We could not synchronize checks via GitHub's checks API since Scrutinizer's GitHub App is not installed for this repository.
@@ -49,7 +49,7 @@ discard block |
||
49 | 49 | if (array_key_exists($subfieldName, $requestInput) && $isSubfieldFake) { |
50 | 50 | $this->addCompactedField($requestInput, $subfieldName, $subFakeFieldKey); |
51 | 51 | |
52 | - if (! in_array($subFakeFieldKey, $compactedFakeFields)) { |
|
52 | + if (!in_array($subFakeFieldKey, $compactedFakeFields)) { |
|
53 | 53 | $compactedFakeFields[] = $subFakeFieldKey; |
54 | 54 | } |
55 | 55 | } |
@@ -61,7 +61,7 @@ discard block |
||
61 | 61 | if (array_key_exists($fieldName, $requestInput) && $isFakeField) { |
62 | 62 | $this->addCompactedField($requestInput, $fieldName, $fakeFieldKey); |
63 | 63 | |
64 | - if (! in_array($fakeFieldKey, $compactedFakeFields)) { |
|
64 | + if (!in_array($fakeFieldKey, $compactedFakeFields)) { |
|
65 | 65 | $compactedFakeFields[] = $fakeFieldKey; |
66 | 66 | } |
67 | 67 | } |
@@ -70,7 +70,7 @@ discard block |
||
70 | 70 | |
71 | 71 | // json_encode all fake_value columns if applicable in the database, so they can be properly stored and interpreted |
72 | 72 | foreach ($compactedFakeFields as $value) { |
73 | - if (! (property_exists($model, 'translatable') && in_array($value, $model->getTranslatableAttributes(), true)) && $model->shouldEncodeFake($value)) { |
|
73 | + if (!(property_exists($model, 'translatable') && in_array($value, $model->getTranslatableAttributes(), true)) && $model->shouldEncodeFake($value)) { |
|
74 | 74 | $requestInput[$value] = json_encode($requestInput[$value]); |
75 | 75 | } |
76 | 76 | } |
@@ -98,7 +98,7 @@ discard block |
||
98 | 98 | } |
99 | 99 | |
100 | 100 | //remove fields that are not in the submitted form input |
101 | - $relationFields = array_filter($relationFields, function ($field) use ($input) { |
|
101 | + $relationFields = array_filter($relationFields, function($field) use ($input) { |
|
102 | 102 | return Arr::has($input, $field['name']) || isset($input[$field['name']]) || Arr::has($input, Str::afterLast($field['name'], '.')); |
103 | 103 | }); |
104 | 104 | |
@@ -177,7 +177,7 @@ discard block |
||
177 | 177 | |
178 | 178 | // when using dot notation if relationMethod is not set we are sure we want to exclude those relations. |
179 | 179 | if ($this->getOnlyRelationEntity($field) !== $field['entity']) { |
180 | - if (! $relationMethod) { |
|
180 | + if (!$relationMethod) { |
|
181 | 181 | $excludedFields[] = $nameToExclude; |
182 | 182 | } |
183 | 183 | |
@@ -191,8 +191,8 @@ discard block |
||
191 | 191 | } |
192 | 192 | } |
193 | 193 | |
194 | - return Arr::where($input, function ($item, $key) use ($excludedFields) { |
|
195 | - return ! in_array($key, $excludedFields); |
|
194 | + return Arr::where($input, function($item, $key) use ($excludedFields) { |
|
195 | + return !in_array($key, $excludedFields); |
|
196 | 196 | }); |
197 | 197 | } |
198 | 198 | } |
@@ -4,7 +4,7 @@ |
||
4 | 4 | |
5 | 5 | use Backpack\CRUD\app\Exceptions\BackpackProRequiredException; |
6 | 6 | |
7 | -if (! backpack_pro()) { |
|
7 | +if (!backpack_pro()) { |
|
8 | 8 | trait BulkDeleteOperation |
9 | 9 | { |
10 | 10 | public function setupBulkDeleteOperationDefaults() |
@@ -4,7 +4,7 @@ |
||
4 | 4 | |
5 | 5 | use Backpack\CRUD\app\Exceptions\BackpackProRequiredException; |
6 | 6 | |
7 | -if (! backpack_pro()) { |
|
7 | +if (!backpack_pro()) { |
|
8 | 8 | trait InlineCreateOperation |
9 | 9 | { |
10 | 10 | public function setupInlineCreateOperationDefaults() |
@@ -4,7 +4,7 @@ |
||
4 | 4 | |
5 | 5 | use Backpack\CRUD\app\Exceptions\BackpackProRequiredException; |
6 | 6 | |
7 | -if (! backpack_pro()) { |
|
7 | +if (!backpack_pro()) { |
|
8 | 8 | trait FetchOperation |
9 | 9 | { |
10 | 10 | public function setupFetchOperationDefaults() |
@@ -4,7 +4,7 @@ |
||
4 | 4 | |
5 | 5 | use Backpack\CRUD\app\Exceptions\BackpackProRequiredException; |
6 | 6 | |
7 | -if (! backpack_pro()) { |
|
7 | +if (!backpack_pro()) { |
|
8 | 8 | trait BulkCloneOperation |
9 | 9 | { |
10 | 10 | public function setupBulkCloneOperationDefaults() |
@@ -4,7 +4,7 @@ |
||
4 | 4 | |
5 | 5 | use Backpack\CRUD\app\Exceptions\BackpackProRequiredException; |
6 | 6 | |
7 | -if (! backpack_pro()) { |
|
7 | +if (!backpack_pro()) { |
|
8 | 8 | trait CloneOperation |
9 | 9 | { |
10 | 10 | public function setupCloneOperationDefaults() |
@@ -46,7 +46,7 @@ discard block |
||
46 | 46 | |
47 | 47 | $this->middleware("guest:$guard"); |
48 | 48 | |
49 | - if (! backpack_users_have_email()) { |
|
49 | + if (!backpack_users_have_email()) { |
|
50 | 50 | abort(501, trans('backpack::base.no_email_column')); |
51 | 51 | } |
52 | 52 | |
@@ -90,7 +90,7 @@ discard block |
||
90 | 90 | // will update the password on an actual user model and persist it to the |
91 | 91 | // database. Otherwise we will parse the error and return the response. |
92 | 92 | $response = $this->broker()->reset( |
93 | - $this->credentials($request), function ($user, $password) { |
|
93 | + $this->credentials($request), function($user, $password) { |
|
94 | 94 | $this->resetPassword($user, $password); |
95 | 95 | } |
96 | 96 | ); |
@@ -38,19 +38,19 @@ discard block |
||
38 | 38 | */ |
39 | 39 | public function handle($request, Closure $next) |
40 | 40 | { |
41 | - if (! $request->hasSession() || ! $this->user) { |
|
41 | + if (!$request->hasSession() || !$this->user) { |
|
42 | 42 | return $next($request); |
43 | 43 | } |
44 | 44 | |
45 | 45 | if ($this->guard()->viaRemember()) { |
46 | 46 | $passwordHash = explode('|', $request->cookies->get($this->guard()->getRecallerName()))[2] ?? null; |
47 | 47 | |
48 | - if (! $passwordHash || $passwordHash != $this->user->getAuthPassword()) { |
|
48 | + if (!$passwordHash || $passwordHash != $this->user->getAuthPassword()) { |
|
49 | 49 | $this->logout($request); |
50 | 50 | } |
51 | 51 | } |
52 | 52 | |
53 | - if (! $request->session()->has('password_hash_'.backpack_guard_name())) { |
|
53 | + if (!$request->session()->has('password_hash_'.backpack_guard_name())) { |
|
54 | 54 | $this->storePasswordHashInSession($request); |
55 | 55 | } |
56 | 56 | |
@@ -58,8 +58,8 @@ discard block |
||
58 | 58 | $this->logout($request); |
59 | 59 | } |
60 | 60 | |
61 | - return tap($next($request), function () use ($request) { |
|
62 | - if (! is_null($this->guard()->user())) { |
|
61 | + return tap($next($request), function() use ($request) { |
|
62 | + if (!is_null($this->guard()->user())) { |
|
63 | 63 | $this->storePasswordHashInSession($request); |
64 | 64 | } |
65 | 65 | }); |
@@ -73,7 +73,7 @@ discard block |
||
73 | 73 | */ |
74 | 74 | protected function storePasswordHashInSession($request) |
75 | 75 | { |
76 | - if (! $this->user) { |
|
76 | + if (!$this->user) { |
|
77 | 77 | return; |
78 | 78 | } |
79 | 79 |