@@ -79,7 +79,7 @@ discard block |
||
79 | 79 | private function getCutoff($expire) { |
80 | 80 | $d1 = new \DateTime(); |
81 | 81 | $d2 = clone $d1; |
82 | - $d2->sub(new \DateInterval('PT' . $expire . 'S')); |
|
82 | + $d2->sub(new \DateInterval('PT'.$expire.'S')); |
|
83 | 83 | return $d2->diff($d1); |
84 | 84 | } |
85 | 85 | |
@@ -94,7 +94,7 @@ discard block |
||
94 | 94 | $ip, |
95 | 95 | array $metadata = []) { |
96 | 96 | // No need to log if the bruteforce protection is disabled |
97 | - if($this->config->getSystemValue('auth.bruteforce.protection.enabled', true) === false) { |
|
97 | + if ($this->config->getSystemValue('auth.bruteforce.protection.enabled', true) === false) { |
|
98 | 98 | return; |
99 | 99 | } |
100 | 100 | |
@@ -102,7 +102,7 @@ discard block |
||
102 | 102 | $values = [ |
103 | 103 | 'action' => $action, |
104 | 104 | 'occurred' => $this->timeFactory->getTime(), |
105 | - 'ip' => (string)$ipAddress, |
|
105 | + 'ip' => (string) $ipAddress, |
|
106 | 106 | 'subnet' => $ipAddress->getSubnet(), |
107 | 107 | 'metadata' => json_encode($metadata), |
108 | 108 | ]; |
@@ -120,7 +120,7 @@ discard block |
||
120 | 120 | |
121 | 121 | $qb = $this->db->getQueryBuilder(); |
122 | 122 | $qb->insert('bruteforce_attempts'); |
123 | - foreach($values as $column => $value) { |
|
123 | + foreach ($values as $column => $value) { |
|
124 | 124 | $qb->setValue($column, $qb->createNamedParameter($value)); |
125 | 125 | } |
126 | 126 | $qb->execute(); |
@@ -133,7 +133,7 @@ discard block |
||
133 | 133 | * @return bool |
134 | 134 | */ |
135 | 135 | private function isIPWhitelisted($ip) { |
136 | - if($this->config->getSystemValue('auth.bruteforce.protection.enabled', true) === false) { |
|
136 | + if ($this->config->getSystemValue('auth.bruteforce.protection.enabled', true) === false) { |
|
137 | 137 | return true; |
138 | 138 | } |
139 | 139 | |
@@ -158,7 +158,7 @@ discard block |
||
158 | 158 | |
159 | 159 | $cx = explode('/', $cidr); |
160 | 160 | $addr = $cx[0]; |
161 | - $mask = (int)$cx[1]; |
|
161 | + $mask = (int) $cx[1]; |
|
162 | 162 | |
163 | 163 | // Do not compare ipv4 to ipv6 |
164 | 164 | if (($type === 4 && !filter_var($addr, FILTER_VALIDATE_IP, FILTER_FLAG_IPV4)) || |
@@ -169,9 +169,9 @@ discard block |
||
169 | 169 | $addr = inet_pton($addr); |
170 | 170 | |
171 | 171 | $valid = true; |
172 | - for($i = 0; $i < $mask; $i++) { |
|
173 | - $part = ord($addr[(int)($i/8)]); |
|
174 | - $orig = ord($ip[(int)($i/8)]); |
|
172 | + for ($i = 0; $i < $mask; $i++) { |
|
173 | + $part = ord($addr[(int) ($i / 8)]); |
|
174 | + $orig = ord($ip[(int) ($i / 8)]); |
|
175 | 175 | |
176 | 176 | $part = $part & (15 << (1 - ($i % 2))); |
177 | 177 | $orig = $orig & (15 << (1 - ($i % 2))); |
@@ -200,7 +200,7 @@ discard block |
||
200 | 200 | */ |
201 | 201 | public function getDelay($ip, $action = '') { |
202 | 202 | $ipAddress = new IpAddress($ip); |
203 | - if ($this->isIPWhitelisted((string)$ipAddress)) { |
|
203 | + if ($this->isIPWhitelisted((string) $ipAddress)) { |
|
204 | 204 | return 0; |
205 | 205 | } |
206 | 206 | |
@@ -226,7 +226,7 @@ discard block |
||
226 | 226 | |
227 | 227 | $maxDelay = 30; |
228 | 228 | $firstDelay = 0.1; |
229 | - if ($attempts > (8 * PHP_INT_SIZE - 1)) { |
|
229 | + if ($attempts > (8 * PHP_INT_SIZE - 1)) { |
|
230 | 230 | // Don't ever overflow. Just assume the maxDelay time:s |
231 | 231 | $firstDelay = $maxDelay; |
232 | 232 | } else { |