403Webshell
Server IP : 66.29.132.122  /  Your IP : 18.117.158.203
Web Server : LiteSpeed
System : Linux business142.web-hosting.com 4.18.0-553.lve.el8.x86_64 #1 SMP Mon May 27 15:27:34 UTC 2024 x86_64
User : admazpex ( 531)
PHP Version : 7.2.34
Disable Function : NONE
MySQL : OFF  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : ON  |  Sudo : OFF  |  Pkexec : OFF
Directory :  /proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/opt/imunify360/venv/lib/python3.11/site-packages/imav/malwarelib/scan/mds/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ Back ]     

Current File : /proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/opt/imunify360/venv/lib/python3.11/site-packages/imav/malwarelib/scan/mds/restore.py
"""
This program is free software: you can redistribute it and/or modify it under
the terms of the GNU General Public License as published by
the Free Software Foundation, either version 3 of the License,
or (at your option) any later version.


This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. 
See the GNU General Public License for more details.


You should have received a copy of the GNU General Public License
 along with this program.  If not, see <https://www.gnu.org/licenses/>.

Copyright © 2019 Cloud Linux Software Inc.

This software is also available under ImunifyAV commercial license,
see <https://www.imunify360.com/legal/eula>
"""
import hashlib
import logging
import uuid

from defence360agent.contracts.config import Malware, MalwareScanIntensity
from defence360agent.contracts.messages import MessageType
from defence360agent.internals.the_sink import TheSink
from defence360agent.utils import resource_limits
from imav.malwarelib.config import (
    MalwareScanResourceType,
    RESTORE_ORIGINAL_INTENSITY_KEY,
)
from imav.malwarelib.model import MalwareHit
from imav.malwarelib.scan.mds import MDS_PATH
from imav.malwarelib.scan.mds.detached import MDSDetachedRestoreDir
from imav.malwarelib.utils import hash_path

logger = logging.getLogger(__name__)


class MalwareDatabaseRestore:
    def __init__(self, *, app_name, path, restore_id=None):
        self.app_name = app_name
        self.path = path
        self.restore_id = restore_id or uuid.uuid4().hex

    def cmd(self, work_dir: MDSDetachedRestoreDir):
        return [
            "/opt/ai-bolit/wrapper",
            MDS_PATH,
            "--restore",
            storage_path(self.path, self.app_name),
            "--path",
            self.path,
            "--app-name",
            self.app_name,
            "--report-file",
            str(work_dir.report_file),
            "--detached",
            self.restore_id,
            "--progress",
            str(work_dir.progress_file),
            "--db-timeout",
            str(Malware.MDS_DB_TIMEOUT),
        ]

    async def restore(self):
        with MDSDetachedRestoreDir(self.restore_id) as work_dir:
            cmd = self.cmd(work_dir)

            with work_dir.log_file.open(
                mode="w"
            ) as l_f, work_dir.err_file.open(mode="w") as e_f:
                logger.info("Running MDS Restore with: %s", cmd)
                await resource_limits.create_subprocess(
                    cmd,
                    intensity_cpu=MalwareScanIntensity.CPU,
                    intensity_io=MalwareScanIntensity.IO,
                    start_new_session=True,
                    stdout=l_f,
                    stderr=e_f,
                    cwd=str(work_dir),
                    key=RESTORE_ORIGINAL_INTENSITY_KEY,
                )


def storage_path(path: str, app_name: str):
    return "/var/imunify360/cleanup_storage/" + hash_path(
        path + app_name, hash_provider=hashlib.sha384
    )


async def restore_hits(hits, sink: TheSink):
    db_hits = [
        hit
        for hit in hits
        if hit.resource_type == MalwareScanResourceType.DB.value
    ]

    hit: MalwareHit
    for hit in db_hits:
        await sink.process_message(
            MessageType.MalwareDatabaseRestoreTask(
                path=hit.orig_file, app_name=hit.app_name
            )
        )

Youez - 2016 - github.com/yon3zu
LinuXploit