Completed
Push — master ( 45c35f...d9247f )
by Blizzz
15:51
created
apps/user_ldap/lib/User_LDAP.php 1 patch
Spacing   +47 added lines, -47 removed lines patch added patch discarded remove patch
@@ -103,16 +103,16 @@  discard block
 block discarded – undo
103 103
 			return $this->userPluginManager->canChangeAvatar($uid);
104 104
 		}
105 105
 
106
-		if(!$this->implementsActions(Backend::PROVIDE_AVATAR)) {
106
+		if (!$this->implementsActions(Backend::PROVIDE_AVATAR)) {
107 107
 			return true;
108 108
 		}
109 109
 
110 110
 		$user = $this->access->userManager->get($uid);
111
-		if(!$user instanceof User) {
111
+		if (!$user instanceof User) {
112 112
 			return false;
113 113
 		}
114 114
 		$imageData = $user->getAvatarImage();
115
-		if($imageData === false) {
115
+		if ($imageData === false) {
116 116
 			return true;
117 117
 		}
118 118
 		return !$user->updateAvatar(true);
@@ -126,7 +126,7 @@  discard block
 block discarded – undo
126 126
 	 * @throws \Exception
127 127
 	 */
128 128
 	public function loginName2UserName($loginName) {
129
-		$cacheKey = 'loginName2UserName-' . $loginName;
129
+		$cacheKey = 'loginName2UserName-'.$loginName;
130 130
 		$username = $this->access->connection->getFromCache($cacheKey);
131 131
 
132 132
 		if ($username !== null) {
@@ -172,9 +172,9 @@  discard block
 block discarded – undo
172 172
 		//find out dn of the user name
173 173
 		$attrs = $this->access->userManager->getAttributes();
174 174
 		$users = $this->access->fetchUsersByLoginName($loginName, $attrs);
175
-		if(count($users) < 1) {
176
-			throw new NotOnLDAP('No user available for the given login name on ' .
177
-				$this->access->connection->ldapHost . ':' . $this->access->connection->ldapPort);
175
+		if (count($users) < 1) {
176
+			throw new NotOnLDAP('No user available for the given login name on '.
177
+				$this->access->connection->ldapHost.':'.$this->access->connection->ldapPort);
178 178
 		}
179 179
 		return $users[0];
180 180
 	}
@@ -189,8 +189,8 @@  discard block
 block discarded – undo
189 189
 	public function checkPassword($uid, $password) {
190 190
 		try {
191 191
 			$ldapRecord = $this->getLDAPUserByLoginName($uid);
192
-		} catch(NotOnLDAP $e) {
193
-			if($this->ocConfig->getSystemValue('loglevel', ILogger::WARN) === ILogger::DEBUG) {
192
+		} catch (NotOnLDAP $e) {
193
+			if ($this->ocConfig->getSystemValue('loglevel', ILogger::WARN) === ILogger::DEBUG) {
194 194
 				\OC::$server->getLogger()->logException($e, ['app' => 'user_ldap']);
195 195
 			}
196 196
 			return false;
@@ -198,16 +198,16 @@  discard block
 block discarded – undo
198 198
 		$dn = $ldapRecord['dn'][0];
199 199
 		$user = $this->access->userManager->get($dn);
200 200
 
201
-		if(!$user instanceof User) {
201
+		if (!$user instanceof User) {
202 202
 			Util::writeLog('user_ldap',
203
-				'LDAP Login: Could not get user object for DN ' . $dn .
203
+				'LDAP Login: Could not get user object for DN '.$dn.
204 204
 				'. Maybe the LDAP entry has no set display name attribute?',
205 205
 				ILogger::WARN);
206 206
 			return false;
207 207
 		}
208
-		if($user->getUsername() !== false) {
208
+		if ($user->getUsername() !== false) {
209 209
 			//are the credentials OK?
210
-			if(!$this->access->areCredentialsValid($dn, $password)) {
210
+			if (!$this->access->areCredentialsValid($dn, $password)) {
211 211
 				return false;
212 212
 			}
213 213
 
@@ -234,14 +234,14 @@  discard block
 block discarded – undo
234 234
 
235 235
 		$user = $this->access->userManager->get($uid);
236 236
 
237
-		if(!$user instanceof User) {
238
-			throw new \Exception('LDAP setPassword: Could not get user object for uid ' . $uid .
237
+		if (!$user instanceof User) {
238
+			throw new \Exception('LDAP setPassword: Could not get user object for uid '.$uid.
239 239
 				'. Maybe the LDAP entry has no set display name attribute?');
240 240
 		}
241
-		if($user->getUsername() !== false && $this->access->setPassword($user->getDN(), $password)) {
241
+		if ($user->getUsername() !== false && $this->access->setPassword($user->getDN(), $password)) {
242 242
 			$ldapDefaultPPolicyDN = $this->access->connection->ldapDefaultPPolicyDN;
243 243
 			$turnOnPasswordChange = $this->access->connection->turnOnPasswordChange;
244
-			if (!empty($ldapDefaultPPolicyDN) && ((int)$turnOnPasswordChange === 1)) {
244
+			if (!empty($ldapDefaultPPolicyDN) && ((int) $turnOnPasswordChange === 1)) {
245 245
 				//remove last password expiry warning if any
246 246
 				$notification = $this->notificationManager->createNotification();
247 247
 				$notification->setApp('user_ldap')
@@ -270,18 +270,18 @@  discard block
 block discarded – undo
270 270
 
271 271
 		//check if users are cached, if so return
272 272
 		$ldap_users = $this->access->connection->getFromCache($cachekey);
273
-		if(!is_null($ldap_users)) {
273
+		if (!is_null($ldap_users)) {
274 274
 			return $ldap_users;
275 275
 		}
276 276
 
277 277
 		// if we'd pass -1 to LDAP search, we'd end up in a Protocol
278 278
 		// error. With a limit of 0, we get 0 results. So we pass null.
279
-		if($limit <= 0) {
279
+		if ($limit <= 0) {
280 280
 			$limit = null;
281 281
 		}
282 282
 		$filter = $this->access->combineFilterWithAnd(array(
283 283
 			$this->access->connection->ldapUserFilter,
284
-			$this->access->connection->ldapUserDisplayName . '=*',
284
+			$this->access->connection->ldapUserDisplayName.'=*',
285 285
 			$this->access->getFilterPartForUserSearch($search)
286 286
 		));
287 287
 
@@ -294,7 +294,7 @@  discard block
 block discarded – undo
294 294
 			$this->access->userManager->getAttributes(true),
295 295
 			$limit, $offset);
296 296
 		$ldap_users = $this->access->nextcloudUserNames($ldap_users);
297
-		Util::writeLog('user_ldap', 'getUsers: '.count($ldap_users). ' Users found', ILogger::DEBUG);
297
+		Util::writeLog('user_ldap', 'getUsers: '.count($ldap_users).' Users found', ILogger::DEBUG);
298 298
 
299 299
 		$this->access->connection->writeToCache($cachekey, $ldap_users);
300 300
 		return $ldap_users;
@@ -310,16 +310,16 @@  discard block
 block discarded – undo
310 310
 	 * @throws \OC\ServerNotAvailableException
311 311
 	 */
312 312
 	public function userExistsOnLDAP($user) {
313
-		if(is_string($user)) {
313
+		if (is_string($user)) {
314 314
 			$user = $this->access->userManager->get($user);
315 315
 		}
316
-		if(is_null($user)) {
316
+		if (is_null($user)) {
317 317
 			return false;
318 318
 		}
319 319
 
320 320
 		$dn = $user->getDN();
321 321
 		//check if user really still exists by reading its entry
322
-		if(!is_array($this->access->readAttribute($dn, '', $this->access->connection->ldapUserFilter))) {
322
+		if (!is_array($this->access->readAttribute($dn, '', $this->access->connection->ldapUserFilter))) {
323 323
 			try {
324 324
 				$uuid = $this->access->getUserMapper()->getUUIDByDN($dn);
325 325
 				if (!$uuid) {
@@ -339,7 +339,7 @@  discard block
 block discarded – undo
339 339
 			}
340 340
 		}
341 341
 
342
-		if($user instanceof OfflineUser) {
342
+		if ($user instanceof OfflineUser) {
343 343
 			$user->unmark();
344 344
 		}
345 345
 
@@ -354,18 +354,18 @@  discard block
 block discarded – undo
354 354
 	 */
355 355
 	public function userExists($uid) {
356 356
 		$userExists = $this->access->connection->getFromCache('userExists'.$uid);
357
-		if(!is_null($userExists)) {
358
-			return (bool)$userExists;
357
+		if (!is_null($userExists)) {
358
+			return (bool) $userExists;
359 359
 		}
360 360
 		//getting dn, if false the user does not exist. If dn, he may be mapped only, requires more checking.
361 361
 		$user = $this->access->userManager->get($uid);
362 362
 
363
-		if(is_null($user)) {
363
+		if (is_null($user)) {
364 364
 			Util::writeLog('user_ldap', 'No DN found for '.$uid.' on '.
365 365
 				$this->access->connection->ldapHost, ILogger::DEBUG);
366 366
 			$this->access->connection->writeToCache('userExists'.$uid, false);
367 367
 			return false;
368
-		} else if($user instanceof OfflineUser) {
368
+		} else if ($user instanceof OfflineUser) {
369 369
 			//express check for users marked as deleted. Returning true is
370 370
 			//necessary for cleanup
371 371
 			return true;
@@ -388,13 +388,13 @@  discard block
 block discarded – undo
388 388
 		}
389 389
 
390 390
 		$marked = $this->ocConfig->getUserValue($uid, 'user_ldap', 'isDeleted', 0);
391
-		if((int)$marked === 0) {
391
+		if ((int) $marked === 0) {
392 392
 			\OC::$server->getLogger()->notice(
393
-				'User '.$uid . ' is not marked as deleted, not cleaning up.',
393
+				'User '.$uid.' is not marked as deleted, not cleaning up.',
394 394
 				array('app' => 'user_ldap'));
395 395
 			return false;
396 396
 		}
397
-		\OC::$server->getLogger()->info('Cleaning up after user ' . $uid,
397
+		\OC::$server->getLogger()->info('Cleaning up after user '.$uid,
398 398
 			array('app' => 'user_ldap'));
399 399
 
400 400
 		$this->access->getUserMapper()->unmap($uid); // we don't emit unassign signals here, since it is implicit to delete signals fired from core
@@ -412,7 +412,7 @@  discard block
 block discarded – undo
412 412
 	 */
413 413
 	public function getHome($uid) {
414 414
 		// user Exists check required as it is not done in user proxy!
415
-		if(!$this->userExists($uid)) {
415
+		if (!$this->userExists($uid)) {
416 416
 			return false;
417 417
 		}
418 418
 
@@ -422,22 +422,22 @@  discard block
 block discarded – undo
422 422
 
423 423
 		$cacheKey = 'getHome'.$uid;
424 424
 		$path = $this->access->connection->getFromCache($cacheKey);
425
-		if(!is_null($path)) {
425
+		if (!is_null($path)) {
426 426
 			return $path;
427 427
 		}
428 428
 
429 429
 		// early return path if it is a deleted user
430 430
 		$user = $this->access->userManager->get($uid);
431
-		if($user instanceof OfflineUser) {
432
-			if($this->currentUserInDeletionProcess !== null
431
+		if ($user instanceof OfflineUser) {
432
+			if ($this->currentUserInDeletionProcess !== null
433 433
 				&& $this->currentUserInDeletionProcess === $user->getOCName()
434 434
 			) {
435 435
 				return $user->getHomePath();
436 436
 			} else {
437
-				throw new NoUserException($uid . ' is not a valid user anymore');
437
+				throw new NoUserException($uid.' is not a valid user anymore');
438 438
 			}
439 439
 		} else if ($user === null) {
440
-			throw new NoUserException($uid . ' is not a valid user anymore');
440
+			throw new NoUserException($uid.' is not a valid user anymore');
441 441
 		}
442 442
 
443 443
 		$path = $user->getHomePath();
@@ -456,12 +456,12 @@  discard block
 block discarded – undo
456 456
 			return $this->userPluginManager->getDisplayName($uid);
457 457
 		}
458 458
 
459
-		if(!$this->userExists($uid)) {
459
+		if (!$this->userExists($uid)) {
460 460
 			return false;
461 461
 		}
462 462
 
463 463
 		$cacheKey = 'getDisplayName'.$uid;
464
-		if(!is_null($displayName = $this->access->connection->getFromCache($cacheKey))) {
464
+		if (!is_null($displayName = $this->access->connection->getFromCache($cacheKey))) {
465 465
 			return $displayName;
466 466
 		}
467 467
 
@@ -478,10 +478,10 @@  discard block
 block discarded – undo
478 478
 			$this->access->username2dn($uid),
479 479
 			$this->access->connection->ldapUserDisplayName);
480 480
 
481
-		if($displayName && (count($displayName) > 0)) {
481
+		if ($displayName && (count($displayName) > 0)) {
482 482
 			$displayName = $displayName[0];
483 483
 
484
-			if (is_array($displayName2)){
484
+			if (is_array($displayName2)) {
485 485
 				$displayName2 = count($displayName2) > 0 ? $displayName2[0] : '';
486 486
 			}
487 487
 
@@ -523,7 +523,7 @@  discard block
 block discarded – undo
523 523
 	 */
524 524
 	public function getDisplayNames($search = '', $limit = null, $offset = null) {
525 525
 		$cacheKey = 'getDisplayNames-'.$search.'-'.$limit.'-'.$offset;
526
-		if(!is_null($displayNames = $this->access->connection->getFromCache($cacheKey))) {
526
+		if (!is_null($displayNames = $this->access->connection->getFromCache($cacheKey))) {
527 527
 			return $displayNames;
528 528
 		}
529 529
 
@@ -545,12 +545,12 @@  discard block
 block discarded – undo
545 545
 	* compared with \OC\User\Backend::CREATE_USER etc.
546 546
 	*/
547 547
 	public function implementsActions($actions) {
548
-		return (bool)((Backend::CHECK_PASSWORD
548
+		return (bool) ((Backend::CHECK_PASSWORD
549 549
 			| Backend::GET_HOME
550 550
 			| Backend::GET_DISPLAYNAME
551 551
 			| (($this->access->connection->ldapUserAvatarRule !== 'none') ? Backend::PROVIDE_AVATAR : 0)
552 552
 			| Backend::COUNT_USERS
553
-			| (((int)$this->access->connection->turnOnPasswordChange === 1)? Backend::SET_PASSWORD :0)
553
+			| (((int) $this->access->connection->turnOnPasswordChange === 1) ? Backend::SET_PASSWORD : 0)
554 554
 			| $this->userPluginManager->getImplementedActions())
555 555
 			& $actions);
556 556
 	}
@@ -574,7 +574,7 @@  discard block
 block discarded – undo
574 574
 
575 575
 		$filter = $this->access->getFilterForUserCount();
576 576
 		$cacheKey = 'countUsers-'.$filter;
577
-		if(!is_null($entries = $this->access->connection->getFromCache($cacheKey))) {
577
+		if (!is_null($entries = $this->access->connection->getFromCache($cacheKey))) {
578 578
 			return $entries;
579 579
 		}
580 580
 		$entries = $this->access->countUsers($filter);
@@ -586,7 +586,7 @@  discard block
 block discarded – undo
586 586
 	 * Backend name to be shown in user management
587 587
 	 * @return string the name of the backend to be shown
588 588
 	 */
589
-	public function getBackendName(){
589
+	public function getBackendName() {
590 590
 		return 'LDAP';
591 591
 	}
592 592
 	
Please login to merge, or discard this patch.