We could not synchronize checks via GitHub's checks API since Scrutinizer's GitHub App is not installed for this repository.
@@ -44,7 +44,7 @@ |
||
| 44 | 44 | ->filter(fn ($item) => isset($item[$macro])); |
| 45 | 45 | |
| 46 | 46 | $subfieldsWithMacros->each( |
| 47 | - function ($item) use ($subfieldsWithMacros, $macro) { |
|
| 47 | + function($item) use ($subfieldsWithMacros, $macro) { |
|
| 48 | 48 | if ($subfieldsWithMacros->last() === $item) { |
| 49 | 49 | $this->{$macro}($item[$macro], $item); |
| 50 | 50 | } else { |
@@ -10,7 +10,7 @@ discard block |
||
| 10 | 10 | /** |
| 11 | 11 | * Set an operation as having access using the Settings API. |
| 12 | 12 | */ |
| 13 | - public function allowAccess(array|string $operation): bool |
|
| 13 | + public function allowAccess(array | string $operation): bool |
|
| 14 | 14 | { |
| 15 | 15 | foreach ((array) $operation as $op) { |
| 16 | 16 | $this->set($op.'.access', true); |
@@ -22,13 +22,13 @@ discard block |
||
| 22 | 22 | /** |
| 23 | 23 | * Disable the access to a certain operation, or the current one. |
| 24 | 24 | */ |
| 25 | - public function denyAccess(array|string $operation): bool |
|
| 25 | + public function denyAccess(array | string $operation): bool |
|
| 26 | 26 | { |
| 27 | 27 | foreach ((array) $operation as $op) { |
| 28 | 28 | $this->set($op.'.access', false); |
| 29 | 29 | } |
| 30 | 30 | |
| 31 | - return ! $this->hasAccessToAny($operation); |
|
| 31 | + return !$this->hasAccessToAny($operation); |
|
| 32 | 32 | } |
| 33 | 33 | |
| 34 | 34 | /** |
@@ -52,7 +52,7 @@ discard block |
||
| 52 | 52 | /** |
| 53 | 53 | * Check if any operations are allowed for a Crud Panel. Return false if not. |
| 54 | 54 | */ |
| 55 | - public function hasAccessToAny(array|string $operation_array, ?Model $entry = null): bool |
|
| 55 | + public function hasAccessToAny(array | string $operation_array, ?Model $entry = null): bool |
|
| 56 | 56 | { |
| 57 | 57 | foreach ((array) $operation_array as $key => $operation) { |
| 58 | 58 | if ($this->hasAccess($operation, $entry) == true) { |
@@ -66,10 +66,10 @@ discard block |
||
| 66 | 66 | /** |
| 67 | 67 | * Check if all operations are allowed for a Crud Panel. Return false if not. |
| 68 | 68 | */ |
| 69 | - public function hasAccessToAll(array|string $operation_array, ?Model $entry = null): bool |
|
| 69 | + public function hasAccessToAll(array | string $operation_array, ?Model $entry = null): bool |
|
| 70 | 70 | { |
| 71 | 71 | foreach ((array) $operation_array as $key => $operation) { |
| 72 | - if (! $this->hasAccess($operation, $entry)) { |
|
| 72 | + if (!$this->hasAccess($operation, $entry)) { |
|
| 73 | 73 | return false; |
| 74 | 74 | } |
| 75 | 75 | } |
@@ -84,7 +84,7 @@ discard block |
||
| 84 | 84 | */ |
| 85 | 85 | public function hasAccessOrFail(string $operation, ?Model $entry = null): bool |
| 86 | 86 | { |
| 87 | - if (! $this->hasAccess($operation, $entry)) { |
|
| 87 | + if (!$this->hasAccess($operation, $entry)) { |
|
| 88 | 88 | throw new AccessDeniedException(trans('backpack::crud.unauthorized_access', ['access' => $operation])); |
| 89 | 89 | } |
| 90 | 90 | |
@@ -95,7 +95,7 @@ discard block |
||
| 95 | 95 | * Get an operation's access condition, if set. A condition |
| 96 | 96 | * can be anything, but usually a boolean or a callable. |
| 97 | 97 | */ |
| 98 | - public function getAccessCondition(string $operation): bool|callable|null |
|
| 98 | + public function getAccessCondition(string $operation): bool | callable | null |
|
| 99 | 99 | { |
| 100 | 100 | return $this->get($operation.'.access'); |
| 101 | 101 | } |
@@ -103,7 +103,7 @@ discard block |
||
| 103 | 103 | /** |
| 104 | 104 | * Set the condition under which an operation is allowed for a Crud Panel. |
| 105 | 105 | */ |
| 106 | - public function setAccessCondition(array|string $operation, bool|callable|null $condition): void |
|
| 106 | + public function setAccessCondition(array | string $operation, bool | callable | null $condition): void |
|
| 107 | 107 | { |
| 108 | 108 | foreach ((array) $operation as $op) { |
| 109 | 109 | $this->set($op.'.access', $condition); |
@@ -131,7 +131,7 @@ discard block |
||
| 131 | 131 | * Allow access only to operations in the array. |
| 132 | 132 | * By denying access to all other operations. |
| 133 | 133 | */ |
| 134 | - public function allowAccessOnlyTo(array|string $operation): void |
|
| 134 | + public function allowAccessOnlyTo(array | string $operation): void |
|
| 135 | 135 | { |
| 136 | 136 | $this->denyAllAccess(); |
| 137 | 137 | $this->allowAccess($operation); |
@@ -15,5 +15,5 @@ |
||
| 15 | 15 | (array) config('backpack.base.middleware_key', 'admin') |
| 16 | 16 | ), |
| 17 | 17 | 'namespace' => 'App\Http\Controllers\Admin', |
| 18 | -], function () { // custom admin routes |
|
| 18 | +], function() { // custom admin routes |
|
| 19 | 19 | }); // this should be the absolute last line of this file |
@@ -18,7 +18,7 @@ |
||
| 18 | 18 | 'middleware' => config('backpack.base.web_middleware', 'web'), |
| 19 | 19 | 'prefix' => config('backpack.base.route_prefix'), |
| 20 | 20 | ], |
| 21 | - function () { |
|
| 21 | + function() { |
|
| 22 | 22 | // if not otherwise configured, setup the auth routes |
| 23 | 23 | if (config('backpack.base.setup_auth_routes')) { |
| 24 | 24 | // Authentication Routes... |
@@ -15,7 +15,7 @@ |
||
| 15 | 15 | (array) config('backpack.base.middleware_key', 'admin'), |
| 16 | 16 | 'prefix' => config('backpack.base.route_prefix', 'admin'), |
| 17 | 17 | ], |
| 18 | - function () { |
|
| 18 | + function() { |
|
| 19 | 19 | Route::crud('users', 'Backpack\CRUD\Tests\Config\Http\Controllers\UserCrudController'); |
| 20 | 20 | } |
| 21 | 21 | ); |
@@ -47,7 +47,7 @@ discard block |
||
| 47 | 47 | } |
| 48 | 48 | |
| 49 | 49 | // always have a hidden input for the entry id |
| 50 | - if (! array_key_exists('id', $fields)) { |
|
| 50 | + if (!array_key_exists('id', $fields)) { |
|
| 51 | 51 | $fields['id'] = [ |
| 52 | 52 | 'name' => $entry->getKeyName(), |
| 53 | 53 | 'value' => $entry->getKey(), |
@@ -72,12 +72,12 @@ discard block |
||
| 72 | 72 | $fieldEntity = $field['entity'] ?? false; |
| 73 | 73 | $fakeField = $field['fake'] ?? false; |
| 74 | 74 | |
| 75 | - if ($fieldEntity && ! $fakeField) { |
|
| 75 | + if ($fieldEntity && !$fakeField) { |
|
| 76 | 76 | return $this->getModelAttributeValueFromRelationship($model, $field); |
| 77 | 77 | } |
| 78 | 78 | |
| 79 | 79 | if ($this->holdsMultipleInputs($field['name'])) { |
| 80 | - $result = array_map(function ($item) use ($model) { |
|
| 80 | + $result = array_map(function($item) use ($model) { |
|
| 81 | 81 | return $model->{$item}; |
| 82 | 82 | }, explode(',', $field['name'])); |
| 83 | 83 | |
@@ -99,7 +99,7 @@ discard block |
||
| 99 | 99 | { |
| 100 | 100 | [$relatedModel, $relationMethod] = $this->getModelAndMethodFromEntity($model, $field); |
| 101 | 101 | |
| 102 | - if (! method_exists($relatedModel, $relationMethod)) { |
|
| 102 | + if (!method_exists($relatedModel, $relationMethod)) { |
|
| 103 | 103 | return $relatedModel->{$relationMethod}; |
| 104 | 104 | } |
| 105 | 105 | |
@@ -118,7 +118,7 @@ discard block |
||
| 118 | 118 | $model = $this->setupRelatedModelLocale($model); |
| 119 | 119 | // when subfields are NOT set we don't need to get any more values |
| 120 | 120 | // we just return the plain models as we only need the ids |
| 121 | - if (! isset($field['subfields'])) { |
|
| 121 | + if (!isset($field['subfields'])) { |
|
| 122 | 122 | $result->push($model); |
| 123 | 123 | |
| 124 | 124 | continue; |
@@ -146,13 +146,13 @@ discard block |
||
| 146 | 146 | break; |
| 147 | 147 | case 'HasOne': |
| 148 | 148 | case 'MorphOne': |
| 149 | - if (! method_exists($relatedModel, $relationMethod)) { |
|
| 149 | + if (!method_exists($relatedModel, $relationMethod)) { |
|
| 150 | 150 | return; |
| 151 | 151 | } |
| 152 | 152 | |
| 153 | 153 | $model = $relatedModel->{$relationMethod}; |
| 154 | 154 | |
| 155 | - if (! $model) { |
|
| 155 | + if (!$model) { |
|
| 156 | 156 | return; |
| 157 | 157 | } |
| 158 | 158 | |
@@ -233,7 +233,7 @@ discard block |
||
| 233 | 233 | |
| 234 | 234 | $relationArray = explode('.', $relationEntity); |
| 235 | 235 | |
| 236 | - $relatedModel = array_reduce(array_splice($relationArray, 0, -1), function ($obj, $method) { |
|
| 236 | + $relatedModel = array_reduce(array_splice($relationArray, 0, -1), function($obj, $method) { |
|
| 237 | 237 | // if the string ends with `_id` we strip it out |
| 238 | 238 | $method = Str::endsWith($method, '_id') ? Str::replaceLast('_id', '', $method) : $method; |
| 239 | 239 | |
@@ -260,7 +260,7 @@ discard block |
||
| 260 | 260 | // if the subfield name does not contain a dot we just need to check |
| 261 | 261 | // if it has subfields and return the result accordingly. |
| 262 | 262 | foreach ((array) $subfield['name'] as $name) { |
| 263 | - if (! Str::contains($name, '.')) { |
|
| 263 | + if (!Str::contains($name, '.')) { |
|
| 264 | 264 | // when subfields are present, $relatedModel->{$name} returns a model instance |
| 265 | 265 | // otherwise returns the model attribute. |
| 266 | 266 | if ($relatedModel->{$name}) { |
@@ -23,7 +23,7 @@ |
||
| 23 | 23 | (array) config('backpack.base.middleware_key', 'admin'), |
| 24 | 24 | 'prefix' => config('backpack.base.route_prefix', 'admin'), |
| 25 | 25 | ], |
| 26 | - function () { |
|
| 26 | + function() { |
|
| 27 | 27 | Route::get('articles/{id}/show/{detail}', ['as' => 'article.show.detail', 'action' => 'Backpack\CRUD\Tests\config\Http\Controllers\ArticleCrudController@detail']); |
| 28 | 28 | Route::crud('users', 'Backpack\CRUD\Tests\config\Http\Controllers\UserCrudController'); |
| 29 | 29 | Route::crud('articles', 'Backpack\CRUD\Tests\config\Http\Controllers\ArticleCrudController'); |
@@ -605,7 +605,7 @@ discard block |
||
| 605 | 605 | |
| 606 | 606 | public function testCreateBelongsToFake() |
| 607 | 607 | { |
| 608 | - $belongsToField = [ // select_grouped |
|
| 608 | + $belongsToField = [// select_grouped |
|
| 609 | 609 | 'label' => 'Select_grouped', |
| 610 | 610 | 'type' => 'select_grouped', //https://github.com/Laravel-Backpack/CRUD/issues/502 |
| 611 | 611 | 'name' => 'bang_relation_field', |
@@ -741,7 +741,7 @@ discard block |
||
| 741 | 741 | 'nickname' => 'i_have_has_one', |
| 742 | 742 | 'profile_picture' => 'ohh my picture 1.jpg', |
| 743 | 743 | 'article' => 1, |
| 744 | - 'addresses' => [ // HasOne is tested in other test function |
|
| 744 | + 'addresses' => [// HasOne is tested in other test function |
|
| 745 | 745 | [ |
| 746 | 746 | 'city' => 2, |
| 747 | 747 | 'street' => 'test', |
@@ -45,7 +45,7 @@ discard block |
||
| 45 | 45 | 'password' => 'test', |
| 46 | 46 | ]); |
| 47 | 47 | |
| 48 | - $request->setRouteResolver(function () use ($request) { |
|
| 48 | + $request->setRouteResolver(function() use ($request) { |
|
| 49 | 49 | return (new Route('POST', 'users', ['Backpack\CRUD\Tests\Config\Http\Controllers\UserCrudController', 'create']))->bind($request); |
| 50 | 50 | }); |
| 51 | 51 | |
@@ -85,7 +85,7 @@ discard block |
||
| 85 | 85 | 'email' => '', |
| 86 | 86 | ]); |
| 87 | 87 | |
| 88 | - $request->setRouteResolver(function () use ($request) { |
|
| 88 | + $request->setRouteResolver(function() use ($request) { |
|
| 89 | 89 | return (new Route('POST', 'users', ['Backpack\CRUD\Tests\Config\Http\Controllers\UserCrudController', 'create']))->bind($request); |
| 90 | 90 | }); |
| 91 | 91 | |
@@ -125,7 +125,7 @@ discard block |
||
| 125 | 125 | 'password' => 'test', |
| 126 | 126 | ]); |
| 127 | 127 | |
| 128 | - $request->setRouteResolver(function () use ($request) { |
|
| 128 | + $request->setRouteResolver(function() use ($request) { |
|
| 129 | 129 | return (new Route('POST', 'users', ['Backpack\CRUD\Tests\Config\Http\Controllers\UserCrudController', 'create']))->bind($request); |
| 130 | 130 | }); |
| 131 | 131 | |
@@ -247,7 +247,7 @@ discard block |
||
| 247 | 247 | 'name' => 'test', |
| 248 | 248 | ]); |
| 249 | 249 | |
| 250 | - $request->setRouteResolver(function () use ($request) { |
|
| 250 | + $request->setRouteResolver(function() use ($request) { |
|
| 251 | 251 | return (new Route('POST', 'users', ['Backpack\CRUD\Tests\Config\Http\Controllers\UserCrudController', 'create']))->bind($request); |
| 252 | 252 | }); |
| 253 | 253 | |