晋太元中,武陵人捕鱼为业。缘溪行,忘路之远近。忽逢桃花林,夹岸数百步,中无杂树,芳草鲜美,落英缤纷。渔人甚异之,复前行,欲穷其林。 林尽水源,便得一山,山有小口,仿佛若有光。便舍船,从口入。初极狭,才通人。复行数十步,豁然开朗。土地平旷,屋舍俨然,有良田、美池、桑竹之属。阡陌交通,鸡犬相闻。其中往来种作,男女衣着,悉如外人。黄发垂髫,并怡然自乐。 见渔人,乃大惊,问所从来。具答之。便要还家,设酒杀鸡作食。村中闻有此人,咸来问讯。自云先世避秦时乱,率妻子邑人来此绝境,不复出焉,遂与外人间隔。问今是何世,乃不知有汉,无论魏晋。此人一一为具言所闻,皆叹惋。余人各复延至其家,皆出酒食。停数日,辞去。此中人语云:“不足为外人道也。”(间隔 一作:隔绝) 既出,得其船,便扶向路,处处志之。及郡下,诣太守,说如此。太守即遣人随其往,寻向所志,遂迷,不复得路。 南阳刘子骥,高尚士也,闻之,欣然规往。未果,寻病终。后遂无问津者。
| DIR:/opt/imunify360/venv/lib/python3.11/site-packages/imav/contracts/ |
| Current File : //opt/imunify360/venv/lib/python3.11/site-packages/imav/contracts/imunify_patch_id.py |
"""
This program is free software: you can redistribute it and/or modify it under
the terms of the GNU General Public License as published by
the Free Software Foundation, either version 3 of the License,
or (at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
See the GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program. If not, see <https://www.gnu.org/licenses/>.
Copyright © 2019 Cloud Linux Software Inc.
This software is also available under ImunifyAV commercial license,
see <https://www.imunify360.com/legal/eula>
"""
import asyncio
import json
import logging
import pwd
import uuid
from collections import defaultdict
from functools import lru_cache
from itertools import islice
from pathlib import Path
from typing import Any
from urllib.parse import parse_qsl, urlencode, urlparse, urlunparse
from defence360agent.internals.iaid import IndependentAgentIDAPI
from defence360agent.subsys.panels.base import PanelException
from defence360agent.subsys.panels.hosting_panel import HostingPanel
from defence360agent.utils import (
async_lru_cache,
log_error_and_ignore,
safe_fileops,
)
from imav.malwarelib.api.imunify_patch_subscription import (
ImunifyPatchSubscriptionAPI,
)
from imav.malwarelib.api.vulnerability import VulnerabilityAPI
from imav.malwarelib.config import VulnerabilityHitStatus
from imav.malwarelib.model import VulnerabilityHit
IMUNIFY_PATCH_ID_FILE = ".imunify_patch_id"
PURCHASE_URL_MAX_WEBSITES = 5 # Take only first 5 domains for better display in UI. Not used anywhere else.
MAX_SEVERITY_COUNT = 10
logger = logging.getLogger(__name__)
class ImunifyPatchIdError(Exception):
pass
class DiskQuotaError(Exception):
pass
ImunifyPatchUserId = str
async def ensure_id_file(username: str) -> ImunifyPatchUserId:
"""Ensure the Imunify Patch ID file exists for the given user.
This function checks if the Imunify Patch ID file exists in the user's
home directory. If it does not exist, it generates a new ID, writes it
to the file, and returns the ID. If the file already exists, it reads
and returns the existing ID.
Args:
username (str): The username for which to ensure the ID file.
Returns:
ImunifyPatchUserId: The Imunify Patch user ID.
"""
id_file = await _get_id_file(username)
if _id := _read_id_file(id_file):
return _id
_id = _generate_id()
await _write_id_file(id_file, _id)
return _id
@log_error_and_ignore()
async def get_imunify_patch_id(username: str) -> ImunifyPatchUserId:
async with get_lock(username):
try:
return await ensure_id_file(username)
except DiskQuotaError as e:
logger.warning(
"Unable to ensure %s user id file %s",
username,
e,
)
@lru_cache(maxsize=None)
def get_lock(username: str):
return asyncio.Lock()
async def _get_id_file(username: str) -> Path:
"""Get a file with Imunify Patch user id and create it if does not exist"""
try:
user_pwd = pwd.getpwnam(username)
except KeyError as e:
logger.error(f"No such user: {username}")
raise ImunifyPatchIdError(f"No such user {username}") from e
else:
id_file = Path(user_pwd.pw_dir) / IMUNIFY_PATCH_ID_FILE
if not id_file.exists():
if not id_file.parent.exists():
logger.error(f"No such user homedir: {id_file.parent}")
raise ImunifyPatchIdError(
f"No such user homedir: {id_file.parent}"
)
try:
await safe_fileops.touch(str(id_file))
except (PermissionError, OSError) as e:
if "Disk quota exceeded" in str(e):
raise DiskQuotaError from e
else:
logger.error(
"Unable to put %s in user home dir %s",
IMUNIFY_PATCH_ID_FILE,
e,
)
raise ImunifyPatchIdError from e
return id_file
def _generate_id() -> ImunifyPatchUserId:
"""Generate Imunify Patch id"""
return uuid.uuid4().hex
def _read_id_file(id_file: Path) -> ImunifyPatchUserId | None:
"""Read Imunify Patch id from `id_file`.
If id is not found, return `None`.
"""
with id_file.open("r") as f:
for line in reversed(f.readlines()):
if line and not line.startswith("#"):
if imunify_patch_id := line.strip():
return imunify_patch_id
logger.warning(f"Cannot parse {id_file}, file is corrupted or empty")
return None
async def _write_id_file(id_file: Path, _id: ImunifyPatchUserId) -> None:
"""Write Imunify Patch id to `id_file`."""
text = (
"# DO NOT EDIT\n"
"# This file contains Imunify Patch id unique to this user\n"
"\n"
f"{_id}\n"
)
try:
await safe_fileops.write_text(str(id_file), text)
except (OSError, PermissionError) as e:
logger.error(
"Unable to write %s in user home dir: %s", IMUNIFY_PATCH_ID_FILE, e
)
raise ImunifyPatchIdError from e
@async_lru_cache(maxsize=100, ttl=60)
async def get_imunify_patch_purchase_url(username) -> str | None:
# Imunify Patch purchase URL template:
# https://www.cloudlinux.com/purchase-imunify-patch?iaid=<iaid>
# &imunify_patch_user_id=<imunify_patch_user_id>&server_ip=12.23.34.45
# &username=johndoe&websites=example.com,anotherexample.com
# defined in Jira ticket: https://cloudlinux.atlassian.net/browse/DEF-32303
purchase_eligibility = (
await ImunifyPatchSubscriptionAPI.get_purchase_eligibility()
)
if not purchase_eligibility.purchase_url:
return None
iaid = IndependentAgentIDAPI.get_iaid()
imunify_patch_user_id = await get_imunify_patch_id(username)
panel_manager = HostingPanel()
server_ip = panel_manager.get_server_ip()
user_domains = (await panel_manager.get_domains_per_user()).get(
username, []
)
total_websites = len(user_domains)
try:
domain_paths = (await panel_manager.get_domain_paths()).items()
except PanelException as e:
logger.error("Error fetching domain paths: %s", e)
domain_paths = {}
user_domain_paths = {
domain: paths
for domain, paths in domain_paths
if domain in user_domains
}
hits = VulnerabilityHit.select().where(
(VulnerabilityHit.user == username)
& (VulnerabilityHit.status == VulnerabilityHitStatus.VULNERABLE)
)
vulnerable_domains = [
domain
for hit in hits
for domain, doc_roots in user_domain_paths.items()
for path in doc_roots
if hit.orig_file.startswith(path)
]
vulnerabilities = group_by_severity(
await VulnerabilityAPI.get_details(
VulnerabilityHit.get_vulnerabilities_ids(
[hit.as_dict() for hit in hits]
)
)
)
url_args = {
"iaid": iaid,
"imunify_patch_user_id": imunify_patch_user_id or "",
"subscription_target_id": imunify_patch_user_id or "",
"server_ip": server_ip,
"username": username,
"websites": ",".join(user_domains[:PURCHASE_URL_MAX_WEBSITES]),
"total_websites": total_websites,
"vulnerable_domains": len(vulnerable_domains),
"vulnerabilities": json.dumps(vulnerabilities, sort_keys=True),
}
return build_purchase_url(purchase_eligibility.purchase_url, url_args)
def build_purchase_url(base_url: str, params: dict):
parsed_url = urlparse(base_url)
existing_qs = dict(parse_qsl(parsed_url.query, keep_blank_values=True))
existing_qs.update({k: v for k, v in params.items() if v is not None})
new_parsed = parsed_url._replace(query=urlencode(existing_qs, doseq=True))
return urlunparse(new_parsed)
def group_by_severity(
vulnerabilities: dict[str, Any],
limit: int = MAX_SEVERITY_COUNT,
) -> dict[str, dict[str, int]]:
result = defaultdict(lambda: defaultdict(int))
for item in islice(vulnerabilities.values(), limit):
app_name = item["app"]
severity = item.get("severity", "UNKNOWN")
if severity in ("HIGH", "MEDIUM", "LOW", "UNKNOWN"):
result[app_name][severity] += 1
return dict(result)
|