X7ROOT File Manager
Current Path:
/opt/imunify360/venv/lib/python3.11/site-packages/imav/plugins
opt
/
imunify360
/
venv
/
lib
/
python3.11
/
site-packages
/
imav
/
plugins
/
π
..
π
__init__.py
(0 B)
π
__pycache__
π
check_license.py
(9.47 KB)
π
conflicts.py
(3.18 KB)
π
event_hook_executor.py
(3.72 KB)
π
event_hooks.py
(3.47 KB)
π
generic_sensor.py
(6.11 KB)
π
im360_register.py
(2.8 KB)
π
imunify_patch_id.py
(2.12 KB)
π
inotify.py
(1.75 KB)
π
malware_filters.py
(3.68 KB)
π
mr_proper.py
(2.67 KB)
π
plesk_notifications.py
(3.82 KB)
π
post_action.py
(1.72 KB)
π
restore_from_backup.py
(3.37 KB)
π
server_pull.py
(2.56 KB)
π
service_manager.py
(3.93 KB)
π
wordpress.py
(11.43 KB)
Editing: event_hooks.py
""" This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.Β See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program.Β If not, see <https://www.gnu.org/licenses/>. CopyrightΒ Β© 2019 Cloud Linux Software Inc. This software is also available under ImunifyAV commercial license, see <https://www.imunify360.com/legal/eula> """ import logging from pathlib import Path from defence360agent.contracts.hook_events import HookEvent from defence360agent.contracts.plugins import MessageSink, expect from imav.malwarelib.config import MalwareScanType from imav.malwarelib.utils.user_list import panel_users from defence360agent.subsys import notifier logger = logging.getLogger(__name__) async def trigger_event(event_id: str, user: str, body: dict): try: await notifier.trigger_event(event_id, user, body) except Exception as e: logger.error("Failed to trigger an event '%s': %r", event_id, e) async def trigger_scan_event( path: str, scan_id: str, scan_type: str, custom_event_id: str, user_event_id: str, **kwargs ): if scan_type == MalwareScanType.ON_DEMAND: user = "" event_id = custom_event_id elif scan_type in (MalwareScanType.BACKGROUND, MalwareScanType.USER): user = next( ( u["user"] for u in await panel_users() if Path(path) == Path(u["home"]) ), "", ) event_id = user_event_id else: return await trigger_event( event_id, user, {"scan_id": scan_id, "path": path, **kwargs}, ) class EventHooks(MessageSink): async def create_sink(self, loop): self._loop = loop @expect(HookEvent.MalwareDetectedCritical) async def malware_found(self, event): scan_type = event["scan_type"] if scan_type in ( MalwareScanType.ON_DEMAND, MalwareScanType.RESCAN, MalwareScanType.RESCAN_OUTDATED, ): event_id = notifier.CUSTOM_SCAN_MALWARE_FOUND_EVENT_ID elif scan_type in (MalwareScanType.BACKGROUND, MalwareScanType.USER): event_id = notifier.USER_SCAN_MALWARE_FOUND_EVENT_ID else: return users = {hit["username"] for hit in event["DUMP"]} for user in users: await trigger_event(event_id, user, {"scan_id": event["scan_id"]}) @expect(HookEvent.MalwareScanningStarted) async def scan_started(self, event): await trigger_scan_event( event["path"], event["scan_id"], event["scan_type"], notifier.CUSTOM_SCAN_STARTED_EVENT_ID, notifier.USER_SCAN_STARTED_EVENT_ID, started=event["started"], ) @expect(HookEvent.MalwareScanningFinished) async def scan_finished(self, event): await trigger_scan_event( event["path"], event["scan_id"], event["scan_type"], notifier.CUSTOM_SCAN_FINISHED_EVENT_ID, notifier.USER_SCAN_FINISHED_EVENT_ID, )
Upload File
Create Folder