@@ -227,6 +227,6 @@ |
||
227 | 227 | */ |
228 | 228 | protected function getStub() |
229 | 229 | { |
230 | - return __DIR__ . '/Lib/stubs/' . $this->getTemplate() . '.stub'; |
|
230 | + return __DIR__.'/Lib/stubs/'.$this->getTemplate().'.stub'; |
|
231 | 231 | } |
232 | 232 | } |
233 | 233 | \ No newline at end of file |
@@ -8,7 +8,7 @@ discard block |
||
8 | 8 | $model = last($model); |
9 | 9 | $model = preg_replace('/\.php/i', '', $model); |
10 | 10 | |
11 | - return '\\' . $model; |
|
11 | + return '\\'.$model; |
|
12 | 12 | |
13 | 13 | } |
14 | 14 | |
@@ -20,7 +20,7 @@ discard block |
||
20 | 20 | { |
21 | 21 | $state = preg_replace('/Contracts/i', 'States', $state); |
22 | 22 | $state = preg_replace('/Contract/i', 'Trait', $state); |
23 | - $result .= 'use ' . $state . ';' . "\n"; |
|
23 | + $result .= 'use '.$state.';'."\n"; |
|
24 | 24 | } |
25 | 25 | |
26 | 26 | return $result; |
@@ -29,7 +29,7 @@ discard block |
||
29 | 29 | |
30 | 30 | public function getImplementation($states) |
31 | 31 | { |
32 | - $result = 'implements ' . join(', ', $states); |
|
32 | + $result = 'implements '.join(', ', $states); |
|
33 | 33 | |
34 | 34 | return $result; |
35 | 35 |
@@ -18,7 +18,7 @@ discard block |
||
18 | 18 | |
19 | 19 | $this->{$this->column_nb_of_try_name} += 1; |
20 | 20 | \DB::table($this->getTable()) |
21 | - ->where($this->getKeyName(),$this->getKey()) |
|
21 | + ->where($this->getKeyName(), $this->getKey()) |
|
22 | 22 | ->increment($this->column_nb_of_try_name); |
23 | 23 | return $this; |
24 | 24 | |
@@ -28,8 +28,8 @@ discard block |
||
28 | 28 | { |
29 | 29 | |
30 | 30 | \DB::table($this->getTable()) |
31 | - ->where($this->getKeyName(),$this->getKey()) |
|
32 | - ->decrement($this->column_nb_of_try_name,$this->{$this->column_nb_of_try_name}); |
|
31 | + ->where($this->getKeyName(), $this->getKey()) |
|
32 | + ->decrement($this->column_nb_of_try_name, $this->{$this->column_nb_of_try_name}); |
|
33 | 33 | |
34 | 34 | $this->{$this->column_nb_of_try_name} = 0; |
35 | 35 | return $this; |
@@ -41,8 +41,8 @@ discard block |
||
41 | 41 | $this->{$this->column_nb_of_try_name} = config($this->config_key_security_lock) + 1; |
42 | 42 | |
43 | 43 | \DB::table($this->getTable()) |
44 | - ->where($this->getKeyName(),$this->getKey()) |
|
45 | - ->increment($this->column_nb_of_try_name,$this->{$this->column_nb_of_try_name} ); |
|
44 | + ->where($this->getKeyName(), $this->getKey()) |
|
45 | + ->increment($this->column_nb_of_try_name, $this->{$this->column_nb_of_try_name} ); |
|
46 | 46 | |
47 | 47 | return $this; |
48 | 48 | } |
@@ -13,7 +13,7 @@ |
||
13 | 13 | |
14 | 14 | $input = $request->all(); |
15 | 15 | |
16 | - array_walk_recursive($input, function (&$input) { |
|
16 | + array_walk_recursive($input, function(&$input) { |
|
17 | 17 | |
18 | 18 | $input = (new Security)->xss_clean($input); |
19 | 19 |
@@ -296,6 +296,10 @@ discard block |
||
296 | 296 | * @param boolean $is_image TRUE if this is an image |
297 | 297 | * @return string The string with the evil attributes removed |
298 | 298 | */ |
299 | + |
|
300 | + /** |
|
301 | + * @param boolean $evilAttribute |
|
302 | + */ |
|
299 | 303 | protected function _remove_evil_attributes($str, $is_image, $evilAttribute) |
300 | 304 | { |
301 | 305 | // All javascript event handlers (e.g. onload, onclick, onmouseover), style, and xmlns |
@@ -419,7 +423,7 @@ discard block |
||
419 | 423 | * things like j a v a s c r i p t |
420 | 424 | * |
421 | 425 | * @param type |
422 | - * @return type |
|
426 | + * @return string |
|
423 | 427 | */ |
424 | 428 | protected function _compact_exploded_words($matches) |
425 | 429 | { |
@@ -169,7 +169,7 @@ discard block |
||
169 | 169 | // do the long opening tags. |
170 | 170 | $str = preg_replace('/<\?(php)/i', "<?\\1", $str); |
171 | 171 | } else { |
172 | - $str = str_replace(['<?', '?' . '>'], ['<?', '?>'], $str); |
|
172 | + $str = str_replace(['<?', '?'.'>'], ['<?', '?>'], $str); |
|
173 | 173 | } |
174 | 174 | |
175 | 175 | /* |
@@ -195,12 +195,12 @@ discard block |
||
195 | 195 | $temp = ''; |
196 | 196 | |
197 | 197 | for ($i = 0, $wordlen = strlen($word); $i < $wordlen; $i++) { |
198 | - $temp .= substr($word, $i, 1) . "\s*"; |
|
198 | + $temp .= substr($word, $i, 1)."\s*"; |
|
199 | 199 | } |
200 | 200 | |
201 | 201 | // We only want to do this when it is followed by a non-word character |
202 | 202 | // That way valid stuff like "dealer to" does not become "dealerto" |
203 | - $str = preg_replace_callback('#(' . substr($temp, 0, -3) . ')(\W)#is', [$this, '_compact_exploded_words'], $str); |
|
203 | + $str = preg_replace_callback('#('.substr($temp, 0, -3).')(\W)#is', [$this, '_compact_exploded_words'], $str); |
|
204 | 204 | } |
205 | 205 | |
206 | 206 | /* |
@@ -240,7 +240,7 @@ discard block |
||
240 | 240 | * Becomes: <blink> |
241 | 241 | */ |
242 | 242 | $naughty = 'alert|applet|audio|basefont|base|behavior|bgsound|blink|body|embed|expression|form|frameset|frame|head|html|ilayer|iframe|input|isindex|layer|link|meta|object|plaintext|style|script|textarea|title|video|xml|xss'; |
243 | - $str = preg_replace_callback('#<(/*\s*)(' . $naughty . ')([^><]*)([><]*)#is', [$this, '_sanitize_naughty_html'], $str); |
|
243 | + $str = preg_replace_callback('#<(/*\s*)('.$naughty.')([^><]*)([><]*)#is', [$this, '_sanitize_naughty_html'], $str); |
|
244 | 244 | |
245 | 245 | /* |
246 | 246 | * Sanitize naughty scripting elements |
@@ -315,7 +315,7 @@ discard block |
||
315 | 315 | |
316 | 316 | do { |
317 | 317 | $str = preg_replace( |
318 | - "#<(/?[^><]+?)([^A-Za-z\-])(" . implode('|', $evil_attributes) . ")(\s*=\s*)([\"][^>]*?[\"]|[\'][^>]*?[\']|[^>]*?)([\s><])([><]*)#i", |
|
318 | + "#<(/?[^><]+?)([^A-Za-z\-])(".implode('|', $evil_attributes).")(\s*=\s*)([\"][^>]*?[\"]|[\'][^>]*?[\']|[^>]*?)([\s><])([><]*)#i", |
|
319 | 319 | "<$1$6", |
320 | 320 | $str, -1, $count |
321 | 321 | ); |
@@ -386,17 +386,17 @@ discard block |
||
386 | 386 | '?', |
387 | 387 | "%20", |
388 | 388 | "%22", |
389 | - "%3c", // < |
|
390 | - "%253c", // < |
|
391 | - "%3e", // > |
|
392 | - "%0e", // > |
|
393 | - "%28", // ( |
|
394 | - "%29", // ) |
|
395 | - "%2528", // ( |
|
396 | - "%26", // & |
|
397 | - "%24", // $ |
|
398 | - "%3f", // ? |
|
399 | - "%3b", // ; |
|
389 | + "%3c", // < |
|
390 | + "%253c", // < |
|
391 | + "%3e", // > |
|
392 | + "%0e", // > |
|
393 | + "%28", // ( |
|
394 | + "%29", // ) |
|
395 | + "%2528", // ( |
|
396 | + "%26", // & |
|
397 | + "%24", // $ |
|
398 | + "%3f", // ? |
|
399 | + "%3b", // ; |
|
400 | 400 | "%3d" // = |
401 | 401 | ]; |
402 | 402 | |
@@ -423,7 +423,7 @@ discard block |
||
423 | 423 | */ |
424 | 424 | protected function _compact_exploded_words($matches) |
425 | 425 | { |
426 | - return preg_replace('/\s+/s', '', $matches[1]) . $matches[2]; |
|
426 | + return preg_replace('/\s+/s', '', $matches[1]).$matches[2]; |
|
427 | 427 | } |
428 | 428 | |
429 | 429 | // -------------------------------------------------------------------- |
@@ -439,7 +439,7 @@ discard block |
||
439 | 439 | protected function _sanitize_naughty_html($matches) |
440 | 440 | { |
441 | 441 | // encode opening brace |
442 | - $str = '<' . $matches[1] . $matches[2] . $matches[3]; |
|
442 | + $str = '<'.$matches[1].$matches[2].$matches[3]; |
|
443 | 443 | |
444 | 444 | // encode captured opening or closing brace to prevent recursive vectors |
445 | 445 | $str .= str_replace(['>', '<'], ['>', '<'], |
@@ -571,7 +571,7 @@ discard block |
||
571 | 571 | |
572 | 572 | // 901119URL5918AMP18930PROTECT8198 |
573 | 573 | |
574 | - $str = preg_replace('|\&([a-z\_0-9\-]+)\=([a-z\_0-9\-]+)|i', $this->xss_hash() . "\\1=\\2", $str); |
|
574 | + $str = preg_replace('|\&([a-z\_0-9\-]+)\=([a-z\_0-9\-]+)|i', $this->xss_hash()."\\1=\\2", $str); |
|
575 | 575 | |
576 | 576 | /* |
577 | 577 | * Validate standard character entities |
@@ -609,7 +609,7 @@ discard block |
||
609 | 609 | $str = str_replace(array_keys($this->_never_allowed_str), $this->_never_allowed_str, $str); |
610 | 610 | |
611 | 611 | foreach ($this->_never_allowed_regex as $regex) { |
612 | - $str = preg_replace('#' . $regex . '#is', '[removed]', $str); |
|
612 | + $str = preg_replace('#'.$regex.'#is', '[removed]', $str); |
|
613 | 613 | } |
614 | 614 | |
615 | 615 | return $str; |
@@ -624,11 +624,11 @@ discard block |
||
624 | 624 | // carriage return (dec 13), and horizontal tab (dec 09) |
625 | 625 | |
626 | 626 | if ($url_encoded) { |
627 | - $non_displayables[] = '/%0[0-8bcef]/'; // url encoded 00-08, 11, 12, 14, 15 |
|
628 | - $non_displayables[] = '/%1[0-9a-f]/'; // url encoded 16-31 |
|
627 | + $non_displayables[] = '/%0[0-8bcef]/'; // url encoded 00-08, 11, 12, 14, 15 |
|
628 | + $non_displayables[] = '/%1[0-9a-f]/'; // url encoded 16-31 |
|
629 | 629 | } |
630 | 630 | |
631 | - $non_displayables[] = '/[\x00-\x08\x0B\x0C\x0E-\x1F\x7F]+/S'; // 00-08, 11, 12, 14-31, 127 |
|
631 | + $non_displayables[] = '/[\x00-\x08\x0B\x0C\x0E-\x1F\x7F]+/S'; // 00-08, 11, 12, 14-31, 127 |
|
632 | 632 | |
633 | 633 | do { |
634 | 634 | $str = preg_replace($non_displayables, '', $str, -1, $count); |
@@ -42,7 +42,7 @@ |
||
42 | 42 | // First, we will check to see if a controller prefix has been registered in |
43 | 43 | // the route group. If it has, we will need to prefix it before trying to |
44 | 44 | // reflect into the class instance and pull out the method for routing. |
45 | - if (! empty($this->groupStack)) { |
|
45 | + if (!empty($this->groupStack)) { |
|
46 | 46 | $prepended = $this->prependGroupUses($controller); |
47 | 47 | } |
48 | 48 | $routable = (new ControllerInspector) |
@@ -20,7 +20,7 @@ |
||
20 | 20 | * |
21 | 21 | * @param \Illuminate\Http\Request $request |
22 | 22 | * @param \Closure $next |
23 | - * @return mixed |
|
23 | + * @return \Illuminate\Http\RedirectResponse |
|
24 | 24 | */ |
25 | 25 | public function handle($request, Closure $next) |
26 | 26 | { |
@@ -28,7 +28,7 @@ |
||
28 | 28 | preg_match_all('/(\W|^)([a-z]{2})([^a-z]|$)/six', $request->server->get('HTTP_ACCEPT_LANGUAGE'), $m, PREG_PATTERN_ORDER); |
29 | 29 | |
30 | 30 | $user_langs = $m[2]; |
31 | - if (! empty($user_langs[0])) { |
|
31 | + if (!empty($user_langs[0])) { |
|
32 | 32 | $total = Language::where('iso', '=', $user_langs[0])->count(); |
33 | 33 | if ($total > 0) { |
34 | 34 | return redirect()->to('/'.$user_langs[0]); |
@@ -24,7 +24,7 @@ |
||
24 | 24 | public function handle($request, Closure $next) |
25 | 25 | { |
26 | 26 | |
27 | - if (! $request->isSecure() and env('SECURE_COOKIE', false)) { |
|
27 | + if (!$request->isSecure() and env('SECURE_COOKIE', false)) { |
|
28 | 28 | if (strpos($request->getRequestUri(), '/storage/') === false) { |
29 | 29 | return redirect()->secure($request->getRequestUri()); |
30 | 30 | } |
@@ -18,8 +18,8 @@ |
||
18 | 18 | if (config('cache.enabled') === true) { |
19 | 19 | $url = $request->url(); |
20 | 20 | |
21 | - $key = md5($url . json_encode($request->query())); |
|
22 | - $value = \Cache::remember($key, config('cache.minutes'), function () use ($next, $request) { |
|
21 | + $key = md5($url.json_encode($request->query())); |
|
22 | + $value = \Cache::remember($key, config('cache.minutes'), function() use ($next, $request) { |
|
23 | 23 | return $next($request); |
24 | 24 | }); |
25 | 25 |