@@ -37,7 +37,7 @@ |
||
| 37 | 37 | * Creates a Folder that represents a non-existing path |
| 38 | 38 | * |
| 39 | 39 | * @param string $path path |
| 40 | - * @return string non-existing node class |
|
| 40 | + * @return NonExistingFolder non-existing node class |
|
| 41 | 41 | */ |
| 42 | 42 | protected function createNonExistingNode($path) { |
| 43 | 43 | return new NonExistingFolder($this->root, $this->view, $path); |
@@ -33,6 +33,7 @@ |
||
| 33 | 33 | * |
| 34 | 34 | * @returns string |
| 35 | 35 | * @since 12 |
| 36 | + * @return string |
|
| 36 | 37 | */ |
| 37 | 38 | public function getIcon(); |
| 38 | 39 | } |
@@ -139,6 +139,9 @@ |
||
| 139 | 139 | return false; |
| 140 | 140 | } |
| 141 | 141 | |
| 142 | + /** |
|
| 143 | + * @param string $path |
|
| 144 | + */ |
|
| 142 | 145 | public function writeBack($tmpFile, $path) { |
| 143 | 146 | $this->uploadFile($tmpFile, $path); |
| 144 | 147 | unlink($tmpFile); |
@@ -616,6 +616,9 @@ |
||
| 616 | 616 | return $this->container; |
| 617 | 617 | } |
| 618 | 618 | |
| 619 | + /** |
|
| 620 | + * @param string $path |
|
| 621 | + */ |
|
| 619 | 622 | public function writeBack($tmpFile, $path) { |
| 620 | 623 | $fileData = fopen($tmpFile, 'r'); |
| 621 | 624 | $this->getContainer()->uploadObject($path, $fileData); |
@@ -597,7 +597,7 @@ |
||
| 597 | 597 | * publish activity |
| 598 | 598 | * |
| 599 | 599 | * @param string $subject |
| 600 | - * @param array $parameters |
|
| 600 | + * @param string[] $parameters |
|
| 601 | 601 | * @param string $affectedUser |
| 602 | 602 | * @param int $fileId |
| 603 | 603 | * @param string $filePath |
@@ -358,7 +358,7 @@ discard block |
||
| 358 | 358 | * split user and remote from federated cloud id |
| 359 | 359 | * |
| 360 | 360 | * @param string $address federated share address |
| 361 | - * @return array [user, remoteURL] |
|
| 361 | + * @return string[] [user, remoteURL] |
|
| 362 | 362 | * @throws \Exception |
| 363 | 363 | */ |
| 364 | 364 | public function splitUserRemote($address) { |
@@ -633,6 +633,9 @@ discard block |
||
| 633 | 633 | return $result; |
| 634 | 634 | } |
| 635 | 635 | |
| 636 | + /** |
|
| 637 | + * @param string $search |
|
| 638 | + */ |
|
| 636 | 639 | protected function getLookup($search) { |
| 637 | 640 | $isEnabled = $this->config->getAppValue('files_sharing', 'lookupServerEnabled', 'no'); |
| 638 | 641 | $result = []; |
@@ -225,7 +225,7 @@ |
||
| 225 | 225 | /** |
| 226 | 226 | * creates a array with all user data |
| 227 | 227 | * |
| 228 | - * @param $userId |
|
| 228 | + * @param string $userId |
|
| 229 | 229 | * @return array |
| 230 | 230 | * @throws OCSException |
| 231 | 231 | */ |
@@ -124,6 +124,9 @@ |
||
| 124 | 124 | return $nextPrefix; |
| 125 | 125 | } |
| 126 | 126 | |
| 127 | + /** |
|
| 128 | + * @param string $value |
|
| 129 | + */ |
|
| 127 | 130 | private function getServersConfig($value) { |
| 128 | 131 | $regex = '/' . $value . '$/S'; |
| 129 | 132 | |
@@ -104,6 +104,10 @@ |
||
| 104 | 104 | // TODO: dont check/enforce 2FA if a auth token is used |
| 105 | 105 | } |
| 106 | 106 | |
| 107 | + /** |
|
| 108 | + * @param Controller $controller |
|
| 109 | + * @param string $methodName |
|
| 110 | + */ |
|
| 107 | 111 | private function checkTwoFactor($controller, $methodName, IUser $user) { |
| 108 | 112 | // If two-factor auth is in progress disallow access to any controllers |
| 109 | 113 | // defined within "LoginController". |