Viewing file: post_action.py (2.25 KB) -rw-r--r-- Select action/file-type: (+) | (+) | (+) | Code (+) | Session (+) | (+) | SDB (+) | (+) | (+) | (+) | (+) | (+) |
""" This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.
This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.
You should have received a copy of the GNU General Public License along with this program. If not, see <https://www.gnu.org/licenses/>.
Copyright © 2019 Cloud Linux Software Inc.
This software is also available under ImunifyAV commercial license, see <https://www.imunify360.com/legal/eula> """ from logging import getLogger from typing import Dict
from defence360agent.contracts.messages import MessageType from defence360agent.contracts.plugins import ( MessageSink, MessageSource, expect, ) from imav.malwarelib.config import MalwareHitStatus from imav.malwarelib.model import MalwareHit from defence360agent.utils import Scope
logger = getLogger(__name__)
class PostAction(MessageSink, MessageSource): PROCESSING_ORDER = MessageSink.ProcessingOrder.POST_ACTION SCOPE = Scope.IM360
async def create_sink(self, loop): pass
async def create_source(self, loop, sink): self._sink = sink
@expect(MessageType.MalwareCleanup) async def process_post_action(self, message: Dict): post_action = message.pop("post_action", None) if not post_action: return
scan_id = message["scan_id"] cause = message["cause"] initiator = message["initiator"]
found_hits = [ hit for hit in message["hits"] if hit.status == MalwareHitStatus.FOUND ] other_hits = [ hit for hit in message["hits"] if hit.status != MalwareHitStatus.FOUND ]
if await post_action( hits=found_hits, scan_id=scan_id, cause=cause, initiator=initiator, sink=self._sink, ): message["hits"] = MalwareHit.refresh_hits(found_hits) + other_hits
return message
|