@@ -16,7 +16,7 @@ discard block |
||
16 | 16 | * Calls sniff once and then caches |
17 | 17 | */ |
18 | 18 | public function details() { |
19 | - if(!$this->details) $this->details = $this->sniff(); |
|
19 | + if (!$this->details) $this->details = $this->sniff(); |
|
20 | 20 | return $this->details; |
21 | 21 | } |
22 | 22 | |
@@ -26,16 +26,16 @@ discard block |
||
26 | 26 | public function sniff() { |
27 | 27 | global $snifferFileContent; |
28 | 28 | |
29 | - if(!$snifferFileContent) $snifferFileContent = file_get_contents(PACKAGE_ROOT . 'src/sspak-sniffer.php'); |
|
29 | + if (!$snifferFileContent) $snifferFileContent = file_get_contents(PACKAGE_ROOT.'src/sspak-sniffer.php'); |
|
30 | 30 | |
31 | - $remoteSniffer = '/tmp/sspak-sniffer-' . rand(100000,999999) . '.php'; |
|
31 | + $remoteSniffer = '/tmp/sspak-sniffer-'.rand(100000, 999999).'.php'; |
|
32 | 32 | $this->uploadContent($snifferFileContent, $remoteSniffer); |
33 | 33 | |
34 | 34 | $result = $this->execSudo(array('/usr/bin/env', 'php', $remoteSniffer, $this->path)); |
35 | 35 | $this->unlink($remoteSniffer); |
36 | 36 | |
37 | 37 | $parsed = @unserialize($result['output']); |
38 | - if(!$parsed) throw new Exception("Could not parse sspak-sniffer content:\n{$result['output']}\n"); |
|
38 | + if (!$parsed) throw new Exception("Could not parse sspak-sniffer content:\n{$result['output']}\n"); |
|
39 | 39 | return $parsed; |
40 | 40 | } |
41 | 41 | |
@@ -46,19 +46,19 @@ discard block |
||
46 | 46 | * @return array A map containing 'return', 'output', and 'error' |
47 | 47 | */ |
48 | 48 | public function execSudo($command, $options = array()) { |
49 | - if($this->sudo) { |
|
50 | - if(is_array($command)) $command = $this->executor->commandArrayToString($command); |
|
49 | + if ($this->sudo) { |
|
50 | + if (is_array($command)) $command = $this->executor->commandArrayToString($command); |
|
51 | 51 | // Try running sudo without asking for a password |
52 | 52 | try { |
53 | - return $this->exec("sudo -n -u " . escapeshellarg($this->sudo) . " " . $command, $options); |
|
53 | + return $this->exec("sudo -n -u ".escapeshellarg($this->sudo)." ".$command, $options); |
|
54 | 54 | |
55 | 55 | // Otherwise capture SUDO password ourselves and pass it in through STDIN |
56 | - } catch(Exception $e) { |
|
56 | + } catch (Exception $e) { |
|
57 | 57 | echo "[sspak sudo] Enter your password: "; |
58 | - $stdin = fopen( 'php://stdin', 'r'); |
|
58 | + $stdin = fopen('php://stdin', 'r'); |
|
59 | 59 | $password = fgets($stdin); |
60 | 60 | |
61 | - return $this->exec("sudo -S -p '' -u " . escapeshellarg($this->sudo) . " " . $command, array('inputContent' => $password)); |
|
61 | + return $this->exec("sudo -S -p '' -u ".escapeshellarg($this->sudo)." ".$command, array('inputContent' => $password)); |
|
62 | 62 | } |
63 | 63 | |
64 | 64 | } else { |
@@ -77,8 +77,8 @@ discard block |
||
77 | 77 | |
78 | 78 | // Check the database type |
79 | 79 | $dbFunction = 'putdb_'.$details['db_type']; |
80 | - if(!method_exists($this,$dbFunction)) { |
|
81 | - throw new Exception("Can't process database type '" . $details['db_type'] . "'"); |
|
80 | + if (!method_exists($this, $dbFunction)) { |
|
81 | + throw new Exception("Can't process database type '".$details['db_type']."'"); |
|
82 | 82 | } |
83 | 83 | |
84 | 84 | // Extract DB direct from sspak file |
@@ -97,7 +97,7 @@ discard block |
||
97 | 97 | $hostArg = ''; |
98 | 98 | $portArg = ''; |
99 | 99 | if (!empty($conf['db_server']) && $conf['db_server'] != 'localhost') { |
100 | - if (strpos($conf['db_server'], ':')!==false) { |
|
100 | + if (strpos($conf['db_server'], ':') !== false) { |
|
101 | 101 | // Handle "server:port" format. |
102 | 102 | $server = explode(':', $conf['db_server'], 2); |
103 | 103 | $hostArg = escapeshellarg("--host=".$server[0]); |
@@ -106,9 +106,9 @@ discard block |
||
106 | 106 | $hostArg = escapeshellarg("--host=".$conf['db_server']); |
107 | 107 | } |
108 | 108 | } |
109 | - $dbCommand = "create database if not exists `" . addslashes($conf['db_database']) . "`"; |
|
110 | - if($dropdb) { |
|
111 | - $dbCommand = "drop database if exists `" . addslashes($conf['db_database']) . "`; " . $dbCommand; |
|
109 | + $dbCommand = "create database if not exists `".addslashes($conf['db_database'])."`"; |
|
110 | + if ($dropdb) { |
|
111 | + $dbCommand = "drop database if exists `".addslashes($conf['db_database'])."`; ".$dbCommand; |
|
112 | 112 | } |
113 | 113 | |
114 | 114 | $this->exec("echo '$dbCommand' | mysql $usernameArg $passwordArg $hostArg $portArg"); |
@@ -128,7 +128,7 @@ discard block |
||
128 | 128 | |
129 | 129 | // Create database if needed |
130 | 130 | $result = $this->exec("echo \"select count(*) from pg_catalog.pg_database where datname = $databaseArg\" | $passwordArg psql $usernameArg $hostArg $databaseArg -qt"); |
131 | - if(trim($result['output']) == '0') { |
|
131 | + if (trim($result['output']) == '0') { |
|
132 | 132 | $this->exec("$passwordArg createdb $usernameArg $hostArg $databaseArg"); |
133 | 133 | } |
134 | 134 | |
@@ -150,7 +150,7 @@ discard block |
||
150 | 150 | $assetsPathExec = $this->exec("if [ -L {$assetsPath} ]; then readlink -f {$assetsPath}; else echo {$assetsPath}; fi"); |
151 | 151 | $assetsPath = trim($assetsPathExec["output"]); |
152 | 152 | |
153 | - $assetsOldPath = $assetsPath . '.old'; |
|
153 | + $assetsOldPath = $assetsPath.'.old'; |
|
154 | 154 | $assetsParentArg = escapeshellarg(dirname($assetsPath)); |
155 | 155 | |
156 | 156 | // Move existing assets to assets.old |
@@ -177,7 +177,7 @@ discard block |
||
177 | 177 | */ |
178 | 178 | public function putgit($details) { |
179 | 179 | $this->exec(array('git', 'clone', $details['remote'], $this->path)); |
180 | - $this->exec("cd $this->path && git checkout " . escapeshellarg($details['branch'])); |
|
180 | + $this->exec("cd $this->path && git checkout ".escapeshellarg($details['branch'])); |
|
181 | 181 | return true; |
182 | 182 | } |
183 | 183 | } |