Fixed typos/CS/PHPDoc
This commit is contained in:
parent
43becff31d
commit
e1110de107
@ -165,13 +165,13 @@ class AclProvider implements AclProviderInterface
|
||||
if ((self::MAX_BATCH_SIZE === count($currentBatch) || ($i + 1) === $c) && count($currentBatch) > 0) {
|
||||
try {
|
||||
$loadedBatch = $this->lookupObjectIdentities($currentBatch, $sids, $oidLookup);
|
||||
} catch (AclNotFoundException $aclNotFoundexception) {
|
||||
} catch (AclNotFoundException $aclNotFoundException) {
|
||||
if ($result->count()) {
|
||||
$partialResultException = new NotAllAclsFoundException('The provider could not find ACLs for all object identities.');
|
||||
$partialResultException->setPartialResult($result);
|
||||
throw $partialResultException;
|
||||
} else {
|
||||
throw $aclNotFoundexception;
|
||||
throw $aclNotFoundException;
|
||||
}
|
||||
}
|
||||
foreach ($loadedBatch as $loadedOid) {
|
||||
|
@ -253,7 +253,7 @@ class MutableAclProvider extends AclProvider implements MutableAclProviderInterf
|
||||
}
|
||||
|
||||
// check properties for deleted, and created ACEs, and perform deletions
|
||||
// we need to perfom deletions before updating existing ACEs, in order to
|
||||
// we need to perform deletions before updating existing ACEs, in order to
|
||||
// preserve uniqueness of the order field
|
||||
if (isset($propertyChanges['classAces'])) {
|
||||
$this->updateOldAceProperty('classAces', $propertyChanges['classAces']);
|
||||
@ -360,7 +360,7 @@ class MutableAclProvider extends AclProvider implements MutableAclProviderInterf
|
||||
protected function getDeleteAccessControlEntriesSql($oidPK)
|
||||
{
|
||||
return sprintf(
|
||||
'DELETE FROM %s WHERE object_identity_id = %d',
|
||||
'DELETE FROM %s WHERE object_identity_id = %d',
|
||||
$this->options['entry_table_name'],
|
||||
$oidPK
|
||||
);
|
||||
@ -806,7 +806,7 @@ QUERY;
|
||||
* @param string $name
|
||||
* @param array $changes
|
||||
*/
|
||||
private function updateOldFieldAceProperty($ane, array $changes)
|
||||
private function updateOldFieldAceProperty($name, array $changes)
|
||||
{
|
||||
$currentIds = array();
|
||||
foreach ($changes[1] as $field => $new) {
|
||||
@ -925,11 +925,12 @@ QUERY;
|
||||
if (isset($propertyChanges['aceOrder'])
|
||||
&& $propertyChanges['aceOrder'][1] > $propertyChanges['aceOrder'][0]
|
||||
&& $propertyChanges == $aces->offsetGet($ace)) {
|
||||
$aces->next();
|
||||
if ($aces->valid()) {
|
||||
|
||||
$aces->next();
|
||||
if ($aces->valid()) {
|
||||
$this->updateAce($aces, $aces->current());
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
if (isset($propertyChanges['mask'])) {
|
||||
$sets[] = sprintf('mask = %d', $propertyChanges['mask'][1]);
|
||||
@ -949,5 +950,4 @@ QUERY;
|
||||
|
||||
$this->connection->executeQuery($this->getUpdateAccessControlEntrySql($ace->getId(), $sets));
|
||||
}
|
||||
|
||||
}
|
||||
|
@ -26,12 +26,12 @@ class AuditLoggerTest extends \PHPUnit_Framework_TestCase
|
||||
->expects($this->once())
|
||||
->method('isAuditSuccess')
|
||||
->will($this->returnValue($audit))
|
||||
;
|
||||
;
|
||||
|
||||
$ace
|
||||
$ace
|
||||
->expects($this->never())
|
||||
->method('isAuditFailure')
|
||||
;
|
||||
;
|
||||
} else {
|
||||
$ace
|
||||
->expects($this->never())
|
||||
|
@ -47,23 +47,22 @@ class PreAuthenticatedAuthenticationProvider implements AuthenticationProviderIn
|
||||
$this->providerKey = $providerKey;
|
||||
}
|
||||
|
||||
/**
|
||||
* {@inheritdoc}
|
||||
*/
|
||||
public function authenticate(TokenInterface $token)
|
||||
{
|
||||
if (!$this->supports($token)) {
|
||||
return null;
|
||||
}
|
||||
|
||||
/**
|
||||
* {@inheritdoc}
|
||||
*/
|
||||
public function authenticate(TokenInterface $token)
|
||||
{
|
||||
if (!$this->supports($token)) {
|
||||
return null;
|
||||
}
|
||||
if (!$user = $token->getUser()) {
|
||||
throw new BadCredentialsException('No pre-authenticated principal found in request.');
|
||||
}
|
||||
/*
|
||||
/*
|
||||
if (null === $token->getCredentials()) {
|
||||
throw new BadCredentialsException('No pre-authenticated credentials found in request.');
|
||||
}
|
||||
*/
|
||||
*/
|
||||
$user = $this->userProvider->loadUserByUsername($user);
|
||||
|
||||
$this->userChecker->checkPostAuth($user);
|
||||
|
@ -32,7 +32,9 @@ class ExpressionVoter implements VoterInterface
|
||||
/**
|
||||
* Constructor.
|
||||
*
|
||||
* @param ExpressionLanguage $expressionLanguage
|
||||
* @param ExpressionLanguage $expressionLanguage
|
||||
* @param AuthenticationTrustResolverInterface $trustResolver
|
||||
* @param RoleHierarchyInterface $roleHierarchy
|
||||
*/
|
||||
public function __construct(ExpressionLanguage $expressionLanguage, AuthenticationTrustResolverInterface $trustResolver, RoleHierarchyInterface $roleHierarchy = null)
|
||||
{
|
||||
|
@ -89,6 +89,8 @@ abstract class BasePasswordEncoder implements PasswordEncoderInterface
|
||||
/**
|
||||
* Checks if the password is too long.
|
||||
*
|
||||
* @param string $password The password
|
||||
*
|
||||
* @return Boolean true if the password is too long, false otherwise
|
||||
*/
|
||||
protected function isPasswordTooLong($password)
|
||||
|
@ -87,7 +87,7 @@ class SwitchUserListenerTest extends \PHPUnit_Framework_TestCase
|
||||
|
||||
$this->request->expects($this->any())->method('get')->with('_switch_user')->will($this->returnValue('_exit'));
|
||||
$this->request->expects($this->any())->method('getUri')->will($this->returnValue('/'));
|
||||
$this->request->query->expects($this->once())->method('remove','_switch_user');
|
||||
$this->request->query->expects($this->once())->method('remove', '_switch_user');
|
||||
$this->request->query->expects($this->any())->method('all')->will($this->returnValue(array()));
|
||||
$this->request->server->expects($this->once())->method('set')->with('QUERY_STRING', '');
|
||||
|
||||
@ -103,7 +103,7 @@ class SwitchUserListenerTest extends \PHPUnit_Framework_TestCase
|
||||
/**
|
||||
* @expectedException \Symfony\Component\Security\Core\Exception\AccessDeniedException
|
||||
*/
|
||||
public function testSwitchUserIsDissallowed()
|
||||
public function testSwitchUserIsDisallowed()
|
||||
{
|
||||
$token = $this->getToken(array($this->getMock('Symfony\Component\Security\Core\Role\RoleInterface')));
|
||||
|
||||
@ -126,7 +126,7 @@ class SwitchUserListenerTest extends \PHPUnit_Framework_TestCase
|
||||
|
||||
$this->securityContext->expects($this->any())->method('getToken')->will($this->returnValue($token));
|
||||
$this->request->expects($this->any())->method('get')->with('_switch_user')->will($this->returnValue('kuba'));
|
||||
$this->request->query->expects($this->once())->method('remove','_switch_user');
|
||||
$this->request->query->expects($this->once())->method('remove', '_switch_user');
|
||||
$this->request->query->expects($this->any())->method('all')->will($this->returnValue(array()));
|
||||
|
||||
$this->request->expects($this->any())->method('getUri')->will($this->returnValue('/'));
|
||||
@ -156,7 +156,7 @@ class SwitchUserListenerTest extends \PHPUnit_Framework_TestCase
|
||||
|
||||
$this->securityContext->expects($this->any())->method('getToken')->will($this->returnValue($token));
|
||||
$this->request->expects($this->any())->method('get')->with('_switch_user')->will($this->returnValue('kuba'));
|
||||
$this->request->query->expects($this->once())->method('remove','_switch_user');
|
||||
$this->request->query->expects($this->once())->method('remove', '_switch_user');
|
||||
$this->request->query->expects($this->any())->method('all')->will($this->returnValue(array('page'=>3,'section'=>2)));
|
||||
$this->request->expects($this->any())->method('getUri')->will($this->returnValue('/'));
|
||||
$this->request->server->expects($this->once())->method('set')->with('QUERY_STRING', 'page=3§ion=2');
|
||||
|
@ -57,7 +57,7 @@ class X509AuthenticationListenerTest extends \PHPUnit_Framework_TestCase
|
||||
}
|
||||
|
||||
/**
|
||||
* @expectedException Symfony\Component\Security\Core\Exception\BadCredentialsException
|
||||
* @expectedException \Symfony\Component\Security\Core\Exception\BadCredentialsException
|
||||
*/
|
||||
public function testGetPreAuthenticatedDataNoUser()
|
||||
{
|
||||
|
Reference in New Issue
Block a user