$calendarData $data $data $vcardData $principalUri $data $cardData array IEventListener !is_array($notification) IEventListener IEventListener IEventListener getId()]]> IEventListener $baseuri $baseuri \OC\Files\Filesystem::logWarningWhenAddingStorageWrapper($previousLog) \OC\Files\Filesystem::logWarningWhenAddingStorageWrapper(false) $baseuri 'OCA\DAV\Connector\Sabre::addPlugin' dispatch $baseuri $baseuri $baseuri CalendarDeletionDefaultUpdaterListener::class setDateTime setDateTime VEVENT->DTSTART]]> VEVENT->SUMMARY]]> VEVENT->DTSTART]]> VEVENT->SUMMARY]]> $calendarData objectData['calendardata']]]> $calendarData $calendarData array array $objectData $uris $uris atomic(function () use ($calendarId, $syncToken, $syncLevel, $limit, $calendarType) { // Current synctoken $qb = $this->db->getQueryBuilder(); $qb->select('synctoken') ->from('calendars') ->where( $qb->expr()->eq('id', $qb->createNamedParameter($calendarId)) ); $stmt = $qb->executeQuery(); $currentToken = $stmt->fetchOne(); if ($currentToken === false) { return null; } $result = [ 'syncToken' => $currentToken, 'added' => [], 'modified' => [], 'deleted' => [], ]; if ($syncToken) { $qb = $this->db->getQueryBuilder(); $qb->select('uri', 'operation') ->from('calendarchanges') ->where( $qb->expr()->andX( $qb->expr()->gte('synctoken', $qb->createNamedParameter($syncToken)), $qb->expr()->lt('synctoken', $qb->createNamedParameter($currentToken)), $qb->expr()->eq('calendarid', $qb->createNamedParameter($calendarId)), $qb->expr()->eq('calendartype', $qb->createNamedParameter($calendarType)) ) )->orderBy('synctoken'); if (is_int($limit) && $limit > 0) { $qb->setMaxResults($limit); } // Fetching all changes $stmt = $qb->executeQuery(); $changes = []; // This loop ensures that any duplicates are overwritten, only the // last change on a node is relevant. while ($row = $stmt->fetch()) { $changes[$row['uri']] = $row['operation']; } $stmt->closeCursor(); foreach ($changes as $uri => $operation) { switch ($operation) { case 1: $result['added'][] = $uri; break; case 2: $result['modified'][] = $uri; break; case 3: $result['deleted'][] = $uri; break; } } } else { // No synctoken supplied, this is the initial sync. $qb = $this->db->getQueryBuilder(); $qb->select('uri') ->from('calendarobjects') ->where( $qb->expr()->andX( $qb->expr()->eq('calendarid', $qb->createNamedParameter($calendarId)), $qb->expr()->eq('calendartype', $qb->createNamedParameter($calendarType)) ) ); $stmt = $qb->executeQuery(); $result['added'] = $stmt->fetchAll(\PDO::FETCH_COLUMN); $stmt->closeCursor(); } return $result; }, $this->db)]]> null INode INode getCalendarInCalendarHome($this->principalInfo['uri'], $calendarUri)]]> calendarSearch $principal string|null $principalInfo $paths hasTime isFloating isFloating getDateTime getDateTime isFloating $provider::NOTIFICATION_TYPE $diff === false getDateTime getDateTime parent->UID]]> array $principals string[] null null recipientName]]> is_array($modified['old']) getNormalizedValue getNormalizedValue [$aclPlugin, 'propFind'] [$aclPlugin, 'propFind'] get getChildren getDateTime hasTime isFloating isFloating principalSearch bool $property, 'parameter' => $parameter, ]]]> string !is_array($newProps['filters']['comps']) !is_array($newProps['filters']['params']) !is_array($newProps['filters']['props']) !isset($newProps['filters']['comps']) || !is_array($newProps['filters']['comps']) !isset($newProps['filters']['params']) || !is_array($newProps['filters']['params']) !isset($newProps['filters']['props']) || !is_array($newProps['filters']['props']) $webcalData getKey()]]> getKey()]]> $principal false $addressBooks[$row['id']][$readOnlyPropertyName] === 0 bool string $type string|null getChanges null principalUri]]> principalUri]]> $groups int null 200 $args['datetime'] \Sabre\HTTP\toDate($value) !is_string($name) CommentsEntityEvent::EVENT_ENTITY \Sabre\DAV\INode[] int entityTypeCollections]]> null dispatch bool tryTokenLogin $nodes dirContent]]> \Sabre\DAV\INode[] null null null $fullSourcePath $data 0 200 bool $resultFileIds new PreconditionFailed('Cannot filter by non-existing tag', 0, $e) \OCA\Circles\Api\v1\Circles getById getPath int integer info->getId()]]> info->getId()]]> array $principals string[] $results circleToPrincipal($decodedName) ?: $this->circleToPrincipal($name)]]> null null null null null null null \OCA\Circles\Api\v1\Circles \OCA\Circles\Api\v1\Circles getPath getPath new \OCA\DAV\Connector\Sabre\QuotaPlugin($view, true) $shareType getShareType()]]> null getId DTSTAMP]]> $whereValues array string $principals string[] $members null null null null null null null array null enablePropfindDepthInfinityf]]> $value ?string $search getTimestamp() !== false]]> arguments[0]->name]]> arguments[0]->name]]> backend->getArbiterPath()]]> bool usersToDelete]]> usersToDelete]]> IEventListener IEventListener IEventListener IEventListener IEventListener IEventListener IEventListener IEventListener IEventListener IEventListener IEventListener IEventListener $arguments $arguments getCursor()]]> l10n->l('date', $startDateTime, ['width' => 'medium'])]]> getCursor()]]> ['CN'], 'ORGANIZER' => ['CN'], ]]]> l10n->l('date', $startDateTime, ['width' => 'medium'])]]> string getDateTime getDateTime hasTime isFloating isFloating getCursor()]]> getDateTime getDateTime hasTime 'OCA\DAV\Connector\Sabre::addPlugin' 'OCA\DAV\Connector\Sabre::authInit' dispatch dispatch $tagId $tagName $objectName SystemTagsEntityEvent::EVENT_ENTITY dispatch $members false currentStream]]> $context array array_values getId getId getId getInternalPath getNode getSize $userSession get_class($res) === 'OpenSSLAsymmetricKey' $position time() time() time() throw $exception; new Exceptions\PrivateKeyMissingException('please try to log-out and log-in again', 0) $userSession $id $id $id $id $id $id $remoteId $shareId $shareId $shareId $shareId (int)$data['id'] IEventListener bool bool bool $id $id $id $id $shareId string (int)$share['id'] IEventListener $files_list fileEncrypted[$fileId]]]> fileIsEncrypted]]> fileIsEncrypted]]> fileIsEncrypted]]> fileIsEncrypted]]> fileIsEncrypted]]> fileIsEncrypted]]> fileIsEncrypted]]> fileIsEncrypted]]> fileIsEncrypted]]> fileIsEncrypted]]> fileIsEncrypted]]> fileIsEncrypted]]> fileIsEncrypted]]> fileIsEncrypted]]> null null $templateId getTemplates open $fileId getById getRelativePath getRelativePath $file $i $i $i $i $i $i $i $i $i $i $i $i $legacyEvent IEventListener IEventListener IEventListener empty($encryptedFiles) isReadyForUser self::class . '::' . $eventName dispatch $this getCode()]]> (int)$status getUniqueStorages put getCode()]]> getCode()]]> getCode()]]> getCode()]]> getCode()]]> getCode()]]> getCode()]]> lastModified]]> filetype fopen IEventListener IEventListener IEventListener login decrypt encrypt setIV setIV test 'OCA\\Files_External::loadAdditionalBackends' dispatch (int)$code (int)$code \OCA\Circles\Api\v1\Circles \OCA\Circles\Api\v1\Circles getRoomShareHelper()]]> getRoomShareHelper()]]> getRoomShareHelper()]]> \OCA\Talk\Share\Helper\ShareAPIController $files_list $cacheData $legacyEvent IEventListener IEventListener IEventListener IEventListener IEventListener IEventListener getMessage()]]> array_values $itemSource $itemSource $shareWith fetchRow bool sourceRootInfo]]> ICacheEntry new FailedCache() sourceRootInfo]]> moveMount $_['hideFileList'] !== true IEventListener int data->getId()]]> $entry ITrash getChild null INode $entry ITrash 'OCA\Files_Trashbin::moveToTrash' mountPoint]]> dispatch $trashFiles null $file getById false $timestamp $timestamp $this $this IEventListener IEventListener IEventListener getChild null getChild instanceOfStorage('\OC\Files\ObjectStore\ObjectStoreStorage')]]> retries + 1]]> request->server]]> $groupid === null $groupid === null IEventListener Response AppPasswordCreatedActivityListener::class getSettingsManager ignoreNextcloudRequirementForApp IDBConnection::CHECK_MISSING_COLUMNS_EVENT IDBConnection::CHECK_MISSING_INDEXES_EVENT IDBConnection::CHECK_MISSING_PRIMARY_KEYS_EVENT dispatch dispatch dispatch getEMailAddress() => $user->getDisplayName()]]]> IEventListener IEventListener IEventListener isReady null getId()]]> (int)$data['id'] getObjectId()]]> getObjectId()]]> TIME_SENSITIVE IEventListener IEventListener getRgb())]]> array{0: int, 1: int, 2: int} IEventListener IEventListener IEventListener IEventListener IEventListener IEventListener false users]]> $ln + 1 $this $uuid $values string[] getCode()]]> 'OCA\\User_LDAP\\User\\User::postLDAPBackendAdded' dispatch $subj default: $subj = $key; break; $groupID $gid $i null isset($qb) isset($qb) protected function handleRequest($id, $method, $parameters, $passOnWhen = false) { public function setLdapAccess(Access $access) { avatarImage]]> refreshedFeatures]]> null 0)]]> string|false $limit $offset null 0)]]> is_string($dn) $uid $possibleAttrs[$i] registerProvider IEventListener IEventListener IEventListener null size]]> $size size]]> string storage]]> $decodedValue[1] $decodedValue[1] $decodedValue[1] $decodedValue[1] $hour1 $minute1 Application::APP_ID, 'class' => get_class($subject)]]]> string $uid IEventListener $missingCheck IManager::EVENT_NAME_REG_CHECK IManager::EVENT_NAME_REG_ENTITY IManager::EVENT_NAME_REG_OPERATION $result $result bool dispatch dispatch dispatch getAllConfiguredScopesForOperation getChecks getOperations getOperations isUserScopeEnabled $arguments $arguments $arguments $result === false array $result === true 0 1 appConfig->getValues($app, false)]]> getFilteredValues IDBConnection::ADD_MISSING_COLUMNS_EVENT dispatch IDBConnection::ADD_MISSING_INDEXES_EVENT dispatch IDBConnection::ADD_MISSING_PRIMARY_KEYS_EVENT dispatch 0 1 null [0] string[] $levelNum timeFactory->getTime()]]> getAllMappings updateFilecache getAllAliases section section [] !is_string($stateToken) searchCollections getCode()]]> null findMatchingRoute IEventListener request->server]]> $this $this create('core_ajax_update', '/core/ajax/update.php')]]> getIcon memoryCache]]> $restrictions 'OC\AccountManager::userUpdated' dispatch $affectedUser filterClasses]]> providerClasses]]> settingsClasses]]> $key !is_array($userIds) ManagerEvent::EVENT_APP_DISABLE ManagerEvent::EVENT_APP_ENABLE ManagerEvent::EVENT_APP_ENABLE_FOR_GROUPS array array dispatch dispatch dispatch fetch bool version_compare($first, $second, $operator) $array[$element][] $array[$element][] (string)$xml array $values $default bootedApps]]> getName boolean|null server]]> \OCP\IServerContainer mixed getAppDataDir request->method]]> null @readfile($path) http_response_code() bool int \ArrayAccess $name $remoteAddress getOverwriteHost()]]> method]]> $uri cookies[$key]) ? $this->cookies[$key] : null]]> env[$key]) ? $this->env[$key] : null]]> files[$key]) ? $this->files[$key] : null]]> \is_array($params) \Sabre\HTTP\decodePath($pathInfo) log TemplateResponse::EVENT_LOAD_ADDITIONAL_SCRIPTS TemplateResponse::EVENT_LOAD_ADDITIONAL_SCRIPTS_LOGGEDIN dispatch dispatch setOCSVersion request->server]]> request->server]]> request->server]]> \OCA\Talk\Controller\PageController $action['url-postfix'] $default ArrayAccess getCode()]]> tar->extractInString($path)]]> IEventListener IEventListener $trySession DO_NOT_REMEMBER PERMANENT_TOKEN REMEMBER TEMPORARY_TOKEN WIPE_TOKEN getExpires getLastCheck getLoginName getName getPassword getRemember getScope setExpires setLastCheck setName setPassword setPasswordInvalid setScope setScope setToken setType $row['provider_id'], 'uid' => $row['uid'], 'enabled' => 1 === (int) $row['enabled'], ]; }, $rows)]]> int[] IProvider::EVENT_FAILED IProvider::EVENT_SUCCESS dispatch dispatch providers]]> providers]]> [] providers]]> IProvider[] providers]]> $provider['provider_id'] $jobList $jobList \ArrayAccess bool|mixed bool|mixed container->get($registration->getService()); } catch (Throwable $e) { $this->logger->error('Could not load calendar provider ' . $registration->getService() . ': ' . $e->getMessage(), [ 'exception' => $e, ]); return []; } return $provider->getCalendars($principalUri, $calendarUris); }, $context->getCalendarProviders())]]> $serializedCallable [LaravelClosure::class, OpisClosure::class] $serializedCallable $serializedCommand \DateTime|null $timestamp !is_array($mentions[0]) public function getForObjectSince( (string)$id delete($key)]]> set($key, $value)]]> $CONFIG $CONFIG ConsoleEvent::EVENT_RUN request->server]]> dispatch $searchOptions IAddressBook array bool null null null null null $addressBook $addressBook execute()]]> int getParams $params['collation'] getParams $params $params['adapter'] $params['tablePrefix'] adapter->lastInsertId($seqName)]]> string $seqName $statement getCode())]]> 0 $offset $offset $key[0] functionBuilder->lower($x)]]> $y $y getParams $params['collation'] string $alias $groupBys $selects string $string l($type, $timestamp, [ 'width' => $format, ])]]> public function formatDateSpan($timestamp, $baseTimestamp = null, \OCP\IL10N $l = null) { public function formatTimeSpan($timestamp, $baseTimestamp = null, \OCP\IL10N $l = null) { l($type, $timestamp, [ 'width' => $format, ])]]> string $timestamp float microtime(true) stopQuery execute()]]> TemplateResponse int $template $template $template $template getShareForToken deleteUserKey null null null bool dispatch $eventName $listener $eventName dispatch $providerId $parentData array $path \OC_Util::normalizeUnicode($path) null null $searchQuery [] getIncomplete insert put $data $file $file self::SCAN_RECURSIVE_INCOMPLETE $existingChildren array[] array getStorageInfo($storageId)]]> cache instanceof Cache]]> array array $searchQuery $user get_class($provider) !== 'OCA\Files_Sharing\MountProvider' get_class($provider) === 'OCA\Files_Sharing\MountProvider' remoteStorageMounts removeUserStorageMount array \ArrayAccess addStorageWrapper wrap \OCP\Files\Mount\IMountPoint null view->hash($type, $this->path, $raw)]]> string $node '\OCP\Files::postCopy' '\OCP\Files::postCreate' '\OCP\Files::postDelete' '\OCP\Files::postRename' '\OCP\Files::postTouch' '\OCP\Files::postWrite' '\OCP\Files::preCopy' '\OCP\Files::preCreate' '\OCP\Files::preDelete' '\OCP\Files::preRename' '\OCP\Files::preTouch' '\OCP\Files::preWrite' '\OCP\Files::read' dispatch dispatch dispatch dispatch dispatch dispatch dispatch dispatch dispatch dispatch dispatch dispatch dispatch emit emit emit emit emit emit emit emit emit emit emit emit emit __call(__FUNCTION__, func_get_args())]]> Node '\OCP\Files::' . $hook FileInfo getChecksum fileInfo]]> $type dispatch fileInfo]]> fileInfo]]> Node \OC\User\User user]]> remove false|string $source ClientResolver::_default_signature_provider() ClientResolver::_default_signature_provider() ClientResolver::_default_signature_provider() Promise\promise_for( new Credentials($key, $secret) ) \Aws\or_chain([self::class, 'legacySignatureProvider'], ClientResolver::_default_signature_provider()) upload \Aws\serialize($command) null string string|false !$permissions copyFromStorage($sourceStorage, $sourceInternalPath . '/' . $file, $targetInternalPath . '/' . $file)]]> cache]]> cache]]> propagator]]> propagator]]> scanner]]> scanner]]> updater]]> updater]]> ArrayCache ArrayCache getETag getBody()]]> fopen null new FailedCache() true getCache verifyPath $file $result $result rename $space === false || is_null($space) is_null($space) $stat === false scanner]]> scanner]]> \Normalizer::FORM_C \Normalizer::FORM_C \Normalizer::FORM_D namesCache]]> namesCache]]> namesCache]]> namesCache]]> namesCache]]> namesCache]]> namesCache]]> namesCache]]> namesCache]]> namesCache]]> namesCache]]> namesCache]]> namesCache]]> namesCache]]> namesCache]]> namesCache]]> namesCache]]> $result $result copyFromStorage($sourceStorage, $sourceInternalPath . '/' . $file, $targetInternalPath . '/' . $file, false, $isRename)]]> $newUnencryptedSize $result bool int $lastChunkPos $size getWrapperStorage()->filetype($this->getUnjailedPath($path))]]> bool getWrapperStorage()->test()]]> true stream_close stream_flush !$isDefaultTemplates $mimetype execute()]]> int $mtime acquireLock changeLock releaseLock getContent())]]> groupCache[$gid]['displayname']]]> groupCache]]> groupCache]]> groupCache]]> IEventListener IGroup::class . '::postAddUser' IGroup::class . '::postDelete' IGroup::class . '::postRemoveUser' IGroup::class . '::preAddUser' IGroup::class . '::preDelete' IGroup::class . '::preRemoveUser' bool $hide $user emitter]]> emitter]]> emitter]]> dispatch dispatch dispatch dispatch dispatch dispatch addToGroup countUsersInGroup deleteGroup removeFromGroup createGroup getGroupDetails isAdmin string|resource stream ? $this->response->getBody()->detach(): $this->response->getBody()->getContents()]]> false false false $app['path'] $app['path'] null getDN(X509::DN_OPENSSL)['CN']]]> getDN(X509::DN_OPENSSL)['CN']]]> getDN(true)['CN']]]> getAllAliases getOnlyDefaultAliases ExcludeFileByNameFilterIterator ExcludeFoldersByPathFilterIterator null|string array|mixed $matches[1] get [] getIncomplete -1, 'parent' => -1, 'name' => '', 'path' => '', 'size' => '0', 'mtime' => time(), 'storage_mtime' => time(), 'etag' => '', 'mimetype' => FileInfo::MIMETYPE_FOLDER, 'mimepart' => 'httpd', 'permissions' => Constants::PERMISSION_READ ])]]> getOwner getPermissions new IteratorDirectory([]) new NullCache() getCache opendir null null new IteratorDirectory([]) $callback() $sessionCallback $request $limit === null getMethod())]]> $dummy syslogId, 'MESSAGE=' . $this->logDetailsAsJSON($app, $message, $level))]]> getPrefix() . $key, $value, $ttl)]]> bool mixed mixed mixed mixed \ArrayAccess \ArrayAccess $id [] $maxPreviewImage $semId IPreview::EVENT $sem false|resource ISimpleFile dispatch height height preciseResizeCopy resizeCopy valid width width $thumbnail === false ? null: $thumbnail ?IImage \RedisCluster::OPT_SLAVE_FAILOVER array getBody()]]> bool|string $response false $arguments $arguments $counter % 100 === 0 userToNotify]]> $out $out $out \OC_APP string collectionName]]> $provider instanceof Provider getId()]]> getMtime()]]> getPermissions()]]> hasPreview($data)]]> null request->server]]> value)]]> execute()]]> execute()]]> int int decrypt encrypt setIV setIV setPassword setPassword \OCP\Calendar\Resource\IManager \OCP\Calendar\Room\IManager \OCP\Files\Folder|null new GenericEvent($user) \OC\OCSClient hasNoAppContainer]]> appContainers[$namespace];]]> \ArrayAccess $value $value \ArrayAccess $content !== '' $type === 'pdo' $vendor dbPort)]]> dbprettyname]]> dbprettyname]]> dbprettyname]]> dbprettyname]]> !self::isResharingAllowed() getParents getParents getId()]]> getId()]]> (int)$data['id'] set getParent $id 'OCP\Share::postAcceptShare' 'OCP\Share::postShare' 'OCP\Share::postUnshare' 'OCP\Share::postUnshareFromSelf' 'OCP\Share::preShare' 'OCP\Share::preUnshare' dispatch dispatch dispatch dispatch dispatch dispatch update \OCA\Circles\Api\v1\Circles getChildren FederatedShareProvider ShareByMailProvider $provider $provider shareByCircleProvider]]> getProviderForType null null null null null null $shareProviderClass \OCA\Circles\ShareByCircleProvider RoomShareProvider \OCA\Circles\ShareByCircleProvider \OCA\Talk\Share\RoomShareProvider private $roomShareProvider = null; private $shareByCircleProvider = null; getLazyRootFolder getLazyRootFolder getLazyRootFolder getLazyRootFolder $stream get listen listen getSupportedApps ManagerEvent::EVENT_CREATE ManagerEvent::EVENT_DELETE ManagerEvent::EVENT_UPDATE dispatch dispatch dispatch MapperEvent::EVENT_ASSIGN MapperEvent::EVENT_UNASSIGN dispatch dispatch \OCP\ITags null $from $names $tag false false $style $style null null false $script $script string string $appName $appName getInitialStates $path false IEventListener IUser|false $backend createUser getUsersForUserValueCaseInsensitive boolean|null IUser::class . '::firstLogin' server]]> server]]> dispatch IUser::class . '::changeUser' IUser::class . '::postDelete' IUser::class . '::postSetPassword' IUser::class . '::preDelete' IUser::class . '::preSetPassword' dispatch dispatch dispatch dispatch dispatch emit emit emit emit emit int null $groupsList ManagerEvent::EVENT_APP_UPDATE $dir['path'] $dir['url'] null null dispatch $appId === null $appId === null \OC\InsufficientStorageException $getType === self::ZIP_DIR $getType === self::ZIP_DIR get get $matches[0][$last_match] $matches[1][$last_match] $path getQuota bool|string \Test\Util\User\Dummy void request->server]]> container, $router, $routes)]]> string $column data]]> array EVENT_FAILED EVENT_SUCCESS $jobList $jobList \ArrayAccess mixed ArrayAccess IteratorAggregate \OC_App::getStorage($app) ArrayAccess array \Iterator