summaryrefslogtreecommitdiffstats
path: root/perl-install
diff options
context:
space:
mode:
authorOlivier Blin <oblin@mandriva.org>2005-09-01 16:53:19 +0000
committerOlivier Blin <oblin@mandriva.org>2005-09-01 16:53:19 +0000
commit47cc4246f1ed1a70a90363bfc212aa2a787a9261 (patch)
treecddba8117fc4c56d73fef70161700ddb5eb03d32 /perl-install
parentff8e2f3d63b5728123793358e7d61c7e5296ad61 (diff)
downloaddrakx-backup-do-not-use-47cc4246f1ed1a70a90363bfc212aa2a787a9261.tar
drakx-backup-do-not-use-47cc4246f1ed1a70a90363bfc212aa2a787a9261.tar.gz
drakx-backup-do-not-use-47cc4246f1ed1a70a90363bfc212aa2a787a9261.tar.bz2
drakx-backup-do-not-use-47cc4246f1ed1a70a90363bfc212aa2a787a9261.tar.xz
drakx-backup-do-not-use-47cc4246f1ed1a70a90363bfc212aa2a787a9261.zip
run drakids on click if an alert is still available
Diffstat (limited to 'perl-install')
-rw-r--r--perl-install/standalone/net_applet11
1 files changed, 5 insertions, 6 deletions
diff --git a/perl-install/standalone/net_applet b/perl-install/standalone/net_applet
index 795e64d20..d0bfa77e8 100644
--- a/perl-install/standalone/net_applet
+++ b/perl-install/standalone/net_applet
@@ -87,11 +87,6 @@ gtkadd(my $icon = Gtk2::TrayIcon->new("Net_Applet"),
gtkpack($img = Gtk2::Image->new)
)
);
-$eventbox->signal_connect(button_press_event => sub {
- $_[1]->button == 1 and run_net_monitor();
- $_[1]->button == 3 && $menu and $menu->popup(undef, undef, undef, undef, $_[1]->button, $_[1]->time);
-});
-
$icon->show_all;
my ($dbus, $monitor, $ifw, $interactive_cb, @attacks_queue, $ifw_alert);
@@ -125,6 +120,11 @@ $bubble->signal_connect(clicked => sub {
ask_attack_verdict($attacks_queue[0]);
});
+$eventbox->signal_connect(button_press_event => sub {
+ $_[1]->button == 1 and ($ifw_alert ? run_drakids() : run_net_monitor());
+ $_[1]->button == 3 && $menu and $menu->popup(undef, undef, undef, undef, $_[1]->button, $_[1]->time);
+});
+
checkNetworkForce();
cronNetwork();
cronUpdate();
@@ -397,7 +397,6 @@ sub notify_attack {
}
$bubble->set(N("Interactive Firewall"), Gtk2::Image->new_from_pixbuf($pixbufs{firewall}), $attack->{msg});
$bubble->show(5000);
-
}
sub ask_attack_verdict {