664 | } |
| 665 | 665 | |
| 666 | 666 | //proceed from the best configuration and return on first success |
| 667 | - foreach($portSettings as $setting) { |
|
| 667 | + foreach ($portSettings as $setting) { |
|
| 668 | 668 | $p = $setting['port']; |
| 669 | 669 | $t = $setting['tls']; |
| 670 | - \OCP\Util::writeLog('user_ldap', 'Wiz: trying port '. $p . ', TLS '. $t, \OCP\Util::DEBUG); |
|
| 670 | + \OCP\Util::writeLog('user_ldap', 'Wiz: trying port '.$p.', TLS '.$t, \OCP\Util::DEBUG); |
|
| 671 | 671 | //connectAndBind may throw Exception, it needs to be catched by the |
| 672 | 672 | //callee of this method |
| 673 | 673 | |
@@ -677,7 +677,7 @@ discard block |
||
| 677 | 677 | // any reply other than -1 (= cannot connect) is already okay, |
| 678 | 678 | // because then we found the server |
| 679 | 679 | // unavailable startTLS returns -11 |
| 680 | - if($e->getCode() > 0) { |
|
| 680 | + if ($e->getCode() > 0) { |
|
| 681 | 681 | $settingsFound = true; |
| 682 | 682 | } else { |
| 683 | 683 | throw $e; |
@@ -690,7 +690,7 @@ discard block |
||
| 690 | 690 | 'ldapTLS' => intval($t) |
| 691 | 691 | ); |
| 692 | 692 | $this->configuration->setConfiguration($config); |
| 693 | - \OCP\Util::writeLog('user_ldap', 'Wiz: detected Port ' . $p, \OCP\Util::DEBUG); |
|
| 693 | + \OCP\Util::writeLog('user_ldap', 'Wiz: detected Port '.$p, \OCP\Util::DEBUG); |
|
| 694 | 694 | $this->result->addChange('ldap_port', $p); |
| 695 | 695 | return $this->result; |
| 696 | 696 | } |
@@ -705,7 +705,7 @@ discard block |
||
| 705 | 705 | * @return WizardResult|false WizardResult on success, false otherwise |
| 706 | 706 | */ |
| 707 | 707 | public function guessBaseDN() { |
| 708 | - if(!$this->checkRequirements(array('ldapHost', |
|
| 708 | + if (!$this->checkRequirements(array('ldapHost', |
|
| 709 | 709 | 'ldapPort', |
| 710 | 710 | ))) { |
| 711 | 711 | return false; |
@@ -714,9 +714,9 @@ discard block |
||
| 714 | 714 | //check whether a DN is given in the agent name (99.9% of all cases) |
| 715 | 715 | $base = null; |
| 716 | 716 | $i = stripos($this->configuration->ldapAgentName, 'dc='); |
| 717 | - if($i !== false) { |
|
| 717 | + if ($i !== false) { |
|
| 718 | 718 | $base = substr($this->configuration->ldapAgentName, $i); |
| 719 | - if($this->testBaseDN($base)) { |
|
| 719 | + if ($this->testBaseDN($base)) { |
|
| 720 | 720 | $this->applyFind('ldap_base', $base); |
| 721 | 721 | return $this->result; |
| 722 | 722 | } |
@@ -727,13 +727,13 @@ discard block |
||
| 727 | 727 | //a base DN |
| 728 | 728 | $helper = new Helper(\OC::$server->getConfig()); |
| 729 | 729 | $domain = $helper->getDomainFromURL($this->configuration->ldapHost); |
| 730 | - if(!$domain) { |
|
| 730 | + if (!$domain) { |
|
| 731 | 731 | return false; |
| 732 | 732 | } |
| 733 | 733 | |
| 734 | 734 | $dparts = explode('.', $domain); |
| 735 | - while(count($dparts) > 0) { |
|
| 736 | - $base2 = 'dc=' . implode(',dc=', $dparts); |
|
| 735 | + while (count($dparts) > 0) { |
|
| 736 | + $base2 = 'dc='.implode(',dc=', $dparts); |
|
| 737 | 737 | if ($base !== $base2 && $this->testBaseDN($base2)) { |
| 738 | 738 | $this->applyFind('ldap_base', $base2); |
| 739 | 739 | return $this->result; |
@@ -766,7 +766,7 @@ discard block |
||
| 766 | 766 | $hostInfo = parse_url($host); |
| 767 | 767 | |
| 768 | 768 | //removes Port from Host |
| 769 | - if(is_array($hostInfo) && isset($hostInfo['port'])) { |
|
| 769 | + if (is_array($hostInfo) && isset($hostInfo['port'])) { |
|
| 770 | 770 | $port = $hostInfo['port']; |
| 771 | 771 | $host = str_replace(':'.$port, '', $host); |
| 772 | 772 | $this->applyFind('ldap_host', $host); |
@@ -783,30 +783,30 @@ discard block |
||
| 783 | 783 | private function detectGroupMemberAssoc() { |
| 784 | 784 | $possibleAttrs = array('uniqueMember', 'memberUid', 'member', 'gidNumber'); |
| 785 | 785 | $filter = $this->configuration->ldapGroupFilter; |
| 786 | - if(empty($filter)) { |
|
| 786 | + if (empty($filter)) { |
|
| 787 | 787 | return false; |
| 788 | 788 | } |
| 789 | 789 | $cr = $this->getConnection(); |
| 790 | - if(!$cr) { |
|
| 790 | + if (!$cr) { |
|
| 791 | 791 | throw new \Exception('Could not connect to LDAP'); |
| 792 | 792 | } |
| 793 | 793 | $base = $this->configuration->ldapBase[0]; |
| 794 | 794 | $rr = $this->ldap->search($cr, $base, $filter, $possibleAttrs, 0, 1000); |
| 795 | - if(!$this->ldap->isResource($rr)) { |
|
| 795 | + if (!$this->ldap->isResource($rr)) { |
|
| 796 | 796 | return false; |
| 797 | 797 | } |
| 798 | 798 | $er = $this->ldap->firstEntry($cr, $rr); |
| 799 | - while(is_resource($er)) { |
|
| 799 | + while (is_resource($er)) { |
|
| 800 | 800 | $this->ldap->getDN($cr, $er); |
| 801 | 801 | $attrs = $this->ldap->getAttributes($cr, $er); |
| 802 | 802 | $result = array(); |
| 803 | 803 | $possibleAttrsCount = count($possibleAttrs); |
| 804 | - for($i = 0; $i < $possibleAttrsCount; $i++) { |
|
| 805 | - if(isset($attrs[$possibleAttrs[$i]])) { |
|
| 804 | + for ($i = 0; $i < $possibleAttrsCount; $i++) { |
|
| 805 | + if (isset($attrs[$possibleAttrs[$i]])) { |
|
| 806 | 806 | $result[$possibleAttrs[$i]] = $attrs[$possibleAttrs[$i]]['count']; |
| 807 | 807 | } |
| 808 | 808 | } |
| 809 | - if(!empty($result)) { |
|
| 809 | + if (!empty($result)) { |
|
| 810 | 810 | natsort($result); |
| 811 | 811 | return key($result); |
| 812 | 812 | } |
@@ -825,14 +825,14 @@ discard block |
||
| 825 | 825 | */ |
| 826 | 826 | private function testBaseDN($base) { |
| 827 | 827 | $cr = $this->getConnection(); |
| 828 | - if(!$cr) { |
|
| 828 | + if (!$cr) { |
|
| 829 | 829 | throw new \Exception('Could not connect to LDAP'); |
| 830 | 830 | } |
| 831 | 831 | |
| 832 | 832 | //base is there, let's validate it. If we search for anything, we should |
| 833 | 833 | //get a result set > 0 on a proper base |
| 834 | 834 | $rr = $this->ldap->search($cr, $base, 'objectClass=*', array('dn'), 0, 1); |
| 835 | - if(!$this->ldap->isResource($rr)) { |
|
| 835 | + if (!$this->ldap->isResource($rr)) { |
|
| 836 | 836 | $errorNo = $this->ldap->errno($cr); |
| 837 | 837 | $errorMsg = $this->ldap->error($cr); |
| 838 | 838 | \OCP\Util::writeLog('user_ldap', 'Wiz: Could not search base '.$base. |
@@ -854,11 +854,11 @@ discard block |
||
| 854 | 854 | */ |
| 855 | 855 | private function testMemberOf() { |
| 856 | 856 | $cr = $this->getConnection(); |
| 857 | - if(!$cr) { |
|
| 857 | + if (!$cr) { |
|
| 858 | 858 | throw new \Exception('Could not connect to LDAP'); |
| 859 | 859 | } |
| 860 | 860 | $result = $this->access->countUsers('memberOf=*', array('memberOf'), 1); |
| 861 | - if(is_int($result) && $result > 0) { |
|
| 861 | + if (is_int($result) && $result > 0) { |
|
| 862 | 862 | return true; |
| 863 | 863 | } |
| 864 | 864 | return false; |
@@ -879,27 +879,27 @@ discard block |
||
| 879 | 879 | case self::LFILTER_USER_LIST: |
| 880 | 880 | $objcs = $this->configuration->ldapUserFilterObjectclass; |
| 881 | 881 | //glue objectclasses |
| 882 | - if(is_array($objcs) && count($objcs) > 0) { |
|
| 882 | + if (is_array($objcs) && count($objcs) > 0) { |
|
| 883 | 883 | $filter .= '(|'; |
| 884 | - foreach($objcs as $objc) { |
|
| 885 | - $filter .= '(objectclass=' . $objc . ')'; |
|
| 884 | + foreach ($objcs as $objc) { |
|
| 885 | + $filter .= '(objectclass='.$objc.')'; |
|
| 886 | 886 | } |
| 887 | 887 | $filter .= ')'; |
| 888 | 888 | $parts++; |
| 889 | 889 | } |
| 890 | 890 | //glue group memberships |
| 891 | - if($this->configuration->hasMemberOfFilterSupport) { |
|
| 891 | + if ($this->configuration->hasMemberOfFilterSupport) { |
|
| 892 | 892 | $cns = $this->configuration->ldapUserFilterGroups; |
| 893 | - if(is_array($cns) && count($cns) > 0) { |
|
| 893 | + if (is_array($cns) && count($cns) > 0) { |
|
| 894 | 894 | $filter .= '(|'; |
| 895 | 895 | $cr = $this->getConnection(); |
| 896 | - if(!$cr) { |
|
| 896 | + if (!$cr) { |
|
| 897 | 897 | throw new \Exception('Could not connect to LDAP'); |
| 898 | 898 | } |
| 899 | 899 | $base = $this->configuration->ldapBase[0]; |
| 900 | - foreach($cns as $cn) { |
|
| 901 | - $rr = $this->ldap->search($cr, $base, 'cn=' . $cn, array('dn', 'primaryGroupToken')); |
|
| 902 | - if(!$this->ldap->isResource($rr)) { |
|
| 900 | + foreach ($cns as $cn) { |
|
| 901 | + $rr = $this->ldap->search($cr, $base, 'cn='.$cn, array('dn', 'primaryGroupToken')); |
|
| 902 | + if (!$this->ldap->isResource($rr)) { |
|
| 903 | 903 | continue; |
| 904 | 904 | } |
| 905 | 905 | $er = $this->ldap->firstEntry($cr, $rr); |
@@ -908,11 +908,11 @@ discard block |
||
| 908 | 908 | if ($dn === false || $dn === '') { |
| 909 | 909 | continue; |
| 910 | 910 | } |
| 911 | - $filterPart = '(memberof=' . $dn . ')'; |
|
| 912 | - if(isset($attrs['primaryGroupToken'])) { |
|
| 911 | + $filterPart = '(memberof='.$dn.')'; |
|
| 912 | + if (isset($attrs['primaryGroupToken'])) { |
|
| 913 | 913 | $pgt = $attrs['primaryGroupToken'][0]; |
| 914 | - $primaryFilterPart = '(primaryGroupID=' . $pgt .')'; |
|
| 915 | - $filterPart = '(|' . $filterPart . $primaryFilterPart . ')'; |
|
| 914 | + $primaryFilterPart = '(primaryGroupID='.$pgt.')'; |
|
| 915 | + $filterPart = '(|'.$filterPart.$primaryFilterPart.')'; |
|
| 916 | 916 | } |
| 917 | 917 | $filter .= $filterPart; |
| 918 | 918 | } |
@@ -921,8 +921,8 @@ discard block |
||
| 921 | 921 | $parts++; |
| 922 | 922 | } |
| 923 | 923 | //wrap parts in AND condition |
| 924 | - if($parts > 1) { |
|
| 925 | - $filter = '(&' . $filter . ')'; |
|
| 924 | + if ($parts > 1) { |
|
| 925 | + $filter = '(&'.$filter.')'; |
|
| 926 | 926 | } |
| 927 | 927 | if ($filter === '') { |
| 928 | 928 | $filter = '(objectclass=*)'; |
@@ -932,27 +932,27 @@ discard block |
||
| 932 | 932 | case self::LFILTER_GROUP_LIST: |
| 933 | 933 | $objcs = $this->configuration->ldapGroupFilterObjectclass; |
| 934 | 934 | //glue objectclasses |
| 935 | - if(is_array($objcs) && count($objcs) > 0) { |
|
| 935 | + if (is_array($objcs) && count($objcs) > 0) { |
|
| 936 | 936 | $filter .= '(|'; |
| 937 | - foreach($objcs as $objc) { |
|
| 938 | - $filter .= '(objectclass=' . $objc . ')'; |
|
| 937 | + foreach ($objcs as $objc) { |
|
| 938 | + $filter .= '(objectclass='.$objc.')'; |
|
| 939 | 939 | } |
| 940 | 940 | $filter .= ')'; |
| 941 | 941 | $parts++; |
| 942 | 942 | } |
| 943 | 943 | //glue group memberships |
| 944 | 944 | $cns = $this->configuration->ldapGroupFilterGroups; |
| 945 | - if(is_array($cns) && count($cns) > 0) { |
|
| 945 | + if (is_array($cns) && count($cns) > 0) { |
|
| 946 | 946 | $filter .= '(|'; |
| 947 | - foreach($cns as $cn) { |
|
| 948 | - $filter .= '(cn=' . $cn . ')'; |
|
| 947 | + foreach ($cns as $cn) { |
|
| 948 | + $filter .= '(cn='.$cn.')'; |
|
| 949 | 949 | } |
| 950 | 950 | $filter .= ')'; |
| 951 | 951 | } |
| 952 | 952 | $parts++; |
| 953 | 953 | //wrap parts in AND condition |
| 954 | - if($parts > 1) { |
|
| 955 | - $filter = '(&' . $filter . ')'; |
|
| 954 | + if ($parts > 1) { |
|
| 955 | + $filter = '(&'.$filter.')'; |
|
| 956 | 956 | } |
| 957 | 957 | break; |
| 958 | 958 | |
@@ -964,47 +964,47 @@ discard block |
||
| 964 | 964 | $userAttributes = array_change_key_case(array_flip($userAttributes)); |
| 965 | 965 | $parts = 0; |
| 966 | 966 | |
| 967 | - if($this->configuration->ldapLoginFilterUsername === '1') { |
|
| 967 | + if ($this->configuration->ldapLoginFilterUsername === '1') { |
|
| 968 | 968 | $attr = ''; |
| 969 | - if(isset($userAttributes['uid'])) { |
|
| 969 | + if (isset($userAttributes['uid'])) { |
|
| 970 | 970 | $attr = 'uid'; |
| 971 | - } else if(isset($userAttributes['samaccountname'])) { |
|
| 971 | + } else if (isset($userAttributes['samaccountname'])) { |
|
| 972 | 972 | $attr = 'samaccountname'; |
| 973 | - } else if(isset($userAttributes['cn'])) { |
|
| 973 | + } else if (isset($userAttributes['cn'])) { |
|
| 974 | 974 | //fallback |
| 975 | 975 | $attr = 'cn'; |
| 976 | 976 | } |
| 977 | 977 | if ($attr !== '') { |
| 978 | - $filterUsername = '(' . $attr . $loginpart . ')'; |
|
| 978 | + $filterUsername = '('.$attr.$loginpart.')'; |
|
| 979 | 979 | $parts++; |
| 980 | 980 | } |
| 981 | 981 | } |
| 982 | 982 | |
| 983 | 983 | $filterEmail = ''; |
| 984 | - if($this->configuration->ldapLoginFilterEmail === '1') { |
|
| 984 | + if ($this->configuration->ldapLoginFilterEmail === '1') { |
|
| 985 | 985 | $filterEmail = '(|(mailPrimaryAddress=%uid)(mail=%uid))'; |
| 986 | 986 | $parts++; |
| 987 | 987 | } |
| 988 | 988 | |
| 989 | 989 | $filterAttributes = ''; |
| 990 | 990 | $attrsToFilter = $this->configuration->ldapLoginFilterAttributes; |
| 991 | - if(is_array($attrsToFilter) && count($attrsToFilter) > 0) { |
|
| 991 | + if (is_array($attrsToFilter) && count($attrsToFilter) > 0) { |
|
| 992 | 992 | $filterAttributes = '(|'; |
| 993 | - foreach($attrsToFilter as $attribute) { |
|
| 994 | - $filterAttributes .= '(' . $attribute . $loginpart . ')'; |
|
| 993 | + foreach ($attrsToFilter as $attribute) { |
|
| 994 | + $filterAttributes .= '('.$attribute.$loginpart.')'; |
|
| 995 | 995 | } |
| 996 | 996 | $filterAttributes .= ')'; |
| 997 | 997 | $parts++; |
| 998 | 998 | } |
| 999 | 999 | |
| 1000 | 1000 | $filterLogin = ''; |
| 1001 | - if($parts > 1) { |
|
| 1001 | + if ($parts > 1) { |
|
| 1002 | 1002 | $filterLogin = '(|'; |
| 1003 | 1003 | } |
| 1004 | 1004 | $filterLogin .= $filterUsername; |
| 1005 | 1005 | $filterLogin .= $filterEmail; |
| 1006 | 1006 | $filterLogin .= $filterAttributes; |
| 1007 | - if($parts > 1) { |
|
| 1007 | + if ($parts > 1) { |
|
| 1008 | 1008 | $filterLogin .= ')'; |
| 1009 | 1009 | } |
| 1010 | 1010 | |
@@ -1029,12 +1029,12 @@ discard block |
||
| 1029 | 1029 | //connect, does not really trigger any server communication |
| 1030 | 1030 | $host = $this->configuration->ldapHost; |
| 1031 | 1031 | $hostInfo = parse_url($host); |
| 1032 | - if(!$hostInfo) { |
|
| 1032 | + if (!$hostInfo) { |
|
| 1033 | 1033 | throw new \Exception(self::$l->t('Invalid Host')); |
| 1034 | 1034 | } |
| 1035 | 1035 | \OCP\Util::writeLog('user_ldap', 'Wiz: Attempting to connect ', \OCP\Util::DEBUG); |
| 1036 | 1036 | $cr = $this->ldap->connect($host, $port); |
| 1037 | - if(!is_resource($cr)) { |
|
| 1037 | + if (!is_resource($cr)) { |
|
| 1038 | 1038 | throw new \Exception(self::$l->t('Invalid Host')); |
| 1039 | 1039 | } |
| 1040 | 1040 | |
@@ -1044,9 +1044,9 @@ discard block |
||
| 1044 | 1044 | $this->ldap->setOption($cr, LDAP_OPT_NETWORK_TIMEOUT, self::LDAP_NW_TIMEOUT); |
| 1045 | 1045 | |
| 1046 | 1046 | try { |
| 1047 | - if($tls) { |
|
| 1047 | + if ($tls) { |
|
| 1048 | 1048 | $isTlsWorking = @$this->ldap->startTls($cr); |
| 1049 | - if(!$isTlsWorking) { |
|
| 1049 | + if (!$isTlsWorking) { |
|
| 1050 | 1050 | return false; |
| 1051 | 1051 | } |
| 1052 | 1052 | } |
@@ -1060,17 +1060,17 @@ discard block |
||
| 1060 | 1060 | $errNo = $this->ldap->errno($cr); |
| 1061 | 1061 | $error = ldap_error($cr); |
| 1062 | 1062 | $this->ldap->unbind($cr); |
| 1063 | - } catch(ServerNotAvailableException $e) { |
|
| 1063 | + } catch (ServerNotAvailableException $e) { |
|
| 1064 | 1064 | return false; |
| 1065 | 1065 | } |
| 1066 | 1066 | |
| 1067 | - if($login === true) { |
|
| 1067 | + if ($login === true) { |
|
| 1068 | 1068 | $this->ldap->unbind($cr); |
| 1069 | - \OCP\Util::writeLog('user_ldap', 'Wiz: Bind successful to Port '. $port . ' TLS ' . intval($tls), \OCP\Util::DEBUG); |
|
| 1069 | + \OCP\Util::writeLog('user_ldap', 'Wiz: Bind successful to Port '.$port.' TLS '.intval($tls), \OCP\Util::DEBUG); |
|
| 1070 | 1070 | return true; |
| 1071 | 1071 | } |
| 1072 | 1072 | |
| 1073 | - if($errNo === -1) { |
|
| 1073 | + if ($errNo === -1) { |
|
| 1074 | 1074 | //host, port or TLS wrong |
| 1075 | 1075 | return false; |
| 1076 | 1076 | } |
@@ -1098,9 +1098,9 @@ discard block |
||
| 1098 | 1098 | */ |
| 1099 | 1099 | private function checkRequirements($reqs) { |
| 1100 | 1100 | $this->checkAgentRequirements(); |
| 1101 | - foreach($reqs as $option) { |
|
| 1101 | + foreach ($reqs as $option) { |
|
| 1102 | 1102 | $value = $this->configuration->$option; |
| 1103 | - if(empty($value)) { |
|
| 1103 | + if (empty($value)) { |
|
| 1104 | 1104 | return false; |
| 1105 | 1105 | } |
| 1106 | 1106 | } |
@@ -1122,33 +1122,33 @@ discard block |
||
| 1122 | 1122 | $dnRead = array(); |
| 1123 | 1123 | $foundItems = array(); |
| 1124 | 1124 | $maxEntries = 0; |
| 1125 | - if(!is_array($this->configuration->ldapBase) |
|
| 1125 | + if (!is_array($this->configuration->ldapBase) |
|
| 1126 | 1126 | || !isset($this->configuration->ldapBase[0])) { |
| 1127 | 1127 | return false; |
| 1128 | 1128 | } |
| 1129 | 1129 | $base = $this->configuration->ldapBase[0]; |
| 1130 | 1130 | $cr = $this->getConnection(); |
| 1131 | - if(!$this->ldap->isResource($cr)) { |
|
| 1131 | + if (!$this->ldap->isResource($cr)) { |
|
| 1132 | 1132 | return false; |
| 1133 | 1133 | } |
| 1134 | 1134 | $lastFilter = null; |
| 1135 | - if(isset($filters[count($filters)-1])) { |
|
| 1136 | - $lastFilter = $filters[count($filters)-1]; |
|
| 1135 | + if (isset($filters[count($filters) - 1])) { |
|
| 1136 | + $lastFilter = $filters[count($filters) - 1]; |
|
| 1137 | 1137 | } |
| 1138 | - foreach($filters as $filter) { |
|
| 1139 | - if($lastFilter === $filter && count($foundItems) > 0) { |
|
| 1138 | + foreach ($filters as $filter) { |
|
| 1139 | + if ($lastFilter === $filter && count($foundItems) > 0) { |
|
| 1140 | 1140 | //skip when the filter is a wildcard and results were found |
| 1141 | 1141 | continue; |
| 1142 | 1142 | } |
| 1143 | 1143 | // 20k limit for performance and reason |
| 1144 | 1144 | $rr = $this->ldap->search($cr, $base, $filter, array($attr), 0, 20000); |
| 1145 | - if(!$this->ldap->isResource($rr)) { |
|
| 1145 | + if (!$this->ldap->isResource($rr)) { |
|
| 1146 | 1146 | continue; |
| 1147 | 1147 | } |
| 1148 | 1148 | $entries = $this->ldap->countEntries($cr, $rr); |
| 1149 | 1149 | $getEntryFunc = 'firstEntry'; |
| 1150 | - if(($entries !== false) && ($entries > 0)) { |
|
| 1151 | - if(!is_null($maxF) && $entries > $maxEntries) { |
|
| 1150 | + if (($entries !== false) && ($entries > 0)) { |
|
| 1151 | + if (!is_null($maxF) && $entries > $maxEntries) { |
|
| 1152 | 1152 | $maxEntries = $entries; |
| 1153 | 1153 | $maxF = $filter; |
| 1154 | 1154 | } |
@@ -1156,13 +1156,13 @@ discard block |
||
| 1156 | 1156 | do { |
| 1157 | 1157 | $entry = $this->ldap->$getEntryFunc($cr, $rr); |
| 1158 | 1158 | $getEntryFunc = 'nextEntry'; |
| 1159 | - if(!$this->ldap->isResource($entry)) { |
|
| 1159 | + if (!$this->ldap->isResource($entry)) { |
|
| 1160 | 1160 | continue 2; |
| 1161 | 1161 | } |
| 1162 | 1162 | $rr = $entry; //will be expected by nextEntry next round |
| 1163 | 1163 | $attributes = $this->ldap->getAttributes($cr, $entry); |
| 1164 | 1164 | $dn = $this->ldap->getDN($cr, $entry); |
| 1165 | - if($dn === false || in_array($dn, $dnRead)) { |
|
| 1165 | + if ($dn === false || in_array($dn, $dnRead)) { |
|
| 1166 | 1166 | continue; |
| 1167 | 1167 | } |
| 1168 | 1168 | $newItems = array(); |
@@ -1173,7 +1173,7 @@ discard block |
||
| 1173 | 1173 | $foundItems = array_merge($foundItems, $newItems); |
| 1174 | 1174 | $this->resultCache[$dn][$attr] = $newItems; |
| 1175 | 1175 | $dnRead[] = $dn; |
| 1176 | - } while(($state === self::LRESULT_PROCESSED_SKIP |
|
| 1176 | + } while (($state === self::LRESULT_PROCESSED_SKIP |
|
| 1177 | 1177 | || $this->ldap->isResource($entry)) |
| 1178 | 1178 | && ($dnReadLimit === 0 || $dnReadCount < $dnReadLimit)); |
| 1179 | 1179 | } |
@@ -1196,11 +1196,11 @@ discard block |
||
| 1196 | 1196 | */ |
| 1197 | 1197 | private function determineFeature($objectclasses, $attr, $dbkey, $confkey, $po = false) { |
| 1198 | 1198 | $cr = $this->getConnection(); |
| 1199 | - if(!$cr) { |
|
| 1199 | + if (!$cr) { |
|
| 1200 | 1200 | throw new \Exception('Could not connect to LDAP'); |
| 1201 | 1201 | } |
| 1202 | 1202 | $p = 'objectclass='; |
| 1203 | - foreach($objectclasses as $key => $value) { |
|
| 1203 | + foreach ($objectclasses as $key => $value) { |
|
| 1204 | 1204 | $objectclasses[$key] = $p.$value; |
| 1205 | 1205 | } |
| 1206 | 1206 | $maxEntryObjC = ''; |
@@ -1212,7 +1212,7 @@ discard block |
||
| 1212 | 1212 | $availableFeatures = |
| 1213 | 1213 | $this->cumulativeSearchOnAttribute($objectclasses, $attr, |
| 1214 | 1214 | $dig, $maxEntryObjC); |
| 1215 | - if(is_array($availableFeatures) |
|
| 1215 | + if (is_array($availableFeatures) |
|
| 1216 | 1216 | && count($availableFeatures) > 0) { |
| 1217 | 1217 | natcasesort($availableFeatures); |
| 1218 | 1218 | //natcasesort keeps indices, but we must get rid of them for proper |
@@ -1223,7 +1223,7 @@ discard block |
||
| 1223 | 1223 | } |
| 1224 | 1224 | |
| 1225 | 1225 | $setFeatures = $this->configuration->$confkey; |
| 1226 | - if(is_array($setFeatures) && !empty($setFeatures)) { |
|
| 1226 | + if (is_array($setFeatures) && !empty($setFeatures)) { |
|
| 1227 | 1227 | //something is already configured? pre-select it. |
| 1228 | 1228 | $this->result->addChange($dbkey, $setFeatures); |
| 1229 | 1229 | } else if ($po && $maxEntryObjC !== '') { |
@@ -1245,7 +1245,7 @@ discard block |
||
| 1245 | 1245 | * LRESULT_PROCESSED_INVALID or LRESULT_PROCESSED_SKIP |
| 1246 | 1246 | */ |
| 1247 | 1247 | private function getAttributeValuesFromEntry($result, $attribute, &$known) { |
| 1248 | - if(!is_array($result) |
|
| 1248 | + if (!is_array($result) |
|
| 1249 | 1249 | || !isset($result['count']) |
| 1250 | 1250 | || !$result['count'] > 0) { |
| 1251 | 1251 | return self::LRESULT_PROCESSED_INVALID; |
@@ -1254,12 +1254,12 @@ discard block |
||
| 1254 | 1254 | // strtolower on all keys for proper comparison |
| 1255 | 1255 | $result = \OCP\Util::mb_array_change_key_case($result); |
| 1256 | 1256 | $attribute = strtolower($attribute); |
| 1257 | - if(isset($result[$attribute])) { |
|
| 1258 | - foreach($result[$attribute] as $key => $val) { |
|
| 1259 | - if($key === 'count') { |
|
| 1257 | + if (isset($result[$attribute])) { |
|
| 1258 | + foreach ($result[$attribute] as $key => $val) { |
|
| 1259 | + if ($key === 'count') { |
|
| 1260 | 1260 | continue; |
| 1261 | 1261 | } |
| 1262 | - if(!in_array($val, $known)) { |
|
| 1262 | + if (!in_array($val, $known)) { |
|
| 1263 | 1263 | $known[] = $val; |
| 1264 | 1264 | } |
| 1265 | 1265 | } |
@@ -1273,7 +1273,7 @@ discard block |
||
| 1273 | 1273 | * @return bool|mixed |
| 1274 | 1274 | */ |
| 1275 | 1275 | private function getConnection() { |
| 1276 | - if(!is_null($this->cr)) { |
|
| 1276 | + if (!is_null($this->cr)) { |
|
| 1277 | 1277 | return $this->cr; |
| 1278 | 1278 | } |
| 1279 | 1279 | |
@@ -1285,14 +1285,14 @@ discard block |
||
| 1285 | 1285 | $this->ldap->setOption($cr, LDAP_OPT_PROTOCOL_VERSION, 3); |
| 1286 | 1286 | $this->ldap->setOption($cr, LDAP_OPT_REFERRALS, 0); |
| 1287 | 1287 | $this->ldap->setOption($cr, LDAP_OPT_NETWORK_TIMEOUT, self::LDAP_NW_TIMEOUT); |
| 1288 | - if($this->configuration->ldapTLS === 1) { |
|
| 1288 | + if ($this->configuration->ldapTLS === 1) { |
|
| 1289 | 1289 | $this->ldap->startTls($cr); |
| 1290 | 1290 | } |
| 1291 | 1291 | |
| 1292 | 1292 | $lo = @$this->ldap->bind($cr, |
| 1293 | 1293 | $this->configuration->ldapAgentName, |
| 1294 | 1294 | $this->configuration->ldapAgentPassword); |
| 1295 | - if($lo === true) { |
|
| 1295 | + if ($lo === true) { |
|
| 1296 | 1296 | $this->$cr = $cr; |
| 1297 | 1297 | return $cr; |
| 1298 | 1298 | } |
@@ -1327,14 +1327,14 @@ discard block |
||
| 1327 | 1327 | $portSettings = array(); |
| 1328 | 1328 | |
| 1329 | 1329 | //In case the port is already provided, we will check this first |
| 1330 | - if($port > 0) { |
|
| 1330 | + if ($port > 0) { |
|
| 1331 | 1331 | $hostInfo = parse_url($host); |
| 1332 | - if(!(is_array($hostInfo) |
|
| 1332 | + if (!(is_array($hostInfo) |
|
| 1333 | 1333 | && isset($hostInfo['scheme']) |
| 1334 | 1334 | && stripos($hostInfo['scheme'], 'ldaps') !== false)) { |
| 1335 | 1335 | $portSettings[] = array('port' => $port, 'tls' => true); |
| 1336 | 1336 | } |
| 1337 | - $portSettings[] =array('port' => $port, 'tls' => false); |
|
| 1337 | + $portSettings[] = array('port' => $port, 'tls' => false); |
|
| 1338 | 1338 | } |
| 1339 | 1339 | |
| 1340 | 1340 | //default ports |
@@ -46,15 +46,15 @@ |
||
| 46 | 46 | const CREATE_GROUP = 0x00000001; |
| 47 | 47 | const DELETE_GROUP = 0x00000010; |
| 48 | 48 | const ADD_TO_GROUP = 0x00000100; |
| 49 | - const REMOVE_FROM_GOUP = 0x00001000; // oops |
|
| 50 | - const REMOVE_FROM_GROUP = 0x00001000; |
|
| 49 | + const REMOVE_FROM_GOUP = 0x00001000; // oops |
|
| 50 | + const REMOVE_FROM_GROUP = 0x00001000; |
|
| 51 | 51 | //OBSOLETE const GET_DISPLAYNAME = 0x00010000; |
| 52 | - const COUNT_USERS = 0x00100000; |
|
| 53 | - const GROUP_DETAILS = 0x01000000; |
|
| 52 | + const COUNT_USERS = 0x00100000; |
|
| 53 | + const GROUP_DETAILS = 0x01000000; |
|
| 54 | 54 | /** |
| 55 | 55 | * @since 13.0.0 |
| 56 | 56 | */ |
| 57 | - const IS_ADMIN = 0x10000000; |
|
| 57 | + const IS_ADMIN = 0x10000000; |
|
| 58 | 58 | |
| 59 | 59 | /** |
| 60 | 60 | * Check if backend implements actions |
@@ -1,3 +1,3 @@ |
||
| 1 | 1 | <div class="section"> |
| 2 | - <p><?php include(__DIR__ . '/../../settings.development.notice.php'); ?></p> |
|
| 2 | + <p><?php include(__DIR__.'/../../settings.development.notice.php'); ?></p> |
|
| 3 | 3 | </div> |
@@ -71,18 +71,18 @@ |
||
| 71 | 71 | $errorMessage = $this->getLastError(); |
| 72 | 72 | if ($errorMessage) { |
| 73 | 73 | throw new \OC\DatabaseSetupException($this->trans->t('Oracle connection could not be established'), |
| 74 | - $errorMessage . ' Check environment: ORACLE_HOME=' . getenv('ORACLE_HOME') |
|
| 75 | - . ' ORACLE_SID=' . getenv('ORACLE_SID') |
|
| 76 | - . ' LD_LIBRARY_PATH=' . getenv('LD_LIBRARY_PATH') |
|
| 77 | - . ' NLS_LANG=' . getenv('NLS_LANG') |
|
| 78 | - . ' tnsnames.ora is ' . (is_readable(getenv('ORACLE_HOME') . '/network/admin/tnsnames.ora') ? '' : 'not ') . 'readable'); |
|
| 74 | + $errorMessage.' Check environment: ORACLE_HOME='.getenv('ORACLE_HOME') |
|
| 75 | + . ' ORACLE_SID='.getenv('ORACLE_SID') |
|
| 76 | + . ' LD_LIBRARY_PATH='.getenv('LD_LIBRARY_PATH') |
|
| 77 | + . ' NLS_LANG='.getenv('NLS_LANG') |
|
| 78 | + . ' tnsnames.ora is '.(is_readable(getenv('ORACLE_HOME').'/network/admin/tnsnames.ora') ? '' : 'not ').'readable'); |
|
| 79 | 79 | } |
| 80 | 80 | throw new \OC\DatabaseSetupException($this->trans->t('Oracle username and/or password not valid'), |
| 81 | - 'Check environment: ORACLE_HOME=' . getenv('ORACLE_HOME') |
|
| 82 | - . ' ORACLE_SID=' . getenv('ORACLE_SID') |
|
| 83 | - . ' LD_LIBRARY_PATH=' . getenv('LD_LIBRARY_PATH') |
|
| 84 | - . ' NLS_LANG=' . getenv('NLS_LANG') |
|
| 85 | - . ' tnsnames.ora is ' . (is_readable(getenv('ORACLE_HOME') . '/network/admin/tnsnames.ora') ? '' : 'not ') . 'readable'); |
|
| 81 | + 'Check environment: ORACLE_HOME='.getenv('ORACLE_HOME') |
|
| 82 | + . ' ORACLE_SID='.getenv('ORACLE_SID') |
|
| 83 | + . ' LD_LIBRARY_PATH='.getenv('LD_LIBRARY_PATH') |
|
| 84 | + . ' NLS_LANG='.getenv('NLS_LANG') |
|
| 85 | + . ' tnsnames.ora is '.(is_readable(getenv('ORACLE_HOME').'/network/admin/tnsnames.ora') ? '' : 'not ').'readable'); |
|
| 86 | 86 | } |
| 87 | 87 | |
| 88 | 88 | $this->config->setValues([ |
@@ -59,11 +59,11 @@ |
||
| 59 | 59 | protected function getValidatedType($type) { |
| 60 | 60 | $type = trim(strval($type)); |
| 61 | 61 | |
| 62 | - if($type === '') { |
|
| 62 | + if ($type === '') { |
|
| 63 | 63 | throw new \InvalidArgumentException('Type must not be empty'); |
| 64 | 64 | } |
| 65 | 65 | |
| 66 | - if($type === 'exact') { |
|
| 66 | + if ($type === 'exact') { |
|
| 67 | 67 | throw new \InvalidArgumentException('Provided type is a reserved word'); |
| 68 | 68 | } |
| 69 | 69 | |
@@ -22,7 +22,7 @@ discard block |
||
| 22 | 22 | */ |
| 23 | 23 | |
| 24 | 24 | style('settings', 'settings'); |
| 25 | -script('settings', [ 'settings', 'admin', 'log', 'certificates'] ); |
|
| 25 | +script('settings', ['settings', 'admin', 'log', 'certificates']); |
|
| 26 | 26 | script('core', ['multiselect', 'setupchecks']); |
| 27 | 27 | script('files', 'jquery.fileupload'); |
| 28 | 28 | |
@@ -32,10 +32,10 @@ discard block |
||
| 32 | 32 | <ul> |
| 33 | 33 | <li class="settings-caption"><?php p($l->t('Personal')); ?></li> |
| 34 | 34 | <?php |
| 35 | - foreach($_['forms']['personal'] as $form) { |
|
| 35 | + foreach ($_['forms']['personal'] as $form) { |
|
| 36 | 36 | if (isset($form['anchor'])) { |
| 37 | 37 | $anchor = \OC::$server->getURLGenerator()->linkToRoute('settings.PersonalSettings.index', ['section' => $form['anchor']]); |
| 38 | - $class = 'nav-icon-' . $form['anchor']; |
|
| 38 | + $class = 'nav-icon-'.$form['anchor']; |
|
| 39 | 39 | $sectionName = $form['section-name']; |
| 40 | 40 | $active = $form['active'] ? ' class="active"' : ''; |
| 41 | 41 | ?> |
@@ -55,16 +55,16 @@ discard block |
||
| 55 | 55 | ?> |
| 56 | 56 | |
| 57 | 57 | <?php |
| 58 | - if(!empty($_['forms']['admin'])) { |
|
| 58 | + if (!empty($_['forms']['admin'])) { |
|
| 59 | 59 | ?> |
| 60 | 60 | <li class="settings-caption"><?php p($l->t('Administration')); ?></li> |
| 61 | 61 | <?php |
| 62 | 62 | } |
| 63 | - foreach($_['forms']['admin'] as $form) { |
|
| 63 | + foreach ($_['forms']['admin'] as $form) { |
|
| 64 | 64 | if (isset($form['anchor'])) { |
| 65 | 65 | |
| 66 | 66 | $anchor = \OC::$server->getURLGenerator()->linkToRoute('settings.AdminSettings.index', ['section' => $form['anchor']]); |
| 67 | - $class = 'nav-icon-' . $form['anchor']; |
|
| 67 | + $class = 'nav-icon-'.$form['anchor']; |
|
| 68 | 68 | $sectionName = $form['section-name']; |
| 69 | 69 | $active = $form['active'] ? ' class="active"' : ''; |
| 70 | 70 | ?> |
@@ -88,7 +88,7 @@ |
||
| 88 | 88 | protected function shouldRun() { |
| 89 | 89 | $schema = $this->db->createSchema(); |
| 90 | 90 | |
| 91 | - $tableName = $this->config->getSystemValue('dbtableprefix', 'oc_') . 'accounts'; |
|
| 91 | + $tableName = $this->config->getSystemValue('dbtableprefix', 'oc_').'accounts'; |
|
| 92 | 92 | if (!$schema->hasTable($tableName)) { |
| 93 | 93 | return false; |
| 94 | 94 | } |