File "NullsafeObjectOperatorTest.inc"
Full Path: /home/warrior1/public_html/languages/wp-content/themes/storefront/vendor/squizlabs/php_codesniffer/tests/Core/Tokenizer/NullsafeObjectOperatorTest.inc
File size: 567 bytes
MIME-type: text/x-php
Charset: utf-8
<?php
/*
* Null safe operator.
*/
/* testObjectOperator */
echo $obj->foo;
/* testNullsafeObjectOperator */
echo $obj?->foo;
/* testNullsafeObjectOperatorWriteContext */
// Intentional parse error, but not the concern of the tokenizer.
$foo?->bar->baz = 'baz';
/* testTernaryThen */
echo $obj ? $obj->prop : $other->prop;
/* testParseErrorWhitespaceNotAllowed */
echo $obj ?
-> foo;
/* testParseErrorCommentNotAllowed */
echo $obj ?/*comment*/-> foo;
/* testLiveCoding */
// Intentional parse error. This has to be the last test in the file.
echo $obj?