You are here

protected function StrictSchemaDisabledSniff::processVariableInString in Coder 8.3

Same name and namespace in other branches
  1. 8.3.x coder_sniffer/DrupalPractice/Sniffs/Objects/StrictSchemaDisabledSniff.php \DrupalPractice\Sniffs\Objects\StrictSchemaDisabledSniff::processVariableInString()

Called to process variables found in double quoted strings or heredocs.

Note that there may be more than one variable in the string, which will result only in one call for the string or one call per line for heredocs.

Parameters

\PHP_CodeSniffer\Files\File $phpcsFile The PHP_CodeSniffer file where this: token was found.

int $stackPtr The position where the double quoted: string was found.

Return value

void|int Optionally returns a stack pointer. The sniff will not be called again on the current file until the returned stack pointer is reached. Return ($phpcsFile->numTokens + 1) to skip the rest of the file.

File

coder_sniffer/DrupalPractice/Sniffs/Objects/StrictSchemaDisabledSniff.php, line 124

Class

StrictSchemaDisabledSniff
Checks that $strictConfigSchema is not set to FALSE in test classes.

Namespace

DrupalPractice\Sniffs\Objects

Code

protected function processVariableInString(File $phpcsFile, $stackPtr) {
}