| @@ -32,7 +32,7 @@ | ||
| 32 | 32 |          $registry = $container->findDefinition('sylius.registry.grid_driver'); | 
| 33 | 33 | |
| 34 | 34 |          foreach ($container->findTaggedServiceIds('sylius.grid_driver') as $id => $attributes) { | 
| 35 | -            if (!isset($attributes[0]['alias']))  { | |
| 35 | +            if (!isset($attributes[0]['alias'])) { | |
| 36 | 36 |                  throw new \InvalidArgumentException('Tagged grid drivers needs to have `alias` attribute.'); | 
| 37 | 37 | } | 
| 38 | 38 | |
| @@ -32,7 +32,7 @@ | ||
| 32 | 32 |          $registry = $container->getDefinition('sylius.registry.grid_filter'); | 
| 33 | 33 | |
| 34 | 34 |          foreach ($container->findTaggedServiceIds('sylius.grid_filter') as $id => $attributes) { | 
| 35 | -            if (!isset($attributes[0]['type']))  { | |
| 35 | +            if (!isset($attributes[0]['type'])) { | |
| 36 | 36 |                  throw new \InvalidArgumentException('Tagged grid filters needs to have `type` attribute.'); | 
| 37 | 37 | } | 
| 38 | 38 | |
| @@ -32,7 +32,7 @@ | ||
| 32 | 32 |          $registry = $container->getDefinition('sylius.registry.grid_filter'); | 
| 33 | 33 | |
| 34 | 34 |          foreach ($container->findTaggedServiceIds('sylius.grid_filter') as $id => $attributes) { | 
| 35 | -            if (!isset($attributes[0]['type']))  { | |
| 35 | +            if (!isset($attributes[0]['type'])) { | |
| 36 | 36 |                  throw new \InvalidArgumentException('Tagged grid filters needs to have `type` attribute.'); | 
| 37 | 37 | } | 
| 38 | 38 | |
| @@ -51,13 +51,13 @@ | ||
| 51 | 51 | |
| 52 | 52 |          foreach ($securityRoles as $securityRole) { | 
| 53 | 53 |              if (!$user->hasRole($securityRole)) { | 
| 54 | -                $output->writeln(sprintf('<error>User "%s" didn\'t have "%s" Security role.</error>', (string)$user, $securityRole)); | |
| 54 | +                $output->writeln(sprintf('<error>User "%s" didn\'t have "%s" Security role.</error>', (string) $user, $securityRole)); | |
| 55 | 55 | $error = true; | 
| 56 | 56 | continue; | 
| 57 | 57 | } | 
| 58 | 58 | |
| 59 | 59 | $user->removeRole($securityRole); | 
| 60 | -            $output->writeln(sprintf('Security role <comment>%s</comment> has been removed from user <comment>%s</comment>', $securityRole, (string)$user)); | |
| 60 | +            $output->writeln(sprintf('Security role <comment>%s</comment> has been removed from user <comment>%s</comment>', $securityRole, (string) $user)); | |
| 61 | 61 | } | 
| 62 | 62 | |
| 63 | 63 |          if (!$error) { | 
| @@ -232,7 +232,7 @@ | ||
| 232 | 232 | Assert::eq( | 
| 233 | 233 | 1, | 
| 234 | 234 | $this->updatePage->countMembers(), | 
| 235 | -            sprintf('Zone %s should have only %s zone member',$zone->getName(), $zoneMember->getCode()) | |
| 235 | +            sprintf('Zone %s should have only %s zone member', $zone->getName(), $zoneMember->getCode()) | |
| 236 | 236 | ); | 
| 237 | 237 | } | 
| 238 | 238 | |
| @@ -163,7 +163,7 @@ | ||
| 163 | 163 | */ | 
| 164 | 164 | public function orderBy($field, $direction) | 
| 165 | 165 |      { | 
| 166 | - $this->orderBys = [ $field => $direction ]; | |
| 166 | + $this->orderBys = [$field => $direction]; | |
| 167 | 167 | } | 
| 168 | 168 | |
| 169 | 169 | /** | 
| @@ -76,7 +76,7 @@ | ||
| 76 | 76 |      { | 
| 77 | 77 | $this->shouldThrow( | 
| 78 | 78 |              new \RuntimeException('Unknown restrict condition "foo"') | 
| 79 | -        )->during('restrict', [ $comparison, 'foo' ]); | |
| 79 | +        )->during('restrict', [$comparison, 'foo']); | |
| 80 | 80 | } | 
| 81 | 81 | |
| 82 | 82 | function it_should_return_the_expression_builder( | 
| @@ -51,13 +51,13 @@ | ||
| 51 | 51 | |
| 52 | 52 |          foreach ($securityRoles as $securityRole) { | 
| 53 | 53 |              if ($user->hasRole($securityRole)) { | 
| 54 | -                $output->writeln(sprintf('<error>User "%s" did already have "%s" security role.</error>', (string)$user, $securityRole)); | |
| 54 | +                $output->writeln(sprintf('<error>User "%s" did already have "%s" security role.</error>', (string) $user, $securityRole)); | |
| 55 | 55 | $error = true; | 
| 56 | 56 | continue; | 
| 57 | 57 | } | 
| 58 | 58 | |
| 59 | 59 | $user->addRole($securityRole); | 
| 60 | -            $output->writeln(sprintf('Security role <comment>%s</comment> has been added to user <comment>%s</comment>', $securityRole, (string)$user)); | |
| 60 | +            $output->writeln(sprintf('Security role <comment>%s</comment> has been added to user <comment>%s</comment>', $securityRole, (string) $user)); | |
| 61 | 61 | } | 
| 62 | 62 | |
| 63 | 63 |          if (!$error) { | 
| @@ -49,7 +49,7 @@ | ||
| 49 | 49 |          $documentManager->getClassMetadata('stdClass')->willReturn($metadata); | 
| 50 | 50 | $metadata->nodename = null; | 
| 51 | 51 | |
| 52 | -        $this->shouldThrow(new \RuntimeException('In order to use the node name filter on "stdClass" it is necessary to map a field as the "nodename"'))->during('onEvent', [ $event ]); | |
| 52 | +        $this->shouldThrow(new \RuntimeException('In order to use the node name filter on "stdClass" it is necessary to map a field as the "nodename"'))->during('onEvent', [$event]); | |
| 53 | 53 | } | 
| 54 | 54 | |
| 55 | 55 | function it_should_clean_the_name( |