summaryrefslogtreecommitdiffstats
path: root/perl-install/standalone/net_applet
diff options
context:
space:
mode:
authorPascal Rigaux <pixel@mandriva.com>2005-06-03 06:12:07 +0000
committerPascal Rigaux <pixel@mandriva.com>2005-06-03 06:12:07 +0000
commite80d8aea22eb4bf86af2679f4f984da7277eee53 (patch)
tree8761dbe50286443e968b658b666eb44173d5d599 /perl-install/standalone/net_applet
parent3983ff898098e7a79113318aa4dde65df50e4288 (diff)
downloaddrakx-e80d8aea22eb4bf86af2679f4f984da7277eee53.tar
drakx-e80d8aea22eb4bf86af2679f4f984da7277eee53.tar.gz
drakx-e80d8aea22eb4bf86af2679f4f984da7277eee53.tar.bz2
drakx-e80d8aea22eb4bf86af2679f4f984da7277eee53.tar.xz
drakx-e80d8aea22eb4bf86af2679f4f984da7277eee53.zip
make perl_checker happy
Diffstat (limited to 'perl-install/standalone/net_applet')
-rw-r--r--perl-install/standalone/net_applet10
1 files changed, 5 insertions, 5 deletions
diff --git a/perl-install/standalone/net_applet b/perl-install/standalone/net_applet
index 8c9d3ec24..28d7c8e11 100644
--- a/perl-install/standalone/net_applet
+++ b/perl-install/standalone/net_applet
@@ -112,7 +112,7 @@ my @attacks_queue;
if ($enable_activefw) {
$activefw = activefw->new(sub {
- my ($con, $msg) = @_;
+ my ($_con, $msg) = @_;
handle_attack($msg->get_args_list) if
$msg->get_interface eq "com.mandrakesoft.activefirewall" &&
$msg->get_path eq "/com/mandrakesoft/activefirewall" &&
@@ -159,7 +159,7 @@ sub netMonitor() {
checkNetwork();
}
sub checkNetwork() {
- my ($gw_intf, $is_up, $gw_address) = $watched_interface ?
+ my ($gw_intf, $_is_up, $gw_address) = $watched_interface ?
($watched_interface, network::tools::get_interface_status($watched_interface)) :
network::tools::get_internet_connection($netc, $intf);
go2State($gw_address ? 'connected' : $gw_intf ? 'disconnected' : 'notconfigured', $gw_intf);
@@ -234,7 +234,7 @@ sub mainQuit() {
Glib::Source->remove($timeout) if $timeout;
Gtk2->main_quit;
}
-sub getAutoStart {
+sub getAutoStart() {
my %p = getVarsFromSh($onstartupfile);
return to_bool($p{AUTOSTART} ne 'FALSE');
}
@@ -245,7 +245,7 @@ sub setAutoStart {
);
}
-sub get_unprocessed_attacks {
+sub get_unprocessed_attacks() {
my @packets = $activefw->get_reports;
while (my @attack = splice(@packets, 0, 9)) {
handle_attack(@attack);
@@ -266,7 +266,7 @@ sub set_attack_verdict {
sub ask_attack_verdict {
my ($attack) = @_;
- my ($seq, $timestamp, $indev, $prefix, $sensor, $protocol, $addr, $port, $icmp_type) = @$attack;
+ my ($seq, $timestamp, $indev, $prefix, $_sensor, $protocol, $addr, $port, $icmp_type) = @$attack;
unless ($interactive_cb->get_active) {
#- let the daemon handle the blacklist policy in automatic mode