Server IP : 103.119.228.120 / Your IP : 3.135.184.195 Web Server : Apache System : Linux v8.techscape8.com 3.10.0-1160.119.1.el7.tuxcare.els2.x86_64 #1 SMP Mon Jul 15 12:09:18 UTC 2024 x86_64 User : nobody ( 99) PHP Version : 5.6.40 Disable Function : shell_exec,symlink,system,exec,proc_get_status,proc_nice,proc_terminate,define_syslog_variables,syslog,openlog,closelog,escapeshellcmd,passthru,ocinum cols,ini_alter,leak,listen,chgrp,apache_note,apache_setenv,debugger_on,debugger_off,ftp_exec,dl,dll,myshellexec,proc_open,socket_bind,proc_close,escapeshellarg,parse_ini_filepopen,fpassthru,exec,passthru,escapeshellarg,escapeshellcmd,proc_close,proc_open,ini_alter,popen,show_source,proc_nice,proc_terminate,proc_get_status,proc_close,pfsockopen,leak,apache_child_terminate,posix_kill,posix_mkfifo,posix_setpgid,posix_setsid,posix_setuid,dl,symlink,shell_exec,system,dl,passthru,escapeshellarg,escapeshellcmd,myshellexec,c99_buff_prepare,c99_sess_put,fpassthru,getdisfunc,fx29exec,fx29exec2,is_windows,disp_freespace,fx29sh_getupdate,fx29_buff_prepare,fx29_sess_put,fx29shexit,fx29fsearch,fx29ftpbrutecheck,fx29sh_tools,fx29sh_about,milw0rm,imagez,sh_name,myshellexec,checkproxyhost,dosyayicek,c99_buff_prepare,c99_sess_put,c99getsource,c99sh_getupdate,c99fsearch,c99shexit,view_perms,posix_getpwuid,posix_getgrgid,posix_kill,parse_perms,parsesort,view_perms_color,set_encoder_input,ls_setcheckboxall,ls_reverse_all,rsg_read,rsg_glob,selfURL,dispsecinfo,unix2DosTime,addFile,system,get_users,view_size,DirFiles,DirFilesWide,DirPrintHTMLHeaders,GetFilesTotal,GetTitles,GetTimeTotal,GetMatchesCount,GetFileMatchesCount,GetResultFiles,fs_copy_dir,fs_copy_obj,fs_move_dir,fs_move_obj,fs_rmdir,SearchText,getmicrotime MySQL : ON | cURL : ON | WGET : ON | Perl : ON | Python : ON | Sudo : ON | Pkexec : ON Directory : /scripts/ |
Upload File : |
#!/usr/local/cpanel/3rdparty/bin/perl # cpanel - scripts/sa-update_wrapper Copyright 2022 cPanel, L.L.C. # All rights reserved. # copyright@cpanel.net http://cpanel.net # This code is subject to the cPanel license. Unauthorized copying is prohibited use strict; use warnings; use Cpanel::Binaries (); use Cpanel::SafeRun::Object (); use Cpanel::SpamAssassin::Rules (); alarm(3600); if ($>) { die "$0: must run as root"; } my $saupdate_bin = Cpanel::Binaries::path('sa-update'); if ( $ENV{CPANEL_BASE_INSTALL} ) { print STDERR "“$0” refuses to run during a cPanel installation.\n"; exit(0); } if ( !$saupdate_bin ) { die "$0: Found no sa-update path!\n"; } if ( !-e $saupdate_bin ) { die "$0: “$saupdate_bin” is missing!\n"; } if ( !-x _ ) { die "$0: “$saupdate_bin” is not executable!\n"; } sub run_saupdate { my $gpg_option = shift; if ( !$gpg_option ) { my $gpg_bin = Cpanel::Binaries::path('gpg'); $gpg_option = !-x $gpg_bin ? '--nogpg' : '--gpg'; } print "[*] Cleaning up from previous updates.....\n"; clean_up_updates(); print "[*] Running sa-update ($saupdate_bin).....\n"; print "[*] Please note that 'IO::Socket::IP' and 'Net::Patricia' are not needed by our implementation of SpamAssassin.\n[*] The warnings related to them can be safely ignored.\n\n"; my $run = Cpanel::SafeRun::Object->new( 'program' => $saupdate_bin, 'args' => [ $gpg_option, grep( /-Q/i, @ARGV ) ? () : ('-D') ], 'stdout' => \*STDOUT, 'stderr' => \*STDOUT, 'timeout' => 3600, 'read_timeout' => 3600, ); if ( $run->CHILD_ERROR() ) { if ( $run->signal_code() || _sa_update_exit_code_is_a_real_failure( $run->error_code() ) ) { $run->die_if_error(); } } print "Done\n"; return; } sub _sa_update_exit_code_is_a_real_failure { my ($error_code) = @_; # sa-update uses nonzero error codes to indicate # certain success states: # https://spamassassin.apache.org/full/3.1.x/doc/sa-update.html#exit_codes # # exit code of 0 = updates installed return 0 if !$error_code; # exit code of 1 = no updates needed return 0 if $error_code == 1; # exit code of 2 = lint of files failed, perl die or general failure return 1 if $error_code == 2; # exit code of 3 = at least one channel download filed, but the updater found a backup server to update from successfully return 0 if $error_code == 3; # exit code of 4+ = error downloading or extracting and all channels failed return 1; } sub clean_up_updates { my $version = eval { require Mail::SpamAssassin; $Mail::SpamAssassin::VERSION }; return unless defined $version; my $dir = "/var/lib/spamassassin/$version/updates_spamassassin_org"; return unless opendir( my $dh, $dir ); while ( defined( my $file = readdir $dh ) ) { unlink "$dir/$file" if $file =~ /^\d+\.tar\.gz(?:\.(?:asc|sha1))?$/; } closedir($dh); return; } run_saupdate(); print "Checking update...."; if ( !Cpanel::SpamAssassin::Rules::has_rules_installed() ) { print "update failed...retrying without gpg...\n"; run_saupdate('--nogpg'); } else { print "update ok!\n"; }