]> source.dussan.org Git - nextcloud-server.git/commitdiff
reformat code
authorFlorin Peter <github@florin-peter.de>
Mon, 3 Jun 2013 16:42:13 +0000 (18:42 +0200)
committerFlorin Peter <github@florin-peter.de>
Mon, 3 Jun 2013 16:42:13 +0000 (18:42 +0200)
apps/files_encryption/ajax/updatePrivateKeyPassword.php
apps/files_encryption/hooks/hooks.php
apps/files_encryption/lib/crypt.php
apps/files_encryption/lib/helper.php
apps/files_encryption/lib/session.php
apps/files_encryption/lib/util.php
apps/files_encryption/settings-personal.php
apps/files_encryption/templates/settings-admin.php
apps/files_encryption/tests/crypt.php
apps/files_encryption/tests/share.php

index e0b3d55d8b3abc16f2e5c2eb1fe15ce5e5a978d2..49f97dd3231425b046953db51e8d7a144769b73d 100644 (file)
@@ -29,7 +29,7 @@ $user = \OCP\User::getUser();
 $proxyStatus = \OC_FileProxy::$enabled;
 \OC_FileProxy::$enabled = false;
 
-$keyPath = '/' . $user . '/files_encryption/'.$user.'.private.key';
+$keyPath = '/' . $user . '/files_encryption/' . $user . '.private.key';
 
 $encryptedKey = $view->file_get_contents($keyPath);
 $decryptedKey = \OCA\Encryption\Crypt::decryptPrivateKey($encryptedKey, $oldPassword);
index 5271b51202c362c7d9a5a8b7b240db19e095f9af..cfe9e9d2a322d3098ea237e15e4f71b2d36614bf 100644 (file)
@@ -57,8 +57,9 @@ class Hooks {
 \r
                $privateKey = Crypt::decryptPrivateKey($encryptedKey, $params['password']);\r
 \r
-               if($privateKey === false) {\r
-                       \OCP\Util::writeLog('Encryption library', 'Private key for user "' . $params['uid'] . '" is not valid! Maybe the user password was changed from outside if so please change it back to gain access', \OCP\Util::ERROR);\r
+               if ($privateKey === false) {\r
+                       \OCP\Util::writeLog('Encryption library', 'Private key for user "' . $params['uid']\r
+                                                                                                         . '" is not valid! Maybe the user password was changed from outside if so please change it back to gain access', \OCP\Util::ERROR);\r
                }\r
 \r
                $session = new \OCA\Encryption\Session($view);\r
@@ -332,7 +333,7 @@ class Hooks {
                        $sharingEnabled = \OCP\Share::isEnabled();\r
 \r
                        // get the path including mount point only if not a shared folder\r
-                       if(strncmp($path, '/Shared' , strlen('/Shared') !== 0)) {\r
+                       if (strncmp($path, '/Shared', strlen('/Shared') !== 0)) {\r
                                // get path including the the storage mount point\r
                                $path = $util->getPathWithMountPoint($params['itemSource']);\r
                        }\r
@@ -409,14 +410,14 @@ class Hooks {
                        }\r
 \r
                        // get the path including mount point only if not a shared folder\r
-                       if(strncmp($path, '/Shared' , strlen('/Shared') !== 0)) {\r
+                       if (strncmp($path, '/Shared', strlen('/Shared') !== 0)) {\r
                                // get path including the the storage mount point\r
                                $path = $util->getPathWithMountPoint($params['itemSource']);\r
                        }\r
 \r
                        // if we unshare a folder we need a list of all (sub-)files\r
                        if ($params['itemType'] === 'folder') {\r
-                               $allFiles = $util->getAllFiles( $path );\r
+                               $allFiles = $util->getAllFiles($path);\r
                        } else {\r
                                $allFiles = array($path);\r
                        }\r
index 8c96e536415273cf15e318921dd949e9df2bd188..ecbec2e8b2b6880574e2b1f5d96f777659b5c420 100755 (executable)
@@ -365,9 +365,9 @@ class Crypt {
 \r
                // check if this a valid private key\r
                $res = openssl_pkey_get_private($plainKey);\r
-               if(is_resource($res)) {\r
+               if (is_resource($res)) {\r
                        $sslInfo = openssl_pkey_get_details($res);\r
-                       if(!isset($sslInfo['key'])) {\r
+                       if (!isset($sslInfo['key'])) {\r
                                $plainKey = false;\r
                        }\r
                } else {\r
index 42871a4a955a0afc106ff5b818cabbd4ce9ce58e..3e581a6ee394d04ffe8243e7d8b2d298701b89fa 100755 (executable)
@@ -73,7 +73,7 @@ class Helper {
                if (!$util->ready()) {
 
                        \OCP\Util::writeLog('Encryption library', 'User account "' . $util->getUserId()
-                                                                                                . '" is not ready for encryption; configuration started', \OCP\Util::DEBUG);
+                                                                                                         . '" is not ready for encryption; configuration started', \OCP\Util::DEBUG);
 
                        if (!$util->setupServerSide($password)) {
                                return false;
index 9b0ca224c84e0645c93b33e4ea124e6b1351f51b..1911386cd12f06832d2406071a4092942191c7d7 100644 (file)
@@ -88,9 +88,10 @@ class Session {
                        $proxyStatus = \OC_FileProxy::$enabled;
                        \OC_FileProxy::$enabled = false;
 
-                       $encryptedKey = $this->view->file_get_contents( '/owncloud_private_key/' . $publicShareKeyId . '.private.key' );
+                       $encryptedKey = $this->view->file_get_contents(
+                               '/owncloud_private_key/' . $publicShareKeyId . '.private.key');
                        $privateKey = Crypt::decryptPrivateKey($encryptedKey, '');
-                       $this->setPublicSharePrivateKey( $privateKey );
+                       $this->setPublicSharePrivateKey($privateKey);
 
                        \OC_FileProxy::$enabled = $proxyStatus;
                }
@@ -121,7 +122,7 @@ class Session {
                if (\OCA\Encryption\Helper::isPublicAccess()) {
                        return $this->getPublicSharePrivateKey();
                } else {
-                       if (!is_null( \OC::$session->get('privateKey') )) {
+                       if (!is_null(\OC::$session->get('privateKey'))) {
                                return \OC::$session->get('privateKey');
                        } else {
                                return false;
@@ -136,7 +137,7 @@ class Session {
         */
        public function setPublicSharePrivateKey($privateKey) {
 
-                       \OC::$session->set('publicSharePrivateKey', $privateKey);
+               \OC::$session->set('publicSharePrivateKey', $privateKey);
 
                return true;
 
@@ -149,7 +150,7 @@ class Session {
         */
        public function getPublicSharePrivateKey() {
 
-               if (!is_null( \OC::$session->get('publicSharePrivateKey') )) {
+               if (!is_null(\OC::$session->get('publicSharePrivateKey'))) {
                        return \OC::$session->get('publicSharePrivateKey');
                } else {
                        return false;
@@ -176,7 +177,7 @@ class Session {
         */
        public function getLegacyKey() {
 
-               if ( !is_null( \OC::$session->get('legacyKey') ) ) {
+               if (!is_null(\OC::$session->get('legacyKey'))) {
 
                        return \OC::$session->get('legacyKey');
 
index 6923b81b92627c463358b9a63d1cd8dc49684f4d..6446e83222ef8735d0840bcf10bbdd9e216ce8b0 100644 (file)
@@ -302,7 +302,7 @@ class Util {
                if (\OCP\DB::isError($result)) {
                        \OCP\Util::writeLog('Encryption library', \OC_DB::getErrorMessage($result), \OCP\Util::ERROR);
                } else {
-                       if($result->numRows() > 0) {
+                       if ($result->numRows() > 0) {
                                $row = $result->fetchRow();
                                if (isset($row['recovery_enabled'])) {
                                        $recoveryEnabled[] = $row['recovery_enabled'];
@@ -442,7 +442,7 @@ class Util {
 
                                                        // If the file uses old
                                                        // encryption system
-                                               } elseif ( Crypt::isLegacyEncryptedContent( $data, $relPath ) ) {
+                                               } elseif (Crypt::isLegacyEncryptedContent($data, $relPath)) {
 
                                                        $found['legacy'][] = array(
                                                                'name' => $file,
@@ -573,7 +573,9 @@ class Util {
                // get relative path
                $relativePath = \OCA\Encryption\Helper::stripUserFilesPath($path);
 
-               if (isset($pathParts[2]) && $pathParts[2] === 'files' && $this->view->file_exists($path) && $this->isEncryptedPath($path)) {
+               if (isset($pathParts[2]) && $pathParts[2] === 'files' && $this->view->file_exists($path)
+                       && $this->isEncryptedPath($path)
+               ) {
 
                        // get the size from filesystem
                        $fullPath = $this->view->getLocalFile($path);
@@ -643,7 +645,7 @@ class Util {
                return $result;
        }
 
-       
+
        /**
         * @param $path
         * @return bool
@@ -687,28 +689,32 @@ class Util {
                                $relPath = $plainFile['path'];
 
                                //relative to /data
-                               $rawPath = '/'.$this->userId . '/files/' . $plainFile['path'];
+                               $rawPath = '/' . $this->userId . '/files/' . $plainFile['path'];
 
                                // Open plain file handle for binary reading
-                               $plainHandle = $this->view->fopen( $rawPath, 'rb' );
+                               $plainHandle = $this->view->fopen($rawPath, 'rb');
 
                                // Open enc file handle for binary writing, with same filename as original plain file
-                               $encHandle = fopen( 'crypt://' . $relPath.'.tmp', 'wb' );
+                               $encHandle = fopen('crypt://' . $relPath . '.tmp', 'wb');
 
                                // Move plain file to a temporary location
-                               $size = stream_copy_to_stream( $plainHandle, $encHandle );
+                               $size = stream_copy_to_stream($plainHandle, $encHandle);
 
                                fclose($encHandle);
 
                                $fakeRoot = $this->view->getRoot();
-                               $this->view->chroot('/'.$this->userId.'/files');
+                               $this->view->chroot('/' . $this->userId . '/files');
 
                                $this->view->rename($relPath . '.tmp', $relPath);
 
                                $this->view->chroot($fakeRoot);
 
                                // Add the file to the cache
-                               \OC\Files\Filesystem::putFileInfo( $relPath, array( 'encrypted' => true, 'size' => $size, 'unencrypted_size' => $size ) );
+                               \OC\Files\Filesystem::putFileInfo($relPath, array(
+                                                                                                                                'encrypted' => true,
+                                                                                                                                'size' => $size,
+                                                                                                                                'unencrypted_size' => $size
+                                                                                                                       ));
                        }
 
                        // Encrypt legacy encrypted files
@@ -735,7 +741,7 @@ class Util {
                                        $publicKeys = Keymanager::getPublicKeys($this->view, $uniqueUserIds);
 
                                        // Recrypt data, generate catfile
-                                       $recrypted = Crypt::legacyKeyRecryptKeyfile( $legacyData, $legacyPassphrase, $publicKeys );
+                                       $recrypted = Crypt::legacyKeyRecryptKeyfile($legacyData, $legacyPassphrase, $publicKeys);
 
                                        $rawPath = $legacyFile['path'];
                                        $relPath = \OCA\Encryption\Helper::stripUserFilesPath($rawPath);
@@ -831,7 +837,7 @@ class Util {
                if (\OCP\DB::isError($result)) {
                        \OCP\Util::writeLog('Encryption library', \OC_DB::getErrorMessage($result), \OCP\Util::ERROR);
                } else {
-                       if($result->numRows() > 0) {
+                       if ($result->numRows() > 0) {
                                $row = $result->fetchRow();
                                $path = substr($row['path'], strlen('files'));
                        }
@@ -1102,7 +1108,7 @@ class Util {
                if (\OCP\DB::isError($result)) {
                        \OCP\Util::writeLog('Encryption library', \OC_DB::getErrorMessage($result), \OCP\Util::ERROR);
                } else {
-                       if($result->numRows() > 0) {
+                       if ($result->numRows() > 0) {
                                $row = $result->fetchRow();
                                if (isset($row['migration_status'])) {
                                        $migrationStatus[] = $row['migration_status'];
@@ -1191,7 +1197,8 @@ class Util {
 
                $result = array();
 
-               $content = $this->view->getDirectoryContent(\OC\Files\Filesystem::normalizePath($this->userFilesDir . '/' . $dir));
+               $content = $this->view->getDirectoryContent(\OC\Files\Filesystem::normalizePath(
+                       $this->userFilesDir . '/' . $dir));
 
                // handling for re shared folders
                $pathSplit = explode('/', $dir);
@@ -1252,7 +1259,7 @@ class Util {
                if (\OCP\DB::isError($result)) {
                        \OCP\Util::writeLog('Encryption library', \OC_DB::getErrorMessage($result), \OCP\Util::ERROR);
                } else {
-                       if($result->numRows() > 0) {
+                       if ($result->numRows() > 0) {
                                $row = $result->fetchRow();
                        }
                }
@@ -1278,7 +1285,7 @@ class Util {
                if (\OCP\DB::isError($result)) {
                        \OCP\Util::writeLog('Encryption library', \OC_DB::getErrorMessage($result), \OCP\Util::ERROR);
                } else {
-                       if($result->numRows() > 0) {
+                       if ($result->numRows() > 0) {
                                $row = $result->fetchRow();
                        }
                }
@@ -1303,7 +1310,7 @@ class Util {
                if (\OCP\DB::isError($result)) {
                        \OCP\Util::writeLog('Encryption library', \OC_DB::getErrorMessage($result), \OCP\Util::ERROR);
                } else {
-                       if($result->numRows() > 0) {
+                       if ($result->numRows() > 0) {
                                $source = $result->fetchRow();
                        }
                }
@@ -1324,7 +1331,7 @@ class Util {
                                if (\OCP\DB::isError($result)) {
                                        \OCP\Util::writeLog('Encryption library', \OC_DB::getErrorMessage($result), \OCP\Util::ERROR);
                                } else {
-                                       if($result->numRows() > 0) {
+                                       if ($result->numRows() > 0) {
                                                $item = $result->fetchRow();
                                        }
                                }
@@ -1534,7 +1541,7 @@ class Util {
                list($storage, $internalPath) = \OC\Files\Cache\Cache::getById($id);
                $mount = \OC\Files\Filesystem::getMountByStorageId($storage);
                $mountPoint = $mount[0]->getMountPoint();
-               $path = \OC\Files\Filesystem::normalizePath($mountPoint.'/'.$internalPath);
+               $path = \OC\Files\Filesystem::normalizePath($mountPoint . '/' . $internalPath);
 
                // reformat the path to be relative e.g. /user/files/folder becomes /folder/
                $relativePath = \OCA\Encryption\Helper::stripUserFilesPath($path);
index d23a4cfdde3e0ecf2e360c7d8ad326a7cb008e3c..3aa8b399355006661df22b0eedf3563a24c7050c 100644 (file)
@@ -26,7 +26,7 @@ $recoveryEnabledForUser = $util->recoveryEnabledForUser();
 \r
 $tmpl->assign('recoveryEnabled', $recoveryAdminEnabled);\r
 $tmpl->assign('recoveryEnabledForUser', $recoveryEnabledForUser);\r
-$tmpl->assign("privateKeySet" , $privateKeySet);\r
+$tmpl->assign('privateKeySet', $privateKeySet);\r
 \r
 return $tmpl->fetchPage();\r
 \r
index 18fea1845f42189f9fce958377cd5984c5e1cccb..c420b006c4572132b9a58ac87dd7f4129e8a6c56 100644 (file)
@@ -1,54 +1,56 @@
 <form id="encryption">
        <fieldset class="personalblock">
-               
+
                <p>
-                       <strong><?php p($l->t( 'Encryption' )); ?></strong>
-                       <br />
+                       <strong><?php p($l->t('Encryption')); ?></strong>
+                       <br/>
                </p>
+
                <p>
-                       <?php p($l->t( "Enable encryption passwords recovery key (allow sharing to recovery key):" )); ?>
-                       <br />
-                       <br />
-                       <input type="password" name="recoveryPassword" id="recoveryPassword" />
-                       <label for="recoveryPassword"><?php p($l->t( "Recovery account password" )); ?></label>
-                       <br />
-                       <input 
-                       type='radio'
-                       name='adminEnableRecovery'
-                       value='1'
-                       <?php echo ( $_["recoveryEnabled"] == 1 ? 'checked="checked"' : 'disabled' ); ?> />
-                       <?php p($l->t( "Enabled" )); ?>
-                       <br />
-                       
-                       <input 
-                       type='radio'
-                       name='adminEnableRecovery'
-                       value='0'
-                       <?php echo ( $_["recoveryEnabled"] == 0 ? 'checked="checked"' : 'disabled' ); ?> />
-                       <?php p($l->t( "Disabled" )); ?>
+                       <?php p($l->t("Enable encryption passwords recovery key (allow sharing to recovery key):")); ?>
+                       <br/>
+                       <br/>
+                       <input type="password" name="recoveryPassword" id="recoveryPassword"/>
+                       <label for="recoveryPassword"><?php p($l->t("Recovery account password")); ?></label>
+                       <br/>
+                       <input
+                               type='radio'
+                               name='adminEnableRecovery'
+                               value='1'
+                               <?php echo($_["recoveryEnabled"] == 1 ? 'checked="checked"' : 'disabled'); ?> />
+                       <?php p($l->t("Enabled")); ?>
+                       <br/>
+
+                       <input
+                               type='radio'
+                               name='adminEnableRecovery'
+                               value='0'
+                               <?php echo($_["recoveryEnabled"] == 0 ? 'checked="checked"' : 'disabled'); ?> />
+                       <?php p($l->t("Disabled")); ?>
                </p>
-               <br /><br />
+               <br/><br/>
+
                <p>
-                       <strong><?php p($l->t( "Change encryption passwords recovery key:" )); ?></strong>
-                       <br /><br />
-                       <input 
+                       <strong><?php p($l->t("Change encryption passwords recovery key:")); ?></strong>
+                       <br/><br/>
+                       <input
                                type="password"
                                name="changeRecoveryPassword"
                                id="oldRecoveryPassword"
-                               <?php echo ( $_["recoveryEnabled"] == 0 ? 'disabled' : '' ); ?> />
-                       <label for="oldRecoveryPassword"><?php p($l->t( "Old Recovery account password" )); ?></label>
-                       <br />
-                       <input 
+                               <?php echo($_["recoveryEnabled"] == 0 ? 'disabled' : ''); ?> />
+                       <label for="oldRecoveryPassword"><?php p($l->t("Old Recovery account password")); ?></label>
+                       <br/>
+                       <input
                                type="password"
                                name="changeRecoveryPassword"
                                id="newRecoveryPassword"
-                               <?php echo ( $_["recoveryEnabled"] == 0 ? 'disabled' : '' ); ?> />
-                       <label for="newRecoveryPassword"><?php p($l->t( "New Recovery account password" )); ?></label>
-                       <br />
+                               <?php echo($_["recoveryEnabled"] == 0 ? 'disabled' : ''); ?> />
+                       <label for="newRecoveryPassword"><?php p($l->t("New Recovery account password")); ?></label>
+                       <br/>
                        <button
                                type="button"
                                name="submitChangeRecoveryKey"
-                               disabled><?php p($l->t( "Change Password" )); ?>
+                               disabled><?php p($l->t("Change Password")); ?>
                        </button>
                        <span class="msg"></span>
                </p>
index bb84ff26907e4d612cf0227e91fbee1713fcb7d9..d856e5d59b513494483d228c1dcd05efa75c7cd3 100755 (executable)
@@ -92,8 +92,7 @@ class Test_Encryption_Crypt extends \PHPUnit_Framework_TestCase {
                // reset app files_trashbin
                if ($this->stateFilesTrashbin) {
                        OC_App::enable('files_trashbin');
-               }
-               else {
+               } else {
                        OC_App::disable('files_trashbin');
                }
        }
index 28f0de4941bef0e4dddaec413a90001a590a943b..9a0d542c6d55320ad751cd5a9d9ed113dc8f24be 100755 (executable)
@@ -111,8 +111,7 @@ class Test_Encryption_Share extends \PHPUnit_Framework_TestCase {
                // reset app files_trashbin
                if ($this->stateFilesTrashbin) {
                        OC_App::enable('files_trashbin');
-               }
-               else {
+               } else {
                        OC_App::disable('files_trashbin');
                }
        }