We could not synchronize checks via GitHub's checks API since Scrutinizer's GitHub App is not installed for this repository.
@@ -24,19 +24,19 @@ |
||
| 24 | 24 | if (isset($field['fake']) && $field['fake'] == true) { |
| 25 | 25 | // add it to the request in its appropriate variable - the one defined, if defined |
| 26 | 26 | if (isset($field['store_in'])) { |
| 27 | - if (! in_array($field['store_in'], $fakeFieldsColumnsArray, true)) { |
|
| 27 | + if (!in_array($field['store_in'], $fakeFieldsColumnsArray, true)) { |
|
| 28 | 28 | array_push($fakeFieldsColumnsArray, $field['store_in']); |
| 29 | 29 | } |
| 30 | 30 | } else { |
| 31 | 31 | //otherwise in the one defined in the $crud variable |
| 32 | - if (! in_array('extras', $fakeFieldsColumnsArray, true)) { |
|
| 32 | + if (!in_array('extras', $fakeFieldsColumnsArray, true)) { |
|
| 33 | 33 | array_push($fakeFieldsColumnsArray, 'extras'); |
| 34 | 34 | } |
| 35 | 35 | } |
| 36 | 36 | } |
| 37 | 37 | } |
| 38 | 38 | |
| 39 | - if (! count($fakeFieldsColumnsArray)) { |
|
| 39 | + if (!count($fakeFieldsColumnsArray)) { |
|
| 40 | 40 | $fakeFieldsColumnsArray = ['extras']; |
| 41 | 41 | } |
| 42 | 42 | |
@@ -56,7 +56,7 @@ |
||
| 56 | 56 | return $this->respondToUnauthorizedRequest($request); |
| 57 | 57 | } |
| 58 | 58 | |
| 59 | - if (! $this->checkIfUserIsAdmin(backpack_user())) { |
|
| 59 | + if (!$this->checkIfUserIsAdmin(backpack_user())) { |
|
| 60 | 60 | return $this->respondToUnauthorizedRequest($request); |
| 61 | 61 | } |
| 62 | 62 | |
@@ -88,7 +88,7 @@ discard block |
||
| 88 | 88 | public function showRegistrationForm() |
| 89 | 89 | { |
| 90 | 90 | // if registration is closed, deny access |
| 91 | - if (! config('backpack.base.registration_open')) { |
|
| 91 | + if (!config('backpack.base.registration_open')) { |
|
| 92 | 92 | abort(403, trans('backpack::base.registration_closed')); |
| 93 | 93 | } |
| 94 | 94 | |
@@ -107,7 +107,7 @@ discard block |
||
| 107 | 107 | public function register(Request $request) |
| 108 | 108 | { |
| 109 | 109 | // if registration is closed, deny access |
| 110 | - if (! config('backpack.base.registration_open')) { |
|
| 110 | + if (!config('backpack.base.registration_open')) { |
|
| 111 | 111 | abort(403, trans('backpack::base.registration_closed')); |
| 112 | 112 | } |
| 113 | 113 | |
@@ -41,9 +41,9 @@ |
||
| 41 | 41 | */ |
| 42 | 42 | public function withValidator($validator) |
| 43 | 43 | { |
| 44 | - $validator->after(function ($validator) { |
|
| 44 | + $validator->after(function($validator) { |
|
| 45 | 45 | // check old password matches |
| 46 | - if (! Hash::check($this->input('old_password'), backpack_auth()->user()->password)) { |
|
| 46 | + if (!Hash::check($this->input('old_password'), backpack_auth()->user()->password)) { |
|
| 47 | 47 | $validator->errors()->add('old_password', trans('backpack::base.old_password_incorrect')); |
| 48 | 48 | } |
| 49 | 49 | }); |
@@ -38,7 +38,7 @@ |
||
| 38 | 38 | private function sendUsageStats() |
| 39 | 39 | { |
| 40 | 40 | // only send usage stats in production |
| 41 | - if (! $this->runningInProduction()) { |
|
| 41 | + if (!$this->runningInProduction()) { |
|
| 42 | 42 | return; |
| 43 | 43 | } |
| 44 | 44 | |
@@ -41,7 +41,7 @@ discard block |
||
| 41 | 41 | { |
| 42 | 42 | $this->crud->allowAccess('update'); |
| 43 | 43 | |
| 44 | - $this->crud->operation('update', function () { |
|
| 44 | + $this->crud->operation('update', function() { |
|
| 45 | 45 | $this->crud->loadDefaultOperationSettingsFromConfig(); |
| 46 | 46 | |
| 47 | 47 | if ($this->crud->getModel()->translationEnabled()) { |
@@ -55,7 +55,7 @@ discard block |
||
| 55 | 55 | $this->crud->setupDefaultSaveActions(); |
| 56 | 56 | }); |
| 57 | 57 | |
| 58 | - $this->crud->operation(['list', 'show'], function () { |
|
| 58 | + $this->crud->operation(['list', 'show'], function() { |
|
| 59 | 59 | $this->crud->addButton('line', 'update', 'view', 'crud::buttons.update', 'end'); |
| 60 | 60 | }); |
| 61 | 61 | } |
@@ -45,7 +45,7 @@ |
||
| 45 | 45 | // will update the password on an actual user model and persist it to the |
| 46 | 46 | // database. Otherwise we will parse the error and return the response. |
| 47 | 47 | $response = $this->broker()->reset( |
| 48 | - $this->credentials($request), function ($user, $password) { |
|
| 48 | + $this->credentials($request), function($user, $password) { |
|
| 49 | 49 | $this->resetPassword($user, $password); |
| 50 | 50 | } |
| 51 | 51 | ); |
@@ -34,11 +34,11 @@ |
||
| 34 | 34 | */ |
| 35 | 35 | public function verify(Request $request) |
| 36 | 36 | { |
| 37 | - if (! hash_equals((string) $request->route('id'), (string) $request->user()->getKey())) { |
|
| 37 | + if (!hash_equals((string) $request->route('id'), (string) $request->user()->getKey())) { |
|
| 38 | 38 | throw new AuthorizationException; |
| 39 | 39 | } |
| 40 | 40 | |
| 41 | - if (! hash_equals((string) $request->route('hash'), sha1($request->user()->getEmailForVerification()))) { |
|
| 41 | + if (!hash_equals((string) $request->route('hash'), sha1($request->user()->getEmailForVerification()))) { |
|
| 42 | 42 | throw new AuthorizationException; |
| 43 | 43 | } |
| 44 | 44 | |
@@ -20,7 +20,7 @@ discard block |
||
| 20 | 20 | public function addFakes($columns = ['extras']) |
| 21 | 21 | { |
| 22 | 22 | foreach ($columns as $key => $column) { |
| 23 | - if (! isset($this->attributes[$column])) { |
|
| 23 | + if (!isset($this->attributes[$column])) { |
|
| 24 | 24 | continue; |
| 25 | 25 | } |
| 26 | 26 | |
@@ -69,7 +69,7 @@ discard block |
||
| 69 | 69 | */ |
| 70 | 70 | public function shouldDecodeFake($column) |
| 71 | 71 | { |
| 72 | - return ! in_array($column, array_keys($this->casts)); |
|
| 72 | + return !in_array($column, array_keys($this->casts)); |
|
| 73 | 73 | } |
| 74 | 74 | |
| 75 | 75 | /** |
@@ -81,6 +81,6 @@ discard block |
||
| 81 | 81 | */ |
| 82 | 82 | public function shouldEncodeFake($column) |
| 83 | 83 | { |
| 84 | - return ! in_array($column, array_keys($this->casts)); |
|
| 84 | + return !in_array($column, array_keys($this->casts)); |
|
| 85 | 85 | } |
| 86 | 86 | } |