summaryrefslogtreecommitdiffstats
path: root/perl-install/standalone
diff options
context:
space:
mode:
authorOlivier Blin <oblin@mandriva.org>2005-08-12 12:12:52 +0000
committerOlivier Blin <oblin@mandriva.org>2005-08-12 12:12:52 +0000
commitc274e0785bdc544a31687a3b68c27549b9459e79 (patch)
treee801eaf303fa2ffc460089b9899dfa7409a496b0 /perl-install/standalone
parent561fd9c6c0c7d0ba2b536a46583757efcf865cf6 (diff)
downloaddrakx-c274e0785bdc544a31687a3b68c27549b9459e79.tar
drakx-c274e0785bdc544a31687a3b68c27549b9459e79.tar.gz
drakx-c274e0785bdc544a31687a3b68c27549b9459e79.tar.bz2
drakx-c274e0785bdc544a31687a3b68c27549b9459e79.tar.xz
drakx-c274e0785bdc544a31687a3b68c27549b9459e79.zip
perl_checker fixes
Diffstat (limited to 'perl-install/standalone')
-rw-r--r--perl-install/standalone/net_applet8
1 files changed, 4 insertions, 4 deletions
diff --git a/perl-install/standalone/net_applet b/perl-install/standalone/net_applet
index 069ff4559..37399329c 100644
--- a/perl-install/standalone/net_applet
+++ b/perl-install/standalone/net_applet
@@ -101,10 +101,10 @@ $balloon = Gtk2::Balloon->new_from_window($icon->window);
$balloon->add_events('button-press-mask');
$balloon->signal_connect(hide => sub {
#- on timeout, apply default policy
- exists $attacks_queue[0]->{handled} or set_blacklist_verdict($attacks_queue[0]->{seq}, undef);
+ exists $attacks_queue[0]{handled} or set_blacklist_verdict($attacks_queue[0]{seq}, undef);
});
$balloon->signal_connect(button_press_event => sub {
- $attacks_queue[0]->{handled} = 1;
+ $attacks_queue[0]{handled} = 1;
Gtk2::Balloon::hide_text($balloon);
ask_attack_verdict($attacks_queue[0]);
});
@@ -324,7 +324,7 @@ sub get_unprocessed_attacks() {
}
sub handle_attack {
- my $attack = { mapn { $_[0] => $_[1] } [ 'seq', 'timestamp', 'indev', 'prefix', 'sensor', 'protocol', 'addr', 'port', 'icmp_type'], \@_ };
+ my $attack = { mapn { $_[0] => $_[1] } [ 'seq', 'timestamp', 'indev', 'prefix', 'sensor', 'protocol', 'addr', 'port', 'icmp_type' ], \@_ };
$attack->{ip_addr} = network::activefw::get_ip_address($attack->{addr});
$attack->{hostname} = network::activefw::resolve_address($attack->{ip_addr});
$attack->{service} = network::activefw::get_service($attack->{port});
@@ -346,7 +346,7 @@ sub set_blacklist_verdict {
shift @attacks_queue;
#- wait for some time so that the new balloon is noticeable
- @attacks_queue and Glib::Timeout->add(500, sub { notify_attack($attacks_queue[0]); 0; });
+ @attacks_queue and Glib::Timeout->add(500, sub { notify_attack($attacks_queue[0]); 0 });
}
sub notify_attack {