@@ -59,7 +59,7 @@ discard block |
||
59 | 59 | | This is used to verify the decoded tokens when using RS256 |
60 | 60 | | |
61 | 61 | */ |
62 | - 'authorized_issuers' => [env('AUTH0_DOMAIN')], |
|
62 | + 'authorized_issuers' => [ env('AUTH0_DOMAIN') ], |
|
63 | 63 | |
64 | 64 | /* |
65 | 65 | |-------------------------------------------------------------------------- |
@@ -85,7 +85,7 @@ discard block |
||
85 | 85 | | Token decoding algorithms supported by your API |
86 | 86 | | |
87 | 87 | */ |
88 | - 'supported_algs' => ['RS256'], |
|
88 | + 'supported_algs' => [ 'RS256' ], |
|
89 | 89 | |
90 | 90 | /* |
91 | 91 | |-------------------------------------------------------------------------- |
@@ -38,14 +38,14 @@ |
||
38 | 38 | $user = $this->auth0Repository->getUserByDecodedJWT($tokenInfo); |
39 | 39 | |
40 | 40 | if (!$user) { |
41 | - return response()->json(['error' => 'Unauthorized user'], 401); |
|
41 | + return response()->json([ 'error' => 'Unauthorized user' ], 401); |
|
42 | 42 | } |
43 | 43 | |
44 | 44 | \Auth::login($user); |
45 | 45 | } catch (InvalidTokenException $e) { |
46 | - return response()->json(['error' => 'Invalid or no token set'], 401); |
|
46 | + return response()->json([ 'error' => 'Invalid or no token set' ], 401); |
|
47 | 47 | } catch (CoreException $e) { |
48 | - return response()->json(['error' => $e->getMessage()], 401); |
|
48 | + return response()->json([ 'error' => $e->getMessage() ], 401); |
|
49 | 49 | } |
50 | 50 | |
51 | 51 | return $next($request); |
@@ -27,7 +27,7 @@ discard block |
||
27 | 27 | |
28 | 28 | private function getUserTokenData(): \stdClass |
29 | 29 | { |
30 | - return Cache::remember('testing:http_access_token', 60, function () { |
|
30 | + return Cache::remember('testing:http_access_token', 60, function() { |
|
31 | 31 | $httpClient = new Client(); |
32 | 32 | $response = $httpClient->post(config('laravel-auth0.domain').'oauth/token', [ |
33 | 33 | 'form_params' => [ |
@@ -43,19 +43,19 @@ discard block |
||
43 | 43 | }); |
44 | 44 | } |
45 | 45 | |
46 | - protected function http(string $method, string $route, array $payload = []) |
|
46 | + protected function http(string $method, string $route, array $payload = [ ]) |
|
47 | 47 | { |
48 | 48 | return $this->sendRequest($method, $route, $payload, true); |
49 | 49 | } |
50 | 50 | |
51 | - private function sendRequest(string $method, string $route, array $payload = [], $authenticated = true): \Illuminate\Foundation\Testing\TestResponse |
|
51 | + private function sendRequest(string $method, string $route, array $payload = [ ], $authenticated = true): \Illuminate\Foundation\Testing\TestResponse |
|
52 | 52 | { |
53 | 53 | return $this->json($method, $route, $payload, $authenticated ? [ |
54 | 54 | 'Authorization' => 'Bearer '.$this->getUserTokenData()->id_token, |
55 | - ] : []); |
|
55 | + ] : [ ]); |
|
56 | 56 | } |
57 | 57 | |
58 | - protected function httpNoAuth(string $method, string $route, array $payload = []) |
|
58 | + protected function httpNoAuth(string $method, string $route, array $payload = [ ]) |
|
59 | 59 | { |
60 | 60 | return $this->sendRequest($method, $route, $payload, false); |
61 | 61 | } |
@@ -52,17 +52,17 @@ discard block |
||
52 | 52 | $apiDomain = strtolower(env('API_URL')); |
53 | 53 | $apiDomain = str_replace('http://', '', $apiDomain); |
54 | 54 | $apiDomain = str_replace('https://', '', $apiDomain); |
55 | - $moduleNamespace = $route[1]; |
|
56 | - $moduleName = explode('\\', $moduleNamespace)[1]; |
|
55 | + $moduleNamespace = $route[ 1 ]; |
|
56 | + $moduleName = explode('\\', $moduleNamespace)[ 1 ]; |
|
57 | 57 | $controllerNamespace = $moduleNamespace.'\\'.'Http\\Controllers'; |
58 | 58 | $modelNameSpace = $moduleNamespace.'\\'.'Entities\\'.$moduleName; |
59 | - $filepath = $route[0]; |
|
59 | + $filepath = $route[ 0 ]; |
|
60 | 60 | Route::group([ |
61 | 61 | 'prefix' => 'v1', |
62 | 62 | 'namespace' => $controllerNamespace, |
63 | 63 | 'domain' => $apiDomain, |
64 | - 'middleware' => ['api'], |
|
65 | - ], function (Router $router) use ($filepath) { |
|
64 | + 'middleware' => [ 'api' ], |
|
65 | + ], function(Router $router) use ($filepath) { |
|
66 | 66 | require $filepath; |
67 | 67 | }); |
68 | 68 | Route::model(strtolower($moduleName), $modelNameSpace); |
@@ -78,10 +78,10 @@ discard block |
||
78 | 78 | { |
79 | 79 | foreach ($this->bootstrapService->getConfigs() as $route) { |
80 | 80 | $this->publishes([ |
81 | - $route[0] => config_path($route[1]), |
|
81 | + $route[ 0 ] => config_path($route[ 1 ]), |
|
82 | 82 | ], 'config'); |
83 | 83 | $this->mergeConfigFrom( |
84 | - $route[0], basename($route[1], '.php') |
|
84 | + $route[ 0 ], basename($route[ 1 ], '.php') |
|
85 | 85 | ); |
86 | 86 | } |
87 | 87 | } |
@@ -121,8 +121,8 @@ discard block |
||
121 | 121 | { |
122 | 122 | $app = $this->app; |
123 | 123 | $service = $this->bootstrapService; |
124 | - $this->app->extend('command.seed', function () use ($app, $service) { |
|
125 | - return new SeedCommand($app['db'], $service); |
|
124 | + $this->app->extend('command.seed', function() use ($app, $service) { |
|
125 | + return new SeedCommand($app[ 'db' ], $service); |
|
126 | 126 | }); |
127 | 127 | } |
128 | 128 | } |
@@ -42,7 +42,7 @@ discard block |
||
42 | 42 | |
43 | 43 | public function getUserByUserInfo($userInfo) |
44 | 44 | { |
45 | - return $this->upsertUser($userInfo['profile']); |
|
45 | + return $this->upsertUser($userInfo[ 'profile' ]); |
|
46 | 46 | } |
47 | 47 | |
48 | 48 | protected function upsertUser($profile) |
@@ -51,8 +51,8 @@ discard block |
||
51 | 51 | throw new Exception('Missing token information: Auth0 user id is not set'); |
52 | 52 | } |
53 | 53 | $identifier = explode('|', $profile->user_id); |
54 | - $identityProvider = $identifier[0]; |
|
55 | - $id = $identifier[1]; |
|
54 | + $identityProvider = $identifier[ 0 ]; |
|
55 | + $id = $identifier[ 1 ]; |
|
56 | 56 | |
57 | 57 | $user = $this->service->find($id); |
58 | 58 |