@@ -271,8 +271,8 @@ |
||
271 | 271 | } |
272 | 272 | |
273 | 273 | /** |
274 | - * @param $username |
|
275 | - * @param $password |
|
274 | + * @param string $username |
|
275 | + * @param string $password |
|
276 | 276 | * @return bool |
277 | 277 | */ |
278 | 278 | public function auth($username, $password) { |
@@ -327,7 +327,7 @@ |
||
327 | 327 | * split user and remote from federated cloud id |
328 | 328 | * |
329 | 329 | * @param string $address federated share address |
330 | - * @return array [user, remoteURL] |
|
330 | + * @return string[] [user, remoteURL] |
|
331 | 331 | * @throws \Exception |
332 | 332 | */ |
333 | 333 | public function splitUserRemote($address) { |
@@ -856,7 +856,7 @@ |
||
856 | 856 | * Get the certificate manager for the user |
857 | 857 | * |
858 | 858 | * @param string $userId (optional) if not specified the current loggedin user is used |
859 | - * @return \OCP\ICertificateManager | null if $uid is null and no user is logged in |
|
859 | + * @return null|CertificateManager | null if $uid is null and no user is logged in |
|
860 | 860 | */ |
861 | 861 | public function getCertificateManager($userId = null) { |
862 | 862 | if (is_null($userId)) { |
@@ -25,7 +25,6 @@ discard block |
||
25 | 25 | use OCP\IUserManager; |
26 | 26 | use OCP\Share\IManager; |
27 | 27 | use OCP\Share\IProviderFactory; |
28 | -use OC\Share20\Exception\BackendError; |
|
29 | 28 | use OCP\IConfig; |
30 | 29 | use OCP\IL10N; |
31 | 30 | use OCP\ILogger; |
@@ -35,7 +34,6 @@ discard block |
||
35 | 34 | use OCP\IGroupManager; |
36 | 35 | use OCP\Files\File; |
37 | 36 | use OCP\Files\Folder; |
38 | - |
|
39 | 37 | use OCP\Share\Exceptions\ShareNotFound; |
40 | 38 | use OCP\Share\Exceptions\GenericShareException; |
41 | 39 |
@@ -28,7 +28,6 @@ |
||
28 | 28 | use Symfony\Component\Console\Command\Command; |
29 | 29 | use Symfony\Component\Console\Helper\Table; |
30 | 30 | use Symfony\Component\Console\Input\InputInterface; |
31 | -use Symfony\Component\Console\Input\InputOption; |
|
32 | 31 | use Symfony\Component\Console\Output\OutputInterface; |
33 | 32 | |
34 | 33 | class ListCertificates extends Base { |
@@ -131,7 +131,7 @@ |
||
131 | 131 | } |
132 | 132 | |
133 | 133 | /** |
134 | - * @param $message |
|
134 | + * @param string $message |
|
135 | 135 | * @param array $additional |
136 | 136 | * @return array |
137 | 137 | */ |
@@ -97,7 +97,7 @@ |
||
97 | 97 | } |
98 | 98 | |
99 | 99 | /** |
100 | - * @param string|int $category |
|
100 | + * @param string $category |
|
101 | 101 | * @return int |
102 | 102 | */ |
103 | 103 | protected function getCategory($category) { |
@@ -70,7 +70,7 @@ discard block |
||
70 | 70 | * |
71 | 71 | * @NoAdminRequired |
72 | 72 | * @NoSubadminRequired |
73 | - * @return array |
|
73 | + * @return DataResponse |
|
74 | 74 | */ |
75 | 75 | public function addPersonalRootCertificate() { |
76 | 76 | return $this->addCertificate($this->userCertificateManager); |
@@ -80,7 +80,7 @@ discard block |
||
80 | 80 | * Add a new root certificate to a trust store |
81 | 81 | * |
82 | 82 | * @param ICertificateManager $certificateManager |
83 | - * @return array |
|
83 | + * @return DataResponse |
|
84 | 84 | */ |
85 | 85 | private function addCertificate(ICertificateManager $certificateManager) { |
86 | 86 | $headers = []; |
@@ -158,7 +158,7 @@ discard block |
||
158 | 158 | /** |
159 | 159 | * Add a new personal root certificate to the system's trust store |
160 | 160 | * |
161 | - * @return array |
|
161 | + * @return DataResponse |
|
162 | 162 | */ |
163 | 163 | public function addSystemRootCertificate() { |
164 | 164 | return $this->addCertificate($this->systemCertificateManager); |
@@ -268,7 +268,7 @@ |
||
268 | 268 | |
269 | 269 | /** |
270 | 270 | * @NoCSRFRequired |
271 | - * @return DataResponse |
|
271 | + * @return DataDisplayResponse |
|
272 | 272 | */ |
273 | 273 | public function getFailedIntegrityCheckFiles() { |
274 | 274 | $completeResults = $this->checker->getResults(); |