We could not synchronize checks via GitHub's checks API since Scrutinizer's GitHub App is not installed for this repository.
@@ -44,7 +44,7 @@ |
||
44 | 44 | ->filter(fn ($item) => isset($item[$macro])); |
45 | 45 | |
46 | 46 | $subfieldsWithMacros->each( |
47 | - function ($item) use ($subfieldsWithMacros, $macro) { |
|
47 | + function($item) use ($subfieldsWithMacros, $macro) { |
|
48 | 48 | if ($subfieldsWithMacros->last() === $item) { |
49 | 49 | $this->{$macro}($item[$macro], $item); |
50 | 50 | } else { |
@@ -10,7 +10,7 @@ discard block |
||
10 | 10 | /** |
11 | 11 | * Set an operation as having access using the Settings API. |
12 | 12 | */ |
13 | - public function allowAccess(array|string $operation): bool |
|
13 | + public function allowAccess(array | string $operation): bool |
|
14 | 14 | { |
15 | 15 | foreach ((array) $operation as $op) { |
16 | 16 | $this->set($op.'.access', true); |
@@ -22,13 +22,13 @@ discard block |
||
22 | 22 | /** |
23 | 23 | * Disable the access to a certain operation, or the current one. |
24 | 24 | */ |
25 | - public function denyAccess(array|string $operation): bool |
|
25 | + public function denyAccess(array | string $operation): bool |
|
26 | 26 | { |
27 | 27 | foreach ((array) $operation as $op) { |
28 | 28 | $this->set($op.'.access', false); |
29 | 29 | } |
30 | 30 | |
31 | - return ! $this->hasAccessToAny($operation); |
|
31 | + return !$this->hasAccessToAny($operation); |
|
32 | 32 | } |
33 | 33 | |
34 | 34 | /** |
@@ -52,7 +52,7 @@ discard block |
||
52 | 52 | /** |
53 | 53 | * Check if any operations are allowed for a Crud Panel. Return false if not. |
54 | 54 | */ |
55 | - public function hasAccessToAny(array|string $operation_array, ?Model $entry = null): bool |
|
55 | + public function hasAccessToAny(array | string $operation_array, ?Model $entry = null): bool |
|
56 | 56 | { |
57 | 57 | foreach ((array) $operation_array as $key => $operation) { |
58 | 58 | if ($this->hasAccess($operation, $entry) == true) { |
@@ -66,10 +66,10 @@ discard block |
||
66 | 66 | /** |
67 | 67 | * Check if all operations are allowed for a Crud Panel. Return false if not. |
68 | 68 | */ |
69 | - public function hasAccessToAll(array|string $operation_array, ?Model $entry = null): bool |
|
69 | + public function hasAccessToAll(array | string $operation_array, ?Model $entry = null): bool |
|
70 | 70 | { |
71 | 71 | foreach ((array) $operation_array as $key => $operation) { |
72 | - if (! $this->hasAccess($operation, $entry)) { |
|
72 | + if (!$this->hasAccess($operation, $entry)) { |
|
73 | 73 | return false; |
74 | 74 | } |
75 | 75 | } |
@@ -84,7 +84,7 @@ discard block |
||
84 | 84 | */ |
85 | 85 | public function hasAccessOrFail(string $operation, ?Model $entry = null): bool |
86 | 86 | { |
87 | - if (! $this->hasAccess($operation, $entry)) { |
|
87 | + if (!$this->hasAccess($operation, $entry)) { |
|
88 | 88 | throw new AccessDeniedException(trans('backpack::crud.unauthorized_access', ['access' => $operation])); |
89 | 89 | } |
90 | 90 | |
@@ -95,7 +95,7 @@ discard block |
||
95 | 95 | * Get an operation's access condition, if set. A condition |
96 | 96 | * can be anything, but usually a boolean or a callable. |
97 | 97 | */ |
98 | - public function getAccessCondition(string $operation): bool|callable|null |
|
98 | + public function getAccessCondition(string $operation): bool | callable | null |
|
99 | 99 | { |
100 | 100 | return $this->get($operation.'.access'); |
101 | 101 | } |
@@ -103,7 +103,7 @@ discard block |
||
103 | 103 | /** |
104 | 104 | * Set the condition under which an operation is allowed for a Crud Panel. |
105 | 105 | */ |
106 | - public function setAccessCondition(array|string $operation, bool|callable|null $condition): void |
|
106 | + public function setAccessCondition(array | string $operation, bool | callable | null $condition): void |
|
107 | 107 | { |
108 | 108 | foreach ((array) $operation as $op) { |
109 | 109 | $this->set($op.'.access', $condition); |
@@ -131,7 +131,7 @@ discard block |
||
131 | 131 | * Allow access only to operations in the array. |
132 | 132 | * By denying access to all other operations. |
133 | 133 | */ |
134 | - public function allowAccessOnlyTo(array|string $operation): void |
|
134 | + public function allowAccessOnlyTo(array | string $operation): void |
|
135 | 135 | { |
136 | 136 | $this->denyAllAccess(); |
137 | 137 | $this->allowAccess($operation); |
@@ -15,5 +15,5 @@ |
||
15 | 15 | (array) config('backpack.base.middleware_key', 'admin') |
16 | 16 | ), |
17 | 17 | 'namespace' => 'App\Http\Controllers\Admin', |
18 | -], function () { // custom admin routes |
|
18 | +], function() { // custom admin routes |
|
19 | 19 | }); // this should be the absolute last line of this file |
@@ -18,7 +18,7 @@ |
||
18 | 18 | 'middleware' => config('backpack.base.web_middleware', 'web'), |
19 | 19 | 'prefix' => config('backpack.base.route_prefix'), |
20 | 20 | ], |
21 | - function () { |
|
21 | + function() { |
|
22 | 22 | // if not otherwise configured, setup the auth routes |
23 | 23 | if (config('backpack.base.setup_auth_routes')) { |
24 | 24 | // Authentication Routes... |
@@ -15,7 +15,7 @@ |
||
15 | 15 | (array) config('backpack.base.middleware_key', 'admin'), |
16 | 16 | 'prefix' => config('backpack.base.route_prefix', 'admin'), |
17 | 17 | ], |
18 | - function () { |
|
18 | + function() { |
|
19 | 19 | Route::crud('users', 'Backpack\CRUD\Tests\Config\Http\Controllers\UserCrudController'); |
20 | 20 | } |
21 | 21 | ); |
@@ -47,7 +47,7 @@ discard block |
||
47 | 47 | } |
48 | 48 | |
49 | 49 | // always have a hidden input for the entry id |
50 | - if (! array_key_exists('id', $fields)) { |
|
50 | + if (!array_key_exists('id', $fields)) { |
|
51 | 51 | $fields['id'] = [ |
52 | 52 | 'name' => $entry->getKeyName(), |
53 | 53 | 'value' => $entry->getKey(), |
@@ -72,12 +72,12 @@ discard block |
||
72 | 72 | $fieldEntity = $field['entity'] ?? false; |
73 | 73 | $fakeField = $field['fake'] ?? false; |
74 | 74 | |
75 | - if ($fieldEntity && ! $fakeField) { |
|
75 | + if ($fieldEntity && !$fakeField) { |
|
76 | 76 | return $this->getModelAttributeValueFromRelationship($model, $field); |
77 | 77 | } |
78 | 78 | |
79 | 79 | if ($this->holdsMultipleInputs($field['name'])) { |
80 | - $result = array_map(function ($item) use ($model) { |
|
80 | + $result = array_map(function($item) use ($model) { |
|
81 | 81 | return $model->{$item}; |
82 | 82 | }, explode(',', $field['name'])); |
83 | 83 | |
@@ -99,7 +99,7 @@ discard block |
||
99 | 99 | { |
100 | 100 | [$relatedModel, $relationMethod] = $this->getModelAndMethodFromEntity($model, $field); |
101 | 101 | |
102 | - if (! method_exists($relatedModel, $relationMethod)) { |
|
102 | + if (!method_exists($relatedModel, $relationMethod)) { |
|
103 | 103 | return $relatedModel->{$relationMethod}; |
104 | 104 | } |
105 | 105 | |
@@ -118,7 +118,7 @@ discard block |
||
118 | 118 | $model = $this->setupRelatedModelLocale($model); |
119 | 119 | // when subfields are NOT set we don't need to get any more values |
120 | 120 | // we just return the plain models as we only need the ids |
121 | - if (! isset($field['subfields'])) { |
|
121 | + if (!isset($field['subfields'])) { |
|
122 | 122 | $result->push($model); |
123 | 123 | |
124 | 124 | continue; |
@@ -146,13 +146,13 @@ discard block |
||
146 | 146 | break; |
147 | 147 | case 'HasOne': |
148 | 148 | case 'MorphOne': |
149 | - if (! method_exists($relatedModel, $relationMethod)) { |
|
149 | + if (!method_exists($relatedModel, $relationMethod)) { |
|
150 | 150 | return; |
151 | 151 | } |
152 | 152 | |
153 | 153 | $model = $relatedModel->{$relationMethod}; |
154 | 154 | |
155 | - if (! $model) { |
|
155 | + if (!$model) { |
|
156 | 156 | return; |
157 | 157 | } |
158 | 158 | |
@@ -233,7 +233,7 @@ discard block |
||
233 | 233 | |
234 | 234 | $relationArray = explode('.', $relationEntity); |
235 | 235 | |
236 | - $relatedModel = array_reduce(array_splice($relationArray, 0, -1), function ($obj, $method) { |
|
236 | + $relatedModel = array_reduce(array_splice($relationArray, 0, -1), function($obj, $method) { |
|
237 | 237 | // if the string ends with `_id` we strip it out |
238 | 238 | $method = Str::endsWith($method, '_id') ? Str::replaceLast('_id', '', $method) : $method; |
239 | 239 | |
@@ -260,7 +260,7 @@ discard block |
||
260 | 260 | // if the subfield name does not contain a dot we just need to check |
261 | 261 | // if it has subfields and return the result accordingly. |
262 | 262 | foreach ((array) $subfield['name'] as $name) { |
263 | - if (! Str::contains($name, '.')) { |
|
263 | + if (!Str::contains($name, '.')) { |
|
264 | 264 | // when subfields are present, $relatedModel->{$name} returns a model instance |
265 | 265 | // otherwise returns the model attribute. |
266 | 266 | if ($relatedModel->{$name}) { |
@@ -23,7 +23,7 @@ |
||
23 | 23 | (array) config('backpack.base.middleware_key', 'admin'), |
24 | 24 | 'prefix' => config('backpack.base.route_prefix', 'admin'), |
25 | 25 | ], |
26 | - function () { |
|
26 | + function() { |
|
27 | 27 | Route::get('articles/{id}/show/{detail}', ['as' => 'article.show.detail', 'action' => 'Backpack\CRUD\Tests\config\Http\Controllers\ArticleCrudController@detail']); |
28 | 28 | Route::crud('users', 'Backpack\CRUD\Tests\config\Http\Controllers\UserCrudController'); |
29 | 29 | Route::crud('articles', 'Backpack\CRUD\Tests\config\Http\Controllers\ArticleCrudController'); |
@@ -605,7 +605,7 @@ discard block |
||
605 | 605 | |
606 | 606 | public function testCreateBelongsToFake() |
607 | 607 | { |
608 | - $belongsToField = [ // select_grouped |
|
608 | + $belongsToField = [// select_grouped |
|
609 | 609 | 'label' => 'Select_grouped', |
610 | 610 | 'type' => 'select_grouped', //https://github.com/Laravel-Backpack/CRUD/issues/502 |
611 | 611 | 'name' => 'bang_relation_field', |
@@ -741,7 +741,7 @@ discard block |
||
741 | 741 | 'nickname' => 'i_have_has_one', |
742 | 742 | 'profile_picture' => 'ohh my picture 1.jpg', |
743 | 743 | 'article' => 1, |
744 | - 'addresses' => [ // HasOne is tested in other test function |
|
744 | + 'addresses' => [// HasOne is tested in other test function |
|
745 | 745 | [ |
746 | 746 | 'city' => 2, |
747 | 747 | 'street' => 'test', |
@@ -45,7 +45,7 @@ discard block |
||
45 | 45 | 'password' => 'test', |
46 | 46 | ]); |
47 | 47 | |
48 | - $request->setRouteResolver(function () use ($request) { |
|
48 | + $request->setRouteResolver(function() use ($request) { |
|
49 | 49 | return (new Route('POST', 'users', ['Backpack\CRUD\Tests\Config\Http\Controllers\UserCrudController', 'create']))->bind($request); |
50 | 50 | }); |
51 | 51 | |
@@ -85,7 +85,7 @@ discard block |
||
85 | 85 | 'email' => '', |
86 | 86 | ]); |
87 | 87 | |
88 | - $request->setRouteResolver(function () use ($request) { |
|
88 | + $request->setRouteResolver(function() use ($request) { |
|
89 | 89 | return (new Route('POST', 'users', ['Backpack\CRUD\Tests\Config\Http\Controllers\UserCrudController', 'create']))->bind($request); |
90 | 90 | }); |
91 | 91 | |
@@ -125,7 +125,7 @@ discard block |
||
125 | 125 | 'password' => 'test', |
126 | 126 | ]); |
127 | 127 | |
128 | - $request->setRouteResolver(function () use ($request) { |
|
128 | + $request->setRouteResolver(function() use ($request) { |
|
129 | 129 | return (new Route('POST', 'users', ['Backpack\CRUD\Tests\Config\Http\Controllers\UserCrudController', 'create']))->bind($request); |
130 | 130 | }); |
131 | 131 | |
@@ -247,7 +247,7 @@ discard block |
||
247 | 247 | 'name' => 'test', |
248 | 248 | ]); |
249 | 249 | |
250 | - $request->setRouteResolver(function () use ($request) { |
|
250 | + $request->setRouteResolver(function() use ($request) { |
|
251 | 251 | return (new Route('POST', 'users', ['Backpack\CRUD\Tests\Config\Http\Controllers\UserCrudController', 'create']))->bind($request); |
252 | 252 | }); |
253 | 253 |