X7ROOT File Manager
Current Path:
/opt/imunify360/venv/lib/python3.11/site-packages/imav/migrations
opt
/
imunify360
/
venv
/
lib
/
python3.11
/
site-packages
/
imav
/
migrations
/
π
..
π
000_noop_migration.py
(947 B)
π
001_fix_scan_unserialization.py
(2.85 KB)
π
002_convert_serialized_scans.py
(2.48 KB)
π
003_add_new_fields_to_malware_history.py
(1.29 KB)
π
003_whmapi1_set_importance_imav.py
(1.64 KB)
π
004_add_malwarehit_owner.py
(1.1 KB)
π
004_patchman_client.py
(1.71 KB)
π
004_plesk_configs.py
(6.3 KB)
π
004_plesk_eula.py
(2.33 KB)
π
005_plesk_cleanup_storage.py
(4.01 KB)
π
005_populate_malwarehit_owner.py
(1.12 KB)
π
006_add_malwarehit_snippet.py
(1.11 KB)
π
007_add_malwarehistory_fileuser.py
(1.13 KB)
π
007_revisium_ignore_list.py
(2.6 KB)
π
008_populate_malwarehistory_foleuser.py
(1.16 KB)
π
008_subscription_permissions.py
(3.29 KB)
π
009_revisium_scan_history.py
(8.99 KB)
π
010_add_malwarehistory_scan_id.py
(1.13 KB)
π
011_add_malwarehistory_index.py
(1.49 KB)
π
012_add_rescan_outdated_scan_type.py
(1.4 KB)
π
013_add_malware_ctime.py
(1.2 KB)
π
014_add_imunify_security.py
(1.22 KB)
π
015_manually_deleted_at_field_added.py
(1.17 KB)
π
016_add_vulnerability_hit_table.py
(2.48 KB)
π
017_add_imunify_patch_subscriptions_table.py
(1.29 KB)
π
__init__.py
(0 B)
π
__pycache__
Editing: 005_plesk_cleanup_storage.py
""" This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.Β See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program.Β If not, see <https://www.gnu.org/licenses/>. CopyrightΒ Β© 2019 Cloud Linux Software Inc. This software is also available under ImunifyAV commercial license, see <https://www.imunify360.com/legal/eula> """ import logging import os from functools import lru_cache from glob import iglob from hashlib import sha1 as hash_func from itertools import cycle from pathlib import Path from tempfile import NamedTemporaryFile from typing import Tuple from defence360agent.utils import run_coro from imav.malwarelib.cleanup.storage import CleanupStorage from imav.migration_utils.other import skip_for_im360 from imav.migration_utils.revisium import get_all_domains, get_vhosts_dir logger = logging.getLogger(__name__) ENCRYPT_KEY = b"IMUNIFY" REVISIUM_DIR_PREFIX = ".revisium" BACKUP_FILE_SUFFIX = ".imunify" BACKUP_LOCATION = ( ".revisium_antivirus_cache", f"{REVISIUM_DIR_PREFIX}*", "backup", f"*{BACKUP_FILE_SUFFIX}", ) @lru_cache(maxsize=1) def _get_backup_file_slices() -> Tuple[slice, slice, slice]: """Get backup file slices for splitting it apart""" key_size = len(ENCRYPT_KEY) digest_size = len(hash_func().hexdigest()) meta_size = key_size + digest_size return ( # content: from the beginning to the meta data slice(None, -meta_size), # key: the first part of the meta data slice(-meta_size, -digest_size), # digest: the last part of the meta data slice(-digest_size, None), ) def decrypt(encrypted: bytes) -> bytes: """Decrypt ex-Revisium backup file content""" decrypted = bytes(c ^ k for c, k in zip(encrypted, cycle(ENCRYPT_KEY))) content_slice, key_slice, digest_slice = _get_backup_file_slices() content = decrypted[content_slice] key = decrypted[key_slice] digest = decrypted[digest_slice] assert key == ENCRYPT_KEY assert hash_func(content).hexdigest() == digest.decode("latin-1") return content def get_orig_filename(filename: str) -> str: """Figure out what the original filename of ex-Revisium backup""" path = Path(filename) domain_id = path.parent.parent.name.removeprefix(REVISIUM_DIR_PREFIX) orig_dir = get_all_domains()[domain_id]["document_root"] return os.path.join(orig_dir, path.name.removesuffix(BACKUP_FILE_SUFFIX)) def transit_backup(filename: str) -> None: """ Decrypt ex-Revisium backup file and copy it to Imunify360 cleanup storage """ with open(filename, "rb") as f: st = os.stat(f.fileno()) encrypted = f.read() decrypted = decrypt(encrypted) with NamedTemporaryFile() as temp: temp.write(decrypted) temp.flush() fd = temp.fileno() os.chmod(fd, st.st_mode) os.chown(fd, st.st_uid, st.st_gid) orig = get_orig_filename(filename) dst = CleanupStorage.path / CleanupStorage.storage_name(orig) # noinspection PyProtectedMember,PyTypeChecker run_coro( CleanupStorage._copy(temp.name, dst, safe_src=True, safe_dst=True) ) def main() -> None: for file in iglob(os.path.join(get_vhosts_dir(), "*", *BACKUP_LOCATION)): try: transit_backup(file) except Exception as e: logger.warning("Failed to transit a backup file %r: %r", file, e) @skip_for_im360 def migrate(migrator, database, fake=False, **kwargs): if fake: return main() @skip_for_im360 def rollback(migrator, database, fake=False, **kwargs): pass if __name__ == "__main__": main()
Upload File
Create Folder