diff options
author | Olivier Blin <oblin@mandriva.org> | 2005-08-12 12:12:52 +0000 |
---|---|---|
committer | Olivier Blin <oblin@mandriva.org> | 2005-08-12 12:12:52 +0000 |
commit | c274e0785bdc544a31687a3b68c27549b9459e79 (patch) | |
tree | e801eaf303fa2ffc460089b9899dfa7409a496b0 /perl-install/standalone | |
parent | 561fd9c6c0c7d0ba2b536a46583757efcf865cf6 (diff) | |
download | drakx-c274e0785bdc544a31687a3b68c27549b9459e79.tar drakx-c274e0785bdc544a31687a3b68c27549b9459e79.tar.gz drakx-c274e0785bdc544a31687a3b68c27549b9459e79.tar.bz2 drakx-c274e0785bdc544a31687a3b68c27549b9459e79.tar.xz drakx-c274e0785bdc544a31687a3b68c27549b9459e79.zip |
perl_checker fixes
Diffstat (limited to 'perl-install/standalone')
-rw-r--r-- | perl-install/standalone/net_applet | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/perl-install/standalone/net_applet b/perl-install/standalone/net_applet index 069ff4559..37399329c 100644 --- a/perl-install/standalone/net_applet +++ b/perl-install/standalone/net_applet @@ -101,10 +101,10 @@ $balloon = Gtk2::Balloon->new_from_window($icon->window); $balloon->add_events('button-press-mask'); $balloon->signal_connect(hide => sub { #- on timeout, apply default policy - exists $attacks_queue[0]->{handled} or set_blacklist_verdict($attacks_queue[0]->{seq}, undef); + exists $attacks_queue[0]{handled} or set_blacklist_verdict($attacks_queue[0]{seq}, undef); }); $balloon->signal_connect(button_press_event => sub { - $attacks_queue[0]->{handled} = 1; + $attacks_queue[0]{handled} = 1; Gtk2::Balloon::hide_text($balloon); ask_attack_verdict($attacks_queue[0]); }); @@ -324,7 +324,7 @@ sub get_unprocessed_attacks() { } sub handle_attack { - my $attack = { mapn { $_[0] => $_[1] } [ 'seq', 'timestamp', 'indev', 'prefix', 'sensor', 'protocol', 'addr', 'port', 'icmp_type'], \@_ }; + my $attack = { mapn { $_[0] => $_[1] } [ 'seq', 'timestamp', 'indev', 'prefix', 'sensor', 'protocol', 'addr', 'port', 'icmp_type' ], \@_ }; $attack->{ip_addr} = network::activefw::get_ip_address($attack->{addr}); $attack->{hostname} = network::activefw::resolve_address($attack->{ip_addr}); $attack->{service} = network::activefw::get_service($attack->{port}); @@ -346,7 +346,7 @@ sub set_blacklist_verdict { shift @attacks_queue; #- wait for some time so that the new balloon is noticeable - @attacks_queue and Glib::Timeout->add(500, sub { notify_attack($attacks_queue[0]); 0; }); + @attacks_queue and Glib::Timeout->add(500, sub { notify_attack($attacks_queue[0]); 0 }); } sub notify_attack { |