@@ -278,6 +278,7 @@ |
||
| 278 | 278 | * get default share folder |
| 279 | 279 | * |
| 280 | 280 | * @param \OC\Files\View |
| 281 | + * @param View $view |
|
| 281 | 282 | * @return string |
| 282 | 283 | */ |
| 283 | 284 | public static function getShareFolder($view = null) { |
@@ -300,7 +300,7 @@ discard block |
||
| 300 | 300 | * @param IRequest $request |
| 301 | 301 | * @throws LoginException |
| 302 | 302 | * @throws PasswordLoginForbiddenException |
| 303 | - * @return boolean |
|
| 303 | + * @return boolean|null |
|
| 304 | 304 | */ |
| 305 | 305 | public function logClientIn($user, $password, IRequest $request) { |
| 306 | 306 | $isTokenPassword = $this->isTokenPassword($password); |
@@ -340,6 +340,9 @@ discard block |
||
| 340 | 340 | return $this->config->getSystemValue('token_auth_enforced', false); |
| 341 | 341 | } |
| 342 | 342 | |
| 343 | + /** |
|
| 344 | + * @param string $username |
|
| 345 | + */ |
|
| 343 | 346 | protected function isTwoFactorEnforced($username) { |
| 344 | 347 | Util::emitHook( |
| 345 | 348 | '\OCA\Files_Sharing\API\Server2Server', |
@@ -27,13 +27,8 @@ |
||
| 27 | 27 | use OCA\Files_External\Lib\DefinitionParameter; |
| 28 | 28 | use OCA\Files_External\Service\BackendService; |
| 29 | 29 | use Symfony\Component\Console\Command\Command; |
| 30 | -use Symfony\Component\Console\Helper\Table; |
|
| 31 | -use Symfony\Component\Console\Helper\TableHelper; |
|
| 32 | -use Symfony\Component\Console\Input\ArrayInput; |
|
| 33 | 30 | use Symfony\Component\Console\Input\InputArgument; |
| 34 | 31 | use Symfony\Component\Console\Input\InputInterface; |
| 35 | -use Symfony\Component\Console\Input\InputOption; |
|
| 36 | -use Symfony\Component\Console\Input\Input; |
|
| 37 | 32 | use Symfony\Component\Console\Output\OutputInterface; |
| 38 | 33 | |
| 39 | 34 | class Backends extends Base { |
@@ -207,7 +207,7 @@ |
||
| 207 | 207 | * @param array $groupSharesById |
| 208 | 208 | * @param array $subShares |
| 209 | 209 | * |
| 210 | - * @return true if the share is valid, false if it needs repair |
|
| 210 | + * @return boolean if the share is valid, false if it needs repair |
|
| 211 | 211 | */ |
| 212 | 212 | private function isThisShareValid($groupSharesById, $subShares) { |
| 213 | 213 | $foundTargets = []; |
@@ -566,7 +566,7 @@ |
||
| 566 | 566 | /** |
| 567 | 567 | * update permissions in database |
| 568 | 568 | * |
| 569 | - * @param IShare $share |
|
| 569 | + * @param Share\IShare $share |
|
| 570 | 570 | * @param int $permissions |
| 571 | 571 | */ |
| 572 | 572 | protected function updatePermissionsInDatabase(IShare $share, $permissions) { |
@@ -395,7 +395,7 @@ discard block |
||
| 395 | 395 | |
| 396 | 396 | /** |
| 397 | 397 | * returns the internal ownCloud name for the given LDAP DN of the user, false on DN outside of search DN or failure |
| 398 | - * @param string $dn the dn of the user object |
|
| 398 | + * @param string $fdn the dn of the user object |
|
| 399 | 399 | * @param string $ldapName optional, the display name of the object |
| 400 | 400 | * @return string|false with with the name to use in ownCloud |
| 401 | 401 | */ |
@@ -412,7 +412,7 @@ discard block |
||
| 412 | 412 | |
| 413 | 413 | /** |
| 414 | 414 | * returns an internal ownCloud name for the given LDAP DN, false on DN outside of search DN |
| 415 | - * @param string $dn the dn of the user object |
|
| 415 | + * @param string $fdn the dn of the user object |
|
| 416 | 416 | * @param string $ldapName optional, the display name of the object |
| 417 | 417 | * @param bool $isUser optional, whether it is a user object (otherwise group assumed) |
| 418 | 418 | * @return string|false with with the name to use in ownCloud |
@@ -672,7 +672,7 @@ discard block |
||
| 672 | 672 | * the login filter. |
| 673 | 673 | * |
| 674 | 674 | * @param string $loginName |
| 675 | - * @param array $attributes optional, list of attributes to read |
|
| 675 | + * @param string[] $attributes optional, list of attributes to read |
|
| 676 | 676 | * @return array |
| 677 | 677 | */ |
| 678 | 678 | public function fetchUsersByLoginName($loginName, $attributes = array('dn')) { |
@@ -745,7 +745,7 @@ discard block |
||
| 745 | 745 | |
| 746 | 746 | /** |
| 747 | 747 | * @param string $filter |
| 748 | - * @param string|string[] $attr |
|
| 748 | + * @param string[] $attr |
|
| 749 | 749 | * @param int $limit |
| 750 | 750 | * @param int $offset |
| 751 | 751 | * @return array |
@@ -793,7 +793,7 @@ discard block |
||
| 793 | 793 | |
| 794 | 794 | /** |
| 795 | 795 | * @param string $filter |
| 796 | - * @param string|string[] $attr |
|
| 796 | + * @param string[] $attr |
|
| 797 | 797 | * @param int $limit |
| 798 | 798 | * @param int $offset |
| 799 | 799 | * @return false|int |
@@ -843,6 +843,7 @@ discard block |
||
| 843 | 843 | * retrieved. Results will according to the order in the array. |
| 844 | 844 | * @param int $limit optional, maximum results to be counted |
| 845 | 845 | * @param int $offset optional, a starting point |
| 846 | + * @param string $filter |
|
| 846 | 847 | * @return array|false array with the search result as first value and pagedSearchOK as |
| 847 | 848 | * second | false if not successful |
| 848 | 849 | */ |
@@ -889,7 +890,7 @@ discard block |
||
| 889 | 890 | * @param bool $pagedSearchOK whether a paged search has been executed |
| 890 | 891 | * @param bool $skipHandling required for paged search when cookies to |
| 891 | 892 | * prior results need to be gained |
| 892 | - * @return bool cookie validity, true if we have more pages, false otherwise. |
|
| 893 | + * @return null|boolean cookie validity, true if we have more pages, false otherwise. |
|
| 893 | 894 | */ |
| 894 | 895 | private function processPagedSearchStatus($sr, $filter, $base, $iFoundItems, $limit, $offset, $pagedSearchOK, $skipHandling) { |
| 895 | 896 | $cookie = null; |
@@ -1098,7 +1099,7 @@ discard block |
||
| 1098 | 1099 | |
| 1099 | 1100 | /** |
| 1100 | 1101 | * @param string $name |
| 1101 | - * @return bool|mixed|string |
|
| 1102 | + * @return string |
|
| 1102 | 1103 | */ |
| 1103 | 1104 | public function sanitizeUsername($name) { |
| 1104 | 1105 | if($this->connection->ldapIgnoreNamingRules) { |
@@ -1122,6 +1123,7 @@ discard block |
||
| 1122 | 1123 | * escapes (user provided) parts for LDAP filter |
| 1123 | 1124 | * @param string $input, the provided value |
| 1124 | 1125 | * @param bool $allowAsterisk whether in * at the beginning should be preserved |
| 1126 | + * @param string $input |
|
| 1125 | 1127 | * @return string the escaped string |
| 1126 | 1128 | */ |
| 1127 | 1129 | public function escapeFilterPart($input, $allowAsterisk = false) { |
@@ -1100,7 +1100,7 @@ |
||
| 1100 | 1100 | } |
| 1101 | 1101 | |
| 1102 | 1102 | /** |
| 1103 | - * @param array $reqs |
|
| 1103 | + * @param string[] $reqs |
|
| 1104 | 1104 | * @return bool |
| 1105 | 1105 | */ |
| 1106 | 1106 | private function checkRequirements($reqs) { |
@@ -70,7 +70,7 @@ discard block |
||
| 70 | 70 | |
| 71 | 71 | /** |
| 72 | 72 | * @param array $entry |
| 73 | - * @return array |
|
| 73 | + * @return string |
|
| 74 | 74 | */ |
| 75 | 75 | protected function formatCacheEntry($entry) { |
| 76 | 76 | if (isset($entry['path'])) { |
@@ -189,6 +189,9 @@ discard block |
||
| 189 | 189 | return $this->cache->getStatus($this->getSourcePath($file)); |
| 190 | 190 | } |
| 191 | 191 | |
| 192 | + /** |
|
| 193 | + * @param \OCP\Files\Cache\ICacheEntry[] $results |
|
| 194 | + */ |
|
| 192 | 195 | private function formatSearchResults($results) { |
| 193 | 196 | $results = array_filter($results, array($this, 'filterCacheEntry')); |
| 194 | 197 | $results = array_values($results); |
@@ -52,7 +52,7 @@ |
||
| 52 | 52 | * Wrapper around file_put_contents($filename, $data) |
| 53 | 53 | * |
| 54 | 54 | * @param string $filename |
| 55 | - * @param $data |
|
| 55 | + * @param string $data |
|
| 56 | 56 | * @return int|false |
| 57 | 57 | */ |
| 58 | 58 | public function file_put_contents($filename, $data) { |