403Webshell
Server IP : 66.29.132.122  /  Your IP : 3.148.115.210
Web Server : LiteSpeed
System : Linux business142.web-hosting.com 4.18.0-553.lve.el8.x86_64 #1 SMP Mon May 27 15:27:34 UTC 2024 x86_64
User : admazpex ( 531)
PHP Version : 7.2.34
Disable Function : NONE
MySQL : OFF  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : ON  |  Sudo : OFF  |  Pkexec : OFF
Directory :  /opt/imunify360/venv/lib/python3.11/site-packages/defence360agent/migrations/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ Back ]     

Current File : /opt/imunify360/venv/lib/python3.11/site-packages/defence360agent/migrations/129_fixed_cagefs_unmount.py
import subprocess
import time
import os
from functools import lru_cache
from defence360agent.utils import retry_on, run_with_umask

_SERVICE_NAME = "cagefs"
_COMMAND = "restart"
_CAGEFSCTL_TOOL = "/usr/sbin/cagefsctl"
_WAIT_LOCK = "--wait-lock"


@lru_cache(1)
def systemctl_present(paths=["/usr/bin", "/bin"]):
    """Return whether we can find systemctl in given *paths*."""
    return any(os.path.isfile(os.path.join(p, "systemctl")) for p in paths)


def _restart_cagefs(exc, i):
    if systemctl_present():
        cmd = ["systemctl", _COMMAND, _SERVICE_NAME]
    else:
        cmd = ["service", _SERVICE_NAME, _COMMAND]
    try:
        subprocess.check_call(cmd)
    except Exception:
        pass
    time.sleep(5)


@retry_on(
    subprocess.CalledProcessError,
    max_tries=3,
    on_error=_restart_cagefs,
    silent=True,
)
def _execute_command(cmd):
    subprocess.check_output(cmd, shell=False, stderr=subprocess.STDOUT)


def migrate(migrator, database, fake=False, umask=0o022, **kwargs):
    if fake:
        return
    cmd_list = [
        [_CAGEFSCTL_TOOL, _WAIT_LOCK, "--force-update-etc"],
        [_CAGEFSCTL_TOOL, _WAIT_LOCK, "--remount-all"],
    ]
    with run_with_umask(umask):
        if os.path.exists(_CAGEFSCTL_TOOL):
            for cmd in cmd_list:
                _execute_command(cmd)


def rollback(migrator, database, fake=False, **kwargs):
    pass

Youez - 2016 - github.com/yon3zu
LinuXploit