Passed
Push — master ( 6ce3c5...504e18 )
by John
14:34 queued 13s
created
apps/workflowengine/composer/composer/autoload_psr4.php 1 patch
Spacing   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -6,5 +6,5 @@
 block discarded – undo
6 6
 $baseDir = $vendorDir;
7 7
 
8 8
 return array(
9
-    'OCA\\WorkflowEngine\\' => array($baseDir . '/../lib'),
9
+    'OCA\\WorkflowEngine\\' => array($baseDir.'/../lib'),
10 10
 );
Please login to merge, or discard this patch.
lib/public/Security/IContentSecurityPolicyManager.php 1 patch
Indentation   +19 added lines, -19 removed lines patch added patch discarded remove patch
@@ -31,23 +31,23 @@
 block discarded – undo
31 31
  * @deprecated 17.0.0 listen to the AddContentSecurityPolicyEvent to add a policy
32 32
  */
33 33
 interface IContentSecurityPolicyManager {
34
-	/**
35
-	 * Allows to inject something into the default content policy. This is for
36
-	 * example useful when you're injecting Javascript code into a view belonging
37
-	 * to another controller and cannot modify its Content-Security-Policy itself.
38
-	 * Note that the adjustment is only applied to applications that use AppFramework
39
-	 * controllers.
40
-	 *
41
-	 * To use this from your `app.php` use `\OC::$server->getContentSecurityPolicyManager()->addDefaultPolicy($policy)`,
42
-	 * $policy has to be of type `\OCP\AppFramework\Http\ContentSecurityPolicy`.
43
-	 *
44
-	 * WARNING: Using this API incorrectly may make the instance more insecure.
45
-	 * Do think twice before adding whitelisting resources. Please do also note
46
-	 * that it is not possible to use the `disallowXYZ` functions.
47
-	 *
48
-	 * @param EmptyContentSecurityPolicy $policy
49
-	 * @since 9.0.0
50
-	 * @deprecated 17.0.0 listen to the AddContentSecurityPolicyEvent to add a policy
51
-	 */
52
-	public function addDefaultPolicy(EmptyContentSecurityPolicy $policy);
34
+    /**
35
+     * Allows to inject something into the default content policy. This is for
36
+     * example useful when you're injecting Javascript code into a view belonging
37
+     * to another controller and cannot modify its Content-Security-Policy itself.
38
+     * Note that the adjustment is only applied to applications that use AppFramework
39
+     * controllers.
40
+     *
41
+     * To use this from your `app.php` use `\OC::$server->getContentSecurityPolicyManager()->addDefaultPolicy($policy)`,
42
+     * $policy has to be of type `\OCP\AppFramework\Http\ContentSecurityPolicy`.
43
+     *
44
+     * WARNING: Using this API incorrectly may make the instance more insecure.
45
+     * Do think twice before adding whitelisting resources. Please do also note
46
+     * that it is not possible to use the `disallowXYZ` functions.
47
+     *
48
+     * @param EmptyContentSecurityPolicy $policy
49
+     * @since 9.0.0
50
+     * @deprecated 17.0.0 listen to the AddContentSecurityPolicyEvent to add a policy
51
+     */
52
+    public function addDefaultPolicy(EmptyContentSecurityPolicy $policy);
53 53
 }
Please login to merge, or discard this patch.
lib/public/Preview/IVersionedPreviewFile.php 1 patch
Indentation   +5 added lines, -5 removed lines patch added patch discarded remove patch
@@ -31,9 +31,9 @@
 block discarded – undo
31 31
  * @since 17.0.0
32 32
  */
33 33
 interface IVersionedPreviewFile {
34
-	/**
35
-	 * @return string
36
-	 * @since 17.0.0
37
-	 */
38
-	public function getPreviewVersion(): string;
34
+    /**
35
+     * @return string
36
+     * @since 17.0.0
37
+     */
38
+    public function getPreviewVersion(): string;
39 39
 }
Please login to merge, or discard this patch.
lib/private/Authentication/Token/RemoteWipe.php 2 patches
Spacing   +3 added lines, -3 removed lines patch added patch discarded remove patch
@@ -85,7 +85,7 @@  discard block
 block discarded – undo
85 85
 		$tokens = $this->tokenProvider->getTokenByUser($user->getUID());
86 86
 
87 87
 		/** @var IWipeableToken[] $wipeable */
88
-		$wipeable = array_filter($tokens, function (IToken $token) {
88
+		$wipeable = array_filter($tokens, function(IToken $token) {
89 89
 			return $token instanceof IWipeableToken;
90 90
 		});
91 91
 
@@ -121,7 +121,7 @@  discard block
 block discarded – undo
121 121
 
122 122
 		$dbToken = $e->getToken();
123 123
 
124
-		$this->logger->info("user " . $dbToken->getUID() . " started a remote wipe");
124
+		$this->logger->info("user ".$dbToken->getUID()." started a remote wipe");
125 125
 
126 126
 		$this->eventDispatcher->dispatch(RemoteWipeStarted::class, new RemoteWipeStarted($dbToken));
127 127
 
@@ -149,7 +149,7 @@  discard block
 block discarded – undo
149 149
 
150 150
 		$this->tokenProvider->invalidateToken($token);
151 151
 
152
-		$this->logger->info("user " . $dbToken->getUID() . " finished a remote wipe");
152
+		$this->logger->info("user ".$dbToken->getUID()." finished a remote wipe");
153 153
 		$this->eventDispatcher->dispatch(RemoteWipeFinished::class, new RemoteWipeFinished($dbToken));
154 154
 
155 155
 		return true;
Please login to merge, or discard this patch.
Indentation   +113 added lines, -113 removed lines patch added patch discarded remove patch
@@ -37,117 +37,117 @@
 block discarded – undo
37 37
 use OCP\IUser;
38 38
 
39 39
 class RemoteWipe {
40
-	/** @var IProvider */
41
-	private $tokenProvider;
42
-
43
-	/** @var IEventDispatcher */
44
-	private $eventDispatcher;
45
-
46
-	/** @var LoggerInterface */
47
-	private $logger;
48
-
49
-	public function __construct(IProvider $tokenProvider,
50
-								IEventDispatcher $eventDispatcher,
51
-								LoggerInterface $logger) {
52
-		$this->tokenProvider = $tokenProvider;
53
-		$this->eventDispatcher = $eventDispatcher;
54
-		$this->logger = $logger;
55
-	}
56
-
57
-	/**
58
-	 * @param IToken $token
59
-	 * @return bool
60
-	 *
61
-	 * @throws InvalidTokenException
62
-	 * @throws WipeTokenException
63
-	 */
64
-	public function markTokenForWipe(IToken $token): bool {
65
-		if (!$token instanceof IWipeableToken) {
66
-			return false;
67
-		}
68
-
69
-		$token->wipe();
70
-		$this->tokenProvider->updateToken($token);
71
-
72
-		return true;
73
-	}
74
-
75
-	/**
76
-	 * @param IUser $user
77
-	 *
78
-	 * @return bool true if any tokens have been marked for remote wipe
79
-	 */
80
-	public function markAllTokensForWipe(IUser $user): bool {
81
-		$tokens = $this->tokenProvider->getTokenByUser($user->getUID());
82
-
83
-		/** @var IWipeableToken[] $wipeable */
84
-		$wipeable = array_filter($tokens, function (IToken $token) {
85
-			return $token instanceof IWipeableToken;
86
-		});
87
-
88
-		if (empty($wipeable)) {
89
-			return false;
90
-		}
91
-
92
-		foreach ($wipeable as $token) {
93
-			$token->wipe();
94
-			$this->tokenProvider->updateToken($token);
95
-		}
96
-
97
-		return true;
98
-	}
99
-
100
-	/**
101
-	 * @param string $token
102
-	 *
103
-	 * @return bool whether wiping was started
104
-	 * @throws InvalidTokenException
105
-	 *
106
-	 */
107
-	public function start(string $token): bool {
108
-		try {
109
-			$this->tokenProvider->getToken($token);
110
-
111
-			// We expect a WipedTokenException here. If we reach this point this
112
-			// is an ordinary token
113
-			return false;
114
-		} catch (WipeTokenException $e) {
115
-			// Expected -> continue below
116
-		}
117
-
118
-		$dbToken = $e->getToken();
119
-
120
-		$this->logger->info("user " . $dbToken->getUID() . " started a remote wipe");
121
-
122
-		$this->eventDispatcher->dispatch(RemoteWipeStarted::class, new RemoteWipeStarted($dbToken));
123
-
124
-		return true;
125
-	}
126
-
127
-	/**
128
-	 * @param string $token
129
-	 *
130
-	 * @return bool whether wiping could be finished
131
-	 * @throws InvalidTokenException
132
-	 */
133
-	public function finish(string $token): bool {
134
-		try {
135
-			$this->tokenProvider->getToken($token);
136
-
137
-			// We expect a WipedTokenException here. If we reach this point this
138
-			// is an ordinary token
139
-			return false;
140
-		} catch (WipeTokenException $e) {
141
-			// Expected -> continue below
142
-		}
143
-
144
-		$dbToken = $e->getToken();
145
-
146
-		$this->tokenProvider->invalidateToken($token);
147
-
148
-		$this->logger->info("user " . $dbToken->getUID() . " finished a remote wipe");
149
-		$this->eventDispatcher->dispatch(RemoteWipeFinished::class, new RemoteWipeFinished($dbToken));
150
-
151
-		return true;
152
-	}
40
+    /** @var IProvider */
41
+    private $tokenProvider;
42
+
43
+    /** @var IEventDispatcher */
44
+    private $eventDispatcher;
45
+
46
+    /** @var LoggerInterface */
47
+    private $logger;
48
+
49
+    public function __construct(IProvider $tokenProvider,
50
+                                IEventDispatcher $eventDispatcher,
51
+                                LoggerInterface $logger) {
52
+        $this->tokenProvider = $tokenProvider;
53
+        $this->eventDispatcher = $eventDispatcher;
54
+        $this->logger = $logger;
55
+    }
56
+
57
+    /**
58
+     * @param IToken $token
59
+     * @return bool
60
+     *
61
+     * @throws InvalidTokenException
62
+     * @throws WipeTokenException
63
+     */
64
+    public function markTokenForWipe(IToken $token): bool {
65
+        if (!$token instanceof IWipeableToken) {
66
+            return false;
67
+        }
68
+
69
+        $token->wipe();
70
+        $this->tokenProvider->updateToken($token);
71
+
72
+        return true;
73
+    }
74
+
75
+    /**
76
+     * @param IUser $user
77
+     *
78
+     * @return bool true if any tokens have been marked for remote wipe
79
+     */
80
+    public function markAllTokensForWipe(IUser $user): bool {
81
+        $tokens = $this->tokenProvider->getTokenByUser($user->getUID());
82
+
83
+        /** @var IWipeableToken[] $wipeable */
84
+        $wipeable = array_filter($tokens, function (IToken $token) {
85
+            return $token instanceof IWipeableToken;
86
+        });
87
+
88
+        if (empty($wipeable)) {
89
+            return false;
90
+        }
91
+
92
+        foreach ($wipeable as $token) {
93
+            $token->wipe();
94
+            $this->tokenProvider->updateToken($token);
95
+        }
96
+
97
+        return true;
98
+    }
99
+
100
+    /**
101
+     * @param string $token
102
+     *
103
+     * @return bool whether wiping was started
104
+     * @throws InvalidTokenException
105
+     *
106
+     */
107
+    public function start(string $token): bool {
108
+        try {
109
+            $this->tokenProvider->getToken($token);
110
+
111
+            // We expect a WipedTokenException here. If we reach this point this
112
+            // is an ordinary token
113
+            return false;
114
+        } catch (WipeTokenException $e) {
115
+            // Expected -> continue below
116
+        }
117
+
118
+        $dbToken = $e->getToken();
119
+
120
+        $this->logger->info("user " . $dbToken->getUID() . " started a remote wipe");
121
+
122
+        $this->eventDispatcher->dispatch(RemoteWipeStarted::class, new RemoteWipeStarted($dbToken));
123
+
124
+        return true;
125
+    }
126
+
127
+    /**
128
+     * @param string $token
129
+     *
130
+     * @return bool whether wiping could be finished
131
+     * @throws InvalidTokenException
132
+     */
133
+    public function finish(string $token): bool {
134
+        try {
135
+            $this->tokenProvider->getToken($token);
136
+
137
+            // We expect a WipedTokenException here. If we reach this point this
138
+            // is an ordinary token
139
+            return false;
140
+        } catch (WipeTokenException $e) {
141
+            // Expected -> continue below
142
+        }
143
+
144
+        $dbToken = $e->getToken();
145
+
146
+        $this->tokenProvider->invalidateToken($token);
147
+
148
+        $this->logger->info("user " . $dbToken->getUID() . " finished a remote wipe");
149
+        $this->eventDispatcher->dispatch(RemoteWipeFinished::class, new RemoteWipeFinished($dbToken));
150
+
151
+        return true;
152
+    }
153 153
 }
Please login to merge, or discard this patch.
lib/public/Notification/IApp.php 1 patch
Indentation   +17 added lines, -17 removed lines patch added patch discarded remove patch
@@ -30,23 +30,23 @@
 block discarded – undo
30 30
  * @since 9.0.0
31 31
  */
32 32
 interface IApp {
33
-	/**
34
-	 * @param INotification $notification
35
-	 * @throws \InvalidArgumentException When the notification is not valid
36
-	 * @since 9.0.0
37
-	 */
38
-	public function notify(INotification $notification): void;
33
+    /**
34
+     * @param INotification $notification
35
+     * @throws \InvalidArgumentException When the notification is not valid
36
+     * @since 9.0.0
37
+     */
38
+    public function notify(INotification $notification): void;
39 39
 
40
-	/**
41
-	 * @param INotification $notification
42
-	 * @since 9.0.0
43
-	 */
44
-	public function markProcessed(INotification $notification): void;
40
+    /**
41
+     * @param INotification $notification
42
+     * @since 9.0.0
43
+     */
44
+    public function markProcessed(INotification $notification): void;
45 45
 
46
-	/**
47
-	 * @param INotification $notification
48
-	 * @return int
49
-	 * @since 9.0.0
50
-	 */
51
-	public function getCount(INotification $notification): int;
46
+    /**
47
+     * @param INotification $notification
48
+     * @return int
49
+     * @since 9.0.0
50
+     */
51
+    public function getCount(INotification $notification): int;
52 52
 }
Please login to merge, or discard this patch.
apps/lookup_server_connector/lib/UpdateLookupServer.php 1 patch
Indentation   +42 added lines, -42 removed lines patch added patch discarded remove patch
@@ -34,51 +34,51 @@
 block discarded – undo
34 34
  * @package OCA\LookupServerConnector
35 35
  */
36 36
 class UpdateLookupServer {
37
-	/** @var IConfig */
38
-	private $config;
39
-	/** @var IJobList */
40
-	private $jobList;
37
+    /** @var IConfig */
38
+    private $config;
39
+    /** @var IJobList */
40
+    private $jobList;
41 41
 
42
-	/**
43
-	 * @param IJobList $jobList
44
-	 * @param IConfig $config
45
-	 */
46
-	public function __construct(IJobList $jobList,
47
-								IConfig $config) {
48
-		$this->config = $config;
49
-		$this->jobList = $jobList;
50
-	}
42
+    /**
43
+     * @param IJobList $jobList
44
+     * @param IConfig $config
45
+     */
46
+    public function __construct(IJobList $jobList,
47
+                                IConfig $config) {
48
+        $this->config = $config;
49
+        $this->jobList = $jobList;
50
+    }
51 51
 
52
-	/**
53
-	 * @param IUser $user
54
-	 */
55
-	public function userUpdated(IUser $user): void {
56
-		if (!$this->shouldUpdateLookupServer()) {
57
-			return;
58
-		}
52
+    /**
53
+     * @param IUser $user
54
+     */
55
+    public function userUpdated(IUser $user): void {
56
+        if (!$this->shouldUpdateLookupServer()) {
57
+            return;
58
+        }
59 59
 
60
-		// Reset retry counter
61
-		$this->config->deleteUserValue(
62
-			$user->getUID(),
63
-			'lookup_server_connector',
64
-			'update_retries'
65
-		);
66
-		$this->jobList->add(RetryJob::class, ['userId' => $user->getUID()]);
67
-	}
60
+        // Reset retry counter
61
+        $this->config->deleteUserValue(
62
+            $user->getUID(),
63
+            'lookup_server_connector',
64
+            'update_retries'
65
+        );
66
+        $this->jobList->add(RetryJob::class, ['userId' => $user->getUID()]);
67
+    }
68 68
 
69
-	/**
70
-	 * check if we should update the lookup server, we only do it if
71
-	 *
72
-	 * + we have an internet connection
73
-	 * + the lookup server update was not disabled by the admin
74
-	 * + we have a valid lookup server URL
75
-	 *
76
-	 * @return bool
77
-	 */
78
-	private function shouldUpdateLookupServer(): bool {
79
-		return $this->config->getSystemValueBool('has_internet_connection', true) === true &&
80
-			$this->config->getAppValue('files_sharing', 'lookupServerUploadEnabled', 'yes') === 'yes' &&
81
-			$this->config->getSystemValueString('lookup_server', 'https://lookup.nextcloud.com') !== '';
82
-	}
69
+    /**
70
+     * check if we should update the lookup server, we only do it if
71
+     *
72
+     * + we have an internet connection
73
+     * + the lookup server update was not disabled by the admin
74
+     * + we have a valid lookup server URL
75
+     *
76
+     * @return bool
77
+     */
78
+    private function shouldUpdateLookupServer(): bool {
79
+        return $this->config->getSystemValueBool('has_internet_connection', true) === true &&
80
+            $this->config->getAppValue('files_sharing', 'lookupServerUploadEnabled', 'yes') === 'yes' &&
81
+            $this->config->getSystemValueString('lookup_server', 'https://lookup.nextcloud.com') !== '';
82
+    }
83 83
 
84 84
 }
Please login to merge, or discard this patch.
apps/dav/lib/Exception/UnsupportedLimitOnInitialSyncException.php 1 patch
Indentation   +6 added lines, -6 removed lines patch added patch discarded remove patch
@@ -32,10 +32,10 @@
 block discarded – undo
32 32
  */
33 33
 class UnsupportedLimitOnInitialSyncException extends InsufficientStorage {
34 34
 
35
-	/**
36
-	 * @inheritDoc
37
-	 */
38
-	public function serialize(Server $server, \DOMElement $errorNode) {
39
-		$errorNode->appendChild($errorNode->ownerDocument->createElementNS('DAV:', 'd:number-of-matches-within-limits'));
40
-	}
35
+    /**
36
+     * @inheritDoc
37
+     */
38
+    public function serialize(Server $server, \DOMElement $errorNode) {
39
+        $errorNode->appendChild($errorNode->ownerDocument->createElementNS('DAV:', 'd:number-of-matches-within-limits'));
40
+    }
41 41
 }
Please login to merge, or discard this patch.
lib/public/AppFramework/Http/StrictContentSecurityPolicy.php 1 patch
Indentation   +40 added lines, -40 removed lines patch added patch discarded remove patch
@@ -42,45 +42,45 @@
 block discarded – undo
42 42
  * @deprecated 17.0.0
43 43
  */
44 44
 class StrictContentSecurityPolicy extends EmptyContentSecurityPolicy {
45
-	/** @var bool Whether inline JS snippets are allowed */
46
-	protected $inlineScriptAllowed = false;
47
-	/** @var bool Whether eval in JS scripts is allowed */
48
-	protected $evalScriptAllowed = false;
49
-	/** @var array Domains from which scripts can get loaded */
50
-	protected $allowedScriptDomains = [
51
-		'\'self\'',
52
-	];
53
-	/** @var bool Whether inline CSS is allowed */
54
-	protected $inlineStyleAllowed = false;
55
-	/** @var array Domains from which CSS can get loaded */
56
-	protected $allowedStyleDomains = [
57
-		'\'self\'',
58
-	];
59
-	/** @var array Domains from which images can get loaded */
60
-	protected $allowedImageDomains = [
61
-		'\'self\'',
62
-		'data:',
63
-		'blob:',
64
-	];
65
-	/** @var array Domains to which connections can be done */
66
-	protected $allowedConnectDomains = [
67
-		'\'self\'',
68
-	];
69
-	/** @var array Domains from which media elements can be loaded */
70
-	protected $allowedMediaDomains = [
71
-		'\'self\'',
72
-	];
73
-	/** @var array Domains from which object elements can be loaded */
74
-	protected $allowedObjectDomains = [];
75
-	/** @var array Domains from which iframes can be loaded */
76
-	protected $allowedFrameDomains = [];
77
-	/** @var array Domains from which fonts can be loaded */
78
-	protected $allowedFontDomains = [
79
-		'\'self\'',
80
-	];
81
-	/** @var array Domains from which web-workers and nested browsing content can load elements */
82
-	protected $allowedChildSrcDomains = [];
45
+    /** @var bool Whether inline JS snippets are allowed */
46
+    protected $inlineScriptAllowed = false;
47
+    /** @var bool Whether eval in JS scripts is allowed */
48
+    protected $evalScriptAllowed = false;
49
+    /** @var array Domains from which scripts can get loaded */
50
+    protected $allowedScriptDomains = [
51
+        '\'self\'',
52
+    ];
53
+    /** @var bool Whether inline CSS is allowed */
54
+    protected $inlineStyleAllowed = false;
55
+    /** @var array Domains from which CSS can get loaded */
56
+    protected $allowedStyleDomains = [
57
+        '\'self\'',
58
+    ];
59
+    /** @var array Domains from which images can get loaded */
60
+    protected $allowedImageDomains = [
61
+        '\'self\'',
62
+        'data:',
63
+        'blob:',
64
+    ];
65
+    /** @var array Domains to which connections can be done */
66
+    protected $allowedConnectDomains = [
67
+        '\'self\'',
68
+    ];
69
+    /** @var array Domains from which media elements can be loaded */
70
+    protected $allowedMediaDomains = [
71
+        '\'self\'',
72
+    ];
73
+    /** @var array Domains from which object elements can be loaded */
74
+    protected $allowedObjectDomains = [];
75
+    /** @var array Domains from which iframes can be loaded */
76
+    protected $allowedFrameDomains = [];
77
+    /** @var array Domains from which fonts can be loaded */
78
+    protected $allowedFontDomains = [
79
+        '\'self\'',
80
+    ];
81
+    /** @var array Domains from which web-workers and nested browsing content can load elements */
82
+    protected $allowedChildSrcDomains = [];
83 83
 
84
-	/** @var array Domains which can embed this Nextcloud instance */
85
-	protected $allowedFrameAncestors = [];
84
+    /** @var array Domains which can embed this Nextcloud instance */
85
+    protected $allowedFrameAncestors = [];
86 86
 }
Please login to merge, or discard this patch.
lib/public/Calendar/IMetadataProvider.php 2 patches
Spacing   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -61,5 +61,5 @@
 block discarded – undo
61 61
 	 * @return string|null - The value stored for the key, null if no value stored
62 62
 	 * @since 17.0.0
63 63
 	 */
64
-	public function getMetadataForKey(string $key):?string;
64
+	public function getMetadataForKey(string $key): ?string;
65 65
 }
Please login to merge, or discard this patch.
Indentation   +27 added lines, -27 removed lines patch added patch discarded remove patch
@@ -30,33 +30,33 @@
 block discarded – undo
30 30
  * @since 17.0.0
31 31
  */
32 32
 interface IMetadataProvider {
33
-	/**
34
-	 * Get a list of all metadata keys available for this room
35
-	 *
36
-	 * Room backends are allowed to return custom keys, beyond the ones
37
-	 * defined in this class. If they do, they should make sure to use their
38
-	 * own namespace.
39
-	 *
40
-	 * @return String[] - A list of available keys
41
-	 * @since 17.0.0
42
-	 */
43
-	public function getAllAvailableMetadataKeys():array;
33
+    /**
34
+     * Get a list of all metadata keys available for this room
35
+     *
36
+     * Room backends are allowed to return custom keys, beyond the ones
37
+     * defined in this class. If they do, they should make sure to use their
38
+     * own namespace.
39
+     *
40
+     * @return String[] - A list of available keys
41
+     * @since 17.0.0
42
+     */
43
+    public function getAllAvailableMetadataKeys():array;
44 44
 
45
-	/**
46
-	 * Get whether or not a metadata key is set for this room
47
-	 *
48
-	 * @param string $key - The key to check for
49
-	 * @return bool - Whether or not key is available
50
-	 * @since 17.0.0
51
-	 */
52
-	public function hasMetadataForKey(string $key):bool;
45
+    /**
46
+     * Get whether or not a metadata key is set for this room
47
+     *
48
+     * @param string $key - The key to check for
49
+     * @return bool - Whether or not key is available
50
+     * @since 17.0.0
51
+     */
52
+    public function hasMetadataForKey(string $key):bool;
53 53
 
54
-	/**
55
-	 * Get the value for a metadata key
56
-	 *
57
-	 * @param string $key - The key to check for
58
-	 * @return string|null - The value stored for the key, null if no value stored
59
-	 * @since 17.0.0
60
-	 */
61
-	public function getMetadataForKey(string $key):?string;
54
+    /**
55
+     * Get the value for a metadata key
56
+     *
57
+     * @param string $key - The key to check for
58
+     * @return string|null - The value stored for the key, null if no value stored
59
+     * @since 17.0.0
60
+     */
61
+    public function getMetadataForKey(string $key):?string;
62 62
 }
Please login to merge, or discard this patch.