@@ -50,7 +50,7 @@ |
||
50 | 50 | ->setFlag(DefinitionParameter::FLAG_OPTIONAL), |
51 | 51 | ]) |
52 | 52 | ->addAuthScheme(AuthMechanism::SCHEME_OPENSTACK) |
53 | - ->setLegacyAuthMechanismCallback(function (array $params) use ($openstackAuth, $rackspaceAuth) { |
|
53 | + ->setLegacyAuthMechanismCallback(function(array $params) use ($openstackAuth, $rackspaceAuth) { |
|
54 | 54 | if (isset($params['options']['key']) && $params['options']['key']) { |
55 | 55 | return $rackspaceAuth; |
56 | 56 | } |
@@ -134,7 +134,7 @@ discard block |
||
134 | 134 | */ |
135 | 135 | public function requestSharedSecret($url, $token) { |
136 | 136 | if ($this->trustedServers->isTrustedServer($url) === false) { |
137 | - $this->logger->error('remote server not trusted (' . $url . ') while requesting shared secret', ['app' => 'federation']); |
|
137 | + $this->logger->error('remote server not trusted ('.$url.') while requesting shared secret', ['app' => 'federation']); |
|
138 | 138 | throw new OCSForbiddenException(); |
139 | 139 | } |
140 | 140 | |
@@ -143,7 +143,7 @@ discard block |
||
143 | 143 | $localToken = $this->dbHandler->getToken($url); |
144 | 144 | if (strcmp($localToken, $token) > 0) { |
145 | 145 | $this->logger->info( |
146 | - 'remote server (' . $url . ') presented lower token. We will initiate the exchange of the shared secret.', |
|
146 | + 'remote server ('.$url.') presented lower token. We will initiate the exchange of the shared secret.', |
|
147 | 147 | ['app' => 'federation'] |
148 | 148 | ); |
149 | 149 | throw new OCSForbiddenException(); |
@@ -183,14 +183,14 @@ discard block |
||
183 | 183 | */ |
184 | 184 | public function getSharedSecret($url, $token) { |
185 | 185 | if ($this->trustedServers->isTrustedServer($url) === false) { |
186 | - $this->logger->error('remote server not trusted (' . $url . ') while getting shared secret', ['app' => 'federation']); |
|
186 | + $this->logger->error('remote server not trusted ('.$url.') while getting shared secret', ['app' => 'federation']); |
|
187 | 187 | throw new OCSForbiddenException(); |
188 | 188 | } |
189 | 189 | |
190 | 190 | if ($this->isValidToken($url, $token) === false) { |
191 | 191 | $expectedToken = $this->dbHandler->getToken($url); |
192 | 192 | $this->logger->error( |
193 | - 'remote server (' . $url . ') didn\'t send a valid token (got "' . $token . '" but expected "'. $expectedToken . '") while getting shared secret', |
|
193 | + 'remote server ('.$url.') didn\'t send a valid token (got "'.$token.'" but expected "'.$expectedToken.'") while getting shared secret', |
|
194 | 194 | ['app' => 'federation'] |
195 | 195 | ); |
196 | 196 | throw new OCSForbiddenException(); |
@@ -53,7 +53,7 @@ |
||
53 | 53 | public function getLastUsedTagIds() { |
54 | 54 | $lastUsed = $this->config->getUserValue($this->userSession->getUser()->getUID(), 'systemtags', 'last_used', '[]'); |
55 | 55 | $tagIds = json_decode($lastUsed, true); |
56 | - return new DataResponse(array_map(function ($id) { |
|
56 | + return new DataResponse(array_map(function($id) { |
|
57 | 57 | return (string) $id; |
58 | 58 | }, $tagIds)); |
59 | 59 | } |
@@ -90,7 +90,7 @@ discard block |
||
90 | 90 | } else { |
91 | 91 | $p = new ProgressBar($output); |
92 | 92 | $p->start(); |
93 | - $this->userManager->callForSeenUsers(function (IUser $user) use ($p) { |
|
93 | + $this->userManager->callForSeenUsers(function(IUser $user) use ($p) { |
|
94 | 94 | $p->advance(); |
95 | 95 | $this->expireTrashForUser($user); |
96 | 96 | }); |
@@ -118,7 +118,7 @@ discard block |
||
118 | 118 | \OC_Util::setupFS($user); |
119 | 119 | |
120 | 120 | // Check if this user has a trashbin directory |
121 | - $view = new \OC\Files\View('/' . $user); |
|
121 | + $view = new \OC\Files\View('/'.$user); |
|
122 | 122 | if (!$view->is_dir('/files_trashbin/files')) { |
123 | 123 | return false; |
124 | 124 | } |
@@ -78,7 +78,7 @@ discard block |
||
78 | 78 | return; |
79 | 79 | } |
80 | 80 | |
81 | - $this->userManager->callForSeenUsers(function (IUser $user) { |
|
81 | + $this->userManager->callForSeenUsers(function(IUser $user) { |
|
82 | 82 | $uid = $user->getUID(); |
83 | 83 | if (!$this->setupFS($uid)) { |
84 | 84 | return; |
@@ -100,7 +100,7 @@ discard block |
||
100 | 100 | \OC_Util::setupFS($user); |
101 | 101 | |
102 | 102 | // Check if this user has a trashbin directory |
103 | - $view = new \OC\Files\View('/' . $user); |
|
103 | + $view = new \OC\Files\View('/'.$user); |
|
104 | 104 | if (!$view->is_dir('/files_trashbin/files')) { |
105 | 105 | return false; |
106 | 106 | } |
@@ -44,7 +44,7 @@ discard block |
||
44 | 44 | $result = []; |
45 | 45 | $timestamp = null; |
46 | 46 | |
47 | - $view = new \OC\Files\View('/' . $user . '/files_trashbin/files'); |
|
47 | + $view = new \OC\Files\View('/'.$user.'/files_trashbin/files'); |
|
48 | 48 | |
49 | 49 | if (ltrim($dir, '/') !== '' && !$view->is_dir($dir)) { |
50 | 50 | throw new \Exception('Directory does not exists'); |
@@ -91,12 +91,12 @@ discard block |
||
91 | 91 | ]; |
92 | 92 | if ($originalPath) { |
93 | 93 | if ($originalPath !== '.') { |
94 | - $i['extraData'] = $originalPath . '/' . $originalName; |
|
94 | + $i['extraData'] = $originalPath.'/'.$originalName; |
|
95 | 95 | } else { |
96 | 96 | $i['extraData'] = $originalName; |
97 | 97 | } |
98 | 98 | } |
99 | - $result[] = new FileInfo($absoluteDir . '/' . $i['name'], $storage, $internalPath . '/' . $i['name'], $i, $mount); |
|
99 | + $result[] = new FileInfo($absoluteDir.'/'.$i['name'], $storage, $internalPath.'/'.$i['name'], $i, $mount); |
|
100 | 100 | } |
101 | 101 | |
102 | 102 | if ($sortAttribute !== '') { |
@@ -90,7 +90,7 @@ |
||
90 | 90 | $notification |
91 | 91 | ->setApp('comments') |
92 | 92 | ->setObject('comment', $comment->getId()) |
93 | - ->setSubject('mention', [ $comment->getObjectType(), $comment->getObjectId() ]) |
|
93 | + ->setSubject('mention', [$comment->getObjectType(), $comment->getObjectId()]) |
|
94 | 94 | ->setDateTime($comment->getCreationDateTime()); |
95 | 95 | |
96 | 96 | return $notification; |
@@ -197,7 +197,7 @@ discard block |
||
197 | 197 | * @return string|false |
198 | 198 | */ |
199 | 199 | public function loginName2UserName($loginName) { |
200 | - $id = 'LOGINNAME,' . $loginName; |
|
200 | + $id = 'LOGINNAME,'.$loginName; |
|
201 | 201 | return $this->handleRequest($id, 'loginName2UserName', [$loginName]); |
202 | 202 | } |
203 | 203 | |
@@ -208,7 +208,7 @@ discard block |
||
208 | 208 | * @return string|false with the username |
209 | 209 | */ |
210 | 210 | public function dn2UserName($dn) { |
211 | - $id = 'DN,' . $dn; |
|
211 | + $id = 'DN,'.$dn; |
|
212 | 212 | return $this->handleRequest($id, 'dn2UserName', [$dn]); |
213 | 213 | } |
214 | 214 |
@@ -167,7 +167,7 @@ discard block |
||
167 | 167 | * @return bool |
168 | 168 | */ |
169 | 169 | public function userHasFiles($uid) { |
170 | - return $this->files->file_exists($uid . '/files'); |
|
170 | + return $this->files->file_exists($uid.'/files'); |
|
171 | 171 | } |
172 | 172 | |
173 | 173 | /** |
@@ -183,7 +183,7 @@ discard block |
||
183 | 183 | if (count($parts) > 1) { |
184 | 184 | $owner = $parts[1]; |
185 | 185 | if ($this->userManager->userExists($owner) === false) { |
186 | - throw new \BadMethodCallException('Unknown user: ' . |
|
186 | + throw new \BadMethodCallException('Unknown user: '. |
|
187 | 187 | 'method expects path to a user folder relative to the data folder'); |
188 | 188 | } |
189 | 189 | } |