Server IP : 66.29.132.122 / Your IP : 3.144.42.128 Web Server : LiteSpeed System : Linux business142.web-hosting.com 4.18.0-553.lve.el8.x86_64 #1 SMP Mon May 27 15:27:34 UTC 2024 x86_64 User : admazpex ( 531) PHP Version : 7.2.34 Disable Function : NONE MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : ON | Sudo : OFF | Pkexec : OFF Directory : /proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/opt/imunify360/venv/lib64/python3.11/site-packages/imav/simple_rpc/ |
Upload File : |
""" This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program. If not, see <https://www.gnu.org/licenses/>. Copyright © 2019 Cloud Linux Software Inc. This software is also available under ImunifyAV commercial license, see <https://www.imunify360.com/legal/eula> """ from imav.rpc_tools.middleware import add_malicious_count from defence360agent.contracts.config import UserType from defence360agent.rpc_tools.middleware import max_count from defence360agent.simple_rpc.schema import ( init_validator as init_base_validator, ) def init_validator(schema_validator, validate_middleware, schema_paths): imav_middleware = { ("malware", "ignore", "list"): [ # need for backward compatibility # convert result -> tuple (max_items, items) -> # dict {max_items:<int>, items:[...]} (max_count, (UserType.ROOT, UserType.NON_ROOT)) ], ("malware", "malicious", "list"): [ (add_malicious_count, (UserType.ROOT, UserType.NON_ROOT)), (max_count, (UserType.ROOT, UserType.NON_ROOT)), ], ("malware", "history", "list"): [ (max_count, (UserType.ROOT, UserType.NON_ROOT)) ], ("malware", "user", "list"): [ (add_malicious_count, (UserType.ROOT, UserType.NON_ROOT)), (max_count, (UserType.ROOT, UserType.NON_ROOT)), ], ("malware", "suspicious", "list"): [ (max_count, (UserType.ROOT, UserType.NON_ROOT)) ], ("malware", "on-demand", "list"): [ (max_count, (UserType.ROOT, UserType.NON_ROOT)) ], ("malware", "on-demand", "list-user"): [ (max_count, (UserType.ROOT, UserType.NON_ROOT)) ], } validator, middleware, middleware_exclude = init_base_validator( schema_validator, validate_middleware, schema_paths ) middleware.update(imav_middleware) return validator, middleware, middleware_exclude