Passed
Push — dev ( 8b84d5...475726 )
by Nils
05:50
created
sources/main.functions.php 1 patch
Indentation   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -2226,7 +2226,7 @@
 block discarded – undo
2226 2226
  * <tt>exec("find ".$path." -type d -exec chmod 755 {} \;");</tt>
2227 2227
  *
2228 2228
  * @author Jeppe Toustrup (tenzer at tenzer dot dk)
2229
-  *
2229
+ *
2230 2230
  * @param string $path      An either relative or absolute path to a file or directory which should be processed.
2231 2231
  * @param int    $filePerm The permissions any found files should get.
2232 2232
  * @param int    $dirPerm  The permissions any found folder should get.
Please login to merge, or discard this patch.
api/Model/AuthModel.php 1 patch
Indentation   +2 added lines, -2 removed lines patch added patch discarded remove patch
@@ -94,7 +94,7 @@  discard block
 block discarded – undo
94 94
     {
95 95
         require API_ROOT_PATH . '/../includes/config/tp.config.php';
96 96
         $headers = ['alg'=>'HS256','typ'=>'JWT'];
97
-		$payload = [
97
+        $payload = [
98 98
             'username' => $login,
99 99
             'id' => $id, 
100 100
             'exp' => (time() + $SETTINGS['api_token_duration'] + 600),
@@ -105,7 +105,7 @@  discard block
 block discarded – undo
105 105
         ];
106 106
 
107 107
         include_once API_ROOT_PATH . '/inc/jwt_utils.php';
108
-		return ['token' => generate_jwt($headers, $payload)];
108
+        return ['token' => generate_jwt($headers, $payload)];
109 109
     }
110 110
 
111 111
     //end createUserJWT
Please login to merge, or discard this patch.
api/Model/FolderModel.php 1 patch
Indentation   +4 added lines, -4 removed lines patch added patch discarded remove patch
@@ -34,7 +34,7 @@  discard block
 block discarded – undo
34 34
         $ret = [];
35 35
 
36 36
         foreach ($rows as $row) {
37
-			$isVisible = in_array((int) $row['id'], $foldersId);
37
+            $isVisible = in_array((int) $row['id'], $foldersId);
38 38
             $childrens = $this->getFoldersChildren($row['id'], $foldersId);
39 39
 
40 40
             if ($isVisible || count($childrens) > 0) {
@@ -43,7 +43,7 @@  discard block
 block discarded – undo
43 43
                     [
44 44
                         'id' => (int) $row['id'],
45 45
                         'title' => $row['title'],
46
-						'isVisible' => $isVisible,
46
+                        'isVisible' => $isVisible,
47 47
                         'childrens' => $childrens
48 48
                     ]
49 49
                 );
@@ -63,7 +63,7 @@  discard block
 block discarded – undo
63 63
 
64 64
         if ( count($childrens) > 0) {
65 65
             foreach ($childrens as $children) {
66
-				$isVisible = in_array((int) $children['id'], $foldersId);
66
+                $isVisible = in_array((int) $children['id'], $foldersId);
67 67
                 $childs = $this->getFoldersChildren($children['id'], $foldersId);
68 68
 
69 69
                 if (in_array((int) $children['id'], $foldersId) || count($childs) > 0) {
@@ -72,7 +72,7 @@  discard block
 block discarded – undo
72 72
                         [
73 73
                             'id' => (int) $children['id'],
74 74
                             'title' => $children['title'],
75
-							'isVisible' => $isVisible,
75
+                            'isVisible' => $isVisible,
76 76
                             'childrens' => $childs
77 77
                         ]
78 78
                     );
Please login to merge, or discard this patch.
pages/search.js.php 1 patch
Indentation   +22 added lines, -22 removed lines patch added patch discarded remove patch
@@ -2,28 +2,28 @@
 block discarded – undo
2 2
 
3 3
 declare(strict_types=1);
4 4
 
5
- /**
6
-  * Teampass - a collaborative passwords manager.
7
-  * ---
8
-  * This library is distributed in the hope that it will be useful,
9
-  * but WITHOUT ANY WARRANTY; without even the implied warranty of
10
-  *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
11
-  * ---
12
-  *
13
-  * @project   Teampass
14
-  *
15
-  * @file      search.js.php
16
-  * ---
17
-  *
18
-  * @author    Nils LaumaillĂ© ([email protected])
19
-  *
20
-  * @copyright 2009-2023 Teampass.net
21
-  *
22
-  * @license   https://spdx.org/licenses/GPL-3.0-only.html#licenseText GPL-3.0
23
-  * ---
24
-  *
25
-  * @see       https://www.teampass.net
26
-  */
5
+    /**
6
+     * Teampass - a collaborative passwords manager.
7
+     * ---
8
+     * This library is distributed in the hope that it will be useful,
9
+     * but WITHOUT ANY WARRANTY; without even the implied warranty of
10
+     *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
11
+     * ---
12
+     *
13
+     * @project   Teampass
14
+     *
15
+     * @file      search.js.php
16
+     * ---
17
+     *
18
+     * @author    Nils LaumaillĂ© ([email protected])
19
+     *
20
+     * @copyright 2009-2023 Teampass.net
21
+     *
22
+     * @license   https://spdx.org/licenses/GPL-3.0-only.html#licenseText GPL-3.0
23
+     * ---
24
+     *
25
+     * @see       https://www.teampass.net
26
+     */
27 27
 
28 28
 Use TeampassClasses\PerformChecks\PerformChecks;
29 29
 
Please login to merge, or discard this patch.
api/inc/jwt_utils.php 1 patch
Indentation   +44 added lines, -44 removed lines patch added patch discarded remove patch
@@ -26,43 +26,43 @@  discard block
 block discarded – undo
26 26
 Use TeampassClasses\SuperGlobal\SuperGlobal;
27 27
 
28 28
 function generate_jwt($headers, $payload) {
29
-	$headers_encoded = base64url_encode(json_encode($headers));
29
+    $headers_encoded = base64url_encode(json_encode($headers));
30 30
 	
31
-	$payload_encoded = base64url_encode(json_encode($payload));
31
+    $payload_encoded = base64url_encode(json_encode($payload));
32 32
 	
33
-	$signature = hash_hmac('SHA256', "$headers_encoded.$payload_encoded", DB_PASSWD, true);
34
-	$signature_encoded = base64url_encode($signature);
33
+    $signature = hash_hmac('SHA256', "$headers_encoded.$payload_encoded", DB_PASSWD, true);
34
+    $signature_encoded = base64url_encode($signature);
35 35
 	
36
-	$jwt = "$headers_encoded.$payload_encoded.$signature_encoded";
36
+    $jwt = "$headers_encoded.$payload_encoded.$signature_encoded";
37 37
 	
38
-	return $jwt;
38
+    return $jwt;
39 39
 }
40 40
 
41 41
 function is_jwt_valid($jwt) {
42
-	// split the jwt
43
-	$tokenParts = explode('.', $jwt);
44
-	$header = base64_decode($tokenParts[0]);
45
-	$payload = base64_decode($tokenParts[1]);
46
-	$signature_provided = $tokenParts[2];
42
+    // split the jwt
43
+    $tokenParts = explode('.', $jwt);
44
+    $header = base64_decode($tokenParts[0]);
45
+    $payload = base64_decode($tokenParts[1]);
46
+    $signature_provided = $tokenParts[2];
47 47
 
48
-	// check the expiration time - note this will cause an error if there is no 'exp' claim in the jwt
49
-	$expiration = json_decode($payload)->exp;
50
-	$is_token_expired = ($expiration - time()) < 0;
48
+    // check the expiration time - note this will cause an error if there is no 'exp' claim in the jwt
49
+    $expiration = json_decode($payload)->exp;
50
+    $is_token_expired = ($expiration - time()) < 0;
51 51
 
52
-	// build a signature based on the header and payload using the secret
53
-	$base64_url_header = base64url_encode($header);
54
-	$base64_url_payload = base64url_encode($payload);
55
-	$signature = hash_hmac('SHA256', $base64_url_header . "." . $base64_url_payload, DB_PASSWD, true);
56
-	$base64_url_signature = base64url_encode($signature);
52
+    // build a signature based on the header and payload using the secret
53
+    $base64_url_header = base64url_encode($header);
54
+    $base64_url_payload = base64url_encode($payload);
55
+    $signature = hash_hmac('SHA256', $base64_url_header . "." . $base64_url_payload, DB_PASSWD, true);
56
+    $base64_url_signature = base64url_encode($signature);
57 57
 
58
-	// verify it matches the signature provided in the jwt
59
-	$is_signature_valid = ($base64_url_signature === $signature_provided);
58
+    // verify it matches the signature provided in the jwt
59
+    $is_signature_valid = ($base64_url_signature === $signature_provided);
60 60
 	
61
-	if ($is_token_expired || !$is_signature_valid) {
62
-		return FALSE;
63
-	} else {
64
-		return TRUE;
65
-	}
61
+    if ($is_token_expired || !$is_signature_valid) {
62
+        return FALSE;
63
+    } else {
64
+        return TRUE;
65
+    }
66 66
 }
67 67
 
68 68
 function base64url_encode($data) {
@@ -70,24 +70,24 @@  discard block
 block discarded – undo
70 70
 }
71 71
 
72 72
 function get_authorization_header(){
73
-	$superGlobal = new SuperGlobal();
74
-	$headers = null;
73
+    $superGlobal = new SuperGlobal();
74
+    $headers = null;
75 75
 	
76
-	if (null !== $superGlobal->get('Authorization', 'SERVER')) {
77
-		$headers = trim($superGlobal->get('Authorization', 'SERVER'));
78
-	} else if (null !== $superGlobal->get('HTTP_AUTHORIZATION', 'SERVER')) { //Nginx or fast CGI
79
-		$headers = trim($superGlobal->get('HTTP_AUTHORIZATION', 'SERVER'));
80
-	} else if (function_exists('apache_request_headers') === true) {
81
-		$requestHeaders = (array) apache_request_headers();
82
-		// Server-side fix for bug in old Android versions (a nice side-effect of this fix means we don't care about capitalization for Authorization)
83
-		$requestHeaders = array_combine(array_map('ucwords', array_keys($requestHeaders)), array_values($requestHeaders));
84
-		//print_r($requestHeaders);
85
-		if (isset($requestHeaders['Authorization']) === true) {
86
-			$headers = trim($requestHeaders['Authorization']);
87
-		}
88
-	}
76
+    if (null !== $superGlobal->get('Authorization', 'SERVER')) {
77
+        $headers = trim($superGlobal->get('Authorization', 'SERVER'));
78
+    } else if (null !== $superGlobal->get('HTTP_AUTHORIZATION', 'SERVER')) { //Nginx or fast CGI
79
+        $headers = trim($superGlobal->get('HTTP_AUTHORIZATION', 'SERVER'));
80
+    } else if (function_exists('apache_request_headers') === true) {
81
+        $requestHeaders = (array) apache_request_headers();
82
+        // Server-side fix for bug in old Android versions (a nice side-effect of this fix means we don't care about capitalization for Authorization)
83
+        $requestHeaders = array_combine(array_map('ucwords', array_keys($requestHeaders)), array_values($requestHeaders));
84
+        //print_r($requestHeaders);
85
+        if (isset($requestHeaders['Authorization']) === true) {
86
+            $headers = trim($requestHeaders['Authorization']);
87
+        }
88
+    }
89 89
 	
90
-	return $headers;
90
+    return $headers;
91 91
 }
92 92
 
93 93
 function get_bearer_token() {
@@ -104,8 +104,8 @@  discard block
 block discarded – undo
104 104
 
105 105
 function get_bearer_data($jwt) {
106 106
     // split the jwt
107
-	$tokenParts = explode('.', $jwt);
108
-	$payload = base64_decode($tokenParts[1]);
107
+    $tokenParts = explode('.', $jwt);
108
+    $payload = base64_decode($tokenParts[1]);
109 109
 	
110 110
     // HEADER: Get the access token from the header
111 111
     if (empty($payload) === false) {
Please login to merge, or discard this patch.