@@ -9,13 +9,13 @@ discard block |
||
9 | 9 | { |
10 | 10 | protected function canPassWithoutCheckingOTP(): bool |
11 | 11 | { |
12 | - if (! $this->getUser()->passwordSecurity) { |
|
12 | + if (!$this->getUser()->passwordSecurity) { |
|
13 | 13 | return true; |
14 | 14 | } |
15 | 15 | |
16 | 16 | return |
17 | - ! $this->getUser()->passwordSecurity->google2fa_enable || |
|
18 | - ! $this->isEnabled() || |
|
17 | + !$this->getUser()->passwordSecurity->google2fa_enable || |
|
18 | + !$this->isEnabled() || |
|
19 | 19 | $this->noUserIsAuthenticated() || |
20 | 20 | $this->twoFactorAuthStillValid() || |
21 | 21 | $this->isDeviceTrusted(); |
@@ -28,7 +28,7 @@ discard block |
||
28 | 28 | { |
29 | 29 | $cookie = request()->cookie('2fa_trusted_device'); |
30 | 30 | |
31 | - if (! $cookie) { |
|
31 | + if (!$cookie) { |
|
32 | 32 | return false; |
33 | 33 | } |
34 | 34 | |
@@ -36,7 +36,7 @@ discard block |
||
36 | 36 | $data = json_decode($cookie, true); |
37 | 37 | |
38 | 38 | // Check if cookie contains the required data |
39 | - if (! isset($data['user_id'], $data['token'], $data['expires_at'])) { |
|
39 | + if (!isset($data['user_id'], $data['token'], $data['expires_at'])) { |
|
40 | 40 | return false; |
41 | 41 | } |
42 | 42 |