ÿØÿà JFIF ÿþ; %PDF-1.5 %���� ºaâÚÎΞ-ÌE1ÍØÄ÷{òò2ÿ ÛÖ^ÔÀá TÎ{¦?§®¥kuµùÕ5sLOšuY
Server IP : 157.90.209.209 / Your IP : 216.73.216.148 [ Web Server : Apache System : Linux hcomm124.dns-wk.info 4.18.0-553.64.1.el8_10.x86_64 #1 SMP Mon Jul 28 12:01:56 EDT 2025 x86_64 User : evidenciarevista ( 1049) PHP Version : 7.2.34 Disable Function : exec,passthru,shell_exec,system Domains : 216 Domains MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : OFF | Sudo : ON | Pkexec : ON Directory : /opt/imunify360/venv/lib/python3.11/site-packages/defence360agent/contracts/ |
Upload File : |
import asyncio import os.path from typing import Optional from defence360agent import files from defence360agent.contracts.config import ANTIVIRUS_MODE from defence360agent.model.simplification import Eula, run_in_executor _MESSAGE_TEMPLATE = "message{}.txt" _SUFFIX = "-av" if ANTIVIRUS_MODE else "" _TEXT_TEMPLATE = "eula{}.txt" _UPDATED_TEMPLATE = "updated{}.txt" def _readfile(path: str, errors: Optional[str] = None) -> str: with open(path, errors=errors) as f: return f.read().strip() def _get_path(template: str) -> str: return os.path.join( files.Index.files_path(files.EULA), template.format(_SUFFIX) ) async def is_accepted() -> bool: """Return True if latest EULA was accepted, False otherwise.""" return await run_in_executor(asyncio.get_event_loop(), Eula.is_accepted) async def accept() -> None: """Accepts EULA.""" await run_in_executor(asyncio.get_event_loop(), Eula.accept) async def update() -> None: """Updates latest EULA date from files.""" await run_in_executor( asyncio.get_event_loop(), lambda: Eula.get_or_create(updated=updated()) ) def text() -> str: """Return main text of the EULA.""" return _readfile(_get_path(_TEXT_TEMPLATE), errors="ignore") def message() -> str: """Return a message inviting to accept EULA.""" return _readfile(_get_path(_MESSAGE_TEMPLATE)) def updated() -> str: """Return last EULA's update time.""" return _readfile(_get_path(_UPDATED_TEMPLATE))