Found via `codespell -q 3 -S l10n,./apps/files_external/3rdparty -L adn,ba,boxs,keypair,jus,optionel,ressource,tabel ./apps/` Signed-off-by: luz paz <luzpaz@github.com> Signed-off-by: nextcloud-command <nextcloud-command@users.noreply.github.com>tags/v25.0.0beta5
@@ -1,2 +1,2 @@ | |||
# cloud_federation_api | |||
The cloud federation API allows to share information like files, contacts, calendars, incoming calls, etc accross Nextcloud instances | |||
The cloud federation API allows to share information like files, contacts, calendars, incoming calls, etc across Nextcloud instances |
@@ -31,7 +31,7 @@ | |||
* | |||
* @param {OCA.Activity.ActivityModel} model for this activity | |||
* @param {jQuery} $el jQuery handle for this activity | |||
* @param {string} view The view that displayes this activity | |||
* @param {string} view The view that displays this activity | |||
*/ | |||
prepareModelForDisplay(model, $el, view) { | |||
if (model.get('app') !== 'comments' || model.get('type') !== 'comments') { |
@@ -50,7 +50,7 @@ export default async function({ commentsType, ressourceId }, options = {}) { | |||
<oc:offset>${options.offset || 0}</oc:offset> | |||
</oc:filter-comments>`, | |||
}, options)) | |||
// See example on how it's done normaly | |||
// See example on how it's done normally | |||
// https://github.com/perry-mitchell/webdav-client/blob/9de2da4a2599e06bd86c2778145b7ade39fe0b3c/source/interface/stat.js#L19 | |||
// Waiting for proper REPORT integration https://github.com/perry-mitchell/webdav-client/issues/207 | |||
.then(res => { |
@@ -60,7 +60,7 @@ class SystemPrincipalBackend extends AbstractBackend { | |||
} | |||
/** | |||
* Returns a specific principal, specified by it's path. | |||
* Returns a specific principal, specified by its path. | |||
* The returned structure should be the exact same as from | |||
* getPrincipalsByPrefix. | |||
* |
@@ -50,7 +50,7 @@ class CalendarShareUpdateListener implements IEventListener { | |||
return; | |||
} | |||
$this->logger->debug("Creating activity for Calendar having it's shares updated"); | |||
$this->logger->debug("Creating activity for Calendar having its shares updated"); | |||
$this->activityBackend->onCalendarUpdateShares( | |||
$event->getCalendarData(), |
@@ -55,7 +55,7 @@ class CalDavBackendTest extends AbstractCalDavBackend { | |||
public function testCalendarOperations() { | |||
$calendarId = $this->createTestCalendar(); | |||
// update it's display name | |||
// update its display name | |||
$patch = new PropPatch([ | |||
'{DAV:}displayname' => 'Unit test', | |||
'{urn:ietf:params:xml:ns:caldav}calendar-description' => 'Calendar used for unit testing' |
@@ -193,7 +193,7 @@ class CardDavBackendTest extends TestCase { | |||
$this->assertEquals('Example', $books[0]['{DAV:}displayname']); | |||
$this->assertEquals('User\'s displayname', $books[0]['{http://nextcloud.com/ns}owner-displayname']); | |||
// update it's display name | |||
// update its display name | |||
$patch = new PropPatch([ | |||
'{DAV:}displayname' => 'Unit test', | |||
'{urn:ietf:params:xml:ns:carddav}addressbook-description' => 'Addressbook used for unit testing' |
@@ -623,7 +623,7 @@ class KeyManager { | |||
} | |||
/** | |||
* creat a backup of the users private and public key and then delete it | |||
* create a backup of the users private and public key and then delete it | |||
* | |||
* @param string $uid | |||
*/ |
@@ -969,7 +969,7 @@ class FederatedShareProvider implements IShareProvider { | |||
* @param int $shareType | |||
*/ | |||
public function userDeleted($uid, $shareType) { | |||
//TODO: probabaly a good idea to send unshare info to remote servers | |||
//TODO: probably a good idea to send unshare info to remote servers | |||
$qb = $this->dbConnection->getQueryBuilder(); | |||
@@ -69,7 +69,7 @@ | |||
var url = $(this).val(); | |||
// toggle add-button visiblity based on input length | |||
// toggle add-button visibility based on input length | |||
if ( url.length > 0 ) | |||
$btnSubmit.removeClass("hidden") | |||
else |
@@ -155,7 +155,7 @@ class RequestSharedSecret extends Job { | |||
$endPoints = $this->ocsDiscoveryService->discover($target, 'FEDERATED_SHARING'); | |||
$endPoint = isset($endPoints['shared-secret']) ? $endPoints['shared-secret'] : $this->defaultEndPoint; | |||
// make sure that we have a well formated url | |||
// make sure that we have a well formatted url | |||
$url = rtrim($target, '/') . '/' . trim($endPoint, '/'); | |||
try { |
@@ -1062,7 +1062,7 @@ table.dragshadow td.size { | |||
overflow: hidden; | |||
// we but the thumbnail in background to ensure | |||
// the name is the default click handler | |||
// force back the cursor which have been overrided | |||
// force back the cursor which has been overridden | |||
// and disabled for some reason... | |||
cursor: pointer !important; | |||
@@ -320,7 +320,7 @@ | |||
// depending on whether the menu was previously being shown or not. | |||
this.$el.find('.crumbmenu').addClass('hidden'); | |||
// Show the crumbs to compress the siblings before hidding again the | |||
// Show the crumbs to compress the siblings before hiding again the | |||
// crumbs. This is needed when the siblings expand to fill all the | |||
// available width, as in that case their old width would limit the | |||
// available width for the crumbs. |
@@ -12,7 +12,7 @@ | |||
* The file upload code uses several hooks to interact with blueimps jQuery file upload library: | |||
* 1. the core upload handling hooks are added when initializing the plugin, | |||
* 2. if the browser supports progress events they are added in a separate set after the initialization | |||
* 3. every app can add it's own triggers for fileupload | |||
* 3. every app can add its own triggers for fileupload | |||
* - files adds d'n'd handlers and also reacts to done events to add new rows to the filelist | |||
* - TODO pictures upload button | |||
* - TODO music upload button |
@@ -2591,7 +2591,7 @@ | |||
* @param fileNames array of file names to move | |||
* @param targetPath absolute target path | |||
* @param callback function to call when movement is finished | |||
* @param dir the dir path where fileNames are located (optionnal, will take current folder if undefined) | |||
* @param dir the dir path where fileNames are located (optional, will take current folder if undefined) | |||
*/ | |||
move: function(fileNames, targetPath, callback, dir) { | |||
var self = this; | |||
@@ -2683,7 +2683,7 @@ | |||
* @param fileNames array of file names to copy | |||
* @param targetPath absolute target path | |||
* @param callback to call when copy is finished with success | |||
* @param dir the dir path where fileNames are located (optionnal, will take current folder if undefined) | |||
* @param dir the dir path where fileNames are located (optional, will take current folder if undefined) | |||
*/ | |||
copy: function(fileNames, targetPath, callback, dir) { | |||
var self = this; | |||
@@ -2712,7 +2712,7 @@ | |||
if ( dotIndex > 1) { | |||
var leftPartOfName = targetPathAndName.substr(0, dotIndex); | |||
var fileNumber = leftPartOfName.match(/\d+/); | |||
// TRANSLATORS name that is appended to copied files with the same name, will be put in parenthesis and appened with a number if it is the second+ copy | |||
// TRANSLATORS name that is appended to copied files with the same name, will be put in parenthesis and appended with a number if it is the second+ copy | |||
var copyNameLocalized = t('files', 'copy'); | |||
if (isNaN(fileNumber) ) { | |||
fileNumber++; |
@@ -420,7 +420,7 @@ | |||
_initProgressListener: function (options) { | |||
var that = this, | |||
xhr = options.xhr ? options.xhr() : $.ajaxSettings.xhr(); | |||
// Accesss to the native XHR object is required to add event listeners | |||
// Access to the native XHR object is required to add event listeners | |||
// for the upload progress event: | |||
if (xhr.upload) { | |||
$(xhr.upload).bind('progress', function (e) { | |||
@@ -1060,7 +1060,7 @@ | |||
data.fileInputClone = inputClone; | |||
$('<form></form>').append(inputClone)[0].reset(); | |||
// Detaching allows to insert the fileInput on another form | |||
// without loosing the file input value: | |||
// without losing the file input value: | |||
input.after(inputClone).detach(); | |||
// If the fileInput had focus before it was detached, | |||
// restore focus to the inputClone. | |||
@@ -1138,7 +1138,7 @@ | |||
dirReader = entry.createReader(); | |||
readEntries(); | |||
} else { | |||
// Return an empy list for file system items | |||
// Return an empty list for file system items | |||
// other than files or directories: | |||
dfd.resolve([]); | |||
} |
@@ -68,7 +68,7 @@ class RepairTree extends Command { | |||
->where($query->expr()->eq('fileid', $query->createParameter('fileid'))); | |||
foreach ($rows as $row) { | |||
$output->writeln("Path of file {$row['fileid']} is {$row['path']} but should be {$row['parent_path']}/{$row['name']} based on it's parent", OutputInterface::VERBOSITY_VERBOSE); | |||
$output->writeln("Path of file {$row['fileid']} is {$row['path']} but should be {$row['parent_path']}/{$row['name']} based on its parent", OutputInterface::VERBOSITY_VERBOSE); | |||
if ($fix) { | |||
$fileId = $this->getFileId((int)$row['parent_storage'], $row['parent_path'] . '/' . $row['name']); |
@@ -247,7 +247,7 @@ class ApiController extends Controller { | |||
} | |||
/** | |||
* Returns a list of recently modifed files. | |||
* Returns a list of recently modified files. | |||
* | |||
* @NoAdminRequired | |||
* |
@@ -278,7 +278,7 @@ class Notifier implements INotifier, IDismissableNotifier { | |||
throw new \InvalidArgumentException('Unhandled app'); | |||
} | |||
// TODO: This should all be moved to a service that also the transferownershipContoller uses. | |||
// TODO: This should all be moved to a service that also the transferownershipController uses. | |||
try { | |||
$transferOwnership = $this->mapper->getById((int)$notification->getObjectId()); | |||
} catch (DoesNotExistException $e) { |
@@ -456,7 +456,7 @@ export default { | |||
/** | |||
* Allow to set the Sidebar as fullscreen from OCA.Files.Sidebar | |||
* | |||
* @param {boolean} isFullScreen - Wether or not to render the Sidebar in fullscreen. | |||
* @param {boolean} isFullScreen - Whether or not to render the Sidebar in fullscreen. | |||
*/ | |||
setFullScreenMode(isFullScreen) { | |||
this.isFullScreen = isFullScreen |
@@ -266,7 +266,7 @@ describe('OCA.Files.FileList tests', function() { | |||
type: OCA.Files.FileActions.TYPE_INLINE, | |||
permissions: OC.PERMISSION_ALL, | |||
icon: function() { | |||
// Specify icon for hitory button | |||
// Specify icon for history button | |||
return OC.imagePath('core','actions/history'); | |||
}, | |||
actionHandler: actionStub | |||
@@ -2474,7 +2474,7 @@ describe('OCA.Files.FileList tests', function() { | |||
type: OCA.Files.FileActions.TYPE_INLINE, | |||
permissions: OC.PERMISSION_ALL, | |||
icon: function() { | |||
// Specify icon for hitory button | |||
// Specify icon for history button | |||
return OC.imagePath('core','actions/history'); | |||
}, | |||
actionHandler: actionStub | |||
@@ -2539,7 +2539,7 @@ describe('OCA.Files.FileList tests', function() { | |||
type: OCA.Files.FileActions.TYPE_INLINE, | |||
permissions: OC.PERMISSION_ALL, | |||
icon: function() { | |||
// Specify icon for hitory button | |||
// Specify icon for history button | |||
return OC.imagePath('core','actions/history'); | |||
}, | |||
actionHandler: actionStub |
@@ -145,7 +145,7 @@ class GlobalStoragesController extends StoragesController { | |||
* @param int $id storage id | |||
* @param string $mountPoint storage mount point | |||
* @param string $backend backend identifier | |||
* @param string $authMechanism authentication mechansim identifier | |||
* @param string $authMechanism authentication mechanism identifier | |||
* @param array $backendOptions backend-specific options | |||
* @param array $mountOptions mount-specific options | |||
* @param array $applicableUsers users for which to mount the storage |
@@ -37,7 +37,7 @@ use OCA\Files_External\Lib\VisibilityTrait; | |||
* such as \OCP\IDB for database operations. This allows an authentication | |||
* mechanism to perform advanced operations based on provided information. | |||
* | |||
* An authenication scheme defines the parameter interface, common to the | |||
* An authentication scheme defines the parameter interface, common to the | |||
* storage implementation, the backend and the authentication mechanism. | |||
* A storage implementation expects parameters according to the authentication | |||
* scheme, which are provided from the authentication mechanism. |
@@ -38,7 +38,7 @@ use OCA\Files_External\Lib\VisibilityTrait; | |||
* such as \OCP\IDB for database operations. This allows a backend | |||
* to perform advanced operations based on provided information. | |||
* | |||
* An authenication scheme defines the parameter interface, common to the | |||
* An authentication scheme defines the parameter interface, common to the | |||
* storage implementation, the backend and the authentication mechanism. | |||
* A storage implementation expects parameters according to the authentication | |||
* scheme, which are provided from the authentication mechanism. |
@@ -261,7 +261,7 @@ class StorageConfig implements \JsonSerializable { | |||
} | |||
/** | |||
* Sets the mount priotity | |||
* Sets the mount priority | |||
* | |||
* @param int $priority priority | |||
*/ |
@@ -345,7 +345,7 @@ abstract class StoragesService { | |||
* Triggers the given hook signal for all the applicables given | |||
* | |||
* @param string $signal signal | |||
* @param string $mountPoint hook mount pount param | |||
* @param string $mountPoint hook mount point param | |||
* @param string $mountType hook mount type param | |||
* @param array $applicableArray array of applicable users/groups for which to trigger the hook | |||
*/ |
@@ -135,7 +135,7 @@ class SmbTest extends \Test\Files\Storage\Storage { | |||
$result = null; | |||
// since the notify handler buffers untill we start listening we will get the above changes | |||
// since the notify handler buffers until we start listening we will get the above changes | |||
$notifyHandler->listen(function (IChange $change) use (&$result) { | |||
$result = $change; | |||
return false;//stop listening |
@@ -97,7 +97,7 @@ | |||
Drop.addFileToUpload(e, data); | |||
$('#drop-upload-status').text(t('files_sharing', 'Waiting…')); | |||
//we return true to keep trying to upload next file even | |||
//if addFileToUpload did not like the privious one | |||
//if addFileToUpload did not like the previous one | |||
return true; | |||
}, | |||
done: function(e, data) { |
@@ -77,7 +77,7 @@ class Cache extends CacheJail { | |||
// the sourceRootInfo path is the absolute path of the folder in the "real" storage | |||
// in the case where a folder is shared from a Jail we need to ensure that the share Jail | |||
// has it's root set relative to the source Jail | |||
// has its root set relative to the source Jail | |||
$currentStorage = $this->storage->getSourceStorage(); | |||
if ($currentStorage->instanceOfStorage(Jail::class)) { | |||
/** @var Jail $currentStorage */ |
@@ -382,7 +382,7 @@ class ShareAPIController extends OCSController { | |||
return new DataResponse([$share]); | |||
} | |||
} catch (NotFoundException $e) { | |||
// Fall trough | |||
// Fall through | |||
} | |||
throw new OCSNotFoundException($this->l->t('Wrong share ID, share does not exist')); | |||
@@ -1219,7 +1219,7 @@ class ShareAPIController extends OCSController { | |||
if ($label !== null) { | |||
if (strlen($label) > 255) { | |||
throw new OCSBadRequestException("Maxmimum label length is 255"); | |||
throw new OCSBadRequestException("Maximum label length is 255"); | |||
} | |||
$share->setLabel($label); | |||
} |
@@ -324,7 +324,7 @@ class ShareController extends AuthPublicShareController { | |||
* @return bool | |||
*/ | |||
private function validateShare(\OCP\Share\IShare $share) { | |||
// If the owner is disabled no access to the linke is granted | |||
// If the owner is disabled no access to the link is granted | |||
$owner = $this->userManager->get($share->getShareOwner()); | |||
if ($owner === null || !$owner->isEnabled()) { | |||
return false; |
@@ -436,7 +436,7 @@ class SharedStorage extends \OC\Files\Storage\Wrapper\Jail implements ISharedSto | |||
public function getWatcher($path = '', $storage = null): Watcher { | |||
$mountManager = \OC::$server->getMountManager(); | |||
// Get node informations | |||
// Get node information | |||
$node = $this->getShare()->getNodeCacheEntry(); | |||
if ($node) { | |||
$mount = $mountManager->findByNumericId($node->getStorageId()); |
@@ -824,7 +824,7 @@ export default { | |||
}, | |||
/** | |||
* Menu have been closed or password has been submited. | |||
* Menu have been closed or password has been submitted. | |||
* The only property that does not get | |||
* synced automatically is the password | |||
* So let's check if we have an unsaved |
@@ -249,7 +249,7 @@ export default { | |||
const allSuggestions = exactSuggestions.concat(suggestions).concat(externalResults).concat(lookupEntry) | |||
// Count occurances of display names in order to provide a distinguishable description if needed | |||
// Count occurrences of display names in order to provide a distinguishable description if needed | |||
const nameCounts = allSuggestions.reduce((nameCounts, result) => { | |||
if (!result.displayName) { | |||
return nameCounts | |||
@@ -383,7 +383,7 @@ export default { | |||
shareTypeToIcon(type) { | |||
switch (type) { | |||
case this.SHARE_TYPES.SHARE_TYPE_GUEST: | |||
// default is a user, other icons are here to differenciate | |||
// default is a user, other icons are here to differentiate | |||
// themselves from it, so let's not display the user icon | |||
// case this.SHARE_TYPES.SHARE_TYPE_REMOTE: | |||
// case this.SHARE_TYPES.SHARE_TYPE_USER: |
@@ -392,7 +392,7 @@ export default class Share { | |||
/** | |||
* Password expiration time | |||
* | |||
* @param {string} password exipration time | |||
* @param {string} password expiration time | |||
* @memberof Share | |||
*/ | |||
set passwordExpirationTime(passwordExpirationTime) { |
@@ -75,7 +75,7 @@ | |||
:name="fileInfo.name" /> | |||
</template> | |||
<!-- additionnal entries, use it with cautious --> | |||
<!-- additional entries, use it with cautious --> | |||
<div v-for="(section, index) in sections" | |||
:ref="'section-' + index" | |||
:key="index" |
@@ -54,7 +54,7 @@ use OCP\UserStatus\IManager as IUserStatusManager; | |||
* Class ApiTest | |||
* | |||
* @group DB | |||
* TODO: convert to real intergration tests | |||
* TODO: convert to real integration tests | |||
*/ | |||
class ApiTest extends TestCase { | |||
public const TEST_FOLDER_NAME = '/folder_share_api_test'; |
@@ -247,7 +247,7 @@ class SharedMountTest extends TestCase { | |||
if ($exception) { | |||
$this->assertSame(10, $e->getCode()); | |||
} else { | |||
$this->assertTrue(false, 'Exception catched, but expected: ' . $expectedResult); | |||
$this->assertTrue(false, 'Exception caught, but expected: ' . $expectedResult); | |||
} | |||
} | |||
} |
@@ -932,7 +932,7 @@ class Trashbin { | |||
* recursive copy to copy a whole directory | |||
* | |||
* @param string $source source path, relative to the users files directory | |||
* @param string $destination destination path relative to the users root directoy | |||
* @param string $destination destination path relative to the users root directory | |||
* @param View $view file view for the users root directory | |||
* @return int | |||
* @throws Exceptions\CopyRecursiveException |
@@ -133,7 +133,7 @@ class OauthApiController extends Controller { | |||
$decryptedToken = $this->crypto->decrypt($accessToken->getEncryptedToken(), $code); | |||
// Obtain the appToken assoicated | |||
// Obtain the appToken associated | |||
try { | |||
$appToken = $this->tokenProvider->getTokenById($accessToken->getTokenId()); | |||
} catch (ExpiredTokenException $e) { |
@@ -477,7 +477,7 @@ class UsersController extends AUserData { | |||
throw new OCSException($e->getHint(), 107); | |||
} catch (OCSException $e) { | |||
$this->logger->warning( | |||
'Failed addUser attempt with ocs exeption.', | |||
'Failed addUser attempt with ocs exception.', | |||
[ | |||
'app' => 'ocs_api', | |||
'exception' => $e, | |||
@@ -486,7 +486,7 @@ class UsersController extends AUserData { | |||
throw $e; | |||
} catch (InvalidArgumentException $e) { | |||
$this->logger->error( | |||
'Failed addUser attempt with invalid argument exeption.', | |||
'Failed addUser attempt with invalid argument exception.', | |||
[ | |||
'app' => 'ocs_api', | |||
'exception' => $e, |
@@ -445,7 +445,7 @@ export default { | |||
/** | |||
* Set user password | |||
* | |||
* @param {string} password The email adress | |||
* @param {string} password The email address | |||
*/ | |||
updatePassword() { | |||
const password = this.$refs.password.value | |||
@@ -463,7 +463,7 @@ export default { | |||
/** | |||
* Set user mailAddress | |||
* | |||
* @param {string} mailAddress The email adress | |||
* @param {string} mailAddress The email address | |||
*/ | |||
updateEmail() { | |||
const mailAddress = this.$refs.mailAddress.value |
@@ -39,7 +39,7 @@ const state = { | |||
const mutations = { | |||
APPS_API_FAILURE(state, error) { | |||
showError(t('settings', 'An error occured during the request. Unable to proceed.') + '<br>' + error.error.response.data.data.message, { isHTML: true }) | |||
showError(t('settings', 'An error occurred during the request. Unable to proceed.') + '<br>' + error.error.response.data.data.message, { isHTML: true }) | |||
console.error(state, error) | |||
}, | |||
@@ -197,7 +197,7 @@ const mutations = { | |||
break | |||
default: | |||
logger.error(`Unknown action type in updateUserCounts: '${actionType}'`) | |||
// not throwing error to interupt execution as this is not fatal | |||
// not throwing error to interrupt execution as this is not fatal | |||
} | |||
}, | |||
setUserData(state, { userid, key, value }) { |
@@ -47,7 +47,7 @@ try { | |||
if ($configurationOk) { | |||
//Configuration is okay | |||
/* | |||
* Clossing the session since it won't be used from this point on. There might be a potential | |||
* Closing the session since it won't be used from this point on. There might be a potential | |||
* race condition if a second request is made: either this request or the other might not | |||
* contact the LDAP backup server the first time when it should, but there shouldn't be any | |||
* problem with that other than the extra connection. |
@@ -40,7 +40,7 @@ OCA = OCA || {}; | |||
}, | |||
/** | |||
* applies click events to the forward and backword buttons | |||
* applies click events to the forward and backward buttons | |||
*/ | |||
initControls: function() { | |||
var view = this; |
@@ -1751,7 +1751,7 @@ class Access extends LDAPUtility { | |||
/** | |||
* converts a binary ObjectGUID into a string representation | |||
* | |||
* @param string $oguid the ObjectGUID in it's binary form as retrieved from AD | |||
* @param string $oguid the ObjectGUID in its binary form as retrieved from AD | |||
* @link https://www.php.net/manual/en/function.ldap-get-values-len.php#73198 | |||
*/ | |||
private function convertObjectGUID2Str(string $oguid): string { | |||
@@ -1777,8 +1777,8 @@ class Access extends LDAPUtility { | |||
/** | |||
* the first three blocks of the string-converted GUID happen to be in | |||
* reverse order. In order to use it in a filter, this needs to be | |||
* corrected. Furthermore the dashes need to be replaced and \\ preprended | |||
* to every two hax figures. | |||
* corrected. Furthermore the dashes need to be replaced and \\ prepended | |||
* to every two hex figures. | |||
* | |||
* If an invalid string is passed, it will be returned without change. | |||
*/ | |||
@@ -2003,7 +2003,7 @@ class Access extends LDAPUtility { | |||
$this->logger->debug('Ready for a paged search', ['app' => 'user_ldap']); | |||
} | |||
/* ++ Fixing RHDS searches with pages with zero results ++ | |||
* We coudn't get paged searches working with our RHDS for login ($limit = 0), | |||
* We couldn't get paged searches working with our RHDS for login ($limit = 0), | |||
* due to pages with zero results. | |||
* So we added "&& !empty($this->lastCookie)" to this test to ignore pagination | |||
* if we don't have a previous paged search. |
@@ -245,7 +245,7 @@ class Group_LDAP extends BackendUtility implements GroupInterface, IGroupLDAP, I | |||
private function _groupMembers(string $dnGroup, ?array &$seen = null): array { | |||
if ($seen === null) { | |||
$seen = []; | |||
// the root entry has to be marked as processed to avoind infinit loops, | |||
// the root entry has to be marked as processed to avoid infinite loops, | |||
// but not included in the results laters on | |||
$excludeFromResult = $dnGroup; | |||
} |
@@ -80,7 +80,7 @@ interface IAdapter { | |||
public function getResponseCallArgs(array $originalArgs): array; | |||
/** | |||
* the adapter should do it's LDAP function call and return success state | |||
* the adapter should do its LDAP function call and return success state | |||
* | |||
* @param resource|\LDAP\Connection $link LDAP resource | |||
* @return bool |
@@ -209,7 +209,7 @@ class Manager { | |||
} | |||
/** | |||
* @brief returns a User object by it's Nextcloud username | |||
* @brief returns a User object by its Nextcloud username | |||
* @param string $id the DN or username of the user | |||
* @return \OCA\User_LDAP\User\User|\OCA\User_LDAP\User\OfflineUser|null | |||
*/ | |||
@@ -226,7 +226,7 @@ class Manager { | |||
} | |||
/** | |||
* @brief returns a User object by it's DN or Nextcloud username | |||
* @brief returns a User object by its DN or Nextcloud username | |||
* @param string $id the DN or username of the user | |||
* @return \OCA\User_LDAP\User\User|\OCA\User_LDAP\User\OfflineUser|null | |||
* @throws \Exception when connection could not be established |
@@ -682,7 +682,7 @@ class Wizard extends LDAPUtility { | |||
'Wiz: trying port '. $p . ', TLS '. $t, | |||
['app' => 'user_ldap'] | |||
); | |||
//connectAndBind may throw Exception, it needs to be catched by the | |||
//connectAndBind may throw Exception, it needs to be caught by the | |||
//callee of this method | |||
try { | |||
@@ -1077,7 +1077,7 @@ class Wizard extends LDAPUtility { | |||
} | |||
$this->logger->debug( | |||
'Wiz: Attemping to Bind', | |||
'Wiz: Attempting to Bind', | |||
['app' => 'user_ldap'] | |||
); | |||
//interesting part: do the bind! |
@@ -154,7 +154,7 @@ class Group_LDAPTest extends TestCase { | |||
->method('readAttribute') | |||
->willReturnCallback(function ($name) { | |||
//the search operation will call readAttribute, thus we need | |||
//to anaylze the "dn". All other times we just need to return | |||
//to analyze the "dn". All other times we just need to return | |||
//something that is neither null or false, but once an array | |||
//with the users in the group – so we do so all other times for | |||
//simplicicity. | |||
@@ -724,7 +724,7 @@ class Group_LDAPTest extends TestCase { | |||
} | |||
/** | |||
* tests that a user listing is complete, if all it's members have the group | |||
* tests that a user listing is complete, if all its members have the group | |||
* as their primary. | |||
*/ | |||
public function testUsersInGroupPrimaryMembersOnly() { | |||
@@ -770,7 +770,7 @@ class Group_LDAPTest extends TestCase { | |||
} | |||
/** | |||
* tests that a user listing is complete, if all it's members have the group | |||
* tests that a user listing is complete, if all its members have the group | |||
* as their primary. | |||
*/ | |||
public function testUsersInGroupPrimaryAndUnixMembers() { | |||
@@ -814,7 +814,7 @@ class Group_LDAPTest extends TestCase { | |||
} | |||
/** | |||
* tests that a user counting is complete, if all it's members have the group | |||
* tests that a user counting is complete, if all its members have the group | |||
* as their primary. | |||
*/ | |||
public function testCountUsersInGroupPrimaryMembersOnly() { |
@@ -82,7 +82,7 @@ abstract class AbstractMappingTest extends \Test\TestCase { | |||
} | |||
/** | |||
* initalizes environment for a test run and returns an array with | |||
* initializes environment for a test run and returns an array with | |||
* test objects. Preparing environment means that all mappings are cleared | |||
* first and then filled with test entries. | |||
* @return array 0 = \OCA\User_LDAP\Mapping\AbstractMapping, 1 = array of |
@@ -493,7 +493,7 @@ class UserTest extends \Test\TestCase { | |||
$this->user->updateQuota(); | |||
} | |||
//the testUpdateAvatar series also implicitely tests getAvatarImage | |||
//the testUpdateAvatar series also implicitly tests getAvatarImage | |||
public function XtestUpdateAvatarJpegPhotoProvided() { | |||
$this->access->expects($this->once()) | |||
->method('readAttribute') |
@@ -43,7 +43,7 @@ class PredefinedStatusService { | |||
private const VACATIONING = 'vacationing'; | |||
private const REMOTE_WORK = 'remote-work'; | |||
/** | |||
* @depreacted See \OCP\UserStatus\IUserStatus::MESSAGE_CALL | |||
* @deprecated See \OCP\UserStatus\IUserStatus::MESSAGE_CALL | |||
*/ | |||
public const CALL = 'call'; | |||
@@ -42,7 +42,7 @@ import ShippedChecks from './components/Checks' | |||
*/ | |||
/** | |||
* A plugin for extending the admin page repesentation of a operator | |||
* A plugin for extending the admin page representation of an operator | |||
* | |||
* @typedef {object} OperatorPlugin | |||
* @property {string} id - The PHP class name of the check |