@@ -12,12 +12,12 @@ |
||
12 | 12 | { |
13 | 13 | $optimizerChain = app(OptimizerChain::class); |
14 | 14 | |
15 | - collect($request->allFiles())->each(function ($file) use ($optimizerChain) { |
|
15 | + collect($request->allFiles())->each(function($file) use ($optimizerChain) { |
|
16 | 16 | if (is_array($file)) { |
17 | - collect($file)->each(function ($media) use ($optimizerChain) { |
|
17 | + collect($file)->each(function($media) use ($optimizerChain) { |
|
18 | 18 | $optimizerChain->optimize($media->getPathname()); |
19 | 19 | }); |
20 | - } else { |
|
20 | + }else { |
|
21 | 21 | $optimizerChain->optimize($file->getPathname()); |
22 | 22 | } |
23 | 23 | }); |
@@ -18,9 +18,9 @@ |
||
18 | 18 | |
19 | 19 | $onlineModels = UrlHelper::onlineModels(); |
20 | 20 | |
21 | - $links = $onlineModels->reject(function (Visitable $model) { |
|
22 | - return ! $model->url(); |
|
23 | - })->map(function ($model) { |
|
21 | + $links = $onlineModels->reject(function(Visitable $model) { |
|
22 | + return !$model->url(); |
|
23 | + })->map(function($model) { |
|
24 | 24 | $name = (method_exists($model, 'menuLabel') && $model->menuLabel()) ? $model->menuLabel() : (isset($model->title) ? $model->title : $model->url()); |
25 | 25 | |
26 | 26 | return [ |
@@ -65,7 +65,7 @@ |
||
65 | 65 | // Here we will attempt to reset the user's password. If it is successful we |
66 | 66 | // will update the password on an actual user model and persist it to the |
67 | 67 | // database. Otherwise we will parse the error and return the response. |
68 | - $response = $this->broker()->reset($this->credentials($request), function ($user, $password) { |
|
68 | + $response = $this->broker()->reset($this->credentials($request), function($user, $password) { |
|
69 | 69 | $this->resetPassword($user, $password); |
70 | 70 | }); |
71 | 71 |
@@ -16,7 +16,7 @@ |
||
16 | 16 | { |
17 | 17 | $user = auth()->guard('chief')->user(); |
18 | 18 | |
19 | - return view('chief::admin.auth.passwords.edit', ['new_password' => ! $user->password]); |
|
19 | + return view('chief::admin.auth.passwords.edit', ['new_password' => !$user->password]); |
|
20 | 20 | } |
21 | 21 | |
22 | 22 | public function update(Request $request) |
@@ -20,11 +20,11 @@ |
||
20 | 20 | return redirect('/'); |
21 | 21 | } |
22 | 22 | |
23 | - if (! $request->user('chief')->hasRole($role)) { |
|
23 | + if (!$request->user('chief')->hasRole($role)) { |
|
24 | 24 | abort(403); |
25 | 25 | } |
26 | 26 | |
27 | - if (! $request->user('chief')->can($permission)) { |
|
27 | + if (!$request->user('chief')->can($permission)) { |
|
28 | 28 | abort(403); |
29 | 29 | } |
30 | 30 |
@@ -17,7 +17,7 @@ discard block |
||
17 | 17 | |
18 | 18 | public function handle($request, Closure $next) |
19 | 19 | { |
20 | - if (! $request->user('chief') || ! $request->session()) { |
|
20 | + if (!$request->user('chief') || !$request->session()) { |
|
21 | 21 | return $next($request); |
22 | 22 | } |
23 | 23 | |
@@ -29,7 +29,7 @@ discard block |
||
29 | 29 | } |
30 | 30 | } |
31 | 31 | |
32 | - if (! $request->session()->has('chief_password_hash')) { |
|
32 | + if (!$request->session()->has('chief_password_hash')) { |
|
33 | 33 | $this->storePasswordHashInSession($request); |
34 | 34 | } |
35 | 35 | |
@@ -37,7 +37,7 @@ discard block |
||
37 | 37 | $this->logout($request); |
38 | 38 | } |
39 | 39 | |
40 | - return tap($next($request), function () use ($request) { |
|
40 | + return tap($next($request), function() use ($request) { |
|
41 | 41 | $this->storePasswordHashInSession($request); |
42 | 42 | }); |
43 | 43 | } |
@@ -50,7 +50,7 @@ discard block |
||
50 | 50 | */ |
51 | 51 | protected function storePasswordHashInSession($request) |
52 | 52 | { |
53 | - if (! $request->user('chief')) { |
|
53 | + if (!$request->user('chief')) { |
|
54 | 54 | return; |
55 | 55 | } |
56 | 56 |
@@ -38,10 +38,10 @@ |
||
38 | 38 | { |
39 | 39 | // Low level way to only allow TT users |
40 | 40 | // this is not a safe way to handle security and is only used for convenience, not to secure page restriction!! |
41 | - if (! $this->auth->user() || ! $this->authorize('update-squanto')) { |
|
41 | + if (!$this->auth->user() || !$this->authorize('update-squanto')) { |
|
42 | 42 | if ($request->ajax()) { |
43 | 43 | return response('Unauthorized.', 401); |
44 | - } else { |
|
44 | + }else { |
|
45 | 45 | return redirect()->guest('admin/login'); |
46 | 46 | } |
47 | 47 | } |
@@ -20,7 +20,7 @@ |
||
20 | 20 | return redirect('/'); |
21 | 21 | } |
22 | 22 | |
23 | - if (! $request->user('chief')->can($permission)) { |
|
23 | + if (!$request->user('chief')->can($permission)) { |
|
24 | 24 | abort(403); |
25 | 25 | } |
26 | 26 |
@@ -18,17 +18,17 @@ |
||
18 | 18 | public function handle($request, Closure $next) |
19 | 19 | { |
20 | 20 | // Verifies a valid signature and still outside expiration period |
21 | - if (! $request->hasValidSignature()) { |
|
21 | + if (!$request->hasValidSignature()) { |
|
22 | 22 | return redirect()->route('invite.expired'); |
23 | 23 | } |
24 | 24 | |
25 | - if (! $invitation = Invitation::findByToken($request->token)) { |
|
25 | + if (!$invitation = Invitation::findByToken($request->token)) { |
|
26 | 26 | return redirect()->route('invite.expired'); |
27 | 27 | } |
28 | 28 | |
29 | 29 | if (in_array($invitation->getState(InvitationState::KEY), [InvitationState::accepted, InvitationState::revoked])) { |
30 | 30 | // We allow the user to pass if the invitee is already logged in. Otherwise the invite link cannot be reused. |
31 | - if (! auth()->guard('chief')->check() || ! auth()->guard('chief')->user()->is($invitation->invitee)) { |
|
31 | + if (!auth()->guard('chief')->check() || !auth()->guard('chief')->user()->is($invitation->invitee)) { |
|
32 | 32 | return redirect()->route('invite.expired'); |
33 | 33 | } |
34 | 34 | } |