@@ -18,7 +18,7 @@ |
||
18 | 18 | /** |
19 | 19 | * Assign the permissions to the admin role. |
20 | 20 | */ |
21 | - \DB::table('permissions')->orderBy('created_at', 'asc')->whereIn('model', ['report'])->each(function ($permission) use ($adminRoleId) { |
|
21 | + \DB::table('permissions')->orderBy('created_at', 'asc')->whereIn('model', ['report'])->each(function($permission) use ($adminRoleId) { |
|
22 | 22 | \DB::table('permission_role')->insert( |
23 | 23 | [ |
24 | 24 | 'permission_id' => $permission->id, |
@@ -11,6 +11,6 @@ |
||
11 | 11 | | |
12 | 12 | */ |
13 | 13 | |
14 | -Broadcast::channel('users.{id}', function ($user, $id) { |
|
14 | +Broadcast::channel('users.{id}', function($user, $id) { |
|
15 | 15 | return (int) $user->id === (int) $id; |
16 | 16 | }); |
@@ -63,7 +63,7 @@ |
||
63 | 63 | return \Response::json(['errors' => [$errors]], $exception->getStatusCode()); |
64 | 64 | } elseif ($exception instanceof \Illuminate\Validation\ValidationException) { |
65 | 65 | return \Response::json(['errors' => $exception->errors()], 422); |
66 | - } elseif (! $exception instanceof \Symfony\Component\ErrorHandler\Error\FatalError) { |
|
66 | + } elseif ( ! $exception instanceof \Symfony\Component\ErrorHandler\Error\FatalError) { |
|
67 | 67 | return parent::render($request, $exception); |
68 | 68 | } |
69 | 69 | } |
@@ -25,7 +25,7 @@ |
||
25 | 25 | { |
26 | 26 | $this->registerPolicies(); |
27 | 27 | |
28 | - Passport::routes(function ($router) { |
|
28 | + Passport::routes(function($router) { |
|
29 | 29 | $router->forAuthorization(); |
30 | 30 | $router->forAccessTokens(); |
31 | 31 | $router->forPersonalAccessTokens(); |
@@ -56,8 +56,8 @@ discard block |
||
56 | 56 | $permission = $routeActions[1]; |
57 | 57 | |
58 | 58 | $this->auth->shouldUse('api'); |
59 | - if (! in_array($permission, $skipLoginCheck)) { |
|
60 | - $this->authMiddleware->handle($request, function ($request) use ($modelName, $skipPermissionCheck, $skipLoginCheck, $permission) { |
|
59 | + if ( ! in_array($permission, $skipLoginCheck)) { |
|
60 | + $this->authMiddleware->handle($request, function($request) use ($modelName, $skipPermissionCheck, $skipLoginCheck, $permission) { |
|
61 | 61 | $user = $this->auth->user(); |
62 | 62 | $isPasswordClient = $user->token()->client->password_client; |
63 | 63 | |
@@ -66,7 +66,7 @@ discard block |
||
66 | 66 | } |
67 | 67 | |
68 | 68 | if ($isPasswordClient && (in_array($permission, $skipPermissionCheck) || $this->userService->can($permission, $modelName))) { |
69 | - } elseif (! $isPasswordClient && $user->tokenCan($modelName.'-'.$permission)) { |
|
69 | + } elseif ( ! $isPasswordClient && $user->tokenCan($modelName.'-'.$permission)) { |
|
70 | 70 | } else { |
71 | 71 | \Errors::noPermissions(); |
72 | 72 | } |
@@ -74,7 +74,7 @@ |
||
74 | 74 | if ($this->cacheConfig && $this->cacheConfig == 'cache') { |
75 | 75 | $page = \Request::get('page') !== null ? \Request::get('page') : '1'; |
76 | 76 | $cacheKey = $name.$page.\Session::get('locale').serialize($arguments); |
77 | - return $this->cache->tags([$this->cacheTag])->rememberForever($cacheKey, function () use ($arguments, $name) { |
|
77 | + return $this->cache->tags([$this->cacheTag])->rememberForever($cacheKey, function() use ($arguments, $name) { |
|
78 | 78 | return call_user_func_array([$this->repo, $name], $arguments); |
79 | 79 | }); |
80 | 80 | } elseif ($this->cacheConfig && $this->cacheConfig == 'clear') { |
@@ -49,7 +49,7 @@ |
||
49 | 49 | |
50 | 50 | $response = \ApiConsumer::post('/oauth/token', $data); |
51 | 51 | |
52 | - if (! $response->isSuccessful()) { |
|
52 | + if ( ! $response->isSuccessful()) { |
|
53 | 53 | if ($grantType == 'refresh_token') { |
54 | 54 | \Errors::invalidRefreshToken(); |
55 | 55 | } |
@@ -36,7 +36,7 @@ |
||
36 | 36 | public function updated($model) |
37 | 37 | { |
38 | 38 | if ($model->isDirty('blocked') && $model->blocked) { |
39 | - $model->tokens()->each(function ($token) { |
|
39 | + $model->tokens()->each(function($token) { |
|
40 | 40 | \Core::oauthClients()->revokeAccessToken($token); |
41 | 41 | }); |
42 | 42 | } |
@@ -43,9 +43,9 @@ |
||
43 | 43 | /** |
44 | 44 | * Check report existance and permission. |
45 | 45 | */ |
46 | - if (! $report) { |
|
46 | + if ( ! $report) { |
|
47 | 47 | \Errors::notFound('report'); |
48 | - } elseif (! $skipPermission && ! $this->userService->can($report->view_name, 'report')) { |
|
48 | + } elseif ( ! $skipPermission && ! $this->userService->can($report->view_name, 'report')) { |
|
49 | 49 | \Errors::noPermissions(); |
50 | 50 | } |
51 | 51 |