Completed
Push — master ( 02d451...2ce496 )
by Sherif
02:39
created
src/lang/ar/notifications.php 1 patch
Indentation   +3 added lines, -3 removed lines patch added patch discarded remove patch
@@ -2,8 +2,8 @@
 block discarded – undo
2 2
 
3 3
 return [
4 4
     
5
-    /**
6
-     * Here goes your notification messages.
7
-     */
5
+	/**
6
+	 * Here goes your notification messages.
7
+	 */
8 8
 
9 9
 ];
10 10
\ No newline at end of file
Please login to merge, or discard this patch.
src/lang/en/auth.php 1 patch
Indentation   +3 added lines, -3 removed lines patch added patch discarded remove patch
@@ -2,7 +2,7 @@  discard block
 block discarded – undo
2 2
 
3 3
 return [
4 4
 
5
-    /*
5
+	/*
6 6
     |--------------------------------------------------------------------------
7 7
     | Authentication Language Lines
8 8
     |--------------------------------------------------------------------------
@@ -13,7 +13,7 @@  discard block
 block discarded – undo
13 13
     |
14 14
     */
15 15
 
16
-    'failed' => 'These credentials do not match our records.',
17
-    'throttle' => 'Too many login attempts. Please try again in :seconds seconds.',
16
+	'failed' => 'These credentials do not match our records.',
17
+	'throttle' => 'Too many login attempts. Please try again in :seconds seconds.',
18 18
 
19 19
 ];
Please login to merge, or discard this patch.
src/lang/en/validation.php 1 patch
Indentation   +75 added lines, -75 removed lines patch added patch discarded remove patch
@@ -2,7 +2,7 @@  discard block
 block discarded – undo
2 2
 
3 3
 return [
4 4
 
5
-    /*
5
+	/*
6 6
     |--------------------------------------------------------------------------
7 7
     | Validation Language Lines
8 8
     |--------------------------------------------------------------------------
@@ -13,74 +13,74 @@  discard block
 block discarded – undo
13 13
     |
14 14
     */
15 15
 
16
-    'accepted'             => 'The :attribute must be accepted.',
17
-    'active_url'           => 'The :attribute is not a valid URL.',
18
-    'after'                => 'The :attribute must be a date after :date.',
19
-    'alpha'                => 'The :attribute may only contain letters.',
20
-    'alpha_dash'           => 'The :attribute may only contain letters, numbers, and dashes.',
21
-    'alpha_num'            => 'The :attribute may only contain letters and numbers.',
22
-    'array'                => 'The :attribute must be an array.',
23
-    'before'               => 'The :attribute must be a date before :date.',
24
-    'between'              => [
25
-        'numeric' => 'The :attribute must be between :min and :max.',
26
-        'file'    => 'The :attribute must be between :min and :max kilobytes.',
27
-        'string'  => 'The :attribute must be between :min and :max characters.',
28
-        'array'   => 'The :attribute must have between :min and :max items.',
29
-    ],
30
-    'boolean'              => 'The :attribute field must be true or false.',
31
-    'confirmed'            => 'The :attribute confirmation does not match.',
32
-    'date'                 => 'The :attribute is not a valid date.',
33
-    'date_format'          => 'The :attribute does not match the format :format.',
34
-    'different'            => 'The :attribute and :other must be different.',
35
-    'digits'               => 'The :attribute must be :digits digits.',
36
-    'digits_between'       => 'The :attribute must be between :min and :max digits.',
37
-    'distinct'             => 'The :attribute field has a duplicate value.',
38
-    'email'                => 'The :attribute must be a valid email address.',
39
-    'exists'               => 'The selected :attribute is invalid.',
40
-    'filled'               => 'The :attribute field is required.',
41
-    'image'                => 'The :attribute must be an image.',
42
-    'in'                   => 'The selected :attribute is invalid.',
43
-    'in_array'             => 'The :attribute field does not exist in :other.',
44
-    'integer'              => 'The :attribute must be an integer.',
45
-    'ip'                   => 'The :attribute must be a valid IP address.',
46
-    'json'                 => 'The :attribute must be a valid JSON string.',
47
-    'max'                  => [
48
-        'numeric' => 'The :attribute may not be greater than :max.',
49
-        'file'    => 'The :attribute may not be greater than :max kilobytes.',
50
-        'string'  => 'The :attribute may not be greater than :max characters.',
51
-        'array'   => 'The :attribute may not have more than :max items.',
52
-    ],
53
-    'mimes'                => 'The :attribute must be a file of type: :values.',
54
-    'min'                  => [
55
-        'numeric' => 'The :attribute must be at least :min.',
56
-        'file'    => 'The :attribute must be at least :min kilobytes.',
57
-        'string'  => 'The :attribute must be at least :min characters.',
58
-        'array'   => 'The :attribute must have at least :min items.',
59
-    ],
60
-    'not_in'               => 'The selected :attribute is invalid.',
61
-    'numeric'              => 'The :attribute must be a number.',
62
-    'present'              => 'The :attribute field must be present.',
63
-    'regex'                => 'The :attribute format is invalid.',
64
-    'required'             => 'The :attribute field is required.',
65
-    'required_if'          => 'The :attribute field is required when :other is :value.',
66
-    'required_unless'      => 'The :attribute field is required unless :other is in :values.',
67
-    'required_with'        => 'The :attribute field is required when :values is present.',
68
-    'required_with_all'    => 'The :attribute field is required when :values is present.',
69
-    'required_without'     => 'The :attribute field is required when :values is not present.',
70
-    'required_without_all' => 'The :attribute field is required when none of :values are present.',
71
-    'same'                 => 'The :attribute and :other must match.',
72
-    'size'                 => [
73
-        'numeric' => 'The :attribute must be :size.',
74
-        'file'    => 'The :attribute must be :size kilobytes.',
75
-        'string'  => 'The :attribute must be :size characters.',
76
-        'array'   => 'The :attribute must contain :size items.',
77
-    ],
78
-    'string'               => 'The :attribute must be a string.',
79
-    'timezone'             => 'The :attribute must be a valid zone.',
80
-    'unique'               => 'The :attribute has already been taken.',
81
-    'url'                  => 'The :attribute format is invalid.',
16
+	'accepted'             => 'The :attribute must be accepted.',
17
+	'active_url'           => 'The :attribute is not a valid URL.',
18
+	'after'                => 'The :attribute must be a date after :date.',
19
+	'alpha'                => 'The :attribute may only contain letters.',
20
+	'alpha_dash'           => 'The :attribute may only contain letters, numbers, and dashes.',
21
+	'alpha_num'            => 'The :attribute may only contain letters and numbers.',
22
+	'array'                => 'The :attribute must be an array.',
23
+	'before'               => 'The :attribute must be a date before :date.',
24
+	'between'              => [
25
+		'numeric' => 'The :attribute must be between :min and :max.',
26
+		'file'    => 'The :attribute must be between :min and :max kilobytes.',
27
+		'string'  => 'The :attribute must be between :min and :max characters.',
28
+		'array'   => 'The :attribute must have between :min and :max items.',
29
+	],
30
+	'boolean'              => 'The :attribute field must be true or false.',
31
+	'confirmed'            => 'The :attribute confirmation does not match.',
32
+	'date'                 => 'The :attribute is not a valid date.',
33
+	'date_format'          => 'The :attribute does not match the format :format.',
34
+	'different'            => 'The :attribute and :other must be different.',
35
+	'digits'               => 'The :attribute must be :digits digits.',
36
+	'digits_between'       => 'The :attribute must be between :min and :max digits.',
37
+	'distinct'             => 'The :attribute field has a duplicate value.',
38
+	'email'                => 'The :attribute must be a valid email address.',
39
+	'exists'               => 'The selected :attribute is invalid.',
40
+	'filled'               => 'The :attribute field is required.',
41
+	'image'                => 'The :attribute must be an image.',
42
+	'in'                   => 'The selected :attribute is invalid.',
43
+	'in_array'             => 'The :attribute field does not exist in :other.',
44
+	'integer'              => 'The :attribute must be an integer.',
45
+	'ip'                   => 'The :attribute must be a valid IP address.',
46
+	'json'                 => 'The :attribute must be a valid JSON string.',
47
+	'max'                  => [
48
+		'numeric' => 'The :attribute may not be greater than :max.',
49
+		'file'    => 'The :attribute may not be greater than :max kilobytes.',
50
+		'string'  => 'The :attribute may not be greater than :max characters.',
51
+		'array'   => 'The :attribute may not have more than :max items.',
52
+	],
53
+	'mimes'                => 'The :attribute must be a file of type: :values.',
54
+	'min'                  => [
55
+		'numeric' => 'The :attribute must be at least :min.',
56
+		'file'    => 'The :attribute must be at least :min kilobytes.',
57
+		'string'  => 'The :attribute must be at least :min characters.',
58
+		'array'   => 'The :attribute must have at least :min items.',
59
+	],
60
+	'not_in'               => 'The selected :attribute is invalid.',
61
+	'numeric'              => 'The :attribute must be a number.',
62
+	'present'              => 'The :attribute field must be present.',
63
+	'regex'                => 'The :attribute format is invalid.',
64
+	'required'             => 'The :attribute field is required.',
65
+	'required_if'          => 'The :attribute field is required when :other is :value.',
66
+	'required_unless'      => 'The :attribute field is required unless :other is in :values.',
67
+	'required_with'        => 'The :attribute field is required when :values is present.',
68
+	'required_with_all'    => 'The :attribute field is required when :values is present.',
69
+	'required_without'     => 'The :attribute field is required when :values is not present.',
70
+	'required_without_all' => 'The :attribute field is required when none of :values are present.',
71
+	'same'                 => 'The :attribute and :other must match.',
72
+	'size'                 => [
73
+		'numeric' => 'The :attribute must be :size.',
74
+		'file'    => 'The :attribute must be :size kilobytes.',
75
+		'string'  => 'The :attribute must be :size characters.',
76
+		'array'   => 'The :attribute must contain :size items.',
77
+	],
78
+	'string'               => 'The :attribute must be a string.',
79
+	'timezone'             => 'The :attribute must be a valid zone.',
80
+	'unique'               => 'The :attribute has already been taken.',
81
+	'url'                  => 'The :attribute format is invalid.',
82 82
 
83
-    /*
83
+	/*
84 84
     |--------------------------------------------------------------------------
85 85
     | Custom Validation Language Lines
86 86
     |--------------------------------------------------------------------------
@@ -91,13 +91,13 @@  discard block
 block discarded – undo
91 91
     |
92 92
     */
93 93
 
94
-    'custom' => [
95
-        'attribute-name' => [
96
-            'rule-name' => 'custom-message',
97
-        ],
98
-    ],
94
+	'custom' => [
95
+		'attribute-name' => [
96
+			'rule-name' => 'custom-message',
97
+		],
98
+	],
99 99
 
100
-    /*
100
+	/*
101 101
     |--------------------------------------------------------------------------
102 102
     | Custom Validation Attributes
103 103
     |--------------------------------------------------------------------------
@@ -108,6 +108,6 @@  discard block
 block discarded – undo
108 108
     |
109 109
     */
110 110
 
111
-    'attributes' => [],
111
+	'attributes' => [],
112 112
 
113 113
 ];
Please login to merge, or discard this patch.
src/lang/en/passwords.php 1 patch
Indentation   +6 added lines, -6 removed lines patch added patch discarded remove patch
@@ -2,7 +2,7 @@  discard block
 block discarded – undo
2 2
 
3 3
 return [
4 4
 
5
-    /*
5
+	/*
6 6
     |--------------------------------------------------------------------------
7 7
     | Password Reset Language Lines
8 8
     |--------------------------------------------------------------------------
@@ -13,10 +13,10 @@  discard block
 block discarded – undo
13 13
     |
14 14
     */
15 15
 
16
-    'password' => 'Passwords must be at least six characters and match the confirmation.',
17
-    'reset' => 'Your password has been reset!',
18
-    'sent' => 'We have e-mailed your password reset link!',
19
-    'token' => 'This password reset token is invalid.',
20
-    'user' => "We can't find a user with that e-mail address.",
16
+	'password' => 'Passwords must be at least six characters and match the confirmation.',
17
+	'reset' => 'Your password has been reset!',
18
+	'sent' => 'We have e-mailed your password reset link!',
19
+	'token' => 'This password reset token is invalid.',
20
+	'user' => "We can't find a user with that e-mail address.",
21 21
 
22 22
 ];
Please login to merge, or discard this patch.
src/lang/en/pagination.php 1 patch
Indentation   +3 added lines, -3 removed lines patch added patch discarded remove patch
@@ -2,7 +2,7 @@  discard block
 block discarded – undo
2 2
 
3 3
 return [
4 4
 
5
-    /*
5
+	/*
6 6
     |--------------------------------------------------------------------------
7 7
     | Pagination Language Lines
8 8
     |--------------------------------------------------------------------------
@@ -13,7 +13,7 @@  discard block
 block discarded – undo
13 13
     |
14 14
     */
15 15
 
16
-    'previous' => '« Previous',
17
-    'next'     => 'Next »',
16
+	'previous' => '« Previous',
17
+	'next'     => 'Next »',
18 18
 
19 19
 ];
Please login to merge, or discard this patch.
src/Modules/V1/Acl/Repositories/UserRepository.php 3 patches
Braces   +8 added lines, -16 removed lines patch added patch discarded remove patch
@@ -103,24 +103,19 @@  discard block
 block discarded – undo
103 103
         if ( ! $user = $this->first(['email' => $credentials['email']])) 
104 104
         {
105 105
             \ErrorHandler::loginFailed();
106
-        }
107
-        else if ($adminLogin && $user->groups->pluck('name')->search('Admin', true) === false) 
106
+        } else if ($adminLogin && $user->groups->pluck('name')->search('Admin', true) === false) 
108 107
         {
109 108
             \ErrorHandler::loginFailed();
110
-        }
111
-        else if ( ! $adminLogin && $user->groups->pluck('name')->search('Admin', true) !== false) 
109
+        } else if ( ! $adminLogin && $user->groups->pluck('name')->search('Admin', true) !== false) 
112 110
         {
113 111
             \ErrorHandler::loginFailed();
114
-        }
115
-        else if ($user->blocked)
112
+        } else if ($user->blocked)
116 113
         {
117 114
             \ErrorHandler::userIsBlocked();
118
-        }
119
-        else if ($token = \JWTAuth::attempt($credentials))
115
+        } else if ($token = \JWTAuth::attempt($credentials))
120 116
         {
121 117
             return ['token' => $token];
122
-        }
123
-        else
118
+        } else
124 119
         {
125 120
             \ErrorHandler::loginFailed();
126 121
         }
@@ -146,8 +141,7 @@  discard block
 block discarded – undo
146 141
         {
147 142
             $data = ['email' => $user->email, 'password' => ''];
148 143
             return $this->register($data);
149
-        }
150
-        else
144
+        } else
151 145
         {
152 146
             if ( ! \Auth::attempt(['email' => $registeredUser->email, 'password' => '']))
153 147
             {
@@ -193,12 +187,10 @@  discard block
 block discarded – undo
193 187
         if ( ! $this->hasGroup('Admin'))
194 188
         {
195 189
             \ErrorHandler::noPermissions();
196
-        }
197
-        else if (\JWTAuth::parseToken()->authenticate()->id == $user_id)
190
+        } else if (\JWTAuth::parseToken()->authenticate()->id == $user_id)
198 191
         {
199 192
             \ErrorHandler::noPermissions();
200
-        }
201
-        else if ($user->groups->pluck('name')->search('Admin', true) !== false) 
193
+        } else if ($user->groups->pluck('name')->search('Admin', true) !== false) 
202 194
         {
203 195
             \ErrorHandler::noPermissions();
204 196
         }
Please login to merge, or discard this patch.
Indentation   +351 added lines, -351 removed lines patch added patch discarded remove patch
@@ -4,362 +4,362 @@
 block discarded – undo
4 4
 
5 5
 class UserRepository extends AbstractRepository
6 6
 {
7
-    /**
8
-     * Return the model full namespace.
9
-     * 
10
-     * @return string
11
-     */
12
-    protected function getModel()
13
-    {
14
-        return 'App\Modules\V1\Acl\AclUser';
15
-    }
16
-
17
-    /**
18
-     * Return the logged in user account.
19
-     *
20
-     * @param  array   $relations
21
-     * @return boolean
22
-     */
23
-    public function account($relations = [])
24
-    {
25
-        $permissions = [];
26
-        $user        = \Core::users()->find(\JWTAuth::parseToken()->authenticate()->id, $relations);
27
-        foreach ($user->groups()->get() as $group)
28
-        {
29
-            $group->permissions->each(function ($permission) use (&$permissions){
30
-                $permissions[$permission->model][$permission->id] = $permission->name;
31
-            });
32
-        }
33
-        $user->permissions = $permissions;
34
-
35
-       return $user;
36
-    }
37
-
38
-    /**
39
-     * Check if the logged in user or the given user 
40
-     * has the given permissions on the given model.
41
-     * 
42
-     * @param  string  $nameOfPermission
43
-     * @param  string  $model            
44
-     * @param  boolean $user
45
-     * @return boolean
46
-     */
47
-    public function can($nameOfPermission, $model, $user = false )
48
-    {      
49
-        $user        = $user ?: \JWTAuth::parseToken()->authenticate();
50
-        $permissions = [];
51
-
52
-        if ( ! $user = $this->find($user->id, ['groups.permissions'])) 
53
-        {
54
-            \ErrorHandler::tokenExpired();
55
-        }
56
-
57
-        $user->groups->pluck('permissions')->each(function ($permission) use (&$permissions, $model){
58
-            $permissions = array_merge($permissions, $permission->where('model', $model)->pluck('name')->toArray()); 
59
-        });
7
+	/**
8
+	 * Return the model full namespace.
9
+	 * 
10
+	 * @return string
11
+	 */
12
+	protected function getModel()
13
+	{
14
+		return 'App\Modules\V1\Acl\AclUser';
15
+	}
16
+
17
+	/**
18
+	 * Return the logged in user account.
19
+	 *
20
+	 * @param  array   $relations
21
+	 * @return boolean
22
+	 */
23
+	public function account($relations = [])
24
+	{
25
+		$permissions = [];
26
+		$user        = \Core::users()->find(\JWTAuth::parseToken()->authenticate()->id, $relations);
27
+		foreach ($user->groups()->get() as $group)
28
+		{
29
+			$group->permissions->each(function ($permission) use (&$permissions){
30
+				$permissions[$permission->model][$permission->id] = $permission->name;
31
+			});
32
+		}
33
+		$user->permissions = $permissions;
34
+
35
+	   return $user;
36
+	}
37
+
38
+	/**
39
+	 * Check if the logged in user or the given user 
40
+	 * has the given permissions on the given model.
41
+	 * 
42
+	 * @param  string  $nameOfPermission
43
+	 * @param  string  $model            
44
+	 * @param  boolean $user
45
+	 * @return boolean
46
+	 */
47
+	public function can($nameOfPermission, $model, $user = false )
48
+	{      
49
+		$user        = $user ?: \JWTAuth::parseToken()->authenticate();
50
+		$permissions = [];
51
+
52
+		if ( ! $user = $this->find($user->id, ['groups.permissions'])) 
53
+		{
54
+			\ErrorHandler::tokenExpired();
55
+		}
56
+
57
+		$user->groups->pluck('permissions')->each(function ($permission) use (&$permissions, $model){
58
+			$permissions = array_merge($permissions, $permission->where('model', $model)->pluck('name')->toArray()); 
59
+		});
60 60
         
61
-        return in_array($nameOfPermission, $permissions);
62
-    }
63
-
64
-    /**
65
-     * Check if the logged in user has the given group.
66
-     * 
67
-     * @param  string  $groupName
68
-     * @return boolean
69
-     */
70
-    public function hasGroup($groupName)
71
-    {
72
-        $groups = $this->find(\JWTAuth::parseToken()->authenticate()->id)->groups;
73
-        return $groups->pluck('name')->search($groupName, true) === false ? false : true;
74
-    }
75
-
76
-    /**
77
-     * Assign the given group ids to the given user.
78
-     * 
79
-     * @param  integer $user_id    
80
-     * @param  array   $group_ids
81
-     * @return object
82
-     */
83
-    public function assignGroups($user_id, $group_ids)
84
-    {
85
-        \DB::transaction(function () use ($user_id, $group_ids) {
86
-            $user = $this->find($user_id);
87
-            $user->groups()->detach();
88
-            $user->groups()->attach($group_ids);
89
-        });
90
-
91
-        return $this->find($user_id);
92
-    }
93
-
94
-    /**
95
-     * Handle a login request to the application.
96
-     * 
97
-     * @param  array   $credentials    
98
-     * @param  boolean $adminLogin
99
-     * @return array
100
-     */
101
-    public function login($credentials, $adminLogin = false)
102
-    {
103
-        if ( ! $user = $this->first(['email' => $credentials['email']])) 
104
-        {
105
-            \ErrorHandler::loginFailed();
106
-        }
107
-        else if ($adminLogin && $user->groups->pluck('name')->search('Admin', true) === false) 
108
-        {
109
-            \ErrorHandler::loginFailed();
110
-        }
111
-        else if ( ! $adminLogin && $user->groups->pluck('name')->search('Admin', true) !== false) 
112
-        {
113
-            \ErrorHandler::loginFailed();
114
-        }
115
-        else if ($user->blocked)
116
-        {
117
-            \ErrorHandler::userIsBlocked();
118
-        }
119
-        else if ($token = \JWTAuth::attempt($credentials))
120
-        {
121
-            return ['token' => $token];
122
-        }
123
-        else
124
-        {
125
-            \ErrorHandler::loginFailed();
126
-        }
127
-    }
128
-
129
-    /**
130
-     * Handle a social login request of the none admin to the application.
131
-     * 
132
-     * @param  array   $credentials
133
-     * @return array
134
-     */
135
-    public function loginSocial($credentials)
136
-    {
137
-        $access_token = $credentials['auth_code'] ? \Socialite::driver($credentials['type'])->getAccessToken($credentials['auth_code']) : $credentials['access_token'];
138
-        $user         = \Socialite::driver($credentials['type'])->userFromToken($access_token);
139
-
140
-        if ( ! $user->email)
141
-        {
142
-            \ErrorHandler::noSocialEmail();
143
-        }
144
-
145
-        if ( ! $registeredUser = $this->model->where('email', $user->email)->first()) 
146
-        {
147
-            $data = ['email' => $user->email, 'password' => ''];
148
-            return $this->register($data);
149
-        }
150
-        else
151
-        {
152
-            if ( ! \Auth::attempt(['email' => $registeredUser->email, 'password' => '']))
153
-            {
154
-                \ErrorHandler::userAlreadyRegistered();
155
-            }
156
-            return $this->login(['email' => $registeredUser->email, 'password' => ''], false);
157
-        }
158
-    }
61
+		return in_array($nameOfPermission, $permissions);
62
+	}
63
+
64
+	/**
65
+	 * Check if the logged in user has the given group.
66
+	 * 
67
+	 * @param  string  $groupName
68
+	 * @return boolean
69
+	 */
70
+	public function hasGroup($groupName)
71
+	{
72
+		$groups = $this->find(\JWTAuth::parseToken()->authenticate()->id)->groups;
73
+		return $groups->pluck('name')->search($groupName, true) === false ? false : true;
74
+	}
75
+
76
+	/**
77
+	 * Assign the given group ids to the given user.
78
+	 * 
79
+	 * @param  integer $user_id    
80
+	 * @param  array   $group_ids
81
+	 * @return object
82
+	 */
83
+	public function assignGroups($user_id, $group_ids)
84
+	{
85
+		\DB::transaction(function () use ($user_id, $group_ids) {
86
+			$user = $this->find($user_id);
87
+			$user->groups()->detach();
88
+			$user->groups()->attach($group_ids);
89
+		});
90
+
91
+		return $this->find($user_id);
92
+	}
93
+
94
+	/**
95
+	 * Handle a login request to the application.
96
+	 * 
97
+	 * @param  array   $credentials    
98
+	 * @param  boolean $adminLogin
99
+	 * @return array
100
+	 */
101
+	public function login($credentials, $adminLogin = false)
102
+	{
103
+		if ( ! $user = $this->first(['email' => $credentials['email']])) 
104
+		{
105
+			\ErrorHandler::loginFailed();
106
+		}
107
+		else if ($adminLogin && $user->groups->pluck('name')->search('Admin', true) === false) 
108
+		{
109
+			\ErrorHandler::loginFailed();
110
+		}
111
+		else if ( ! $adminLogin && $user->groups->pluck('name')->search('Admin', true) !== false) 
112
+		{
113
+			\ErrorHandler::loginFailed();
114
+		}
115
+		else if ($user->blocked)
116
+		{
117
+			\ErrorHandler::userIsBlocked();
118
+		}
119
+		else if ($token = \JWTAuth::attempt($credentials))
120
+		{
121
+			return ['token' => $token];
122
+		}
123
+		else
124
+		{
125
+			\ErrorHandler::loginFailed();
126
+		}
127
+	}
128
+
129
+	/**
130
+	 * Handle a social login request of the none admin to the application.
131
+	 * 
132
+	 * @param  array   $credentials
133
+	 * @return array
134
+	 */
135
+	public function loginSocial($credentials)
136
+	{
137
+		$access_token = $credentials['auth_code'] ? \Socialite::driver($credentials['type'])->getAccessToken($credentials['auth_code']) : $credentials['access_token'];
138
+		$user         = \Socialite::driver($credentials['type'])->userFromToken($access_token);
139
+
140
+		if ( ! $user->email)
141
+		{
142
+			\ErrorHandler::noSocialEmail();
143
+		}
144
+
145
+		if ( ! $registeredUser = $this->model->where('email', $user->email)->first()) 
146
+		{
147
+			$data = ['email' => $user->email, 'password' => ''];
148
+			return $this->register($data);
149
+		}
150
+		else
151
+		{
152
+			if ( ! \Auth::attempt(['email' => $registeredUser->email, 'password' => '']))
153
+			{
154
+				\ErrorHandler::userAlreadyRegistered();
155
+			}
156
+			return $this->login(['email' => $registeredUser->email, 'password' => ''], false);
157
+		}
158
+	}
159 159
     
160
-    /**
161
-     * Handle a registration request.
162
-     * 
163
-     * @param  array $credentials
164
-     * @return array
165
-     */
166
-    public function register($credentials)
167
-    {
168
-        return ['token' => \JWTAuth::fromUser($this->model->create($credentials))];
169
-    }
170
-
171
-    /**
172
-     * Logout the user.
173
-     * 
174
-     * @return boolean
175
-     */
176
-    public function logout()
177
-    {
178
-        return \JWTAuth::invalidate(\JWTAuth::getToken());
179
-    }
180
-
181
-    /**
182
-     * Block the user.
183
-     *
184
-     * @param  integer $user_id
185
-     * @return object
186
-     */
187
-    public function block($user_id)
188
-    {
189
-        if ( ! $user = $this->find($user_id)) 
190
-        {
191
-            \ErrorHandler::notFound('user');
192
-        }
193
-        if ( ! $this->hasGroup('Admin'))
194
-        {
195
-            \ErrorHandler::noPermissions();
196
-        }
197
-        else if (\JWTAuth::parseToken()->authenticate()->id == $user_id)
198
-        {
199
-            \ErrorHandler::noPermissions();
200
-        }
201
-        else if ($user->groups->pluck('name')->search('Admin', true) !== false) 
202
-        {
203
-            \ErrorHandler::noPermissions();
204
-        }
205
-
206
-        $user->blocked = 1;
207
-        $user->save();
160
+	/**
161
+	 * Handle a registration request.
162
+	 * 
163
+	 * @param  array $credentials
164
+	 * @return array
165
+	 */
166
+	public function register($credentials)
167
+	{
168
+		return ['token' => \JWTAuth::fromUser($this->model->create($credentials))];
169
+	}
170
+
171
+	/**
172
+	 * Logout the user.
173
+	 * 
174
+	 * @return boolean
175
+	 */
176
+	public function logout()
177
+	{
178
+		return \JWTAuth::invalidate(\JWTAuth::getToken());
179
+	}
180
+
181
+	/**
182
+	 * Block the user.
183
+	 *
184
+	 * @param  integer $user_id
185
+	 * @return object
186
+	 */
187
+	public function block($user_id)
188
+	{
189
+		if ( ! $user = $this->find($user_id)) 
190
+		{
191
+			\ErrorHandler::notFound('user');
192
+		}
193
+		if ( ! $this->hasGroup('Admin'))
194
+		{
195
+			\ErrorHandler::noPermissions();
196
+		}
197
+		else if (\JWTAuth::parseToken()->authenticate()->id == $user_id)
198
+		{
199
+			\ErrorHandler::noPermissions();
200
+		}
201
+		else if ($user->groups->pluck('name')->search('Admin', true) !== false) 
202
+		{
203
+			\ErrorHandler::noPermissions();
204
+		}
205
+
206
+		$user->blocked = 1;
207
+		$user->save();
208 208
         
209
-        return $user;
210
-    }
211
-
212
-    /**
213
-     * Unblock the user.
214
-     *
215
-     * @param  integer $user_id
216
-     * @return object
217
-     */
218
-    public function unblock($user_id)
219
-    {
220
-        if ( ! $this->hasGroup('Admin'))
221
-        {
222
-            \ErrorHandler::noPermissions();
223
-        }
224
-
225
-        $user          = $this->find($user_id);
226
-        $user->blocked = 0;
227
-        $user->save();
228
-
229
-        return $user;
230
-    }
231
-
232
-    /**
233
-     * Send a reset link to the given user.
234
-     *
235
-     * @param  string  $email
236
-     * @return void
237
-     */
238
-    public function sendReset($email)
239
-    {
240
-        if ( ! $user = $this->model->where('email', $email)->first())
241
-        {
242
-            \ErrorHandler::notFound('email');
243
-        }
244
-
245
-        $url   = $this->config['resetLink'];
246
-        $token = \Password::getRepository()->create($user);
209
+		return $user;
210
+	}
211
+
212
+	/**
213
+	 * Unblock the user.
214
+	 *
215
+	 * @param  integer $user_id
216
+	 * @return object
217
+	 */
218
+	public function unblock($user_id)
219
+	{
220
+		if ( ! $this->hasGroup('Admin'))
221
+		{
222
+			\ErrorHandler::noPermissions();
223
+		}
224
+
225
+		$user          = $this->find($user_id);
226
+		$user->blocked = 0;
227
+		$user->save();
228
+
229
+		return $user;
230
+	}
231
+
232
+	/**
233
+	 * Send a reset link to the given user.
234
+	 *
235
+	 * @param  string  $email
236
+	 * @return void
237
+	 */
238
+	public function sendReset($email)
239
+	{
240
+		if ( ! $user = $this->model->where('email', $email)->first())
241
+		{
242
+			\ErrorHandler::notFound('email');
243
+		}
244
+
245
+		$url   = $this->config['resetLink'];
246
+		$token = \Password::getRepository()->create($user);
247 247
         
248
-        \Mail::send('auth.emails.password', ['user' => $user, 'url' => $url, 'token' => $token], function ($m) use ($user) {
249
-            $m->to($user->email, $user->name)->subject('Your Password Reset Link');
250
-        });
251
-    }
252
-
253
-    /**
254
-     * Reset the given user's password.
255
-     *
256
-     * @param  array  $credentials
257
-     * @return array
258
-     */
259
-    public function resetPassword($credentials)
260
-    {
261
-        $token    = false;
262
-        $response = \Password::reset($credentials, function ($user, $password) use (&$token) {
263
-            $user->password = bcrypt($password);
264
-            $user->save();
265
-
266
-            $token = \JWTAuth::fromUser($user);
267
-        });
268
-
269
-        switch ($response) {
270
-            case \Password::PASSWORD_RESET:
271
-                return ['token' => $token];
248
+		\Mail::send('auth.emails.password', ['user' => $user, 'url' => $url, 'token' => $token], function ($m) use ($user) {
249
+			$m->to($user->email, $user->name)->subject('Your Password Reset Link');
250
+		});
251
+	}
252
+
253
+	/**
254
+	 * Reset the given user's password.
255
+	 *
256
+	 * @param  array  $credentials
257
+	 * @return array
258
+	 */
259
+	public function resetPassword($credentials)
260
+	{
261
+		$token    = false;
262
+		$response = \Password::reset($credentials, function ($user, $password) use (&$token) {
263
+			$user->password = bcrypt($password);
264
+			$user->save();
265
+
266
+			$token = \JWTAuth::fromUser($user);
267
+		});
268
+
269
+		switch ($response) {
270
+			case \Password::PASSWORD_RESET:
271
+				return ['token' => $token];
272 272
                 
273
-            case \Password::INVALID_TOKEN:
274
-                \ErrorHandler::invalidResetToken('token');
275
-
276
-            case \Password::INVALID_PASSWORD:
277
-                \ErrorHandler::invalidResetPassword('email');
278
-
279
-            case \Password::INVALID_USER:
280
-                \ErrorHandler::notFound('user');
281
-
282
-            default:
283
-                \ErrorHandler::generalError();
284
-        }
285
-    }
286
-
287
-    /**
288
-     * Change the logged in user password.
289
-     *
290
-     * @param  array  $credentials
291
-     * @return void
292
-     */
293
-    public function changePassword($credentials)
294
-    {
295
-        $user = $this->find(\JWTAuth::parseToken()->authenticate()->id);
296
-        if ( ! \Hash::check($credentials['old_password'], $user->password)) 
297
-        {
298
-            \ErrorHandler::invalidOldPassword();
299
-        }
300
-
301
-        $user->password = $credentials['password'];
302
-        $user->save();
303
-    }
304
-
305
-    /**
306
-     * Refresh the expired login token.
307
-     *
308
-     * @return array
309
-     */
310
-    public function refreshtoken()
311
-    {
312
-        $token = \JWTAuth::parseToken()->refresh();
313
-
314
-        return ['token' => $token];
315
-    }
316
-
317
-    /**
318
-     * Paginate all users in the given group based on the given conditions.
319
-     * 
320
-     * @param  string  $groupName
321
-     * @param  array   $relations
322
-     * @param  integer $perPage
323
-     * @param  string  $sortBy
324
-     * @param  boolean $desc
325
-     * @return \Illuminate\Http\Response
326
-     */
327
-    public function group($conditions, $groupName, $relations, $perPage, $sortBy, $desc)
328
-    {   
329
-        unset($conditions['page']);
330
-        $conditions = $this->constructConditions($conditions, $this->model);
331
-        $sort       = $desc ? 'desc' : 'asc';
332
-        $model      = call_user_func_array("{$this->getModel()}::with", array($relations));
333
-
334
-        $model->whereHas('groups', function($q) use ($groupName){
335
-            $q->where('name', $groupName);
336
-        });
273
+			case \Password::INVALID_TOKEN:
274
+				\ErrorHandler::invalidResetToken('token');
275
+
276
+			case \Password::INVALID_PASSWORD:
277
+				\ErrorHandler::invalidResetPassword('email');
278
+
279
+			case \Password::INVALID_USER:
280
+				\ErrorHandler::notFound('user');
281
+
282
+			default:
283
+				\ErrorHandler::generalError();
284
+		}
285
+	}
286
+
287
+	/**
288
+	 * Change the logged in user password.
289
+	 *
290
+	 * @param  array  $credentials
291
+	 * @return void
292
+	 */
293
+	public function changePassword($credentials)
294
+	{
295
+		$user = $this->find(\JWTAuth::parseToken()->authenticate()->id);
296
+		if ( ! \Hash::check($credentials['old_password'], $user->password)) 
297
+		{
298
+			\ErrorHandler::invalidOldPassword();
299
+		}
300
+
301
+		$user->password = $credentials['password'];
302
+		$user->save();
303
+	}
304
+
305
+	/**
306
+	 * Refresh the expired login token.
307
+	 *
308
+	 * @return array
309
+	 */
310
+	public function refreshtoken()
311
+	{
312
+		$token = \JWTAuth::parseToken()->refresh();
313
+
314
+		return ['token' => $token];
315
+	}
316
+
317
+	/**
318
+	 * Paginate all users in the given group based on the given conditions.
319
+	 * 
320
+	 * @param  string  $groupName
321
+	 * @param  array   $relations
322
+	 * @param  integer $perPage
323
+	 * @param  string  $sortBy
324
+	 * @param  boolean $desc
325
+	 * @return \Illuminate\Http\Response
326
+	 */
327
+	public function group($conditions, $groupName, $relations, $perPage, $sortBy, $desc)
328
+	{   
329
+		unset($conditions['page']);
330
+		$conditions = $this->constructConditions($conditions, $this->model);
331
+		$sort       = $desc ? 'desc' : 'asc';
332
+		$model      = call_user_func_array("{$this->getModel()}::with", array($relations));
333
+
334
+		$model->whereHas('groups', function($q) use ($groupName){
335
+			$q->where('name', $groupName);
336
+		});
337 337
 
338 338
         
339
-        if (count($conditions['conditionValues']))
340
-        {
341
-            $model->whereRaw($conditions['conditionString'], $conditions['conditionValues']);
342
-        }
343
-
344
-        if ($perPage) 
345
-        {
346
-            return $model->orderBy($sortBy, $sort)->paginate($perPage);
347
-        }
348
-
349
-        return $model->orderBy($sortBy, $sort)->get();
350
-    }
351
-
352
-    /**
353
-     * Save the given data to the logged in user.
354
-     *
355
-     * @param  array $credentials
356
-     * @return object
357
-     */
358
-    public function saveProfile($credentials) 
359
-    {
360
-        $user = \JWTAuth::parseToken()->authenticate();
361
-        $user->save($credentials);
362
-
363
-        return $user;
364
-    }
339
+		if (count($conditions['conditionValues']))
340
+		{
341
+			$model->whereRaw($conditions['conditionString'], $conditions['conditionValues']);
342
+		}
343
+
344
+		if ($perPage) 
345
+		{
346
+			return $model->orderBy($sortBy, $sort)->paginate($perPage);
347
+		}
348
+
349
+		return $model->orderBy($sortBy, $sort)->get();
350
+	}
351
+
352
+	/**
353
+	 * Save the given data to the logged in user.
354
+	 *
355
+	 * @param  array $credentials
356
+	 * @return object
357
+	 */
358
+	public function saveProfile($credentials) 
359
+	{
360
+		$user = \JWTAuth::parseToken()->authenticate();
361
+		$user->save($credentials);
362
+
363
+		return $user;
364
+	}
365 365
 }
Please login to merge, or discard this patch.
Spacing   +6 added lines, -6 removed lines patch added patch discarded remove patch
@@ -26,7 +26,7 @@  discard block
 block discarded – undo
26 26
         $user        = \Core::users()->find(\JWTAuth::parseToken()->authenticate()->id, $relations);
27 27
         foreach ($user->groups()->get() as $group)
28 28
         {
29
-            $group->permissions->each(function ($permission) use (&$permissions){
29
+            $group->permissions->each(function($permission) use (&$permissions){
30 30
                 $permissions[$permission->model][$permission->id] = $permission->name;
31 31
             });
32 32
         }
@@ -44,7 +44,7 @@  discard block
 block discarded – undo
44 44
      * @param  boolean $user
45 45
      * @return boolean
46 46
      */
47
-    public function can($nameOfPermission, $model, $user = false )
47
+    public function can($nameOfPermission, $model, $user = false)
48 48
     {      
49 49
         $user        = $user ?: \JWTAuth::parseToken()->authenticate();
50 50
         $permissions = [];
@@ -54,7 +54,7 @@  discard block
 block discarded – undo
54 54
             \ErrorHandler::tokenExpired();
55 55
         }
56 56
 
57
-        $user->groups->pluck('permissions')->each(function ($permission) use (&$permissions, $model){
57
+        $user->groups->pluck('permissions')->each(function($permission) use (&$permissions, $model){
58 58
             $permissions = array_merge($permissions, $permission->where('model', $model)->pluck('name')->toArray()); 
59 59
         });
60 60
         
@@ -82,7 +82,7 @@  discard block
 block discarded – undo
82 82
      */
83 83
     public function assignGroups($user_id, $group_ids)
84 84
     {
85
-        \DB::transaction(function () use ($user_id, $group_ids) {
85
+        \DB::transaction(function() use ($user_id, $group_ids) {
86 86
             $user = $this->find($user_id);
87 87
             $user->groups()->detach();
88 88
             $user->groups()->attach($group_ids);
@@ -245,7 +245,7 @@  discard block
 block discarded – undo
245 245
         $url   = $this->config['resetLink'];
246 246
         $token = \Password::getRepository()->create($user);
247 247
         
248
-        \Mail::send('auth.emails.password', ['user' => $user, 'url' => $url, 'token' => $token], function ($m) use ($user) {
248
+        \Mail::send('auth.emails.password', ['user' => $user, 'url' => $url, 'token' => $token], function($m) use ($user) {
249 249
             $m->to($user->email, $user->name)->subject('Your Password Reset Link');
250 250
         });
251 251
     }
@@ -259,7 +259,7 @@  discard block
 block discarded – undo
259 259
     public function resetPassword($credentials)
260 260
     {
261 261
         $token    = false;
262
-        $response = \Password::reset($credentials, function ($user, $password) use (&$token) {
262
+        $response = \Password::reset($credentials, function($user, $password) use (&$token) {
263 263
             $user->password = bcrypt($password);
264 264
             $user->save();
265 265
 
Please login to merge, or discard this patch.
src/Modules/V1/Acl/ModelObservers/AclUserObserver.php 1 patch
Indentation   +52 added lines, -52 removed lines patch added patch discarded remove patch
@@ -5,57 +5,57 @@
 block discarded – undo
5 5
  */
6 6
 class AclUserObserver {
7 7
 
8
-    public function saving($model)
9
-    {
10
-        //
11
-    }
12
-
13
-    public function saved($model)
14
-    {
15
-        //
16
-    }
17
-
18
-    public function creating($model)
19
-    {
20
-        //
21
-    }
22
-
23
-    public function created($model)
24
-    {
25
-        //
26
-    }
27
-
28
-    public function updating($model)
29
-    {
30
-        if ($model->password) 
31
-        {
32
-            $model->last_change_password = \Carbon\Carbon::now()->toDateTimeString();
33
-        }
34
-    }
35
-
36
-    public function updated($model)
37
-    {
38
-        //
39
-    }
40
-
41
-    /**
42
-     * Soft delete user logs.
43
-     * 
44
-     * @param  object $model the delted model.
45
-     * @return void
46
-     */
47
-    public function deleting($model)
48
-    {
49
-        if ($model->getOriginal('id') == \JWTAuth::parseToken()->authenticate()->id) 
50
-        {
51
-            \ErrorHandler::noPermissions();
52
-        }
53
-        $model->logs()->delete();
54
-    }
55
-
56
-    public function deleted($model)
57
-    {
58
-        //
59
-    }
8
+	public function saving($model)
9
+	{
10
+		//
11
+	}
12
+
13
+	public function saved($model)
14
+	{
15
+		//
16
+	}
17
+
18
+	public function creating($model)
19
+	{
20
+		//
21
+	}
22
+
23
+	public function created($model)
24
+	{
25
+		//
26
+	}
27
+
28
+	public function updating($model)
29
+	{
30
+		if ($model->password) 
31
+		{
32
+			$model->last_change_password = \Carbon\Carbon::now()->toDateTimeString();
33
+		}
34
+	}
35
+
36
+	public function updated($model)
37
+	{
38
+		//
39
+	}
40
+
41
+	/**
42
+	 * Soft delete user logs.
43
+	 * 
44
+	 * @param  object $model the delted model.
45
+	 * @return void
46
+	 */
47
+	public function deleting($model)
48
+	{
49
+		if ($model->getOriginal('id') == \JWTAuth::parseToken()->authenticate()->id) 
50
+		{
51
+			\ErrorHandler::noPermissions();
52
+		}
53
+		$model->logs()->delete();
54
+	}
55
+
56
+	public function deleted($model)
57
+	{
58
+		//
59
+	}
60 60
 
61 61
 }
62 62
\ No newline at end of file
Please login to merge, or discard this patch.
src/Modules/V1/Notifications/Providers/ModuleServiceProvider.php 1 patch
Indentation   +18 added lines, -18 removed lines patch added patch discarded remove patch
@@ -7,23 +7,23 @@
 block discarded – undo
7 7
 class ModuleServiceProvider extends ServiceProvider
8 8
 {
9 9
 	/**
10
-     * Bootstrap the module services.
11
-     *
12
-     * @return void
13
-     */
14
-    public function boot()
15
-    {
16
-        $this->loadTranslationsFrom(__DIR__.'/../Resources/Lang', 'catalog');
17
-        $this->loadViewsFrom(__DIR__.'/../Resources/Views', 'catalog');
18
-    }
10
+	 * Bootstrap the module services.
11
+	 *
12
+	 * @return void
13
+	 */
14
+	public function boot()
15
+	{
16
+		$this->loadTranslationsFrom(__DIR__.'/../Resources/Lang', 'catalog');
17
+		$this->loadViewsFrom(__DIR__.'/../Resources/Views', 'catalog');
18
+	}
19 19
 
20
-    /**
21
-     * Register the module services.
22
-     *
23
-     * @return void
24
-     */
25
-    public function register()
26
-    {
27
-        $this->app->register(RouteServiceProvider::class);
28
-    }
20
+	/**
21
+	 * Register the module services.
22
+	 *
23
+	 * @return void
24
+	 */
25
+	public function register()
26
+	{
27
+		$this->app->register(RouteServiceProvider::class);
28
+	}
29 29
 }
Please login to merge, or discard this patch.
src/Modules/V1/Notifications/Providers/RouteServiceProvider.php 2 patches
Indentation   +61 added lines, -61 removed lines patch added patch discarded remove patch
@@ -8,72 +8,72 @@
 block discarded – undo
8 8
 class RouteServiceProvider extends ServiceProvider
9 9
 {
10 10
 	/**
11
-     * This namespace is applied to your controller routes.
12
-     *
13
-     * In addition, it is set as the URL generator's root namespace.
14
-     *
15
-     * @var string
16
-     */
17
-    protected $namespace = 'App\Modules\V1\Notifications\Http\Controllers';
11
+	 * This namespace is applied to your controller routes.
12
+	 *
13
+	 * In addition, it is set as the URL generator's root namespace.
14
+	 *
15
+	 * @var string
16
+	 */
17
+	protected $namespace = 'App\Modules\V1\Notifications\Http\Controllers';
18 18
 
19
-    /**
20
-     * Define your route model bindings, pattern filters, etc.
21
-     *
22
-     * @return void
23
-     */
24
-    public function boot()
25
-    {
26
-        //
19
+	/**
20
+	 * Define your route model bindings, pattern filters, etc.
21
+	 *
22
+	 * @return void
23
+	 */
24
+	public function boot()
25
+	{
26
+		//
27 27
 
28
-        parent::boot();
29
-    }
28
+		parent::boot();
29
+	}
30 30
 
31
-    /**
32
-     * Define the routes for the module.
33
-     *
34
-     * @return void
35
-     */
36
-    public function map()
37
-    {
38
-        $this->mapWebRoutes();
31
+	/**
32
+	 * Define the routes for the module.
33
+	 *
34
+	 * @return void
35
+	 */
36
+	public function map()
37
+	{
38
+		$this->mapWebRoutes();
39 39
 
40
-        $this->mapApiRoutes();
40
+		$this->mapApiRoutes();
41 41
 
42
-        //
43
-    }
42
+		//
43
+	}
44 44
 
45
-    /**
46
-     * Define the "web" routes for the module.
47
-     *
48
-     * These routes all receive session state, CSRF protection, etc.
49
-     *
50
-     * @return void
51
-     */
52
-    protected function mapWebRoutes()
53
-    {
54
-        Route::group([
55
-            'middleware' => 'web',
56
-            'namespace'  => $this->namespace,
57
-        ], function ($router) {
58
-            require module_path('notifications', 'Routes/web.php');
59
-        });
60
-    }
45
+	/**
46
+	 * Define the "web" routes for the module.
47
+	 *
48
+	 * These routes all receive session state, CSRF protection, etc.
49
+	 *
50
+	 * @return void
51
+	 */
52
+	protected function mapWebRoutes()
53
+	{
54
+		Route::group([
55
+			'middleware' => 'web',
56
+			'namespace'  => $this->namespace,
57
+		], function ($router) {
58
+			require module_path('notifications', 'Routes/web.php');
59
+		});
60
+	}
61 61
 
62
-    /**
63
-     * Define the "api" routes for the module.
64
-     *
65
-     * These routes are typically stateless.
66
-     *
67
-     * @return void
68
-     */
69
-    protected function mapApiRoutes()
70
-    {
71
-        Route::group([
72
-            'middleware' => 'api',
73
-            'namespace'  => $this->namespace,
74
-            'prefix'     => 'api',
75
-        ], function ($router) {
76
-            require module_path('notifications', 'Routes/api.php');
77
-        });
78
-    }
62
+	/**
63
+	 * Define the "api" routes for the module.
64
+	 *
65
+	 * These routes are typically stateless.
66
+	 *
67
+	 * @return void
68
+	 */
69
+	protected function mapApiRoutes()
70
+	{
71
+		Route::group([
72
+			'middleware' => 'api',
73
+			'namespace'  => $this->namespace,
74
+			'prefix'     => 'api',
75
+		], function ($router) {
76
+			require module_path('notifications', 'Routes/api.php');
77
+		});
78
+	}
79 79
 }
Please login to merge, or discard this patch.
Spacing   +2 added lines, -2 removed lines patch added patch discarded remove patch
@@ -54,7 +54,7 @@  discard block
 block discarded – undo
54 54
         Route::group([
55 55
             'middleware' => 'web',
56 56
             'namespace'  => $this->namespace,
57
-        ], function ($router) {
57
+        ], function($router) {
58 58
             require module_path('notifications', 'Routes/web.php');
59 59
         });
60 60
     }
@@ -72,7 +72,7 @@  discard block
 block discarded – undo
72 72
             'middleware' => 'api',
73 73
             'namespace'  => $this->namespace,
74 74
             'prefix'     => 'api',
75
-        ], function ($router) {
75
+        ], function($router) {
76 76
             require module_path('notifications', 'Routes/api.php');
77 77
         });
78 78
     }
Please login to merge, or discard this patch.