晋太元中,武陵人捕鱼为业。缘溪行,忘路之远近。忽逢桃花林,夹岸数百步,中无杂树,芳草鲜美,落英缤纷。渔人甚异之,复前行,欲穷其林。 林尽水源,便得一山,山有小口,仿佛若有光。便舍船,从口入。初极狭,才通人。复行数十步,豁然开朗。土地平旷,屋舍俨然,有良田、美池、桑竹之属。阡陌交通,鸡犬相闻。其中往来种作,男女衣着,悉如外人。黄发垂髫,并怡然自乐。 见渔人,乃大惊,问所从来。具答之。便要还家,设酒杀鸡作食。村中闻有此人,咸来问讯。自云先世避秦时乱,率妻子邑人来此绝境,不复出焉,遂与外人间隔。问今是何世,乃不知有汉,无论魏晋。此人一一为具言所闻,皆叹惋。余人各复延至其家,皆出酒食。停数日,辞去。此中人语云:“不足为外人道也。”(间隔 一作:隔绝) 既出,得其船,便扶向路,处处志之。及郡下,诣太守,说如此。太守即遣人随其往,寻向所志,遂迷,不复得路。 南阳刘子骥,高尚士也,闻之,欣然规往。未果,寻病终。后遂无问津者。
| DIR:/opt/imunify360/venv/lib/python3.11/site-packages/imav/malwarelib/rpc/endpoints/ |
| Current File : //opt/imunify360/venv/lib/python3.11/site-packages/imav/malwarelib/rpc/endpoints/cleanup.py |
"""
This program is free software: you can redistribute it and/or modify it under
the terms of the GNU General Public License as published by
the Free Software Foundation, either version 3 of the License,
or (at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
See the GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program. If not, see <https://www.gnu.org/licenses/>.
Copyright © 2019 Cloud Linux Software Inc.
This software is also available under ImunifyAV commercial license,
see <https://www.imunify360.com/legal/eula>
"""
from defence360agent.contracts.messages import MessageType
from defence360agent.contracts.permissions import (
MS_CLEAN_REQUIRES_MYIMUNIFY_PROTECTION,
check_permission,
)
from defence360agent.feature_management.constants import AV, FULL
from defence360agent.feature_management.lookup import feature
from defence360agent.rpc_tools.lookup import (
CommonEndpoints,
RootEndpoints,
bind,
)
from defence360agent.rpc_tools.validate import validate_av_plus_license
from imav.malwarelib.cleanup.cleaner import MalwareCleanupProxy
from imav.malwarelib.cleanup.storage import restore_hits
from imav.malwarelib.model import MalwareHit
from imav.malwarelib.utils.endpoints import MaliciousEndpointStatus
@feature(AV, [FULL])
class CleanupEndpoints(CommonEndpoints):
@bind("malware", "malicious", "cleanup")
@validate_av_plus_license
async def cleanup(self, ids, standard_only=False, user=None):
await check_permission(MS_CLEAN_REQUIRES_MYIMUNIFY_PROTECTION, user)
hits = MalwareHit.malicious_select(ids, user=user, cleanup=True)
if hits:
await self._sink.process_message(
MessageType.MalwareCleanupTask(
hits=hits,
initiator=user,
standard_only=standard_only,
)
)
@bind("malware", "malicious", "cleanup-all")
@validate_av_plus_license
async def cleanup_all(self, standard_only=False, user=None):
await check_permission(MS_CLEAN_REQUIRES_MYIMUNIFY_PROTECTION, user)
hits = MalwareHit.malicious_select(user=user, cleanup=True)
if hits:
await self._sink.process_message(
MessageType.MalwareCleanupTask(
hits=hits,
initiator=user,
standard_only=standard_only,
)
)
@bind("malware", "malicious", "restore-original")
@validate_av_plus_license
async def restore_original(self, ids, user=None):
hits = MalwareHit.malicious_select(ids, user=user, restore=True)
succeded, failed = await restore_hits(hits, self._sink)
return MaliciousEndpointStatus(succeded, failed)
class CleanupRootEndpoints(RootEndpoints):
def __init__(self, sink):
super().__init__(sink)
self._proxy = MalwareCleanupProxy()
@bind("malware", "cleanup", "status")
async def cleanup_status(self):
progress = self._proxy.get_progress()
if progress is None:
status = {"status": "stopped"}
else:
status = {"status": "running", "progress": progress}
return {"items": status}
@bind("malware", "user", "cleanup")
@validate_av_plus_license
async def user_cleanup(self, user, standard_only=False):
users = user # according to schema 'user' is actually a list of users
hits = MalwareHit.malicious_select(user=users, cleanup=True)
if hits:
for user in users:
user_hits = [hit for hit in hits if hit.user == user]
if user_hits:
await self._sink.process_message(
MessageType.MalwareCleanupTask(
hits=user_hits,
initiator=user,
standard_only=standard_only,
)
)
@bind("malware", "user", "restore-original")
@validate_av_plus_license
async def user_restore_original(self, user):
hits = MalwareHit.malicious_select(user=user, restore=True)
succeded, failed = await restore_hits(hits, self._sink, user)
return MaliciousEndpointStatus(succeded, failed)
|