@@ -37,6 +37,5 @@ |
||
37 | 37 | * @class InvalidAlgorithmException |
38 | 38 | * @package Platine\Framework\Security\JWT\Exception |
39 | 39 | */ |
40 | -class InvalidAlgorithmException extends JWTException |
|
41 | -{ |
|
40 | +class InvalidAlgorithmException extends JWTException { |
|
42 | 41 | } |
@@ -37,6 +37,5 @@ |
||
37 | 37 | * @class TokenExpiredException |
38 | 38 | * @package Platine\Framework\Security\JWT\Exception |
39 | 39 | */ |
40 | -class TokenExpiredException extends JWTException |
|
41 | -{ |
|
40 | +class TokenExpiredException extends JWTException { |
|
42 | 41 | } |
@@ -37,6 +37,5 @@ |
||
37 | 37 | * @class InvalidTokenException |
38 | 38 | * @package Platine\Framework\Security\JWT\Exception |
39 | 39 | */ |
40 | -class InvalidTokenException extends JWTException |
|
41 | -{ |
|
40 | +class InvalidTokenException extends JWTException { |
|
42 | 41 | } |
@@ -164,7 +164,7 @@ |
||
164 | 164 | } |
165 | 165 | |
166 | 166 | if (!$this->hasParser($contentType)) { |
167 | - // If not, look for a media type with a structured syntax suffix (RFC 6839) |
|
167 | + // If not, look for a media type with a structured syntax suffix (RFC 6839) |
|
168 | 168 | $parts = explode('+', $contentType); |
169 | 169 | |
170 | 170 | if (count($parts) >= 2) { |
@@ -138,11 +138,11 @@ discard block |
||
138 | 138 | */ |
139 | 139 | protected function registerDefaultParsers(): void |
140 | 140 | { |
141 | - $this->registerParser('application/json', static function ($body) { |
|
141 | + $this->registerParser('application/json', static function($body) { |
|
142 | 142 | return Json::decode($body, true); |
143 | 143 | }); |
144 | 144 | |
145 | - $this->registerParser('application/x-www-form-urlencoded', static function ($body) { |
|
145 | + $this->registerParser('application/x-www-form-urlencoded', static function($body) { |
|
146 | 146 | $data = []; |
147 | 147 | parse_str($body, $data); |
148 | 148 | |
@@ -155,7 +155,7 @@ discard block |
||
155 | 155 | * @param ServerRequestInterface $request |
156 | 156 | * @return null|array<mixed>|object |
157 | 157 | */ |
158 | - protected function parseBody(ServerRequestInterface $request): array|object|null |
|
158 | + protected function parseBody(ServerRequestInterface $request): array | object | null |
|
159 | 159 | { |
160 | 160 | $contentType = $this->getRequestContentType($request); |
161 | 161 | if ($contentType === null) { |
@@ -58,8 +58,7 @@ discard block |
||
58 | 58 | * @class BodyParserMiddleware |
59 | 59 | * @package Platine\Framework\Http\Middleware |
60 | 60 | */ |
61 | -class BodyParserMiddleware implements MiddlewareInterface |
|
62 | -{ |
|
61 | +class BodyParserMiddleware implements MiddlewareInterface { |
|
63 | 62 | /** |
64 | 63 | * List of body parser to use |
65 | 64 | * @var array<string, callable> |
@@ -69,8 +68,7 @@ discard block |
||
69 | 68 | /** |
70 | 69 | * Create new instance |
71 | 70 | */ |
72 | - public function __construct() |
|
73 | - { |
|
71 | + public function __construct() { |
|
74 | 72 | $this->registerDefaultParsers(); |
75 | 73 | } |
76 | 74 |
@@ -69,7 +69,7 @@ |
||
69 | 69 | */ |
70 | 70 | public function register(): void |
71 | 71 | { |
72 | - $this->app->bind(Configuration::class, function (ContainerInterface $app) { |
|
72 | + $this->app->bind(Configuration::class, function(ContainerInterface $app) { |
|
73 | 73 | return new Configuration($app->get(Config::class)->get('lang', [])); |
74 | 74 | }); |
75 | 75 | $this->app->share(StorageInterface::class, MemoryStorage::class); |
@@ -61,8 +61,7 @@ |
||
61 | 61 | * @class LangServiceProvider |
62 | 62 | * @package Platine\Framework\Service\Provider |
63 | 63 | */ |
64 | -class LangServiceProvider extends ServiceProvider |
|
65 | -{ |
|
64 | +class LangServiceProvider extends ServiceProvider { |
|
66 | 65 | /** |
67 | 66 | * {@inheritdoc} |
68 | 67 | */ |
@@ -70,7 +70,7 @@ |
||
70 | 70 | 'updated_at' => '?date', |
71 | 71 | ]); |
72 | 72 | |
73 | - $mapper->filter('not_expire', function (Query $q, $date) { |
|
73 | + $mapper->filter('not_expire', function(Query $q, $date) { |
|
74 | 74 | $q->where('expire_at')->gt($date); |
75 | 75 | }); |
76 | 76 | } |
@@ -56,8 +56,7 @@ |
||
56 | 56 | * @package Platine\Framework\Auth\Entity |
57 | 57 | * @extends Entity<Token> |
58 | 58 | */ |
59 | -class Token extends Entity |
|
60 | -{ |
|
59 | +class Token extends Entity { |
|
61 | 60 | /** |
62 | 61 | * |
63 | 62 | * @param EntityMapperInterface<Token> $mapper |
@@ -66,7 +66,7 @@ |
||
66 | 66 | */ |
67 | 67 | public function register(): void |
68 | 68 | { |
69 | - $this->app->bind(Dompdf::class, function (ContainerInterface $app) { |
|
69 | + $this->app->bind(Dompdf::class, function(ContainerInterface $app) { |
|
70 | 70 | $defaultOptions = array( |
71 | 71 | 'isRemoteEnabled' => true |
72 | 72 | ); |
@@ -58,8 +58,7 @@ |
||
58 | 58 | * @class PDFServiceProvider |
59 | 59 | * @package Platine\Framework\Service\Provider |
60 | 60 | */ |
61 | -class PDFServiceProvider extends ServiceProvider |
|
62 | -{ |
|
61 | +class PDFServiceProvider extends ServiceProvider { |
|
63 | 62 | /** |
64 | 63 | * {@inheritdoc} |
65 | 64 | */ |
@@ -37,8 +37,7 @@ |
||
37 | 37 | * @class HttpBadRequestException |
38 | 38 | * @package Platine\Framework\Http\Exception |
39 | 39 | */ |
40 | -class HttpBadRequestException extends HttpSpecialException |
|
41 | -{ |
|
40 | +class HttpBadRequestException extends HttpSpecialException { |
|
42 | 41 | /** |
43 | 42 | * |
44 | 43 | * @var int |
@@ -39,8 +39,7 @@ |
||
39 | 39 | * @class HttpForbiddenException |
40 | 40 | * @package Platine\Framework\Http\Exception |
41 | 41 | */ |
42 | -class HttpForbiddenException extends HttpSpecialException |
|
43 | -{ |
|
42 | +class HttpForbiddenException extends HttpSpecialException { |
|
44 | 43 | /** |
45 | 44 | * |
46 | 45 | * @var int |