@@ -42,7 +42,7 @@ |
||
42 | 42 | */ |
43 | 43 | public function changeSchema(IOutput $output, |
44 | 44 | \Closure $schemaClosure, |
45 | - array $options):?ISchemaWrapper { |
|
45 | + array $options): ?ISchemaWrapper { |
|
46 | 46 | /** @var ISchemaWrapper $schema */ |
47 | 47 | $schema = $schemaClosure(); |
48 | 48 |
@@ -36,11 +36,11 @@ |
||
36 | 36 | } |
37 | 37 | |
38 | 38 | public function getMimeType(): string { |
39 | - return (string)$this->providerV1->getMimeType(); |
|
39 | + return (string) $this->providerV1->getMimeType(); |
|
40 | 40 | } |
41 | 41 | |
42 | 42 | public function isAvailable(FileInfo $file): bool { |
43 | - return (bool)$this->providerV1->isAvailable($file); |
|
43 | + return (bool) $this->providerV1->isAvailable($file); |
|
44 | 44 | } |
45 | 45 | |
46 | 46 | public function getThumbnail(File $file, int $maxX, int $maxY): ?IImage { |
@@ -80,7 +80,7 @@ discard block |
||
80 | 80 | string $ip): void { |
81 | 81 | $ipSubnet = (new IpAddress($ip))->getSubnet(); |
82 | 82 | |
83 | - $anonHashIdentifier = hash('sha512', 'anon::' . $identifier . $ipSubnet); |
|
83 | + $anonHashIdentifier = hash('sha512', 'anon::'.$identifier.$ipSubnet); |
|
84 | 84 | $this->register($identifier, $anonHashIdentifier, $anonPeriod, $anonLimit); |
85 | 85 | } |
86 | 86 | |
@@ -97,7 +97,7 @@ discard block |
||
97 | 97 | int $userLimit, |
98 | 98 | int $userPeriod, |
99 | 99 | IUser $user): void { |
100 | - $userHashIdentifier = hash('sha512', 'user::' . $identifier . $user->getUID()); |
|
100 | + $userHashIdentifier = hash('sha512', 'user::'.$identifier.$user->getUID()); |
|
101 | 101 | $this->register($identifier, $userHashIdentifier, $userPeriod, $userLimit); |
102 | 102 | } |
103 | 103 | } |
@@ -48,23 +48,23 @@ discard block |
||
48 | 48 | * @inheritdoc |
49 | 49 | */ |
50 | 50 | public function run(IOutput $output) { |
51 | - $orphanItems = $this->removeOrphanChildren('calendarobjects', 'calendars', 'calendarid'); |
|
51 | + $orphanItems = $this->removeOrphanChildren('calendarobjects', 'calendars', 'calendarid'); |
|
52 | 52 | $output->info(sprintf('%d events without a calendar have been cleaned up', $orphanItems)); |
53 | - $orphanItems = $this->removeOrphanChildren('calendarobjects_props', 'calendarobjects', 'objectid'); |
|
53 | + $orphanItems = $this->removeOrphanChildren('calendarobjects_props', 'calendarobjects', 'objectid'); |
|
54 | 54 | $output->info(sprintf('%d properties without an events have been cleaned up', $orphanItems)); |
55 | - $orphanItems = $this->removeOrphanChildren('calendarchanges', 'calendars', 'calendarid'); |
|
55 | + $orphanItems = $this->removeOrphanChildren('calendarchanges', 'calendars', 'calendarid'); |
|
56 | 56 | $output->info(sprintf('%d changes without a calendar have been cleaned up', $orphanItems)); |
57 | 57 | |
58 | - $orphanItems = $this->removeOrphanChildren('calendarobjects', 'calendarsubscriptions', 'calendarid'); |
|
58 | + $orphanItems = $this->removeOrphanChildren('calendarobjects', 'calendarsubscriptions', 'calendarid'); |
|
59 | 59 | $output->info(sprintf('%d cached events without a calendar subscription have been cleaned up', $orphanItems)); |
60 | - $orphanItems = $this->removeOrphanChildren('calendarchanges', 'calendarsubscriptions', 'calendarid'); |
|
60 | + $orphanItems = $this->removeOrphanChildren('calendarchanges', 'calendarsubscriptions', 'calendarid'); |
|
61 | 61 | $output->info(sprintf('%d changes without a calendar subscription have been cleaned up', $orphanItems)); |
62 | 62 | |
63 | - $orphanItems = $this->removeOrphanChildren('cards', 'addressbooks', 'addressbookid'); |
|
63 | + $orphanItems = $this->removeOrphanChildren('cards', 'addressbooks', 'addressbookid'); |
|
64 | 64 | $output->info(sprintf('%d contacts without an addressbook have been cleaned up', $orphanItems)); |
65 | - $orphanItems = $this->removeOrphanChildren('cards_properties', 'cards', 'cardid'); |
|
65 | + $orphanItems = $this->removeOrphanChildren('cards_properties', 'cards', 'cardid'); |
|
66 | 66 | $output->info(sprintf('%d properties without a contact have been cleaned up', $orphanItems)); |
67 | - $orphanItems = $this->removeOrphanChildren('addressbookchanges', 'addressbooks', 'addressbookid'); |
|
67 | + $orphanItems = $this->removeOrphanChildren('addressbookchanges', 'addressbooks', 'addressbookid'); |
|
68 | 68 | $output->info(sprintf('%d changes without an addressbook have been cleaned up', $orphanItems)); |
69 | 69 | } |
70 | 70 | |
@@ -73,7 +73,7 @@ discard block |
||
73 | 73 | |
74 | 74 | $qb->select('c.id') |
75 | 75 | ->from($childTable, 'c') |
76 | - ->leftJoin('c', $parentTable, 'p', $qb->expr()->eq('c.' . $parentId, 'p.id')) |
|
76 | + ->leftJoin('c', $parentTable, 'p', $qb->expr()->eq('c.'.$parentId, 'p.id')) |
|
77 | 77 | ->where($qb->expr()->isNull('p.id')); |
78 | 78 | |
79 | 79 | if (\in_array($parentTable, ['calendars', 'calendarsubscriptions'], true)) { |
@@ -155,7 +155,7 @@ |
||
155 | 155 | } |
156 | 156 | |
157 | 157 | public function supportedEntities(): array { |
158 | - return [ File::class ]; |
|
158 | + return [File::class]; |
|
159 | 159 | } |
160 | 160 | |
161 | 161 | public function isAvailableForScope(int $scope): bool { |
@@ -110,7 +110,7 @@ discard block |
||
110 | 110 | $dispatcher = \OC::$server->getEventDispatcher(); |
111 | 111 | foreach ($hooks as $hook) { |
112 | 112 | $this->root->emit('\OC\Files', $hook, $args); |
113 | - $dispatcher->dispatch('\OCP\Files::' . $hook, new GenericEvent($args)); |
|
113 | + $dispatcher->dispatch('\OCP\Files::'.$hook, new GenericEvent($args)); |
|
114 | 114 | } |
115 | 115 | } |
116 | 116 | |
@@ -297,7 +297,7 @@ discard block |
||
297 | 297 | $path = str_replace('\\', '/', $path); |
298 | 298 | //add leading slash |
299 | 299 | if ($path[0] !== '/') { |
300 | - $path = '/' . $path; |
|
300 | + $path = '/'.$path; |
|
301 | 301 | } |
302 | 302 | //remove duplicate slashes |
303 | 303 | while (strpos($path, '//') !== false) { |
@@ -317,7 +317,7 @@ discard block |
||
317 | 317 | */ |
318 | 318 | public function isValidPath($path) { |
319 | 319 | if (!$path || $path[0] !== '/') { |
320 | - $path = '/' . $path; |
|
320 | + $path = '/'.$path; |
|
321 | 321 | } |
322 | 322 | if (strstr($path, '/../') || strrchr($path, '/') === '/..') { |
323 | 323 | return false; |
@@ -401,14 +401,14 @@ discard block |
||
401 | 401 | $this->sendHooks(['preCopy'], [$this, $nonExisting]); |
402 | 402 | $this->sendHooks(['preWrite'], [$nonExisting]); |
403 | 403 | if (!$this->view->copy($this->path, $targetPath)) { |
404 | - throw new NotPermittedException('Could not copy ' . $this->path . ' to ' . $targetPath); |
|
404 | + throw new NotPermittedException('Could not copy '.$this->path.' to '.$targetPath); |
|
405 | 405 | } |
406 | 406 | $targetNode = $this->root->get($targetPath); |
407 | 407 | $this->sendHooks(['postCopy'], [$this, $targetNode]); |
408 | 408 | $this->sendHooks(['postWrite'], [$targetNode]); |
409 | 409 | return $targetNode; |
410 | 410 | } else { |
411 | - throw new NotPermittedException('No permission to copy to path ' . $targetPath); |
|
411 | + throw new NotPermittedException('No permission to copy to path '.$targetPath); |
|
412 | 412 | } |
413 | 413 | } |
414 | 414 | |
@@ -432,7 +432,7 @@ discard block |
||
432 | 432 | $this->sendHooks(['preRename'], [$this, $nonExisting]); |
433 | 433 | $this->sendHooks(['preWrite'], [$nonExisting]); |
434 | 434 | if (!$this->view->rename($this->path, $targetPath)) { |
435 | - throw new NotPermittedException('Could not move ' . $this->path . ' to ' . $targetPath); |
|
435 | + throw new NotPermittedException('Could not move '.$this->path.' to '.$targetPath); |
|
436 | 436 | } |
437 | 437 | $targetNode = $this->root->get($targetPath); |
438 | 438 | $this->sendHooks(['postRename'], [$this, $targetNode]); |
@@ -440,7 +440,7 @@ discard block |
||
440 | 440 | $this->path = $targetPath; |
441 | 441 | return $targetNode; |
442 | 442 | } else { |
443 | - throw new NotPermittedException('No permission to move to path ' . $targetPath); |
|
443 | + throw new NotPermittedException('No permission to move to path '.$targetPath); |
|
444 | 444 | } |
445 | 445 | } |
446 | 446 |
@@ -155,7 +155,7 @@ |
||
155 | 155 | } |
156 | 156 | |
157 | 157 | public function supportedEntities(): array { |
158 | - return [ File::class ]; |
|
158 | + return [File::class]; |
|
159 | 159 | } |
160 | 160 | |
161 | 161 | public function isAvailableForScope(int $scope): bool { |
@@ -155,7 +155,7 @@ |
||
155 | 155 | } |
156 | 156 | |
157 | 157 | public function supportedEntities(): array { |
158 | - return [ File::class ]; |
|
158 | + return [File::class]; |
|
159 | 159 | } |
160 | 160 | |
161 | 161 | public function isAvailableForScope(int $scope): bool { |
@@ -266,7 +266,7 @@ discard block |
||
266 | 266 | // Save private key |
267 | 267 | if ($encryptedPrivateKey) { |
268 | 268 | $this->keyManager->setPrivateKey($user->getUID(), |
269 | - $this->crypt->generateHeader() . $encryptedPrivateKey); |
|
269 | + $this->crypt->generateHeader().$encryptedPrivateKey); |
|
270 | 270 | } else { |
271 | 271 | $this->logger->error('Encryption could not update users encryption password'); |
272 | 272 | } |
@@ -315,7 +315,7 @@ discard block |
||
315 | 315 | $encryptedKey = $this->crypt->encryptPrivateKey($keyPair['privateKey'], $newUserPassword, $userId); |
316 | 316 | |
317 | 317 | if ($encryptedKey) { |
318 | - $this->keyManager->setPrivateKey($userId, $this->crypt->generateHeader() . $encryptedKey); |
|
318 | + $this->keyManager->setPrivateKey($userId, $this->crypt->generateHeader().$encryptedKey); |
|
319 | 319 | |
320 | 320 | if ($recoveryPassword) { // if recovery key is set we can re-encrypt the key files |
321 | 321 | $this->recovery->recoverUsersFiles($recoveryPassword, $userId); |