We are happy to announce that Vesta is back under active development as of 25 February 2024. We are working on v1 candidate and expect to engage more with the community over the coming months. We are committed to open source, and we encourage contributors to help us build the future of Vesta.
Hacked websites and VestaCP
Re: Hacked websites and VestaCP
Something like this would work. Just a quick and dirty prototype
Code: Select all
#!/bin/bash
for URL in \
/home/admin/web/domain.com/public_html/ \
/home/admin/web/sub.other.com/public_html/blog/ \
/home/user/web/third.com/public_html/
do
WPUSER=$( echo $URL | awk -F "/" '{ print $3}' )
WPCMD="sudo -u $WPUSER -i -- /usr/local/bin/wp-cli --path=$URL"
echo " ------ $URL -------" >> output.txt
$WPCMD core check-update >> output.txt
$WPCMD plugin list >> output.txt
done
mutt -s "Report for $(hostname -f)" [email protected] < output.txt
rm output.txt
Re: Hacked websites and VestaCP
Nice script ! Thanks :)
Re: Hacked websites and VestaCP
It seems wp-cli and EE (https://easyengine.io/) have cooperation. EE only runs on Debian and Ubuntu, and with-out ui.plutocrat wrote: ↑Mon Nov 06, 2017 4:25 amAs a service to your customers, you might consider writing a script to get wp-cli to check for un-updated plugins and wp installations. It could send out an automated email if it found many updates.
It could even perform the upgrades if you wanted, but that might be a bit intrusive.
http://wp-cli.org/