@@ -52,7 +52,9 @@ discard block |
||
| 52 | 52 | parent::__construct(); |
| 53 | 53 | |
| 54 | 54 | // Better to use injector to set these |
| 55 | - if(func_num_args() == 0) return; |
|
| 55 | + if(func_num_args() == 0) { |
|
| 56 | + return; |
|
| 57 | + } |
|
| 56 | 58 | Deprecation::notice( |
| 57 | 59 | '1.2.0', |
| 58 | 60 | "Don't construct DNData with parameters. Assign settings via properties instead" |
@@ -78,7 +80,9 @@ discard block |
||
| 78 | 80 | * @param string $environmentDir |
| 79 | 81 | */ |
| 80 | 82 | public function setEnvironmentDir($environmentDir) { |
| 81 | - if($environmentDir[0] != "/") $environmentDir = BASE_PATH . '/' . $environmentDir; |
|
| 83 | + if($environmentDir[0] != "/") { |
|
| 84 | + $environmentDir = BASE_PATH . '/' . $environmentDir; |
|
| 85 | + } |
|
| 82 | 86 | $this->environmentDir = realpath($environmentDir) ?: $environmentDir; |
| 83 | 87 | } |
| 84 | 88 | |
@@ -97,7 +101,9 @@ discard block |
||
| 97 | 101 | * @param string $keyDir |
| 98 | 102 | */ |
| 99 | 103 | public function setKeyDir($keyDir) { |
| 100 | - if($keyDir[0] != "/") $keyDir = BASE_PATH . '/' . $keyDir; |
|
| 104 | + if($keyDir[0] != "/") { |
|
| 105 | + $keyDir = BASE_PATH . '/' . $keyDir; |
|
| 106 | + } |
|
| 101 | 107 | $this->keyDir = realpath($keyDir) ?: $keyDir; |
| 102 | 108 | } |
| 103 | 109 | |
@@ -137,7 +143,9 @@ discard block |
||
| 137 | 143 | * @param string $transferDir |
| 138 | 144 | */ |
| 139 | 145 | public function setDataTransferDir($transferDir) { |
| 140 | - if($transferDir[0] != "/") $transferDir = BASE_PATH . '/' . $transferDir; |
|
| 146 | + if($transferDir[0] != "/") { |
|
| 147 | + $transferDir = BASE_PATH . '/' . $transferDir; |
|
| 148 | + } |
|
| 141 | 149 | if(strpos($transferDir, ASSETS_PATH) === false) { |
| 142 | 150 | throw new LogicException(sprintf( |
| 143 | 151 | 'DNData::dataTransferDir needs to be located within <webroot>assets/ (location: %s)', |
@@ -207,7 +207,9 @@ discard block |
||
| 207 | 207 | */ |
| 208 | 208 | public function canRestore($member = null) { |
| 209 | 209 | $memberID = $member ? $member->ID : Member::currentUserID(); |
| 210 | - if(!$memberID) return false; |
|
| 210 | + if(!$memberID) { |
|
| 211 | + return false; |
|
| 212 | + } |
|
| 211 | 213 | |
| 212 | 214 | $key = $memberID . '-' . $this->EnvironmentID; |
| 213 | 215 | if(!isset(self::$_cache_can_restore[$key])) { |
@@ -226,7 +228,9 @@ discard block |
||
| 226 | 228 | */ |
| 227 | 229 | public function canDownload($member = null) { |
| 228 | 230 | $memberID = $member ? $member->ID : Member::currentUserID(); |
| 229 | - if(!$memberID) return false; |
|
| 231 | + if(!$memberID) { |
|
| 232 | + return false; |
|
| 233 | + } |
|
| 230 | 234 | |
| 231 | 235 | $key = $memberID . '-' . $this->EnvironmentID; |
| 232 | 236 | if(!isset(self::$_cache_can_download[$key])) { |
@@ -259,14 +263,23 @@ discard block |
||
| 259 | 263 | return false; |
| 260 | 264 | } |
| 261 | 265 | |
| 262 | - if(!$member) $member = Member::currentUser(); |
|
| 263 | - if(!$member) return false; // Must be logged in to check permissions |
|
| 266 | + if(!$member) { |
|
| 267 | + $member = Member::currentUser(); |
|
| 268 | + } |
|
| 269 | + if(!$member) { |
|
| 270 | + return false; |
|
| 271 | + } |
|
| 272 | + // Must be logged in to check permissions |
|
| 264 | 273 | |
| 265 | 274 | // Admin can always move. |
| 266 | - if(Permission::checkMember($member, 'ADMIN')) return true; |
|
| 275 | + if(Permission::checkMember($member, 'ADMIN')) { |
|
| 276 | + return true; |
|
| 277 | + } |
|
| 267 | 278 | |
| 268 | 279 | // Checks if the user can actually access the archive. |
| 269 | - if (!$this->canDownload($member)) return false; |
|
| 280 | + if (!$this->canDownload($member)) { |
|
| 281 | + return false; |
|
| 282 | + } |
|
| 270 | 283 | |
| 271 | 284 | // Hooks into ArchiveUploaders permission to prevent proliferation of permission checkboxes. |
| 272 | 285 | // Bypasses the quota check - we don't need to check for it as long as we move the snapshot within the project. |
@@ -192,7 +192,9 @@ discard block |
||
| 192 | 192 | // Multiple choices, use our choice if it's legal, otherwise default to the first item on the list |
| 193 | 193 | default: |
| 194 | 194 | $backend = $this->BackendIdentifier; |
| 195 | - if(!in_array($backend, $backends)) $backend = $backends[0]; |
|
| 195 | + if(!in_array($backend, $backends)) { |
|
| 196 | + $backend = $backends[0]; |
|
| 197 | + } |
|
| 196 | 198 | } |
| 197 | 199 | |
| 198 | 200 | return Injector::inst()->get($backend); |
@@ -304,10 +306,17 @@ discard block |
||
| 304 | 306 | * @return boolean |
| 305 | 307 | */ |
| 306 | 308 | public function canView($member = null) { |
| 307 | - if(!$member) $member = Member::currentUser(); |
|
| 308 | - if(!$member) return false; // Must be logged in to check permissions |
|
| 309 | + if(!$member) { |
|
| 310 | + $member = Member::currentUser(); |
|
| 311 | + } |
|
| 312 | + if(!$member) { |
|
| 313 | + return false; |
|
| 314 | + } |
|
| 315 | + // Must be logged in to check permissions |
|
| 309 | 316 | |
| 310 | - if(Permission::checkMember($member, 'ADMIN')) return true; |
|
| 317 | + if(Permission::checkMember($member, 'ADMIN')) { |
|
| 318 | + return true; |
|
| 319 | + } |
|
| 311 | 320 | |
| 312 | 321 | // if no Viewers or ViewerGroups defined, fallback to DNProject::canView permissions |
| 313 | 322 | if($this->Viewers()->exists() || $this->ViewerGroups()->exists()) { |
@@ -325,10 +334,17 @@ discard block |
||
| 325 | 334 | * @return boolean |
| 326 | 335 | */ |
| 327 | 336 | public function canDeploy($member = null) { |
| 328 | - if(!$member) $member = Member::currentUser(); |
|
| 329 | - if(!$member) return false; // Must be logged in to check permissions |
|
| 337 | + if(!$member) { |
|
| 338 | + $member = Member::currentUser(); |
|
| 339 | + } |
|
| 340 | + if(!$member) { |
|
| 341 | + return false; |
|
| 342 | + } |
|
| 343 | + // Must be logged in to check permissions |
|
| 330 | 344 | |
| 331 | - if(Permission::checkMember($member, 'ADMIN')) return true; |
|
| 345 | + if(Permission::checkMember($member, 'ADMIN')) { |
|
| 346 | + return true; |
|
| 347 | + } |
|
| 332 | 348 | |
| 333 | 349 | return $this->Deployers()->byID($member->ID) |
| 334 | 350 | || $member->inGroups($this->DeployerGroups()); |
@@ -342,10 +358,17 @@ discard block |
||
| 342 | 358 | * @return boolean true if $member can restore, and false if they can't. |
| 343 | 359 | */ |
| 344 | 360 | public function canRestore($member = null) { |
| 345 | - if(!$member) $member = Member::currentUser(); |
|
| 346 | - if(!$member) return false; // Must be logged in to check permissions |
|
| 361 | + if(!$member) { |
|
| 362 | + $member = Member::currentUser(); |
|
| 363 | + } |
|
| 364 | + if(!$member) { |
|
| 365 | + return false; |
|
| 366 | + } |
|
| 367 | + // Must be logged in to check permissions |
|
| 347 | 368 | |
| 348 | - if(Permission::checkMember($member, 'ADMIN')) return true; |
|
| 369 | + if(Permission::checkMember($member, 'ADMIN')) { |
|
| 370 | + return true; |
|
| 371 | + } |
|
| 349 | 372 | |
| 350 | 373 | return $this->CanRestoreMembers()->byID($member->ID) |
| 351 | 374 | || $member->inGroups($this->CanRestoreGroups()); |
@@ -360,12 +383,21 @@ discard block |
||
| 360 | 383 | */ |
| 361 | 384 | public function canBackup($member = null) { |
| 362 | 385 | $project = $this->Project(); |
| 363 | - if($project->HasDiskQuota() && $project->HasExceededDiskQuota()) return false; |
|
| 386 | + if($project->HasDiskQuota() && $project->HasExceededDiskQuota()) { |
|
| 387 | + return false; |
|
| 388 | + } |
|
| 364 | 389 | |
| 365 | - if(!$member) $member = Member::currentUser(); |
|
| 366 | - if(!$member) return false; // Must be logged in to check permissions |
|
| 390 | + if(!$member) { |
|
| 391 | + $member = Member::currentUser(); |
|
| 392 | + } |
|
| 393 | + if(!$member) { |
|
| 394 | + return false; |
|
| 395 | + } |
|
| 396 | + // Must be logged in to check permissions |
|
| 367 | 397 | |
| 368 | - if(Permission::checkMember($member, 'ADMIN')) return true; |
|
| 398 | + if(Permission::checkMember($member, 'ADMIN')) { |
|
| 399 | + return true; |
|
| 400 | + } |
|
| 369 | 401 | |
| 370 | 402 | return $this->CanBackupMembers()->byID($member->ID) |
| 371 | 403 | || $member->inGroups($this->CanBackupGroups()); |
@@ -384,12 +416,21 @@ discard block |
||
| 384 | 416 | */ |
| 385 | 417 | public function canUploadArchive($member = null) { |
| 386 | 418 | $project = $this->Project(); |
| 387 | - if($project->HasDiskQuota() && $project->HasExceededDiskQuota()) return false; |
|
| 419 | + if($project->HasDiskQuota() && $project->HasExceededDiskQuota()) { |
|
| 420 | + return false; |
|
| 421 | + } |
|
| 388 | 422 | |
| 389 | - if(!$member) $member = Member::currentUser(); |
|
| 390 | - if(!$member) return false; // Must be logged in to check permissions |
|
| 423 | + if(!$member) { |
|
| 424 | + $member = Member::currentUser(); |
|
| 425 | + } |
|
| 426 | + if(!$member) { |
|
| 427 | + return false; |
|
| 428 | + } |
|
| 429 | + // Must be logged in to check permissions |
|
| 391 | 430 | |
| 392 | - if(Permission::checkMember($member, 'ADMIN')) return true; |
|
| 431 | + if(Permission::checkMember($member, 'ADMIN')) { |
|
| 432 | + return true; |
|
| 433 | + } |
|
| 393 | 434 | |
| 394 | 435 | return $this->ArchiveUploaders()->byID($member->ID) |
| 395 | 436 | || $member->inGroups($this->ArchiveUploaderGroups()); |
@@ -403,10 +444,17 @@ discard block |
||
| 403 | 444 | * @return boolean true if $member can download archives from this environment, false if they can't. |
| 404 | 445 | */ |
| 405 | 446 | public function canDownloadArchive($member = null) { |
| 406 | - if(!$member) $member = Member::currentUser(); |
|
| 407 | - if(!$member) return false; // Must be logged in to check permissions |
|
| 447 | + if(!$member) { |
|
| 448 | + $member = Member::currentUser(); |
|
| 449 | + } |
|
| 450 | + if(!$member) { |
|
| 451 | + return false; |
|
| 452 | + } |
|
| 453 | + // Must be logged in to check permissions |
|
| 408 | 454 | |
| 409 | - if(Permission::checkMember($member, 'ADMIN')) return true; |
|
| 455 | + if(Permission::checkMember($member, 'ADMIN')) { |
|
| 456 | + return true; |
|
| 457 | + } |
|
| 410 | 458 | return $this->ArchiveDownloaders()->byID($member->ID) |
| 411 | 459 | || $member->inGroups($this->ArchiveDownloaderGroups()); |
| 412 | 460 | } |
@@ -418,10 +466,16 @@ discard block |
||
| 418 | 466 | * @return boolean |
| 419 | 467 | */ |
| 420 | 468 | public function canAbort($member = null) { |
| 421 | - if(!$member) $member = Member::currentUser(); |
|
| 422 | - if(!$member) return false; |
|
| 469 | + if(!$member) { |
|
| 470 | + $member = Member::currentUser(); |
|
| 471 | + } |
|
| 472 | + if(!$member) { |
|
| 473 | + return false; |
|
| 474 | + } |
|
| 423 | 475 | |
| 424 | - if(Permission::checkMember($member, 'ADMIN')) return true; |
|
| 476 | + if(Permission::checkMember($member, 'ADMIN')) { |
|
| 477 | + return true; |
|
| 478 | + } |
|
| 425 | 479 | |
| 426 | 480 | return $this->PipelineCancellers()->byID($member->ID) |
| 427 | 481 | || $member->inGroups($this->PipelineCancellerGroups()); |
@@ -434,10 +488,16 @@ discard block |
||
| 434 | 488 | * @return boolean |
| 435 | 489 | */ |
| 436 | 490 | public function canApprove($member = null) { |
| 437 | - if(!$member) $member = Member::currentUser(); |
|
| 438 | - if(!$member) return false; |
|
| 491 | + if(!$member) { |
|
| 492 | + $member = Member::currentUser(); |
|
| 493 | + } |
|
| 494 | + if(!$member) { |
|
| 495 | + return false; |
|
| 496 | + } |
|
| 439 | 497 | |
| 440 | - if(Permission::checkMember($member, 'ADMIN')) return true; |
|
| 498 | + if(Permission::checkMember($member, 'ADMIN')) { |
|
| 499 | + return true; |
|
| 500 | + } |
|
| 441 | 501 | return $this->PipelineApprovers()->byID($member->ID) |
| 442 | 502 | || $member->inGroups($this->PipelineApproverGroups()); |
| 443 | 503 | } |
@@ -450,10 +510,17 @@ discard block |
||
| 450 | 510 | * @return boolean true if $member can delete archives from this environment, false if they can't. |
| 451 | 511 | */ |
| 452 | 512 | public function canDeleteArchive($member = null) { |
| 453 | - if(!$member) $member = Member::currentUser(); |
|
| 454 | - if(!$member) return false; // Must be logged in to check permissions |
|
| 513 | + if(!$member) { |
|
| 514 | + $member = Member::currentUser(); |
|
| 515 | + } |
|
| 516 | + if(!$member) { |
|
| 517 | + return false; |
|
| 518 | + } |
|
| 519 | + // Must be logged in to check permissions |
|
| 455 | 520 | |
| 456 | - if(Permission::checkMember($member, 'ADMIN')) return true; |
|
| 521 | + if(Permission::checkMember($member, 'ADMIN')) { |
|
| 522 | + return true; |
|
| 523 | + } |
|
| 457 | 524 | |
| 458 | 525 | return $this->ArchiveDeleters()->byID($member->ID) |
| 459 | 526 | || $member->inGroups($this->ArchiveDeleterGroups()); |
@@ -973,7 +1040,9 @@ discard block |
||
| 973 | 1040 | * Write the deployment config file to filesystem |
| 974 | 1041 | */ |
| 975 | 1042 | protected function writeConfigFile() { |
| 976 | - if(!$this->config()->get('allow_web_editing')) return; |
|
| 1043 | + if(!$this->config()->get('allow_web_editing')) { |
|
| 1044 | + return; |
|
| 1045 | + } |
|
| 977 | 1046 | |
| 978 | 1047 | // Create a basic new environment config from a template |
| 979 | 1048 | if( !$this->envFileExists() |
@@ -991,7 +1060,9 @@ discard block |
||
| 991 | 1060 | * Write the pipeline config file to filesystem |
| 992 | 1061 | */ |
| 993 | 1062 | protected function writePipelineFile() { |
| 994 | - if(!$this->config()->get('allow_web_editing')) return; |
|
| 1063 | + if(!$this->config()->get('allow_web_editing')) { |
|
| 1064 | + return; |
|
| 1065 | + } |
|
| 995 | 1066 | $path = $this->getPipelineFilename(); |
| 996 | 1067 | if($this->PipelineConfig) { |
| 997 | 1068 | // Update file |
@@ -1058,9 +1129,13 @@ discard block |
||
| 1058 | 1129 | */ |
| 1059 | 1130 | public function getPipelineFilename() { |
| 1060 | 1131 | $name = $this->getConfigFilename(); |
| 1061 | - if(!$name) return null; |
|
| 1132 | + if(!$name) { |
|
| 1133 | + return null; |
|
| 1134 | + } |
|
| 1062 | 1135 | $path = pathinfo($name); |
| 1063 | - if($path) return $path['dirname'] . '/' . $path['filename'] . '.yml'; |
|
| 1136 | + if($path) { |
|
| 1137 | + return $path['dirname'] . '/' . $path['filename'] . '.yml'; |
|
| 1138 | + } |
|
| 1064 | 1139 | } |
| 1065 | 1140 | |
| 1066 | 1141 | /** |
@@ -1086,7 +1161,9 @@ discard block |
||
| 1086 | 1161 | */ |
| 1087 | 1162 | public static function array_to_viewabledata($array) { |
| 1088 | 1163 | // Don't transform non-arrays |
| 1089 | - if(!is_array($array)) return $array; |
|
| 1164 | + if(!is_array($array)) { |
|
| 1165 | + return $array; |
|
| 1166 | + } |
|
| 1090 | 1167 | |
| 1091 | 1168 | // Figure out whether this is indexed or associative |
| 1092 | 1169 | $keys = array_keys($array); |
@@ -1119,17 +1196,23 @@ discard block |
||
| 1119 | 1196 | public function getDependentFilteredCommits() { |
| 1120 | 1197 | // check if this environment depends on another environemnt |
| 1121 | 1198 | $dependsOnEnv = $this->DependsOnEnvironment(); |
| 1122 | - if(empty($dependsOnEnv)) return null; |
|
| 1199 | + if(empty($dependsOnEnv)) { |
|
| 1200 | + return null; |
|
| 1201 | + } |
|
| 1123 | 1202 | |
| 1124 | 1203 | // Check if there is a filter |
| 1125 | 1204 | $config = $this->GenericPipelineConfig(); |
| 1126 | 1205 | $filter = isset($config->PipelineConfig->FilteredCommits) |
| 1127 | 1206 | ? $config->PipelineConfig->FilteredCommits |
| 1128 | 1207 | : null; |
| 1129 | - if (empty($filter)) return null; |
|
| 1208 | + if (empty($filter)) { |
|
| 1209 | + return null; |
|
| 1210 | + } |
|
| 1130 | 1211 | |
| 1131 | 1212 | // Create and execute filter |
| 1132 | - if (!class_exists($filter)) throw new Exception(sprintf("Class %s does not exist", $filter)); |
|
| 1213 | + if (!class_exists($filter)) { |
|
| 1214 | + throw new Exception(sprintf("Class %s does not exist", $filter)); |
|
| 1215 | + } |
|
| 1133 | 1216 | $commitClass = $filter::create(); |
| 1134 | 1217 | // setup the environment to check for commits |
| 1135 | 1218 | $commitClass->env = $dependsOnEnv; |
@@ -181,9 +181,13 @@ discard block |
||
| 181 | 181 | * @return boolean |
| 182 | 182 | */ |
| 183 | 183 | public function canView($member = null) { |
| 184 | - if(!$member) $member = Member::currentUser(); |
|
| 184 | + if(!$member) { |
|
| 185 | + $member = Member::currentUser(); |
|
| 186 | + } |
|
| 185 | 187 | |
| 186 | - if(Permission::checkMember($member, 'ADMIN')) return true; |
|
| 188 | + if(Permission::checkMember($member, 'ADMIN')) { |
|
| 189 | + return true; |
|
| 190 | + } |
|
| 187 | 191 | |
| 188 | 192 | return $member->inGroups($this->Viewers()); |
| 189 | 193 | } |
@@ -553,7 +557,9 @@ discard block |
||
| 553 | 557 | */ |
| 554 | 558 | public function getKeyDir() { |
| 555 | 559 | $keyDir = $this->DNData()->getKeyDir(); |
| 556 | - if(!$keyDir) return null; |
|
| 560 | + if(!$keyDir) { |
|
| 561 | + return null; |
|
| 562 | + } |
|
| 557 | 563 | |
| 558 | 564 | $filter = FileNameFilter::create(); |
| 559 | 565 | $name = $filter->filter($this->Name); |
@@ -61,7 +61,9 @@ discard block |
||
| 61 | 61 | protected function getReferences() { |
| 62 | 62 | $repository = new Gitonomy\Git\Repository($this->project->LocalCVSPath); |
| 63 | 63 | if($this->getTags) { |
| 64 | - if($this->reference) throw new LogicException("Can't have \$reference and \$getTags both set"); |
|
| 64 | + if($this->reference) { |
|
| 65 | + throw new LogicException("Can't have \$reference and \$getTags both set"); |
|
| 66 | + } |
|
| 65 | 67 | $log = $repository->getReferences()->getTags(); |
| 66 | 68 | |
| 67 | 69 | } else if($this->reference) { |
@@ -140,7 +142,9 @@ discard block |
||
| 140 | 142 | $this->loaded = true; |
| 141 | 143 | } |
| 142 | 144 | foreach($this->items as $i => $item) { |
| 143 | - if(is_array($item)) $this->items[$i] = new ArrayData($item); |
|
| 145 | + if(is_array($item)) { |
|
| 146 | + $this->items[$i] = new ArrayData($item); |
|
| 147 | + } |
|
| 144 | 148 | } |
| 145 | 149 | return new ArrayIterator($this->items); |
| 146 | 150 | } |
@@ -198,7 +198,9 @@ discard block |
||
| 198 | 198 | public function __isset($property) { |
| 199 | 199 | // Workaround fixed in https://github.com/silverstripe/silverstripe-framework/pull/3201 |
| 200 | 200 | // Remove this once we update to a version of framework which supports this |
| 201 | - if($property === 'MessagingService') return !empty($this->messagingService); |
|
| 201 | + if($property === 'MessagingService') { |
|
| 202 | + return !empty($this->messagingService); |
|
| 203 | + } |
|
| 202 | 204 | return parent::__isset($property); |
| 203 | 205 | } |
| 204 | 206 | |
@@ -234,8 +236,12 @@ discard block |
||
| 234 | 236 | public function canAbort($member = null) { |
| 235 | 237 | // Owner can abort |
| 236 | 238 | $member = $member ?: Member::currentUser(); |
| 237 | - if(!$member) return false; |
|
| 238 | - if($member->ID == $this->AuthorID) return true; |
|
| 239 | + if(!$member) { |
|
| 240 | + return false; |
|
| 241 | + } |
|
| 242 | + if($member->ID == $this->AuthorID) { |
|
| 243 | + return true; |
|
| 244 | + } |
|
| 239 | 245 | |
| 240 | 246 | // Check environment permission |
| 241 | 247 | return $this->Environment()->canAbort($member); |
@@ -263,7 +269,9 @@ discard block |
||
| 263 | 269 | * @return ArrayList List of items with a Link and Title attribute |
| 264 | 270 | */ |
| 265 | 271 | public function RunningOptions() { |
| 266 | - if(!$this->isActive()) return null; |
|
| 272 | + if(!$this->isActive()) { |
|
| 273 | + return null; |
|
| 274 | + } |
|
| 267 | 275 | $actions = array(); |
| 268 | 276 | |
| 269 | 277 | // Let current step update the current list of options |
@@ -279,7 +287,9 @@ discard block |
||
| 279 | 287 | * @return ArrayList List of logs with a Link and Title attribute |
| 280 | 288 | */ |
| 281 | 289 | public function LogOptions() { |
| 282 | - if(!$this->isActive()) return null; |
|
| 290 | + if(!$this->isActive()) { |
|
| 291 | + return null; |
|
| 292 | + } |
|
| 283 | 293 | $logs[] = array( |
| 284 | 294 | 'ButtonText' => 'Pipeline Log', |
| 285 | 295 | 'Link' => $this->Link() |
@@ -374,7 +384,9 @@ discard block |
||
| 374 | 384 | public function getConfigSetting($setting) { |
| 375 | 385 | $source = $this->getConfigData(); |
| 376 | 386 | foreach(func_get_args() as $setting) { |
| 377 | - if(empty($source[$setting])) return null; |
|
| 387 | + if(empty($source[$setting])) { |
|
| 388 | + return null; |
|
| 389 | + } |
|
| 378 | 390 | $source = $source[$setting]; |
| 379 | 391 | } |
| 380 | 392 | return $source; |
@@ -598,8 +610,12 @@ discard block |
||
| 598 | 610 | $success = true; |
| 599 | 611 | $rollback1 = $this->RollbackStep1(); |
| 600 | 612 | $rollback2 = $this->RollbackStep2(); |
| 601 | - if (!empty($rollback1) && $rollback1->Status=='Failed') $success = false; |
|
| 602 | - if (!empty($rollback2) && $rollback2->Status=='Failed') $success = false; |
|
| 613 | + if (!empty($rollback1) && $rollback1->Status=='Failed') { |
|
| 614 | + $success = false; |
|
| 615 | + } |
|
| 616 | + if (!empty($rollback2) && $rollback2->Status=='Failed') { |
|
| 617 | + $success = false; |
|
| 618 | + } |
|
| 603 | 619 | |
| 604 | 620 | // Send messages. |
| 605 | 621 | if ($success) { |
@@ -648,18 +664,26 @@ discard block |
||
| 648 | 664 | */ |
| 649 | 665 | protected function canStartRollback() { |
| 650 | 666 | // The rollback cannot run twice. |
| 651 | - if ($this->isRollback()) return false; |
|
| 667 | + if ($this->isRollback()) { |
|
| 668 | + return false; |
|
| 669 | + } |
|
| 652 | 670 | |
| 653 | 671 | // Rollbacks must be configured. |
| 654 | - if (!$this->getConfigSetting('RollbackStep1')) return false; |
|
| 672 | + if (!$this->getConfigSetting('RollbackStep1')) { |
|
| 673 | + return false; |
|
| 674 | + } |
|
| 655 | 675 | |
| 656 | 676 | // On dryrun let rollback run |
| 657 | - if($this->DryRun) return true; |
|
| 677 | + if($this->DryRun) { |
|
| 678 | + return true; |
|
| 679 | + } |
|
| 658 | 680 | |
| 659 | 681 | // Pipeline must have ran a deployment to be able to rollback. |
| 660 | 682 | $deploy = $this->CurrentDeployment(); |
| 661 | 683 | $previous = $this->PreviousDeployment(); |
| 662 | - if (!$deploy->exists() || !$previous->exists()) return false; |
|
| 684 | + if (!$deploy->exists() || !$previous->exists()) { |
|
| 685 | + return false; |
|
| 686 | + } |
|
| 663 | 687 | |
| 664 | 688 | return true; |
| 665 | 689 | } |
@@ -675,7 +699,9 @@ discard block |
||
| 675 | 699 | // Abort all running or queued steps. |
| 676 | 700 | $steps = $this->Steps(); |
| 677 | 701 | foreach($steps as $step) { |
| 678 | - if ($step->isQueued() || $step->isRunning()) $step->abort(); |
|
| 702 | + if ($step->isQueued() || $step->isRunning()) { |
|
| 703 | + $step->abort(); |
|
| 704 | + } |
|
| 679 | 705 | } |
| 680 | 706 | |
| 681 | 707 | if($this->canStartRollback()) { |
@@ -687,7 +713,9 @@ discard block |
||
| 687 | 713 | $this->Status = 'Failed'; |
| 688 | 714 | $this->log("Pipeline failed, not running rollback (not configured or not applicable yet)."); |
| 689 | 715 | $this->write(); |
| 690 | - if($notify) $this->sendMessage(self::ALERT_FAILURE); |
|
| 716 | + if($notify) { |
|
| 717 | + $this->sendMessage(self::ALERT_FAILURE); |
|
| 718 | + } |
|
| 691 | 719 | } |
| 692 | 720 | } |
| 693 | 721 | |
@@ -723,7 +751,9 @@ discard block |
||
| 723 | 751 | // Abort all running or queued steps. |
| 724 | 752 | $steps = $this->Steps(); |
| 725 | 753 | foreach($steps as $step) { |
| 726 | - if ($step->isQueued() || $step->isRunning()) $step->abort(); |
|
| 754 | + if ($step->isQueued() || $step->isRunning()) { |
|
| 755 | + $step->abort(); |
|
| 756 | + } |
|
| 727 | 757 | } |
| 728 | 758 | |
| 729 | 759 | // Send notification to users about this event |
@@ -753,7 +783,9 @@ discard block |
||
| 753 | 783 | */ |
| 754 | 784 | public function injectMessageReplacements($message, $subject, $substitutions) { |
| 755 | 785 | // Handle empty messages |
| 756 | - if(empty($subject) && empty($message)) return array(null, null); |
|
| 786 | + if(empty($subject) && empty($message)) { |
|
| 787 | + return array(null, null); |
|
| 788 | + } |
|
| 757 | 789 | |
| 758 | 790 | // Check if there's a role specific message |
| 759 | 791 | $subjectText = str_replace( |
@@ -977,8 +1009,14 @@ discard block |
||
| 977 | 1009 | $caller = $bt[$index]; |
| 978 | 1010 | $caller['line'] = $bt[($index - 1)]['line']; // Overwrite line and file to be the the line/file that actually |
| 979 | 1011 | $caller['file'] = $bt[($index - 1)]['file']; // called the function, not where the function is defined. |
| 980 | - if(!isset($caller['class'])) $caller['class'] = ''; // In case it wasn't called from a class |
|
| 981 | - if(!isset($caller['type'])) $caller['type'] = ''; // In case it doesn't have a type (wasn't called from class) |
|
| 1012 | + if(!isset($caller['class'])) { |
|
| 1013 | + $caller['class'] = ''; |
|
| 1014 | + } |
|
| 1015 | + // In case it wasn't called from a class |
|
| 1016 | + if(!isset($caller['type'])) { |
|
| 1017 | + $caller['type'] = ''; |
|
| 1018 | + } |
|
| 1019 | + // In case it doesn't have a type (wasn't called from class) |
|
| 982 | 1020 | |
| 983 | 1021 | $log->write(sprintf("[%s::%s() (line %d)] %s", $caller['class'], $caller['function'], $caller['line'], $message)); |
| 984 | 1022 | } |
@@ -1038,7 +1076,9 @@ discard block |
||
| 1038 | 1076 | public function LogContent() { |
| 1039 | 1077 | if($this->exists() && $this->Environment()) { |
| 1040 | 1078 | $logger = $this->getLogger(); |
| 1041 | - if($logger->exists()) return $logger->content(); |
|
| 1079 | + if($logger->exists()) { |
|
| 1080 | + return $logger->content(); |
|
| 1081 | + } |
|
| 1042 | 1082 | } |
| 1043 | 1083 | } |
| 1044 | 1084 | |
@@ -127,7 +127,9 @@ discard block |
||
| 127 | 127 | */ |
| 128 | 128 | public function beginRollbackWindow() { |
| 129 | 129 | $this->Status = 'Started'; |
| 130 | - if (!$this->Started) $this->Started = SS_Datetime::now()->Rfc2822(); |
|
| 130 | + if (!$this->Started) { |
|
| 131 | + $this->Started = SS_Datetime::now()->Rfc2822(); |
|
| 132 | + } |
|
| 131 | 133 | $this->log(_t('EmergencyRollbackStep.BEGINROLLBACKWINDOW', |
| 132 | 134 | "{$this->Title} is beginning a rollback window...")); |
| 133 | 135 | $this->write(); |
@@ -138,7 +140,9 @@ discard block |
||
| 138 | 140 | |
| 139 | 141 | public function getRunningDescription() { |
| 140 | 142 | // Don't show options if this step has already been confirmed |
| 141 | - if($this->RolledBack) return; |
|
| 143 | + if($this->RolledBack) { |
|
| 144 | + return; |
|
| 145 | + } |
|
| 142 | 146 | |
| 143 | 147 | return _t('EmergencyRollbackStep.RUNNINGDESCRIPTION', |
| 144 | 148 | 'You may now roll back to the previous version, if needed.'); |
@@ -41,7 +41,9 @@ |
||
| 41 | 41 | if($this->Started) { |
| 42 | 42 | $started = intval($this->dbObject('Started')->Format('U')); |
| 43 | 43 | $now = intval(SS_Datetime::now()->Format('U')); |
| 44 | - if($started && $now) return $now - $started; |
|
| 44 | + if($started && $now) { |
|
| 45 | + return $now - $started; |
|
| 46 | + } |
|
| 45 | 47 | } |
| 46 | 48 | return 0; |
| 47 | 49 | } |
@@ -89,7 +89,9 @@ discard block |
||
| 89 | 89 | * @return array |
| 90 | 90 | */ |
| 91 | 91 | public function getConfigData() { |
| 92 | - if(!$this->Config) return array(); |
|
| 92 | + if(!$this->Config) { |
|
| 93 | + return array(); |
|
| 94 | + } |
|
| 93 | 95 | |
| 94 | 96 | // Merge with defaults |
| 95 | 97 | if(!$this->mergedConfig) { |
@@ -125,7 +127,9 @@ discard block |
||
| 125 | 127 | public function getConfigSetting($setting) { |
| 126 | 128 | $source = $this->getConfigData(); |
| 127 | 129 | foreach(func_get_args() as $setting) { |
| 128 | - if(empty($source[$setting])) return null; |
|
| 130 | + if(empty($source[$setting])) { |
|
| 131 | + return null; |
|
| 132 | + } |
|
| 129 | 133 | $source = $source[$setting]; |
| 130 | 134 | } |
| 131 | 135 | return $source; |