Server IP : 66.29.132.122 / Your IP : 18.119.121.170 Web Server : LiteSpeed System : Linux business142.web-hosting.com 4.18.0-553.lve.el8.x86_64 #1 SMP Mon May 27 15:27:34 UTC 2024 x86_64 User : admazpex ( 531) PHP Version : 7.2.34 Disable Function : NONE MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : ON | Sudo : OFF | Pkexec : OFF Directory : /proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/opt/imunify360/venv/lib64/python3.11/site-packages/imav/malwarelib/scan/mds/ |
Upload File : |
""" This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program. If not, see <https://www.gnu.org/licenses/>. Copyright © 2019 Cloud Linux Software Inc. This software is also available under ImunifyAV commercial license, see <https://www.imunify360.com/legal/eula> """ import hashlib import logging import uuid from defence360agent.contracts.config import Malware, MalwareScanIntensity from defence360agent.contracts.messages import MessageType from defence360agent.internals.the_sink import TheSink from defence360agent.utils import resource_limits from imav.malwarelib.config import ( MalwareScanResourceType, RESTORE_ORIGINAL_INTENSITY_KEY, ) from imav.malwarelib.model import MalwareHit from imav.malwarelib.scan.mds import MDS_PATH from imav.malwarelib.scan.mds.detached import MDSDetachedRestoreDir from imav.malwarelib.utils import hash_path logger = logging.getLogger(__name__) class MalwareDatabaseRestore: def __init__(self, *, app_name, path, restore_id=None): self.app_name = app_name self.path = path self.restore_id = restore_id or uuid.uuid4().hex def cmd(self, work_dir: MDSDetachedRestoreDir): return [ "/opt/ai-bolit/wrapper", MDS_PATH, "--restore", storage_path(self.path, self.app_name), "--path", self.path, "--app-name", self.app_name, "--report-file", str(work_dir.report_file), "--detached", self.restore_id, "--progress", str(work_dir.progress_file), "--db-timeout", str(Malware.MDS_DB_TIMEOUT), ] async def restore(self): with MDSDetachedRestoreDir(self.restore_id) as work_dir: cmd = self.cmd(work_dir) with work_dir.log_file.open( mode="w" ) as l_f, work_dir.err_file.open(mode="w") as e_f: logger.info("Running MDS Restore with: %s", cmd) await resource_limits.create_subprocess( cmd, intensity_cpu=MalwareScanIntensity.CPU, intensity_io=MalwareScanIntensity.IO, start_new_session=True, stdout=l_f, stderr=e_f, cwd=str(work_dir), key=RESTORE_ORIGINAL_INTENSITY_KEY, ) def storage_path(path: str, app_name: str): return "/var/imunify360/cleanup_storage/" + hash_path( path + app_name, hash_provider=hashlib.sha384 ) async def restore_hits(hits, sink: TheSink): db_hits = [ hit for hit in hits if hit.resource_type == MalwareScanResourceType.DB.value ] hit: MalwareHit for hit in db_hits: await sink.process_message( MessageType.MalwareDatabaseRestoreTask( path=hit.orig_file, app_name=hit.app_name ) )