@@ -51,7 +51,7 @@ |
||
| 51 | 51 | */ |
| 52 | 52 | public function render($request, Exception $exception) |
| 53 | 53 | { |
| 54 | - if($exception instanceof AuthorizationException){ |
|
| 54 | + if ($exception instanceof AuthorizationException) { |
|
| 55 | 55 | return $this->unauthorized($request, $exception); |
| 56 | 56 | } |
| 57 | 57 | |
@@ -61,7 +61,7 @@ |
||
| 61 | 61 | protected function unauthorized($request, AuthorizationException $exception) |
| 62 | 62 | { |
| 63 | 63 | return redirect()->route('chief.back.dashboard') |
| 64 | - ->with('messages.error', 'Oeps. Het lijkt erop dat je geen toegang hebt tot dit deel van chief. Vraag even de beheerder voor meer info.'); |
|
| 64 | + ->with('messages.error', 'Oeps. Het lijkt erop dat je geen toegang hebt tot dit deel van chief. Vraag even de beheerder voor meer info.'); |
|
| 65 | 65 | |
| 66 | 66 | } |
| 67 | 67 | |
@@ -26,8 +26,8 @@ |
||
| 26 | 26 | { |
| 27 | 27 | |
| 28 | 28 | return [ |
| 29 | - 'trans.*.title' => 'required|unique:page_translations,title,'. $this->id . ',page_id|max:200', |
|
| 30 | - 'trans.*.slug' => 'required|unique:page_translations,slug,' . $this->id . ',page_id|distinct', |
|
| 29 | + 'trans.*.title' => 'required|unique:page_translations,title,'.$this->id.',page_id|max:200', |
|
| 30 | + 'trans.*.slug' => 'required|unique:page_translations,slug,'.$this->id.',page_id|distinct', |
|
| 31 | 31 | 'trans.*.content' => 'required|max:1500', |
| 32 | 32 | 'trans.*.short' => 'max:700', |
| 33 | 33 | |
@@ -10,7 +10,7 @@ |
||
| 10 | 10 | public function index() |
| 11 | 11 | { |
| 12 | 12 | $pages = Page::sequence()->get(); |
| 13 | - $pages->each(function($page){ |
|
| 13 | + $pages->each(function($page) { |
|
| 14 | 14 | $page->groupedlines = $this->groupLinesByKey($page); |
| 15 | 15 | }); |
| 16 | 16 | return view('squanto::index', compact('pages')); |
@@ -20,7 +20,7 @@ |
||
| 20 | 20 | return redirect('/'); |
| 21 | 21 | } |
| 22 | 22 | |
| 23 | - if (! $request->user()->can($permission)) { |
|
| 23 | + if (!$request->user()->can($permission)) { |
|
| 24 | 24 | abort(403); |
| 25 | 25 | } |
| 26 | 26 | |
@@ -39,7 +39,7 @@ |
||
| 39 | 39 | if (!$this->auth->user() || !$this->auth->user()->isSuperAdmin()) { |
| 40 | 40 | if ($request->ajax()) { |
| 41 | 41 | return response('Unauthorized.', 401); |
| 42 | - } else { |
|
| 42 | + }else { |
|
| 43 | 43 | return redirect()->guest('admin/login'); |
| 44 | 44 | } |
| 45 | 45 | } |
@@ -20,11 +20,11 @@ |
||
| 20 | 20 | return redirect('/'); |
| 21 | 21 | } |
| 22 | 22 | |
| 23 | - if (! $request->user()->hasRole($role)) { |
|
| 23 | + if (!$request->user()->hasRole($role)) { |
|
| 24 | 24 | abort(403); |
| 25 | 25 | } |
| 26 | 26 | |
| 27 | - if (! $request->user()->can($permission)) { |
|
| 27 | + if (!$request->user()->can($permission)) { |
|
| 28 | 28 | abort(403); |
| 29 | 29 | } |
| 30 | 30 | |
@@ -12,12 +12,12 @@ |
||
| 12 | 12 | { |
| 13 | 13 | $optimizerChain = app(OptimizerChain::class); |
| 14 | 14 | |
| 15 | - collect($request->allFiles())->each(function ($file) use ($optimizerChain) { |
|
| 16 | - if(is_array($file)){ |
|
| 17 | - collect($file)->each(function ($media) use ($optimizerChain) { |
|
| 15 | + collect($request->allFiles())->each(function($file) use ($optimizerChain) { |
|
| 16 | + if (is_array($file)) { |
|
| 17 | + collect($file)->each(function($media) use ($optimizerChain) { |
|
| 18 | 18 | $optimizerChain->optimize($media->getPathname()); |
| 19 | 19 | }); |
| 20 | - }else{ |
|
| 20 | + }else { |
|
| 21 | 21 | $optimizerChain->optimize($file->getPathname()); |
| 22 | 22 | } |
| 23 | 23 | }); |
@@ -17,7 +17,7 @@ |
||
| 17 | 17 | collect($file)->each(function ($media) use ($optimizerChain) { |
| 18 | 18 | $optimizerChain->optimize($media->getPathname()); |
| 19 | 19 | }); |
| 20 | - }else{ |
|
| 20 | + } else{ |
|
| 21 | 21 | $optimizerChain->optimize($file->getPathname()); |
| 22 | 22 | } |
| 23 | 23 | }); |
@@ -33,9 +33,9 @@ discard block |
||
| 33 | 33 | */ |
| 34 | 34 | private function honeypot(Request $request) |
| 35 | 35 | { |
| 36 | - if(!$request->exists('your_name') or $request->has('your_name')) |
|
| 36 | + if (!$request->exists('your_name') or $request->has('your_name')) |
|
| 37 | 37 | { |
| 38 | - abort('403','Request blocked due to assumed spam attempt. Honeypot field was filled in.'); |
|
| 38 | + abort('403', 'Request blocked due to assumed spam attempt. Honeypot field was filled in.'); |
|
| 39 | 39 | } |
| 40 | 40 | } |
| 41 | 41 | |
@@ -49,9 +49,9 @@ discard block |
||
| 49 | 49 | */ |
| 50 | 50 | private function timer(Request $request) |
| 51 | 51 | { |
| 52 | - if(!$request->exists('_timer') or (time()-2) <= $request->get('_timer')) |
|
| 52 | + if (!$request->exists('_timer') or (time()-2) <= $request->get('_timer')) |
|
| 53 | 53 | { |
| 54 | - abort('403','Request blocked due to assumed spam attempt. Submission happened too fast.'); |
|
| 54 | + abort('403', 'Request blocked due to assumed spam attempt. Submission happened too fast.'); |
|
| 55 | 55 | } |
| 56 | 56 | } |
| 57 | 57 | } |
| 58 | 58 | \ No newline at end of file |
@@ -3,8 +3,8 @@ discard block |
||
| 3 | 3 | /** |
| 4 | 4 | * Retrieve the logged in admin |
| 5 | 5 | */ |
| 6 | -if(!function_exists('admin')){ |
|
| 7 | - function admin(){ |
|
| 6 | +if (!function_exists('admin')) { |
|
| 7 | + function admin() { |
|
| 8 | 8 | return \Illuminate\Support\Facades\Auth::guard('chief')->user(); |
| 9 | 9 | } |
| 10 | 10 | } |
@@ -12,8 +12,8 @@ discard block |
||
| 12 | 12 | /** |
| 13 | 13 | * Form fields for honeypot protection on form submissions |
| 14 | 14 | */ |
| 15 | -if(!function_exists('honeypot_fields')){ |
|
| 16 | - function honeypot_fields(){ |
|
| 15 | +if (!function_exists('honeypot_fields')) { |
|
| 16 | + function honeypot_fields() { |
|
| 17 | 17 | return '<div style="display:none;"><input type="text" name="your_name"/><input type="hidden" name="_timer" value="'.time().'" /></div>'; |
| 18 | 18 | } |
| 19 | 19 | } |
@@ -23,21 +23,21 @@ discard block |
||
| 23 | 23 | * Retrieve the public asset with a version stamp. |
| 24 | 24 | * This allows for browsercache out of the box |
| 25 | 25 | */ |
| 26 | -if(!function_exists('cached_asset')) |
|
| 26 | +if (!function_exists('cached_asset')) |
|
| 27 | 27 | { |
| 28 | 28 | function cached_asset($filepath, $type = null) |
| 29 | 29 | { |
| 30 | 30 | $manifestPath = $type == 'back' ? '/chief-assets/back' : '/assets'; |
| 31 | 31 | |
| 32 | 32 | // Manifest expects each entry to start with a leading slash - we make sure to deduplicate the manifest path. |
| 33 | - $entry = str_replace($manifestPath,'', '/'.ltrim($filepath,'/') ); |
|
| 33 | + $entry = str_replace($manifestPath, '', '/'.ltrim($filepath, '/')); |
|
| 34 | 34 | |
| 35 | - try{ |
|
| 35 | + try { |
|
| 36 | 36 | |
| 37 | 37 | // Paths should be given relative to the manifestpath so make sure to remove the basepath |
| 38 | - return asset( mix($entry.'/test', $manifestPath) ); |
|
| 38 | + return asset(mix($entry.'/test', $manifestPath)); |
|
| 39 | 39 | } |
| 40 | - catch(\Exception $e) |
|
| 40 | + catch (\Exception $e) |
|
| 41 | 41 | { |
| 42 | 42 | \Illuminate\Support\Facades\Log::error($e); |
| 43 | 43 | |
@@ -36,8 +36,7 @@ |
||
| 36 | 36 | |
| 37 | 37 | // Paths should be given relative to the manifestpath so make sure to remove the basepath |
| 38 | 38 | return asset( mix($entry.'/test', $manifestPath) ); |
| 39 | - } |
|
| 40 | - catch(\Exception $e) |
|
| 39 | + } catch(\Exception $e) |
|
| 41 | 40 | { |
| 42 | 41 | \Illuminate\Support\Facades\Log::error($e); |
| 43 | 42 | |