Add support for local whitelist
Since the whitelist file is redownloaded on each script execution, we can not define our own paths to exclude from scan. This commit introduces a evomalware.whitelist.local file to fix this issue.
This commit is contained in:
parent
4c89a12f28
commit
888d644b6a
|
@ -8,6 +8,7 @@ wwwpath=/home
|
||||||
# URL to download patterns and filenames.
|
# URL to download patterns and filenames.
|
||||||
databaseURL="http://antispam00.evolix.org/evomalware"
|
databaseURL="http://antispam00.evolix.org/evomalware"
|
||||||
databasePATH=/var/lib/evomalware
|
databasePATH=/var/lib/evomalware
|
||||||
|
whitelistLocal="${databasePATH}/evomalware.whitelist.local"
|
||||||
# Tools.
|
# Tools.
|
||||||
find="ionice -c3 find -O3"
|
find="ionice -c3 find -O3"
|
||||||
grep="nice -n 19 grep"
|
grep="nice -n 19 grep"
|
||||||
|
@ -39,6 +40,7 @@ fi
|
||||||
mkdir -p $databasePATH
|
mkdir -p $databasePATH
|
||||||
mkdir -p $tmpPATH
|
mkdir -p $tmpPATH
|
||||||
cd $tmpPATH
|
cd $tmpPATH
|
||||||
|
[ -f $whitelistLocal ] || touch $whitelistLocal
|
||||||
for file in evomalware.filenames evomalware.patterns evomalware.whitelist evomalware.suspect; do
|
for file in evomalware.filenames evomalware.patterns evomalware.whitelist evomalware.suspect; do
|
||||||
$wget ${databaseURL}/${file}
|
$wget ${databaseURL}/${file}
|
||||||
$wget ${databaseURL}/${file}.md5
|
$wget ${databaseURL}/${file}.md5
|
||||||
|
@ -51,7 +53,7 @@ for file in evomalware.filenames evomalware.patterns evomalware.whitelist evomal
|
||||||
done
|
done
|
||||||
filenames=$(cat ${databasePATH}/evomalware.filenames | tr -d '\n')
|
filenames=$(cat ${databasePATH}/evomalware.filenames | tr -d '\n')
|
||||||
patterns=$(cat ${databasePATH}/evomalware.patterns | tr -d '\n')
|
patterns=$(cat ${databasePATH}/evomalware.patterns | tr -d '\n')
|
||||||
whitelist=$(cat ${databasePATH}/evomalware.whitelist | tr -d '\n')
|
whitelist=$(cat ${databasePATH}/evomalware.whitelist $whitelistLocal | tr -d '\n')
|
||||||
suspect=$(cat ${databasePATH}/evomalware.suspect | tr -d '\n')
|
suspect=$(cat ${databasePATH}/evomalware.suspect | tr -d '\n')
|
||||||
|
|
||||||
# Search for .php files (less than 1M).
|
# Search for .php files (less than 1M).
|
||||||
|
|
Loading…
Reference in New Issue