@@ -31,8 +31,8 @@ discard block |
||
31 | 31 | public function __construct() |
32 | 32 | { |
33 | 33 | $this->middleware('auth')->except('initializeUser', 'submitInitializeUser'); |
34 | - $this->middleware(function ($request, $next) { |
|
35 | - $this->user = auth()->user(); // TODO - is this correct???? |
|
34 | + $this->middleware(function($request, $next) { |
|
35 | + $this->user = auth()->user(); // TODO - is this correct???? |
|
36 | 36 | $this->authorize('hasAccess', 'Manage Users'); |
37 | 37 | return $next($request); |
38 | 38 | }); |
@@ -41,12 +41,12 @@ discard block |
||
41 | 41 | // Show the list of current users to edit |
42 | 42 | public function index() |
43 | 43 | { |
44 | - $userList = new UserCollection(User::with(['UserLogins' => function ($query) { |
|
44 | + $userList = new UserCollection(User::with(['UserLogins' => function($query) { |
|
45 | 45 | $query->latest()->limit(1); |
46 | 46 | }])->get() |
47 | 47 | /** @scrutinizer ignore-call */ |
48 | 48 | ->makeVisible('user_id')); |
49 | - $route = 'admin.user.edit'; |
|
49 | + $route = 'admin.user.edit'; |
|
50 | 50 | |
51 | 51 | return view('admin.userIndex', [ |
52 | 52 | 'userList' => $userList, |
@@ -108,7 +108,7 @@ discard block |
||
108 | 108 | { |
109 | 109 | // Validate the new user form |
110 | 110 | $request->validate([ |
111 | - 'role' => 'required|numeric', // TODO - add validation rule - is in user roles table |
|
111 | + 'role' => 'required|numeric', // TODO - add validation rule - is in user roles table |
|
112 | 112 | 'username' => 'required|unique:users|regex:/^[a-zA-Z0-9_]*$/', |
113 | 113 | 'first_name' => 'required', |
114 | 114 | 'last_name' => 'required', |
@@ -174,17 +174,17 @@ discard block |
||
174 | 174 | $user = new UserResource(User::findOrFail($id)); |
175 | 175 | |
176 | 176 | // Make sure that the user is not trying to deactivate someone with more permissions |
177 | - if ($user->role_id < Auth::user()->role_id) |
|
177 | + if($user->role_id < Auth::user()->role_id) |
|
178 | 178 | { |
179 | 179 | return abort(403); |
180 | 180 | } |
181 | 181 | |
182 | 182 | // Good to go - update user password |
183 | 183 | $roleArr = []; |
184 | - foreach ($roles as $role) { |
|
185 | - if ($role->role_id == 1 && Auth::user()->role_id != 1) { |
|
184 | + foreach($roles as $role) { |
|
185 | + if($role->role_id == 1 && Auth::user()->role_id != 1) { |
|
186 | 186 | continue; |
187 | - } else if ($role->role_id == 2 && Auth::user()->role_id > 1) { |
|
187 | + } else if($role->role_id == 2 && Auth::user()->role_id > 1) { |
|
188 | 188 | continue; |
189 | 189 | } else { |
190 | 190 | // $roleArr[$role->role_id] = $role->name; |
@@ -195,7 +195,7 @@ discard block |
||
195 | 195 | } |
196 | 196 | } |
197 | 197 | |
198 | - Log::debug('Route ' . Route::currentRouteName() . ' visited by User ID-' . Auth::user()->user_id); |
|
198 | + Log::debug('Route '.Route::currentRouteName().' visited by User ID-'.Auth::user()->user_id); |
|
199 | 199 | return view('admin.userEdit', [ |
200 | 200 | 'roles' => $roleArr, |
201 | 201 | 'user' => $user->makeVisible(['user_id', 'username']), |
@@ -232,7 +232,7 @@ discard block |
||
232 | 232 | // Update the user data |
233 | 233 | $user = User::findOrFail($id); |
234 | 234 | |
235 | - if ($user->role_id < Auth::user()->role_id) |
|
235 | + if($user->role_id < Auth::user()->role_id) |
|
236 | 236 | { |
237 | 237 | return abort(403); |
238 | 238 | } |
@@ -275,12 +275,12 @@ discard block |
||
275 | 275 | $user = User::find($request->user_id); |
276 | 276 | |
277 | 277 | // Verify this is a valid user ID |
278 | - if (!$user) { |
|
278 | + if(!$user) { |
|
279 | 279 | $success = false; |
280 | 280 | $reason = 'Cannot find user with this ID'; |
281 | 281 | } |
282 | 282 | // Make sure that the user is not trying to deactivate someone with more permissions |
283 | - else if ($user->role_id < Auth::user()->role_id) { |
|
283 | + else if($user->role_id < Auth::user()->role_id) { |
|
284 | 284 | $success = false; |
285 | 285 | $reason = 'You cannot change password for a user with higher permissions that you. If this user has locked themselves out, have then use the reset link on the login page.'; |
286 | 286 | } |
@@ -293,11 +293,11 @@ discard block |
||
293 | 293 | 'password_expires' => $nextChange |
294 | 294 | ]); |
295 | 295 | $success = true; |
296 | - $reason = 'Password for ' . $user->full_name . ' successfully reset.'; |
|
296 | + $reason = 'Password for '.$user->full_name.' successfully reset.'; |
|
297 | 297 | } |
298 | 298 | |
299 | - Log::debug('Route ' . Route::currentRouteName() . ' visited by User ID-' . Auth::user()->user_id); |
|
300 | - Log::notice('User ID-' . $request->user_id . ' password chagned by ' . Auth::user()->user_id, [ |
|
299 | + Log::debug('Route '.Route::currentRouteName().' visited by User ID-'.Auth::user()->user_id); |
|
300 | + Log::notice('User ID-'.$request->user_id.' password chagned by '.Auth::user()->user_id, [ |
|
301 | 301 | 'success' => $success, |
302 | 302 | 'reason' => $reason, |
303 | 303 | ]); |
@@ -181,12 +181,18 @@ discard block |
||
181 | 181 | |
182 | 182 | // Good to go - update user password |
183 | 183 | $roleArr = []; |
184 | - foreach ($roles as $role) { |
|
185 | - if ($role->role_id == 1 && Auth::user()->role_id != 1) { |
|
184 | + foreach ($roles as $role) |
|
185 | + { |
|
186 | + if ($role->role_id == 1 && Auth::user()->role_id != 1) |
|
187 | + { |
|
186 | 188 | continue; |
187 | - } else if ($role->role_id == 2 && Auth::user()->role_id > 1) { |
|
189 | + } |
|
190 | + else if ($role->role_id == 2 && Auth::user()->role_id > 1) |
|
191 | + { |
|
188 | 192 | continue; |
189 | - } else { |
|
193 | + } |
|
194 | + else |
|
195 | + { |
|
190 | 196 | // $roleArr[$role->role_id] = $role->name; |
191 | 197 | $roleArr[] = [ |
192 | 198 | 'value' => $role->role_id, |
@@ -275,17 +281,20 @@ discard block |
||
275 | 281 | $user = User::find($request->user_id); |
276 | 282 | |
277 | 283 | // Verify this is a valid user ID |
278 | - if (!$user) { |
|
284 | + if (!$user) |
|
285 | + { |
|
279 | 286 | $success = false; |
280 | 287 | $reason = 'Cannot find user with this ID'; |
281 | 288 | } |
282 | 289 | // Make sure that the user is not trying to deactivate someone with more permissions |
283 | - else if ($user->role_id < Auth::user()->role_id) { |
|
290 | + else if ($user->role_id < Auth::user()->role_id) |
|
291 | + { |
|
284 | 292 | $success = false; |
285 | 293 | $reason = 'You cannot change password for a user with higher permissions that you. If this user has locked themselves out, have then use the reset link on the login page.'; |
286 | 294 | } |
287 | 295 | // Good to go - update user password |
288 | - else { |
|
296 | + else |
|
297 | + { |
|
289 | 298 | // Update the user data |
290 | 299 | $user->update( |
291 | 300 | [ |
@@ -15,7 +15,7 @@ discard block |
||
15 | 15 | public function __construct() |
16 | 16 | { |
17 | 17 | $this->middleware('auth'); |
18 | - $this->middleware(function ($request, $next) { |
|
18 | + $this->middleware(function($request, $next) { |
|
19 | 19 | $this->authorize('hasAccess', 'Manage Equipment'); |
20 | 20 | return $next($request); |
21 | 21 | }); |
@@ -121,7 +121,7 @@ discard block |
||
121 | 121 | SystemCategories::find($id)->delete(); |
122 | 122 | return response()->json(['success' => true, 'reason' => 'Category Successfully Deleted']); |
123 | 123 | } |
124 | - catch (\Illuminate\Database\QueryException $e) |
|
124 | + catch(\Illuminate\Database\QueryException $e) |
|
125 | 125 | { |
126 | 126 | return response()->json(['success' => false, 'reason' => 'Category still in use. You must delete all systems attached to this category first.']); |
127 | 127 | } |
@@ -117,7 +117,8 @@ |
||
117 | 117 | */ |
118 | 118 | public function destroy($id) |
119 | 119 | { |
120 | - try { |
|
120 | + try |
|
121 | + { |
|
121 | 122 | SystemCategories::find($id)->delete(); |
122 | 123 | return response()->json(['success' => true, 'reason' => 'Category Successfully Deleted']); |
123 | 124 | } |
@@ -21,7 +21,7 @@ |
||
21 | 21 | // Database primary key |
22 | 22 | protected $primaryKey = 'user_id'; |
23 | 23 | |
24 | - protected $appends = [ 'full_name' ]; |
|
24 | + protected $appends = ['full_name']; |
|
25 | 25 | protected $casts = [ |
26 | 26 | 'created_at' => 'datetime:M d, Y', |
27 | 27 | 'updated_at' => 'datetime:M d, Y', |
@@ -65,8 +65,8 @@ discard block |
||
65 | 65 | private function updatePhoneIcons() |
66 | 66 | { |
67 | 67 | $newIcons = [ |
68 | - ['description' => 'Home', 'icon_class' => 'ti-home'], |
|
69 | - ['description' => 'Work', 'icon_class' => 'ti-briefcase'], |
|
68 | + ['description' => 'Home', 'icon_class' => 'ti-home'], |
|
69 | + ['description' => 'Work', 'icon_class' => 'ti-briefcase'], |
|
70 | 70 | ['description' => 'Mobile', 'icon_class' => 'ti-mobile'], |
71 | 71 | ]; |
72 | 72 | |
@@ -98,7 +98,7 @@ discard block |
||
98 | 98 | { |
99 | 99 | if(!Schema::hasColumn('users', 'role_id')) |
100 | 100 | { |
101 | - Schema::table('users', function (Blueprint $table) { |
|
101 | + Schema::table('users', function(Blueprint $table) { |
|
102 | 102 | $table->integer('role_id')->after('user_id')->unsigned()->default(4); |
103 | 103 | $table->foreign('role_id')->references('role_id')->on('user_role_descriptions')->onUpdate('cascade'); |
104 | 104 | }); |
@@ -325,8 +325,8 @@ discard block |
||
325 | 325 | // Add soft deletes to tech tips table to prevent accidental deletes |
326 | 326 | private function addSoftDeleteToTechTips() |
327 | 327 | { |
328 | - if (!Schema::hasColumn('tech_tips', 'deleted_at')) { |
|
329 | - Schema::table('tech_tips', function (Blueprint $table) { |
|
328 | + if(!Schema::hasColumn('tech_tips', 'deleted_at')) { |
|
329 | + Schema::table('tech_tips', function(Blueprint $table) { |
|
330 | 330 | $table->softDeletes()->after('description'); |
331 | 331 | }); |
332 | 332 | } |
@@ -344,7 +344,7 @@ discard block |
||
344 | 344 | // Migrate over all deactivated users |
345 | 345 | DB::update('UPDATE `users` SET `deleted_at` = "'.Carbon::now().'" WHERE `active` = 0'); |
346 | 346 | // Remove the Active column |
347 | - Schema::table('users', function (Blueprint $table) { |
|
347 | + Schema::table('users', function(Blueprint $table) { |
|
348 | 348 | $table->dropColumn('active'); |
349 | 349 | }); |
350 | 350 | } |
@@ -82,7 +82,8 @@ discard block |
||
82 | 82 | // Added the ability to set an expiration date for user passwords - will force them to change after this expires |
83 | 83 | private function addPasswordExpiresColumn() |
84 | 84 | { |
85 | - if(!Schema::hasColumn('users', 'password_expires')) { |
|
85 | + if(!Schema::hasColumn('users', 'password_expires')) |
|
86 | + { |
|
86 | 87 | Schema::table('users', function(Blueprint $table) { |
87 | 88 | $table->timestamp('password_expires') |
88 | 89 | ->nullable() |
@@ -118,7 +119,8 @@ discard block |
||
118 | 119 | // Added a 'hidden' attribute to system customer data types to allow passwords to not be viewed unless clicked or focus |
119 | 120 | private function addHiddenColumn() |
120 | 121 | { |
121 | - if(!Schema::hasColumn('system_data_field_types', 'hidden')) { |
|
122 | + if(!Schema::hasColumn('system_data_field_types', 'hidden')) |
|
123 | + { |
|
122 | 124 | Schema::table('system_cust_data_types', function(Blueprint $table) { |
123 | 125 | $table->boolean('hidden') |
124 | 126 | ->default(0) |
@@ -130,7 +132,8 @@ discard block |
||
130 | 132 | // Update the File links table - add cust_id and note column |
131 | 133 | private function addColumnsToFileLinksTable() |
132 | 134 | { |
133 | - if(!Schema::hasColumn('file_links', 'cust_id')) { |
|
135 | + if(!Schema::hasColumn('file_links', 'cust_id')) |
|
136 | + { |
|
134 | 137 | Schema::table('file_links', function(Blueprint $table) { |
135 | 138 | $table->integer('cust_id') |
136 | 139 | ->unsigned() |
@@ -139,7 +142,8 @@ discard block |
||
139 | 142 | $table->foreign('cust_id')->references('cust_id')->on('customers')->onUpdate('cascade')->onDelete('cascade'); |
140 | 143 | }); |
141 | 144 | } |
142 | - if(!Schema::hasColumn('file_links', 'note')) { |
|
145 | + if(!Schema::hasColumn('file_links', 'note')) |
|
146 | + { |
|
143 | 147 | Schema::table('file_links', function(Blueprint $table) { |
144 | 148 | $table->longText('note') |
145 | 149 | ->nullable() |
@@ -147,7 +151,8 @@ discard block |
||
147 | 151 | }); |
148 | 152 | // Migrate the instructions from the old table to the new column |
149 | 153 | $instructions = DB::select('SELECT * FROM `file_link_instructions`'); |
150 | - foreach($instructions as $ins) { |
|
154 | + foreach($instructions as $ins) |
|
155 | + { |
|
151 | 156 | FileLinks::find($ins->link_id)->update([ |
152 | 157 | 'note' => $ins->instruction |
153 | 158 | ]); |
@@ -158,7 +163,8 @@ discard block |
||
158 | 163 | // Add Notes column to the file links files table |
159 | 164 | private function addNotesColumnToFileLinkFiles() |
160 | 165 | { |
161 | - if(!Schema::hasColumn('file_link_files', 'note')) { |
|
166 | + if(!Schema::hasColumn('file_link_files', 'note')) |
|
167 | + { |
|
162 | 168 | Schema::table('file_link_files', function(Blueprint $table) { |
163 | 169 | $table->longText('note') |
164 | 170 | ->nullable() |
@@ -166,7 +172,8 @@ discard block |
||
166 | 172 | }); |
167 | 173 | // Migrate the existing notes to the new table |
168 | 174 | $notes = DB::select('SELECT * FROM `file_link_notes`'); |
169 | - foreach($notes as $note) { |
|
175 | + foreach($notes as $note) |
|
176 | + { |
|
170 | 177 | FileLinkFiles::where('file_id', $note->file_id)->update([ |
171 | 178 | 'note' => $note->note |
172 | 179 | ]); |
@@ -177,7 +184,8 @@ discard block |
||
177 | 184 | // Add the documentation column to the tech tips table |
178 | 185 | private function migrateSystemDocumentation() |
179 | 186 | { |
180 | - if(!Schema::hasColumn('tech_tips', 'tip_type_id')) { |
|
187 | + if(!Schema::hasColumn('tech_tips', 'tip_type_id')) |
|
188 | + { |
|
181 | 189 | Schema::table('tech_tips', function(Blueprint $table) { |
182 | 190 | $table->bigInteger('tip_type_id')->unsigned()->after('public')->default(1); |
183 | 191 | $table->foreign('tip_type_id')->references('tip_type_id')->on('tech_tip_types')->onUpdate('cascade'); |
@@ -185,7 +193,8 @@ discard block |
||
185 | 193 | |
186 | 194 | // Move all of the system files over to the tech tips table |
187 | 195 | $sysFiles = DB::select('SELECT * FROM `system_files`'); |
188 | - foreach($sysFiles as $sysFile) { |
|
196 | + foreach($sysFiles as $sysFile) |
|
197 | + { |
|
189 | 198 | $newTip = TechTips::create([ |
190 | 199 | 'user_id' => $sysFile->user_id, |
191 | 200 | 'public' => 0, |
@@ -279,7 +288,8 @@ discard block |
||
279 | 288 | // Remove the system files and system file types table |
280 | 289 | private function removeSystemFilesTables() |
281 | 290 | { |
282 | - if(Schema::hasTable('system_files')) { |
|
291 | + if(Schema::hasTable('system_files')) |
|
292 | + { |
|
283 | 293 | Schema::table('system_files', function(Blueprint $table) { |
284 | 294 | $table->dropForeign(['sys_id']); |
285 | 295 | $table->dropForeign(['type_id']); |
@@ -325,7 +335,8 @@ discard block |
||
325 | 335 | // Add soft deletes to tech tips table to prevent accidental deletes |
326 | 336 | private function addSoftDeleteToTechTips() |
327 | 337 | { |
328 | - if (!Schema::hasColumn('tech_tips', 'deleted_at')) { |
|
338 | + if (!Schema::hasColumn('tech_tips', 'deleted_at')) |
|
339 | + { |
|
329 | 340 | Schema::table('tech_tips', function (Blueprint $table) { |
330 | 341 | $table->softDeletes()->after('description'); |
331 | 342 | }); |
@@ -337,8 +348,7 @@ discard block |
||
337 | 348 | { |
338 | 349 | if(!Schema::hasColumn('users', 'deleted_at')) |
339 | 350 | { |
340 | - Schema::table('users', function(Blueprint $table) |
|
341 | - { |
|
351 | + Schema::table('users', function(Blueprint $table) { |
|
342 | 352 | $table->softDeletes()->after('password_expires'); |
343 | 353 | }); |
344 | 354 | // Migrate over all deactivated users |
@@ -5,7 +5,7 @@ |
||
5 | 5 | use App\UserRolePermissionTypes; |
6 | 6 | use Faker\Generator as Faker; |
7 | 7 | |
8 | -$factory->define(UserRolePermissionTypes::class, function (Faker $faker) { |
|
8 | +$factory->define(UserRolePermissionTypes::class, function(Faker $faker) { |
|
9 | 9 | return [ |
10 | 10 | // |
11 | 11 | 'description' => $faker->words(2, true), |
@@ -5,7 +5,7 @@ |
||
5 | 5 | use App\UserRolePermissions; |
6 | 6 | use Faker\Generator as Faker; |
7 | 7 | |
8 | -$factory->define(UserRolePermissionsFactory::class, function (Faker $faker) { |
|
8 | +$factory->define(UserRolePermissionsFactory::class, function(Faker $faker) { |
|
9 | 9 | return [ |
10 | 10 | // |
11 | 11 | 'role_id' => factory(App\UserRoleTypes::class)->create()->role_id, |