mirror of
https://github.com/EGroupware/egroupware.git
synced 2024-11-07 08:34:42 +01:00
fix namespace usage in refactured code:
namespace EGroupware\Api --> use eg. just Db, not Api\Db for EGroupware\Api\Db use EGroupware\Api --> use eg. Api\Db for EGroupware\Api\Db
This commit is contained in:
parent
d6faffb32f
commit
4486d9d7a2
@ -118,7 +118,7 @@ class Cache
|
||||
{
|
||||
case self::SESSION:
|
||||
case self::REQUEST:
|
||||
throw new Api\Exception\WrongParameter(__METHOD__."('$level', ...) unsupported level parameter!");
|
||||
throw new Exception\WrongParameter(__METHOD__."('$level', ...) unsupported level parameter!");
|
||||
|
||||
case self::INSTANCE:
|
||||
case self::TREE:
|
||||
@ -134,13 +134,13 @@ class Cache
|
||||
}
|
||||
return $provider->add(self::keys($level,$app,$location),$data,$expiration);
|
||||
}
|
||||
throw new Api\Exception\WrongParameter(__METHOD__."() unknown level '$level'!");
|
||||
throw new Exception\WrongParameter(__METHOD__."() unknown level '$level'!");
|
||||
}
|
||||
|
||||
/**
|
||||
* Set some data in the cache
|
||||
*
|
||||
* @param string $level use Api\Cache::(TREE|INSTANCE|SESSION|REQUEST)
|
||||
* @param string $level use Cache::(TREE|INSTANCE|SESSION|REQUEST)
|
||||
* @param string $app application storing data
|
||||
* @param string $location location name for data
|
||||
* @param mixed $data
|
||||
@ -170,7 +170,7 @@ class Cache
|
||||
}
|
||||
return $provider->set(self::keys($level,$app,$location),$data,$expiration);
|
||||
}
|
||||
throw new Api\Exception\WrongParameter(__METHOD__."() unknown level '$level'!");
|
||||
throw new Exception\WrongParameter(__METHOD__."() unknown level '$level'!");
|
||||
}
|
||||
|
||||
/**
|
||||
@ -209,7 +209,7 @@ class Cache
|
||||
{
|
||||
if (!is_null($callback))
|
||||
{
|
||||
throw new Api\Exception\WrongParameter(__METHOD__."() you can NOT use multiple locations (\$location parameter is an array) together with a callback!");
|
||||
throw new Exception\WrongParameter(__METHOD__."() you can NOT use multiple locations (\$location parameter is an array) together with a callback!");
|
||||
}
|
||||
if (is_a($provider, 'EGroupware\Api\Cache\ProviderMultiple'))
|
||||
{
|
||||
@ -246,7 +246,7 @@ class Cache
|
||||
}
|
||||
return $data;
|
||||
}
|
||||
throw new Api\Exception\WrongParameter(__METHOD__."() unknown level '$level'!");
|
||||
throw new Exception\WrongParameter(__METHOD__."() unknown level '$level'!");
|
||||
}
|
||||
|
||||
/**
|
||||
@ -274,7 +274,7 @@ class Cache
|
||||
}
|
||||
return $provider->delete(self::keys($level,$app,$location));
|
||||
}
|
||||
throw new Api\Exception\WrongParameter(__METHOD__."() unknown level '$level'!");
|
||||
throw new Exception\WrongParameter(__METHOD__."() unknown level '$level'!");
|
||||
}
|
||||
|
||||
/**
|
||||
@ -590,7 +590,7 @@ class Cache
|
||||
error_log(__METHOD__."('$name', $throw) config value NOT found!");//.function_backtrace());
|
||||
}
|
||||
}
|
||||
catch(Api\Db\Exception $e)
|
||||
catch(Db\Exception $e)
|
||||
{
|
||||
if ($throw) error_log(__METHOD__."('$name', $throw) cound NOT query value: ".$e->getMessage());//.function_backtrace());
|
||||
}
|
||||
@ -729,7 +729,7 @@ class Cache
|
||||
*/
|
||||
function __construct()
|
||||
{
|
||||
throw new Api\Exception\WrongParameter("All methods of class ".__CLASS__." should be called static!");
|
||||
throw new Exception\WrongParameter("All methods of class ".__CLASS__." should be called static!");
|
||||
}
|
||||
}
|
||||
|
||||
|
@ -119,7 +119,7 @@ class Vfs extends Vfs\StreamWrapper
|
||||
/**
|
||||
* Reference to the global db object
|
||||
*
|
||||
* @var Api\Db
|
||||
* @var Db
|
||||
*/
|
||||
static $db;
|
||||
|
||||
@ -134,7 +134,7 @@ class Vfs extends Vfs\StreamWrapper
|
||||
{
|
||||
if ($path[0] != '/')
|
||||
{
|
||||
throw new Api\Exception\AssertionFailed("Filename '$path' is not an absolute path!");
|
||||
throw new Exception\AssertionFailed("Filename '$path' is not an absolute path!");
|
||||
}
|
||||
return fopen(self::PREFIX.$path,$mode);
|
||||
}
|
||||
@ -149,7 +149,7 @@ class Vfs extends Vfs\StreamWrapper
|
||||
{
|
||||
if ($path[0] != '/')
|
||||
{
|
||||
throw new Api\Exception\AssertionFailed("Directory '$path' is not an absolute path!");
|
||||
throw new Exception\AssertionFailed("Directory '$path' is not an absolute path!");
|
||||
}
|
||||
return opendir(self::PREFIX.$path);
|
||||
}
|
||||
@ -164,7 +164,7 @@ class Vfs extends Vfs\StreamWrapper
|
||||
{
|
||||
if ($path[0] != '/')
|
||||
{
|
||||
throw new Api\Exception\AssertionFailed("Directory '$path' is not an absolute path!");
|
||||
throw new Exception\AssertionFailed("Directory '$path' is not an absolute path!");
|
||||
}
|
||||
return dir(self::PREFIX.$path);
|
||||
}
|
||||
@ -180,7 +180,7 @@ class Vfs extends Vfs\StreamWrapper
|
||||
{
|
||||
if ($path[0] != '/')
|
||||
{
|
||||
throw new Api\Exception\AssertionFailed("Directory '$path' is not an absolute path!");
|
||||
throw new Exception\AssertionFailed("Directory '$path' is not an absolute path!");
|
||||
}
|
||||
return scandir(self::PREFIX.$path,$sorting_order);
|
||||
}
|
||||
@ -243,7 +243,7 @@ class Vfs extends Vfs\StreamWrapper
|
||||
{
|
||||
if ($path[0] != '/')
|
||||
{
|
||||
throw new Api\Exception\AssertionFailed("File '$path' is not an absolute path!");
|
||||
throw new Exception\AssertionFailed("File '$path' is not an absolute path!");
|
||||
}
|
||||
if (($stat = self::url_stat($path,0,$try_create_home)))
|
||||
{
|
||||
@ -263,7 +263,7 @@ class Vfs extends Vfs\StreamWrapper
|
||||
{
|
||||
if ($path[0] != '/')
|
||||
{
|
||||
throw new Api\Exception\AssertionFailed("File '$path' is not an absolute path!");
|
||||
throw new Exception\AssertionFailed("File '$path' is not an absolute path!");
|
||||
}
|
||||
if (($stat = self::url_stat($path,STREAM_URL_STAT_LINK,$try_create_home)))
|
||||
{
|
||||
@ -758,7 +758,7 @@ class Vfs extends Vfs\StreamWrapper
|
||||
*
|
||||
* @param string|array $urls url or array of url's
|
||||
* @param boolean $allow_urls =false allow to use url's, default no only pathes (to stay within the vfs)
|
||||
* @throws Api\Exception\AssertionFailed when trainig to remove /, /apps or /home
|
||||
* @throws Exception\AssertionFailed when trainig to remove /, /apps or /home
|
||||
* @return array
|
||||
*/
|
||||
static function remove($urls,$allow_urls=false)
|
||||
@ -769,7 +769,7 @@ class Vfs extends Vfs\StreamWrapper
|
||||
{
|
||||
if (preg_match('/^\/?(home|apps|)\/*$/',self::parse_url($url,PHP_URL_PATH)))
|
||||
{
|
||||
throw new Api\Exception\AssertionFailed(__METHOD__.'('.array2string($urls).") Cautiously rejecting to remove folder '$url'!");
|
||||
throw new Exception\AssertionFailed(__METHOD__.'('.array2string($urls).") Cautiously rejecting to remove folder '$url'!");
|
||||
}
|
||||
}
|
||||
return self::find($urls,array('depth'=>true,'url'=>$allow_urls,'hidden'=>true),array(__CLASS__,'_rm_rmdir'));
|
||||
@ -869,7 +869,7 @@ class Vfs extends Vfs\StreamWrapper
|
||||
// throw exception if stat array is used insead of path, can be removed soon
|
||||
if (is_array($path))
|
||||
{
|
||||
throw new Api\Exception\WrongParameter('path has to be string, use check_access($path,$check,$stat=null)!');
|
||||
throw new Exception\WrongParameter('path has to be string, use check_access($path,$check,$stat=null)!');
|
||||
}
|
||||
// query stat array, if not given
|
||||
if (is_null($stat))
|
||||
@ -1091,7 +1091,7 @@ class Vfs extends Vfs\StreamWrapper
|
||||
if (!preg_match($use='/^([ugoa]*)([+=-]+)([rwx]+)$/',$s,$matches))
|
||||
{
|
||||
$use = str_replace(array('/','^','$','(',')'),'',$use);
|
||||
throw new Api\Exception\WrongUserInput("$s is not an allowed mode, use $use !");
|
||||
throw new Exception\WrongUserInput("$s is not an allowed mode, use $use !");
|
||||
}
|
||||
$base = (strpos($matches[3],'r') !== false ? self::READABLE : 0) |
|
||||
(strpos($matches[3],'w') !== false ? self::WRITABLE : 0) |
|
||||
@ -1436,7 +1436,7 @@ class Vfs extends Vfs\StreamWrapper
|
||||
$zip = new \ZipArchive();
|
||||
if (!$zip->open($zip_file, \ZipArchive::OVERWRITE))
|
||||
{
|
||||
throw new Api\Exception("Cannot open zip file for writing.");
|
||||
throw new Exception("Cannot open zip file for writing.");
|
||||
}
|
||||
|
||||
// Find lowest common directory, to use relative paths
|
||||
@ -1648,8 +1648,8 @@ class Vfs extends Vfs\StreamWrapper
|
||||
),__LINE__,__FILE__)->fetch())))
|
||||
{
|
||||
$owner = $row['lock_owner'];
|
||||
$scope = Api\Db::from_bool($row['lock_exclusive']) ? 'exclusive' : 'shared';
|
||||
$type = Api\Db::from_bool($row['lock_write']) ? 'write' : 'read';
|
||||
$scope = Db::from_bool($row['lock_exclusive']) ? 'exclusive' : 'shared';
|
||||
$type = Db::from_bool($row['lock_write']) ? 'write' : 'read';
|
||||
|
||||
self::$db->update(self::LOCK_TABLE,array(
|
||||
'lock_expires' => $timeout,
|
||||
@ -1694,7 +1694,7 @@ class Vfs extends Vfs\StreamWrapper
|
||||
),false,__LINE__,__FILE__);
|
||||
$ret = true;
|
||||
}
|
||||
catch(Api\Db\Exception $e) {
|
||||
catch(Db\Exception $e) {
|
||||
unset($e);
|
||||
$ret = false; // there's already a lock
|
||||
}
|
||||
@ -1749,10 +1749,10 @@ class Vfs extends Vfs\StreamWrapper
|
||||
// ToDo: shared locks can return multiple rows
|
||||
if (($result = self::$db->select(self::LOCK_TABLE,'*',$where,__LINE__,__FILE__)->fetch()))
|
||||
{
|
||||
$result = Api\Db::strip_array_keys($result,'lock_');
|
||||
$result['type'] = Api\Db::from_bool($result['write']) ? 'write' : 'read';
|
||||
$result['scope'] = Api\Db::from_bool($result['exclusive']) ? 'exclusive' : 'shared';
|
||||
$result['depth'] = Api\Db::from_bool($result['recursive']) ? 'infinite' : 0;
|
||||
$result = Db::strip_array_keys($result,'lock_');
|
||||
$result['type'] = Db::from_bool($result['write']) ? 'write' : 'read';
|
||||
$result['scope'] = Db::from_bool($result['exclusive']) ? 'exclusive' : 'shared';
|
||||
$result['depth'] = Db::from_bool($result['recursive']) ? 'infinite' : 0;
|
||||
}
|
||||
if ($result && $result['expires'] < time()) // lock is expired --> remove it
|
||||
{
|
||||
|
Loading…
Reference in New Issue
Block a user