403Webshell
Server IP : 66.29.132.122  /  Your IP : 13.59.72.254
Web Server : LiteSpeed
System : Linux business142.web-hosting.com 4.18.0-553.lve.el8.x86_64 #1 SMP Mon May 27 15:27:34 UTC 2024 x86_64
User : admazpex ( 531)
PHP Version : 7.2.34
Disable Function : NONE
MySQL : OFF  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : ON  |  Sudo : OFF  |  Pkexec : OFF
Directory :  /opt/imunify360/venv/lib/python3.11/site-packages/imav/simple_rpc/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ Back ]     

Current File : /opt/imunify360/venv/lib/python3.11/site-packages/imav/simple_rpc/schema.py
"""
This program is free software: you can redistribute it and/or modify it under
the terms of the GNU General Public License as published by
the Free Software Foundation, either version 3 of the License,
or (at your option) any later version.


This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. 
See the GNU General Public License for more details.


You should have received a copy of the GNU General Public License
 along with this program.  If not, see <https://www.gnu.org/licenses/>.

Copyright © 2019 Cloud Linux Software Inc.

This software is also available under ImunifyAV commercial license,
see <https://www.imunify360.com/legal/eula>
"""
from imav.rpc_tools.middleware import add_malicious_count
from defence360agent.contracts.config import UserType
from defence360agent.rpc_tools.middleware import max_count
from defence360agent.simple_rpc.schema import (
    init_validator as init_base_validator,
)


def init_validator(schema_validator, validate_middleware, schema_paths):
    imav_middleware = {
        ("malware", "ignore", "list"): [
            # need for backward compatibility
            # convert result -> tuple (max_items, items) ->
            # dict {max_items:<int>, items:[...]}
            (max_count, (UserType.ROOT, UserType.NON_ROOT))
        ],
        ("malware", "malicious", "list"): [
            (add_malicious_count, (UserType.ROOT, UserType.NON_ROOT)),
            (max_count, (UserType.ROOT, UserType.NON_ROOT)),
        ],
        ("malware", "history", "list"): [
            (max_count, (UserType.ROOT, UserType.NON_ROOT))
        ],
        ("malware", "user", "list"): [
            (add_malicious_count, (UserType.ROOT, UserType.NON_ROOT)),
            (max_count, (UserType.ROOT, UserType.NON_ROOT)),
        ],
        ("malware", "suspicious", "list"): [
            (max_count, (UserType.ROOT, UserType.NON_ROOT))
        ],
        ("malware", "on-demand", "list"): [
            (max_count, (UserType.ROOT, UserType.NON_ROOT))
        ],
        ("malware", "on-demand", "list-user"): [
            (max_count, (UserType.ROOT, UserType.NON_ROOT))
        ],
    }
    validator, middleware, middleware_exclude = init_base_validator(
        schema_validator, validate_middleware, schema_paths
    )
    middleware.update(imav_middleware)
    return validator, middleware, middleware_exclude

Youez - 2016 - github.com/yon3zu
LinuXploit