@@ -16,7 +16,9 @@ discard block |
||
| 16 | 16 | * Calls sniff once and then caches |
| 17 | 17 | */ |
| 18 | 18 | public function details() { |
| 19 | - if(!$this->details) $this->details = $this->sniff(); |
|
| 19 | + if(!$this->details) { |
|
| 20 | + $this->details = $this->sniff(); |
|
| 21 | + } |
|
| 20 | 22 | return $this->details; |
| 21 | 23 | } |
| 22 | 24 | |
@@ -26,7 +28,9 @@ discard block |
||
| 26 | 28 | public function sniff() { |
| 27 | 29 | global $snifferFileContent; |
| 28 | 30 | |
| 29 | - if(!$snifferFileContent) $snifferFileContent = file_get_contents(PACKAGE_ROOT . 'src/sspak-sniffer.php'); |
|
| 31 | + if(!$snifferFileContent) { |
|
| 32 | + $snifferFileContent = file_get_contents(PACKAGE_ROOT . 'src/sspak-sniffer.php'); |
|
| 33 | + } |
|
| 30 | 34 | |
| 31 | 35 | $remoteSniffer = '/tmp/sspak-sniffer-' . rand(100000,999999) . '.php'; |
| 32 | 36 | $this->uploadContent($snifferFileContent, $remoteSniffer); |
@@ -35,7 +39,9 @@ discard block |
||
| 35 | 39 | $this->unlink($remoteSniffer); |
| 36 | 40 | |
| 37 | 41 | $parsed = @unserialize($result['output']); |
| 38 | - if(!$parsed) throw new Exception("Could not parse sspak-sniffer content:\n{$result['output']}\n"); |
|
| 42 | + if(!$parsed) { |
|
| 43 | + throw new Exception("Could not parse sspak-sniffer content:\n{$result['output']}\n"); |
|
| 44 | + } |
|
| 39 | 45 | return $parsed; |
| 40 | 46 | } |
| 41 | 47 | |
@@ -45,7 +51,9 @@ discard block |
||
| 45 | 51 | */ |
| 46 | 52 | public function execSudo($command, $options = array()) { |
| 47 | 53 | if($this->sudo) { |
| 48 | - if(is_array($command)) $command = $this->executor->commandArrayToString($command); |
|
| 54 | + if(is_array($command)) { |
|
| 55 | + $command = $this->executor->commandArrayToString($command); |
|
| 56 | + } |
|
| 49 | 57 | // Try running sudo without asking for a password |
| 50 | 58 | try { |
| 51 | 59 | return $this->exec("sudo -n -u " . escapeshellarg($this->sudo) . " " . $command, $options); |
@@ -68,9 +68,8 @@ discard block |
||
| 68 | 68 | |
| 69 | 69 | /** |
| 70 | 70 | * Put the database from the given sspak file into this webroot. |
| 71 | - * @param array $details The previously sniffed details of this webroot |
|
| 72 | 71 | * @param bool $dropdb Drop the DB prior to install |
| 73 | - * @param string $sspakFile Filename |
|
| 72 | + * @param SSPakFile $sspak Filename |
|
| 74 | 73 | */ |
| 75 | 74 | public function putdb($sspak, $dropdb) { |
| 76 | 75 | $details = $this->details(); |
@@ -138,7 +137,7 @@ discard block |
||
| 138 | 137 | } |
| 139 | 138 | |
| 140 | 139 | /** |
| 141 | - * @param $sspak SSPakFile SSPak file to extract assets from |
|
| 140 | + * @param SSPakFile $sspak SSPakFile SSPak file to extract assets from |
|
| 142 | 141 | * @todo There should be a return value or exception thrown to indicate success or failure to put assets |
| 143 | 142 | */ |
| 144 | 143 | public function putassets($sspak) { |
@@ -16,7 +16,7 @@ discard block |
||
| 16 | 16 | * Calls sniff once and then caches |
| 17 | 17 | */ |
| 18 | 18 | public function details() { |
| 19 | - if(!$this->details) $this->details = $this->sniff(); |
|
| 19 | + if (!$this->details) $this->details = $this->sniff(); |
|
| 20 | 20 | return $this->details; |
| 21 | 21 | } |
| 22 | 22 | |
@@ -26,16 +26,16 @@ discard block |
||
| 26 | 26 | public function sniff() { |
| 27 | 27 | global $snifferFileContent; |
| 28 | 28 | |
| 29 | - if(!$snifferFileContent) $snifferFileContent = file_get_contents(PACKAGE_ROOT . 'src/sspak-sniffer.php'); |
|
| 29 | + if (!$snifferFileContent) $snifferFileContent = file_get_contents(PACKAGE_ROOT.'src/sspak-sniffer.php'); |
|
| 30 | 30 | |
| 31 | - $remoteSniffer = '/tmp/sspak-sniffer-' . rand(100000,999999) . '.php'; |
|
| 31 | + $remoteSniffer = '/tmp/sspak-sniffer-'.rand(100000, 999999).'.php'; |
|
| 32 | 32 | $this->uploadContent($snifferFileContent, $remoteSniffer); |
| 33 | 33 | |
| 34 | 34 | $result = $this->execSudo(array('/usr/bin/env', 'php', $remoteSniffer, $this->path)); |
| 35 | 35 | $this->unlink($remoteSniffer); |
| 36 | 36 | |
| 37 | 37 | $parsed = @unserialize($result['output']); |
| 38 | - if(!$parsed) throw new Exception("Could not parse sspak-sniffer content:\n{$result['output']}\n"); |
|
| 38 | + if (!$parsed) throw new Exception("Could not parse sspak-sniffer content:\n{$result['output']}\n"); |
|
| 39 | 39 | return $parsed; |
| 40 | 40 | } |
| 41 | 41 | |
@@ -46,19 +46,19 @@ discard block |
||
| 46 | 46 | * @return array A map containing 'return', 'output', and 'error' |
| 47 | 47 | */ |
| 48 | 48 | public function execSudo($command, $options = array()) { |
| 49 | - if($this->sudo) { |
|
| 50 | - if(is_array($command)) $command = $this->executor->commandArrayToString($command); |
|
| 49 | + if ($this->sudo) { |
|
| 50 | + if (is_array($command)) $command = $this->executor->commandArrayToString($command); |
|
| 51 | 51 | // Try running sudo without asking for a password |
| 52 | 52 | try { |
| 53 | - return $this->exec("sudo -n -u " . escapeshellarg($this->sudo) . " " . $command, $options); |
|
| 53 | + return $this->exec("sudo -n -u ".escapeshellarg($this->sudo)." ".$command, $options); |
|
| 54 | 54 | |
| 55 | 55 | // Otherwise capture SUDO password ourselves and pass it in through STDIN |
| 56 | - } catch(Exception $e) { |
|
| 56 | + } catch (Exception $e) { |
|
| 57 | 57 | echo "[sspak sudo] Enter your password: "; |
| 58 | - $stdin = fopen( 'php://stdin', 'r'); |
|
| 58 | + $stdin = fopen('php://stdin', 'r'); |
|
| 59 | 59 | $password = fgets($stdin); |
| 60 | 60 | |
| 61 | - return $this->exec("sudo -S -p '' -u " . escapeshellarg($this->sudo) . " " . $command, array('inputContent' => $password)); |
|
| 61 | + return $this->exec("sudo -S -p '' -u ".escapeshellarg($this->sudo)." ".$command, array('inputContent' => $password)); |
|
| 62 | 62 | } |
| 63 | 63 | |
| 64 | 64 | } else { |
@@ -77,8 +77,8 @@ discard block |
||
| 77 | 77 | |
| 78 | 78 | // Check the database type |
| 79 | 79 | $dbFunction = 'putdb_'.$details['db_type']; |
| 80 | - if(!method_exists($this,$dbFunction)) { |
|
| 81 | - throw new Exception("Can't process database type '" . $details['db_type'] . "'"); |
|
| 80 | + if (!method_exists($this, $dbFunction)) { |
|
| 81 | + throw new Exception("Can't process database type '".$details['db_type']."'"); |
|
| 82 | 82 | } |
| 83 | 83 | |
| 84 | 84 | // Extract DB direct from sspak file |
@@ -97,7 +97,7 @@ discard block |
||
| 97 | 97 | $hostArg = ''; |
| 98 | 98 | $portArg = ''; |
| 99 | 99 | if (!empty($conf['db_server']) && $conf['db_server'] != 'localhost') { |
| 100 | - if (strpos($conf['db_server'], ':')!==false) { |
|
| 100 | + if (strpos($conf['db_server'], ':') !== false) { |
|
| 101 | 101 | // Handle "server:port" format. |
| 102 | 102 | $server = explode(':', $conf['db_server'], 2); |
| 103 | 103 | $hostArg = escapeshellarg("--host=".$server[0]); |
@@ -106,9 +106,9 @@ discard block |
||
| 106 | 106 | $hostArg = escapeshellarg("--host=".$conf['db_server']); |
| 107 | 107 | } |
| 108 | 108 | } |
| 109 | - $dbCommand = "create database if not exists `" . addslashes($conf['db_database']) . "`"; |
|
| 110 | - if($dropdb) { |
|
| 111 | - $dbCommand = "drop database if exists `" . addslashes($conf['db_database']) . "`; " . $dbCommand; |
|
| 109 | + $dbCommand = "create database if not exists `".addslashes($conf['db_database'])."`"; |
|
| 110 | + if ($dropdb) { |
|
| 111 | + $dbCommand = "drop database if exists `".addslashes($conf['db_database'])."`; ".$dbCommand; |
|
| 112 | 112 | } |
| 113 | 113 | |
| 114 | 114 | $this->exec("echo '$dbCommand' | mysql $usernameArg $passwordArg $hostArg $portArg"); |
@@ -128,7 +128,7 @@ discard block |
||
| 128 | 128 | |
| 129 | 129 | // Create database if needed |
| 130 | 130 | $result = $this->exec("echo \"select count(*) from pg_catalog.pg_database where datname = $databaseArg\" | $passwordArg psql $usernameArg $hostArg $databaseArg -qt"); |
| 131 | - if(trim($result['output']) == '0') { |
|
| 131 | + if (trim($result['output']) == '0') { |
|
| 132 | 132 | $this->exec("$passwordArg createdb $usernameArg $hostArg $databaseArg"); |
| 133 | 133 | } |
| 134 | 134 | |
@@ -150,7 +150,7 @@ discard block |
||
| 150 | 150 | $assetsPathExec = $this->exec("if [ -L {$assetsPath} ]; then readlink -f {$assetsPath}; else echo {$assetsPath}; fi"); |
| 151 | 151 | $assetsPath = trim($assetsPathExec["output"]); |
| 152 | 152 | |
| 153 | - $assetsOldPath = $assetsPath . '.old'; |
|
| 153 | + $assetsOldPath = $assetsPath.'.old'; |
|
| 154 | 154 | $assetsParentArg = escapeshellarg(dirname($assetsPath)); |
| 155 | 155 | |
| 156 | 156 | // Move existing assets to assets.old |
@@ -177,7 +177,7 @@ discard block |
||
| 177 | 177 | */ |
| 178 | 178 | public function putgit($details) { |
| 179 | 179 | $this->exec(array('git', 'clone', $details['remote'], $this->path)); |
| 180 | - $this->exec("cd $this->path && git checkout " . escapeshellarg($details['branch'])); |
|
| 180 | + $this->exec("cd $this->path && git checkout ".escapeshellarg($details['branch'])); |
|
| 181 | 181 | return true; |
| 182 | 182 | } |
| 183 | 183 | } |