Passed
Push — 2.x ( da19d0...7afaed )
by Terry
02:02
created
src/Firewall/Firewall/MainTrait.php 1 patch
Spacing   +7 added lines, -7 removed lines patch added patch discarded remove patch
@@ -102,7 +102,7 @@  discard block
 block discarded – undo
102 102
 
103 103
         $frequencyQuota = [];
104 104
         foreach ($frequencyDefaults as $k => $quota) {
105
-            $i = 'quota_' .  $k;
105
+            $i = 'quota_' . $k;
106 106
             $frequencyQuota[$k] = $settings['frequency']['config'][$i] ?? $quota;
107 107
         }
108 108
 
@@ -235,7 +235,7 @@  discard block
 block discarded – undo
235 235
         if (is_array($ipList)) {
236 236
             foreach ($ipList as $ip) {
237 237
 
238
-                if (0 === strpos($this->kernel->getCurrentUrl(), $ip['url']) ) {
238
+                if (0 === strpos($this->kernel->getCurrentUrl(), $ip['url'])) {
239 239
     
240 240
                     if ('allow' === $ip['rule']) {
241 241
                         $allowedList[] = $ip['ip'];
@@ -304,7 +304,7 @@  discard block
 block discarded – undo
304 304
     {
305 305
         $setting = $this->getOption('failed_attempts_in_a_row', 'events');
306 306
 
307
-        $enableDataCircle     = $setting['data_circle']['enable']     ?: false;
307
+        $enableDataCircle     = $setting['data_circle']['enable'] ?: false;
308 308
         $enableSystemFirewall = $setting['system_firewall']['enable'] ?: false;
309 309
 
310 310
         $this->kernel->setProperty('deny_attempt_enable', [
@@ -321,7 +321,7 @@  discard block
 block discarded – undo
321 321
         $recordAttempt = $this->getOption('record_attempt');
322 322
 
323 323
         $detectionPeriod = $recordAttempt['detection_period'] ?? 5;
324
-        $timeToReset     = $recordAttempt['time_to_reset']    ?? 1800;
324
+        $timeToReset     = $recordAttempt['time_to_reset'] ?? 1800;
325 325
 
326 326
         $this->kernel->setProperty('record_attempt_detection_period', $detectionPeriod);
327 327
         $this->kernel->setProperty('reset_attempt_counter', $timeToReset);
@@ -335,7 +335,7 @@  discard block
 block discarded – undo
335 335
     protected function setIptablesBridgeDirectory(): void
336 336
     {
337 337
         $iptablesSetting = $this->getOption('config', 'iptables');
338
-        $this->kernel->setProperty('iptables_watching_folder',  $iptablesSetting['watching_folder']);
338
+        $this->kernel->setProperty('iptables_watching_folder', $iptablesSetting['watching_folder']);
339 339
     }
340 340
 
341 341
     /**
@@ -349,7 +349,7 @@  discard block
 block discarded – undo
349 349
 
350 350
         if ($sessionLimitSetting['enable']) {
351 351
 
352
-            $onlineUsers = $sessionLimitSetting['config']['count']  ?? 100;
352
+            $onlineUsers = $sessionLimitSetting['config']['count'] ?? 100;
353 353
             $alivePeriod = $sessionLimitSetting['config']['period'] ?? 300;
354 354
 
355 355
             $this->kernel->limitSession($onlineUsers, $alivePeriod);
@@ -376,7 +376,7 @@  discard block
 block discarded – undo
376 376
 
377 377
             $lastResetTime = $cronjobSetting['config']['last_update'];
378 378
 
379
-            if (!empty($lastResetTime) ) {
379
+            if (!empty($lastResetTime)) {
380 380
                 $lastResetTime = strtotime($lastResetTime);
381 381
             } else {
382 382
                 // @codeCoverageIgnoreStart
Please login to merge, or discard this patch.