@@ -102,7 +102,7 @@ discard block |
||
| 102 | 102 | |
| 103 | 103 | $frequencyQuota = []; |
| 104 | 104 | foreach ($frequencyDefaults as $k => $quota) { |
| 105 | - $i = 'quota_' . $k; |
|
| 105 | + $i = 'quota_' . $k; |
|
| 106 | 106 | $frequencyQuota[$k] = $settings['frequency']['config'][$i] ?? $quota; |
| 107 | 107 | } |
| 108 | 108 | |
@@ -235,7 +235,7 @@ discard block |
||
| 235 | 235 | if (is_array($ipList)) { |
| 236 | 236 | foreach ($ipList as $ip) { |
| 237 | 237 | |
| 238 | - if (0 === strpos($this->kernel->getCurrentUrl(), $ip['url']) ) { |
|
| 238 | + if (0 === strpos($this->kernel->getCurrentUrl(), $ip['url'])) { |
|
| 239 | 239 | |
| 240 | 240 | if ('allow' === $ip['rule']) { |
| 241 | 241 | $allowedList[] = $ip['ip']; |
@@ -304,7 +304,7 @@ discard block |
||
| 304 | 304 | { |
| 305 | 305 | $setting = $this->getOption('failed_attempts_in_a_row', 'events'); |
| 306 | 306 | |
| 307 | - $enableDataCircle = $setting['data_circle']['enable'] ?: false; |
|
| 307 | + $enableDataCircle = $setting['data_circle']['enable'] ?: false; |
|
| 308 | 308 | $enableSystemFirewall = $setting['system_firewall']['enable'] ?: false; |
| 309 | 309 | |
| 310 | 310 | $this->kernel->setProperty('deny_attempt_enable', [ |
@@ -321,7 +321,7 @@ discard block |
||
| 321 | 321 | $recordAttempt = $this->getOption('record_attempt'); |
| 322 | 322 | |
| 323 | 323 | $detectionPeriod = $recordAttempt['detection_period'] ?? 5; |
| 324 | - $timeToReset = $recordAttempt['time_to_reset'] ?? 1800; |
|
| 324 | + $timeToReset = $recordAttempt['time_to_reset'] ?? 1800; |
|
| 325 | 325 | |
| 326 | 326 | $this->kernel->setProperty('record_attempt_detection_period', $detectionPeriod); |
| 327 | 327 | $this->kernel->setProperty('reset_attempt_counter', $timeToReset); |
@@ -335,7 +335,7 @@ discard block |
||
| 335 | 335 | protected function setIptablesBridgeDirectory(): void |
| 336 | 336 | { |
| 337 | 337 | $iptablesSetting = $this->getOption('config', 'iptables'); |
| 338 | - $this->kernel->setProperty('iptables_watching_folder', $iptablesSetting['watching_folder']); |
|
| 338 | + $this->kernel->setProperty('iptables_watching_folder', $iptablesSetting['watching_folder']); |
|
| 339 | 339 | } |
| 340 | 340 | |
| 341 | 341 | /** |
@@ -349,7 +349,7 @@ discard block |
||
| 349 | 349 | |
| 350 | 350 | if ($sessionLimitSetting['enable']) { |
| 351 | 351 | |
| 352 | - $onlineUsers = $sessionLimitSetting['config']['count'] ?? 100; |
|
| 352 | + $onlineUsers = $sessionLimitSetting['config']['count'] ?? 100; |
|
| 353 | 353 | $alivePeriod = $sessionLimitSetting['config']['period'] ?? 300; |
| 354 | 354 | |
| 355 | 355 | $this->kernel->limitSession($onlineUsers, $alivePeriod); |
@@ -376,7 +376,7 @@ discard block |
||
| 376 | 376 | |
| 377 | 377 | $lastResetTime = $cronjobSetting['config']['last_update']; |
| 378 | 378 | |
| 379 | - if (!empty($lastResetTime) ) { |
|
| 379 | + if (!empty($lastResetTime)) { |
|
| 380 | 380 | $lastResetTime = strtotime($lastResetTime); |
| 381 | 381 | } else { |
| 382 | 382 | // @codeCoverageIgnoreStart |