We could not synchronize checks via GitHub's checks API since Scrutinizer's GitHub App is not installed for this repository.
@@ -4,7 +4,7 @@ |
||
| 4 | 4 | |
| 5 | 5 | use Backpack\CRUD\app\Exceptions\BackpackProRequiredException; |
| 6 | 6 | |
| 7 | -if (! backpack_pro()) { |
|
| 7 | +if (!backpack_pro()) { |
|
| 8 | 8 | trait FetchOperation |
| 9 | 9 | { |
| 10 | 10 | public function setupFetchOperationDefaults() |
@@ -4,7 +4,7 @@ |
||
| 4 | 4 | |
| 5 | 5 | use Backpack\CRUD\app\Exceptions\BackpackProRequiredException; |
| 6 | 6 | |
| 7 | -if (! backpack_pro()) { |
|
| 7 | +if (!backpack_pro()) { |
|
| 8 | 8 | trait BulkCloneOperation |
| 9 | 9 | { |
| 10 | 10 | public function setupBulkCloneOperationDefaults() |
@@ -4,7 +4,7 @@ |
||
| 4 | 4 | |
| 5 | 5 | use Backpack\CRUD\app\Exceptions\BackpackProRequiredException; |
| 6 | 6 | |
| 7 | -if (! backpack_pro()) { |
|
| 7 | +if (!backpack_pro()) { |
|
| 8 | 8 | trait CloneOperation |
| 9 | 9 | { |
| 10 | 10 | public function setupCloneOperationDefaults() |
@@ -46,7 +46,7 @@ discard block |
||
| 46 | 46 | |
| 47 | 47 | $this->middleware("guest:$guard"); |
| 48 | 48 | |
| 49 | - if (! backpack_users_have_email()) { |
|
| 49 | + if (!backpack_users_have_email()) { |
|
| 50 | 50 | abort(501, trans('backpack::base.no_email_column')); |
| 51 | 51 | } |
| 52 | 52 | |
@@ -90,7 +90,7 @@ discard block |
||
| 90 | 90 | // will update the password on an actual user model and persist it to the |
| 91 | 91 | // database. Otherwise we will parse the error and return the response. |
| 92 | 92 | $response = $this->broker()->reset( |
| 93 | - $this->credentials($request), function ($user, $password) { |
|
| 93 | + $this->credentials($request), function($user, $password) { |
|
| 94 | 94 | $this->resetPassword($user, $password); |
| 95 | 95 | } |
| 96 | 96 | ); |
@@ -38,19 +38,19 @@ discard block |
||
| 38 | 38 | */ |
| 39 | 39 | public function handle($request, Closure $next) |
| 40 | 40 | { |
| 41 | - if (! $request->hasSession() || ! $this->user) { |
|
| 41 | + if (!$request->hasSession() || !$this->user) { |
|
| 42 | 42 | return $next($request); |
| 43 | 43 | } |
| 44 | 44 | |
| 45 | 45 | if ($this->guard()->viaRemember()) { |
| 46 | 46 | $passwordHash = explode('|', $request->cookies->get($this->guard()->getRecallerName()))[2] ?? null; |
| 47 | 47 | |
| 48 | - if (! $passwordHash || $passwordHash != $this->user->getAuthPassword()) { |
|
| 48 | + if (!$passwordHash || $passwordHash != $this->user->getAuthPassword()) { |
|
| 49 | 49 | $this->logout($request); |
| 50 | 50 | } |
| 51 | 51 | } |
| 52 | 52 | |
| 53 | - if (! $request->session()->has('password_hash_'.backpack_guard_name())) { |
|
| 53 | + if (!$request->session()->has('password_hash_'.backpack_guard_name())) { |
|
| 54 | 54 | $this->storePasswordHashInSession($request); |
| 55 | 55 | } |
| 56 | 56 | |
@@ -58,8 +58,8 @@ discard block |
||
| 58 | 58 | $this->logout($request); |
| 59 | 59 | } |
| 60 | 60 | |
| 61 | - return tap($next($request), function () use ($request) { |
|
| 62 | - if (! is_null($this->guard()->user())) { |
|
| 61 | + return tap($next($request), function() use ($request) { |
|
| 62 | + if (!is_null($this->guard()->user())) { |
|
| 63 | 63 | $this->storePasswordHashInSession($request); |
| 64 | 64 | } |
| 65 | 65 | }); |
@@ -73,7 +73,7 @@ discard block |
||
| 73 | 73 | */ |
| 74 | 74 | protected function storePasswordHashInSession($request) |
| 75 | 75 | { |
| 76 | - if (! $this->user) { |
|
| 76 | + if (!$this->user) { |
|
| 77 | 77 | return; |
| 78 | 78 | } |
| 79 | 79 | |
@@ -29,7 +29,7 @@ discard block |
||
| 29 | 29 | public static function addFor(string $domain, $viewNamespaces) |
| 30 | 30 | { |
| 31 | 31 | foreach ((array) $viewNamespaces as $viewNamespace) { |
| 32 | - if (! in_array($viewNamespace, self::getForDomain($domain))) { |
|
| 32 | + if (!in_array($viewNamespace, self::getForDomain($domain))) { |
|
| 33 | 33 | self::$viewNamespaces[$domain][] = $viewNamespace; |
| 34 | 34 | } |
| 35 | 35 | } |
@@ -83,7 +83,7 @@ discard block |
||
| 83 | 83 | */ |
| 84 | 84 | public static function getViewPathsFor(string $domain, string $viewName) |
| 85 | 85 | { |
| 86 | - return array_map(function ($item) use ($viewName) { |
|
| 86 | + return array_map(function($item) use ($viewName) { |
|
| 87 | 87 | return $item.'.'.$viewName; |
| 88 | 88 | }, self::getFor($domain)); |
| 89 | 89 | } |
@@ -9,7 +9,7 @@ discard block |
||
| 9 | 9 | { |
| 10 | 10 | public function testItCanRegisterMacro() |
| 11 | 11 | { |
| 12 | - $this->crudPanel::macro('validMacro', function () { |
|
| 12 | + $this->crudPanel::macro('validMacro', function() { |
|
| 13 | 13 | return true; |
| 14 | 14 | }); |
| 15 | 15 | |
@@ -19,7 +19,7 @@ discard block |
||
| 19 | 19 | public function testThrowsErrorIfMacroExists() |
| 20 | 20 | { |
| 21 | 21 | try { |
| 22 | - $this->crudPanel::macro('setModel', function () { |
|
| 22 | + $this->crudPanel::macro('setModel', function() { |
|
| 23 | 23 | return true; |
| 24 | 24 | }); |
| 25 | 25 | } catch (\Throwable $e) { |
@@ -16,7 +16,7 @@ |
||
| 16 | 16 | |
| 17 | 17 | public function testItCanConfigureOperations() |
| 18 | 18 | { |
| 19 | - $this->crudPanel->operation(['create', 'update'], function () { |
|
| 19 | + $this->crudPanel->operation(['create', 'update'], function() { |
|
| 20 | 20 | $this->crudPanel->addField(['name' => 'test', 'type' => 'text']); |
| 21 | 21 | }); |
| 22 | 22 | $this->crudPanel->applyConfigurationFromSettings('create'); |
@@ -48,7 +48,7 @@ discard block |
||
| 48 | 48 | { |
| 49 | 49 | $this->crudPanel->setModel(User::class); |
| 50 | 50 | $request = request()->create('/admin/users', 'GET', ['my_custom_filter' => 'foo']); |
| 51 | - $request->setRouteResolver(function () use ($request) { |
|
| 51 | + $request->setRouteResolver(function() use ($request) { |
|
| 52 | 52 | return (new Route('GET', 'admin/users', ['UserCrudController', 'index']))->bind($request); |
| 53 | 53 | }); |
| 54 | 54 | $this->crudPanel->setRequest($request); |
@@ -64,10 +64,10 @@ discard block |
||
| 64 | 64 | ->options(['test' => 'test']) |
| 65 | 65 | ->view('simple') |
| 66 | 66 | ->viewNamespace('crud::filters') |
| 67 | - ->ifActive(function () { |
|
| 67 | + ->ifActive(function() { |
|
| 68 | 68 | return true; |
| 69 | 69 | }) |
| 70 | - ->ifInactive(function () { |
|
| 70 | + ->ifInactive(function() { |
|
| 71 | 71 | return true; |
| 72 | 72 | }); |
| 73 | 73 | |
@@ -84,10 +84,10 @@ discard block |
||
| 84 | 84 | public function testWhenActiveAndWhenInactiveAliases() |
| 85 | 85 | { |
| 86 | 86 | $filter = CrudFilter::name('my_filter') |
| 87 | - ->whenActive(function () { |
|
| 87 | + ->whenActive(function() { |
|
| 88 | 88 | return true; |
| 89 | 89 | }) |
| 90 | - ->whenInactive(function () { |
|
| 90 | + ->whenInactive(function() { |
|
| 91 | 91 | return true; |
| 92 | 92 | }); |
| 93 | 93 | |
@@ -98,7 +98,7 @@ discard block |
||
| 98 | 98 | |
| 99 | 99 | public function testWhenNotActiveAlias() |
| 100 | 100 | { |
| 101 | - $filter = CrudFilter::name('my_filter')->whenNotActive(function () { |
|
| 101 | + $filter = CrudFilter::name('my_filter')->whenNotActive(function() { |
|
| 102 | 102 | return true; |
| 103 | 103 | }); |
| 104 | 104 | $this->assertCount(1, $this->crudPanel->filters()); |
@@ -107,7 +107,7 @@ discard block |
||
| 107 | 107 | |
| 108 | 108 | public function testIfNotActiveAlias() |
| 109 | 109 | { |
| 110 | - $filter = CrudFilter::name('my_filter')->ifNotActive(function () { |
|
| 110 | + $filter = CrudFilter::name('my_filter')->ifNotActive(function() { |
|
| 111 | 111 | return true; |
| 112 | 112 | }); |
| 113 | 113 | $this->assertCount(1, $this->crudPanel->filters()); |
@@ -116,7 +116,7 @@ discard block |
||
| 116 | 116 | |
| 117 | 117 | public function testElseAlias() |
| 118 | 118 | { |
| 119 | - $filter = CrudFilter::name('my_filter')->else(function () { |
|
| 119 | + $filter = CrudFilter::name('my_filter')->else(function() { |
|
| 120 | 120 | return true; |
| 121 | 121 | }); |
| 122 | 122 | $this->assertCount(1, $this->crudPanel->filters()); |