@@ -93,7 +93,7 @@ |
||
93 | 93 | $column->setType(Type::getType(Types::BIGINT)); |
94 | 94 | $column->setOptions(['length' => 20]); |
95 | 95 | |
96 | - $updates[] = '* ' . $tableName . '.' . $columnName; |
|
96 | + $updates[] = '* '.$tableName.'.'.$columnName; |
|
97 | 97 | } |
98 | 98 | } |
99 | 99 | } |
@@ -47,7 +47,7 @@ |
||
47 | 47 | if (!$schema->hasTable('directlink')) { |
48 | 48 | $table = $schema->createTable('directlink'); |
49 | 49 | |
50 | - $table->addColumn('id',Types::BIGINT, [ |
|
50 | + $table->addColumn('id', Types::BIGINT, [ |
|
51 | 51 | 'autoincrement' => true, |
52 | 52 | 'notnull' => true, |
53 | 53 | 'length' => 11, |
@@ -46,8 +46,8 @@ discard block |
||
46 | 46 | |
47 | 47 | $types = ['resources', 'rooms']; |
48 | 48 | foreach ($types as $type) { |
49 | - if (!$schema->hasTable('calendar_' . $type)) { |
|
50 | - $table = $schema->createTable('calendar_' . $type); |
|
49 | + if (!$schema->hasTable('calendar_'.$type)) { |
|
50 | + $table = $schema->createTable('calendar_'.$type); |
|
51 | 51 | |
52 | 52 | $table->addColumn('id', Types::BIGINT, [ |
53 | 53 | 'autoincrement' => true, |
@@ -77,9 +77,9 @@ discard block |
||
77 | 77 | ]); |
78 | 78 | |
79 | 79 | $table->setPrimaryKey(['id']); |
80 | - $table->addIndex(['backend_id', 'resource_id'], 'calendar_' . $type . '_bkdrsc'); |
|
81 | - $table->addIndex(['email'], 'calendar_' . $type . '_email'); |
|
82 | - $table->addIndex(['displayname'], 'calendar_' . $type . '_name'); |
|
80 | + $table->addIndex(['backend_id', 'resource_id'], 'calendar_'.$type.'_bkdrsc'); |
|
81 | + $table->addIndex(['email'], 'calendar_'.$type.'_email'); |
|
82 | + $table->addIndex(['displayname'], 'calendar_'.$type.'_name'); |
|
83 | 83 | } |
84 | 84 | } |
85 | 85 |
@@ -59,7 +59,7 @@ discard block |
||
59 | 59 | 'length' => 11, |
60 | 60 | 'unsigned' => true, |
61 | 61 | ]); |
62 | - $table->addColumn($type . '_id', Types::BIGINT, [ |
|
62 | + $table->addColumn($type.'_id', Types::BIGINT, [ |
|
63 | 63 | 'notnull' => true, |
64 | 64 | 'length' => 11, |
65 | 65 | 'unsigned' => true, |
@@ -74,7 +74,7 @@ discard block |
||
74 | 74 | ]); |
75 | 75 | |
76 | 76 | $table->setPrimaryKey(['id']); |
77 | - $table->addIndex([$type . '_id', 'key'], $this->getMetadataTableName($type) . '_idk'); |
|
77 | + $table->addIndex([$type.'_id', 'key'], $this->getMetadataTableName($type).'_idk'); |
|
78 | 78 | } |
79 | 79 | } |
80 | 80 | |
@@ -86,6 +86,6 @@ discard block |
||
86 | 86 | * @return string |
87 | 87 | */ |
88 | 88 | private function getMetadataTableName(string $type):string { |
89 | - return 'calendar_' . $type . 's_md'; |
|
89 | + return 'calendar_'.$type.'s_md'; |
|
90 | 90 | } |
91 | 91 | } |
@@ -72,10 +72,10 @@ |
||
72 | 72 | |
73 | 73 | foreach ($configuredEvents as $operationClass => $events) { |
74 | 74 | foreach ($events as $entityClass => $eventNames) { |
75 | - array_map(function (string $eventName) use ($manager, $container, $dispatcher, $logger, $operationClass, $entityClass) { |
|
75 | + array_map(function(string $eventName) use ($manager, $container, $dispatcher, $logger, $operationClass, $entityClass) { |
|
76 | 76 | $dispatcher->addListener( |
77 | 77 | $eventName, |
78 | - function ($event) use ($manager, $container, $eventName, $logger, $operationClass, $entityClass) { |
|
78 | + function($event) use ($manager, $container, $eventName, $logger, $operationClass, $entityClass) { |
|
79 | 79 | $ruleMatcher = $manager->getRuleMatcher(); |
80 | 80 | try { |
81 | 81 | /** @var IEntity $entity */ |
@@ -58,9 +58,9 @@ |
||
58 | 58 | public function search(string $query, array $inApps = [], int $page = 1, int $size = 30): JSONResponse { |
59 | 59 | $results = $this->searcher->searchPaged($query, $inApps, $page, $size); |
60 | 60 | |
61 | - $results = array_filter($results, function (Result $result) { |
|
61 | + $results = array_filter($results, function(Result $result) { |
|
62 | 62 | if (json_encode($result, JSON_HEX_TAG) === false) { |
63 | - $this->logger->warning("Skipping search result due to invalid encoding: {type: " . $result->type . ", id: " . $result->id . "}"); |
|
63 | + $this->logger->warning("Skipping search result due to invalid encoding: {type: ".$result->type.", id: ".$result->id."}"); |
|
64 | 64 | return false; |
65 | 65 | } else { |
66 | 66 | return true; |
@@ -43,7 +43,7 @@ |
||
43 | 43 | |
44 | 44 | public function injectFn(callable $fn) { |
45 | 45 | $reflected = new ReflectionFunction(Closure::fromCallable($fn)); |
46 | - return $fn(...array_map(function (ReflectionParameter $param) { |
|
46 | + return $fn(...array_map(function(ReflectionParameter $param) { |
|
47 | 47 | // First we try by type (more likely these days) |
48 | 48 | if (($type = $param->getType()) !== null) { |
49 | 49 | try { |
@@ -60,11 +60,11 @@ |
||
60 | 60 | if ($readablePath) { |
61 | 61 | $message = "\"$path\"(\"$readablePath\") is locked"; |
62 | 62 | } else { |
63 | - $message = '"' . $path . '" is locked'; |
|
63 | + $message = '"'.$path.'" is locked'; |
|
64 | 64 | } |
65 | 65 | $this->existingLock = $existingLock; |
66 | 66 | if ($existingLock) { |
67 | - $message .= ', existing lock on file: ' . $existingLock; |
|
67 | + $message .= ', existing lock on file: '.$existingLock; |
|
68 | 68 | } |
69 | 69 | parent::__construct($message, 0, $previous); |
70 | 70 | $this->path = $path; |
@@ -64,7 +64,7 @@ discard block |
||
64 | 64 | $linkCheckPlugin = new \OCA\DAV\Files\Sharing\PublicLinkCheckPlugin(); |
65 | 65 | $filesDropPlugin = new \OCA\DAV\Files\Sharing\FilesDropPlugin(); |
66 | 66 | |
67 | -$server = $serverFactory->createServer($baseuri, $requestUri, $authPlugin, function (\Sabre\DAV\Server $server) use ($authBackend, $linkCheckPlugin, $filesDropPlugin) { |
|
67 | +$server = $serverFactory->createServer($baseuri, $requestUri, $authPlugin, function(\Sabre\DAV\Server $server) use ($authBackend, $linkCheckPlugin, $filesDropPlugin) { |
|
68 | 68 | $isAjax = (isset($_SERVER['HTTP_X_REQUESTED_WITH']) && $_SERVER['HTTP_X_REQUESTED_WITH'] === 'XMLHttpRequest'); |
69 | 69 | /** @var \OCA\FederatedFileSharing\FederatedShareProvider $shareProvider */ |
70 | 70 | $federatedShareProvider = \OC::$server->query(\OCA\FederatedFileSharing\FederatedShareProvider::class); |
@@ -80,17 +80,17 @@ discard block |
||
80 | 80 | |
81 | 81 | // FIXME: should not add storage wrappers outside of preSetup, need to find a better way |
82 | 82 | $previousLog = \OC\Files\Filesystem::logWarningWhenAddingStorageWrapper(false); |
83 | - \OC\Files\Filesystem::addStorageWrapper('sharePermissions', function ($mountPoint, $storage) use ($share) { |
|
83 | + \OC\Files\Filesystem::addStorageWrapper('sharePermissions', function($mountPoint, $storage) use ($share) { |
|
84 | 84 | return new \OC\Files\Storage\Wrapper\PermissionsMask(['storage' => $storage, 'mask' => $share->getPermissions() | \OCP\Constants::PERMISSION_SHARE]); |
85 | 85 | }); |
86 | - \OC\Files\Filesystem::addStorageWrapper('shareOwner', function ($mountPoint, $storage) use ($share) { |
|
86 | + \OC\Files\Filesystem::addStorageWrapper('shareOwner', function($mountPoint, $storage) use ($share) { |
|
87 | 87 | return new \OCA\DAV\Storage\PublicOwnerWrapper(['storage' => $storage, 'owner' => $share->getShareOwner()]); |
88 | 88 | }); |
89 | 89 | \OC\Files\Filesystem::logWarningWhenAddingStorageWrapper($previousLog); |
90 | 90 | |
91 | 91 | OC_Util::tearDownFS(); |
92 | 92 | OC_Util::setupFS($owner); |
93 | - $ownerView = new \OC\Files\View('/'. $owner . '/files'); |
|
93 | + $ownerView = new \OC\Files\View('/'.$owner.'/files'); |
|
94 | 94 | $path = $ownerView->getPath($fileId); |
95 | 95 | $fileInfo = $ownerView->getFileInfo($path); |
96 | 96 | $linkCheckPlugin->setFileInfo($fileInfo); |