@@ -16,7 +16,9 @@ discard block |
||
16 | 16 | * Calls sniff once and then caches |
17 | 17 | */ |
18 | 18 | public function details() { |
19 | - if(!$this->details) $this->details = $this->sniff(); |
|
19 | + if(!$this->details) { |
|
20 | + $this->details = $this->sniff(); |
|
21 | + } |
|
20 | 22 | return $this->details; |
21 | 23 | } |
22 | 24 | |
@@ -26,7 +28,9 @@ discard block |
||
26 | 28 | public function sniff() { |
27 | 29 | global $snifferFileContent; |
28 | 30 | |
29 | - if(!$snifferFileContent) $snifferFileContent = file_get_contents(PACKAGE_ROOT . 'src/sspak-sniffer.php'); |
|
31 | + if(!$snifferFileContent) { |
|
32 | + $snifferFileContent = file_get_contents(PACKAGE_ROOT . 'src/sspak-sniffer.php'); |
|
33 | + } |
|
30 | 34 | |
31 | 35 | $remoteSniffer = '/tmp/sspak-sniffer-' . rand(100000,999999) . '.php'; |
32 | 36 | $this->uploadContent($snifferFileContent, $remoteSniffer); |
@@ -35,7 +39,9 @@ discard block |
||
35 | 39 | $this->unlink($remoteSniffer); |
36 | 40 | |
37 | 41 | $parsed = @unserialize($result['output']); |
38 | - if(!$parsed) throw new Exception("Could not parse sspak-sniffer content:\n{$result['output']}\n"); |
|
42 | + if(!$parsed) { |
|
43 | + throw new Exception("Could not parse sspak-sniffer content:\n{$result['output']}\n"); |
|
44 | + } |
|
39 | 45 | return $parsed; |
40 | 46 | } |
41 | 47 | |
@@ -45,7 +51,9 @@ discard block |
||
45 | 51 | */ |
46 | 52 | public function execSudo($command, $options = array()) { |
47 | 53 | if($this->sudo) { |
48 | - if(is_array($command)) $command = $this->executor->commandArrayToString($command); |
|
54 | + if(is_array($command)) { |
|
55 | + $command = $this->executor->commandArrayToString($command); |
|
56 | + } |
|
49 | 57 | // Try running sudo without asking for a password |
50 | 58 | try { |
51 | 59 | return $this->exec("sudo -n -u " . escapeshellarg($this->sudo) . " " . $command, $options); |
@@ -68,9 +68,8 @@ discard block |
||
68 | 68 | |
69 | 69 | /** |
70 | 70 | * Put the database from the given sspak file into this webroot. |
71 | - * @param array $details The previously sniffed details of this webroot |
|
72 | 71 | * @param bool $dropdb Drop the DB prior to install |
73 | - * @param string $sspakFile Filename |
|
72 | + * @param SSPakFile $sspak Filename |
|
74 | 73 | */ |
75 | 74 | public function putdb($sspak, $dropdb) { |
76 | 75 | $details = $this->details(); |
@@ -138,7 +137,7 @@ discard block |
||
138 | 137 | } |
139 | 138 | |
140 | 139 | /** |
141 | - * @param $sspak SSPakFile SSPak file to extract assets from |
|
140 | + * @param SSPakFile $sspak SSPakFile SSPak file to extract assets from |
|
142 | 141 | * @todo There should be a return value or exception thrown to indicate success or failure to put assets |
143 | 142 | */ |
144 | 143 | public function putassets($sspak) { |
@@ -16,7 +16,7 @@ discard block |
||
16 | 16 | * Calls sniff once and then caches |
17 | 17 | */ |
18 | 18 | public function details() { |
19 | - if(!$this->details) $this->details = $this->sniff(); |
|
19 | + if (!$this->details) $this->details = $this->sniff(); |
|
20 | 20 | return $this->details; |
21 | 21 | } |
22 | 22 | |
@@ -26,16 +26,16 @@ discard block |
||
26 | 26 | public function sniff() { |
27 | 27 | global $snifferFileContent; |
28 | 28 | |
29 | - if(!$snifferFileContent) $snifferFileContent = file_get_contents(PACKAGE_ROOT . 'src/sspak-sniffer.php'); |
|
29 | + if (!$snifferFileContent) $snifferFileContent = file_get_contents(PACKAGE_ROOT.'src/sspak-sniffer.php'); |
|
30 | 30 | |
31 | - $remoteSniffer = '/tmp/sspak-sniffer-' . rand(100000,999999) . '.php'; |
|
31 | + $remoteSniffer = '/tmp/sspak-sniffer-'.rand(100000, 999999).'.php'; |
|
32 | 32 | $this->uploadContent($snifferFileContent, $remoteSniffer); |
33 | 33 | |
34 | 34 | $result = $this->execSudo(array('/usr/bin/env', 'php', $remoteSniffer, $this->path)); |
35 | 35 | $this->unlink($remoteSniffer); |
36 | 36 | |
37 | 37 | $parsed = @unserialize($result['output']); |
38 | - if(!$parsed) throw new Exception("Could not parse sspak-sniffer content:\n{$result['output']}\n"); |
|
38 | + if (!$parsed) throw new Exception("Could not parse sspak-sniffer content:\n{$result['output']}\n"); |
|
39 | 39 | return $parsed; |
40 | 40 | } |
41 | 41 | |
@@ -46,19 +46,19 @@ discard block |
||
46 | 46 | * @return array A map containing 'return', 'output', and 'error' |
47 | 47 | */ |
48 | 48 | public function execSudo($command, $options = array()) { |
49 | - if($this->sudo) { |
|
50 | - if(is_array($command)) $command = $this->executor->commandArrayToString($command); |
|
49 | + if ($this->sudo) { |
|
50 | + if (is_array($command)) $command = $this->executor->commandArrayToString($command); |
|
51 | 51 | // Try running sudo without asking for a password |
52 | 52 | try { |
53 | - return $this->exec("sudo -n -u " . escapeshellarg($this->sudo) . " " . $command, $options); |
|
53 | + return $this->exec("sudo -n -u ".escapeshellarg($this->sudo)." ".$command, $options); |
|
54 | 54 | |
55 | 55 | // Otherwise capture SUDO password ourselves and pass it in through STDIN |
56 | - } catch(Exception $e) { |
|
56 | + } catch (Exception $e) { |
|
57 | 57 | echo "[sspak sudo] Enter your password: "; |
58 | - $stdin = fopen( 'php://stdin', 'r'); |
|
58 | + $stdin = fopen('php://stdin', 'r'); |
|
59 | 59 | $password = fgets($stdin); |
60 | 60 | |
61 | - return $this->exec("sudo -S -p '' -u " . escapeshellarg($this->sudo) . " " . $command, array('inputContent' => $password)); |
|
61 | + return $this->exec("sudo -S -p '' -u ".escapeshellarg($this->sudo)." ".$command, array('inputContent' => $password)); |
|
62 | 62 | } |
63 | 63 | |
64 | 64 | } else { |
@@ -77,8 +77,8 @@ discard block |
||
77 | 77 | |
78 | 78 | // Check the database type |
79 | 79 | $dbFunction = 'putdb_'.$details['db_type']; |
80 | - if(!method_exists($this,$dbFunction)) { |
|
81 | - throw new Exception("Can't process database type '" . $details['db_type'] . "'"); |
|
80 | + if (!method_exists($this, $dbFunction)) { |
|
81 | + throw new Exception("Can't process database type '".$details['db_type']."'"); |
|
82 | 82 | } |
83 | 83 | |
84 | 84 | // Extract DB direct from sspak file |
@@ -97,7 +97,7 @@ discard block |
||
97 | 97 | $hostArg = ''; |
98 | 98 | $portArg = ''; |
99 | 99 | if (!empty($conf['db_server']) && $conf['db_server'] != 'localhost') { |
100 | - if (strpos($conf['db_server'], ':')!==false) { |
|
100 | + if (strpos($conf['db_server'], ':') !== false) { |
|
101 | 101 | // Handle "server:port" format. |
102 | 102 | $server = explode(':', $conf['db_server'], 2); |
103 | 103 | $hostArg = escapeshellarg("--host=".$server[0]); |
@@ -106,9 +106,9 @@ discard block |
||
106 | 106 | $hostArg = escapeshellarg("--host=".$conf['db_server']); |
107 | 107 | } |
108 | 108 | } |
109 | - $dbCommand = "create database if not exists `" . addslashes($conf['db_database']) . "`"; |
|
110 | - if($dropdb) { |
|
111 | - $dbCommand = "drop database if exists `" . addslashes($conf['db_database']) . "`; " . $dbCommand; |
|
109 | + $dbCommand = "create database if not exists `".addslashes($conf['db_database'])."`"; |
|
110 | + if ($dropdb) { |
|
111 | + $dbCommand = "drop database if exists `".addslashes($conf['db_database'])."`; ".$dbCommand; |
|
112 | 112 | } |
113 | 113 | |
114 | 114 | $this->exec("echo '$dbCommand' | mysql $usernameArg $passwordArg $hostArg $portArg"); |
@@ -128,7 +128,7 @@ discard block |
||
128 | 128 | |
129 | 129 | // Create database if needed |
130 | 130 | $result = $this->exec("echo \"select count(*) from pg_catalog.pg_database where datname = $databaseArg\" | $passwordArg psql $usernameArg $hostArg $databaseArg -qt"); |
131 | - if(trim($result['output']) == '0') { |
|
131 | + if (trim($result['output']) == '0') { |
|
132 | 132 | $this->exec("$passwordArg createdb $usernameArg $hostArg $databaseArg"); |
133 | 133 | } |
134 | 134 | |
@@ -150,7 +150,7 @@ discard block |
||
150 | 150 | $assetsPathExec = $this->exec("if [ -L {$assetsPath} ]; then readlink -f {$assetsPath}; else echo {$assetsPath}; fi"); |
151 | 151 | $assetsPath = trim($assetsPathExec["output"]); |
152 | 152 | |
153 | - $assetsOldPath = $assetsPath . '.old'; |
|
153 | + $assetsOldPath = $assetsPath.'.old'; |
|
154 | 154 | $assetsParentArg = escapeshellarg(dirname($assetsPath)); |
155 | 155 | |
156 | 156 | // Move existing assets to assets.old |
@@ -177,7 +177,7 @@ discard block |
||
177 | 177 | */ |
178 | 178 | public function putgit($details) { |
179 | 179 | $this->exec(array('git', 'clone', $details['remote'], $this->path)); |
180 | - $this->exec("cd $this->path && git checkout " . escapeshellarg($details['branch'])); |
|
180 | + $this->exec("cd $this->path && git checkout ".escapeshellarg($details['branch'])); |
|
181 | 181 | return true; |
182 | 182 | } |
183 | 183 | } |