@@ -103,16 +103,16 @@ discard block |
||
103 | 103 | return $this->userPluginManager->canChangeAvatar($uid); |
104 | 104 | } |
105 | 105 | |
106 | - if(!$this->implementsActions(Backend::PROVIDE_AVATAR)) { |
|
106 | + if (!$this->implementsActions(Backend::PROVIDE_AVATAR)) { |
|
107 | 107 | return true; |
108 | 108 | } |
109 | 109 | |
110 | 110 | $user = $this->access->userManager->get($uid); |
111 | - if(!$user instanceof User) { |
|
111 | + if (!$user instanceof User) { |
|
112 | 112 | return false; |
113 | 113 | } |
114 | 114 | $imageData = $user->getAvatarImage(); |
115 | - if($imageData === false) { |
|
115 | + if ($imageData === false) { |
|
116 | 116 | return true; |
117 | 117 | } |
118 | 118 | return !$user->updateAvatar(true); |
@@ -126,7 +126,7 @@ discard block |
||
126 | 126 | * @throws \Exception |
127 | 127 | */ |
128 | 128 | public function loginName2UserName($loginName) { |
129 | - $cacheKey = 'loginName2UserName-' . $loginName; |
|
129 | + $cacheKey = 'loginName2UserName-'.$loginName; |
|
130 | 130 | $username = $this->access->connection->getFromCache($cacheKey); |
131 | 131 | |
132 | 132 | if ($username !== null) { |
@@ -172,9 +172,9 @@ discard block |
||
172 | 172 | //find out dn of the user name |
173 | 173 | $attrs = $this->access->userManager->getAttributes(); |
174 | 174 | $users = $this->access->fetchUsersByLoginName($loginName, $attrs); |
175 | - if(count($users) < 1) { |
|
176 | - throw new NotOnLDAP('No user available for the given login name on ' . |
|
177 | - $this->access->connection->ldapHost . ':' . $this->access->connection->ldapPort); |
|
175 | + if (count($users) < 1) { |
|
176 | + throw new NotOnLDAP('No user available for the given login name on '. |
|
177 | + $this->access->connection->ldapHost.':'.$this->access->connection->ldapPort); |
|
178 | 178 | } |
179 | 179 | return $users[0]; |
180 | 180 | } |
@@ -189,8 +189,8 @@ discard block |
||
189 | 189 | public function checkPassword($uid, $password) { |
190 | 190 | try { |
191 | 191 | $ldapRecord = $this->getLDAPUserByLoginName($uid); |
192 | - } catch(NotOnLDAP $e) { |
|
193 | - if($this->ocConfig->getSystemValue('loglevel', ILogger::WARN) === ILogger::DEBUG) { |
|
192 | + } catch (NotOnLDAP $e) { |
|
193 | + if ($this->ocConfig->getSystemValue('loglevel', ILogger::WARN) === ILogger::DEBUG) { |
|
194 | 194 | \OC::$server->getLogger()->logException($e, ['app' => 'user_ldap']); |
195 | 195 | } |
196 | 196 | return false; |
@@ -198,16 +198,16 @@ discard block |
||
198 | 198 | $dn = $ldapRecord['dn'][0]; |
199 | 199 | $user = $this->access->userManager->get($dn); |
200 | 200 | |
201 | - if(!$user instanceof User) { |
|
201 | + if (!$user instanceof User) { |
|
202 | 202 | Util::writeLog('user_ldap', |
203 | - 'LDAP Login: Could not get user object for DN ' . $dn . |
|
203 | + 'LDAP Login: Could not get user object for DN '.$dn. |
|
204 | 204 | '. Maybe the LDAP entry has no set display name attribute?', |
205 | 205 | ILogger::WARN); |
206 | 206 | return false; |
207 | 207 | } |
208 | - if($user->getUsername() !== false) { |
|
208 | + if ($user->getUsername() !== false) { |
|
209 | 209 | //are the credentials OK? |
210 | - if(!$this->access->areCredentialsValid($dn, $password)) { |
|
210 | + if (!$this->access->areCredentialsValid($dn, $password)) { |
|
211 | 211 | return false; |
212 | 212 | } |
213 | 213 | |
@@ -234,14 +234,14 @@ discard block |
||
234 | 234 | |
235 | 235 | $user = $this->access->userManager->get($uid); |
236 | 236 | |
237 | - if(!$user instanceof User) { |
|
238 | - throw new \Exception('LDAP setPassword: Could not get user object for uid ' . $uid . |
|
237 | + if (!$user instanceof User) { |
|
238 | + throw new \Exception('LDAP setPassword: Could not get user object for uid '.$uid. |
|
239 | 239 | '. Maybe the LDAP entry has no set display name attribute?'); |
240 | 240 | } |
241 | - if($user->getUsername() !== false && $this->access->setPassword($user->getDN(), $password)) { |
|
241 | + if ($user->getUsername() !== false && $this->access->setPassword($user->getDN(), $password)) { |
|
242 | 242 | $ldapDefaultPPolicyDN = $this->access->connection->ldapDefaultPPolicyDN; |
243 | 243 | $turnOnPasswordChange = $this->access->connection->turnOnPasswordChange; |
244 | - if (!empty($ldapDefaultPPolicyDN) && ((int)$turnOnPasswordChange === 1)) { |
|
244 | + if (!empty($ldapDefaultPPolicyDN) && ((int) $turnOnPasswordChange === 1)) { |
|
245 | 245 | //remove last password expiry warning if any |
246 | 246 | $notification = $this->notificationManager->createNotification(); |
247 | 247 | $notification->setApp('user_ldap') |
@@ -270,18 +270,18 @@ discard block |
||
270 | 270 | |
271 | 271 | //check if users are cached, if so return |
272 | 272 | $ldap_users = $this->access->connection->getFromCache($cachekey); |
273 | - if(!is_null($ldap_users)) { |
|
273 | + if (!is_null($ldap_users)) { |
|
274 | 274 | return $ldap_users; |
275 | 275 | } |
276 | 276 | |
277 | 277 | // if we'd pass -1 to LDAP search, we'd end up in a Protocol |
278 | 278 | // error. With a limit of 0, we get 0 results. So we pass null. |
279 | - if($limit <= 0) { |
|
279 | + if ($limit <= 0) { |
|
280 | 280 | $limit = null; |
281 | 281 | } |
282 | 282 | $filter = $this->access->combineFilterWithAnd(array( |
283 | 283 | $this->access->connection->ldapUserFilter, |
284 | - $this->access->connection->ldapUserDisplayName . '=*', |
|
284 | + $this->access->connection->ldapUserDisplayName.'=*', |
|
285 | 285 | $this->access->getFilterPartForUserSearch($search) |
286 | 286 | )); |
287 | 287 | |
@@ -294,7 +294,7 @@ discard block |
||
294 | 294 | $this->access->userManager->getAttributes(true), |
295 | 295 | $limit, $offset); |
296 | 296 | $ldap_users = $this->access->nextcloudUserNames($ldap_users); |
297 | - Util::writeLog('user_ldap', 'getUsers: '.count($ldap_users). ' Users found', ILogger::DEBUG); |
|
297 | + Util::writeLog('user_ldap', 'getUsers: '.count($ldap_users).' Users found', ILogger::DEBUG); |
|
298 | 298 | |
299 | 299 | $this->access->connection->writeToCache($cachekey, $ldap_users); |
300 | 300 | return $ldap_users; |
@@ -310,16 +310,16 @@ discard block |
||
310 | 310 | * @throws \OC\ServerNotAvailableException |
311 | 311 | */ |
312 | 312 | public function userExistsOnLDAP($user) { |
313 | - if(is_string($user)) { |
|
313 | + if (is_string($user)) { |
|
314 | 314 | $user = $this->access->userManager->get($user); |
315 | 315 | } |
316 | - if(is_null($user)) { |
|
316 | + if (is_null($user)) { |
|
317 | 317 | return false; |
318 | 318 | } |
319 | 319 | |
320 | 320 | $dn = $user->getDN(); |
321 | 321 | //check if user really still exists by reading its entry |
322 | - if(!is_array($this->access->readAttribute($dn, '', $this->access->connection->ldapUserFilter))) { |
|
322 | + if (!is_array($this->access->readAttribute($dn, '', $this->access->connection->ldapUserFilter))) { |
|
323 | 323 | try { |
324 | 324 | $uuid = $this->access->getUserMapper()->getUUIDByDN($dn); |
325 | 325 | if (!$uuid) { |
@@ -339,7 +339,7 @@ discard block |
||
339 | 339 | } |
340 | 340 | } |
341 | 341 | |
342 | - if($user instanceof OfflineUser) { |
|
342 | + if ($user instanceof OfflineUser) { |
|
343 | 343 | $user->unmark(); |
344 | 344 | } |
345 | 345 | |
@@ -354,18 +354,18 @@ discard block |
||
354 | 354 | */ |
355 | 355 | public function userExists($uid) { |
356 | 356 | $userExists = $this->access->connection->getFromCache('userExists'.$uid); |
357 | - if(!is_null($userExists)) { |
|
358 | - return (bool)$userExists; |
|
357 | + if (!is_null($userExists)) { |
|
358 | + return (bool) $userExists; |
|
359 | 359 | } |
360 | 360 | //getting dn, if false the user does not exist. If dn, he may be mapped only, requires more checking. |
361 | 361 | $user = $this->access->userManager->get($uid); |
362 | 362 | |
363 | - if(is_null($user)) { |
|
363 | + if (is_null($user)) { |
|
364 | 364 | Util::writeLog('user_ldap', 'No DN found for '.$uid.' on '. |
365 | 365 | $this->access->connection->ldapHost, ILogger::DEBUG); |
366 | 366 | $this->access->connection->writeToCache('userExists'.$uid, false); |
367 | 367 | return false; |
368 | - } else if($user instanceof OfflineUser) { |
|
368 | + } else if ($user instanceof OfflineUser) { |
|
369 | 369 | //express check for users marked as deleted. Returning true is |
370 | 370 | //necessary for cleanup |
371 | 371 | return true; |
@@ -388,13 +388,13 @@ discard block |
||
388 | 388 | } |
389 | 389 | |
390 | 390 | $marked = $this->ocConfig->getUserValue($uid, 'user_ldap', 'isDeleted', 0); |
391 | - if((int)$marked === 0) { |
|
391 | + if ((int) $marked === 0) { |
|
392 | 392 | \OC::$server->getLogger()->notice( |
393 | - 'User '.$uid . ' is not marked as deleted, not cleaning up.', |
|
393 | + 'User '.$uid.' is not marked as deleted, not cleaning up.', |
|
394 | 394 | array('app' => 'user_ldap')); |
395 | 395 | return false; |
396 | 396 | } |
397 | - \OC::$server->getLogger()->info('Cleaning up after user ' . $uid, |
|
397 | + \OC::$server->getLogger()->info('Cleaning up after user '.$uid, |
|
398 | 398 | array('app' => 'user_ldap')); |
399 | 399 | |
400 | 400 | $this->access->getUserMapper()->unmap($uid); // we don't emit unassign signals here, since it is implicit to delete signals fired from core |
@@ -412,7 +412,7 @@ discard block |
||
412 | 412 | */ |
413 | 413 | public function getHome($uid) { |
414 | 414 | // user Exists check required as it is not done in user proxy! |
415 | - if(!$this->userExists($uid)) { |
|
415 | + if (!$this->userExists($uid)) { |
|
416 | 416 | return false; |
417 | 417 | } |
418 | 418 | |
@@ -422,22 +422,22 @@ discard block |
||
422 | 422 | |
423 | 423 | $cacheKey = 'getHome'.$uid; |
424 | 424 | $path = $this->access->connection->getFromCache($cacheKey); |
425 | - if(!is_null($path)) { |
|
425 | + if (!is_null($path)) { |
|
426 | 426 | return $path; |
427 | 427 | } |
428 | 428 | |
429 | 429 | // early return path if it is a deleted user |
430 | 430 | $user = $this->access->userManager->get($uid); |
431 | - if($user instanceof OfflineUser) { |
|
432 | - if($this->currentUserInDeletionProcess !== null |
|
431 | + if ($user instanceof OfflineUser) { |
|
432 | + if ($this->currentUserInDeletionProcess !== null |
|
433 | 433 | && $this->currentUserInDeletionProcess === $user->getOCName() |
434 | 434 | ) { |
435 | 435 | return $user->getHomePath(); |
436 | 436 | } else { |
437 | - throw new NoUserException($uid . ' is not a valid user anymore'); |
|
437 | + throw new NoUserException($uid.' is not a valid user anymore'); |
|
438 | 438 | } |
439 | 439 | } else if ($user === null) { |
440 | - throw new NoUserException($uid . ' is not a valid user anymore'); |
|
440 | + throw new NoUserException($uid.' is not a valid user anymore'); |
|
441 | 441 | } |
442 | 442 | |
443 | 443 | $path = $user->getHomePath(); |
@@ -456,12 +456,12 @@ discard block |
||
456 | 456 | return $this->userPluginManager->getDisplayName($uid); |
457 | 457 | } |
458 | 458 | |
459 | - if(!$this->userExists($uid)) { |
|
459 | + if (!$this->userExists($uid)) { |
|
460 | 460 | return false; |
461 | 461 | } |
462 | 462 | |
463 | 463 | $cacheKey = 'getDisplayName'.$uid; |
464 | - if(!is_null($displayName = $this->access->connection->getFromCache($cacheKey))) { |
|
464 | + if (!is_null($displayName = $this->access->connection->getFromCache($cacheKey))) { |
|
465 | 465 | return $displayName; |
466 | 466 | } |
467 | 467 | |
@@ -478,10 +478,10 @@ discard block |
||
478 | 478 | $this->access->username2dn($uid), |
479 | 479 | $this->access->connection->ldapUserDisplayName); |
480 | 480 | |
481 | - if($displayName && (count($displayName) > 0)) { |
|
481 | + if ($displayName && (count($displayName) > 0)) { |
|
482 | 482 | $displayName = $displayName[0]; |
483 | 483 | |
484 | - if (is_array($displayName2)){ |
|
484 | + if (is_array($displayName2)) { |
|
485 | 485 | $displayName2 = count($displayName2) > 0 ? $displayName2[0] : ''; |
486 | 486 | } |
487 | 487 | |
@@ -523,7 +523,7 @@ discard block |
||
523 | 523 | */ |
524 | 524 | public function getDisplayNames($search = '', $limit = null, $offset = null) { |
525 | 525 | $cacheKey = 'getDisplayNames-'.$search.'-'.$limit.'-'.$offset; |
526 | - if(!is_null($displayNames = $this->access->connection->getFromCache($cacheKey))) { |
|
526 | + if (!is_null($displayNames = $this->access->connection->getFromCache($cacheKey))) { |
|
527 | 527 | return $displayNames; |
528 | 528 | } |
529 | 529 | |
@@ -545,12 +545,12 @@ discard block |
||
545 | 545 | * compared with \OC\User\Backend::CREATE_USER etc. |
546 | 546 | */ |
547 | 547 | public function implementsActions($actions) { |
548 | - return (bool)((Backend::CHECK_PASSWORD |
|
548 | + return (bool) ((Backend::CHECK_PASSWORD |
|
549 | 549 | | Backend::GET_HOME |
550 | 550 | | Backend::GET_DISPLAYNAME |
551 | 551 | | (($this->access->connection->ldapUserAvatarRule !== 'none') ? Backend::PROVIDE_AVATAR : 0) |
552 | 552 | | Backend::COUNT_USERS |
553 | - | (((int)$this->access->connection->turnOnPasswordChange === 1)? Backend::SET_PASSWORD :0) |
|
553 | + | (((int) $this->access->connection->turnOnPasswordChange === 1) ? Backend::SET_PASSWORD : 0) |
|
554 | 554 | | $this->userPluginManager->getImplementedActions()) |
555 | 555 | & $actions); |
556 | 556 | } |
@@ -574,7 +574,7 @@ discard block |
||
574 | 574 | |
575 | 575 | $filter = $this->access->getFilterForUserCount(); |
576 | 576 | $cacheKey = 'countUsers-'.$filter; |
577 | - if(!is_null($entries = $this->access->connection->getFromCache($cacheKey))) { |
|
577 | + if (!is_null($entries = $this->access->connection->getFromCache($cacheKey))) { |
|
578 | 578 | return $entries; |
579 | 579 | } |
580 | 580 | $entries = $this->access->countUsers($filter); |
@@ -586,7 +586,7 @@ discard block |
||
586 | 586 | * Backend name to be shown in user management |
587 | 587 | * @return string the name of the backend to be shown |
588 | 588 | */ |
589 | - public function getBackendName(){ |
|
589 | + public function getBackendName() { |
|
590 | 590 | return 'LDAP'; |
591 | 591 | } |
592 | 592 |