Welcome to mirror list, hosted at ThFree Co, Russian Federation.

github.com/undo-ransomware/ransomware_detection.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorMatthias <ilovemilk@wusa.io>2020-09-20 17:20:55 +0300
committerMatthias <ilovemilk@wusa.io>2020-09-20 17:20:55 +0300
commit1afd930be233d7d99cd3598acd4cda1dc0db9760 (patch)
tree4c893347e048cee499d10bc1bb92b290e2a813cf
parent96364e71664084d75738c983443ea6e4233386c2 (diff)
shorten table name
-rw-r--r--appinfo/database.xml2
-rw-r--r--appinfo/info.xml2
-rw-r--r--lib/Db/RecoveredFileOperationMapper.php18
3 files changed, 11 insertions, 11 deletions
diff --git a/appinfo/database.xml b/appinfo/database.xml
index 12d4170..2c58641 100644
--- a/appinfo/database.xml
+++ b/appinfo/database.xml
@@ -104,7 +104,7 @@
</declaration>
</table>
<table>
- <name>*dbprefix*ransomware_detection_recovered</name>
+ <name>*dbprefix*ransomware_detection_recov</name>
<declaration>
<field>
<name>id</name>
diff --git a/appinfo/info.xml b/appinfo/info.xml
index bb7626b..caa6ce0 100644
--- a/appinfo/info.xml
+++ b/appinfo/info.xml
@@ -5,7 +5,7 @@
<name>Ransomware recovery</name>
<summary><![CDATA[This app offers synchronization monitoring and a file storage scanner for a guided user-controlled one-step ransomare recovery.]]></summary>
<description><![CDATA[This app monitors file operations during the synchronization to detect ransomware attacks and also offers a post infection file storage scanner, which works even if it happend that you didn't have this app installed during an attack. This is done by using generic indicators for a guided user-controlled one-step recovery utilizing the integrated file versioning methods. Sponsored by the German Federal Ministry of Education and Research, and Prototype Fund.]]></description>
- <version>0.8.2</version>
+ <version>0.8.3</version>
<licence>agpl</licence>
<author mail="matthias.held@uni-konstanz.de">Matthias Held</author>
<namespace>RansomwareDetection</namespace>
diff --git a/lib/Db/RecoveredFileOperationMapper.php b/lib/Db/RecoveredFileOperationMapper.php
index ed6e442..14c24be 100644
--- a/lib/Db/RecoveredFileOperationMapper.php
+++ b/lib/Db/RecoveredFileOperationMapper.php
@@ -32,7 +32,7 @@ class RecoveredFileOperationMapper extends Mapper
public function __construct(
IDBConnection $db
) {
- parent::__construct($db, 'ransomware_detection_recovered');
+ parent::__construct($db, 'ransomware_detection');
}
/**
@@ -47,7 +47,7 @@ class RecoveredFileOperationMapper extends Mapper
*/
public function find($id, $userId)
{
- $sql = 'SELECT * FROM `*PREFIX*ransomware_detection_recovered` '.
+ $sql = 'SELECT * FROM `*PREFIX*ransomware_detection_recov` '.
'WHERE `id` = ? AND `user_id` = ?';
return $this->findEntity($sql, [$id, $userId]);
@@ -65,7 +65,7 @@ class RecoveredFileOperationMapper extends Mapper
*/
public function findOneByFileName($name, $userId)
{
- $sql = 'SELECT * FROM `*PREFIX*ransomware_detection_recovered` '.
+ $sql = 'SELECT * FROM `*PREFIX*ransomware_detection_recov` '.
'WHERE `original_name` = ? AND `user_id` = ?';
return $this->findEntity($sql, [$name, $userId]);
@@ -81,7 +81,7 @@ class RecoveredFileOperationMapper extends Mapper
*/
public function findOneWithHighestId($userId)
{
- $sql = 'SELECT * FROM `*PREFIX*ransomware_detection_recovered` WHERE `user_id` = ?'.
+ $sql = 'SELECT * FROM `*PREFIX*ransomware_detection_recov` WHERE `user_id` = ?'.
'ORDER BY id DESC LIMIT 1';
return $this->findEntity($sql, [$userId]);
@@ -97,7 +97,7 @@ class RecoveredFileOperationMapper extends Mapper
*/
public function findAll(array $params = [], $limit = null, $offset = null)
{
- $sql = 'SELECT * FROM `*PREFIX*ransomware_detection_recovered` WHERE `user_id` = ?';
+ $sql = 'SELECT * FROM `*PREFIX*ransomware_detection_recov` WHERE `user_id` = ?';
return $this->findEntities($sql, $params, $limit, $offset);
}
@@ -113,7 +113,7 @@ class RecoveredFileOperationMapper extends Mapper
*/
public function findSequenceById(array $params = [], $limit = null, $offset = null)
{
- $sql = 'SELECT * FROM `*PREFIX*ransomware_detection_recovered` WHERE `sequence` = ? AND `user_id` = ?';
+ $sql = 'SELECT * FROM `*PREFIX*ransomware_detection_recov` WHERE `sequence` = ? AND `user_id` = ?';
return $this->findEntities($sql, $params, $limit, $offset);
}
@@ -125,7 +125,7 @@ class RecoveredFileOperationMapper extends Mapper
*/
public function deleteById($id, $userId)
{
- $sql = 'DELETE FROM `*PREFIX*ransomware_detection_recovered` WHERE `id` = ? AND `user_id` = ?';
+ $sql = 'DELETE FROM `*PREFIX*ransomware_detection_recov` WHERE `id` = ? AND `user_id` = ?';
$stmt = $this->execute($sql, [$id, $userId]);
$stmt->closeCursor();
}
@@ -137,7 +137,7 @@ class RecoveredFileOperationMapper extends Mapper
*/
public function deleteSequenceById($sequence, $userId)
{
- $sql = 'DELETE FROM `*PREFIX*ransomware_detection_recovered` WHERE `sequence` = ? AND `user_id` = ?';
+ $sql = 'DELETE FROM `*PREFIX*ransomware_detection_recov` WHERE `sequence` = ? AND `user_id` = ?';
$stmt = $this->execute($sql, [$sequence, $userId]);
$stmt->closeCursor();
}
@@ -149,7 +149,7 @@ class RecoveredFileOperationMapper extends Mapper
*/
public function deleteFileOperationsBefore($timestamp)
{
- $sql = 'DELETE FROM `*PREFIX*ransomware_detection_recovered` WHERE `timestamp` < ?';
+ $sql = 'DELETE FROM `*PREFIX*ransomware_detection_recov` WHERE `timestamp` < ?';
$stmt = $this->execute($sql, [$timestamp]);
$stmt->closeCursor();
}