PATH:
opt
/
imunify360
/
venv
/
lib
/
python3.11
/
site-packages
/
im360
/
subsys
from configparser import ConfigParser from defence360agent.utils import is_cloudways # This code is a ported copy-paste from Go agent. def _is_nginx_server(path: str, raise_err: bool) -> bool: try: cfg = ConfigParser() cfg.read(path) return cfg.get("web_server", "server_type", fallback="") == "nginx" except Exception: if raise_err: raise return False def is_force_use_coraza( *, path: str = "/etc/sysconfig/imunify360/integration.conf", raise_err: bool = False, detect_cloudways: bool = True, ) -> bool: if not _is_nginx_server(path, raise_err): return False if detect_cloudways: return is_cloudways() return True
[-] smtp_blocking.py
[edit]
[-] fail2ban.py
[edit]
[-] modsec_audit_log.py
[edit]
[-] proactive.py
[edit]
[-] whitelist_rbl.py
[edit]
[-] running_ids.py
[edit]
[-] ossec.py
[edit]
[+]
__pycache__
[-] pam.py
[edit]
[+]
features
[+]
panels
[-] webshield.py
[edit]
[-] shared_disabled_rules.py
[edit]
[-] int_config.py
[edit]
[-] modsec_app_version_detector.py
[edit]
[-] modsec_cache_dir.py
[edit]
[-] __init__.py
[edit]
[-] waf_rules_configurator.py
[edit]
[-] webshield_mode.py
[edit]
[+]
..
[-] csf.py
[edit]
[-] remoteip.py
[edit]