Completed
Pull Request — master (#8232)
by Joas
25:31 queued 09:08
created
apps/files_sharing/lib/MountProvider.php 1 patch
Spacing   +2 added lines, -2 removed lines patch added patch discarded remove patch
@@ -74,7 +74,7 @@  discard block
 block discarded – undo
74 74
 		$shares = array_merge($shares, $this->shareManager->getSharedWith($user->getUID(), \OCP\Share::SHARE_TYPE_CIRCLE, null, -1));
75 75
 
76 76
 		// filter out excluded shares and group shares that includes self
77
-		$shares = array_filter($shares, function (\OCP\Share\IShare $share) use ($user) {
77
+		$shares = array_filter($shares, function(\OCP\Share\IShare $share) use ($user) {
78 78
 			return $share->getPermissions() > 0 && $share->getShareOwner() !== $user->getUID();
79 79
 		});
80 80
 
@@ -186,7 +186,7 @@  discard block
 block discarded – undo
186 186
 						// null groups which usually appear with group backend
187 187
 						// caching inconsistencies
188 188
 						$this->logger->debug(
189
-							'Could not adjust share target for share ' . $share->getId() . ' to make it consistent: ' . $e->getMessage(),
189
+							'Could not adjust share target for share '.$share->getId().' to make it consistent: '.$e->getMessage(),
190 190
 							['app' => 'files_sharing']
191 191
 						);
192 192
 					}
Please login to merge, or discard this patch.
lib/autoloader.php 1 patch
Spacing   +7 added lines, -7 removed lines patch added patch discarded remove patch
@@ -99,24 +99,24 @@  discard block
 block discarded – undo
99 99
 			 * Remove "apps/" from inclusion path for smooth migration to multi app dir
100 100
 			 */
101 101
 			if (strpos(\OC::$CLASSPATH[$class], 'apps/') === 0) {
102
-				\OCP\Util::writeLog('core', 'include path for class "' . $class . '" starts with "apps/"', \OCP\Util::DEBUG);
102
+				\OCP\Util::writeLog('core', 'include path for class "'.$class.'" starts with "apps/"', \OCP\Util::DEBUG);
103 103
 				$paths[] = str_replace('apps/', '', \OC::$CLASSPATH[$class]);
104 104
 			}
105 105
 		} elseif (strpos($class, 'OC_') === 0) {
106
-			$paths[] = \OC::$SERVERROOT . '/lib/private/legacy/' . strtolower(str_replace('_', '/', substr($class, 3)) . '.php');
106
+			$paths[] = \OC::$SERVERROOT.'/lib/private/legacy/'.strtolower(str_replace('_', '/', substr($class, 3)).'.php');
107 107
 		} elseif (strpos($class, 'OCA\\') === 0) {
108 108
 			list(, $app, $rest) = explode('\\', $class, 3);
109 109
 			$app = strtolower($app);
110 110
 			$appPath = \OC_App::getAppPath($app);
111 111
 			if ($appPath && stream_resolve_include_path($appPath)) {
112
-				$paths[] = $appPath . '/' . strtolower(str_replace('\\', '/', $rest) . '.php');
112
+				$paths[] = $appPath.'/'.strtolower(str_replace('\\', '/', $rest).'.php');
113 113
 				// If not found in the root of the app directory, insert '/lib' after app id and try again.
114
-				$paths[] = $appPath . '/lib/' . strtolower(str_replace('\\', '/', $rest) . '.php');
114
+				$paths[] = $appPath.'/lib/'.strtolower(str_replace('\\', '/', $rest).'.php');
115 115
 			}
116 116
 		} elseif ($class === 'Test\\TestCase') {
117 117
 			// This File is considered public API, so we make sure that the class
118 118
 			// can still be loaded, although the PSR-4 paths have not been loaded.
119
-			$paths[] = \OC::$SERVERROOT . '/tests/lib/TestCase.php';
119
+			$paths[] = \OC::$SERVERROOT.'/tests/lib/TestCase.php';
120 120
 		}
121 121
 		return $paths;
122 122
 	}
@@ -127,7 +127,7 @@  discard block
 block discarded – undo
127 127
 	 */
128 128
 	protected function isValidPath($fullPath) {
129 129
 		foreach ($this->validRoots as $root => $true) {
130
-			if (substr($fullPath, 0, strlen($root) + 1) === $root . '/') {
130
+			if (substr($fullPath, 0, strlen($root) + 1) === $root.'/') {
131 131
 				return true;
132 132
 			}
133 133
 		}
@@ -146,7 +146,7 @@  discard block
 block discarded – undo
146 146
 			$pathsToRequire = $this->memoryCache->get($class);
147 147
 		}
148 148
 
149
-		if(class_exists($class, false)) {
149
+		if (class_exists($class, false)) {
150 150
 			return false;
151 151
 		}
152 152
 
Please login to merge, or discard this patch.
lib/private/IntegrityCheck/Checker.php 1 patch
Spacing   +47 added lines, -47 removed lines patch added patch discarded remove patch
@@ -96,7 +96,7 @@  discard block
 block discarded – undo
96 96
 	 * @return bool
97 97
 	 */
98 98
 	public function isCodeCheckEnforced() {
99
-		$notSignedChannels = [ '', 'git'];
99
+		$notSignedChannels = ['', 'git'];
100 100
 		if (in_array($this->environmentHelper->getChannel(), $notSignedChannels, true)) {
101 101
 			return false;
102 102
 		}
@@ -131,7 +131,7 @@  discard block
 block discarded – undo
131 131
 			$folderToIterate,
132 132
 			\RecursiveDirectoryIterator::SKIP_DOTS
133 133
 		);
134
-		if($root === '') {
134
+		if ($root === '') {
135 135
 			$root = \OC::$SERVERROOT;
136 136
 		}
137 137
 		$root = rtrim($root, '/');
@@ -160,9 +160,9 @@  discard block
 block discarded – undo
160 160
 		$tmpFolder = '';
161 161
 
162 162
 		$baseDirectoryLength = strlen($path);
163
-		foreach($iterator as $filename => $data) {
163
+		foreach ($iterator as $filename => $data) {
164 164
 			/** @var \DirectoryIterator $data */
165
-			if($data->isDir()) {
165
+			if ($data->isDir()) {
166 166
 				continue;
167 167
 			}
168 168
 
@@ -170,11 +170,11 @@  discard block
 block discarded – undo
170 170
 			$relativeFileName = ltrim($relativeFileName, '/');
171 171
 
172 172
 			// Exclude signature.json files in the appinfo and root folder
173
-			if($relativeFileName === 'appinfo/signature.json') {
173
+			if ($relativeFileName === 'appinfo/signature.json') {
174 174
 				continue;
175 175
 			}
176 176
 			// Exclude signature.json files in the appinfo and core folder
177
-			if($relativeFileName === 'core/signature.json') {
177
+			if ($relativeFileName === 'core/signature.json') {
178 178
 				continue;
179 179
 			}
180 180
 
@@ -183,18 +183,18 @@  discard block
 block discarded – undo
183 183
 			// to ensure that this will not lead to false positives this will
184 184
 			// copy the file to a temporary folder and reset it to the default
185 185
 			// values.
186
-			if($filename === $this->environmentHelper->getServerRoot() . '/.htaccess'
187
-				|| $filename === $this->environmentHelper->getServerRoot() . '/.user.ini') {
186
+			if ($filename === $this->environmentHelper->getServerRoot().'/.htaccess'
187
+				|| $filename === $this->environmentHelper->getServerRoot().'/.user.ini') {
188 188
 
189
-				if(!$copiedWebserverSettingFiles) {
189
+				if (!$copiedWebserverSettingFiles) {
190 190
 					$tmpFolder = rtrim($this->tempManager->getTemporaryFolder(), '/');
191
-					copy($this->environmentHelper->getServerRoot() . '/.htaccess', $tmpFolder . '/.htaccess');
192
-					copy($this->environmentHelper->getServerRoot() . '/.user.ini', $tmpFolder . '/.user.ini');
191
+					copy($this->environmentHelper->getServerRoot().'/.htaccess', $tmpFolder.'/.htaccess');
192
+					copy($this->environmentHelper->getServerRoot().'/.user.ini', $tmpFolder.'/.user.ini');
193 193
 					\OC_Files::setUploadLimit(
194 194
 						\OCP\Util::computerFileSize('511MB'),
195 195
 						[
196
-							'.htaccess' => $tmpFolder . '/.htaccess',
197
-							'.user.ini' => $tmpFolder . '/.user.ini',
196
+							'.htaccess' => $tmpFolder.'/.htaccess',
197
+							'.user.ini' => $tmpFolder.'/.user.ini',
198 198
 						]
199 199
 					);
200 200
 				}
@@ -202,8 +202,8 @@  discard block
 block discarded – undo
202 202
 
203 203
 			// The .user.ini file can contain custom modifications to the file size
204 204
 			// as well.
205
-			if($filename === $this->environmentHelper->getServerRoot() . '/.user.ini') {
206
-				$fileContent = file_get_contents($tmpFolder . '/.user.ini');
205
+			if ($filename === $this->environmentHelper->getServerRoot().'/.user.ini') {
206
+				$fileContent = file_get_contents($tmpFolder.'/.user.ini');
207 207
 				$hashes[$relativeFileName] = hash('sha512', $fileContent);
208 208
 				continue;
209 209
 			}
@@ -215,10 +215,10 @@  discard block
 block discarded – undo
215 215
 			// Thus we ignore everything below the first occurrence of
216 216
 			// "#### DO NOT CHANGE ANYTHING ABOVE THIS LINE ####" and have the
217 217
 			// hash generated based on this.
218
-			if($filename === $this->environmentHelper->getServerRoot() . '/.htaccess') {
219
-				$fileContent = file_get_contents($tmpFolder . '/.htaccess');
218
+			if ($filename === $this->environmentHelper->getServerRoot().'/.htaccess') {
219
+				$fileContent = file_get_contents($tmpFolder.'/.htaccess');
220 220
 				$explodedArray = explode('#### DO NOT CHANGE ANYTHING ABOVE THIS LINE ####', $fileContent);
221
-				if(count($explodedArray) === 2) {
221
+				if (count($explodedArray) === 2) {
222 222
 					$hashes[$relativeFileName] = hash('sha512', $explodedArray[0]);
223 223
 					continue;
224 224
 				}
@@ -267,7 +267,7 @@  discard block
 block discarded – undo
267 267
 	public function writeAppSignature($path,
268 268
 									  X509 $certificate,
269 269
 									  RSA $privateKey) {
270
-		$appInfoDir = $path . '/appinfo';
270
+		$appInfoDir = $path.'/appinfo';
271 271
 		try {
272 272
 			$this->fileAccessHelper->assertDirectoryExists($appInfoDir);
273 273
 
@@ -275,12 +275,12 @@  discard block
 block discarded – undo
275 275
 			$hashes = $this->generateHashes($iterator, $path);
276 276
 			$signature = $this->createSignatureData($hashes, $certificate, $privateKey);
277 277
 				$this->fileAccessHelper->file_put_contents(
278
-					$appInfoDir . '/signature.json',
278
+					$appInfoDir.'/signature.json',
279 279
 				json_encode($signature, JSON_PRETTY_PRINT)
280 280
 			);
281
-		} catch (\Exception $e){
281
+		} catch (\Exception $e) {
282 282
 			if (!$this->fileAccessHelper->is_writable($appInfoDir)) {
283
-				throw new \Exception($appInfoDir . ' is not writable');
283
+				throw new \Exception($appInfoDir.' is not writable');
284 284
 			}
285 285
 			throw $e;
286 286
 		}
@@ -297,7 +297,7 @@  discard block
 block discarded – undo
297 297
 	public function writeCoreSignature(X509 $certificate,
298 298
 									   RSA $rsa,
299 299
 									   $path) {
300
-		$coreDir = $path . '/core';
300
+		$coreDir = $path.'/core';
301 301
 		try {
302 302
 
303 303
 			$this->fileAccessHelper->assertDirectoryExists($coreDir);
@@ -305,12 +305,12 @@  discard block
 block discarded – undo
305 305
 			$hashes = $this->generateHashes($iterator, $path);
306 306
 			$signatureData = $this->createSignatureData($hashes, $certificate, $rsa);
307 307
 			$this->fileAccessHelper->file_put_contents(
308
-				$coreDir . '/signature.json',
308
+				$coreDir.'/signature.json',
309 309
 				json_encode($signatureData, JSON_PRETTY_PRINT)
310 310
 			);
311
-		} catch (\Exception $e){
311
+		} catch (\Exception $e) {
312 312
 			if (!$this->fileAccessHelper->is_writable($coreDir)) {
313
-				throw new \Exception($coreDir . ' is not writable');
313
+				throw new \Exception($coreDir.' is not writable');
314 314
 			}
315 315
 			throw $e;
316 316
 		}
@@ -327,12 +327,12 @@  discard block
 block discarded – undo
327 327
 	 * @throws \Exception
328 328
 	 */
329 329
 	private function verify($signaturePath, $basePath, $certificateCN) {
330
-		if(!$this->isCodeCheckEnforced()) {
330
+		if (!$this->isCodeCheckEnforced()) {
331 331
 			return [];
332 332
 		}
333 333
 
334 334
 		$signatureData = json_decode($this->fileAccessHelper->file_get_contents($signaturePath), true);
335
-		if(!is_array($signatureData)) {
335
+		if (!is_array($signatureData)) {
336 336
 			throw new InvalidSignatureException('Signature data not found.');
337 337
 		}
338 338
 
@@ -346,11 +346,11 @@  discard block
 block discarded – undo
346 346
 		$rootCertificatePublicKey = $this->fileAccessHelper->file_get_contents($this->environmentHelper->getServerRoot().'/resources/codesigning/root.crt');
347 347
 		$x509->loadCA($rootCertificatePublicKey);
348 348
 		$x509->loadX509($certificate);
349
-		if(!$x509->validateSignature()) {
349
+		if (!$x509->validateSignature()) {
350 350
 			throw new InvalidSignatureException('Certificate is not valid.');
351 351
 		}
352 352
 		// Verify if certificate has proper CN. "core" CN is always trusted.
353
-		if($x509->getDN(X509::DN_OPENSSL)['CN'] !== $certificateCN && $x509->getDN(X509::DN_OPENSSL)['CN'] !== 'core') {
353
+		if ($x509->getDN(X509::DN_OPENSSL)['CN'] !== $certificateCN && $x509->getDN(X509::DN_OPENSSL)['CN'] !== 'core') {
354 354
 			throw new InvalidSignatureException(
355 355
 					sprintf('Certificate is not valid for required scope. (Requested: %s, current: CN=%s)', $certificateCN, $x509->getDN(true)['CN'])
356 356
 			);
@@ -363,7 +363,7 @@  discard block
 block discarded – undo
363 363
 		$rsa->setMGFHash('sha512');
364 364
 		// See https://tools.ietf.org/html/rfc3447#page-38
365 365
 		$rsa->setSaltLength(0);
366
-		if(!$rsa->verify(json_encode($expectedHashes), $signature)) {
366
+		if (!$rsa->verify(json_encode($expectedHashes), $signature)) {
367 367
 			throw new InvalidSignatureException('Signature could not get verified.');
368 368
 		}
369 369
 
@@ -372,9 +372,9 @@  discard block
 block discarded – undo
372 372
 		//
373 373
 		// Due to this reason we exclude the whole updater/ folder from the code
374 374
 		// integrity check.
375
-		if($basePath === $this->environmentHelper->getServerRoot()) {
376
-			foreach($expectedHashes as $fileName => $hash) {
377
-				if(strpos($fileName, 'updater/') === 0) {
375
+		if ($basePath === $this->environmentHelper->getServerRoot()) {
376
+			foreach ($expectedHashes as $fileName => $hash) {
377
+				if (strpos($fileName, 'updater/') === 0) {
378 378
 					unset($expectedHashes[$fileName]);
379 379
 				}
380 380
 			}
@@ -386,23 +386,23 @@  discard block
 block discarded – undo
386 386
 		$differencesB = array_diff($currentInstanceHashes, $expectedHashes);
387 387
 		$differences = array_unique(array_merge($differencesA, $differencesB));
388 388
 		$differenceArray = [];
389
-		foreach($differences as $filename => $hash) {
389
+		foreach ($differences as $filename => $hash) {
390 390
 			// Check if file should not exist in the new signature table
391
-			if(!array_key_exists($filename, $expectedHashes)) {
391
+			if (!array_key_exists($filename, $expectedHashes)) {
392 392
 				$differenceArray['EXTRA_FILE'][$filename]['expected'] = '';
393 393
 				$differenceArray['EXTRA_FILE'][$filename]['current'] = $hash;
394 394
 				continue;
395 395
 			}
396 396
 
397 397
 			// Check if file is missing
398
-			if(!array_key_exists($filename, $currentInstanceHashes)) {
398
+			if (!array_key_exists($filename, $currentInstanceHashes)) {
399 399
 				$differenceArray['FILE_MISSING'][$filename]['expected'] = $expectedHashes[$filename];
400 400
 				$differenceArray['FILE_MISSING'][$filename]['current'] = '';
401 401
 				continue;
402 402
 			}
403 403
 
404 404
 			// Check if hash does mismatch
405
-			if($expectedHashes[$filename] !== $currentInstanceHashes[$filename]) {
405
+			if ($expectedHashes[$filename] !== $currentInstanceHashes[$filename]) {
406 406
 				$differenceArray['INVALID_HASH'][$filename]['expected'] = $expectedHashes[$filename];
407 407
 				$differenceArray['INVALID_HASH'][$filename]['current'] = $currentInstanceHashes[$filename];
408 408
 				continue;
@@ -422,7 +422,7 @@  discard block
 block discarded – undo
422 422
 	 */
423 423
 	public function hasPassedCheck() {
424 424
 		$results = $this->getResults();
425
-		if(empty($results)) {
425
+		if (empty($results)) {
426 426
 			return true;
427 427
 		}
428 428
 
@@ -434,7 +434,7 @@  discard block
 block discarded – undo
434 434
 	 */
435 435
 	public function getResults() {
436 436
 		$cachedResults = $this->cache->get(self::CACHE_KEY);
437
-		if(!is_null($cachedResults)) {
437
+		if (!is_null($cachedResults)) {
438 438
 			return json_decode($cachedResults, true);
439 439
 		}
440 440
 
@@ -453,7 +453,7 @@  discard block
 block discarded – undo
453 453
 	private function storeResults($scope, array $result) {
454 454
 		$resultArray = $this->getResults();
455 455
 		unset($resultArray[$scope]);
456
-		if(!empty($result)) {
456
+		if (!empty($result)) {
457 457
 			$resultArray[$scope] = $result;
458 458
 		}
459 459
 		if ($this->config !== null) {
@@ -505,11 +505,11 @@  discard block
 block discarded – undo
505 505
 	 */
506 506
 	public function verifyAppSignature($appId, $path = '') {
507 507
 		try {
508
-			if($path === '') {
508
+			if ($path === '') {
509 509
 				$path = $this->appLocator->getAppPath($appId);
510 510
 			}
511 511
 			$result = $this->verify(
512
-					$path . '/appinfo/signature.json',
512
+					$path.'/appinfo/signature.json',
513 513
 					$path,
514 514
 					$appId
515 515
 			);
@@ -559,7 +559,7 @@  discard block
 block discarded – undo
559 559
 	public function verifyCoreSignature() {
560 560
 		try {
561 561
 			$result = $this->verify(
562
-					$this->environmentHelper->getServerRoot() . '/core/signature.json',
562
+					$this->environmentHelper->getServerRoot().'/core/signature.json',
563 563
 					$this->environmentHelper->getServerRoot(),
564 564
 					'core'
565 565
 			);
@@ -584,18 +584,18 @@  discard block
 block discarded – undo
584 584
 		$this->cleanResults();
585 585
 		$this->verifyCoreSignature();
586 586
 		$appIds = $this->appLocator->getAllApps();
587
-		foreach($appIds as $appId) {
587
+		foreach ($appIds as $appId) {
588 588
 			// If an application is shipped a valid signature is required
589 589
 			$isShipped = $this->appManager->isShipped($appId);
590 590
 			$appNeedsToBeChecked = false;
591 591
 			if ($isShipped) {
592 592
 				$appNeedsToBeChecked = true;
593
-			} elseif ($this->fileAccessHelper->file_exists($this->appLocator->getAppPath($appId) . '/appinfo/signature.json')) {
593
+			} elseif ($this->fileAccessHelper->file_exists($this->appLocator->getAppPath($appId).'/appinfo/signature.json')) {
594 594
 				// Otherwise only if the application explicitly ships a signature.json file
595 595
 				$appNeedsToBeChecked = true;
596 596
 			}
597 597
 
598
-			if($appNeedsToBeChecked) {
598
+			if ($appNeedsToBeChecked) {
599 599
 				$this->verifyAppSignature($appId);
600 600
 			}
601 601
 		}
Please login to merge, or discard this patch.
lib/private/Files/Config/MountProviderCollection.php 1 patch
Spacing   +7 added lines, -7 removed lines patch added patch discarded remove patch
@@ -74,13 +74,13 @@  discard block
 block discarded – undo
74 74
 	 */
75 75
 	public function getMountsForUser(IUser $user) {
76 76
 		$loader = $this->loader;
77
-		$mounts = array_map(function (IMountProvider $provider) use ($user, $loader) {
77
+		$mounts = array_map(function(IMountProvider $provider) use ($user, $loader) {
78 78
 			return $provider->getMountsForUser($user, $loader);
79 79
 		}, $this->providers);
80
-		$mounts = array_filter($mounts, function ($result) {
80
+		$mounts = array_filter($mounts, function($result) {
81 81
 			return is_array($result);
82 82
 		});
83
-		return array_reduce($mounts, function (array $mounts, array $providerMounts) {
83
+		return array_reduce($mounts, function(array $mounts, array $providerMounts) {
84 84
 			return array_merge($mounts, $providerMounts);
85 85
 		}, array());
86 86
 	}
@@ -89,10 +89,10 @@  discard block
 block discarded – undo
89 89
 		// shared mount provider gets to go last since it needs to know existing files
90 90
 		// to check for name collisions
91 91
 		$firstMounts = [];
92
-		$firstProviders = array_filter($this->providers, function (IMountProvider $provider) {
92
+		$firstProviders = array_filter($this->providers, function(IMountProvider $provider) {
93 93
 			return (get_class($provider) !== 'OCA\Files_Sharing\MountProvider');
94 94
 		});
95
-		$lastProviders = array_filter($this->providers, function (IMountProvider $provider) {
95
+		$lastProviders = array_filter($this->providers, function(IMountProvider $provider) {
96 96
 			return (get_class($provider) === 'OCA\Files_Sharing\MountProvider');
97 97
 		});
98 98
 		foreach ($firstProviders as $provider) {
@@ -128,11 +128,11 @@  discard block
 block discarded – undo
128 128
 		$providers = array_reverse($this->homeProviders); // call the latest registered provider first to give apps an opportunity to overwrite builtin
129 129
 		foreach ($providers as $homeProvider) {
130 130
 			if ($mount = $homeProvider->getHomeMountForUser($user, $this->loader)) {
131
-				$mount->setMountPoint('/' . $user->getUID()); //make sure the mountpoint is what we expect
131
+				$mount->setMountPoint('/'.$user->getUID()); //make sure the mountpoint is what we expect
132 132
 				return $mount;
133 133
 			}
134 134
 		}
135
-		throw new \Exception('No home storage configured for user ' . $user);
135
+		throw new \Exception('No home storage configured for user '.$user);
136 136
 	}
137 137
 
138 138
 	/**
Please login to merge, or discard this patch.
apps/files_trashbin/lib/Helper.php 1 patch
Spacing   +4 added lines, -4 removed lines patch added patch discarded remove patch
@@ -44,7 +44,7 @@  discard block
 block discarded – undo
44 44
 		$result = array();
45 45
 		$timestamp = null;
46 46
 
47
-		$view = new \OC\Files\View('/' . $user . '/files_trashbin/files');
47
+		$view = new \OC\Files\View('/'.$user.'/files_trashbin/files');
48 48
 
49 49
 		if (ltrim($dir, '/') !== '' && !$view->is_dir($dir)) {
50 50
 			throw new \Exception('Directory does not exists');
@@ -72,7 +72,7 @@  discard block
 block discarded – undo
72 72
 				$timestamp = substr(pathinfo($parts[0], PATHINFO_EXTENSION), 1);
73 73
 			}
74 74
 			$originalPath = '';
75
-			$originalName = substr($entryName, 0, -strlen($timestamp)-2);
75
+			$originalName = substr($entryName, 0, -strlen($timestamp) - 2);
76 76
 			if (isset($originalLocations[$originalName][$timestamp])) {
77 77
 				$originalPath = $originalLocations[$originalName][$timestamp];
78 78
 				if (substr($originalPath, -1) === '/') {
@@ -92,12 +92,12 @@  discard block
 block discarded – undo
92 92
 			);
93 93
 			if ($originalPath) {
94 94
 				if ($originalPath !== '.') {
95
-					$i['extraData'] = $originalPath . '/' . $originalName;
95
+					$i['extraData'] = $originalPath.'/'.$originalName;
96 96
 				} else {
97 97
 					$i['extraData'] = $originalName;
98 98
 				}
99 99
 			}
100
-			$result[] = new FileInfo($absoluteDir . '/' . $i['name'], $storage, $internalPath . '/' . $i['name'], $i, $mount);
100
+			$result[] = new FileInfo($absoluteDir.'/'.$i['name'], $storage, $internalPath.'/'.$i['name'], $i, $mount);
101 101
 		}
102 102
 
103 103
 		if ($sortAttribute !== '') {
Please login to merge, or discard this patch.
apps/files/lib/Command/TransferOwnership.php 1 patch
Spacing   +11 added lines, -11 removed lines patch added patch discarded remove patch
@@ -119,7 +119,7 @@  discard block
 block discarded – undo
119 119
 		$this->sourceUser = $sourceUserObject->getUID();
120 120
 		$this->destinationUser = $destinationUserObject->getUID();
121 121
 		$sourcePathOption = ltrim($input->getOption('path'), '/');
122
-		$this->sourcePath = rtrim($this->sourceUser . '/files/' . $sourcePathOption, '/');
122
+		$this->sourcePath = rtrim($this->sourceUser.'/files/'.$sourcePathOption, '/');
123 123
 
124 124
 		// target user has to be ready
125 125
 		if (!\OC::$server->getEncryptionManager()->isReadyForUser($this->destinationUser)) {
@@ -176,7 +176,7 @@  discard block
 block discarded – undo
176 176
 		$self = $this;
177 177
 
178 178
 		$this->walkFiles($view, $this->sourcePath,
179
-				function (FileInfo $fileInfo) use ($progress, $self) {
179
+				function(FileInfo $fileInfo) use ($progress, $self) {
180 180
 					if ($fileInfo->getType() === FileInfo::TYPE_FOLDER) {
181 181
 						// only analyze into folders from main storage,
182 182
 						if (!$fileInfo->getStorage()->instanceOfStorage(IHomeStorage::class)) {
@@ -197,9 +197,9 @@  discard block
 block discarded – undo
197 197
 		// no file is allowed to be encrypted
198 198
 		if (!empty($this->encryptedFiles)) {
199 199
 			$output->writeln("<error>Some files are encrypted - please decrypt them first</error>");
200
-			foreach($this->encryptedFiles as $encryptedFile) {
200
+			foreach ($this->encryptedFiles as $encryptedFile) {
201 201
 				/** @var FileInfo $encryptedFile */
202
-				$output->writeln("  " . $encryptedFile->getPath());
202
+				$output->writeln("  ".$encryptedFile->getPath());
203 203
 			}
204 204
 			throw new \Exception('Execution terminated.');
205 205
 		}
@@ -213,7 +213,7 @@  discard block
 block discarded – undo
213 213
 		$output->writeln("Collecting all share information for files and folder of $this->sourceUser ...");
214 214
 
215 215
 		$progress = new ProgressBar($output, count($this->shares));
216
-		foreach([\OCP\Share::SHARE_TYPE_GROUP, \OCP\Share::SHARE_TYPE_USER, \OCP\Share::SHARE_TYPE_LINK, \OCP\Share::SHARE_TYPE_REMOTE] as $shareType) {
216
+		foreach ([\OCP\Share::SHARE_TYPE_GROUP, \OCP\Share::SHARE_TYPE_USER, \OCP\Share::SHARE_TYPE_LINK, \OCP\Share::SHARE_TYPE_REMOTE] as $shareType) {
217 217
 		$offset = 0;
218 218
 			while (true) {
219 219
 				$sharePage = $this->shareManager->getSharesBy($this->sourceUser, $shareType, null, true, 50, $offset);
@@ -239,9 +239,9 @@  discard block
 block discarded – undo
239 239
 
240 240
 		// This change will help user to transfer the folder specified using --path option.
241 241
 		// Else only the content inside folder is transferred which is not correct.
242
-		if($this->sourcePath !== "$this->sourceUser/files") {
242
+		if ($this->sourcePath !== "$this->sourceUser/files") {
243 243
 			$view->mkdir($this->finalTarget);
244
-			$this->finalTarget = $this->finalTarget . '/' . basename($this->sourcePath);
244
+			$this->finalTarget = $this->finalTarget.'/'.basename($this->sourcePath);
245 245
 		}
246 246
 		$view->rename($this->sourcePath, $this->finalTarget);
247 247
 		if (!is_dir("$this->sourceUser/files")) {
@@ -257,11 +257,11 @@  discard block
 block discarded – undo
257 257
 		$output->writeln("Restoring shares ...");
258 258
 		$progress = new ProgressBar($output, count($this->shares));
259 259
 
260
-		foreach($this->shares as $share) {
260
+		foreach ($this->shares as $share) {
261 261
 			try {
262 262
 				if ($share->getSharedWith() === $this->destinationUser) {
263 263
 					// Unmount the shares before deleting, so we don't try to get the storage later on.
264
-					$shareMountPoint = $this->mountManager->find('/' . $this->destinationUser . '/files' . $share->getTarget());
264
+					$shareMountPoint = $this->mountManager->find('/'.$this->destinationUser.'/files'.$share->getTarget());
265 265
 					if ($shareMountPoint) {
266 266
 						$this->mountManager->removeMount($shareMountPoint->getMountPoint());
267 267
 					}
@@ -277,9 +277,9 @@  discard block
 block discarded – undo
277 277
 					$this->shareManager->updateShare($share);
278 278
 				}
279 279
 			} catch (\OCP\Files\NotFoundException $e) {
280
-				$output->writeln('<error>Share with id ' . $share->getId() . ' points at deleted file, skipping</error>');
280
+				$output->writeln('<error>Share with id '.$share->getId().' points at deleted file, skipping</error>');
281 281
 			} catch (\Exception $e) {
282
-				$output->writeln('<error>Could not restore share with id ' . $share->getId() . ':' . $e->getTraceAsString() . '</error>');
282
+				$output->writeln('<error>Could not restore share with id '.$share->getId().':'.$e->getTraceAsString().'</error>');
283 283
 			}
284 284
 			$progress->advance();
285 285
 		}
Please login to merge, or discard this patch.
settings/Controller/ChangePasswordController.php 1 patch
Spacing   +4 added lines, -4 removed lines patch added patch discarded remove patch
@@ -110,7 +110,7 @@  discard block
 block discarded – undo
110 110
 				]);
111 111
 			}
112 112
 		// password policy app throws exception
113
-		} catch(HintException $e) {
113
+		} catch (HintException $e) {
114 114
 			return new JSONResponse([
115 115
 				'status' => 'error',
116 116
 				'data' => [
@@ -220,7 +220,7 @@  discard block
 block discarded – undo
220 220
 						'message' => $this->l->t('Please provide an admin recovery password; otherwise, all user data will be lost.'),
221 221
 					]
222 222
 				]);
223
-			} elseif ($recoveryEnabledForUser && ! $validRecoveryPassword) {
223
+			} elseif ($recoveryEnabledForUser && !$validRecoveryPassword) {
224 224
 				return new JSONResponse([
225 225
 					'status' => 'error',
226 226
 					'data' => [
@@ -231,7 +231,7 @@  discard block
 block discarded – undo
231 231
 				try {
232 232
 					$result = $targetUser->setPassword($password, $recoveryPassword);
233 233
 				// password policy app throws exception
234
-				} catch(HintException $e) {
234
+				} catch (HintException $e) {
235 235
 					return new JSONResponse([
236 236
 						'status' => 'error',
237 237
 						'data' => [
@@ -266,7 +266,7 @@  discard block
 block discarded – undo
266 266
 					]);
267 267
 				}
268 268
 			// password policy app throws exception
269
-			} catch(HintException $e) {
269
+			} catch (HintException $e) {
270 270
 				return new JSONResponse([
271 271
 					'status' => 'error',
272 272
 					'data' => [
Please login to merge, or discard this patch.
apps/dav/lib/CardDAV/SyncService.php 1 patch
Spacing   +5 added lines, -5 removed lines patch added patch discarded remove patch
@@ -99,7 +99,7 @@  discard block
 block discarded – undo
99 99
 			if ($ex->getCode() === Http::STATUS_UNAUTHORIZED) {
100 100
 				// remote server revoked access to the address book, remove it
101 101
 				$this->backend->deleteAddressBook($addressBookId);
102
-				$this->logger->info('Authorization failed, remove address book: ' . $url, ['app' => 'dav']);
102
+				$this->logger->info('Authorization failed, remove address book: '.$url, ['app' => 'dav']);
103 103
 				throw $ex;
104 104
 			}
105 105
 		}
@@ -149,7 +149,7 @@  discard block
 block discarded – undo
149 149
 	 */
150 150
 	protected function getClient($url, $userName, $sharedSecret) {
151 151
 		$settings = [
152
-			'baseUri' => $url . '/',
152
+			'baseUri' => $url.'/',
153 153
 			'userName' => $userName,
154 154
 			'password' => $sharedSecret,
155 155
 		];
@@ -269,7 +269,7 @@  discard block
 block discarded – undo
269 269
 	 */
270 270
 	public function deleteUser($userOrCardId) {
271 271
 		$systemAddressBook = $this->getLocalSystemAddressBook();
272
-		if ($userOrCardId instanceof IUser){
272
+		if ($userOrCardId instanceof IUser) {
273 273
 			$name = $userOrCardId->getBackendClassName();
274 274
 			$userId = $userOrCardId->getUID();
275 275
 
@@ -285,7 +285,7 @@  discard block
 block discarded – undo
285 285
 		if (is_null($this->localSystemAddressBook)) {
286 286
 			$systemPrincipal = "principals/system/system";
287 287
 			$this->localSystemAddressBook = $this->ensureSystemAddressBookExists($systemPrincipal, 'system', [
288
-				'{' . Plugin::NS_CARDDAV . '}addressbook-description' => 'System addressbook which holds all users of this instance'
288
+				'{'.Plugin::NS_CARDDAV.'}addressbook-description' => 'System addressbook which holds all users of this instance'
289 289
 			]);
290 290
 		}
291 291
 
@@ -303,7 +303,7 @@  discard block
 block discarded – undo
303 303
 
304 304
 		// remove no longer existing
305 305
 		$allCards = $this->backend->getCards($systemAddressBook['id']);
306
-		foreach($allCards as $card) {
306
+		foreach ($allCards as $card) {
307 307
 			$vCard = Reader::read($card['carddata']);
308 308
 			$uid = $vCard->UID->getValue();
309 309
 			// load backend and see if user exists
Please login to merge, or discard this patch.
lib/private/Files/FileInfo.php 1 patch
Spacing   +4 added lines, -4 removed lines patch added patch discarded remove patch
@@ -87,7 +87,7 @@  discard block
 block discarded – undo
87 87
 	 * @param \OCP\Files\Mount\IMountPoint $mount
88 88
 	 * @param \OCP\IUser|null $owner
89 89
 	 */
90
-	public function __construct($path, $storage, $internalPath, $data, $mount, $owner= null) {
90
+	public function __construct($path, $storage, $internalPath, $data, $mount, $owner = null) {
91 91
 		$this->path = $path;
92 92
 		$this->storage = $storage;
93 93
 		$this->internalPath = $internalPath;
@@ -153,7 +153,7 @@  discard block
 block discarded – undo
153 153
 	 * @return int|null
154 154
 	 */
155 155
 	public function getId() {
156
-		return isset($this->data['fileid']) ? (int)  $this->data['fileid'] : null;
156
+		return isset($this->data['fileid']) ? (int) $this->data['fileid'] : null;
157 157
 	}
158 158
 
159 159
 	/**
@@ -183,7 +183,7 @@  discard block
 block discarded – undo
183 183
 	public function getEtag() {
184 184
 		$this->updateEntryfromSubMounts();
185 185
 		if (count($this->childEtags) > 0) {
186
-			$combinedEtag = $this->data['etag'] . '::' . implode('::', $this->childEtags);
186
+			$combinedEtag = $this->data['etag'].'::'.implode('::', $this->childEtags);
187 187
 			return md5($combinedEtag);
188 188
 		} else {
189 189
 			return $this->data['etag'];
@@ -379,7 +379,7 @@  discard block
 block discarded – undo
379 379
 			$relativeEntryPath = substr($entryPath, strlen($this->getPath()));
380 380
 			// attach the permissions to propagate etag on permision changes of submounts
381 381
 			$permissions = isset($data['permissions']) ? $data['permissions'] : 0;
382
-			$this->childEtags[] = $relativeEntryPath . '/' . $data['etag'] . $permissions;
382
+			$this->childEtags[] = $relativeEntryPath.'/'.$data['etag'].$permissions;
383 383
 		}
384 384
 	}
385 385
 
Please login to merge, or discard this patch.