Passed
Push — master ( f97491...570c25 )
by Roeland
14:12 queued 10s
created
apps/files_trashbin/lib/Command/ExpireTrash.php 2 patches
Spacing   +2 added lines, -2 removed lines patch added patch discarded remove patch
@@ -90,7 +90,7 @@  discard block
 block discarded – undo
90 90
 		} else {
91 91
 			$p = new ProgressBar($output);
92 92
 			$p->start();
93
-			$this->userManager->callForSeenUsers(function (IUser $user) use ($p) {
93
+			$this->userManager->callForSeenUsers(function(IUser $user) use ($p) {
94 94
 				$p->advance();
95 95
 				$this->expireTrashForUser($user);
96 96
 			});
@@ -118,7 +118,7 @@  discard block
 block discarded – undo
118 118
 		\OC_Util::setupFS($user);
119 119
 
120 120
 		// Check if this user has a trashbin directory
121
-		$view = new \OC\Files\View('/' . $user);
121
+		$view = new \OC\Files\View('/'.$user);
122 122
 		if (!$view->is_dir('/files_trashbin/files')) {
123 123
 			return false;
124 124
 		}
Please login to merge, or discard this patch.
Indentation   +81 added lines, -81 removed lines patch added patch discarded remove patch
@@ -38,95 +38,95 @@
 block discarded – undo
38 38
 
39 39
 class ExpireTrash extends Command {
40 40
 
41
-	/**
42
-	 * @var Expiration
43
-	 */
44
-	private $expiration;
41
+    /**
42
+     * @var Expiration
43
+     */
44
+    private $expiration;
45 45
 
46
-	/**
47
-	 * @var IUserManager
48
-	 */
49
-	private $userManager;
46
+    /**
47
+     * @var IUserManager
48
+     */
49
+    private $userManager;
50 50
 
51
-	/**
52
-	 * @param IUserManager|null $userManager
53
-	 * @param Expiration|null $expiration
54
-	 */
55
-	public function __construct(IUserManager $userManager = null,
56
-								Expiration $expiration = null) {
57
-		parent::__construct();
51
+    /**
52
+     * @param IUserManager|null $userManager
53
+     * @param Expiration|null $expiration
54
+     */
55
+    public function __construct(IUserManager $userManager = null,
56
+                                Expiration $expiration = null) {
57
+        parent::__construct();
58 58
 
59
-		$this->userManager = $userManager;
60
-		$this->expiration = $expiration;
61
-	}
59
+        $this->userManager = $userManager;
60
+        $this->expiration = $expiration;
61
+    }
62 62
 
63
-	protected function configure() {
64
-		$this
65
-			->setName('trashbin:expire')
66
-			->setDescription('Expires the users trashbin')
67
-			->addArgument(
68
-				'user_id',
69
-				InputArgument::OPTIONAL | InputArgument::IS_ARRAY,
70
-				'expires the trashbin of the given user(s), if no user is given the trash for all users will be expired'
71
-			);
72
-	}
63
+    protected function configure() {
64
+        $this
65
+            ->setName('trashbin:expire')
66
+            ->setDescription('Expires the users trashbin')
67
+            ->addArgument(
68
+                'user_id',
69
+                InputArgument::OPTIONAL | InputArgument::IS_ARRAY,
70
+                'expires the trashbin of the given user(s), if no user is given the trash for all users will be expired'
71
+            );
72
+    }
73 73
 
74
-	protected function execute(InputInterface $input, OutputInterface $output): int {
75
-		$maxAge = $this->expiration->getMaxAgeAsTimestamp();
76
-		if (!$maxAge) {
77
-			$output->writeln("No expiry configured.");
78
-			return 1;
79
-		}
74
+    protected function execute(InputInterface $input, OutputInterface $output): int {
75
+        $maxAge = $this->expiration->getMaxAgeAsTimestamp();
76
+        if (!$maxAge) {
77
+            $output->writeln("No expiry configured.");
78
+            return 1;
79
+        }
80 80
 
81
-		$users = $input->getArgument('user_id');
82
-		if (!empty($users)) {
83
-			foreach ($users as $user) {
84
-				if ($this->userManager->userExists($user)) {
85
-					$output->writeln("Remove deleted files of   <info>$user</info>");
86
-					$userObject = $this->userManager->get($user);
87
-					$this->expireTrashForUser($userObject);
88
-				} else {
89
-					$output->writeln("<error>Unknown user $user</error>");
90
-					return 1;
91
-				}
92
-			}
93
-		} else {
94
-			$p = new ProgressBar($output);
95
-			$p->start();
96
-			$this->userManager->callForSeenUsers(function (IUser $user) use ($p) {
97
-				$p->advance();
98
-				$this->expireTrashForUser($user);
99
-			});
100
-			$p->finish();
101
-			$output->writeln('');
102
-		}
103
-		return 0;
104
-	}
81
+        $users = $input->getArgument('user_id');
82
+        if (!empty($users)) {
83
+            foreach ($users as $user) {
84
+                if ($this->userManager->userExists($user)) {
85
+                    $output->writeln("Remove deleted files of   <info>$user</info>");
86
+                    $userObject = $this->userManager->get($user);
87
+                    $this->expireTrashForUser($userObject);
88
+                } else {
89
+                    $output->writeln("<error>Unknown user $user</error>");
90
+                    return 1;
91
+                }
92
+            }
93
+        } else {
94
+            $p = new ProgressBar($output);
95
+            $p->start();
96
+            $this->userManager->callForSeenUsers(function (IUser $user) use ($p) {
97
+                $p->advance();
98
+                $this->expireTrashForUser($user);
99
+            });
100
+            $p->finish();
101
+            $output->writeln('');
102
+        }
103
+        return 0;
104
+    }
105 105
 
106
-	public function expireTrashForUser(IUser $user) {
107
-		$uid = $user->getUID();
108
-		if (!$this->setupFS($uid)) {
109
-			return;
110
-		}
111
-		$dirContent = Helper::getTrashFiles('/', $uid, 'mtime');
112
-		Trashbin::deleteExpiredFiles($dirContent, $uid);
113
-	}
106
+    public function expireTrashForUser(IUser $user) {
107
+        $uid = $user->getUID();
108
+        if (!$this->setupFS($uid)) {
109
+            return;
110
+        }
111
+        $dirContent = Helper::getTrashFiles('/', $uid, 'mtime');
112
+        Trashbin::deleteExpiredFiles($dirContent, $uid);
113
+    }
114 114
 
115
-	/**
116
-	 * Act on behalf on trash item owner
117
-	 * @param string $user
118
-	 * @return boolean
119
-	 */
120
-	protected function setupFS($user) {
121
-		\OC_Util::tearDownFS();
122
-		\OC_Util::setupFS($user);
115
+    /**
116
+     * Act on behalf on trash item owner
117
+     * @param string $user
118
+     * @return boolean
119
+     */
120
+    protected function setupFS($user) {
121
+        \OC_Util::tearDownFS();
122
+        \OC_Util::setupFS($user);
123 123
 
124
-		// Check if this user has a trashbin directory
125
-		$view = new \OC\Files\View('/' . $user);
126
-		if (!$view->is_dir('/files_trashbin/files')) {
127
-			return false;
128
-		}
124
+        // Check if this user has a trashbin directory
125
+        $view = new \OC\Files\View('/' . $user);
126
+        if (!$view->is_dir('/files_trashbin/files')) {
127
+            return false;
128
+        }
129 129
 
130
-		return true;
131
-	}
130
+        return true;
131
+    }
132 132
 }
Please login to merge, or discard this patch.
apps/files_trashbin/lib/BackgroundJob/ExpireTrash.php 2 patches
Spacing   +2 added lines, -2 removed lines patch added patch discarded remove patch
@@ -78,7 +78,7 @@  discard block
 block discarded – undo
78 78
 			return;
79 79
 		}
80 80
 
81
-		$this->userManager->callForSeenUsers(function (IUser $user) {
81
+		$this->userManager->callForSeenUsers(function(IUser $user) {
82 82
 			$uid = $user->getUID();
83 83
 			if (!$this->setupFS($uid)) {
84 84
 				return;
@@ -100,7 +100,7 @@  discard block
 block discarded – undo
100 100
 		\OC_Util::setupFS($user);
101 101
 
102 102
 		// Check if this user has a trashbin directory
103
-		$view = new \OC\Files\View('/' . $user);
103
+		$view = new \OC\Files\View('/'.$user);
104 104
 		if (!$view->is_dir('/files_trashbin/files')) {
105 105
 			return false;
106 106
 		}
Please login to merge, or discard this patch.
Indentation   +63 added lines, -63 removed lines patch added patch discarded remove patch
@@ -36,77 +36,77 @@
 block discarded – undo
36 36
 
37 37
 class ExpireTrash extends \OC\BackgroundJob\TimedJob {
38 38
 
39
-	/**
40
-	 * @var Expiration
41
-	 */
42
-	private $expiration;
39
+    /**
40
+     * @var Expiration
41
+     */
42
+    private $expiration;
43 43
 	
44
-	/**
45
-	 * @var IUserManager
46
-	 */
47
-	private $userManager;
44
+    /**
45
+     * @var IUserManager
46
+     */
47
+    private $userManager;
48 48
 
49
-	/**
50
-	 * @param IUserManager|null $userManager
51
-	 * @param Expiration|null $expiration
52
-	 */
53
-	public function __construct(IUserManager $userManager = null,
54
-								Expiration $expiration = null) {
55
-		// Run once per 30 minutes
56
-		$this->setInterval(60 * 30);
49
+    /**
50
+     * @param IUserManager|null $userManager
51
+     * @param Expiration|null $expiration
52
+     */
53
+    public function __construct(IUserManager $userManager = null,
54
+                                Expiration $expiration = null) {
55
+        // Run once per 30 minutes
56
+        $this->setInterval(60 * 30);
57 57
 
58
-		if (is_null($expiration) || is_null($userManager)) {
59
-			$this->fixDIForJobs();
60
-		} else {
61
-			$this->userManager = $userManager;
62
-			$this->expiration = $expiration;
63
-		}
64
-	}
58
+        if (is_null($expiration) || is_null($userManager)) {
59
+            $this->fixDIForJobs();
60
+        } else {
61
+            $this->userManager = $userManager;
62
+            $this->expiration = $expiration;
63
+        }
64
+    }
65 65
 
66
-	protected function fixDIForJobs() {
67
-		/** @var Application $application */
68
-		$application = \OC::$server->query(Application::class);
69
-		$this->userManager = \OC::$server->getUserManager();
70
-		$this->expiration = $application->getContainer()->query('Expiration');
71
-	}
66
+    protected function fixDIForJobs() {
67
+        /** @var Application $application */
68
+        $application = \OC::$server->query(Application::class);
69
+        $this->userManager = \OC::$server->getUserManager();
70
+        $this->expiration = $application->getContainer()->query('Expiration');
71
+    }
72 72
 
73
-	/**
74
-	 * @param $argument
75
-	 * @throws \Exception
76
-	 */
77
-	protected function run($argument) {
78
-		$maxAge = $this->expiration->getMaxAgeAsTimestamp();
79
-		if (!$maxAge) {
80
-			return;
81
-		}
73
+    /**
74
+     * @param $argument
75
+     * @throws \Exception
76
+     */
77
+    protected function run($argument) {
78
+        $maxAge = $this->expiration->getMaxAgeAsTimestamp();
79
+        if (!$maxAge) {
80
+            return;
81
+        }
82 82
 
83
-		$this->userManager->callForSeenUsers(function (IUser $user) {
84
-			$uid = $user->getUID();
85
-			if (!$this->setupFS($uid)) {
86
-				return;
87
-			}
88
-			$dirContent = Helper::getTrashFiles('/', $uid, 'mtime');
89
-			Trashbin::deleteExpiredFiles($dirContent, $uid);
90
-		});
83
+        $this->userManager->callForSeenUsers(function (IUser $user) {
84
+            $uid = $user->getUID();
85
+            if (!$this->setupFS($uid)) {
86
+                return;
87
+            }
88
+            $dirContent = Helper::getTrashFiles('/', $uid, 'mtime');
89
+            Trashbin::deleteExpiredFiles($dirContent, $uid);
90
+        });
91 91
 		
92
-		\OC_Util::tearDownFS();
93
-	}
92
+        \OC_Util::tearDownFS();
93
+    }
94 94
 
95
-	/**
96
-	 * Act on behalf on trash item owner
97
-	 * @param string $user
98
-	 * @return boolean
99
-	 */
100
-	protected function setupFS($user) {
101
-		\OC_Util::tearDownFS();
102
-		\OC_Util::setupFS($user);
95
+    /**
96
+     * Act on behalf on trash item owner
97
+     * @param string $user
98
+     * @return boolean
99
+     */
100
+    protected function setupFS($user) {
101
+        \OC_Util::tearDownFS();
102
+        \OC_Util::setupFS($user);
103 103
 
104
-		// Check if this user has a trashbin directory
105
-		$view = new \OC\Files\View('/' . $user);
106
-		if (!$view->is_dir('/files_trashbin/files')) {
107
-			return false;
108
-		}
104
+        // Check if this user has a trashbin directory
105
+        $view = new \OC\Files\View('/' . $user);
106
+        if (!$view->is_dir('/files_trashbin/files')) {
107
+            return false;
108
+        }
109 109
 
110
-		return true;
111
-	}
110
+        return true;
111
+    }
112 112
 }
Please login to merge, or discard this patch.
apps/files_trashbin/lib/Helper.php 2 patches
Spacing   +3 added lines, -3 removed lines patch added patch discarded remove patch
@@ -44,7 +44,7 @@  discard block
 block discarded – undo
44 44
 		$result = [];
45 45
 		$timestamp = null;
46 46
 
47
-		$view = new \OC\Files\View('/' . $user . '/files_trashbin/files');
47
+		$view = new \OC\Files\View('/'.$user.'/files_trashbin/files');
48 48
 
49 49
 		if (ltrim($dir, '/') !== '' && !$view->is_dir($dir)) {
50 50
 			throw new \Exception('Directory does not exists');
@@ -91,12 +91,12 @@  discard block
 block discarded – undo
91 91
 			];
92 92
 			if ($originalPath) {
93 93
 				if ($originalPath !== '.') {
94
-					$i['extraData'] = $originalPath . '/' . $originalName;
94
+					$i['extraData'] = $originalPath.'/'.$originalName;
95 95
 				} else {
96 96
 					$i['extraData'] = $originalName;
97 97
 				}
98 98
 			}
99
-			$result[] = new FileInfo($absoluteDir . '/' . $i['name'], $storage, $internalPath . '/' . $i['name'], $i, $mount);
99
+			$result[] = new FileInfo($absoluteDir.'/'.$i['name'], $storage, $internalPath.'/'.$i['name'], $i, $mount);
100 100
 		}
101 101
 
102 102
 		if ($sortAttribute !== '') {
Please login to merge, or discard this patch.
Indentation   +85 added lines, -85 removed lines patch added patch discarded remove patch
@@ -36,95 +36,95 @@
 block discarded – undo
36 36
 use OCP\Files\Cache\ICacheEntry;
37 37
 
38 38
 class Helper {
39
-	/**
40
-	 * Retrieves the contents of a trash bin directory.
41
-	 *
42
-	 * @param string $dir path to the directory inside the trashbin
43
-	 * or empty to retrieve the root of the trashbin
44
-	 * @param string $user
45
-	 * @param string $sortAttribute attribute to sort on or empty to disable sorting
46
-	 * @param bool $sortDescending true for descending sort, false otherwise
47
-	 * @return \OCP\Files\FileInfo[]
48
-	 */
49
-	public static function getTrashFiles($dir, $user, $sortAttribute = '', $sortDescending = false) {
50
-		$result = [];
51
-		$timestamp = null;
39
+    /**
40
+     * Retrieves the contents of a trash bin directory.
41
+     *
42
+     * @param string $dir path to the directory inside the trashbin
43
+     * or empty to retrieve the root of the trashbin
44
+     * @param string $user
45
+     * @param string $sortAttribute attribute to sort on or empty to disable sorting
46
+     * @param bool $sortDescending true for descending sort, false otherwise
47
+     * @return \OCP\Files\FileInfo[]
48
+     */
49
+    public static function getTrashFiles($dir, $user, $sortAttribute = '', $sortDescending = false) {
50
+        $result = [];
51
+        $timestamp = null;
52 52
 
53
-		$view = new \OC\Files\View('/' . $user . '/files_trashbin/files');
53
+        $view = new \OC\Files\View('/' . $user . '/files_trashbin/files');
54 54
 
55
-		if (ltrim($dir, '/') !== '' && !$view->is_dir($dir)) {
56
-			throw new \Exception('Directory does not exists');
57
-		}
55
+        if (ltrim($dir, '/') !== '' && !$view->is_dir($dir)) {
56
+            throw new \Exception('Directory does not exists');
57
+        }
58 58
 
59
-		$mount = $view->getMount($dir);
60
-		$storage = $mount->getStorage();
61
-		$absoluteDir = $view->getAbsolutePath($dir);
62
-		$internalPath = $mount->getInternalPath($absoluteDir);
59
+        $mount = $view->getMount($dir);
60
+        $storage = $mount->getStorage();
61
+        $absoluteDir = $view->getAbsolutePath($dir);
62
+        $internalPath = $mount->getInternalPath($absoluteDir);
63 63
 
64
-		$originalLocations = \OCA\Files_Trashbin\Trashbin::getLocations($user);
65
-		$dirContent = $storage->getCache()->getFolderContents($mount->getInternalPath($view->getAbsolutePath($dir)));
66
-		foreach ($dirContent as $entry) {
67
-			$entryName = $entry->getName();
68
-			$name = $entryName;
69
-			if ($dir === '' || $dir === '/') {
70
-				$pathparts = pathinfo($entryName);
71
-				$timestamp = substr($pathparts['extension'], 1);
72
-				$name = $pathparts['filename'];
73
-			} elseif ($timestamp === null) {
74
-				// for subfolders we need to calculate the timestamp only once
75
-				$parts = explode('/', ltrim($dir, '/'));
76
-				$timestamp = substr(pathinfo($parts[0], PATHINFO_EXTENSION), 1);
77
-			}
78
-			$originalPath = '';
79
-			$originalName = substr($entryName, 0, -strlen($timestamp) - 2);
80
-			if (isset($originalLocations[$originalName][$timestamp])) {
81
-				$originalPath = $originalLocations[$originalName][$timestamp];
82
-				if (substr($originalPath, -1) === '/') {
83
-					$originalPath = substr($originalPath, 0, -1);
84
-				}
85
-			}
86
-			$type = $entry->getMimeType() === ICacheEntry::DIRECTORY_MIMETYPE ? 'dir' : 'file';
87
-			$i = [
88
-				'name' => $name,
89
-				'mtime' => $timestamp,
90
-				'mimetype' => $type === 'dir' ? 'httpd/unix-directory' : \OC::$server->getMimeTypeDetector()->detectPath($name),
91
-				'type' => $type,
92
-				'directory' => ($dir === '/') ? '' : $dir,
93
-				'size' => $entry->getSize(),
94
-				'etag' => '',
95
-				'permissions' => Constants::PERMISSION_ALL - Constants::PERMISSION_SHARE,
96
-				'fileid' => $entry->getId(),
97
-			];
98
-			if ($originalPath) {
99
-				if ($originalPath !== '.') {
100
-					$i['extraData'] = $originalPath . '/' . $originalName;
101
-				} else {
102
-					$i['extraData'] = $originalName;
103
-				}
104
-			}
105
-			$result[] = new FileInfo($absoluteDir . '/' . $i['name'], $storage, $internalPath . '/' . $i['name'], $i, $mount);
106
-		}
64
+        $originalLocations = \OCA\Files_Trashbin\Trashbin::getLocations($user);
65
+        $dirContent = $storage->getCache()->getFolderContents($mount->getInternalPath($view->getAbsolutePath($dir)));
66
+        foreach ($dirContent as $entry) {
67
+            $entryName = $entry->getName();
68
+            $name = $entryName;
69
+            if ($dir === '' || $dir === '/') {
70
+                $pathparts = pathinfo($entryName);
71
+                $timestamp = substr($pathparts['extension'], 1);
72
+                $name = $pathparts['filename'];
73
+            } elseif ($timestamp === null) {
74
+                // for subfolders we need to calculate the timestamp only once
75
+                $parts = explode('/', ltrim($dir, '/'));
76
+                $timestamp = substr(pathinfo($parts[0], PATHINFO_EXTENSION), 1);
77
+            }
78
+            $originalPath = '';
79
+            $originalName = substr($entryName, 0, -strlen($timestamp) - 2);
80
+            if (isset($originalLocations[$originalName][$timestamp])) {
81
+                $originalPath = $originalLocations[$originalName][$timestamp];
82
+                if (substr($originalPath, -1) === '/') {
83
+                    $originalPath = substr($originalPath, 0, -1);
84
+                }
85
+            }
86
+            $type = $entry->getMimeType() === ICacheEntry::DIRECTORY_MIMETYPE ? 'dir' : 'file';
87
+            $i = [
88
+                'name' => $name,
89
+                'mtime' => $timestamp,
90
+                'mimetype' => $type === 'dir' ? 'httpd/unix-directory' : \OC::$server->getMimeTypeDetector()->detectPath($name),
91
+                'type' => $type,
92
+                'directory' => ($dir === '/') ? '' : $dir,
93
+                'size' => $entry->getSize(),
94
+                'etag' => '',
95
+                'permissions' => Constants::PERMISSION_ALL - Constants::PERMISSION_SHARE,
96
+                'fileid' => $entry->getId(),
97
+            ];
98
+            if ($originalPath) {
99
+                if ($originalPath !== '.') {
100
+                    $i['extraData'] = $originalPath . '/' . $originalName;
101
+                } else {
102
+                    $i['extraData'] = $originalName;
103
+                }
104
+            }
105
+            $result[] = new FileInfo($absoluteDir . '/' . $i['name'], $storage, $internalPath . '/' . $i['name'], $i, $mount);
106
+        }
107 107
 
108
-		if ($sortAttribute !== '') {
109
-			return \OCA\Files\Helper::sortFiles($result, $sortAttribute, $sortDescending);
110
-		}
111
-		return $result;
112
-	}
108
+        if ($sortAttribute !== '') {
109
+            return \OCA\Files\Helper::sortFiles($result, $sortAttribute, $sortDescending);
110
+        }
111
+        return $result;
112
+    }
113 113
 
114
-	/**
115
-	 * Format file infos for JSON
116
-	 *
117
-	 * @param \OCP\Files\FileInfo[] $fileInfos file infos
118
-	 */
119
-	public static function formatFileInfos($fileInfos) {
120
-		$files = [];
121
-		foreach ($fileInfos as $i) {
122
-			$entry = \OCA\Files\Helper::formatFileInfo($i);
123
-			$entry['id'] = $i->getId();
124
-			$entry['etag'] = $entry['mtime']; // add fake etag, it is only needed to identify the preview image
125
-			$entry['permissions'] = \OCP\Constants::PERMISSION_READ;
126
-			$files[] = $entry;
127
-		}
128
-		return $files;
129
-	}
114
+    /**
115
+     * Format file infos for JSON
116
+     *
117
+     * @param \OCP\Files\FileInfo[] $fileInfos file infos
118
+     */
119
+    public static function formatFileInfos($fileInfos) {
120
+        $files = [];
121
+        foreach ($fileInfos as $i) {
122
+            $entry = \OCA\Files\Helper::formatFileInfo($i);
123
+            $entry['id'] = $i->getId();
124
+            $entry['etag'] = $entry['mtime']; // add fake etag, it is only needed to identify the preview image
125
+            $entry['permissions'] = \OCP\Constants::PERMISSION_READ;
126
+            $files[] = $entry;
127
+        }
128
+        return $files;
129
+    }
130 130
 }
Please login to merge, or discard this patch.
apps/comments/lib/Notification/Listener.php 2 patches
Indentation   +77 added lines, -77 removed lines patch added patch discarded remove patch
@@ -27,91 +27,91 @@
 block discarded – undo
27 27
 use OCP\Notification\IManager;
28 28
 
29 29
 class Listener {
30
-	/** @var IManager */
31
-	protected $notificationManager;
30
+    /** @var IManager */
31
+    protected $notificationManager;
32 32
 
33
-	/** @var IUserManager */
34
-	protected $userManager;
33
+    /** @var IUserManager */
34
+    protected $userManager;
35 35
 
36
-	/**
37
-	 * Listener constructor.
38
-	 *
39
-	 * @param IManager $notificationManager
40
-	 * @param IUserManager $userManager
41
-	 */
42
-	public function __construct(
43
-		IManager $notificationManager,
44
-		IUserManager $userManager
45
-	) {
46
-		$this->notificationManager = $notificationManager;
47
-		$this->userManager = $userManager;
48
-	}
36
+    /**
37
+     * Listener constructor.
38
+     *
39
+     * @param IManager $notificationManager
40
+     * @param IUserManager $userManager
41
+     */
42
+    public function __construct(
43
+        IManager $notificationManager,
44
+        IUserManager $userManager
45
+    ) {
46
+        $this->notificationManager = $notificationManager;
47
+        $this->userManager = $userManager;
48
+    }
49 49
 
50
-	/**
51
-	 * @param CommentsEvent $event
52
-	 */
53
-	public function evaluate(CommentsEvent $event) {
54
-		$comment = $event->getComment();
50
+    /**
51
+     * @param CommentsEvent $event
52
+     */
53
+    public function evaluate(CommentsEvent $event) {
54
+        $comment = $event->getComment();
55 55
 
56
-		$mentions = $this->extractMentions($comment->getMentions());
57
-		if (empty($mentions)) {
58
-			// no one to notify
59
-			return;
60
-		}
56
+        $mentions = $this->extractMentions($comment->getMentions());
57
+        if (empty($mentions)) {
58
+            // no one to notify
59
+            return;
60
+        }
61 61
 
62
-		$notification = $this->instantiateNotification($comment);
62
+        $notification = $this->instantiateNotification($comment);
63 63
 
64
-		foreach ($mentions as $uid) {
65
-			if (($comment->getActorType() === 'users' && $uid === $comment->getActorId())
66
-				|| !$this->userManager->userExists($uid)
67
-			) {
68
-				// do not notify unknown users or yourself
69
-				continue;
70
-			}
64
+        foreach ($mentions as $uid) {
65
+            if (($comment->getActorType() === 'users' && $uid === $comment->getActorId())
66
+                || !$this->userManager->userExists($uid)
67
+            ) {
68
+                // do not notify unknown users or yourself
69
+                continue;
70
+            }
71 71
 
72
-			$notification->setUser($uid);
73
-			if ($event->getEvent() === CommentsEvent::EVENT_DELETE
74
-				|| $event->getEvent() === CommentsEvent::EVENT_PRE_UPDATE) {
75
-				$this->notificationManager->markProcessed($notification);
76
-			} else {
77
-				$this->notificationManager->notify($notification);
78
-			}
79
-		}
80
-	}
72
+            $notification->setUser($uid);
73
+            if ($event->getEvent() === CommentsEvent::EVENT_DELETE
74
+                || $event->getEvent() === CommentsEvent::EVENT_PRE_UPDATE) {
75
+                $this->notificationManager->markProcessed($notification);
76
+            } else {
77
+                $this->notificationManager->notify($notification);
78
+            }
79
+        }
80
+    }
81 81
 
82
-	/**
83
-	 * creates a notification instance and fills it with comment data
84
-	 *
85
-	 * @param IComment $comment
86
-	 * @return \OCP\Notification\INotification
87
-	 */
88
-	public function instantiateNotification(IComment $comment) {
89
-		$notification = $this->notificationManager->createNotification();
90
-		$notification
91
-			->setApp('comments')
92
-			->setObject('comment', $comment->getId())
93
-			->setSubject('mention', [ $comment->getObjectType(), $comment->getObjectId() ])
94
-			->setDateTime($comment->getCreationDateTime());
82
+    /**
83
+     * creates a notification instance and fills it with comment data
84
+     *
85
+     * @param IComment $comment
86
+     * @return \OCP\Notification\INotification
87
+     */
88
+    public function instantiateNotification(IComment $comment) {
89
+        $notification = $this->notificationManager->createNotification();
90
+        $notification
91
+            ->setApp('comments')
92
+            ->setObject('comment', $comment->getId())
93
+            ->setSubject('mention', [ $comment->getObjectType(), $comment->getObjectId() ])
94
+            ->setDateTime($comment->getCreationDateTime());
95 95
 
96
-		return $notification;
97
-	}
96
+        return $notification;
97
+    }
98 98
 
99
-	/**
100
-	 * flattens the mention array returned from comments to a list of user ids.
101
-	 *
102
-	 * @param array $mentions
103
-	 * @return string[] containing the mentions, e.g. ['alice', 'bob']
104
-	 */
105
-	public function extractMentions(array $mentions) {
106
-		if (empty($mentions)) {
107
-			return [];
108
-		}
109
-		$uids = [];
110
-		foreach ($mentions as $mention) {
111
-			if ($mention['type'] === 'user') {
112
-				$uids[] = $mention['id'];
113
-			}
114
-		}
115
-		return $uids;
116
-	}
99
+    /**
100
+     * flattens the mention array returned from comments to a list of user ids.
101
+     *
102
+     * @param array $mentions
103
+     * @return string[] containing the mentions, e.g. ['alice', 'bob']
104
+     */
105
+    public function extractMentions(array $mentions) {
106
+        if (empty($mentions)) {
107
+            return [];
108
+        }
109
+        $uids = [];
110
+        foreach ($mentions as $mention) {
111
+            if ($mention['type'] === 'user') {
112
+                $uids[] = $mention['id'];
113
+            }
114
+        }
115
+        return $uids;
116
+    }
117 117
 }
Please login to merge, or discard this patch.
Spacing   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -90,7 +90,7 @@
 block discarded – undo
90 90
 		$notification
91 91
 			->setApp('comments')
92 92
 			->setObject('comment', $comment->getId())
93
-			->setSubject('mention', [ $comment->getObjectType(), $comment->getObjectId() ])
93
+			->setSubject('mention', [$comment->getObjectType(), $comment->getObjectId()])
94 94
 			->setDateTime($comment->getCreationDateTime());
95 95
 
96 96
 		return $notification;
Please login to merge, or discard this patch.
apps/comments/lib/EventHandler.php 1 patch
Indentation   +45 added lines, -45 removed lines patch added patch discarded remove patch
@@ -36,56 +36,56 @@
 block discarded – undo
36 36
  * @package OCA\Comments
37 37
  */
38 38
 class EventHandler implements ICommentsEventHandler {
39
-	/** @var ActivityListener */
40
-	private $activityListener;
39
+    /** @var ActivityListener */
40
+    private $activityListener;
41 41
 
42
-	/** @var NotificationListener */
43
-	private $notificationListener;
42
+    /** @var NotificationListener */
43
+    private $notificationListener;
44 44
 
45
-	public function __construct(ActivityListener $activityListener, NotificationListener $notificationListener) {
46
-		$this->activityListener = $activityListener;
47
-		$this->notificationListener = $notificationListener;
48
-	}
45
+    public function __construct(ActivityListener $activityListener, NotificationListener $notificationListener) {
46
+        $this->activityListener = $activityListener;
47
+        $this->notificationListener = $notificationListener;
48
+    }
49 49
 
50
-	/**
51
-	 * @param CommentsEvent $event
52
-	 */
53
-	public function handle(CommentsEvent $event) {
54
-		if ($event->getComment()->getObjectType() !== 'files') {
55
-			// this is a 'files'-specific Handler
56
-			return;
57
-		}
50
+    /**
51
+     * @param CommentsEvent $event
52
+     */
53
+    public function handle(CommentsEvent $event) {
54
+        if ($event->getComment()->getObjectType() !== 'files') {
55
+            // this is a 'files'-specific Handler
56
+            return;
57
+        }
58 58
 
59
-		$eventType = $event->getEvent();
60
-		if ($eventType === CommentsEvent::EVENT_ADD
61
-		) {
62
-			$this->notificationHandler($event);
63
-			$this->activityHandler($event);
64
-			return;
65
-		}
59
+        $eventType = $event->getEvent();
60
+        if ($eventType === CommentsEvent::EVENT_ADD
61
+        ) {
62
+            $this->notificationHandler($event);
63
+            $this->activityHandler($event);
64
+            return;
65
+        }
66 66
 
67
-		$applicableEvents = [
68
-			CommentsEvent::EVENT_PRE_UPDATE,
69
-			CommentsEvent::EVENT_UPDATE,
70
-			CommentsEvent::EVENT_DELETE,
71
-		];
72
-		if (in_array($eventType, $applicableEvents)) {
73
-			$this->notificationHandler($event);
74
-			return;
75
-		}
76
-	}
67
+        $applicableEvents = [
68
+            CommentsEvent::EVENT_PRE_UPDATE,
69
+            CommentsEvent::EVENT_UPDATE,
70
+            CommentsEvent::EVENT_DELETE,
71
+        ];
72
+        if (in_array($eventType, $applicableEvents)) {
73
+            $this->notificationHandler($event);
74
+            return;
75
+        }
76
+    }
77 77
 
78
-	/**
79
-	 * @param CommentsEvent $event
80
-	 */
81
-	private function activityHandler(CommentsEvent $event) {
82
-		$this->activityListener->commentEvent($event);
83
-	}
78
+    /**
79
+     * @param CommentsEvent $event
80
+     */
81
+    private function activityHandler(CommentsEvent $event) {
82
+        $this->activityListener->commentEvent($event);
83
+    }
84 84
 
85
-	/**
86
-	 * @param CommentsEvent $event
87
-	 */
88
-	private function notificationHandler(CommentsEvent $event) {
89
-		$this->notificationListener->evaluate($event);
90
-	}
85
+    /**
86
+     * @param CommentsEvent $event
87
+     */
88
+    private function notificationHandler(CommentsEvent $event) {
89
+        $this->notificationListener->evaluate($event);
90
+    }
91 91
 }
Please login to merge, or discard this patch.
apps/user_ldap/lib/User_Proxy.php 2 patches
Spacing   +2 added lines, -2 removed lines patch added patch discarded remove patch
@@ -197,7 +197,7 @@  discard block
 block discarded – undo
197 197
 	 * @return string|false
198 198
 	 */
199 199
 	public function loginName2UserName($loginName) {
200
-		$id = 'LOGINNAME,' . $loginName;
200
+		$id = 'LOGINNAME,'.$loginName;
201 201
 		return $this->handleRequest($id, 'loginName2UserName', [$loginName]);
202 202
 	}
203 203
 	
@@ -208,7 +208,7 @@  discard block
 block discarded – undo
208 208
 	 * @return string|false with the username
209 209
 	 */
210 210
 	public function dn2UserName($dn) {
211
-		$id = 'DN,' . $dn;
211
+		$id = 'DN,'.$dn;
212 212
 		return $this->handleRequest($id, 'dn2UserName', [$dn]);
213 213
 	}
214 214
 
Please login to merge, or discard this patch.
Indentation   +323 added lines, -323 removed lines patch added patch discarded remove patch
@@ -38,352 +38,352 @@
 block discarded – undo
38 38
 use OCP\Notification\IManager as INotificationManager;
39 39
 
40 40
 class User_Proxy extends Proxy implements \OCP\IUserBackend, \OCP\UserInterface, IUserLDAP {
41
-	private $backends = [];
42
-	/** @var User_LDAP */
43
-	private $refBackend = null;
41
+    private $backends = [];
42
+    /** @var User_LDAP */
43
+    private $refBackend = null;
44 44
 
45
-	public function __construct(
46
-		Helper $helper,
47
-		ILDAPWrapper $ldap,
48
-		IConfig $ocConfig,
49
-		INotificationManager $notificationManager,
50
-		IUserSession $userSession,
51
-		UserPluginManager $userPluginManager
52
-	) {
53
-		parent::__construct($ldap);
54
-		$serverConfigPrefixes = $helper->getServerConfigurationPrefixes(true);
55
-		foreach ($serverConfigPrefixes as $configPrefix) {
56
-			$this->backends[$configPrefix] =
57
-				new User_LDAP($this->getAccess($configPrefix), $ocConfig, $notificationManager, $userSession, $userPluginManager);
45
+    public function __construct(
46
+        Helper $helper,
47
+        ILDAPWrapper $ldap,
48
+        IConfig $ocConfig,
49
+        INotificationManager $notificationManager,
50
+        IUserSession $userSession,
51
+        UserPluginManager $userPluginManager
52
+    ) {
53
+        parent::__construct($ldap);
54
+        $serverConfigPrefixes = $helper->getServerConfigurationPrefixes(true);
55
+        foreach ($serverConfigPrefixes as $configPrefix) {
56
+            $this->backends[$configPrefix] =
57
+                new User_LDAP($this->getAccess($configPrefix), $ocConfig, $notificationManager, $userSession, $userPluginManager);
58 58
 
59
-			if (is_null($this->refBackend)) {
60
-				$this->refBackend = &$this->backends[$configPrefix];
61
-			}
62
-		}
63
-	}
59
+            if (is_null($this->refBackend)) {
60
+                $this->refBackend = &$this->backends[$configPrefix];
61
+            }
62
+        }
63
+    }
64 64
 
65
-	/**
66
-	 * Tries the backends one after the other until a positive result is returned from the specified method
67
-	 *
68
-	 * @param string $id the uid connected to the request
69
-	 * @param string $method the method of the user backend that shall be called
70
-	 * @param array $parameters an array of parameters to be passed
71
-	 * @return mixed the result of the method or false
72
-	 */
73
-	protected function walkBackends($id, $method, $parameters) {
74
-		$uid = $id;
75
-		$cacheKey = $this->getUserCacheKey($uid);
76
-		foreach ($this->backends as $configPrefix => $backend) {
77
-			$instance = $backend;
78
-			if (!method_exists($instance, $method)
79
-				&& method_exists($this->getAccess($configPrefix), $method)) {
80
-				$instance = $this->getAccess($configPrefix);
81
-			}
82
-			if ($result = call_user_func_array([$instance, $method], $parameters)) {
83
-				if (!$this->isSingleBackend()) {
84
-					$this->writeToCache($cacheKey, $configPrefix);
85
-				}
86
-				return $result;
87
-			}
88
-		}
89
-		return false;
90
-	}
65
+    /**
66
+     * Tries the backends one after the other until a positive result is returned from the specified method
67
+     *
68
+     * @param string $id the uid connected to the request
69
+     * @param string $method the method of the user backend that shall be called
70
+     * @param array $parameters an array of parameters to be passed
71
+     * @return mixed the result of the method or false
72
+     */
73
+    protected function walkBackends($id, $method, $parameters) {
74
+        $uid = $id;
75
+        $cacheKey = $this->getUserCacheKey($uid);
76
+        foreach ($this->backends as $configPrefix => $backend) {
77
+            $instance = $backend;
78
+            if (!method_exists($instance, $method)
79
+                && method_exists($this->getAccess($configPrefix), $method)) {
80
+                $instance = $this->getAccess($configPrefix);
81
+            }
82
+            if ($result = call_user_func_array([$instance, $method], $parameters)) {
83
+                if (!$this->isSingleBackend()) {
84
+                    $this->writeToCache($cacheKey, $configPrefix);
85
+                }
86
+                return $result;
87
+            }
88
+        }
89
+        return false;
90
+    }
91 91
 
92
-	/**
93
-	 * Asks the backend connected to the server that supposely takes care of the uid from the request.
94
-	 *
95
-	 * @param string $id the uid connected to the request
96
-	 * @param string $method the method of the user backend that shall be called
97
-	 * @param array $parameters an array of parameters to be passed
98
-	 * @param mixed $passOnWhen the result matches this variable
99
-	 * @return mixed the result of the method or false
100
-	 */
101
-	protected function callOnLastSeenOn($id, $method, $parameters, $passOnWhen) {
102
-		$uid = $id;
103
-		$cacheKey = $this->getUserCacheKey($uid);
104
-		$prefix = $this->getFromCache($cacheKey);
105
-		//in case the uid has been found in the past, try this stored connection first
106
-		if (!is_null($prefix)) {
107
-			if (isset($this->backends[$prefix])) {
108
-				$instance = $this->backends[$prefix];
109
-				if (!method_exists($instance, $method)
110
-					&& method_exists($this->getAccess($prefix), $method)) {
111
-					$instance = $this->getAccess($prefix);
112
-				}
113
-				$result = call_user_func_array([$instance, $method], $parameters);
114
-				if ($result === $passOnWhen) {
115
-					//not found here, reset cache to null if user vanished
116
-					//because sometimes methods return false with a reason
117
-					$userExists = call_user_func_array(
118
-						[$this->backends[$prefix], 'userExistsOnLDAP'],
119
-						[$uid]
120
-					);
121
-					if (!$userExists) {
122
-						$this->writeToCache($cacheKey, null);
123
-					}
124
-				}
125
-				return $result;
126
-			}
127
-		}
128
-		return false;
129
-	}
92
+    /**
93
+     * Asks the backend connected to the server that supposely takes care of the uid from the request.
94
+     *
95
+     * @param string $id the uid connected to the request
96
+     * @param string $method the method of the user backend that shall be called
97
+     * @param array $parameters an array of parameters to be passed
98
+     * @param mixed $passOnWhen the result matches this variable
99
+     * @return mixed the result of the method or false
100
+     */
101
+    protected function callOnLastSeenOn($id, $method, $parameters, $passOnWhen) {
102
+        $uid = $id;
103
+        $cacheKey = $this->getUserCacheKey($uid);
104
+        $prefix = $this->getFromCache($cacheKey);
105
+        //in case the uid has been found in the past, try this stored connection first
106
+        if (!is_null($prefix)) {
107
+            if (isset($this->backends[$prefix])) {
108
+                $instance = $this->backends[$prefix];
109
+                if (!method_exists($instance, $method)
110
+                    && method_exists($this->getAccess($prefix), $method)) {
111
+                    $instance = $this->getAccess($prefix);
112
+                }
113
+                $result = call_user_func_array([$instance, $method], $parameters);
114
+                if ($result === $passOnWhen) {
115
+                    //not found here, reset cache to null if user vanished
116
+                    //because sometimes methods return false with a reason
117
+                    $userExists = call_user_func_array(
118
+                        [$this->backends[$prefix], 'userExistsOnLDAP'],
119
+                        [$uid]
120
+                    );
121
+                    if (!$userExists) {
122
+                        $this->writeToCache($cacheKey, null);
123
+                    }
124
+                }
125
+                return $result;
126
+            }
127
+        }
128
+        return false;
129
+    }
130 130
 
131
-	protected function activeBackends(): int {
132
-		return count($this->backends);
133
-	}
131
+    protected function activeBackends(): int {
132
+        return count($this->backends);
133
+    }
134 134
 
135
-	/**
136
-	 * Check if backend implements actions
137
-	 *
138
-	 * @param int $actions bitwise-or'ed actions
139
-	 * @return boolean
140
-	 *
141
-	 * Returns the supported actions as int to be
142
-	 * compared with \OC\User\Backend::CREATE_USER etc.
143
-	 */
144
-	public function implementsActions($actions) {
145
-		//it's the same across all our user backends obviously
146
-		return $this->refBackend->implementsActions($actions);
147
-	}
135
+    /**
136
+     * Check if backend implements actions
137
+     *
138
+     * @param int $actions bitwise-or'ed actions
139
+     * @return boolean
140
+     *
141
+     * Returns the supported actions as int to be
142
+     * compared with \OC\User\Backend::CREATE_USER etc.
143
+     */
144
+    public function implementsActions($actions) {
145
+        //it's the same across all our user backends obviously
146
+        return $this->refBackend->implementsActions($actions);
147
+    }
148 148
 
149
-	/**
150
-	 * Backend name to be shown in user management
151
-	 *
152
-	 * @return string the name of the backend to be shown
153
-	 */
154
-	public function getBackendName() {
155
-		return $this->refBackend->getBackendName();
156
-	}
149
+    /**
150
+     * Backend name to be shown in user management
151
+     *
152
+     * @return string the name of the backend to be shown
153
+     */
154
+    public function getBackendName() {
155
+        return $this->refBackend->getBackendName();
156
+    }
157 157
 
158
-	/**
159
-	 * Get a list of all users
160
-	 *
161
-	 * @param string $search
162
-	 * @param null|int $limit
163
-	 * @param null|int $offset
164
-	 * @return string[] an array of all uids
165
-	 */
166
-	public function getUsers($search = '', $limit = 10, $offset = 0) {
167
-		//we do it just as the /OC_User implementation: do not play around with limit and offset but ask all backends
168
-		$users = [];
169
-		foreach ($this->backends as $backend) {
170
-			$backendUsers = $backend->getUsers($search, $limit, $offset);
171
-			if (is_array($backendUsers)) {
172
-				$users = array_merge($users, $backendUsers);
173
-			}
174
-		}
175
-		return $users;
176
-	}
158
+    /**
159
+     * Get a list of all users
160
+     *
161
+     * @param string $search
162
+     * @param null|int $limit
163
+     * @param null|int $offset
164
+     * @return string[] an array of all uids
165
+     */
166
+    public function getUsers($search = '', $limit = 10, $offset = 0) {
167
+        //we do it just as the /OC_User implementation: do not play around with limit and offset but ask all backends
168
+        $users = [];
169
+        foreach ($this->backends as $backend) {
170
+            $backendUsers = $backend->getUsers($search, $limit, $offset);
171
+            if (is_array($backendUsers)) {
172
+                $users = array_merge($users, $backendUsers);
173
+            }
174
+        }
175
+        return $users;
176
+    }
177 177
 
178
-	/**
179
-	 * check if a user exists
180
-	 *
181
-	 * @param string $uid the username
182
-	 * @return boolean
183
-	 */
184
-	public function userExists($uid) {
185
-		$existsOnLDAP = false;
186
-		$existsLocally = $this->handleRequest($uid, 'userExists', [$uid]);
187
-		if ($existsLocally) {
188
-			$existsOnLDAP = $this->userExistsOnLDAP($uid);
189
-		}
190
-		if ($existsLocally && !$existsOnLDAP) {
191
-			try {
192
-				$user = $this->getLDAPAccess($uid)->userManager->get($uid);
193
-				if ($user instanceof User) {
194
-					$user->markUser();
195
-				}
196
-			} catch (\Exception $e) {
197
-				// ignore
198
-			}
199
-		}
200
-		return $existsLocally;
201
-	}
178
+    /**
179
+     * check if a user exists
180
+     *
181
+     * @param string $uid the username
182
+     * @return boolean
183
+     */
184
+    public function userExists($uid) {
185
+        $existsOnLDAP = false;
186
+        $existsLocally = $this->handleRequest($uid, 'userExists', [$uid]);
187
+        if ($existsLocally) {
188
+            $existsOnLDAP = $this->userExistsOnLDAP($uid);
189
+        }
190
+        if ($existsLocally && !$existsOnLDAP) {
191
+            try {
192
+                $user = $this->getLDAPAccess($uid)->userManager->get($uid);
193
+                if ($user instanceof User) {
194
+                    $user->markUser();
195
+                }
196
+            } catch (\Exception $e) {
197
+                // ignore
198
+            }
199
+        }
200
+        return $existsLocally;
201
+    }
202 202
 
203
-	/**
204
-	 * check if a user exists on LDAP
205
-	 *
206
-	 * @param string|\OCA\User_LDAP\User\User $user either the Nextcloud user
207
-	 * name or an instance of that user
208
-	 * @return boolean
209
-	 */
210
-	public function userExistsOnLDAP($user) {
211
-		$id = ($user instanceof User) ? $user->getUsername() : $user;
212
-		return $this->handleRequest($id, 'userExistsOnLDAP', [$user]);
213
-	}
203
+    /**
204
+     * check if a user exists on LDAP
205
+     *
206
+     * @param string|\OCA\User_LDAP\User\User $user either the Nextcloud user
207
+     * name or an instance of that user
208
+     * @return boolean
209
+     */
210
+    public function userExistsOnLDAP($user) {
211
+        $id = ($user instanceof User) ? $user->getUsername() : $user;
212
+        return $this->handleRequest($id, 'userExistsOnLDAP', [$user]);
213
+    }
214 214
 
215
-	/**
216
-	 * Check if the password is correct
217
-	 *
218
-	 * @param string $uid The username
219
-	 * @param string $password The password
220
-	 * @return bool
221
-	 *
222
-	 * Check if the password is correct without logging in the user
223
-	 */
224
-	public function checkPassword($uid, $password) {
225
-		return $this->handleRequest($uid, 'checkPassword', [$uid, $password]);
226
-	}
215
+    /**
216
+     * Check if the password is correct
217
+     *
218
+     * @param string $uid The username
219
+     * @param string $password The password
220
+     * @return bool
221
+     *
222
+     * Check if the password is correct without logging in the user
223
+     */
224
+    public function checkPassword($uid, $password) {
225
+        return $this->handleRequest($uid, 'checkPassword', [$uid, $password]);
226
+    }
227 227
 
228
-	/**
229
-	 * returns the username for the given login name, if available
230
-	 *
231
-	 * @param string $loginName
232
-	 * @return string|false
233
-	 */
234
-	public function loginName2UserName($loginName) {
235
-		$id = 'LOGINNAME,' . $loginName;
236
-		return $this->handleRequest($id, 'loginName2UserName', [$loginName]);
237
-	}
228
+    /**
229
+     * returns the username for the given login name, if available
230
+     *
231
+     * @param string $loginName
232
+     * @return string|false
233
+     */
234
+    public function loginName2UserName($loginName) {
235
+        $id = 'LOGINNAME,' . $loginName;
236
+        return $this->handleRequest($id, 'loginName2UserName', [$loginName]);
237
+    }
238 238
 
239
-	/**
240
-	 * returns the username for the given LDAP DN, if available
241
-	 *
242
-	 * @param string $dn
243
-	 * @return string|false with the username
244
-	 */
245
-	public function dn2UserName($dn) {
246
-		$id = 'DN,' . $dn;
247
-		return $this->handleRequest($id, 'dn2UserName', [$dn]);
248
-	}
239
+    /**
240
+     * returns the username for the given LDAP DN, if available
241
+     *
242
+     * @param string $dn
243
+     * @return string|false with the username
244
+     */
245
+    public function dn2UserName($dn) {
246
+        $id = 'DN,' . $dn;
247
+        return $this->handleRequest($id, 'dn2UserName', [$dn]);
248
+    }
249 249
 
250
-	/**
251
-	 * get the user's home directory
252
-	 *
253
-	 * @param string $uid the username
254
-	 * @return boolean
255
-	 */
256
-	public function getHome($uid) {
257
-		return $this->handleRequest($uid, 'getHome', [$uid]);
258
-	}
250
+    /**
251
+     * get the user's home directory
252
+     *
253
+     * @param string $uid the username
254
+     * @return boolean
255
+     */
256
+    public function getHome($uid) {
257
+        return $this->handleRequest($uid, 'getHome', [$uid]);
258
+    }
259 259
 
260
-	/**
261
-	 * get display name of the user
262
-	 *
263
-	 * @param string $uid user ID of the user
264
-	 * @return string display name
265
-	 */
266
-	public function getDisplayName($uid) {
267
-		return $this->handleRequest($uid, 'getDisplayName', [$uid]);
268
-	}
260
+    /**
261
+     * get display name of the user
262
+     *
263
+     * @param string $uid user ID of the user
264
+     * @return string display name
265
+     */
266
+    public function getDisplayName($uid) {
267
+        return $this->handleRequest($uid, 'getDisplayName', [$uid]);
268
+    }
269 269
 
270
-	/**
271
-	 * set display name of the user
272
-	 *
273
-	 * @param string $uid user ID of the user
274
-	 * @param string $displayName new display name
275
-	 * @return string display name
276
-	 */
277
-	public function setDisplayName($uid, $displayName) {
278
-		return $this->handleRequest($uid, 'setDisplayName', [$uid, $displayName]);
279
-	}
270
+    /**
271
+     * set display name of the user
272
+     *
273
+     * @param string $uid user ID of the user
274
+     * @param string $displayName new display name
275
+     * @return string display name
276
+     */
277
+    public function setDisplayName($uid, $displayName) {
278
+        return $this->handleRequest($uid, 'setDisplayName', [$uid, $displayName]);
279
+    }
280 280
 
281
-	/**
282
-	 * checks whether the user is allowed to change his avatar in Nextcloud
283
-	 *
284
-	 * @param string $uid the Nextcloud user name
285
-	 * @return boolean either the user can or cannot
286
-	 */
287
-	public function canChangeAvatar($uid) {
288
-		return $this->handleRequest($uid, 'canChangeAvatar', [$uid], true);
289
-	}
281
+    /**
282
+     * checks whether the user is allowed to change his avatar in Nextcloud
283
+     *
284
+     * @param string $uid the Nextcloud user name
285
+     * @return boolean either the user can or cannot
286
+     */
287
+    public function canChangeAvatar($uid) {
288
+        return $this->handleRequest($uid, 'canChangeAvatar', [$uid], true);
289
+    }
290 290
 
291
-	/**
292
-	 * Get a list of all display names and user ids.
293
-	 *
294
-	 * @param string $search
295
-	 * @param int|null $limit
296
-	 * @param int|null $offset
297
-	 * @return array an array of all displayNames (value) and the corresponding uids (key)
298
-	 */
299
-	public function getDisplayNames($search = '', $limit = null, $offset = null) {
300
-		//we do it just as the /OC_User implementation: do not play around with limit and offset but ask all backends
301
-		$users = [];
302
-		foreach ($this->backends as $backend) {
303
-			$backendUsers = $backend->getDisplayNames($search, $limit, $offset);
304
-			if (is_array($backendUsers)) {
305
-				$users = $users + $backendUsers;
306
-			}
307
-		}
308
-		return $users;
309
-	}
291
+    /**
292
+     * Get a list of all display names and user ids.
293
+     *
294
+     * @param string $search
295
+     * @param int|null $limit
296
+     * @param int|null $offset
297
+     * @return array an array of all displayNames (value) and the corresponding uids (key)
298
+     */
299
+    public function getDisplayNames($search = '', $limit = null, $offset = null) {
300
+        //we do it just as the /OC_User implementation: do not play around with limit and offset but ask all backends
301
+        $users = [];
302
+        foreach ($this->backends as $backend) {
303
+            $backendUsers = $backend->getDisplayNames($search, $limit, $offset);
304
+            if (is_array($backendUsers)) {
305
+                $users = $users + $backendUsers;
306
+            }
307
+        }
308
+        return $users;
309
+    }
310 310
 
311
-	/**
312
-	 * delete a user
313
-	 *
314
-	 * @param string $uid The username of the user to delete
315
-	 * @return bool
316
-	 *
317
-	 * Deletes a user
318
-	 */
319
-	public function deleteUser($uid) {
320
-		return $this->handleRequest($uid, 'deleteUser', [$uid]);
321
-	}
311
+    /**
312
+     * delete a user
313
+     *
314
+     * @param string $uid The username of the user to delete
315
+     * @return bool
316
+     *
317
+     * Deletes a user
318
+     */
319
+    public function deleteUser($uid) {
320
+        return $this->handleRequest($uid, 'deleteUser', [$uid]);
321
+    }
322 322
 
323
-	/**
324
-	 * Set password
325
-	 *
326
-	 * @param string $uid The username
327
-	 * @param string $password The new password
328
-	 * @return bool
329
-	 *
330
-	 */
331
-	public function setPassword($uid, $password) {
332
-		return $this->handleRequest($uid, 'setPassword', [$uid, $password]);
333
-	}
323
+    /**
324
+     * Set password
325
+     *
326
+     * @param string $uid The username
327
+     * @param string $password The new password
328
+     * @return bool
329
+     *
330
+     */
331
+    public function setPassword($uid, $password) {
332
+        return $this->handleRequest($uid, 'setPassword', [$uid, $password]);
333
+    }
334 334
 
335
-	/**
336
-	 * @return bool
337
-	 */
338
-	public function hasUserListings() {
339
-		return $this->refBackend->hasUserListings();
340
-	}
335
+    /**
336
+     * @return bool
337
+     */
338
+    public function hasUserListings() {
339
+        return $this->refBackend->hasUserListings();
340
+    }
341 341
 
342
-	/**
343
-	 * Count the number of users
344
-	 *
345
-	 * @return int|bool
346
-	 */
347
-	public function countUsers() {
348
-		$users = false;
349
-		foreach ($this->backends as $backend) {
350
-			$backendUsers = $backend->countUsers();
351
-			if ($backendUsers !== false) {
352
-				$users += $backendUsers;
353
-			}
354
-		}
355
-		return $users;
356
-	}
342
+    /**
343
+     * Count the number of users
344
+     *
345
+     * @return int|bool
346
+     */
347
+    public function countUsers() {
348
+        $users = false;
349
+        foreach ($this->backends as $backend) {
350
+            $backendUsers = $backend->countUsers();
351
+            if ($backendUsers !== false) {
352
+                $users += $backendUsers;
353
+            }
354
+        }
355
+        return $users;
356
+    }
357 357
 
358
-	/**
359
-	 * Return access for LDAP interaction.
360
-	 *
361
-	 * @param string $uid
362
-	 * @return Access instance of Access for LDAP interaction
363
-	 */
364
-	public function getLDAPAccess($uid) {
365
-		return $this->handleRequest($uid, 'getLDAPAccess', [$uid]);
366
-	}
358
+    /**
359
+     * Return access for LDAP interaction.
360
+     *
361
+     * @param string $uid
362
+     * @return Access instance of Access for LDAP interaction
363
+     */
364
+    public function getLDAPAccess($uid) {
365
+        return $this->handleRequest($uid, 'getLDAPAccess', [$uid]);
366
+    }
367 367
 
368
-	/**
369
-	 * Return a new LDAP connection for the specified user.
370
-	 * The connection needs to be closed manually.
371
-	 *
372
-	 * @param string $uid
373
-	 * @return resource of the LDAP connection
374
-	 */
375
-	public function getNewLDAPConnection($uid) {
376
-		return $this->handleRequest($uid, 'getNewLDAPConnection', [$uid]);
377
-	}
368
+    /**
369
+     * Return a new LDAP connection for the specified user.
370
+     * The connection needs to be closed manually.
371
+     *
372
+     * @param string $uid
373
+     * @return resource of the LDAP connection
374
+     */
375
+    public function getNewLDAPConnection($uid) {
376
+        return $this->handleRequest($uid, 'getNewLDAPConnection', [$uid]);
377
+    }
378 378
 
379
-	/**
380
-	 * Creates a new user in LDAP
381
-	 *
382
-	 * @param $username
383
-	 * @param $password
384
-	 * @return bool
385
-	 */
386
-	public function createUser($username, $password) {
387
-		return $this->handleRequest($username, 'createUser', [$username, $password]);
388
-	}
379
+    /**
380
+     * Creates a new user in LDAP
381
+     *
382
+     * @param $username
383
+     * @param $password
384
+     * @return bool
385
+     */
386
+    public function createUser($username, $password) {
387
+        return $this->handleRequest($username, 'createUser', [$username, $password]);
388
+    }
389 389
 }
Please login to merge, or discard this patch.
apps/user_ldap/lib/BackendUtility.php 1 patch
Indentation   +8 added lines, -8 removed lines patch added patch discarded remove patch
@@ -26,13 +26,13 @@
 block discarded – undo
26 26
 namespace OCA\User_LDAP;
27 27
 
28 28
 abstract class BackendUtility {
29
-	protected $access;
29
+    protected $access;
30 30
 
31
-	/**
32
-	 * constructor, make sure the subclasses call this one!
33
-	 * @param Access $access an instance of Access for LDAP interaction
34
-	 */
35
-	public function __construct(Access $access) {
36
-		$this->access = $access;
37
-	}
31
+    /**
32
+     * constructor, make sure the subclasses call this one!
33
+     * @param Access $access an instance of Access for LDAP interaction
34
+     */
35
+    public function __construct(Access $access) {
36
+        $this->access = $access;
37
+    }
38 38
 }
Please login to merge, or discard this patch.
apps/user_ldap/ajax/getNewServerConfigPrefix.php 2 patches
Indentation   +5 added lines, -5 removed lines patch added patch discarded remove patch
@@ -38,12 +38,12 @@
 block discarded – undo
38 38
 
39 39
 $newConfig = new \OCA\User_LDAP\Configuration($nk, false);
40 40
 if (isset($_POST['copyConfig'])) {
41
-	$originalConfig = new \OCA\User_LDAP\Configuration($_POST['copyConfig']);
42
-	$newConfig->setConfiguration($originalConfig->getConfiguration());
41
+    $originalConfig = new \OCA\User_LDAP\Configuration($_POST['copyConfig']);
42
+    $newConfig->setConfiguration($originalConfig->getConfiguration());
43 43
 } else {
44
-	$configuration = new \OCA\User_LDAP\Configuration($nk, false);
45
-	$newConfig->setConfiguration($configuration->getDefaults());
46
-	$resultData['defaults'] = $configuration->getDefaults();
44
+    $configuration = new \OCA\User_LDAP\Configuration($nk, false);
45
+    $newConfig->setConfiguration($configuration->getDefaults());
46
+    $resultData['defaults'] = $configuration->getDefaults();
47 47
 }
48 48
 $newConfig->saveConfiguration();
49 49
 
Please login to merge, or discard this patch.
Spacing   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -33,7 +33,7 @@
 block discarded – undo
33 33
 $serverConnections = $helper->getServerConfigurationPrefixes();
34 34
 sort($serverConnections);
35 35
 $lk = array_pop($serverConnections);
36
-$ln = (int)str_replace('s', '', $lk);
36
+$ln = (int) str_replace('s', '', $lk);
37 37
 $nk = 's'.str_pad($ln + 1, 2, '0', STR_PAD_LEFT);
38 38
 
39 39
 $resultData = ['configPrefix' => $nk];
Please login to merge, or discard this patch.
apps/encryption/lib/Util.php 2 patches
Spacing   +2 added lines, -2 removed lines patch added patch discarded remove patch
@@ -167,7 +167,7 @@  discard block
 block discarded – undo
167 167
 	 * @return bool
168 168
 	 */
169 169
 	public function userHasFiles($uid) {
170
-		return $this->files->file_exists($uid . '/files');
170
+		return $this->files->file_exists($uid.'/files');
171 171
 	}
172 172
 
173 173
 	/**
@@ -183,7 +183,7 @@  discard block
 block discarded – undo
183 183
 		if (count($parts) > 1) {
184 184
 			$owner = $parts[1];
185 185
 			if ($this->userManager->userExists($owner) === false) {
186
-				throw new \BadMethodCallException('Unknown user: ' .
186
+				throw new \BadMethodCallException('Unknown user: '.
187 187
 				'method expects path to a user folder relative to the data folder');
188 188
 			}
189 189
 		}
Please login to merge, or discard this patch.
Indentation   +160 added lines, -160 removed lines patch added patch discarded remove patch
@@ -36,164 +36,164 @@
 block discarded – undo
36 36
 use OCP\PreConditionNotMetException;
37 37
 
38 38
 class Util {
39
-	/**
40
-	 * @var View
41
-	 */
42
-	private $files;
43
-	/**
44
-	 * @var Crypt
45
-	 */
46
-	private $crypt;
47
-	/**
48
-	 * @var ILogger
49
-	 */
50
-	private $logger;
51
-	/**
52
-	 * @var bool|IUser
53
-	 */
54
-	private $user;
55
-	/**
56
-	 * @var IConfig
57
-	 */
58
-	private $config;
59
-	/**
60
-	 * @var IUserManager
61
-	 */
62
-	private $userManager;
63
-
64
-	/**
65
-	 * Util constructor.
66
-	 *
67
-	 * @param View $files
68
-	 * @param Crypt $crypt
69
-	 * @param ILogger $logger
70
-	 * @param IUserSession $userSession
71
-	 * @param IConfig $config
72
-	 * @param IUserManager $userManager
73
-	 */
74
-	public function __construct(View $files,
75
-								Crypt $crypt,
76
-								ILogger $logger,
77
-								IUserSession $userSession,
78
-								IConfig $config,
79
-								IUserManager $userManager
80
-	) {
81
-		$this->files = $files;
82
-		$this->crypt = $crypt;
83
-		$this->logger = $logger;
84
-		$this->user = $userSession && $userSession->isLoggedIn() ? $userSession->getUser() : false;
85
-		$this->config = $config;
86
-		$this->userManager = $userManager;
87
-	}
88
-
89
-	/**
90
-	 * check if recovery key is enabled for user
91
-	 *
92
-	 * @param string $uid
93
-	 * @return bool
94
-	 */
95
-	public function isRecoveryEnabledForUser($uid) {
96
-		$recoveryMode = $this->config->getUserValue($uid,
97
-			'encryption',
98
-			'recoveryEnabled',
99
-			'0');
100
-
101
-		return ($recoveryMode === '1');
102
-	}
103
-
104
-	/**
105
-	 * check if the home storage should be encrypted
106
-	 *
107
-	 * @return bool
108
-	 */
109
-	public function shouldEncryptHomeStorage() {
110
-		$encryptHomeStorage = $this->config->getAppValue(
111
-			'encryption',
112
-			'encryptHomeStorage',
113
-			'1'
114
-		);
115
-
116
-		return ($encryptHomeStorage === '1');
117
-	}
118
-
119
-	/**
120
-	 * set the home storage encryption on/off
121
-	 *
122
-	 * @param bool $encryptHomeStorage
123
-	 */
124
-	public function setEncryptHomeStorage($encryptHomeStorage) {
125
-		$value = $encryptHomeStorage ? '1' : '0';
126
-		$this->config->setAppValue(
127
-			'encryption',
128
-			'encryptHomeStorage',
129
-			$value
130
-		);
131
-	}
132
-
133
-	/**
134
-	 * check if master key is enabled
135
-	 *
136
-	 * @return bool
137
-	 */
138
-	public function isMasterKeyEnabled() {
139
-		$userMasterKey = $this->config->getAppValue('encryption', 'useMasterKey', '1');
140
-		return ($userMasterKey === '1');
141
-	}
142
-
143
-	/**
144
-	 * @param $enabled
145
-	 * @return bool
146
-	 */
147
-	public function setRecoveryForUser($enabled) {
148
-		$value = $enabled ? '1' : '0';
149
-
150
-		try {
151
-			$this->config->setUserValue($this->user->getUID(),
152
-				'encryption',
153
-				'recoveryEnabled',
154
-				$value);
155
-			return true;
156
-		} catch (PreConditionNotMetException $e) {
157
-			return false;
158
-		}
159
-	}
160
-
161
-	/**
162
-	 * @param string $uid
163
-	 * @return bool
164
-	 */
165
-	public function userHasFiles($uid) {
166
-		return $this->files->file_exists($uid . '/files');
167
-	}
168
-
169
-	/**
170
-	 * get owner from give path, path relative to data/ expected
171
-	 *
172
-	 * @param string $path relative to data/
173
-	 * @return string
174
-	 * @throws \BadMethodCallException
175
-	 */
176
-	public function getOwner($path) {
177
-		$owner = '';
178
-		$parts = explode('/', $path, 3);
179
-		if (count($parts) > 1) {
180
-			$owner = $parts[1];
181
-			if ($this->userManager->userExists($owner) === false) {
182
-				throw new \BadMethodCallException('Unknown user: ' .
183
-				'method expects path to a user folder relative to the data folder');
184
-			}
185
-		}
186
-
187
-		return $owner;
188
-	}
189
-
190
-	/**
191
-	 * get storage of path
192
-	 *
193
-	 * @param string $path
194
-	 * @return \OC\Files\Storage\Storage
195
-	 */
196
-	public function getStorage($path) {
197
-		return $this->files->getMount($path)->getStorage();
198
-	}
39
+    /**
40
+     * @var View
41
+     */
42
+    private $files;
43
+    /**
44
+     * @var Crypt
45
+     */
46
+    private $crypt;
47
+    /**
48
+     * @var ILogger
49
+     */
50
+    private $logger;
51
+    /**
52
+     * @var bool|IUser
53
+     */
54
+    private $user;
55
+    /**
56
+     * @var IConfig
57
+     */
58
+    private $config;
59
+    /**
60
+     * @var IUserManager
61
+     */
62
+    private $userManager;
63
+
64
+    /**
65
+     * Util constructor.
66
+     *
67
+     * @param View $files
68
+     * @param Crypt $crypt
69
+     * @param ILogger $logger
70
+     * @param IUserSession $userSession
71
+     * @param IConfig $config
72
+     * @param IUserManager $userManager
73
+     */
74
+    public function __construct(View $files,
75
+                                Crypt $crypt,
76
+                                ILogger $logger,
77
+                                IUserSession $userSession,
78
+                                IConfig $config,
79
+                                IUserManager $userManager
80
+    ) {
81
+        $this->files = $files;
82
+        $this->crypt = $crypt;
83
+        $this->logger = $logger;
84
+        $this->user = $userSession && $userSession->isLoggedIn() ? $userSession->getUser() : false;
85
+        $this->config = $config;
86
+        $this->userManager = $userManager;
87
+    }
88
+
89
+    /**
90
+     * check if recovery key is enabled for user
91
+     *
92
+     * @param string $uid
93
+     * @return bool
94
+     */
95
+    public function isRecoveryEnabledForUser($uid) {
96
+        $recoveryMode = $this->config->getUserValue($uid,
97
+            'encryption',
98
+            'recoveryEnabled',
99
+            '0');
100
+
101
+        return ($recoveryMode === '1');
102
+    }
103
+
104
+    /**
105
+     * check if the home storage should be encrypted
106
+     *
107
+     * @return bool
108
+     */
109
+    public function shouldEncryptHomeStorage() {
110
+        $encryptHomeStorage = $this->config->getAppValue(
111
+            'encryption',
112
+            'encryptHomeStorage',
113
+            '1'
114
+        );
115
+
116
+        return ($encryptHomeStorage === '1');
117
+    }
118
+
119
+    /**
120
+     * set the home storage encryption on/off
121
+     *
122
+     * @param bool $encryptHomeStorage
123
+     */
124
+    public function setEncryptHomeStorage($encryptHomeStorage) {
125
+        $value = $encryptHomeStorage ? '1' : '0';
126
+        $this->config->setAppValue(
127
+            'encryption',
128
+            'encryptHomeStorage',
129
+            $value
130
+        );
131
+    }
132
+
133
+    /**
134
+     * check if master key is enabled
135
+     *
136
+     * @return bool
137
+     */
138
+    public function isMasterKeyEnabled() {
139
+        $userMasterKey = $this->config->getAppValue('encryption', 'useMasterKey', '1');
140
+        return ($userMasterKey === '1');
141
+    }
142
+
143
+    /**
144
+     * @param $enabled
145
+     * @return bool
146
+     */
147
+    public function setRecoveryForUser($enabled) {
148
+        $value = $enabled ? '1' : '0';
149
+
150
+        try {
151
+            $this->config->setUserValue($this->user->getUID(),
152
+                'encryption',
153
+                'recoveryEnabled',
154
+                $value);
155
+            return true;
156
+        } catch (PreConditionNotMetException $e) {
157
+            return false;
158
+        }
159
+    }
160
+
161
+    /**
162
+     * @param string $uid
163
+     * @return bool
164
+     */
165
+    public function userHasFiles($uid) {
166
+        return $this->files->file_exists($uid . '/files');
167
+    }
168
+
169
+    /**
170
+     * get owner from give path, path relative to data/ expected
171
+     *
172
+     * @param string $path relative to data/
173
+     * @return string
174
+     * @throws \BadMethodCallException
175
+     */
176
+    public function getOwner($path) {
177
+        $owner = '';
178
+        $parts = explode('/', $path, 3);
179
+        if (count($parts) > 1) {
180
+            $owner = $parts[1];
181
+            if ($this->userManager->userExists($owner) === false) {
182
+                throw new \BadMethodCallException('Unknown user: ' .
183
+                'method expects path to a user folder relative to the data folder');
184
+            }
185
+        }
186
+
187
+        return $owner;
188
+    }
189
+
190
+    /**
191
+     * get storage of path
192
+     *
193
+     * @param string $path
194
+     * @return \OC\Files\Storage\Storage
195
+     */
196
+    public function getStorage($path) {
197
+        return $this->files->getMount($path)->getStorage();
198
+    }
199 199
 }
Please login to merge, or discard this patch.