Merge pull request #20370 from nextcloud/techdebt/fix-multiline-comments

Fix multiline comments
This commit is contained in:
blizzz 2020-04-09 00:05:53 +02:00 committed by GitHub
commit 22edb626b6
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
69 changed files with 741 additions and 750 deletions

View File

@ -299,10 +299,10 @@ class FilesPlugin extends ServerPlugin {
* so users were unable to navigate into folders where one subitem
* is blocked by the files_accesscontrol app, see:
* https://github.com/nextcloud/files_accesscontrol/issues/65
if (!$node->getFileInfo()->isReadable()) {
// avoid detecting files through this means
throw new NotFound();
}
* if (!$node->getFileInfo()->isReadable()) {
* // avoid detecting files through this means
* throw new NotFound();
* }
*/
$propFind->handle(self::FILEID_PROPERTYNAME, function() use ($node) {

View File

@ -300,7 +300,7 @@ class ShareController extends AuthPublicShareController {
* @PublicPage
* @NoCSRFRequired
*
*
* @param string $path
* @return TemplateResponse
* @throws NotFoundException

View File

@ -27,7 +27,7 @@ namespace OCA\Files_Sharing\Exceptions;
* Expected path with a different root
* Possible Error Codes:
* 10 - Path not relative to data/ and point to the users file directory
*
*/
class BrokenPath extends \Exception {
}

View File

@ -1,6 +1,6 @@
<?php
/**
*
*
* @author Bjoern Schiessle <bjoern@schiessle.org>
* @author Jan-Christoph Borchardt <hey@jancborchardt.net>

View File

@ -75,7 +75,7 @@ class WebAuthnController extends Controller {
Util::emitHook(
'\OCA\Files_Sharing\API\Server2Server',
'preLoginNameUsedAsUserName',
array('uid' => &$uid)
['uid' => &$uid]
);
$this->logger->debug('Got UID: ' . $uid);

View File

@ -524,10 +524,10 @@ class Event implements IEvent {
$this->getTimestamp() !== 0
/**
* Disabled for BC with old activities
&&
$this->getObjectType() !== ''
&&
$this->getObjectId() !== 0
* &&
* $this->getObjectType() !== ''
* &&
* $this->getObjectId() !== 0
*/
;
}

View File

@ -27,11 +27,9 @@ namespace OC\Authentication\Login;
use OC\Authentication\Events\LoginFailed;
use OC\Core\Controller\LoginController;
use OCP\Authentication\Events\LoginFailedEvent;
use OCP\EventDispatcher\IEventDispatcher;
use OCP\ILogger;
use OCP\IUserManager;
use OCP\Util;
class LoggedInCheckCommand extends ALoginCommand {

View File

@ -27,7 +27,6 @@ namespace OC\Authentication\WebAuthn\Db;
use JsonSerializable;
use OCP\AppFramework\Db\Entity;
use Webauthn\PublicKeyCredentialSource;
use Webauthn\TrustPath\TrustPathLoader;
/**
* @since 19.0.0

View File

@ -49,7 +49,6 @@ use Webauthn\PublicKeyCredentialLoader;
use Webauthn\PublicKeyCredentialParameters;
use Webauthn\PublicKeyCredentialRequestOptions;
use Webauthn\PublicKeyCredentialRpEntity;
use Webauthn\PublicKeyCredentialSource;
use Webauthn\PublicKeyCredentialUserEntity;
use Webauthn\TokenBinding\TokenBindingNotSupportedHandler;

View File

@ -51,7 +51,6 @@ use OC_User;
use OC_Util;
use OCA\DAV\Connector\Sabre\Auth;
use OCP\AppFramework\Utility\ITimeFactory;
use OCP\Authentication\Events\LoginFailedEvent;
use OCP\EventDispatcher\IEventDispatcher;
use OCP\Files\NotPermittedException;
use OCP\IConfig;
@ -59,7 +58,6 @@ use OCP\ILogger;
use OCP\IRequest;
use OCP\ISession;
use OCP\IUser;
use OCP\IUserManager;
use OCP\IUserSession;
use OCP\Lockdown\ILockdownManager;
use OCP\Security\ISecureRandom;

View File

@ -44,7 +44,6 @@
*
*/
use OCP\IUser;
use Symfony\Component\Process\ExecutableFinder;
/**

View File

@ -60,7 +60,7 @@ abstract class Job implements IJob {
/**
* The function to prepare the execution of the job.
*
*
* @param IJobList $jobList
* @param ILogger|null $logger

View File

@ -27,7 +27,6 @@ declare(strict_types=1);
namespace OCP\User\Events;
use OCP\EventDispatcher\Event;
use OCP\IUser;
/**
* @since 18.0.0

View File

@ -25,7 +25,6 @@ declare(strict_types=1);
namespace lib\Authentication\Login;
use Hoa\Iterator\Mock;
use OC\Authentication\Login\LoggedInCheckCommand;
use OC\Core\Controller\LoginController;
use OCP\EventDispatcher\IEventDispatcher;