@@ -61,7 +61,7 @@ discard block |
||
61 | 61 | * Lets try the multibucket fallback if available |
62 | 62 | */ |
63 | 63 | if ($this->isMultibucketPreviewDistributionEnabled) { |
64 | - return parent::getFolder('old-multibucket/' . $internalFolder); |
|
64 | + return parent::getFolder('old-multibucket/'.$internalFolder); |
|
65 | 65 | } |
66 | 66 | |
67 | 67 | // when there is no further fallback just throw the exception |
@@ -83,7 +83,7 @@ discard block |
||
83 | 83 | } |
84 | 84 | |
85 | 85 | public static function getInternalFolder(string $name): string { |
86 | - return implode('/', str_split(substr(md5($name), 0, 7))) . '/' . $name; |
|
86 | + return implode('/', str_split(substr(md5($name), 0, 7))).'/'.$name; |
|
87 | 87 | } |
88 | 88 | |
89 | 89 | public function getStorageId(): int { |
@@ -76,7 +76,7 @@ |
||
76 | 76 | $data = [ |
77 | 77 | 'user_id' => $user->getUID(), |
78 | 78 | 'display_name' => $user->getDisplayName(), |
79 | - 'email' => (string)$user->getSystemEMailAddress(), |
|
79 | + 'email' => (string) $user->getSystemEMailAddress(), |
|
80 | 80 | 'cloud_id' => $user->getCloudId(), |
81 | 81 | 'enabled' => $user->isEnabled(), |
82 | 82 | 'groups' => $groups, |
@@ -60,7 +60,7 @@ |
||
60 | 60 | 'notnull' => true, |
61 | 61 | ]); |
62 | 62 | $table->setPrimaryKey(['id']); |
63 | - $table->addUniqueIndex(['user_id'], self::TABLE_NAME . '_user_id_idx'); |
|
63 | + $table->addUniqueIndex(['user_id'], self::TABLE_NAME.'_user_id_idx'); |
|
64 | 64 | return $schema; |
65 | 65 | } |
66 | 66 |
@@ -46,7 +46,7 @@ |
||
46 | 46 | |
47 | 47 | $table = $schema->getTable(self::TABLE_NAME); |
48 | 48 | if ($table->hasIndex('user_id')) { |
49 | - $table->renameIndex('user_id', self::TABLE_NAME . '_user_id_idx'); |
|
49 | + $table->renameIndex('user_id', self::TABLE_NAME.'_user_id_idx'); |
|
50 | 50 | return $schema; |
51 | 51 | } |
52 | 52 | return null; |
@@ -85,7 +85,7 @@ |
||
85 | 85 | |
86 | 86 | public function getAuthorizedAppConfig(): array { |
87 | 87 | return [ |
88 | - 'dav' => ['/(' . implode('|', array_keys(self::defaults)) . ')/'] |
|
88 | + 'dav' => ['/('.implode('|', array_keys(self::defaults)).')/'] |
|
89 | 89 | ]; |
90 | 90 | } |
91 | 91 | } |
@@ -31,12 +31,12 @@ |
||
31 | 31 | if (is_object($link)) { |
32 | 32 | return spl_object_id($link); |
33 | 33 | } elseif (is_resource($link)) { |
34 | - return (int)$link; |
|
34 | + return (int) $link; |
|
35 | 35 | } elseif (is_array($link) && isset($link[0])) { |
36 | 36 | if (is_object($link[0])) { |
37 | 37 | return spl_object_id($link[0]); |
38 | 38 | } elseif (is_resource($link[0])) { |
39 | - return (int)$link[0]; |
|
39 | + return (int) $link[0]; |
|
40 | 40 | } |
41 | 41 | } |
42 | 42 | throw new \RuntimeException('No resource provided'); |
@@ -149,7 +149,7 @@ discard block |
||
149 | 149 | } catch (\DomainException $e) { |
150 | 150 | throw new OCSForbiddenException($e->getMessage(), $e); |
151 | 151 | } catch (Exception $e) { |
152 | - $this->logger->error('Error when updating flow with id ' . $id, ['exception' => $e]); |
|
152 | + $this->logger->error('Error when updating flow with id '.$id, ['exception' => $e]); |
|
153 | 153 | throw new OCSException('An internal error occurred', $e->getCode(), $e); |
154 | 154 | } |
155 | 155 | } |
@@ -168,7 +168,7 @@ discard block |
||
168 | 168 | } catch (\DomainException $e) { |
169 | 169 | throw new OCSForbiddenException($e->getMessage(), $e); |
170 | 170 | } catch (Exception $e) { |
171 | - $this->logger->error('Error when deleting flow with id ' . $id, ['exception' => $e]); |
|
171 | + $this->logger->error('Error when deleting flow with id '.$id, ['exception' => $e]); |
|
172 | 172 | throw new OCSException('An internal error occurred', $e->getCode(), $e); |
173 | 173 | } |
174 | 174 | } |
@@ -70,7 +70,7 @@ discard block |
||
70 | 70 | } |
71 | 71 | |
72 | 72 | if (isset($parsedUrl['port']) && $parsedUrl['port']) { |
73 | - return $this->isTrustedDomain($parsedUrl['host'] . ':' . $parsedUrl['port']); |
|
73 | + return $this->isTrustedDomain($parsedUrl['host'].':'.$parsedUrl['port']); |
|
74 | 74 | } |
75 | 75 | |
76 | 76 | return $this->isTrustedDomain($parsedUrl['host']); |
@@ -106,9 +106,9 @@ discard block |
||
106 | 106 | if (gettype($trusted) !== 'string') { |
107 | 107 | break; |
108 | 108 | } |
109 | - $regex = '/^' . implode('[-\.a-zA-Z0-9]*', array_map(function ($v) { |
|
109 | + $regex = '/^'.implode('[-\.a-zA-Z0-9]*', array_map(function($v) { |
|
110 | 110 | return preg_quote($v, '/'); |
111 | - }, explode('*', $trusted))) . '$/i'; |
|
111 | + }, explode('*', $trusted))).'$/i'; |
|
112 | 112 | if (preg_match($regex, $domain) || preg_match($regex, $domainWithPort)) { |
113 | 113 | return true; |
114 | 114 | } |
@@ -94,7 +94,7 @@ discard block |
||
94 | 94 | */ |
95 | 95 | protected function getPath(string $user, string $path): string { |
96 | 96 | $node = $this->rootFolder->getUserFolder($user)->get($path); |
97 | - return 'files/' . md5($node->getStorage()->getId() . '::' . trim($node->getInternalPath(), '/')); |
|
97 | + return 'files/'.md5($node->getStorage()->getId().'::'.trim($node->getInternalPath(), '/')); |
|
98 | 98 | } |
99 | 99 | |
100 | 100 | /** |
@@ -125,7 +125,7 @@ discard block |
||
125 | 125 | |
126 | 126 | try { |
127 | 127 | $lockingProvider->acquireLock($path, $type); |
128 | - $this->config->setAppValue('testing', 'locking_' . $path, (string)$type); |
|
128 | + $this->config->setAppValue('testing', 'locking_'.$path, (string) $type); |
|
129 | 129 | return new DataResponse(); |
130 | 130 | } catch (LockedException $e) { |
131 | 131 | throw new OCSException('', Http::STATUS_LOCKED, $e); |
@@ -148,7 +148,7 @@ discard block |
||
148 | 148 | |
149 | 149 | try { |
150 | 150 | $lockingProvider->changeLock($path, $type); |
151 | - $this->config->setAppValue('testing', 'locking_' . $path, (string)$type); |
|
151 | + $this->config->setAppValue('testing', 'locking_'.$path, (string) $type); |
|
152 | 152 | return new DataResponse(); |
153 | 153 | } catch (LockedException $e) { |
154 | 154 | throw new OCSException('', Http::STATUS_LOCKED, $e); |
@@ -171,7 +171,7 @@ discard block |
||
171 | 171 | |
172 | 172 | try { |
173 | 173 | $lockingProvider->releaseLock($path, $type); |
174 | - $this->config->deleteAppValue('testing', 'locking_' . $path); |
|
174 | + $this->config->deleteAppValue('testing', 'locking_'.$path); |
|
175 | 175 | return new DataResponse(); |
176 | 176 | } catch (LockedException $e) { |
177 | 177 | throw new OCSException('', Http::STATUS_LOCKED, $e); |
@@ -206,12 +206,12 @@ discard block |
||
206 | 206 | if (strpos($lock, 'locking_') === 0) { |
207 | 207 | $path = substr($lock, strlen('locking_')); |
208 | 208 | |
209 | - if ($type === ILockingProvider::LOCK_EXCLUSIVE && (int)$this->config->getAppValue('testing', $lock) === ILockingProvider::LOCK_EXCLUSIVE) { |
|
210 | - $lockingProvider->releaseLock($path, (int)$this->config->getAppValue('testing', $lock)); |
|
211 | - } elseif ($type === ILockingProvider::LOCK_SHARED && (int)$this->config->getAppValue('testing', $lock) === ILockingProvider::LOCK_SHARED) { |
|
212 | - $lockingProvider->releaseLock($path, (int)$this->config->getAppValue('testing', $lock)); |
|
209 | + if ($type === ILockingProvider::LOCK_EXCLUSIVE && (int) $this->config->getAppValue('testing', $lock) === ILockingProvider::LOCK_EXCLUSIVE) { |
|
210 | + $lockingProvider->releaseLock($path, (int) $this->config->getAppValue('testing', $lock)); |
|
211 | + } elseif ($type === ILockingProvider::LOCK_SHARED && (int) $this->config->getAppValue('testing', $lock) === ILockingProvider::LOCK_SHARED) { |
|
212 | + $lockingProvider->releaseLock($path, (int) $this->config->getAppValue('testing', $lock)); |
|
213 | 213 | } else { |
214 | - $lockingProvider->releaseLock($path, (int)$this->config->getAppValue('testing', $lock)); |
|
214 | + $lockingProvider->releaseLock($path, (int) $this->config->getAppValue('testing', $lock)); |
|
215 | 215 | } |
216 | 216 | } |
217 | 217 | } |