We could not synchronize checks via GitHub's checks API since Scrutinizer's GitHub App is not installed for this repository.
@@ -41,7 +41,7 @@ |
||
41 | 41 | { |
42 | 42 | $this->crud->allowAccess('list'); |
43 | 43 | |
44 | - $this->crud->operation('list', function () { |
|
44 | + $this->crud->operation('list', function() { |
|
45 | 45 | $this->crud->loadDefaultOperationSettingsFromConfig(); |
46 | 46 | }); |
47 | 47 | } |
@@ -46,7 +46,7 @@ discard block |
||
46 | 46 | |
47 | 47 | $this->middleware("guest:$guard"); |
48 | 48 | |
49 | - if (! backpack_users_have_email()) { |
|
49 | + if (!backpack_users_have_email()) { |
|
50 | 50 | abort(501, trans('backpack::base.no_email_column')); |
51 | 51 | } |
52 | 52 | |
@@ -90,7 +90,7 @@ discard block |
||
90 | 90 | // will update the password on an actual user model and persist it to the |
91 | 91 | // database. Otherwise we will parse the error and return the response. |
92 | 92 | $response = $this->broker()->reset( |
93 | - $this->credentials($request), function ($user, $password) { |
|
93 | + $this->credentials($request), function($user, $password) { |
|
94 | 94 | $this->resetPassword($user, $password); |
95 | 95 | } |
96 | 96 | ); |
@@ -38,19 +38,19 @@ discard block |
||
38 | 38 | */ |
39 | 39 | public function handle($request, Closure $next) |
40 | 40 | { |
41 | - if (! $request->hasSession() || ! $this->user) { |
|
41 | + if (!$request->hasSession() || !$this->user) { |
|
42 | 42 | return $next($request); |
43 | 43 | } |
44 | 44 | |
45 | 45 | if ($this->guard()->viaRemember()) { |
46 | 46 | $passwordHash = explode('|', $request->cookies->get($this->guard()->getRecallerName()))[2] ?? null; |
47 | 47 | |
48 | - if (! $passwordHash || $passwordHash != $this->user->getAuthPassword()) { |
|
48 | + if (!$passwordHash || $passwordHash != $this->user->getAuthPassword()) { |
|
49 | 49 | $this->logout($request); |
50 | 50 | } |
51 | 51 | } |
52 | 52 | |
53 | - if (! $request->session()->has('password_hash_'.backpack_guard_name())) { |
|
53 | + if (!$request->session()->has('password_hash_'.backpack_guard_name())) { |
|
54 | 54 | $this->storePasswordHashInSession($request); |
55 | 55 | } |
56 | 56 | |
@@ -58,8 +58,8 @@ discard block |
||
58 | 58 | $this->logout($request); |
59 | 59 | } |
60 | 60 | |
61 | - return tap($next($request), function () use ($request) { |
|
62 | - if (! is_null($this->guard()->user())) { |
|
61 | + return tap($next($request), function() use ($request) { |
|
62 | + if (!is_null($this->guard()->user())) { |
|
63 | 63 | $this->storePasswordHashInSession($request); |
64 | 64 | } |
65 | 65 | }); |
@@ -73,7 +73,7 @@ discard block |
||
73 | 73 | */ |
74 | 74 | protected function storePasswordHashInSession($request) |
75 | 75 | { |
76 | - if (! $this->user) { |
|
76 | + if (!$this->user) { |
|
77 | 77 | return; |
78 | 78 | } |
79 | 79 |
@@ -49,7 +49,7 @@ discard block |
||
49 | 49 | private function runConsoleCommand($command) |
50 | 50 | { |
51 | 51 | $process = new Process($command, null, null, null, 60, null); |
52 | - $process->run(function ($type, $buffer) { |
|
52 | + $process->run(function($type, $buffer) { |
|
53 | 53 | if (Process::ERR === $type) { |
54 | 54 | $this->line($buffer); |
55 | 55 | } else { |
@@ -58,7 +58,7 @@ discard block |
||
58 | 58 | }); |
59 | 59 | |
60 | 60 | // executes after the command finishes |
61 | - if (! $process->isSuccessful()) { |
|
61 | + if (!$process->isSuccessful()) { |
|
62 | 62 | throw new ProcessFailedException($process); |
63 | 63 | } |
64 | 64 | } |