@@ -130,10 +130,10 @@ |
||
| 130 | 130 | */ |
| 131 | 131 | public function getChangesModificationNeeded() { |
| 132 | 132 | $filtered = []; |
| 133 | - foreach ($this->changes as $change => $details) { |
|
| 134 | - if (array_key_exists('description', $details)) { |
|
| 133 | + foreach($this->changes as $change => $details) { |
|
| 134 | + if(array_key_exists('description', $details)) { |
|
| 135 | 135 | $filtered[$change] = $details; |
| 136 | - } else if ( |
|
| 136 | + } else if( |
|
| 137 | 137 | (array_key_exists('from', $details) || array_key_exists('to', $details)) |
| 138 | 138 | && $details['from'] !== $details['to'] |
| 139 | 139 | ) { |
@@ -110,8 +110,12 @@ |
||
| 110 | 110 | // Normalise "empty" values into dashes so comparisons are done properly. |
| 111 | 111 | // This means there is no diference between an empty string and a null |
| 112 | 112 | // but "0" is considered to be non-empty. |
| 113 | - if(empty($from) && !strlen($from)) $from = '-'; |
|
| 114 | - if(empty($to) && !strlen($to)) $to = '-'; |
|
| 113 | + if(empty($from) && !strlen($from)) { |
|
| 114 | + $from = '-'; |
|
| 115 | + } |
|
| 116 | + if(empty($to) && !strlen($to)) { |
|
| 117 | + $to = '-'; |
|
| 118 | + } |
|
| 115 | 119 | |
| 116 | 120 | return $this->changes[$title] = array( |
| 117 | 121 | 'from' => $from, |
@@ -63,7 +63,7 @@ discard block |
||
| 63 | 63 | */ |
| 64 | 64 | public function asJSONValidatorErrors($code, $validatorErrors) { |
| 65 | 65 | $fieldErrors = []; |
| 66 | - foreach ($validatorErrors as $error) { |
|
| 66 | + foreach($validatorErrors as $error) { |
|
| 67 | 67 | $fieldErrors[$error['fieldName']] = $error['message']; |
| 68 | 68 | } |
| 69 | 69 | return $this->asJSONFormFieldErrors($code, $fieldErrors); |
@@ -105,7 +105,7 @@ discard block |
||
| 105 | 105 | // To get around that, upon spotting an active redirect, we change the response code to 200, |
| 106 | 106 | // and move the redirect into the "RedirectTo" field in the JSON response. Frontend can |
| 107 | 107 | // then interpret this and trigger a redirect. |
| 108 | - if ($this->redirectedTo()) { |
|
| 108 | + if($this->redirectedTo()) { |
|
| 109 | 109 | $data['RedirectTo'] = $this->response->getHeader('Location'); |
| 110 | 110 | // Pop off the header - we are no longer redirecting via the usual mechanism. |
| 111 | 111 | $this->response->removeHeader('Location'); |
@@ -145,7 +145,9 @@ discard block |
||
| 145 | 145 | */ |
| 146 | 146 | protected function trimWhitespace($val) { |
| 147 | 147 | if(is_array($val)) { |
| 148 | - foreach($val as $k => $v) $val[$k] = $this->trimWhitespace($v); |
|
| 148 | + foreach($val as $k => $v) { |
|
| 149 | + $val[$k] = $this->trimWhitespace($v); |
|
| 150 | + } |
|
| 149 | 151 | return $val; |
| 150 | 152 | } else { |
| 151 | 153 | return trim($val); |
@@ -160,7 +162,9 @@ discard block |
||
| 160 | 162 | */ |
| 161 | 163 | protected function stripNonPrintables($val) { |
| 162 | 164 | if(is_array($val)) { |
| 163 | - foreach($val as $k => $v) $val[$k] = $this->stripNonPrintables($v); |
|
| 165 | + foreach($val as $k => $v) { |
|
| 166 | + $val[$k] = $this->stripNonPrintables($v); |
|
| 167 | + } |
|
| 164 | 168 | return $val; |
| 165 | 169 | } else { |
| 166 | 170 | return preg_replace('/[[:cntrl:]]/', '', $val); |
@@ -3,7 +3,7 @@ |
||
| 3 | 3 | class FrontendLink extends DataExtension { |
| 4 | 4 | |
| 5 | 5 | public function updateItemEditForm($form) { |
| 6 | - if ($this->owner->record->hasMethod('Link')) { |
|
| 6 | + if($this->owner->record->hasMethod('Link')) { |
|
| 7 | 7 | $link = sprintf( |
| 8 | 8 | '<a style="margin: 0.5em" target="deploynaut-frontend" href="%s">Preview »</a>', |
| 9 | 9 | $this->owner->record->Link() |
@@ -386,9 +386,13 @@ discard block |
||
| 386 | 386 | // Must be logged in to check permissions |
| 387 | 387 | |
| 388 | 388 | if ($this->Usage==='Production' || $this->Usage==='Unspecified') { |
| 389 | - if ($this->Project()->allowed(DNRoot::ALLOW_PROD_DEPLOYMENT, $member)) return true; |
|
| 389 | + if ($this->Project()->allowed(DNRoot::ALLOW_PROD_DEPLOYMENT, $member)) { |
|
| 390 | + return true; |
|
| 391 | + } |
|
| 390 | 392 | } else { |
| 391 | - if ($this->Project()->allowed(DNRoot::ALLOW_NON_PROD_DEPLOYMENT, $member)) return true; |
|
| 393 | + if ($this->Project()->allowed(DNRoot::ALLOW_NON_PROD_DEPLOYMENT, $member)) { |
|
| 394 | + return true; |
|
| 395 | + } |
|
| 392 | 396 | } |
| 393 | 397 | |
| 394 | 398 | return $this->Deployers()->byID($member->ID) |
@@ -412,9 +416,13 @@ discard block |
||
| 412 | 416 | // Must be logged in to check permissions |
| 413 | 417 | |
| 414 | 418 | if ($this->Usage==='Production' || $this->Usage==='Unspecified') { |
| 415 | - if ($this->Project()->allowed(DNRoot::ALLOW_PROD_SNAPSHOT, $member)) return true; |
|
| 419 | + if ($this->Project()->allowed(DNRoot::ALLOW_PROD_SNAPSHOT, $member)) { |
|
| 420 | + return true; |
|
| 421 | + } |
|
| 416 | 422 | } else { |
| 417 | - if ($this->Project()->allowed(DNRoot::ALLOW_NON_PROD_SNAPSHOT, $member)) return true; |
|
| 423 | + if ($this->Project()->allowed(DNRoot::ALLOW_NON_PROD_SNAPSHOT, $member)) { |
|
| 424 | + return true; |
|
| 425 | + } |
|
| 418 | 426 | } |
| 419 | 427 | |
| 420 | 428 | return $this->CanRestoreMembers()->byID($member->ID) |
@@ -443,9 +451,13 @@ discard block |
||
| 443 | 451 | } |
| 444 | 452 | |
| 445 | 453 | if ($this->Usage==='Production' || $this->Usage==='Unspecified') { |
| 446 | - if ($this->Project()->allowed(DNRoot::ALLOW_PROD_SNAPSHOT, $member)) return true; |
|
| 454 | + if ($this->Project()->allowed(DNRoot::ALLOW_PROD_SNAPSHOT, $member)) { |
|
| 455 | + return true; |
|
| 456 | + } |
|
| 447 | 457 | } else { |
| 448 | - if ($this->Project()->allowed(DNRoot::ALLOW_NON_PROD_SNAPSHOT, $member)) return true; |
|
| 458 | + if ($this->Project()->allowed(DNRoot::ALLOW_NON_PROD_SNAPSHOT, $member)) { |
|
| 459 | + return true; |
|
| 460 | + } |
|
| 449 | 461 | } |
| 450 | 462 | |
| 451 | 463 | return $this->CanBackupMembers()->byID($member->ID) |
@@ -478,9 +490,13 @@ discard block |
||
| 478 | 490 | // Must be logged in to check permissions |
| 479 | 491 | |
| 480 | 492 | if ($this->Usage==='Production' || $this->Usage==='Unspecified') { |
| 481 | - if ($this->Project()->allowed(DNRoot::ALLOW_PROD_SNAPSHOT, $member)) return true; |
|
| 493 | + if ($this->Project()->allowed(DNRoot::ALLOW_PROD_SNAPSHOT, $member)) { |
|
| 494 | + return true; |
|
| 495 | + } |
|
| 482 | 496 | } else { |
| 483 | - if ($this->Project()->allowed(DNRoot::ALLOW_NON_PROD_SNAPSHOT, $member)) return true; |
|
| 497 | + if ($this->Project()->allowed(DNRoot::ALLOW_NON_PROD_SNAPSHOT, $member)) { |
|
| 498 | + return true; |
|
| 499 | + } |
|
| 484 | 500 | } |
| 485 | 501 | |
| 486 | 502 | return $this->ArchiveUploaders()->byID($member->ID) |
@@ -504,9 +520,13 @@ discard block |
||
| 504 | 520 | // Must be logged in to check permissions |
| 505 | 521 | |
| 506 | 522 | if ($this->Usage==='Production' || $this->Usage==='Unspecified') { |
| 507 | - if ($this->Project()->allowed(DNRoot::ALLOW_PROD_SNAPSHOT, $member)) return true; |
|
| 523 | + if ($this->Project()->allowed(DNRoot::ALLOW_PROD_SNAPSHOT, $member)) { |
|
| 524 | + return true; |
|
| 525 | + } |
|
| 508 | 526 | } else { |
| 509 | - if ($this->Project()->allowed(DNRoot::ALLOW_NON_PROD_SNAPSHOT, $member)) return true; |
|
| 527 | + if ($this->Project()->allowed(DNRoot::ALLOW_NON_PROD_SNAPSHOT, $member)) { |
|
| 528 | + return true; |
|
| 529 | + } |
|
| 510 | 530 | } |
| 511 | 531 | |
| 512 | 532 | return $this->ArchiveDownloaders()->byID($member->ID) |
@@ -573,9 +593,13 @@ discard block |
||
| 573 | 593 | // Must be logged in to check permissions |
| 574 | 594 | |
| 575 | 595 | if ($this->Usage==='Production' || $this->Usage==='Unspecified') { |
| 576 | - if ($this->Project()->allowed(DNRoot::ALLOW_PROD_SNAPSHOT, $member)) return true; |
|
| 596 | + if ($this->Project()->allowed(DNRoot::ALLOW_PROD_SNAPSHOT, $member)) { |
|
| 597 | + return true; |
|
| 598 | + } |
|
| 577 | 599 | } else { |
| 578 | - if ($this->Project()->allowed(DNRoot::ALLOW_NON_PROD_SNAPSHOT, $member)) return true; |
|
| 600 | + if ($this->Project()->allowed(DNRoot::ALLOW_NON_PROD_SNAPSHOT, $member)) { |
|
| 601 | + return true; |
|
| 602 | + } |
|
| 579 | 603 | } |
| 580 | 604 | |
| 581 | 605 | return $this->ArchiveDeleters()->byID($member->ID) |
@@ -311,10 +311,10 @@ discard block |
||
| 311 | 311 | } |
| 312 | 312 | // Must be logged in to check permissions |
| 313 | 313 | |
| 314 | - if ($this->Usage === self::PRODUCTION || $this->Usage === self::UNSPECIFIED) { |
|
| 315 | - if ($this->Project()->allowed(DNRoot::ALLOW_PROD_DEPLOYMENT, $member)) return true; |
|
| 314 | + if($this->Usage === self::PRODUCTION || $this->Usage === self::UNSPECIFIED) { |
|
| 315 | + if($this->Project()->allowed(DNRoot::ALLOW_PROD_DEPLOYMENT, $member)) return true; |
|
| 316 | 316 | } else { |
| 317 | - if ($this->Project()->allowed(DNRoot::ALLOW_NON_PROD_DEPLOYMENT, $member)) return true; |
|
| 317 | + if($this->Project()->allowed(DNRoot::ALLOW_NON_PROD_DEPLOYMENT, $member)) return true; |
|
| 318 | 318 | } |
| 319 | 319 | |
| 320 | 320 | return $this->Deployers()->byID($member->ID) |
@@ -346,10 +346,10 @@ discard block |
||
| 346 | 346 | } |
| 347 | 347 | // Must be logged in to check permissions |
| 348 | 348 | |
| 349 | - if ($this->Usage === self::PRODUCTION || $this->Usage === self::UNSPECIFIED) { |
|
| 350 | - if ($this->Project()->allowed(DNRoot::ALLOW_PROD_SNAPSHOT, $member)) return true; |
|
| 349 | + if($this->Usage === self::PRODUCTION || $this->Usage === self::UNSPECIFIED) { |
|
| 350 | + if($this->Project()->allowed(DNRoot::ALLOW_PROD_SNAPSHOT, $member)) return true; |
|
| 351 | 351 | } else { |
| 352 | - if ($this->Project()->allowed(DNRoot::ALLOW_NON_PROD_SNAPSHOT, $member)) return true; |
|
| 352 | + if($this->Project()->allowed(DNRoot::ALLOW_NON_PROD_SNAPSHOT, $member)) return true; |
|
| 353 | 353 | } |
| 354 | 354 | |
| 355 | 355 | return $this->CanRestoreMembers()->byID($member->ID) |
@@ -377,10 +377,10 @@ discard block |
||
| 377 | 377 | return false; |
| 378 | 378 | } |
| 379 | 379 | |
| 380 | - if ($this->Usage === self::PRODUCTION || $this->Usage === self::UNSPECIFIED) { |
|
| 381 | - if ($this->Project()->allowed(DNRoot::ALLOW_PROD_SNAPSHOT, $member)) return true; |
|
| 380 | + if($this->Usage === self::PRODUCTION || $this->Usage === self::UNSPECIFIED) { |
|
| 381 | + if($this->Project()->allowed(DNRoot::ALLOW_PROD_SNAPSHOT, $member)) return true; |
|
| 382 | 382 | } else { |
| 383 | - if ($this->Project()->allowed(DNRoot::ALLOW_NON_PROD_SNAPSHOT, $member)) return true; |
|
| 383 | + if($this->Project()->allowed(DNRoot::ALLOW_NON_PROD_SNAPSHOT, $member)) return true; |
|
| 384 | 384 | } |
| 385 | 385 | |
| 386 | 386 | return $this->CanBackupMembers()->byID($member->ID) |
@@ -412,10 +412,10 @@ discard block |
||
| 412 | 412 | } |
| 413 | 413 | // Must be logged in to check permissions |
| 414 | 414 | |
| 415 | - if ($this->Usage === self::PRODUCTION || $this->Usage === self::UNSPECIFIED) { |
|
| 416 | - if ($this->Project()->allowed(DNRoot::ALLOW_PROD_SNAPSHOT, $member)) return true; |
|
| 415 | + if($this->Usage === self::PRODUCTION || $this->Usage === self::UNSPECIFIED) { |
|
| 416 | + if($this->Project()->allowed(DNRoot::ALLOW_PROD_SNAPSHOT, $member)) return true; |
|
| 417 | 417 | } else { |
| 418 | - if ($this->Project()->allowed(DNRoot::ALLOW_NON_PROD_SNAPSHOT, $member)) return true; |
|
| 418 | + if($this->Project()->allowed(DNRoot::ALLOW_NON_PROD_SNAPSHOT, $member)) return true; |
|
| 419 | 419 | } |
| 420 | 420 | |
| 421 | 421 | return $this->ArchiveUploaders()->byID($member->ID) |
@@ -438,10 +438,10 @@ discard block |
||
| 438 | 438 | } |
| 439 | 439 | // Must be logged in to check permissions |
| 440 | 440 | |
| 441 | - if ($this->Usage === self::PRODUCTION || $this->Usage === self::UNSPECIFIED) { |
|
| 442 | - if ($this->Project()->allowed(DNRoot::ALLOW_PROD_SNAPSHOT, $member)) return true; |
|
| 441 | + if($this->Usage === self::PRODUCTION || $this->Usage === self::UNSPECIFIED) { |
|
| 442 | + if($this->Project()->allowed(DNRoot::ALLOW_PROD_SNAPSHOT, $member)) return true; |
|
| 443 | 443 | } else { |
| 444 | - if ($this->Project()->allowed(DNRoot::ALLOW_NON_PROD_SNAPSHOT, $member)) return true; |
|
| 444 | + if($this->Project()->allowed(DNRoot::ALLOW_NON_PROD_SNAPSHOT, $member)) return true; |
|
| 445 | 445 | } |
| 446 | 446 | |
| 447 | 447 | return $this->ArchiveDownloaders()->byID($member->ID) |
@@ -464,10 +464,10 @@ discard block |
||
| 464 | 464 | } |
| 465 | 465 | // Must be logged in to check permissions |
| 466 | 466 | |
| 467 | - if ($this->Usage === self::PRODUCTION || $this->Usage === self::UNSPECIFIED) { |
|
| 468 | - if ($this->Project()->allowed(DNRoot::ALLOW_PROD_SNAPSHOT, $member)) return true; |
|
| 467 | + if($this->Usage === self::PRODUCTION || $this->Usage === self::UNSPECIFIED) { |
|
| 468 | + if($this->Project()->allowed(DNRoot::ALLOW_PROD_SNAPSHOT, $member)) return true; |
|
| 469 | 469 | } else { |
| 470 | - if ($this->Project()->allowed(DNRoot::ALLOW_NON_PROD_SNAPSHOT, $member)) return true; |
|
| 470 | + if($this->Project()->allowed(DNRoot::ALLOW_NON_PROD_SNAPSHOT, $member)) return true; |
|
| 471 | 471 | } |
| 472 | 472 | |
| 473 | 473 | return $this->ArchiveDeleters()->byID($member->ID) |
@@ -804,7 +804,7 @@ discard block |
||
| 804 | 804 | ->buildPermissionField('ArchiveUploaderGroups', 'ArchiveUploaders', $groups, $members) |
| 805 | 805 | ->setTitle('Who can upload?') |
| 806 | 806 | ->setDescription( |
| 807 | - 'Users who can upload archives linked to this environment into Deploynaut.<br />' . |
|
| 807 | + 'Users who can upload archives linked to this environment into Deploynaut.<br />'. |
|
| 808 | 808 | 'Linking them to an environment allows limiting download permissions (see below).' |
| 809 | 809 | ), |
| 810 | 810 | |
@@ -851,7 +851,7 @@ discard block |
||
| 851 | 851 | // Add actions |
| 852 | 852 | $action = new FormAction('check', 'Check Connection'); |
| 853 | 853 | $action->setUseButtonTag(true); |
| 854 | - $dataURL = Director::absoluteBaseURL() . 'naut/api/' . $this->Project()->Name . '/' . $this->Name . '/ping'; |
|
| 854 | + $dataURL = Director::absoluteBaseURL().'naut/api/'.$this->Project()->Name.'/'.$this->Name.'/ping'; |
|
| 855 | 855 | $action->setAttribute('data-url', $dataURL); |
| 856 | 856 | $fields->insertBefore($action, 'Name'); |
| 857 | 857 | |
@@ -888,8 +888,8 @@ discard block |
||
| 888 | 888 | */ |
| 889 | 889 | public function onBeforeWrite() { |
| 890 | 890 | parent::onBeforeWrite(); |
| 891 | - if($this->Name && $this->Name . '.rb' != $this->Filename) { |
|
| 892 | - $this->Filename = $this->Name . '.rb'; |
|
| 891 | + if($this->Name && $this->Name.'.rb' != $this->Filename) { |
|
| 892 | + $this->Filename = $this->Name.'.rb'; |
|
| 893 | 893 | } |
| 894 | 894 | $this->checkEnvironmentPath(); |
| 895 | 895 | $this->writeConfigFile(); |
@@ -936,7 +936,7 @@ discard block |
||
| 936 | 936 | && $this->Filename |
| 937 | 937 | && $this->CreateEnvConfig |
| 938 | 938 | ) { |
| 939 | - $templateFile = $this->config()->template_file ?: BASE_PATH . '/deploynaut/environment.template'; |
|
| 939 | + $templateFile = $this->config()->template_file ?: BASE_PATH.'/deploynaut/environment.template'; |
|
| 940 | 940 | file_put_contents($this->getConfigFilename(), file_get_contents($templateFile)); |
| 941 | 941 | } else if($this->envFileExists() && $this->DeployConfig) { |
| 942 | 942 | file_put_contents($this->getConfigFilename(), $this->DeployConfig); |
@@ -991,7 +991,7 @@ discard block |
||
| 991 | 991 | if(!$this->Filename) { |
| 992 | 992 | return ''; |
| 993 | 993 | } |
| 994 | - return $this->DNData()->getEnvironmentDir() . '/' . $this->Project()->Name . '/' . $this->Filename; |
|
| 994 | + return $this->DNData()->getEnvironmentDir().'/'.$this->Project()->Name.'/'.$this->Filename; |
|
| 995 | 995 | } |
| 996 | 996 | |
| 997 | 997 | /** |
@@ -929,7 +929,9 @@ discard block |
||
| 929 | 929 | * @return SS_List |
| 930 | 930 | */ |
| 931 | 931 | public function whoIsAllowedAny($codes) { |
| 932 | - if(!is_array($codes)) $codes = array($codes); |
|
| 932 | + if(!is_array($codes)) { |
|
| 933 | + $codes = array($codes); |
|
| 934 | + } |
|
| 933 | 935 | |
| 934 | 936 | $SQLa_codes = Convert::raw2sql($codes); |
| 935 | 937 | $SQL_codes = join("','", $SQLa_codes); |
@@ -991,7 +993,9 @@ discard block |
||
| 991 | 993 | $member = Member::currentUser(); |
| 992 | 994 | } |
| 993 | 995 | |
| 994 | - if(Permission::checkMember($member, 'ADMIN')) return true; |
|
| 996 | + if(Permission::checkMember($member, 'ADMIN')) { |
|
| 997 | + return true; |
|
| 998 | + } |
|
| 995 | 999 | |
| 996 | 1000 | $hits = $this->whoIsAllowedAny($codes)->filter('Member.ID', $member->ID)->count(); |
| 997 | 1001 | return ($hits>0 ? true : false); |
@@ -1018,7 +1022,9 @@ discard block |
||
| 1018 | 1022 | }); |
| 1019 | 1023 | |
| 1020 | 1024 | // If anything returns false then we're not ready. |
| 1021 | - if($isDone) return min($isDone); |
|
| 1025 | + if($isDone) { |
|
| 1026 | + return min($isDone); |
|
| 1027 | + } |
|
| 1022 | 1028 | } |
| 1023 | 1029 | |
| 1024 | 1030 | return true; |
@@ -1099,8 +1105,12 @@ discard block |
||
| 1099 | 1105 | * @return bool |
| 1100 | 1106 | */ |
| 1101 | 1107 | public function canCreate($member = null) { |
| 1102 | - if(!$member) $member = Member::currentUser(); |
|
| 1103 | - if(!$member) return false; |
|
| 1108 | + if(!$member) { |
|
| 1109 | + $member = Member::currentUser(); |
|
| 1110 | + } |
|
| 1111 | + if(!$member) { |
|
| 1112 | + return false; |
|
| 1113 | + } |
|
| 1104 | 1114 | |
| 1105 | 1115 | if(Permission::checkMember($member, 'ADMIN')) { |
| 1106 | 1116 | return true; |
@@ -262,7 +262,7 @@ discard block |
||
| 262 | 262 | * @return bool |
| 263 | 263 | */ |
| 264 | 264 | public function canRestore($member = null) { |
| 265 | - if ($this->allowedAny( |
|
| 265 | + if($this->allowedAny( |
|
| 266 | 266 | array( |
| 267 | 267 | DNRoot::ALLOW_PROD_SNAPSHOT, |
| 268 | 268 | DNRoot::ALLOW_NON_PROD_SNAPSHOT |
@@ -282,7 +282,7 @@ discard block |
||
| 282 | 282 | * @return bool |
| 283 | 283 | */ |
| 284 | 284 | public function canBackup($member = null) { |
| 285 | - if ($this->allowedAny( |
|
| 285 | + if($this->allowedAny( |
|
| 286 | 286 | array( |
| 287 | 287 | DNRoot::ALLOW_PROD_SNAPSHOT, |
| 288 | 288 | DNRoot::ALLOW_NON_PROD_SNAPSHOT |
@@ -302,7 +302,7 @@ discard block |
||
| 302 | 302 | * @return bool |
| 303 | 303 | */ |
| 304 | 304 | public function canUploadArchive($member = null) { |
| 305 | - if ($this->allowedAny( |
|
| 305 | + if($this->allowedAny( |
|
| 306 | 306 | array( |
| 307 | 307 | DNRoot::ALLOW_PROD_SNAPSHOT, |
| 308 | 308 | DNRoot::ALLOW_NON_PROD_SNAPSHOT |
@@ -322,7 +322,7 @@ discard block |
||
| 322 | 322 | * @return bool |
| 323 | 323 | */ |
| 324 | 324 | public function canDownloadArchive($member = null) { |
| 325 | - if ($this->allowedAny( |
|
| 325 | + if($this->allowedAny( |
|
| 326 | 326 | array( |
| 327 | 327 | DNRoot::ALLOW_PROD_SNAPSHOT, |
| 328 | 328 | DNRoot::ALLOW_NON_PROD_SNAPSHOT |
@@ -391,7 +391,7 @@ discard block |
||
| 391 | 391 | // Key-pair is available, use it. |
| 392 | 392 | $processEnv = array( |
| 393 | 393 | 'IDENT_KEY' => $this->getPrivateKeyPath(), |
| 394 | - 'GIT_SSH' => BASE_PATH . "/deploynaut/git-deploy.sh" |
|
| 394 | + 'GIT_SSH' => BASE_PATH."/deploynaut/git-deploy.sh" |
|
| 395 | 395 | ); |
| 396 | 396 | } else { |
| 397 | 397 | $processEnv = array(); |
@@ -746,7 +746,7 @@ discard block |
||
| 746 | 746 | */ |
| 747 | 747 | public function getPublicKeyPath() { |
| 748 | 748 | if($privateKey = $this->getPrivateKeyPath()) { |
| 749 | - return $privateKey . '.pub'; |
|
| 749 | + return $privateKey.'.pub'; |
|
| 750 | 750 | } |
| 751 | 751 | return null; |
| 752 | 752 | } |
@@ -761,7 +761,7 @@ discard block |
||
| 761 | 761 | if(!empty($keyDir)) { |
| 762 | 762 | $filter = FileNameFilter::create(); |
| 763 | 763 | $name = $filter->filter($this->Name); |
| 764 | - return $keyDir . '/' . $name; |
|
| 764 | + return $keyDir.'/'.$name; |
|
| 765 | 765 | } |
| 766 | 766 | return null; |
| 767 | 767 | } |
@@ -780,7 +780,7 @@ discard block |
||
| 780 | 780 | $filter = FileNameFilter::create(); |
| 781 | 781 | $name = $filter->filter($this->Name); |
| 782 | 782 | |
| 783 | - return $this->DNData()->getKeyDir() . '/' . $name; |
|
| 783 | + return $this->DNData()->getKeyDir().'/'.$name; |
|
| 784 | 784 | } |
| 785 | 785 | |
| 786 | 786 | /** |
@@ -869,7 +869,7 @@ discard block |
||
| 869 | 869 | /* Look for each whitelisted hostname */ |
| 870 | 870 | foreach($interfaces as $host => $interface) { |
| 871 | 871 | /* See if the CVS Path is for this hostname, followed by some junk (maybe a port), then the path */ |
| 872 | - if(preg_match('{^[^.]*' . $host . '(.*?)([/a-zA-Z].+)}', $this->CVSPath, $match)) { |
|
| 872 | + if(preg_match('{^[^.]*'.$host.'(.*?)([/a-zA-Z].+)}', $this->CVSPath, $match)) { |
|
| 873 | 873 | |
| 874 | 874 | $path = $match[2]; |
| 875 | 875 | |
@@ -880,10 +880,10 @@ discard block |
||
| 880 | 880 | $components = explode('.', $host); |
| 881 | 881 | |
| 882 | 882 | foreach($regex as $pattern => $replacement) { |
| 883 | - $path = preg_replace('/' . $pattern . '/', $replacement, $path); |
|
| 883 | + $path = preg_replace('/'.$pattern.'/', $replacement, $path); |
|
| 884 | 884 | } |
| 885 | 885 | |
| 886 | - $uxurl = Controller::join_links($scheme . '://', $host, $path); |
|
| 886 | + $uxurl = Controller::join_links($scheme.'://', $host, $path); |
|
| 887 | 887 | |
| 888 | 888 | if(array_key_exists('commit', $interface) && $interface['commit'] == false) { |
| 889 | 889 | $commiturl = false; |
@@ -987,14 +987,14 @@ discard block |
||
| 987 | 987 | * @return bool |
| 988 | 988 | */ |
| 989 | 989 | public function allowedAny($codes, $member = null) { |
| 990 | - if (!$member) { |
|
| 990 | + if(!$member) { |
|
| 991 | 991 | $member = Member::currentUser(); |
| 992 | 992 | } |
| 993 | 993 | |
| 994 | 994 | if(Permission::checkMember($member, 'ADMIN')) return true; |
| 995 | 995 | |
| 996 | 996 | $hits = $this->whoIsAllowedAny($codes)->filter('Member.ID', $member->ID)->count(); |
| 997 | - return ($hits>0 ? true : false); |
|
| 997 | + return ($hits > 0 ? true : false); |
|
| 998 | 998 | } |
| 999 | 999 | |
| 1000 | 1000 | /** |
@@ -229,7 +229,7 @@ discard block |
||
| 229 | 229 | return false; |
| 230 | 230 | } |
| 231 | 231 | |
| 232 | - $key = $memberID . '-' . $this->EnvironmentID; |
|
| 232 | + $key = $memberID.'-'.$this->EnvironmentID; |
|
| 233 | 233 | if(!isset(self::$_cache_can_restore[$key])) { |
| 234 | 234 | self::$_cache_can_restore[$key] = $this->Environment()->canUploadArchive($member); |
| 235 | 235 | } |
@@ -250,7 +250,7 @@ discard block |
||
| 250 | 250 | return false; |
| 251 | 251 | } |
| 252 | 252 | |
| 253 | - $key = $memberID . '-' . $this->EnvironmentID; |
|
| 253 | + $key = $memberID.'-'.$this->EnvironmentID; |
|
| 254 | 254 | if(!isset(self::$_cache_can_download[$key])) { |
| 255 | 255 | self::$_cache_can_download[$key] = $this->Environment()->canDownloadArchive($member); |
| 256 | 256 | } |
@@ -437,7 +437,7 @@ discard block |
||
| 437 | 437 | } |
| 438 | 438 | |
| 439 | 439 | // Extract database.sql.gz to <workingdir>/database.sql |
| 440 | - if(file_exists($workingDir . DIRECTORY_SEPARATOR . 'database.sql.gz')) { |
|
| 440 | + if(file_exists($workingDir.DIRECTORY_SEPARATOR.'database.sql.gz')) { |
|
| 441 | 441 | $process = new Process('gunzip database.sql.gz', $workingDir); |
| 442 | 442 | $process->setTimeout(3600); |
| 443 | 443 | $process->run(); |
@@ -448,7 +448,7 @@ discard block |
||
| 448 | 448 | } |
| 449 | 449 | |
| 450 | 450 | // Extract assets.tar.gz to <workingdir>/assets/ |
| 451 | - if(file_exists($workingDir . DIRECTORY_SEPARATOR . 'assets.tar.gz')) { |
|
| 451 | + if(file_exists($workingDir.DIRECTORY_SEPARATOR.'assets.tar.gz')) { |
|
| 452 | 452 | $process = new Process('tar xzf assets.tar.gz', $workingDir); |
| 453 | 453 | $process->setTimeout(3600); |
| 454 | 454 | $process->run(); |
@@ -7,7 +7,7 @@ |
||
| 7 | 7 | public static $cache = array(); |
| 8 | 8 | |
| 9 | 9 | public static function getIncludingBranches($commit) { |
| 10 | - $cacheKey = 'getIncludingBranches-' . $commit->getRepository()->getPath() . '-' . $commit->gethash(); |
|
| 10 | + $cacheKey = 'getIncludingBranches-'.$commit->getRepository()->getPath().'-'.$commit->gethash(); |
|
| 11 | 11 | if(!isset(self::$cache[$cacheKey])) { |
| 12 | 12 | self::$cache[$cacheKey] = $commit->getIncludingBranches(); |
| 13 | 13 | } |
@@ -55,7 +55,7 @@ |
||
| 55 | 55 | |
| 56 | 56 | public function Link() { |
| 57 | 57 | // Use a get-var for branch so that it can handle unsafe chars better |
| 58 | - return Controller::join_links($this->project->Link(), 'branch?name=' . urlencode($this->Name())); |
|
| 58 | + return Controller::join_links($this->project->Link(), 'branch?name='.urlencode($this->Name())); |
|
| 59 | 59 | } |
| 60 | 60 | |
| 61 | 61 | /** |
@@ -37,7 +37,7 @@ |
||
| 37 | 37 | * @return string |
| 38 | 38 | */ |
| 39 | 39 | public function LogLink() { |
| 40 | - return $this->Link() . '/log'; |
|
| 40 | + return $this->Link().'/log'; |
|
| 41 | 41 | } |
| 42 | 42 | |
| 43 | 43 | /** |