ACIL FM
Dark
Refresh
Current DIR:
/opt/imunify360/venv/lib/python3.11/site-packages/imav/plugins
/
opt
imunify360
venv
lib
python3.11
site-packages
imav
plugins
Upload
Zip Selected
Delete Selected
Pilih semua
Nama
Ukuran
Permission
Aksi
__pycache__
-
chmod
Open
Rename
Delete
check_license.py
9.47 MB
chmod
View
DL
Edit
Rename
Delete
conflicts.py
3.18 MB
chmod
View
DL
Edit
Rename
Delete
event_hooks.py
3.47 MB
chmod
View
DL
Edit
Rename
Delete
event_hook_executor.py
3.72 MB
chmod
View
DL
Edit
Rename
Delete
generic_sensor.py
6.11 MB
chmod
View
DL
Edit
Rename
Delete
im360_register.py
2.82 MB
chmod
View
DL
Edit
Rename
Delete
imunify_patch_id.py
2.33 MB
chmod
View
DL
Edit
Rename
Delete
inotify.py
1.75 MB
chmod
View
DL
Edit
Rename
Delete
malware_filters.py
3.68 MB
chmod
View
DL
Edit
Rename
Delete
mr_proper.py
2.67 MB
chmod
View
DL
Edit
Rename
Delete
plesk_notifications.py
4.59 MB
chmod
View
DL
Edit
Rename
Delete
post_action.py
1.72 MB
chmod
View
DL
Edit
Rename
Delete
restore_from_backup.py
3.37 MB
chmod
View
DL
Edit
Rename
Delete
server_pull.py
2.56 MB
chmod
View
DL
Edit
Rename
Delete
service_manager.py
3.93 MB
chmod
View
DL
Edit
Rename
Delete
wordpress.py
17.88 MB
chmod
View
DL
Edit
Rename
Delete
__init__.py
0 B
chmod
View
DL
Edit
Rename
Delete
Edit file: /opt/imunify360/venv/lib/python3.11/site-packages/imav/plugins/plesk_notifications.py
""" This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program. If not, see <https://www.gnu.org/licenses/>. Copyright © 2019 Cloud Linux Software Inc. This software is also available under ImunifyAV commercial license, see <https://www.imunify360.com/legal/eula> """ import logging from functools import lru_cache from pathlib import Path from defence360agent.subsys.panels import hosting_panel, plesk from defence360agent.contracts.plugins import MessageSink from defence360agent.contracts.hooks import HooksConfig from defence360agent.subsys import notifier logger = logging.getLogger(__name__) # Use PLESK_NOTIFICATION_SCRIPT_PATH and PLESK_NOTIFICATION_HOOK_PATH # from `defence360agent.subsys.panels.plesk` # when core package with the `DEF-35388` is released SCRIPT_PATH = "/usr/local/psa/admin/plib/modules/imunify360/scripts/send-notifications.php" HOOK_PATH = "/opt/imunify360/venv/share/imunify360/scripts/send-notifications" EVENTS = [ "CUSTOM_SCAN_MALWARE_FOUND", "USER_SCAN_MALWARE_FOUND", "REALTIME_MALWARE_FOUND", ] class PleskNotificationsHooks(MessageSink): async def create_sink(self, loop): """MessageSink method""" if hosting_panel.HostingPanel().NAME != plesk.Plesk.NAME: return if self.is_supported(): if not self.is_applied(): await self.add_hooks() else: await self.remove_hooks() @lru_cache(maxsize=1) def is_supported(self) -> bool: return Path(SCRIPT_PATH).exists() and Path(HOOK_PATH).exists() def is_applied(self) -> bool: config = HooksConfig().get() config_rules = config.get("rules", {}) if not all(event in config_rules for event in EVENTS): return False return all( HOOK_PATH in config_rules[event].get("SCRIPT", {}).get("scripts", []) for event in EVENTS ) async def add_hooks(self): config = HooksConfig().get() data = { "rules": { event: rule for event, rule in config.get("rules", {}).items() if event in EVENTS } } for event in EVENTS: if event not in data["rules"]: data["rules"][event] = {} updated = False for event in EVENTS: rule = data["rules"][event] if HOOK_PATH not in rule.get("SCRIPT", {}).get("scripts", []): if "SCRIPT" not in rule: rule["SCRIPT"] = {} rule["SCRIPT"]["scripts"] = [] elif "scripts" not in rule["SCRIPT"]: rule["SCRIPT"]["scripts"] = [] rule["SCRIPT"]["enabled"] = True rule["SCRIPT"]["scripts"].append(HOOK_PATH) updated = True if updated: HooksConfig().update(data) try: await notifier.config_updated() except ConnectionRefusedError: logger.warning( "Notifier is not running, cannot send CONFIG_UPDATED event" ) else: logger.info("Hooks added and configuration updated") async def remove_hooks(self): config = HooksConfig().get() data = { "rules": { event: rule for event, rule in config.get("rules", {}).items() if event in EVENTS } } updated = False for event, rule in data["rules"].items(): if HOOK_PATH in rule.get("SCRIPT", {}).get("scripts", []): rule["SCRIPT"]["scripts"].remove(HOOK_PATH) rule["SCRIPT"]["enabled"] = len(rule["SCRIPT"]["scripts"]) != 0 updated = True if updated: HooksConfig().update(data) try: await notifier.config_updated() except ConnectionRefusedError: logger.warning( "Notifier is not running, cannot send CONFIG_UPDATED event" ) else: logger.info("Hooks removed and configuration updated")
Simpan
Batal
Isi Zip:
Unzip
Create
Buat Folder
Buat File
Terminal / Execute
Run
Chmod Bulk
All File
All Folder
All File dan Folder
Apply