GRAYBYTE WORDPRESS FILE MANAGER3334

Server IP : 198.54.121.189 / Your IP : 216.73.216.112
System : Linux premium69.web-hosting.com 4.18.0-553.44.1.lve.el8.x86_64 #1 SMP Thu Mar 13 14:29:12 UTC 2025 x86_64
PHP Version : 7.4.33
Disable Function : NONE
cURL : ON | WGET : ON | Sudo : OFF | Pkexec : OFF
Directory : /opt/imunify360/venv/lib/python3.11/site-packages/imav/migrations/
Upload Files :
Current_dir [ Not Writeable ] Document_root [ Writeable ]

Command :


Current File : /opt/imunify360/venv/lib/python3.11/site-packages/imav/migrations//004_plesk_eula.py
"""
This program is free software: you can redistribute it and/or modify it under
the terms of the GNU General Public License as published by
the Free Software Foundation, either version 3 of the License,
or (at your option) any later version.


This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. 
See the GNU General Public License for more details.


You should have received a copy of the GNU General Public License
 along with this program.  If not, see <https://www.gnu.org/licenses/>.

Copyright © 2019 Cloud Linux Software Inc.

This software is also available under ImunifyAV commercial license,
see <https://www.imunify360.com/legal/eula>
"""
import logging
import time
from peewee import SqliteDatabase, TextField
from imav.migration_utils.revisium import find_revisium_db
from imav.migration_utils.settings import SettingsExtractor

logger = logging.getLogger(__name__)

db = SqliteDatabase(None)


class KeyValue(db.Model):
    """ex-Revisium settings database model"""

    key = TextField()
    value = TextField()

    class Meta:
        primary_key = False


class Revisium(SettingsExtractor):
    """ex-Revisium database settings extractor"""

    def _get(self):
        return KeyValue.get(KeyValue.key == self.key).value


def migrate_eula(migrator, database=None):
    db.init(database)
    eula_value = Revisium("ra_eula", 0).get()
    last_updated_eula_date = "2021-06-29"
    logger.info("EULA value=%s from Revisium database", str(eula_value))
    if eula_value >= 2:
        logger.info("Accepting eula for date=%s", last_updated_eula_date)
        Eula = migrator.orm["eula"]
        Eula.insert(
            updated=last_updated_eula_date, accepted=time.time()
        ).execute()


def migrate(migrator, database, fake=False, **kwargs):
    if fake:
        return

    revisium_db_path = find_revisium_db()
    if revisium_db_path is None:
        logger.info("No legacy ImunifyAV database found. Skipping...")
        return

    try:
        migrate_eula(migrator, revisium_db_path)
    except Exception as e:
        logger.warning("Failed to migrate eula for ImunifyAV: %r", e)


def rollback(migrator, database, fake=False, **kwargs):
    pass


if __name__ == "__main__":
    print(migrate_eula(find_revisium_db()))

[ Back ]
Name
Size
Last Modified
Owner / Group
Permissions
Options
..
--
July 03 2025 07:37:38
root / root
0755
__pycache__
--
July 03 2025 07:37:38
root / root
0755
000_noop_migration.py
0.925 KB
June 26 2025 03:15:17
root / root
0644
001_fix_scan_unserialization.py
2.854 KB
June 26 2025 03:15:17
root / root
0644
002_convert_serialized_scans.py
2.484 KB
June 26 2025 03:15:17
root / root
0644
003_add_new_fields_to_malware_history.py
1.292 KB
June 26 2025 03:15:17
root / root
0644
003_whmapi1_set_importance_imav.py
1.642 KB
June 26 2025 03:15:17
root / root
0644
004_add_malwarehit_owner.py
1.101 KB
June 26 2025 03:15:17
root / root
0644
004_patchman_client.py
1.706 KB
June 26 2025 03:15:17
root / root
0644
004_plesk_configs.py
6.3 KB
June 26 2025 03:15:17
root / root
0644
004_plesk_eula.py
2.33 KB
June 26 2025 03:15:17
root / root
0644
005_plesk_cleanup_storage.py
4.015 KB
June 26 2025 03:15:17
root / root
0644
005_populate_malwarehit_owner.py
1.115 KB
June 26 2025 03:15:17
root / root
0644
006_add_malwarehit_snippet.py
1.11 KB
June 26 2025 03:15:17
root / root
0644
007_add_malwarehistory_fileuser.py
1.13 KB
June 26 2025 03:15:17
root / root
0644
007_revisium_ignore_list.py
2.598 KB
June 26 2025 03:15:17
root / root
0644
008_populate_malwarehistory_foleuser.py
1.157 KB
June 26 2025 03:15:17
root / root
0644
008_subscription_permissions.py
3.292 KB
June 26 2025 03:15:17
root / root
0644
009_revisium_scan_history.py
8.992 KB
June 26 2025 03:15:17
root / root
0644
010_add_malwarehistory_scan_id.py
1.132 KB
June 26 2025 03:15:17
root / root
0644
011_add_malwarehistory_index.py
1.491 KB
June 26 2025 03:15:17
root / root
0644
012_add_rescan_outdated_scan_type.py
1.398 KB
June 26 2025 03:15:17
root / root
0644
013_add_malware_ctime.py
1.195 KB
June 26 2025 03:15:17
root / root
0644
014_add_imunify_security.py
1.225 KB
June 26 2025 03:15:17
root / root
0644
015_manually_deleted_at_field_added.py
1.173 KB
June 26 2025 03:15:17
root / root
0644
016_add_vulnerability_hit_table.py
2.479 KB
June 26 2025 03:15:17
root / root
0644
017_add_imunify_patch_subscriptions_table.py
1.294 KB
June 26 2025 03:15:17
root / root
0644
018_delete_suspicious_hits.py
0.954 KB
June 26 2025 03:15:17
root / root
0644
__init__.py
0 KB
June 26 2025 03:15:17
root / root
0644

GRAYBYTE WORDPRESS FILE MANAGER @ 2025
CONTACT ME
Static GIF