@@ -52,7 +52,9 @@ discard block |
||
52 | 52 | parent::__construct(); |
53 | 53 | |
54 | 54 | // Better to use injector to set these |
55 | - if(func_num_args() == 0) return; |
|
55 | + if(func_num_args() == 0) { |
|
56 | + return; |
|
57 | + } |
|
56 | 58 | Deprecation::notice( |
57 | 59 | '1.2.0', |
58 | 60 | "Don't construct DNData with parameters. Assign settings via properties instead" |
@@ -78,7 +80,9 @@ discard block |
||
78 | 80 | * @param string $environmentDir |
79 | 81 | */ |
80 | 82 | public function setEnvironmentDir($environmentDir) { |
81 | - if($environmentDir[0] != "/") $environmentDir = BASE_PATH . '/' . $environmentDir; |
|
83 | + if($environmentDir[0] != "/") { |
|
84 | + $environmentDir = BASE_PATH . '/' . $environmentDir; |
|
85 | + } |
|
82 | 86 | $this->environmentDir = realpath($environmentDir) ?: $environmentDir; |
83 | 87 | } |
84 | 88 | |
@@ -97,7 +101,9 @@ discard block |
||
97 | 101 | * @param string $keyDir |
98 | 102 | */ |
99 | 103 | public function setKeyDir($keyDir) { |
100 | - if($keyDir[0] != "/") $keyDir = BASE_PATH . '/' . $keyDir; |
|
104 | + if($keyDir[0] != "/") { |
|
105 | + $keyDir = BASE_PATH . '/' . $keyDir; |
|
106 | + } |
|
101 | 107 | $this->keyDir = realpath($keyDir) ?: $keyDir; |
102 | 108 | } |
103 | 109 | |
@@ -137,7 +143,9 @@ discard block |
||
137 | 143 | * @param string $transferDir |
138 | 144 | */ |
139 | 145 | public function setDataTransferDir($transferDir) { |
140 | - if($transferDir[0] != "/") $transferDir = BASE_PATH . '/' . $transferDir; |
|
146 | + if($transferDir[0] != "/") { |
|
147 | + $transferDir = BASE_PATH . '/' . $transferDir; |
|
148 | + } |
|
141 | 149 | if(strpos($transferDir, ASSETS_PATH) === false) { |
142 | 150 | throw new LogicException(sprintf( |
143 | 151 | 'DNData::dataTransferDir needs to be located within <webroot>assets/ (location: %s)', |
@@ -207,7 +207,9 @@ discard block |
||
207 | 207 | */ |
208 | 208 | public function canRestore($member = null) { |
209 | 209 | $memberID = $member ? $member->ID : Member::currentUserID(); |
210 | - if(!$memberID) return false; |
|
210 | + if(!$memberID) { |
|
211 | + return false; |
|
212 | + } |
|
211 | 213 | |
212 | 214 | $key = $memberID . '-' . $this->EnvironmentID; |
213 | 215 | if(!isset(self::$_cache_can_restore[$key])) { |
@@ -226,7 +228,9 @@ discard block |
||
226 | 228 | */ |
227 | 229 | public function canDownload($member = null) { |
228 | 230 | $memberID = $member ? $member->ID : Member::currentUserID(); |
229 | - if(!$memberID) return false; |
|
231 | + if(!$memberID) { |
|
232 | + return false; |
|
233 | + } |
|
230 | 234 | |
231 | 235 | $key = $memberID . '-' . $this->EnvironmentID; |
232 | 236 | if(!isset(self::$_cache_can_download[$key])) { |
@@ -259,14 +263,23 @@ discard block |
||
259 | 263 | return false; |
260 | 264 | } |
261 | 265 | |
262 | - if(!$member) $member = Member::currentUser(); |
|
263 | - if(!$member) return false; // Must be logged in to check permissions |
|
266 | + if(!$member) { |
|
267 | + $member = Member::currentUser(); |
|
268 | + } |
|
269 | + if(!$member) { |
|
270 | + return false; |
|
271 | + } |
|
272 | + // Must be logged in to check permissions |
|
264 | 273 | |
265 | 274 | // Admin can always move. |
266 | - if(Permission::checkMember($member, 'ADMIN')) return true; |
|
275 | + if(Permission::checkMember($member, 'ADMIN')) { |
|
276 | + return true; |
|
277 | + } |
|
267 | 278 | |
268 | 279 | // Checks if the user can actually access the archive. |
269 | - if (!$this->canDownload($member)) return false; |
|
280 | + if (!$this->canDownload($member)) { |
|
281 | + return false; |
|
282 | + } |
|
270 | 283 | |
271 | 284 | // Hooks into ArchiveUploaders permission to prevent proliferation of permission checkboxes. |
272 | 285 | // Bypasses the quota check - we don't need to check for it as long as we move the snapshot within the project. |
@@ -192,7 +192,9 @@ discard block |
||
192 | 192 | // Multiple choices, use our choice if it's legal, otherwise default to the first item on the list |
193 | 193 | default: |
194 | 194 | $backend = $this->BackendIdentifier; |
195 | - if(!in_array($backend, $backends)) $backend = $backends[0]; |
|
195 | + if(!in_array($backend, $backends)) { |
|
196 | + $backend = $backends[0]; |
|
197 | + } |
|
196 | 198 | } |
197 | 199 | |
198 | 200 | return Injector::inst()->get($backend); |
@@ -304,10 +306,17 @@ discard block |
||
304 | 306 | * @return boolean |
305 | 307 | */ |
306 | 308 | public function canView($member = null) { |
307 | - if(!$member) $member = Member::currentUser(); |
|
308 | - if(!$member) return false; // Must be logged in to check permissions |
|
309 | + if(!$member) { |
|
310 | + $member = Member::currentUser(); |
|
311 | + } |
|
312 | + if(!$member) { |
|
313 | + return false; |
|
314 | + } |
|
315 | + // Must be logged in to check permissions |
|
309 | 316 | |
310 | - if(Permission::checkMember($member, 'ADMIN')) return true; |
|
317 | + if(Permission::checkMember($member, 'ADMIN')) { |
|
318 | + return true; |
|
319 | + } |
|
311 | 320 | |
312 | 321 | // if no Viewers or ViewerGroups defined, fallback to DNProject::canView permissions |
313 | 322 | if($this->Viewers()->exists() || $this->ViewerGroups()->exists()) { |
@@ -325,10 +334,17 @@ discard block |
||
325 | 334 | * @return boolean |
326 | 335 | */ |
327 | 336 | public function canDeploy($member = null) { |
328 | - if(!$member) $member = Member::currentUser(); |
|
329 | - if(!$member) return false; // Must be logged in to check permissions |
|
337 | + if(!$member) { |
|
338 | + $member = Member::currentUser(); |
|
339 | + } |
|
340 | + if(!$member) { |
|
341 | + return false; |
|
342 | + } |
|
343 | + // Must be logged in to check permissions |
|
330 | 344 | |
331 | - if(Permission::checkMember($member, 'ADMIN')) return true; |
|
345 | + if(Permission::checkMember($member, 'ADMIN')) { |
|
346 | + return true; |
|
347 | + } |
|
332 | 348 | |
333 | 349 | return $this->Deployers()->byID($member->ID) |
334 | 350 | || $member->inGroups($this->DeployerGroups()); |
@@ -342,10 +358,17 @@ discard block |
||
342 | 358 | * @return boolean true if $member can restore, and false if they can't. |
343 | 359 | */ |
344 | 360 | public function canRestore($member = null) { |
345 | - if(!$member) $member = Member::currentUser(); |
|
346 | - if(!$member) return false; // Must be logged in to check permissions |
|
361 | + if(!$member) { |
|
362 | + $member = Member::currentUser(); |
|
363 | + } |
|
364 | + if(!$member) { |
|
365 | + return false; |
|
366 | + } |
|
367 | + // Must be logged in to check permissions |
|
347 | 368 | |
348 | - if(Permission::checkMember($member, 'ADMIN')) return true; |
|
369 | + if(Permission::checkMember($member, 'ADMIN')) { |
|
370 | + return true; |
|
371 | + } |
|
349 | 372 | |
350 | 373 | return $this->CanRestoreMembers()->byID($member->ID) |
351 | 374 | || $member->inGroups($this->CanRestoreGroups()); |
@@ -360,12 +383,21 @@ discard block |
||
360 | 383 | */ |
361 | 384 | public function canBackup($member = null) { |
362 | 385 | $project = $this->Project(); |
363 | - if($project->HasDiskQuota() && $project->HasExceededDiskQuota()) return false; |
|
386 | + if($project->HasDiskQuota() && $project->HasExceededDiskQuota()) { |
|
387 | + return false; |
|
388 | + } |
|
364 | 389 | |
365 | - if(!$member) $member = Member::currentUser(); |
|
366 | - if(!$member) return false; // Must be logged in to check permissions |
|
390 | + if(!$member) { |
|
391 | + $member = Member::currentUser(); |
|
392 | + } |
|
393 | + if(!$member) { |
|
394 | + return false; |
|
395 | + } |
|
396 | + // Must be logged in to check permissions |
|
367 | 397 | |
368 | - if(Permission::checkMember($member, 'ADMIN')) return true; |
|
398 | + if(Permission::checkMember($member, 'ADMIN')) { |
|
399 | + return true; |
|
400 | + } |
|
369 | 401 | |
370 | 402 | return $this->CanBackupMembers()->byID($member->ID) |
371 | 403 | || $member->inGroups($this->CanBackupGroups()); |
@@ -384,12 +416,21 @@ discard block |
||
384 | 416 | */ |
385 | 417 | public function canUploadArchive($member = null) { |
386 | 418 | $project = $this->Project(); |
387 | - if($project->HasDiskQuota() && $project->HasExceededDiskQuota()) return false; |
|
419 | + if($project->HasDiskQuota() && $project->HasExceededDiskQuota()) { |
|
420 | + return false; |
|
421 | + } |
|
388 | 422 | |
389 | - if(!$member) $member = Member::currentUser(); |
|
390 | - if(!$member) return false; // Must be logged in to check permissions |
|
423 | + if(!$member) { |
|
424 | + $member = Member::currentUser(); |
|
425 | + } |
|
426 | + if(!$member) { |
|
427 | + return false; |
|
428 | + } |
|
429 | + // Must be logged in to check permissions |
|
391 | 430 | |
392 | - if(Permission::checkMember($member, 'ADMIN')) return true; |
|
431 | + if(Permission::checkMember($member, 'ADMIN')) { |
|
432 | + return true; |
|
433 | + } |
|
393 | 434 | |
394 | 435 | return $this->ArchiveUploaders()->byID($member->ID) |
395 | 436 | || $member->inGroups($this->ArchiveUploaderGroups()); |
@@ -403,10 +444,17 @@ discard block |
||
403 | 444 | * @return boolean true if $member can download archives from this environment, false if they can't. |
404 | 445 | */ |
405 | 446 | public function canDownloadArchive($member = null) { |
406 | - if(!$member) $member = Member::currentUser(); |
|
407 | - if(!$member) return false; // Must be logged in to check permissions |
|
447 | + if(!$member) { |
|
448 | + $member = Member::currentUser(); |
|
449 | + } |
|
450 | + if(!$member) { |
|
451 | + return false; |
|
452 | + } |
|
453 | + // Must be logged in to check permissions |
|
408 | 454 | |
409 | - if(Permission::checkMember($member, 'ADMIN')) return true; |
|
455 | + if(Permission::checkMember($member, 'ADMIN')) { |
|
456 | + return true; |
|
457 | + } |
|
410 | 458 | return $this->ArchiveDownloaders()->byID($member->ID) |
411 | 459 | || $member->inGroups($this->ArchiveDownloaderGroups()); |
412 | 460 | } |
@@ -418,10 +466,16 @@ discard block |
||
418 | 466 | * @return boolean |
419 | 467 | */ |
420 | 468 | public function canAbort($member = null) { |
421 | - if(!$member) $member = Member::currentUser(); |
|
422 | - if(!$member) return false; |
|
469 | + if(!$member) { |
|
470 | + $member = Member::currentUser(); |
|
471 | + } |
|
472 | + if(!$member) { |
|
473 | + return false; |
|
474 | + } |
|
423 | 475 | |
424 | - if(Permission::checkMember($member, 'ADMIN')) return true; |
|
476 | + if(Permission::checkMember($member, 'ADMIN')) { |
|
477 | + return true; |
|
478 | + } |
|
425 | 479 | |
426 | 480 | return $this->PipelineCancellers()->byID($member->ID) |
427 | 481 | || $member->inGroups($this->PipelineCancellerGroups()); |
@@ -434,10 +488,16 @@ discard block |
||
434 | 488 | * @return boolean |
435 | 489 | */ |
436 | 490 | public function canApprove($member = null) { |
437 | - if(!$member) $member = Member::currentUser(); |
|
438 | - if(!$member) return false; |
|
491 | + if(!$member) { |
|
492 | + $member = Member::currentUser(); |
|
493 | + } |
|
494 | + if(!$member) { |
|
495 | + return false; |
|
496 | + } |
|
439 | 497 | |
440 | - if(Permission::checkMember($member, 'ADMIN')) return true; |
|
498 | + if(Permission::checkMember($member, 'ADMIN')) { |
|
499 | + return true; |
|
500 | + } |
|
441 | 501 | return $this->PipelineApprovers()->byID($member->ID) |
442 | 502 | || $member->inGroups($this->PipelineApproverGroups()); |
443 | 503 | } |
@@ -450,10 +510,17 @@ discard block |
||
450 | 510 | * @return boolean true if $member can delete archives from this environment, false if they can't. |
451 | 511 | */ |
452 | 512 | public function canDeleteArchive($member = null) { |
453 | - if(!$member) $member = Member::currentUser(); |
|
454 | - if(!$member) return false; // Must be logged in to check permissions |
|
513 | + if(!$member) { |
|
514 | + $member = Member::currentUser(); |
|
515 | + } |
|
516 | + if(!$member) { |
|
517 | + return false; |
|
518 | + } |
|
519 | + // Must be logged in to check permissions |
|
455 | 520 | |
456 | - if(Permission::checkMember($member, 'ADMIN')) return true; |
|
521 | + if(Permission::checkMember($member, 'ADMIN')) { |
|
522 | + return true; |
|
523 | + } |
|
457 | 524 | |
458 | 525 | return $this->ArchiveDeleters()->byID($member->ID) |
459 | 526 | || $member->inGroups($this->ArchiveDeleterGroups()); |
@@ -973,7 +1040,9 @@ discard block |
||
973 | 1040 | * Write the deployment config file to filesystem |
974 | 1041 | */ |
975 | 1042 | protected function writeConfigFile() { |
976 | - if(!$this->config()->get('allow_web_editing')) return; |
|
1043 | + if(!$this->config()->get('allow_web_editing')) { |
|
1044 | + return; |
|
1045 | + } |
|
977 | 1046 | |
978 | 1047 | // Create a basic new environment config from a template |
979 | 1048 | if( !$this->envFileExists() |
@@ -991,7 +1060,9 @@ discard block |
||
991 | 1060 | * Write the pipeline config file to filesystem |
992 | 1061 | */ |
993 | 1062 | protected function writePipelineFile() { |
994 | - if(!$this->config()->get('allow_web_editing')) return; |
|
1063 | + if(!$this->config()->get('allow_web_editing')) { |
|
1064 | + return; |
|
1065 | + } |
|
995 | 1066 | $path = $this->getPipelineFilename(); |
996 | 1067 | if($this->PipelineConfig) { |
997 | 1068 | // Update file |
@@ -1058,9 +1129,13 @@ discard block |
||
1058 | 1129 | */ |
1059 | 1130 | public function getPipelineFilename() { |
1060 | 1131 | $name = $this->getConfigFilename(); |
1061 | - if(!$name) return null; |
|
1132 | + if(!$name) { |
|
1133 | + return null; |
|
1134 | + } |
|
1062 | 1135 | $path = pathinfo($name); |
1063 | - if($path) return $path['dirname'] . '/' . $path['filename'] . '.yml'; |
|
1136 | + if($path) { |
|
1137 | + return $path['dirname'] . '/' . $path['filename'] . '.yml'; |
|
1138 | + } |
|
1064 | 1139 | } |
1065 | 1140 | |
1066 | 1141 | /** |
@@ -1086,7 +1161,9 @@ discard block |
||
1086 | 1161 | */ |
1087 | 1162 | public static function array_to_viewabledata($array) { |
1088 | 1163 | // Don't transform non-arrays |
1089 | - if(!is_array($array)) return $array; |
|
1164 | + if(!is_array($array)) { |
|
1165 | + return $array; |
|
1166 | + } |
|
1090 | 1167 | |
1091 | 1168 | // Figure out whether this is indexed or associative |
1092 | 1169 | $keys = array_keys($array); |
@@ -1119,17 +1196,23 @@ discard block |
||
1119 | 1196 | public function getDependentFilteredCommits() { |
1120 | 1197 | // check if this environment depends on another environemnt |
1121 | 1198 | $dependsOnEnv = $this->DependsOnEnvironment(); |
1122 | - if(empty($dependsOnEnv)) return null; |
|
1199 | + if(empty($dependsOnEnv)) { |
|
1200 | + return null; |
|
1201 | + } |
|
1123 | 1202 | |
1124 | 1203 | // Check if there is a filter |
1125 | 1204 | $config = $this->GenericPipelineConfig(); |
1126 | 1205 | $filter = isset($config->PipelineConfig->FilteredCommits) |
1127 | 1206 | ? $config->PipelineConfig->FilteredCommits |
1128 | 1207 | : null; |
1129 | - if (empty($filter)) return null; |
|
1208 | + if (empty($filter)) { |
|
1209 | + return null; |
|
1210 | + } |
|
1130 | 1211 | |
1131 | 1212 | // Create and execute filter |
1132 | - if (!class_exists($filter)) throw new Exception(sprintf("Class %s does not exist", $filter)); |
|
1213 | + if (!class_exists($filter)) { |
|
1214 | + throw new Exception(sprintf("Class %s does not exist", $filter)); |
|
1215 | + } |
|
1133 | 1216 | $commitClass = $filter::create(); |
1134 | 1217 | // setup the environment to check for commits |
1135 | 1218 | $commitClass->env = $dependsOnEnv; |
@@ -181,9 +181,13 @@ discard block |
||
181 | 181 | * @return boolean |
182 | 182 | */ |
183 | 183 | public function canView($member = null) { |
184 | - if(!$member) $member = Member::currentUser(); |
|
184 | + if(!$member) { |
|
185 | + $member = Member::currentUser(); |
|
186 | + } |
|
185 | 187 | |
186 | - if(Permission::checkMember($member, 'ADMIN')) return true; |
|
188 | + if(Permission::checkMember($member, 'ADMIN')) { |
|
189 | + return true; |
|
190 | + } |
|
187 | 191 | |
188 | 192 | return $member->inGroups($this->Viewers()); |
189 | 193 | } |
@@ -553,7 +557,9 @@ discard block |
||
553 | 557 | */ |
554 | 558 | public function getKeyDir() { |
555 | 559 | $keyDir = $this->DNData()->getKeyDir(); |
556 | - if(!$keyDir) return null; |
|
560 | + if(!$keyDir) { |
|
561 | + return null; |
|
562 | + } |
|
557 | 563 | |
558 | 564 | $filter = FileNameFilter::create(); |
559 | 565 | $name = $filter->filter($this->Name); |
@@ -61,7 +61,9 @@ discard block |
||
61 | 61 | protected function getReferences() { |
62 | 62 | $repository = new Gitonomy\Git\Repository($this->project->LocalCVSPath); |
63 | 63 | if($this->getTags) { |
64 | - if($this->reference) throw new LogicException("Can't have \$reference and \$getTags both set"); |
|
64 | + if($this->reference) { |
|
65 | + throw new LogicException("Can't have \$reference and \$getTags both set"); |
|
66 | + } |
|
65 | 67 | $log = $repository->getReferences()->getTags(); |
66 | 68 | |
67 | 69 | } else if($this->reference) { |
@@ -140,7 +142,9 @@ discard block |
||
140 | 142 | $this->loaded = true; |
141 | 143 | } |
142 | 144 | foreach($this->items as $i => $item) { |
143 | - if(is_array($item)) $this->items[$i] = new ArrayData($item); |
|
145 | + if(is_array($item)) { |
|
146 | + $this->items[$i] = new ArrayData($item); |
|
147 | + } |
|
144 | 148 | } |
145 | 149 | return new ArrayIterator($this->items); |
146 | 150 | } |
@@ -198,7 +198,9 @@ discard block |
||
198 | 198 | public function __isset($property) { |
199 | 199 | // Workaround fixed in https://github.com/silverstripe/silverstripe-framework/pull/3201 |
200 | 200 | // Remove this once we update to a version of framework which supports this |
201 | - if($property === 'MessagingService') return !empty($this->messagingService); |
|
201 | + if($property === 'MessagingService') { |
|
202 | + return !empty($this->messagingService); |
|
203 | + } |
|
202 | 204 | return parent::__isset($property); |
203 | 205 | } |
204 | 206 | |
@@ -234,8 +236,12 @@ discard block |
||
234 | 236 | public function canAbort($member = null) { |
235 | 237 | // Owner can abort |
236 | 238 | $member = $member ?: Member::currentUser(); |
237 | - if(!$member) return false; |
|
238 | - if($member->ID == $this->AuthorID) return true; |
|
239 | + if(!$member) { |
|
240 | + return false; |
|
241 | + } |
|
242 | + if($member->ID == $this->AuthorID) { |
|
243 | + return true; |
|
244 | + } |
|
239 | 245 | |
240 | 246 | // Check environment permission |
241 | 247 | return $this->Environment()->canAbort($member); |
@@ -263,7 +269,9 @@ discard block |
||
263 | 269 | * @return ArrayList List of items with a Link and Title attribute |
264 | 270 | */ |
265 | 271 | public function RunningOptions() { |
266 | - if(!$this->isActive()) return null; |
|
272 | + if(!$this->isActive()) { |
|
273 | + return null; |
|
274 | + } |
|
267 | 275 | $actions = array(); |
268 | 276 | |
269 | 277 | // Let current step update the current list of options |
@@ -279,7 +287,9 @@ discard block |
||
279 | 287 | * @return ArrayList List of logs with a Link and Title attribute |
280 | 288 | */ |
281 | 289 | public function LogOptions() { |
282 | - if(!$this->isActive()) return null; |
|
290 | + if(!$this->isActive()) { |
|
291 | + return null; |
|
292 | + } |
|
283 | 293 | $logs[] = array( |
284 | 294 | 'ButtonText' => 'Pipeline Log', |
285 | 295 | 'Link' => $this->Link() |
@@ -374,7 +384,9 @@ discard block |
||
374 | 384 | public function getConfigSetting($setting) { |
375 | 385 | $source = $this->getConfigData(); |
376 | 386 | foreach(func_get_args() as $setting) { |
377 | - if(empty($source[$setting])) return null; |
|
387 | + if(empty($source[$setting])) { |
|
388 | + return null; |
|
389 | + } |
|
378 | 390 | $source = $source[$setting]; |
379 | 391 | } |
380 | 392 | return $source; |
@@ -598,8 +610,12 @@ discard block |
||
598 | 610 | $success = true; |
599 | 611 | $rollback1 = $this->RollbackStep1(); |
600 | 612 | $rollback2 = $this->RollbackStep2(); |
601 | - if (!empty($rollback1) && $rollback1->Status=='Failed') $success = false; |
|
602 | - if (!empty($rollback2) && $rollback2->Status=='Failed') $success = false; |
|
613 | + if (!empty($rollback1) && $rollback1->Status=='Failed') { |
|
614 | + $success = false; |
|
615 | + } |
|
616 | + if (!empty($rollback2) && $rollback2->Status=='Failed') { |
|
617 | + $success = false; |
|
618 | + } |
|
603 | 619 | |
604 | 620 | // Send messages. |
605 | 621 | if ($success) { |
@@ -648,18 +664,26 @@ discard block |
||
648 | 664 | */ |
649 | 665 | protected function canStartRollback() { |
650 | 666 | // The rollback cannot run twice. |
651 | - if ($this->isRollback()) return false; |
|
667 | + if ($this->isRollback()) { |
|
668 | + return false; |
|
669 | + } |
|
652 | 670 | |
653 | 671 | // Rollbacks must be configured. |
654 | - if (!$this->getConfigSetting('RollbackStep1')) return false; |
|
672 | + if (!$this->getConfigSetting('RollbackStep1')) { |
|
673 | + return false; |
|
674 | + } |
|
655 | 675 | |
656 | 676 | // On dryrun let rollback run |
657 | - if($this->DryRun) return true; |
|
677 | + if($this->DryRun) { |
|
678 | + return true; |
|
679 | + } |
|
658 | 680 | |
659 | 681 | // Pipeline must have ran a deployment to be able to rollback. |
660 | 682 | $deploy = $this->CurrentDeployment(); |
661 | 683 | $previous = $this->PreviousDeployment(); |
662 | - if (!$deploy->exists() || !$previous->exists()) return false; |
|
684 | + if (!$deploy->exists() || !$previous->exists()) { |
|
685 | + return false; |
|
686 | + } |
|
663 | 687 | |
664 | 688 | return true; |
665 | 689 | } |
@@ -675,7 +699,9 @@ discard block |
||
675 | 699 | // Abort all running or queued steps. |
676 | 700 | $steps = $this->Steps(); |
677 | 701 | foreach($steps as $step) { |
678 | - if ($step->isQueued() || $step->isRunning()) $step->abort(); |
|
702 | + if ($step->isQueued() || $step->isRunning()) { |
|
703 | + $step->abort(); |
|
704 | + } |
|
679 | 705 | } |
680 | 706 | |
681 | 707 | if($this->canStartRollback()) { |
@@ -687,7 +713,9 @@ discard block |
||
687 | 713 | $this->Status = 'Failed'; |
688 | 714 | $this->log("Pipeline failed, not running rollback (not configured or not applicable yet)."); |
689 | 715 | $this->write(); |
690 | - if($notify) $this->sendMessage(self::ALERT_FAILURE); |
|
716 | + if($notify) { |
|
717 | + $this->sendMessage(self::ALERT_FAILURE); |
|
718 | + } |
|
691 | 719 | } |
692 | 720 | } |
693 | 721 | |
@@ -723,7 +751,9 @@ discard block |
||
723 | 751 | // Abort all running or queued steps. |
724 | 752 | $steps = $this->Steps(); |
725 | 753 | foreach($steps as $step) { |
726 | - if ($step->isQueued() || $step->isRunning()) $step->abort(); |
|
754 | + if ($step->isQueued() || $step->isRunning()) { |
|
755 | + $step->abort(); |
|
756 | + } |
|
727 | 757 | } |
728 | 758 | |
729 | 759 | // Send notification to users about this event |
@@ -753,7 +783,9 @@ discard block |
||
753 | 783 | */ |
754 | 784 | public function injectMessageReplacements($message, $subject, $substitutions) { |
755 | 785 | // Handle empty messages |
756 | - if(empty($subject) && empty($message)) return array(null, null); |
|
786 | + if(empty($subject) && empty($message)) { |
|
787 | + return array(null, null); |
|
788 | + } |
|
757 | 789 | |
758 | 790 | // Check if there's a role specific message |
759 | 791 | $subjectText = str_replace( |
@@ -977,8 +1009,14 @@ discard block |
||
977 | 1009 | $caller = $bt[$index]; |
978 | 1010 | $caller['line'] = $bt[($index - 1)]['line']; // Overwrite line and file to be the the line/file that actually |
979 | 1011 | $caller['file'] = $bt[($index - 1)]['file']; // called the function, not where the function is defined. |
980 | - if(!isset($caller['class'])) $caller['class'] = ''; // In case it wasn't called from a class |
|
981 | - if(!isset($caller['type'])) $caller['type'] = ''; // In case it doesn't have a type (wasn't called from class) |
|
1012 | + if(!isset($caller['class'])) { |
|
1013 | + $caller['class'] = ''; |
|
1014 | + } |
|
1015 | + // In case it wasn't called from a class |
|
1016 | + if(!isset($caller['type'])) { |
|
1017 | + $caller['type'] = ''; |
|
1018 | + } |
|
1019 | + // In case it doesn't have a type (wasn't called from class) |
|
982 | 1020 | |
983 | 1021 | $log->write(sprintf("[%s::%s() (line %d)] %s", $caller['class'], $caller['function'], $caller['line'], $message)); |
984 | 1022 | } |
@@ -1038,7 +1076,9 @@ discard block |
||
1038 | 1076 | public function LogContent() { |
1039 | 1077 | if($this->exists() && $this->Environment()) { |
1040 | 1078 | $logger = $this->getLogger(); |
1041 | - if($logger->exists()) return $logger->content(); |
|
1079 | + if($logger->exists()) { |
|
1080 | + return $logger->content(); |
|
1081 | + } |
|
1042 | 1082 | } |
1043 | 1083 | } |
1044 | 1084 |
@@ -127,7 +127,9 @@ discard block |
||
127 | 127 | */ |
128 | 128 | public function beginRollbackWindow() { |
129 | 129 | $this->Status = 'Started'; |
130 | - if (!$this->Started) $this->Started = SS_Datetime::now()->Rfc2822(); |
|
130 | + if (!$this->Started) { |
|
131 | + $this->Started = SS_Datetime::now()->Rfc2822(); |
|
132 | + } |
|
131 | 133 | $this->log(_t('EmergencyRollbackStep.BEGINROLLBACKWINDOW', |
132 | 134 | "{$this->Title} is beginning a rollback window...")); |
133 | 135 | $this->write(); |
@@ -138,7 +140,9 @@ discard block |
||
138 | 140 | |
139 | 141 | public function getRunningDescription() { |
140 | 142 | // Don't show options if this step has already been confirmed |
141 | - if($this->RolledBack) return; |
|
143 | + if($this->RolledBack) { |
|
144 | + return; |
|
145 | + } |
|
142 | 146 | |
143 | 147 | return _t('EmergencyRollbackStep.RUNNINGDESCRIPTION', |
144 | 148 | 'You may now roll back to the previous version, if needed.'); |
@@ -41,7 +41,9 @@ |
||
41 | 41 | if($this->Started) { |
42 | 42 | $started = intval($this->dbObject('Started')->Format('U')); |
43 | 43 | $now = intval(SS_Datetime::now()->Format('U')); |
44 | - if($started && $now) return $now - $started; |
|
44 | + if($started && $now) { |
|
45 | + return $now - $started; |
|
46 | + } |
|
45 | 47 | } |
46 | 48 | return 0; |
47 | 49 | } |
@@ -89,7 +89,9 @@ discard block |
||
89 | 89 | * @return array |
90 | 90 | */ |
91 | 91 | public function getConfigData() { |
92 | - if(!$this->Config) return array(); |
|
92 | + if(!$this->Config) { |
|
93 | + return array(); |
|
94 | + } |
|
93 | 95 | |
94 | 96 | // Merge with defaults |
95 | 97 | if(!$this->mergedConfig) { |
@@ -125,7 +127,9 @@ discard block |
||
125 | 127 | public function getConfigSetting($setting) { |
126 | 128 | $source = $this->getConfigData(); |
127 | 129 | foreach(func_get_args() as $setting) { |
128 | - if(empty($source[$setting])) return null; |
|
130 | + if(empty($source[$setting])) { |
|
131 | + return null; |
|
132 | + } |
|
129 | 133 | $source = $source[$setting]; |
130 | 134 | } |
131 | 135 | return $source; |