@@ -4,7 +4,6 @@ |
||
4 | 4 | |
5 | 5 | use App\Containers\Authorization\Models\Permission; |
6 | 6 | use App\Containers\Authorization\Models\Role; |
7 | -use App\Containers\User\Models\User; |
|
8 | 7 | use App\Port\Tests\PHPUnit\Abstracts\TestCase; |
9 | 8 | |
10 | 9 | /** |
@@ -3,10 +3,7 @@ |
||
3 | 3 | namespace App\Containers\Order\UI\API\Tests\Functional; |
4 | 4 | |
5 | 5 | use App\Containers\Order\Models\Order; |
6 | -use App\Containers\Invoice\Models\Invoice; |
|
7 | -use App\Containers\User\Models\User; |
|
8 | 6 | use App\Port\Tests\PHPUnit\Abstracts\TestCase; |
9 | -use Vinkla\Hashids\Facades\Hashids; |
|
10 | 7 | |
11 | 8 | /** |
12 | 9 | * Class FindRoleByNameTest. |
@@ -2,7 +2,6 @@ |
||
2 | 2 | |
3 | 3 | namespace App\Containers\Authorization\UI\API\Tests\Functional; |
4 | 4 | |
5 | -use App\Containers\Authorization\Models\User; |
|
6 | 5 | use App\Port\Tests\PHPUnit\Abstracts\TestCase; |
7 | 6 | |
8 | 7 | /** |
@@ -42,13 +42,13 @@ |
||
42 | 42 | { |
43 | 43 | $role = $this->getRoleAction->run($roleName); |
44 | 44 | |
45 | - if(is_array($permissionNames)){ |
|
45 | + if (is_array($permissionNames)) { |
|
46 | 46 | |
47 | - foreach ($permissionNames as $permissionName){ |
|
47 | + foreach ($permissionNames as $permissionName) { |
|
48 | 48 | $role->givePermissionTo($permissionName); |
49 | 49 | } |
50 | 50 | |
51 | - }else{ |
|
51 | + } else { |
|
52 | 52 | $role->givePermissionTo($permissionNames); |
53 | 53 | } |
54 | 54 |
@@ -43,7 +43,7 @@ |
||
43 | 43 | $this->attachRole($user, $role); |
44 | 44 | } |
45 | 45 | |
46 | - }else{ |
|
46 | + } else{ |
|
47 | 47 | $this->attachRole($user, $roles); |
48 | 48 | } |
49 | 49 |
@@ -47,7 +47,7 @@ |
||
47 | 47 | { |
48 | 48 | $user = $this->webLoginTask->run($email, $password, $remember); |
49 | 49 | |
50 | - if($user){ |
|
50 | + if ($user) { |
|
51 | 51 | $this->isUserAdminTask->run($user); |
52 | 52 | } |
53 | 53 |
@@ -37,7 +37,7 @@ discard block |
||
37 | 37 | public $loggedInTestingUser; |
38 | 38 | |
39 | 39 | /** |
40 | - * @param $endpoint |
|
40 | + * @param string $endpoint |
|
41 | 41 | * @param string $verb |
42 | 42 | * @param array $data |
43 | 43 | * @param bool $protected |
@@ -110,7 +110,7 @@ discard block |
||
110 | 110 | * So this can be used to test endpoints that are protected by visitors |
111 | 111 | * access. |
112 | 112 | * |
113 | - * @return App\Containers\User\Models\User|mixed |
|
113 | + * @return User |
|
114 | 114 | */ |
115 | 115 | public function getVisitor() |
116 | 116 | { |
@@ -124,7 +124,7 @@ discard block |
||
124 | 124 | } |
125 | 125 | |
126 | 126 | /** |
127 | - * @return App\Containers\User\Models\User|mixed |
|
127 | + * @return User |
|
128 | 128 | */ |
129 | 129 | public function getLoggedInTestingAdmin() |
130 | 130 | { |
@@ -162,7 +162,7 @@ discard block |
||
162 | 162 | /** |
163 | 163 | * @param null $userDetails |
164 | 164 | * |
165 | - * @return mixed |
|
165 | + * @return User |
|
166 | 166 | */ |
167 | 167 | public function registerAndLoginTestingUser($userDetails = null) |
168 | 168 | { |
@@ -193,7 +193,7 @@ discard block |
||
193 | 193 | /** |
194 | 194 | * @param null $userDetails |
195 | 195 | * |
196 | - * @return mixed |
|
196 | + * @return User |
|
197 | 197 | */ |
198 | 198 | public function registerAndLoginTestingAdmin($userDetails = null) |
199 | 199 | { |
@@ -209,7 +209,7 @@ discard block |
||
209 | 209 | * |
210 | 210 | * @param null $userDetails |
211 | 211 | * |
212 | - * @return mixed |
|
212 | + * @return User |
|
213 | 213 | */ |
214 | 214 | public function registerAndLoginTestingDeveloper($userDetails = null) |
215 | 215 | { |
@@ -381,7 +381,7 @@ discard block |
||
381 | 381 | */ |
382 | 382 | public static function getTestingFile($fileName, $stubDirPath, $mimeType = null, $size = null) |
383 | 383 | { |
384 | - $file = $stubDirPath . $fileName; |
|
384 | + $file = $stubDirPath . $fileName; |
|
385 | 385 | |
386 | 386 | return new UploadedFile($file, $fileName, $mimeType, $size, $error = null, $testMode = true); |
387 | 387 | } |
@@ -418,7 +418,7 @@ discard block |
||
418 | 418 | */ |
419 | 419 | public function overrideSubDomain($subDomain, $url = null) |
420 | 420 | { |
421 | - $url = ($url) ? : $this->baseUrl; |
|
421 | + $url = ($url) ?: $this->baseUrl; |
|
422 | 422 | |
423 | 423 | $info = parse_url($url); |
424 | 424 |
@@ -93,7 +93,7 @@ discard block |
||
93 | 93 | |
94 | 94 | $token = str_replace('Bearer ', '', $request->header('authorization')); |
95 | 95 | |
96 | - if(!$token){ |
|
96 | + if (!$token) { |
|
97 | 97 | throw new AuthenticationFailedException('Empty Token!'); |
98 | 98 | } |
99 | 99 | |
@@ -113,7 +113,7 @@ discard block |
||
113 | 113 | throw new UserNotPermittedException(); |
114 | 114 | } |
115 | 115 | |
116 | - }else{ |
|
116 | + } else { |
|
117 | 117 | return (App::make(\Dingo\Api\Http\Middleware\Auth::class))->handle($request, $next); |
118 | 118 | // another way to do handle this is by calling `$user = $this->jwtAuthAdapter->toUser($token);` |
119 | 119 | // and continuing the execution of this code till the last return, but to maintain consistency |
@@ -43,7 +43,7 @@ |
||
43 | 43 | $this->attachRole($user, $role); |
44 | 44 | } |
45 | 45 | |
46 | - }else{ |
|
46 | + } else{ |
|
47 | 47 | $this->attachRole($user, $roles); |
48 | 48 | } |
49 | 49 |