@@ -300,7 +300,7 @@ discard block |
||
300 | 300 | * @param IRequest $request |
301 | 301 | * @throws LoginException |
302 | 302 | * @throws PasswordLoginForbiddenException |
303 | - * @return boolean |
|
303 | + * @return boolean|null |
|
304 | 304 | */ |
305 | 305 | public function logClientIn($user, $password, IRequest $request) { |
306 | 306 | $isTokenPassword = $this->isTokenPassword($password); |
@@ -340,6 +340,9 @@ discard block |
||
340 | 340 | return $this->config->getSystemValue('token_auth_enforced', false); |
341 | 341 | } |
342 | 342 | |
343 | + /** |
|
344 | + * @param string $username |
|
345 | + */ |
|
343 | 346 | protected function isTwoFactorEnforced($username) { |
344 | 347 | Util::emitHook( |
345 | 348 | '\OCA\Files_Sharing\API\Server2Server', |
@@ -56,7 +56,7 @@ |
||
56 | 56 | } |
57 | 57 | |
58 | 58 | /** |
59 | - * @param StorageConfig $storage |
|
59 | + * @param IStorageConfig $storage |
|
60 | 60 | * @param IUser $user |
61 | 61 | */ |
62 | 62 | public function manipulateStorageConfig(IStorageConfig &$storage, IUser $user = null) { |
@@ -27,7 +27,6 @@ |
||
27 | 27 | use OCP\Files\External\Backend\Backend; |
28 | 28 | use OCP\Files\External\IStorageConfig; |
29 | 29 | use OCA\Files_External\Lib\LegacyDependencyCheckPolyfill; |
30 | - |
|
31 | 30 | use OCP\IUser; |
32 | 31 | |
33 | 32 | class SMB extends Backend { |
@@ -30,7 +30,6 @@ |
||
30 | 30 | private $publicURLs; |
31 | 31 | |
32 | 32 | /** |
33 | - * @param string[] $publicURLs |
|
34 | 33 | */ |
35 | 34 | public function __construct() { |
36 | 35 | $this->publicURLs = [ |
@@ -22,11 +22,9 @@ |
||
22 | 22 | namespace OCA\Files_External\Lib\Backend; |
23 | 23 | |
24 | 24 | use OCP\IL10N; |
25 | -use OCP\Files\External\Auth\AuthMechanism; |
|
26 | 25 | use OCP\Files\External\Backend\Backend; |
27 | 26 | use OCP\Files\External\DefinitionParameter; |
28 | 27 | use OCA\Files_External\Lib\LegacyDependencyCheckPolyfill; |
29 | - |
|
30 | 28 | use OCA\Files_External\Lib\Auth\AmazonS3\AccessKey; |
31 | 29 | |
32 | 30 | class AmazonS3 extends Backend { |
@@ -207,7 +207,7 @@ |
||
207 | 207 | * @param array $groupSharesById |
208 | 208 | * @param array $subShares |
209 | 209 | * |
210 | - * @return true if the share is valid, false if it needs repair |
|
210 | + * @return boolean if the share is valid, false if it needs repair |
|
211 | 211 | */ |
212 | 212 | private function isThisShareValid($groupSharesById, $subShares) { |
213 | 213 | $foundTargets = []; |
@@ -111,6 +111,9 @@ |
||
111 | 111 | return true; |
112 | 112 | } |
113 | 113 | |
114 | + /** |
|
115 | + * @param string[] $info |
|
116 | + */ |
|
114 | 117 | public function getFileChunking($info) { |
115 | 118 | // FIXME: need a factory for better mocking support |
116 | 119 | return new \OC_FileChunking($info); |
@@ -191,7 +191,7 @@ |
||
191 | 191 | * |
192 | 192 | * @param ISystemTag $tag |
193 | 193 | * |
194 | - * @return SystemTagNode |
|
194 | + * @return SystemTagMappingNode |
|
195 | 195 | */ |
196 | 196 | private function makeNode(ISystemTag $tag) { |
197 | 197 | return new SystemTagMappingNode( |
@@ -26,7 +26,6 @@ |
||
26 | 26 | use Sabre\DAV\Exception\BadRequest; |
27 | 27 | use Sabre\DAV\Exception\PreconditionFailed; |
28 | 28 | use Sabre\DAV\ICollection; |
29 | - |
|
30 | 29 | use OCP\SystemTag\ISystemTagManager; |
31 | 30 | use OCP\SystemTag\ISystemTagObjectMapper; |
32 | 31 | use OCP\SystemTag\ISystemTag; |
@@ -25,8 +25,6 @@ |
||
25 | 25 | |
26 | 26 | use OC\Hooks\BasicEmitter; |
27 | 27 | use PhpParser\Lexer; |
28 | -use PhpParser\Node; |
|
29 | -use PhpParser\Node\Name; |
|
30 | 28 | use PhpParser\NodeTraverser; |
31 | 29 | use PhpParser\Parser; |
32 | 30 | use RecursiveCallbackFilterIterator; |
@@ -71,7 +71,7 @@ |
||
71 | 71 | * Checks if output formatter has style with specified name. |
72 | 72 | * |
73 | 73 | * @param string $name |
74 | - * @return bool |
|
74 | + * @return boolean|null |
|
75 | 75 | */ |
76 | 76 | public function hasStyle($name) { |
77 | 77 | $this->formatter->hasStyle($name); |