Completed
Push — master ( 86ce89...cd8f65 )
by Sherif
03:43
created
src/Modules/V1/Notifications/Http/Controllers/NotificationsController.php 2 patches
Spacing   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -12,7 +12,7 @@
 block discarded – undo
12 12
      * to preform actions like (add, edit ... etc).
13 13
      * @var string
14 14
      */
15
-    protected $model            = 'notifications';
15
+    protected $model = 'notifications';
16 16
 
17 17
     /**
18 18
      * Set the notification notified to true.
Please login to merge, or discard this patch.
Indentation   +24 added lines, -24 removed lines patch added patch discarded remove patch
@@ -8,30 +8,30 @@
 block discarded – undo
8 8
 class NotificationsController extends BaseApiController
9 9
 {
10 10
 	/**
11
-     * The name of the model that is used by the base api controller 
12
-     * to preform actions like (add, edit ... etc).
13
-     * @var string
14
-     */
15
-    protected $model            = 'notifications';
11
+	 * The name of the model that is used by the base api controller 
12
+	 * to preform actions like (add, edit ... etc).
13
+	 * @var string
14
+	 */
15
+	protected $model            = 'notifications';
16 16
 
17
-    /**
18
-     * Set the notification notified to true.
19
-     * 
20
-     * @param  integer  $id
21
-     * @return \Illuminate\Http\Response
22
-     */
23
-    public function notified($id)
24
-    {
25
-        return \Response::json(\Core::notifications()->notified($id), 200);
26
-    }
17
+	/**
18
+	 * Set the notification notified to true.
19
+	 * 
20
+	 * @param  integer  $id
21
+	 * @return \Illuminate\Http\Response
22
+	 */
23
+	public function notified($id)
24
+	{
25
+		return \Response::json(\Core::notifications()->notified($id), 200);
26
+	}
27 27
 
28
-    /**
29
-     * Set the notification notified to all.
30
-     * 
31
-     * @return \Illuminate\Http\Response
32
-     */
33
-    public function notifyall()
34
-    {
35
-        return \Response::json(\Core::notifications()->notifyAll(), 200);
36
-    }
28
+	/**
29
+	 * Set the notification notified to all.
30
+	 * 
31
+	 * @return \Illuminate\Http\Response
32
+	 */
33
+	public function notifyall()
34
+	{
35
+		return \Response::json(\Core::notifications()->notifyAll(), 200);
36
+	}
37 37
 }
Please login to merge, or discard this patch.
src/Modules/V1/Acl/AclGroup.php 2 patches
Spacing   +3 added lines, -3 removed lines patch added patch discarded remove patch
@@ -3,7 +3,7 @@  discard block
 block discarded – undo
3 3
 use Illuminate\Database\Eloquent\Model;
4 4
 use Illuminate\Database\Eloquent\SoftDeletes;
5 5
 
6
-class AclGroup extends Model{
6
+class AclGroup extends Model {
7 7
 
8 8
     use SoftDeletes;
9 9
     protected $table    = 'groups';
@@ -29,12 +29,12 @@  discard block
 block discarded – undo
29 29
 
30 30
     public function users()
31 31
     {
32
-        return $this->belongsToMany('\App\Modules\V1\Acl\AclUser','users_groups','group_id','user_id')->whereNull('users_groups.deleted_at')->withTimestamps();
32
+        return $this->belongsToMany('\App\Modules\V1\Acl\AclUser', 'users_groups', 'group_id', 'user_id')->whereNull('users_groups.deleted_at')->withTimestamps();
33 33
     }
34 34
 
35 35
     public function permissions()
36 36
     {
37
-        return $this->belongsToMany('\App\Modules\V1\Acl\AclPermission','groups_permissions','group_id','permission_id')->whereNull('groups_permissions.deleted_at')->withTimestamps();
37
+        return $this->belongsToMany('\App\Modules\V1\Acl\AclPermission', 'groups_permissions', 'group_id', 'permission_id')->whereNull('groups_permissions.deleted_at')->withTimestamps();
38 38
     }
39 39
 
40 40
     public static function boot()
Please login to merge, or discard this patch.
Indentation   +38 added lines, -38 removed lines patch added patch discarded remove patch
@@ -5,42 +5,42 @@
 block discarded – undo
5 5
 
6 6
 class AclGroup extends Model{
7 7
 
8
-    use SoftDeletes;
9
-    protected $table    = 'groups';
10
-    protected $dates    = ['created_at', 'updated_at', 'deleted_at'];
11
-    protected $hidden   = ['deleted_at'];
12
-    protected $guarded  = ['id'];
13
-    protected $fillable = ['name'];
14
-    public $searchable  = ['name'];
15
-
16
-    public function getCreatedAtAttribute($value)
17
-    {
18
-        return \Carbon\Carbon::parse($value)->addHours(\Session::get('timeZoneDiff'))->toDateTimeString();
19
-    }
20
-
21
-    public function getUpdatedAtAttribute($value)
22
-    {
23
-        return \Carbon\Carbon::parse($value)->addHours(\Session::get('timeZoneDiff'))->toDateTimeString();
24
-    }
25
-
26
-    public function getDeletedAtAttribute($value)
27
-    {
28
-        return \Carbon\Carbon::parse($value)->addHours(\Session::get('timeZoneDiff'))->toDateTimeString();
29
-    }
30
-
31
-    public function users()
32
-    {
33
-        return $this->belongsToMany('\App\Modules\V1\Acl\AclUser','users_groups','group_id','user_id')->whereNull('users_groups.deleted_at')->withTimestamps();
34
-    }
35
-
36
-    public function permissions()
37
-    {
38
-        return $this->belongsToMany('\App\Modules\V1\Acl\AclPermission','groups_permissions','group_id','permission_id')->whereNull('groups_permissions.deleted_at')->withTimestamps();
39
-    }
40
-
41
-    public static function boot()
42
-    {
43
-        parent::boot();
44
-        parent::observe(\App::make('App\Modules\V1\Acl\ModelObservers\AclGroupObserver'));
45
-    }
8
+	use SoftDeletes;
9
+	protected $table    = 'groups';
10
+	protected $dates    = ['created_at', 'updated_at', 'deleted_at'];
11
+	protected $hidden   = ['deleted_at'];
12
+	protected $guarded  = ['id'];
13
+	protected $fillable = ['name'];
14
+	public $searchable  = ['name'];
15
+
16
+	public function getCreatedAtAttribute($value)
17
+	{
18
+		return \Carbon\Carbon::parse($value)->addHours(\Session::get('timeZoneDiff'))->toDateTimeString();
19
+	}
20
+
21
+	public function getUpdatedAtAttribute($value)
22
+	{
23
+		return \Carbon\Carbon::parse($value)->addHours(\Session::get('timeZoneDiff'))->toDateTimeString();
24
+	}
25
+
26
+	public function getDeletedAtAttribute($value)
27
+	{
28
+		return \Carbon\Carbon::parse($value)->addHours(\Session::get('timeZoneDiff'))->toDateTimeString();
29
+	}
30
+
31
+	public function users()
32
+	{
33
+		return $this->belongsToMany('\App\Modules\V1\Acl\AclUser','users_groups','group_id','user_id')->whereNull('users_groups.deleted_at')->withTimestamps();
34
+	}
35
+
36
+	public function permissions()
37
+	{
38
+		return $this->belongsToMany('\App\Modules\V1\Acl\AclPermission','groups_permissions','group_id','permission_id')->whereNull('groups_permissions.deleted_at')->withTimestamps();
39
+	}
40
+
41
+	public static function boot()
42
+	{
43
+		parent::boot();
44
+		parent::observe(\App::make('App\Modules\V1\Acl\ModelObservers\AclGroupObserver'));
45
+	}
46 46
 }
Please login to merge, or discard this patch.
src/Modules/V1/Acl/Database/Migrations/2015_12_22_145819_groups.php 2 patches
Indentation   +12 added lines, -12 removed lines patch added patch discarded remove patch
@@ -13,19 +13,19 @@
 block discarded – undo
13 13
 	public function up()
14 14
 	{
15 15
 		Schema::create('groups', function (Blueprint $table) {
16
-            $table->increments('id');
17
-            $table->string('name',100)->unique();
18
-            $table->softDeletes();
19
-            $table->timestamps();
20
-        });
16
+			$table->increments('id');
17
+			$table->string('name',100)->unique();
18
+			$table->softDeletes();
19
+			$table->timestamps();
20
+		});
21 21
         
22
-        Schema::create('users_groups', function (Blueprint $table) {
23
-            $table->increments('id');
24
-            $table->integer('user_id');
25
-            $table->integer('group_id');
26
-            $table->softDeletes();
27
-            $table->timestamps();
28
-        });
22
+		Schema::create('users_groups', function (Blueprint $table) {
23
+			$table->increments('id');
24
+			$table->integer('user_id');
25
+			$table->integer('group_id');
26
+			$table->softDeletes();
27
+			$table->timestamps();
28
+		});
29 29
 	}
30 30
 
31 31
 	/**
Please login to merge, or discard this patch.
Spacing   +3 added lines, -3 removed lines patch added patch discarded remove patch
@@ -12,14 +12,14 @@
 block discarded – undo
12 12
 	 */
13 13
 	public function up()
14 14
 	{
15
-		Schema::create('groups', function (Blueprint $table) {
15
+		Schema::create('groups', function(Blueprint $table) {
16 16
             $table->increments('id');
17
-            $table->string('name',100)->unique();
17
+            $table->string('name', 100)->unique();
18 18
             $table->softDeletes();
19 19
             $table->timestamps();
20 20
         });
21 21
         
22
-        Schema::create('users_groups', function (Blueprint $table) {
22
+        Schema::create('users_groups', function(Blueprint $table) {
23 23
             $table->increments('id');
24 24
             $table->integer('user_id');
25 25
             $table->integer('group_id');
Please login to merge, or discard this patch.
src/Modules/V1/Acl/Database/Migrations/2016_01_05_130506_permissions.php 2 patches
Indentation   +15 added lines, -15 removed lines patch added patch discarded remove patch
@@ -12,21 +12,21 @@
 block discarded – undo
12 12
 	 */
13 13
 	public function up()
14 14
 	{
15
-        Schema::create('permissions', function (Blueprint $table) {
16
-            $table->increments('id');
17
-            $table->string('name',100);
18
-            $table->string('model',100);
19
-            $table->softDeletes();
20
-            $table->timestamps();
21
-            $table->unique(array('name', 'model'));
22
-        });
23
-        Schema::create('groups_permissions', function (Blueprint $table) {
24
-            $table->increments('id');
25
-            $table->integer('group_id');
26
-            $table->integer('permission_id');
27
-            $table->softDeletes();
28
-            $table->timestamps();
29
-        });
15
+		Schema::create('permissions', function (Blueprint $table) {
16
+			$table->increments('id');
17
+			$table->string('name',100);
18
+			$table->string('model',100);
19
+			$table->softDeletes();
20
+			$table->timestamps();
21
+			$table->unique(array('name', 'model'));
22
+		});
23
+		Schema::create('groups_permissions', function (Blueprint $table) {
24
+			$table->increments('id');
25
+			$table->integer('group_id');
26
+			$table->integer('permission_id');
27
+			$table->softDeletes();
28
+			$table->timestamps();
29
+		});
30 30
 	}
31 31
 
32 32
 	/**
Please login to merge, or discard this patch.
Spacing   +4 added lines, -4 removed lines patch added patch discarded remove patch
@@ -12,15 +12,15 @@
 block discarded – undo
12 12
 	 */
13 13
 	public function up()
14 14
 	{
15
-        Schema::create('permissions', function (Blueprint $table) {
15
+        Schema::create('permissions', function(Blueprint $table) {
16 16
             $table->increments('id');
17
-            $table->string('name',100);
18
-            $table->string('model',100);
17
+            $table->string('name', 100);
18
+            $table->string('model', 100);
19 19
             $table->softDeletes();
20 20
             $table->timestamps();
21 21
             $table->unique(array('name', 'model'));
22 22
         });
23
-        Schema::create('groups_permissions', function (Blueprint $table) {
23
+        Schema::create('groups_permissions', function(Blueprint $table) {
24 24
             $table->increments('id');
25 25
             $table->integer('group_id');
26 26
             $table->integer('permission_id');
Please login to merge, or discard this patch.
src/Modules/V1/Acl/Repositories/GroupRepository.php 2 patches
Spacing   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -23,7 +23,7 @@
 block discarded – undo
23 23
 	 */
24 24
 	public function assignPermissions($group_id, $permission_ids)
25 25
 	{
26
-		\DB::transaction(function () use ($group_id, $permission_ids) {
26
+		\DB::transaction(function() use ($group_id, $permission_ids) {
27 27
 			$group = \Core::groups()->find($group_id);
28 28
 			$group->permissions()->detach();
29 29
 			$group->permissions()->attach($permission_ids);
Please login to merge, or discard this patch.
Indentation   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -29,6 +29,6 @@
 block discarded – undo
29 29
 			$group->permissions()->attach($permission_ids);
30 30
 		});
31 31
 
32
-        return $this->find($group_id);
32
+		return $this->find($group_id);
33 33
 	}
34 34
 }
Please login to merge, or discard this patch.
src/Modules/V1/Acl/AclPermission.php 2 patches
Spacing   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -29,7 +29,7 @@
 block discarded – undo
29 29
     
30 30
     public function groups()
31 31
     {
32
-        return $this->belongsToMany('\App\Modules\V1\Acl\AclGroup','groups_permissions','permission_id','group_id')->whereNull('groups_permissions.deleted_at')->withTimestamps();
32
+        return $this->belongsToMany('\App\Modules\V1\Acl\AclGroup', 'groups_permissions', 'permission_id', 'group_id')->whereNull('groups_permissions.deleted_at')->withTimestamps();
33 33
     }
34 34
 
35 35
     public static function boot()
Please login to merge, or discard this patch.
Indentation   +28 added lines, -28 removed lines patch added patch discarded remove patch
@@ -5,37 +5,37 @@
 block discarded – undo
5 5
 
6 6
 class AclPermission extends Model {
7 7
 
8
-    use SoftDeletes;
9
-    protected $table    = 'permissions';
10
-    protected $dates    = ['created_at', 'updated_at', 'deleted_at'];
11
-    protected $hidden   = ['deleted_at'];
12
-    protected $guarded  = ['id'];
13
-    protected $fillable = ['name', 'model'];
14
-    public $searchable  = ['name', 'model'];
8
+	use SoftDeletes;
9
+	protected $table    = 'permissions';
10
+	protected $dates    = ['created_at', 'updated_at', 'deleted_at'];
11
+	protected $hidden   = ['deleted_at'];
12
+	protected $guarded  = ['id'];
13
+	protected $fillable = ['name', 'model'];
14
+	public $searchable  = ['name', 'model'];
15 15
 
16
-    public function getCreatedAtAttribute($value)
17
-    {
18
-        return \Carbon\Carbon::parse($value)->addHours(\Session::get('timeZoneDiff'))->toDateTimeString();
19
-    }
16
+	public function getCreatedAtAttribute($value)
17
+	{
18
+		return \Carbon\Carbon::parse($value)->addHours(\Session::get('timeZoneDiff'))->toDateTimeString();
19
+	}
20 20
 
21
-    public function getUpdatedAtAttribute($value)
22
-    {
23
-        return \Carbon\Carbon::parse($value)->addHours(\Session::get('timeZoneDiff'))->toDateTimeString();
24
-    }
21
+	public function getUpdatedAtAttribute($value)
22
+	{
23
+		return \Carbon\Carbon::parse($value)->addHours(\Session::get('timeZoneDiff'))->toDateTimeString();
24
+	}
25 25
 
26
-    public function getDeletedAtAttribute($value)
27
-    {
28
-        return \Carbon\Carbon::parse($value)->addHours(\Session::get('timeZoneDiff'))->toDateTimeString();
29
-    }
26
+	public function getDeletedAtAttribute($value)
27
+	{
28
+		return \Carbon\Carbon::parse($value)->addHours(\Session::get('timeZoneDiff'))->toDateTimeString();
29
+	}
30 30
     
31
-    public function groups()
32
-    {
33
-        return $this->belongsToMany('\App\Modules\V1\Acl\AclGroup','groups_permissions','permission_id','group_id')->whereNull('groups_permissions.deleted_at')->withTimestamps();
34
-    }
31
+	public function groups()
32
+	{
33
+		return $this->belongsToMany('\App\Modules\V1\Acl\AclGroup','groups_permissions','permission_id','group_id')->whereNull('groups_permissions.deleted_at')->withTimestamps();
34
+	}
35 35
 
36
-    public static function boot()
37
-    {
38
-        parent::boot();
39
-        parent::observe(\App::make('App\Modules\V1\Acl\ModelObservers\AclPermissionObserver'));
40
-    }
36
+	public static function boot()
37
+	{
38
+		parent::boot();
39
+		parent::observe(\App::make('App\Modules\V1\Acl\ModelObservers\AclPermissionObserver'));
40
+	}
41 41
 }
Please login to merge, or discard this patch.
src/Modules/V1/Acl/Http/Controllers/PermissionsController.php 1 patch
Indentation   +6 added lines, -6 removed lines patch added patch discarded remove patch
@@ -7,10 +7,10 @@
 block discarded – undo
7 7
 
8 8
 class PermissionsController extends BaseApiController
9 9
 {
10
-    /**
11
-     * The name of the model that is used by the base api controller 
12
-     * to preform actions like (add, edit ... etc).
13
-     * @var string
14
-     */
15
-    protected $model = 'permissions';
10
+	/**
11
+	 * The name of the model that is used by the base api controller 
12
+	 * to preform actions like (add, edit ... etc).
13
+	 * @var string
14
+	 */
15
+	protected $model = 'permissions';
16 16
 }
Please login to merge, or discard this patch.
src/Modules/V1/Acl/Http/Controllers/GroupsController.php 2 patches
Spacing   +2 added lines, -2 removed lines patch added patch discarded remove patch
@@ -13,14 +13,14 @@
 block discarded – undo
13 13
      * to preform actions like (add, edit ... etc).
14 14
      * @var string
15 15
      */
16
-    protected $model               = 'groups';
16
+    protected $model = 'groups';
17 17
 
18 18
     /**
19 19
      * The validations rules used by the base api controller
20 20
      * to check before add.
21 21
      * @var array
22 22
      */
23
-    protected $validationRules  = [
23
+    protected $validationRules = [
24 24
     'name' => 'required|string|max:100|unique:groups,name,{id}'
25 25
     ];
26 26
 
Please login to merge, or discard this patch.
Indentation   +28 added lines, -28 removed lines patch added patch discarded remove patch
@@ -8,35 +8,35 @@
 block discarded – undo
8 8
 
9 9
 class GroupsController extends BaseApiController
10 10
 {
11
-    /**
12
-     * The name of the model that is used by the base api controller 
13
-     * to preform actions like (add, edit ... etc).
14
-     * @var string
15
-     */
16
-    protected $model               = 'groups';
11
+	/**
12
+	 * The name of the model that is used by the base api controller 
13
+	 * to preform actions like (add, edit ... etc).
14
+	 * @var string
15
+	 */
16
+	protected $model               = 'groups';
17 17
 
18
-    /**
19
-     * The validations rules used by the base api controller
20
-     * to check before add.
21
-     * @var array
22
-     */
23
-    protected $validationRules  = [
24
-    'name' => 'required|string|max:100|unique:groups,name,{id}'
25
-    ];
18
+	/**
19
+	 * The validations rules used by the base api controller
20
+	 * to check before add.
21
+	 * @var array
22
+	 */
23
+	protected $validationRules  = [
24
+	'name' => 'required|string|max:100|unique:groups,name,{id}'
25
+	];
26 26
 
27
-    /**
28
-     * Handle an assign permissions to group request.
29
-     *
30
-     * @param  \Illuminate\Http\Request  $request
31
-     * @return \Illuminate\Http\Response
32
-     */
33
-    public function assignpermissions(Request $request)
34
-    {
35
-        $this->validate($request, [
36
-            'permission_ids' => 'required|exists:permissions,id', 
37
-            'group_id'       => 'required|array|exists:groups,id'
38
-            ]);
27
+	/**
28
+	 * Handle an assign permissions to group request.
29
+	 *
30
+	 * @param  \Illuminate\Http\Request  $request
31
+	 * @return \Illuminate\Http\Response
32
+	 */
33
+	public function assignpermissions(Request $request)
34
+	{
35
+		$this->validate($request, [
36
+			'permission_ids' => 'required|exists:permissions,id', 
37
+			'group_id'       => 'required|array|exists:groups,id'
38
+			]);
39 39
 
40
-        return \Response::json(\Core::groups()->assignPermissions($request->get('group_id'), $request->get('permission_ids')), 200);
41
-    }
40
+		return \Response::json(\Core::groups()->assignPermissions($request->get('group_id'), $request->get('permission_ids')), 200);
41
+	}
42 42
 }
Please login to merge, or discard this patch.
src/Modules/V1/Acl/Repositories/UserRepository.php 4 patches
Doc Comments   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -202,7 +202,7 @@
 block discarded – undo
202 202
      * Reset the given user's password.
203 203
      *
204 204
      * @param  array  $credentials
205
-     * @return integer
205
+     * @return false|null
206 206
      */
207 207
     public function resetPassword($credentials)
208 208
     {
Please login to merge, or discard this patch.
Braces   +8 added lines, -16 removed lines patch added patch discarded remove patch
@@ -76,24 +76,19 @@  discard block
 block discarded – undo
76 76
         if ( ! $user = $this->first(['email' => $credentials['email']])) 
77 77
         {
78 78
             \ErrorHandler::loginFailed();
79
-        }
80
-        else if ($adminLogin && $user->groups->lists('name')->search('Admin', true) === false) 
79
+        } else if ($adminLogin && $user->groups->lists('name')->search('Admin', true) === false) 
81 80
         {
82 81
             \ErrorHandler::loginFailed();
83
-        }
84
-        else if ( ! $adminLogin && $user->groups->lists('name')->search('Admin', true) !== false) 
82
+        } else if ( ! $adminLogin && $user->groups->lists('name')->search('Admin', true) !== false) 
85 83
         {
86 84
             \ErrorHandler::loginFailed();
87
-        }
88
-        else if ($user->blocked)
85
+        } else if ($user->blocked)
89 86
         {
90 87
             \ErrorHandler::userIsBlocked();
91
-        }
92
-        else if ($token = \JWTAuth::attempt($credentials))
88
+        } else if ($token = \JWTAuth::attempt($credentials))
93 89
         {
94 90
             return ['token' => $token];
95
-        }
96
-        else
91
+        } else
97 92
         {
98 93
             \ErrorHandler::loginFailed();
99 94
         }
@@ -118,8 +113,7 @@  discard block
 block discarded – undo
118 113
         {
119 114
             $data = ['email' => $user->email, 'password' => ''];
120 115
             return $this->register($data);
121
-        }
122
-        else
116
+        } else
123 117
         {
124 118
             return $this->login(['email' => $registeredUser->email, 'password' => ''], false);
125 119
         }
@@ -161,12 +155,10 @@  discard block
 block discarded – undo
161 155
         if ( ! $this->hasGroup('Admin'))
162 156
         {
163 157
             \ErrorHandler::noPermissions();
164
-        }
165
-        else if (\JWTAuth::parseToken()->authenticate()->id == $user_id)
158
+        } else if (\JWTAuth::parseToken()->authenticate()->id == $user_id)
166 159
         {
167 160
             \ErrorHandler::noPermissions();
168
-        }
169
-        else if ($user->groups->lists('name')->search('Admin', true) !== false) 
161
+        } else if ($user->groups->lists('name')->search('Admin', true) !== false) 
170 162
         {
171 163
             \ErrorHandler::noPermissions();
172 164
         }
Please login to merge, or discard this patch.
Indentation   +242 added lines, -242 removed lines patch added patch discarded remove patch
@@ -4,278 +4,278 @@
 block discarded – undo
4 4
 
5 5
 class UserRepository extends AbstractRepository
6 6
 {
7
-    /**
8
-     * Return the model full namespace.
9
-     * 
10
-     * @return string
11
-     */
12
-    protected function getModel()
13
-    {
14
-        return 'App\Modules\V1\Acl\AclUser';
15
-    }
7
+	/**
8
+	 * Return the model full namespace.
9
+	 * 
10
+	 * @return string
11
+	 */
12
+	protected function getModel()
13
+	{
14
+		return 'App\Modules\V1\Acl\AclUser';
15
+	}
16 16
 
17
-    /**
18
-     * Check if the logged in user or the given user 
19
-     * has the given permissions on the given model.
20
-     * 
21
-     * @param  string  $nameOfPermission
22
-     * @param  string  $model            
23
-     * @param  boolean $user
24
-     * @return boolean
25
-     */
26
-    public function can($nameOfPermission, $model, $user = false )
27
-    {      
28
-        $user        = $user ?: \JWTAuth::parseToken()->authenticate();
29
-        $permissions = [];
17
+	/**
18
+	 * Check if the logged in user or the given user 
19
+	 * has the given permissions on the given model.
20
+	 * 
21
+	 * @param  string  $nameOfPermission
22
+	 * @param  string  $model            
23
+	 * @param  boolean $user
24
+	 * @return boolean
25
+	 */
26
+	public function can($nameOfPermission, $model, $user = false )
27
+	{      
28
+		$user        = $user ?: \JWTAuth::parseToken()->authenticate();
29
+		$permissions = [];
30 30
 
31
-        if ( ! $user = $this->find($user->id, ['groups.permissions'])) 
32
-        {
33
-            \ErrorHandler::tokenExpired();
34
-        }
31
+		if ( ! $user = $this->find($user->id, ['groups.permissions'])) 
32
+		{
33
+			\ErrorHandler::tokenExpired();
34
+		}
35 35
 
36
-        $user->groups->lists('permissions')->each(function ($permission) use (&$permissions, $model){
37
-            $permissions = array_merge($permissions, $permission->where('model', $model)->lists('name')->toArray()); 
38
-        });
36
+		$user->groups->lists('permissions')->each(function ($permission) use (&$permissions, $model){
37
+			$permissions = array_merge($permissions, $permission->where('model', $model)->lists('name')->toArray()); 
38
+		});
39 39
         
40
-        return in_array($nameOfPermission, $permissions);
41
-    }
40
+		return in_array($nameOfPermission, $permissions);
41
+	}
42 42
 
43
-    /**
44
-     * Check if the logged in user has the given group.
45
-     * 
46
-     * @param  string  $groupName
47
-     * @return boolean
48
-     */
49
-    public function hasGroup($groupName)
50
-    {
51
-        $groups = $this->find(\JWTAuth::parseToken()->authenticate()->id)->groups;
52
-        return $groups->lists('name')->search($groupName, true) === false ? false : true;
53
-    }
43
+	/**
44
+	 * Check if the logged in user has the given group.
45
+	 * 
46
+	 * @param  string  $groupName
47
+	 * @return boolean
48
+	 */
49
+	public function hasGroup($groupName)
50
+	{
51
+		$groups = $this->find(\JWTAuth::parseToken()->authenticate()->id)->groups;
52
+		return $groups->lists('name')->search($groupName, true) === false ? false : true;
53
+	}
54 54
 
55
-    /**
56
-     * Assign the given group ids to the given user.
57
-     * 
58
-     * @param  integer $user_id    
59
-     * @param  array   $group_ids
60
-     * @return object
61
-     */
62
-    public function assignGroups($user_id, $group_ids)
63
-    {
64
-        \DB::transaction(function () use ($user_id, $group_ids) {
65
-            $user = $this->find($user_id);
66
-            $user->groups()->detach();
67
-            $user->groups()->attach($group_ids);
68
-        });
55
+	/**
56
+	 * Assign the given group ids to the given user.
57
+	 * 
58
+	 * @param  integer $user_id    
59
+	 * @param  array   $group_ids
60
+	 * @return object
61
+	 */
62
+	public function assignGroups($user_id, $group_ids)
63
+	{
64
+		\DB::transaction(function () use ($user_id, $group_ids) {
65
+			$user = $this->find($user_id);
66
+			$user->groups()->detach();
67
+			$user->groups()->attach($group_ids);
68
+		});
69 69
 
70
-        return $this->find($user_id);
71
-    }
70
+		return $this->find($user_id);
71
+	}
72 72
 
73
-    /**
74
-     * Handle a login request to the application.
75
-     * 
76
-     * @param  array   $credentials    
77
-     * @param  boolean $adminLogin
78
-     * @return string
79
-     */
80
-    public function login($credentials, $adminLogin = false)
81
-    {
82
-        if ( ! $user = $this->first(['email' => $credentials['email']])) 
83
-        {
84
-            \ErrorHandler::loginFailed();
85
-        }
86
-        else if ($adminLogin && $user->groups->lists('name')->search('Admin', true) === false) 
87
-        {
88
-            \ErrorHandler::loginFailed();
89
-        }
90
-        else if ( ! $adminLogin && $user->groups->lists('name')->search('Admin', true) !== false) 
91
-        {
92
-            \ErrorHandler::loginFailed();
93
-        }
94
-        else if ($user->blocked)
95
-        {
96
-            \ErrorHandler::userIsBlocked();
97
-        }
98
-        else if ($token = \JWTAuth::attempt($credentials))
99
-        {
100
-            return ['token' => $token];
101
-        }
102
-        else
103
-        {
104
-            \ErrorHandler::loginFailed();
105
-        }
106
-    }
73
+	/**
74
+	 * Handle a login request to the application.
75
+	 * 
76
+	 * @param  array   $credentials    
77
+	 * @param  boolean $adminLogin
78
+	 * @return string
79
+	 */
80
+	public function login($credentials, $adminLogin = false)
81
+	{
82
+		if ( ! $user = $this->first(['email' => $credentials['email']])) 
83
+		{
84
+			\ErrorHandler::loginFailed();
85
+		}
86
+		else if ($adminLogin && $user->groups->lists('name')->search('Admin', true) === false) 
87
+		{
88
+			\ErrorHandler::loginFailed();
89
+		}
90
+		else if ( ! $adminLogin && $user->groups->lists('name')->search('Admin', true) !== false) 
91
+		{
92
+			\ErrorHandler::loginFailed();
93
+		}
94
+		else if ($user->blocked)
95
+		{
96
+			\ErrorHandler::userIsBlocked();
97
+		}
98
+		else if ($token = \JWTAuth::attempt($credentials))
99
+		{
100
+			return ['token' => $token];
101
+		}
102
+		else
103
+		{
104
+			\ErrorHandler::loginFailed();
105
+		}
106
+	}
107 107
 
108
-    /**
109
-     * Handle a social login request of the none admin to the application.
110
-     * 
111
-     * @param  array   $credentials
112
-     * @return string
113
-     */
114
-    public function loginSocial($credentials)
115
-    {
116
-        $access_token = $credentials['auth_code'] ? \Socialite::driver($credentials['type'])->getAccessToken($credentials['auth_code']) : $credentials['access_token'];   
117
-        $user         = \Socialite::driver($credentials['type'])->userFromToken($access_token);
108
+	/**
109
+	 * Handle a social login request of the none admin to the application.
110
+	 * 
111
+	 * @param  array   $credentials
112
+	 * @return string
113
+	 */
114
+	public function loginSocial($credentials)
115
+	{
116
+		$access_token = $credentials['auth_code'] ? \Socialite::driver($credentials['type'])->getAccessToken($credentials['auth_code']) : $credentials['access_token'];   
117
+		$user         = \Socialite::driver($credentials['type'])->userFromToken($access_token);
118 118
 
119
-        if ( ! $user->email)
120
-        {
121
-            \ErrorHandler::noSocialEmail();
122
-        }
119
+		if ( ! $user->email)
120
+		{
121
+			\ErrorHandler::noSocialEmail();
122
+		}
123 123
 
124
-        if ( ! $registeredUser = $this->model->where('email', $user->email)->first()) 
125
-        {
126
-            $data = ['email' => $user->email, 'password' => ''];
127
-            return $this->register($data);
128
-        }
129
-        else
130
-        {
131
-            if ( ! \Auth::attempt(['email' => $registeredUser->email, 'password' => '']))
132
-            {
133
-                \ErrorHandler::userAlreadyRegistered();
134
-            }
135
-            return $this->login(['email' => $registeredUser->email, 'password' => ''], false);
136
-        }
137
-    }
124
+		if ( ! $registeredUser = $this->model->where('email', $user->email)->first()) 
125
+		{
126
+			$data = ['email' => $user->email, 'password' => ''];
127
+			return $this->register($data);
128
+		}
129
+		else
130
+		{
131
+			if ( ! \Auth::attempt(['email' => $registeredUser->email, 'password' => '']))
132
+			{
133
+				\ErrorHandler::userAlreadyRegistered();
134
+			}
135
+			return $this->login(['email' => $registeredUser->email, 'password' => ''], false);
136
+		}
137
+	}
138 138
     
139
-    /**
140
-     * Handle a registration request.
141
-     * 
142
-     * @param  array $credentials
143
-     * @return string
144
-     */
145
-    public function register($credentials)
146
-    {
147
-        return ['token' => \JWTAuth::fromUser($this->model->create($credentials))];
148
-    }
139
+	/**
140
+	 * Handle a registration request.
141
+	 * 
142
+	 * @param  array $credentials
143
+	 * @return string
144
+	 */
145
+	public function register($credentials)
146
+	{
147
+		return ['token' => \JWTAuth::fromUser($this->model->create($credentials))];
148
+	}
149 149
 
150
-    /**
151
-     * Logout the user.
152
-     * 
153
-     * @return boolean
154
-     */
155
-    public function logout()
156
-    {
157
-        return \JWTAuth::invalidate(\JWTAuth::getToken());
158
-    }
150
+	/**
151
+	 * Logout the user.
152
+	 * 
153
+	 * @return boolean
154
+	 */
155
+	public function logout()
156
+	{
157
+		return \JWTAuth::invalidate(\JWTAuth::getToken());
158
+	}
159 159
 
160
-    /**
161
-     * Block the user.
162
-     *
163
-     * @param  integer $user_id
164
-     * @return object
165
-     */
166
-    public function block($user_id)
167
-    {
168
-        if ( ! $user = $this->find($user_id)) 
169
-        {
170
-            \ErrorHandler::notFound('user');
171
-        }
172
-        if ( ! $this->hasGroup('Admin'))
173
-        {
174
-            \ErrorHandler::noPermissions();
175
-        }
176
-        else if (\JWTAuth::parseToken()->authenticate()->id == $user_id)
177
-        {
178
-            \ErrorHandler::noPermissions();
179
-        }
180
-        else if ($user->groups->lists('name')->search('Admin', true) !== false) 
181
-        {
182
-            \ErrorHandler::noPermissions();
183
-        }
160
+	/**
161
+	 * Block the user.
162
+	 *
163
+	 * @param  integer $user_id
164
+	 * @return object
165
+	 */
166
+	public function block($user_id)
167
+	{
168
+		if ( ! $user = $this->find($user_id)) 
169
+		{
170
+			\ErrorHandler::notFound('user');
171
+		}
172
+		if ( ! $this->hasGroup('Admin'))
173
+		{
174
+			\ErrorHandler::noPermissions();
175
+		}
176
+		else if (\JWTAuth::parseToken()->authenticate()->id == $user_id)
177
+		{
178
+			\ErrorHandler::noPermissions();
179
+		}
180
+		else if ($user->groups->lists('name')->search('Admin', true) !== false) 
181
+		{
182
+			\ErrorHandler::noPermissions();
183
+		}
184 184
 
185
-        $user->blocked = 1;
186
-        $user->save();
185
+		$user->blocked = 1;
186
+		$user->save();
187 187
         
188
-        return $user;
189
-    }
188
+		return $user;
189
+	}
190 190
 
191
-    /**
192
-     * Unblock the user.
193
-     *
194
-     * @param  integer $user_id
195
-     * @return object
196
-     */
197
-    public function unblock($user_id)
198
-    {
199
-        if ( ! $this->hasGroup('Admin'))
200
-        {
201
-            \ErrorHandler::noPermissions();
202
-        }
191
+	/**
192
+	 * Unblock the user.
193
+	 *
194
+	 * @param  integer $user_id
195
+	 * @return object
196
+	 */
197
+	public function unblock($user_id)
198
+	{
199
+		if ( ! $this->hasGroup('Admin'))
200
+		{
201
+			\ErrorHandler::noPermissions();
202
+		}
203 203
 
204
-        $user          = $this->find($user_id);
205
-        $user->blocked = 0;
206
-        $user->save();
204
+		$user          = $this->find($user_id);
205
+		$user->blocked = 0;
206
+		$user->save();
207 207
 
208
-        return $user;
209
-    }
208
+		return $user;
209
+	}
210 210
 
211
-    /**
212
-     * Send a reset link to the given user.
213
-     *
214
-     * @param  string  $url
215
-     * @param  string  $email
216
-     * @return void
217
-     */
218
-    public function sendReset($email, $url)
219
-    {
220
-        view()->composer('auth.emails.password', function($view) use ($url) {
221
-            $view->with(['url' => $url]);
222
-        });
211
+	/**
212
+	 * Send a reset link to the given user.
213
+	 *
214
+	 * @param  string  $url
215
+	 * @param  string  $email
216
+	 * @return void
217
+	 */
218
+	public function sendReset($email, $url)
219
+	{
220
+		view()->composer('auth.emails.password', function($view) use ($url) {
221
+			$view->with(['url' => $url]);
222
+		});
223 223
 
224
-        $response = \Password::sendResetLink($email, function (\Illuminate\Mail\Message $message) {
225
-            $message->subject('Your Password Reset Link');
226
-        });
224
+		$response = \Password::sendResetLink($email, function (\Illuminate\Mail\Message $message) {
225
+			$message->subject('Your Password Reset Link');
226
+		});
227 227
 
228
-        switch ($response) 
229
-        {
230
-            case \Password::INVALID_USER:
231
-                \ErrorHandler::notFound('email');
232
-        }
233
-    }
228
+		switch ($response) 
229
+		{
230
+			case \Password::INVALID_USER:
231
+				\ErrorHandler::notFound('email');
232
+		}
233
+	}
234 234
 
235
-    /**
236
-     * Reset the given user's password.
237
-     *
238
-     * @param  array  $credentials
239
-     * @return integer
240
-     */
241
-    public function resetPassword($credentials)
242
-    {
243
-        $token    = false;
244
-        $response = \Password::reset($credentials, function ($user, $password) use (&$token) {
245
-            $user->password = bcrypt($password);
246
-            $user->save();
235
+	/**
236
+	 * Reset the given user's password.
237
+	 *
238
+	 * @param  array  $credentials
239
+	 * @return integer
240
+	 */
241
+	public function resetPassword($credentials)
242
+	{
243
+		$token    = false;
244
+		$response = \Password::reset($credentials, function ($user, $password) use (&$token) {
245
+			$user->password = bcrypt($password);
246
+			$user->save();
247 247
 
248
-            $token = \JWTAuth::fromUser($user);
249
-        });
248
+			$token = \JWTAuth::fromUser($user);
249
+		});
250 250
 
251 251
 
252
-        switch ($response) {
253
-            case \Password::PASSWORD_RESET:
254
-                return $token;
252
+		switch ($response) {
253
+			case \Password::PASSWORD_RESET:
254
+				return $token;
255 255
                 
256
-            case \Password::INVALID_TOKEN:
257
-                \ErrorHandler::invalidResetToken();
256
+			case \Password::INVALID_TOKEN:
257
+				\ErrorHandler::invalidResetToken();
258 258
 
259
-            case \Password::INVALID_PASSWORD:
260
-                \ErrorHandler::invalidResetPassword();
259
+			case \Password::INVALID_PASSWORD:
260
+				\ErrorHandler::invalidResetPassword();
261 261
 
262
-            case \Password::INVALID_USER:
263
-                \ErrorHandler::notFound('user');
262
+			case \Password::INVALID_USER:
263
+				\ErrorHandler::notFound('user');
264 264
 
265
-            default:
266
-                \ErrorHandler::generalError();
267
-        }
268
-    }
265
+			default:
266
+				\ErrorHandler::generalError();
267
+		}
268
+	}
269 269
 
270
-    /**
271
-     * Refresh the expired login token.
272
-     *
273
-     * @return string
274
-     */
275
-    public function refreshtoken()
276
-    {
277
-        $token = \JWTAuth::parseToken()->refresh();
270
+	/**
271
+	 * Refresh the expired login token.
272
+	 *
273
+	 * @return string
274
+	 */
275
+	public function refreshtoken()
276
+	{
277
+		$token = \JWTAuth::parseToken()->refresh();
278 278
 
279
-        return ['token' => $token];
280
-    }
279
+		return ['token' => $token];
280
+	}
281 281
 }
Please login to merge, or discard this patch.
Spacing   +5 added lines, -5 removed lines patch added patch discarded remove patch
@@ -23,7 +23,7 @@  discard block
 block discarded – undo
23 23
      * @param  boolean $user
24 24
      * @return boolean
25 25
      */
26
-    public function can($nameOfPermission, $model, $user = false )
26
+    public function can($nameOfPermission, $model, $user = false)
27 27
     {      
28 28
         $user        = $user ?: \JWTAuth::parseToken()->authenticate();
29 29
         $permissions = [];
@@ -33,7 +33,7 @@  discard block
 block discarded – undo
33 33
             \ErrorHandler::tokenExpired();
34 34
         }
35 35
 
36
-        $user->groups->lists('permissions')->each(function ($permission) use (&$permissions, $model){
36
+        $user->groups->lists('permissions')->each(function($permission) use (&$permissions, $model){
37 37
             $permissions = array_merge($permissions, $permission->where('model', $model)->lists('name')->toArray()); 
38 38
         });
39 39
         
@@ -61,7 +61,7 @@  discard block
 block discarded – undo
61 61
      */
62 62
     public function assignGroups($user_id, $group_ids)
63 63
     {
64
-        \DB::transaction(function () use ($user_id, $group_ids) {
64
+        \DB::transaction(function() use ($user_id, $group_ids) {
65 65
             $user = $this->find($user_id);
66 66
             $user->groups()->detach();
67 67
             $user->groups()->attach($group_ids);
@@ -221,7 +221,7 @@  discard block
 block discarded – undo
221 221
             $view->with(['url' => $url]);
222 222
         });
223 223
 
224
-        $response = \Password::sendResetLink($email, function (\Illuminate\Mail\Message $message) {
224
+        $response = \Password::sendResetLink($email, function(\Illuminate\Mail\Message $message) {
225 225
             $message->subject('Your Password Reset Link');
226 226
         });
227 227
 
@@ -241,7 +241,7 @@  discard block
 block discarded – undo
241 241
     public function resetPassword($credentials)
242 242
     {
243 243
         $token    = false;
244
-        $response = \Password::reset($credentials, function ($user, $password) use (&$token) {
244
+        $response = \Password::reset($credentials, function($user, $password) use (&$token) {
245 245
             $user->password = bcrypt($password);
246 246
             $user->save();
247 247
 
Please login to merge, or discard this patch.