@@ -77,7 +77,7 @@ discard block |
||
77 | 77 | } |
78 | 78 | |
79 | 79 | $readOnly = false; |
80 | - $readOnlyIndex = '{' . \OCA\DAV\DAV\Sharing\Plugin::NS_OWNCLOUD . '}read-only'; |
|
80 | + $readOnlyIndex = '{'.\OCA\DAV\DAV\Sharing\Plugin::NS_OWNCLOUD.'}read-only'; |
|
81 | 81 | if (isset($calendar[$readOnlyIndex])) { |
82 | 82 | $readOnly = $calendar[$readOnlyIndex]; |
83 | 83 | } |
@@ -85,8 +85,8 @@ discard block |
||
85 | 85 | $calendarTableData[] = [ |
86 | 86 | $calendar['uri'], |
87 | 87 | $calendar['{DAV:}displayname'], |
88 | - $calendar['{' . \OCA\DAV\DAV\Sharing\Plugin::NS_OWNCLOUD . '}owner-principal'], |
|
89 | - $calendar['{' . \OCA\DAV\DAV\Sharing\Plugin::NS_NEXTCLOUD . '}owner-displayname'], |
|
88 | + $calendar['{'.\OCA\DAV\DAV\Sharing\Plugin::NS_OWNCLOUD.'}owner-principal'], |
|
89 | + $calendar['{'.\OCA\DAV\DAV\Sharing\Plugin::NS_NEXTCLOUD.'}owner-displayname'], |
|
90 | 90 | $readOnly ? ' x ' : ' ✓ ', |
91 | 91 | ]; |
92 | 92 | } |
@@ -38,7 +38,7 @@ |
||
38 | 38 | $this |
39 | 39 | ->setIdentifier($invalidId) |
40 | 40 | ->setScheme(self::SCHEME_NULL) |
41 | - ->setText('Unknown auth mechanism backend ' . $invalidId) |
|
41 | + ->setText('Unknown auth mechanism backend '.$invalidId) |
|
42 | 42 | ; |
43 | 43 | } |
44 | 44 | } |
@@ -63,7 +63,7 @@ discard block |
||
63 | 63 | */ |
64 | 64 | protected function checkPlaceholder(): void { |
65 | 65 | $this->sanitizedPlaceholder = trim(strtolower($this->placeholder)); |
66 | - if (!(bool)\preg_match('/^[a-z0-9]*$/', $this->sanitizedPlaceholder)) { |
|
66 | + if (!(bool) \preg_match('/^[a-z0-9]*$/', $this->sanitizedPlaceholder)) { |
|
67 | 67 | throw new \RuntimeException(sprintf( |
68 | 68 | 'Invalid placeholder %s, only [a-z0-9] are allowed', $this->sanitizedPlaceholder |
69 | 69 | )); |
@@ -80,7 +80,7 @@ discard block |
||
80 | 80 | */ |
81 | 81 | protected function substituteIfString($value, string $replacement) { |
82 | 82 | if (is_string($value)) { |
83 | - return str_ireplace('$' . $this->sanitizedPlaceholder, $replacement, $value); |
|
83 | + return str_ireplace('$'.$this->sanitizedPlaceholder, $replacement, $value); |
|
84 | 84 | } |
85 | 85 | return $value; |
86 | 86 | } |
@@ -216,7 +216,7 @@ discard block |
||
216 | 216 | * @return Backend[] |
217 | 217 | */ |
218 | 218 | public function getAvailableBackends() { |
219 | - return array_filter($this->getBackends(), function ($backend) { |
|
219 | + return array_filter($this->getBackends(), function($backend) { |
|
220 | 220 | return !$backend->checkDependencies(); |
221 | 221 | }); |
222 | 222 | } |
@@ -255,7 +255,7 @@ discard block |
||
255 | 255 | * @return AuthMechanism[] |
256 | 256 | */ |
257 | 257 | public function getAuthMechanismsByScheme(array $schemes) { |
258 | - return array_filter($this->getAuthMechanisms(), function ($authMech) use ($schemes) { |
|
258 | + return array_filter($this->getAuthMechanisms(), function($authMech) use ($schemes) { |
|
259 | 259 | return in_array($authMech->getScheme(), $schemes, true); |
260 | 260 | }); |
261 | 261 | } |
@@ -322,7 +322,7 @@ discard block |
||
322 | 322 | */ |
323 | 323 | public function registerConfigHandler(string $placeholder, callable $configHandlerLoader) { |
324 | 324 | $placeholder = trim(strtolower($placeholder)); |
325 | - if (!(bool)\preg_match('/^[a-z0-9]*$/', $placeholder)) { |
|
325 | + if (!(bool) \preg_match('/^[a-z0-9]*$/', $placeholder)) { |
|
326 | 326 | throw new \RuntimeException(sprintf( |
327 | 327 | 'Invalid placeholder %s, only [a-z0-9] are allowed', $placeholder |
328 | 328 | )); |
@@ -353,7 +353,7 @@ discard block |
||
353 | 353 | if ($newLoaded) { |
354 | 354 | // ensure those with longest placeholders come first, |
355 | 355 | // to avoid substring matches |
356 | - uksort($this->configHandlers, function ($phA, $phB) { |
|
356 | + uksort($this->configHandlers, function($phA, $phB) { |
|
357 | 357 | return strlen($phB) <=> strlen($phA); |
358 | 358 | }); |
359 | 359 | } |
@@ -60,11 +60,11 @@ |
||
60 | 60 | // at least on PHP 5.6 usort turned out to be not stable. So we add |
61 | 61 | // the current index to the value and compare it on a draw |
62 | 62 | $i = 0; |
63 | - $workArray = array_map(function ($element) use (&$i) { |
|
63 | + $workArray = array_map(function($element) use (&$i) { |
|
64 | 64 | return [$i++, $element]; |
65 | 65 | }, $byType); |
66 | 66 | |
67 | - usort($workArray, function ($a, $b) use ($commenters, $type) { |
|
67 | + usort($workArray, function($a, $b) use ($commenters, $type) { |
|
68 | 68 | $r = $this->compare($a[1], $b[1], $commenters[$type]); |
69 | 69 | if ($r === 0) { |
70 | 70 | $r = $a[0] - $b[0]; |
@@ -7,7 +7,7 @@ |
||
7 | 7 | require_once '../../lib/base.php'; |
8 | 8 | |
9 | 9 | $urlGenerator = \OC::$server->getURLGenerator(); |
10 | - header('Location: ' . $urlGenerator->getAbsoluteURL('/')); |
|
10 | + header('Location: '.$urlGenerator->getAbsoluteURL('/')); |
|
11 | 11 | exit; |
12 | 12 | } |
13 | 13 | // @codeCoverageIgnoreEnd |
@@ -30,7 +30,7 @@ |
||
30 | 30 | <h2><?php p($l->t('Connect to your account')) ?></h2> |
31 | 31 | <p class="info"> |
32 | 32 | <?php print_unescaped($l->t('Please log in before granting %1$s access to your %2$s account.', [ |
33 | - '<strong>' . \OCP\Util::sanitizeHTML($_['client']) . '</strong>', |
|
33 | + '<strong>'.\OCP\Util::sanitizeHTML($_['client']).'</strong>', |
|
34 | 34 | \OCP\Util::sanitizeHTML($_['instanceName']) |
35 | 35 | ])) ?> |
36 | 36 | </p> |
@@ -6,7 +6,7 @@ |
||
6 | 6 | <p><?php p($error['error']) ?></p> |
7 | 7 | <?php if (isset($error['hint']) && $error['hint']): ?> |
8 | 8 | <p class='hint'><?php p($error['hint']) ?></p> |
9 | - <?php endif;?> |
|
9 | + <?php endif; ?> |
|
10 | 10 | </li> |
11 | 11 | <?php endforeach ?> |
12 | 12 | </ul> |
@@ -142,7 +142,7 @@ discard block |
||
142 | 142 | } |
143 | 143 | |
144 | 144 | $result = $this->rootView->file_put_contents( |
145 | - $newRoot . '/' . Storage::KEY_STORAGE_MARKER, |
|
145 | + $newRoot.'/'.Storage::KEY_STORAGE_MARKER, |
|
146 | 146 | 'Nextcloud will detect this folder as key storage root only if this file exists' |
147 | 147 | ); |
148 | 148 | |
@@ -160,10 +160,10 @@ discard block |
||
160 | 160 | */ |
161 | 161 | protected function moveSystemKeys($oldRoot, $newRoot) { |
162 | 162 | if ( |
163 | - $this->rootView->is_dir($oldRoot . '/files_encryption') && |
|
164 | - $this->targetExists($newRoot . '/files_encryption') === false |
|
163 | + $this->rootView->is_dir($oldRoot.'/files_encryption') && |
|
164 | + $this->targetExists($newRoot.'/files_encryption') === false |
|
165 | 165 | ) { |
166 | - $this->rootView->rename($oldRoot . '/files_encryption', $newRoot . '/files_encryption'); |
|
166 | + $this->rootView->rename($oldRoot.'/files_encryption', $newRoot.'/files_encryption'); |
|
167 | 167 | } |
168 | 168 | } |
169 | 169 | |
@@ -217,13 +217,13 @@ discard block |
||
217 | 217 | */ |
218 | 218 | protected function moveUserEncryptionFolder($user, $oldRoot, $newRoot) { |
219 | 219 | if ($this->userManager->userExists($user)) { |
220 | - $source = $oldRoot . '/' . $user . '/files_encryption'; |
|
221 | - $target = $newRoot . '/' . $user . '/files_encryption'; |
|
220 | + $source = $oldRoot.'/'.$user.'/files_encryption'; |
|
221 | + $target = $newRoot.'/'.$user.'/files_encryption'; |
|
222 | 222 | if ( |
223 | 223 | $this->rootView->is_dir($source) && |
224 | 224 | $this->targetExists($target) === false |
225 | 225 | ) { |
226 | - $this->prepareParentFolder($newRoot . '/' . $user); |
|
226 | + $this->prepareParentFolder($newRoot.'/'.$user); |
|
227 | 227 | $this->rootView->rename($source, $target); |
228 | 228 | } |
229 | 229 | } |
@@ -241,7 +241,7 @@ discard block |
||
241 | 241 | $sub_dirs = explode('/', ltrim($path, '/')); |
242 | 242 | $dir = ''; |
243 | 243 | foreach ($sub_dirs as $sub_dir) { |
244 | - $dir .= '/' . $sub_dir; |
|
244 | + $dir .= '/'.$sub_dir; |
|
245 | 245 | if ($this->rootView->file_exists($dir) === false) { |
246 | 246 | $this->rootView->mkdir($dir); |
247 | 247 | } |