protected function StrictSchemaDisabledSniff::processVariableInString in Coder 8.3
Same name and namespace in other branches
- 8.3.x coder_sniffer/DrupalPractice/Sniffs/Objects/StrictSchemaDisabledSniff.php \DrupalPractice\Sniffs\Objects\StrictSchemaDisabledSniff::processVariableInString()
Called to process variables found in double quoted strings or heredocs.
Note that there may be more than one variable in the string, which will result only in one call for the string or one call per line for heredocs.
Parameters
\PHP_CodeSniffer\Files\File $phpcsFile The PHP_CodeSniffer file where this: token was found.
int $stackPtr The position where the double quoted: string was found.
Return value
void|int Optionally returns a stack pointer. The sniff will not be called again on the current file until the returned stack pointer is reached. Return ($phpcsFile->numTokens + 1) to skip the rest of the file.
File
- coder_sniffer/
DrupalPractice/ Sniffs/ Objects/ StrictSchemaDisabledSniff.php, line 124
Class
- StrictSchemaDisabledSniff
- Checks that $strictConfigSchema is not set to FALSE in test classes.
Namespace
DrupalPractice\Sniffs\ObjectsCode
protected function processVariableInString(File $phpcsFile, $stackPtr) {
}