| Total Complexity | 2 |
| Total Lines | 56 |
| Duplicated Lines | 0 % |
| Changes | 1 | ||
| Bugs | 0 | Features | 0 |
| 1 | <?php |
||
| 14 | class SessionRedisConfig extends SprykerSessionRedisConfig |
||
| 15 | { |
||
| 16 | /** |
||
| 17 | * Specification: |
||
| 18 | * - Returns URL patterns that are excluded from Redis locking. |
||
| 19 | * - These patterns are used to identify requests that don't require session locking. |
||
| 20 | * |
||
| 21 | * @api |
||
| 22 | * |
||
| 23 | * @return list<string> |
||
|
|
|||
| 24 | */ |
||
| 25 | public function getSessionRedisLockingExcludedUrlPatterns(): array |
||
| 26 | { |
||
| 27 | return [ |
||
| 28 | '/^.*\/error-page\/*.*$/', |
||
| 29 | '/^.*\/health-check$/', |
||
| 30 | ]; |
||
| 31 | } |
||
| 32 | |||
| 33 | /** |
||
| 34 | * Specification: |
||
| 35 | * - Returns user agent strings used to identify bot traffic. |
||
| 36 | * - Bot traffic is excluded from Redis session locking for better performance. |
||
| 37 | * |
||
| 38 | * @api |
||
| 39 | * |
||
| 40 | * @return list<string> |
||
| 41 | */ |
||
| 42 | public function getSessionRedisLockingExcludedBotUserAgents(): array |
||
| 70 | ]; |
||
| 71 | } |
||
| 73 |
The issue could also be caused by a filter entry in the build configuration. If the path has been excluded in your configuration, e.g.
excluded_paths: ["lib/*"], you can move it to the dependency path list as follows:For further information see https://scrutinizer-ci.com/docs/tools/php/php-scrutinizer/#list-dependency-paths