forked from p15670423/monkey
Format code using black
This commit is contained in:
parent
15107eeea3
commit
8bd30ceb4c
|
@ -5,7 +5,7 @@ from infection_monkey.telemetry.attack.attack_telem import AttackTelem
|
||||||
|
|
||||||
|
|
||||||
STATUS = ScanStatus.USED
|
STATUS = ScanStatus.USED
|
||||||
TECHNIQUE = 'T9999'
|
TECHNIQUE = "T9999"
|
||||||
|
|
||||||
|
|
||||||
@pytest.fixture
|
@pytest.fixture
|
||||||
|
@ -15,7 +15,6 @@ def attack_telem_test_instance():
|
||||||
|
|
||||||
def test_attack_telem_send(attack_telem_test_instance, spy_send_telemetry):
|
def test_attack_telem_send(attack_telem_test_instance, spy_send_telemetry):
|
||||||
attack_telem_test_instance.send()
|
attack_telem_test_instance.send()
|
||||||
expected_data = {'status': STATUS.value,
|
expected_data = {"status": STATUS.value, "technique": TECHNIQUE}
|
||||||
'technique': TECHNIQUE}
|
|
||||||
assert spy_send_telemetry.data == expected_data
|
assert spy_send_telemetry.data == expected_data
|
||||||
assert spy_send_telemetry.telem_category == 'attack'
|
assert spy_send_telemetry.telem_category == "attack"
|
||||||
|
|
|
@ -4,8 +4,8 @@ from common.utils.attack_utils import ScanStatus
|
||||||
from infection_monkey.telemetry.attack.t1005_telem import T1005Telem
|
from infection_monkey.telemetry.attack.t1005_telem import T1005Telem
|
||||||
|
|
||||||
|
|
||||||
GATHERED_DATA_TYPE = '[Type of data collected]'
|
GATHERED_DATA_TYPE = "[Type of data collected]"
|
||||||
INFO = '[Additional info]'
|
INFO = "[Additional info]"
|
||||||
STATUS = ScanStatus.USED
|
STATUS = ScanStatus.USED
|
||||||
|
|
||||||
|
|
||||||
|
@ -16,9 +16,11 @@ def T1005_telem_test_instance():
|
||||||
|
|
||||||
def test_T1005_send(T1005_telem_test_instance, spy_send_telemetry):
|
def test_T1005_send(T1005_telem_test_instance, spy_send_telemetry):
|
||||||
T1005_telem_test_instance.send()
|
T1005_telem_test_instance.send()
|
||||||
expected_data = {'status': STATUS.value,
|
expected_data = {
|
||||||
'technique': 'T1005',
|
"status": STATUS.value,
|
||||||
'gathered_data_type': GATHERED_DATA_TYPE,
|
"technique": "T1005",
|
||||||
'info': INFO}
|
"gathered_data_type": GATHERED_DATA_TYPE,
|
||||||
|
"info": INFO,
|
||||||
|
}
|
||||||
assert spy_send_telemetry.data == expected_data
|
assert spy_send_telemetry.data == expected_data
|
||||||
assert spy_send_telemetry.telem_category == 'attack'
|
assert spy_send_telemetry.telem_category == "attack"
|
||||||
|
|
|
@ -15,8 +15,6 @@ def T1035_telem_test_instance():
|
||||||
|
|
||||||
def test_T1035_send(T1035_telem_test_instance, spy_send_telemetry):
|
def test_T1035_send(T1035_telem_test_instance, spy_send_telemetry):
|
||||||
T1035_telem_test_instance.send()
|
T1035_telem_test_instance.send()
|
||||||
expected_data = {'status': STATUS.value,
|
expected_data = {"status": STATUS.value, "technique": "T1035", "usage": USAGE.name}
|
||||||
'technique': 'T1035',
|
|
||||||
'usage': USAGE.name}
|
|
||||||
assert spy_send_telemetry.data == expected_data
|
assert spy_send_telemetry.data == expected_data
|
||||||
assert spy_send_telemetry.telem_category == 'attack'
|
assert spy_send_telemetry.telem_category == "attack"
|
||||||
|
|
|
@ -5,7 +5,7 @@ from infection_monkey.telemetry.attack.t1064_telem import T1064Telem
|
||||||
|
|
||||||
|
|
||||||
STATUS = ScanStatus.USED
|
STATUS = ScanStatus.USED
|
||||||
USAGE_STR = '[Usage info]'
|
USAGE_STR = "[Usage info]"
|
||||||
|
|
||||||
|
|
||||||
@pytest.fixture
|
@pytest.fixture
|
||||||
|
@ -15,8 +15,6 @@ def T1064_telem_test_instance():
|
||||||
|
|
||||||
def test_T1064_send(T1064_telem_test_instance, spy_send_telemetry):
|
def test_T1064_send(T1064_telem_test_instance, spy_send_telemetry):
|
||||||
T1064_telem_test_instance.send()
|
T1064_telem_test_instance.send()
|
||||||
expected_data = {'status': STATUS.value,
|
expected_data = {"status": STATUS.value, "technique": "T1064", "usage": USAGE_STR}
|
||||||
'technique': 'T1064',
|
|
||||||
'usage': USAGE_STR}
|
|
||||||
assert spy_send_telemetry.data == expected_data
|
assert spy_send_telemetry.data == expected_data
|
||||||
assert spy_send_telemetry.telem_category == 'attack'
|
assert spy_send_telemetry.telem_category == "attack"
|
||||||
|
|
|
@ -4,9 +4,9 @@ from common.utils.attack_utils import ScanStatus
|
||||||
from infection_monkey.telemetry.attack.t1105_telem import T1105Telem
|
from infection_monkey.telemetry.attack.t1105_telem import T1105Telem
|
||||||
|
|
||||||
|
|
||||||
DST_IP = '0.0.0.1'
|
DST_IP = "0.0.0.1"
|
||||||
FILENAME = 'virus.exe'
|
FILENAME = "virus.exe"
|
||||||
SRC_IP = '0.0.0.0'
|
SRC_IP = "0.0.0.0"
|
||||||
STATUS = ScanStatus.USED
|
STATUS = ScanStatus.USED
|
||||||
|
|
||||||
|
|
||||||
|
@ -17,10 +17,12 @@ def T1105_telem_test_instance():
|
||||||
|
|
||||||
def test_T1105_send(T1105_telem_test_instance, spy_send_telemetry):
|
def test_T1105_send(T1105_telem_test_instance, spy_send_telemetry):
|
||||||
T1105_telem_test_instance.send()
|
T1105_telem_test_instance.send()
|
||||||
expected_data = {'status': STATUS.value,
|
expected_data = {
|
||||||
'technique': 'T1105',
|
"status": STATUS.value,
|
||||||
'filename': FILENAME,
|
"technique": "T1105",
|
||||||
'src': SRC_IP,
|
"filename": FILENAME,
|
||||||
'dst': DST_IP}
|
"src": SRC_IP,
|
||||||
|
"dst": DST_IP,
|
||||||
|
}
|
||||||
assert spy_send_telemetry.data == expected_data
|
assert spy_send_telemetry.data == expected_data
|
||||||
assert spy_send_telemetry.telem_category == 'attack'
|
assert spy_send_telemetry.telem_category == "attack"
|
||||||
|
|
|
@ -15,8 +15,6 @@ def T1106_telem_test_instance():
|
||||||
|
|
||||||
def test_T1106_send(T1106_telem_test_instance, spy_send_telemetry):
|
def test_T1106_send(T1106_telem_test_instance, spy_send_telemetry):
|
||||||
T1106_telem_test_instance.send()
|
T1106_telem_test_instance.send()
|
||||||
expected_data = {'status': STATUS.value,
|
expected_data = {"status": STATUS.value, "technique": "T1106", "usage": USAGE.name}
|
||||||
'technique': 'T1106',
|
|
||||||
'usage': USAGE.name}
|
|
||||||
assert spy_send_telemetry.data == expected_data
|
assert spy_send_telemetry.data == expected_data
|
||||||
assert spy_send_telemetry.telem_category == 'attack'
|
assert spy_send_telemetry.telem_category == "attack"
|
||||||
|
|
|
@ -4,7 +4,7 @@ from common.utils.attack_utils import ScanStatus
|
||||||
from infection_monkey.telemetry.attack.t1107_telem import T1107Telem
|
from infection_monkey.telemetry.attack.t1107_telem import T1107Telem
|
||||||
|
|
||||||
|
|
||||||
PATH = 'path/to/file.txt'
|
PATH = "path/to/file.txt"
|
||||||
STATUS = ScanStatus.USED
|
STATUS = ScanStatus.USED
|
||||||
|
|
||||||
|
|
||||||
|
@ -15,8 +15,6 @@ def T1107_telem_test_instance():
|
||||||
|
|
||||||
def test_T1107_send(T1107_telem_test_instance, spy_send_telemetry):
|
def test_T1107_send(T1107_telem_test_instance, spy_send_telemetry):
|
||||||
T1107_telem_test_instance.send()
|
T1107_telem_test_instance.send()
|
||||||
expected_data = {'status': STATUS.value,
|
expected_data = {"status": STATUS.value, "technique": "T1107", "path": PATH}
|
||||||
'technique': 'T1107',
|
|
||||||
'path': PATH}
|
|
||||||
assert spy_send_telemetry.data == expected_data
|
assert spy_send_telemetry.data == expected_data
|
||||||
assert spy_send_telemetry.telem_category == 'attack'
|
assert spy_send_telemetry.telem_category == "attack"
|
||||||
|
|
|
@ -15,8 +15,6 @@ def T1129_telem_test_instance():
|
||||||
|
|
||||||
def test_T1129_send(T1129_telem_test_instance, spy_send_telemetry):
|
def test_T1129_send(T1129_telem_test_instance, spy_send_telemetry):
|
||||||
T1129_telem_test_instance.send()
|
T1129_telem_test_instance.send()
|
||||||
expected_data = {'status': STATUS.value,
|
expected_data = {"status": STATUS.value, "technique": "T1129", "usage": USAGE.name}
|
||||||
'technique': 'T1129',
|
|
||||||
'usage': USAGE.name}
|
|
||||||
assert spy_send_telemetry.data == expected_data
|
assert spy_send_telemetry.data == expected_data
|
||||||
assert spy_send_telemetry.telem_category == 'attack'
|
assert spy_send_telemetry.telem_category == "attack"
|
||||||
|
|
|
@ -5,11 +5,11 @@ from infection_monkey.model import VictimHost
|
||||||
from infection_monkey.telemetry.attack.t1197_telem import T1197Telem
|
from infection_monkey.telemetry.attack.t1197_telem import T1197Telem
|
||||||
|
|
||||||
|
|
||||||
DOMAIN_NAME = 'domain-name'
|
DOMAIN_NAME = "domain-name"
|
||||||
IP = '127.0.0.1'
|
IP = "127.0.0.1"
|
||||||
MACHINE = VictimHost(IP, DOMAIN_NAME)
|
MACHINE = VictimHost(IP, DOMAIN_NAME)
|
||||||
STATUS = ScanStatus.USED
|
STATUS = ScanStatus.USED
|
||||||
USAGE_STR = '[Usage info]'
|
USAGE_STR = "[Usage info]"
|
||||||
|
|
||||||
|
|
||||||
@pytest.fixture
|
@pytest.fixture
|
||||||
|
@ -19,10 +19,11 @@ def T1197_telem_test_instance():
|
||||||
|
|
||||||
def test_T1197_send(T1197_telem_test_instance, spy_send_telemetry):
|
def test_T1197_send(T1197_telem_test_instance, spy_send_telemetry):
|
||||||
T1197_telem_test_instance.send()
|
T1197_telem_test_instance.send()
|
||||||
expected_data = {'machine': {'domain_name': DOMAIN_NAME,
|
expected_data = {
|
||||||
'ip_addr': IP},
|
"machine": {"domain_name": DOMAIN_NAME, "ip_addr": IP},
|
||||||
'status': STATUS.value,
|
"status": STATUS.value,
|
||||||
'technique': 'T1197',
|
"technique": "T1197",
|
||||||
'usage': USAGE_STR}
|
"usage": USAGE_STR,
|
||||||
|
}
|
||||||
assert spy_send_telemetry.data == expected_data
|
assert spy_send_telemetry.data == expected_data
|
||||||
assert spy_send_telemetry.telem_category == 'attack'
|
assert spy_send_telemetry.telem_category == "attack"
|
||||||
|
|
|
@ -5,9 +5,9 @@ from infection_monkey.model import VictimHost
|
||||||
from infection_monkey.telemetry.attack.t1222_telem import T1222Telem
|
from infection_monkey.telemetry.attack.t1222_telem import T1222Telem
|
||||||
|
|
||||||
|
|
||||||
COMMAND = 'echo hi'
|
COMMAND = "echo hi"
|
||||||
DOMAIN_NAME = 'domain-name'
|
DOMAIN_NAME = "domain-name"
|
||||||
IP = '127.0.0.1'
|
IP = "127.0.0.1"
|
||||||
MACHINE = VictimHost(IP, DOMAIN_NAME)
|
MACHINE = VictimHost(IP, DOMAIN_NAME)
|
||||||
STATUS = ScanStatus.USED
|
STATUS = ScanStatus.USED
|
||||||
|
|
||||||
|
@ -19,10 +19,11 @@ def T1222_telem_test_instance():
|
||||||
|
|
||||||
def test_T1222_send(T1222_telem_test_instance, spy_send_telemetry):
|
def test_T1222_send(T1222_telem_test_instance, spy_send_telemetry):
|
||||||
T1222_telem_test_instance.send()
|
T1222_telem_test_instance.send()
|
||||||
expected_data = {'machine': {'domain_name': DOMAIN_NAME,
|
expected_data = {
|
||||||
'ip_addr': IP},
|
"machine": {"domain_name": DOMAIN_NAME, "ip_addr": IP},
|
||||||
'status': STATUS.value,
|
"status": STATUS.value,
|
||||||
'technique': 'T1222',
|
"technique": "T1222",
|
||||||
'command': COMMAND}
|
"command": COMMAND,
|
||||||
|
}
|
||||||
assert spy_send_telemetry.data == expected_data
|
assert spy_send_telemetry.data == expected_data
|
||||||
assert spy_send_telemetry.telem_category == 'attack'
|
assert spy_send_telemetry.telem_category == "attack"
|
||||||
|
|
|
@ -5,7 +5,7 @@ from infection_monkey.telemetry.attack.usage_telem import UsageTelem
|
||||||
|
|
||||||
|
|
||||||
STATUS = ScanStatus.USED
|
STATUS = ScanStatus.USED
|
||||||
TECHNIQUE = 'T9999'
|
TECHNIQUE = "T9999"
|
||||||
USAGE = UsageEnum.SMB
|
USAGE = UsageEnum.SMB
|
||||||
|
|
||||||
|
|
||||||
|
@ -16,8 +16,10 @@ def usage_telem_test_instance():
|
||||||
|
|
||||||
def test_usage_telem_send(usage_telem_test_instance, spy_send_telemetry):
|
def test_usage_telem_send(usage_telem_test_instance, spy_send_telemetry):
|
||||||
usage_telem_test_instance.send()
|
usage_telem_test_instance.send()
|
||||||
expected_data = {'status': STATUS.value,
|
expected_data = {
|
||||||
'technique': TECHNIQUE,
|
"status": STATUS.value,
|
||||||
'usage': USAGE.name}
|
"technique": TECHNIQUE,
|
||||||
|
"usage": USAGE.name,
|
||||||
|
}
|
||||||
assert spy_send_telemetry.data == expected_data
|
assert spy_send_telemetry.data == expected_data
|
||||||
assert spy_send_telemetry.telem_category == 'attack'
|
assert spy_send_telemetry.telem_category == "attack"
|
||||||
|
|
|
@ -5,11 +5,11 @@ from infection_monkey.model import VictimHost
|
||||||
from infection_monkey.telemetry.attack.victim_host_telem import VictimHostTelem
|
from infection_monkey.telemetry.attack.victim_host_telem import VictimHostTelem
|
||||||
|
|
||||||
|
|
||||||
DOMAIN_NAME = 'domain-name'
|
DOMAIN_NAME = "domain-name"
|
||||||
IP = '127.0.0.1'
|
IP = "127.0.0.1"
|
||||||
MACHINE = VictimHost(IP, DOMAIN_NAME)
|
MACHINE = VictimHost(IP, DOMAIN_NAME)
|
||||||
STATUS = ScanStatus.USED
|
STATUS = ScanStatus.USED
|
||||||
TECHNIQUE = 'T9999'
|
TECHNIQUE = "T9999"
|
||||||
|
|
||||||
|
|
||||||
@pytest.fixture
|
@pytest.fixture
|
||||||
|
@ -19,9 +19,10 @@ def victim_host_telem_test_instance():
|
||||||
|
|
||||||
def test_victim_host_telem_send(victim_host_telem_test_instance, spy_send_telemetry):
|
def test_victim_host_telem_send(victim_host_telem_test_instance, spy_send_telemetry):
|
||||||
victim_host_telem_test_instance.send()
|
victim_host_telem_test_instance.send()
|
||||||
expected_data = {'machine': {'domain_name': DOMAIN_NAME,
|
expected_data = {
|
||||||
'ip_addr': IP},
|
"machine": {"domain_name": DOMAIN_NAME, "ip_addr": IP},
|
||||||
'status': STATUS.value,
|
"status": STATUS.value,
|
||||||
'technique': TECHNIQUE}
|
"technique": TECHNIQUE,
|
||||||
|
}
|
||||||
assert spy_send_telemetry.data == expected_data
|
assert spy_send_telemetry.data == expected_data
|
||||||
assert spy_send_telemetry.telem_category == 'attack'
|
assert spy_send_telemetry.telem_category == "attack"
|
||||||
|
|
|
@ -11,5 +11,5 @@ def spy_send_telemetry(monkeypatch):
|
||||||
|
|
||||||
_spy_send_telemetry.telem_category = None
|
_spy_send_telemetry.telem_category = None
|
||||||
_spy_send_telemetry.data = None
|
_spy_send_telemetry.data = None
|
||||||
monkeypatch.setattr(ControlClient, 'send_telemetry', _spy_send_telemetry)
|
monkeypatch.setattr(ControlClient, "send_telemetry", _spy_send_telemetry)
|
||||||
return _spy_send_telemetry
|
return _spy_send_telemetry
|
||||||
|
|
|
@ -8,22 +8,26 @@ from infection_monkey.telemetry.exploit_telem import ExploitTelem
|
||||||
DOMAIN_NAME = "domain-name"
|
DOMAIN_NAME = "domain-name"
|
||||||
IP = "0.0.0.0"
|
IP = "0.0.0.0"
|
||||||
HOST = VictimHost(IP, DOMAIN_NAME)
|
HOST = VictimHost(IP, DOMAIN_NAME)
|
||||||
HOST_AS_DICT = {'ip_addr': IP,
|
HOST_AS_DICT = {
|
||||||
'domain_name': DOMAIN_NAME,
|
"ip_addr": IP,
|
||||||
'os': {},
|
"domain_name": DOMAIN_NAME,
|
||||||
'services': {},
|
"os": {},
|
||||||
'icmp': False,
|
"services": {},
|
||||||
'monkey_exe': None,
|
"icmp": False,
|
||||||
'default_tunnel': None,
|
"monkey_exe": None,
|
||||||
'default_server': None}
|
"default_tunnel": None,
|
||||||
|
"default_server": None,
|
||||||
|
}
|
||||||
EXPLOITER = WmiExploiter(HOST)
|
EXPLOITER = WmiExploiter(HOST)
|
||||||
EXPLOITER_NAME = 'WmiExploiter'
|
EXPLOITER_NAME = "WmiExploiter"
|
||||||
EXPLOITER_INFO = {'display_name': WmiExploiter._EXPLOITED_SERVICE,
|
EXPLOITER_INFO = {
|
||||||
'started': '',
|
"display_name": WmiExploiter._EXPLOITED_SERVICE,
|
||||||
'finished': '',
|
"started": "",
|
||||||
'vulnerable_urls': [],
|
"finished": "",
|
||||||
'vulnerable_ports': [],
|
"vulnerable_urls": [],
|
||||||
'executed_cmds': []}
|
"vulnerable_ports": [],
|
||||||
|
"executed_cmds": [],
|
||||||
|
}
|
||||||
EXPLOITER_ATTEMPTS = []
|
EXPLOITER_ATTEMPTS = []
|
||||||
RESULT = False
|
RESULT = False
|
||||||
|
|
||||||
|
|
|
@ -2,10 +2,12 @@ import pytest
|
||||||
|
|
||||||
from common.data.post_breach_consts import POST_BREACH_JOB_SCHEDULING
|
from common.data.post_breach_consts import POST_BREACH_JOB_SCHEDULING
|
||||||
from infection_monkey.post_breach.actions.schedule_jobs import ScheduleJobs
|
from infection_monkey.post_breach.actions.schedule_jobs import ScheduleJobs
|
||||||
from infection_monkey.post_breach.job_scheduling.linux_job_scheduling import \
|
from infection_monkey.post_breach.job_scheduling.linux_job_scheduling import (
|
||||||
get_linux_commands_to_schedule_jobs
|
get_linux_commands_to_schedule_jobs,
|
||||||
from infection_monkey.post_breach.job_scheduling.windows_job_scheduling import \
|
)
|
||||||
get_windows_commands_to_schedule_jobs
|
from infection_monkey.post_breach.job_scheduling.windows_job_scheduling import (
|
||||||
|
get_windows_commands_to_schedule_jobs,
|
||||||
|
)
|
||||||
from infection_monkey.telemetry.post_breach_telem import PostBreachTelem
|
from infection_monkey.telemetry.post_breach_telem import PostBreachTelem
|
||||||
from infection_monkey.utils.environment import is_windows_os
|
from infection_monkey.utils.environment import is_windows_os
|
||||||
|
|
||||||
|
@ -13,8 +15,11 @@ from infection_monkey.utils.environment import is_windows_os
|
||||||
HOSTNAME = "hostname"
|
HOSTNAME = "hostname"
|
||||||
IP = "0.0.0.0"
|
IP = "0.0.0.0"
|
||||||
PBA = ScheduleJobs()
|
PBA = ScheduleJobs()
|
||||||
PBA_COMMAND = get_windows_commands_to_schedule_jobs() if is_windows_os() else\
|
PBA_COMMAND = (
|
||||||
' '.join(get_linux_commands_to_schedule_jobs())
|
get_windows_commands_to_schedule_jobs()
|
||||||
|
if is_windows_os()
|
||||||
|
else " ".join(get_linux_commands_to_schedule_jobs())
|
||||||
|
)
|
||||||
PBA_NAME = POST_BREACH_JOB_SCHEDULING
|
PBA_NAME = POST_BREACH_JOB_SCHEDULING
|
||||||
RESULT = False
|
RESULT = False
|
||||||
|
|
||||||
|
|
|
@ -3,17 +3,20 @@ import pytest
|
||||||
from infection_monkey.telemetry.scan_telem import ScanTelem
|
from infection_monkey.telemetry.scan_telem import ScanTelem
|
||||||
from infection_monkey.model.host import VictimHost
|
from infection_monkey.model.host import VictimHost
|
||||||
|
|
||||||
|
|
||||||
DOMAIN_NAME = "domain-name"
|
DOMAIN_NAME = "domain-name"
|
||||||
IP = "0.0.0.0"
|
IP = "0.0.0.0"
|
||||||
HOST = VictimHost(IP, DOMAIN_NAME)
|
HOST = VictimHost(IP, DOMAIN_NAME)
|
||||||
HOST_AS_DICT = {'ip_addr': IP,
|
HOST_AS_DICT = {
|
||||||
'domain_name': DOMAIN_NAME,
|
"ip_addr": IP,
|
||||||
'os': {},
|
"domain_name": DOMAIN_NAME,
|
||||||
'services': {},
|
"os": {},
|
||||||
'icmp': False,
|
"services": {},
|
||||||
'monkey_exe': None,
|
"icmp": False,
|
||||||
'default_tunnel': None,
|
"monkey_exe": None,
|
||||||
'default_server': None}
|
"default_tunnel": None,
|
||||||
|
"default_server": None,
|
||||||
|
}
|
||||||
HOST_SERVICES = {}
|
HOST_SERVICES = {}
|
||||||
|
|
||||||
|
|
||||||
|
|
|
@ -2,6 +2,7 @@ import pytest
|
||||||
|
|
||||||
from infection_monkey.telemetry.state_telem import StateTelem
|
from infection_monkey.telemetry.state_telem import StateTelem
|
||||||
|
|
||||||
|
|
||||||
IS_DONE = True
|
IS_DONE = True
|
||||||
VERSION = "version"
|
VERSION = "version"
|
||||||
|
|
||||||
|
|
|
@ -2,6 +2,7 @@ import pytest
|
||||||
|
|
||||||
from infection_monkey.telemetry.system_info_telem import SystemInfoTelem
|
from infection_monkey.telemetry.system_info_telem import SystemInfoTelem
|
||||||
|
|
||||||
|
|
||||||
SYSTEM_INFO = {}
|
SYSTEM_INFO = {}
|
||||||
|
|
||||||
|
|
||||||
|
|
|
@ -2,6 +2,7 @@ import pytest
|
||||||
|
|
||||||
from infection_monkey.telemetry.trace_telem import TraceTelem
|
from infection_monkey.telemetry.trace_telem import TraceTelem
|
||||||
|
|
||||||
|
|
||||||
MSG = "message"
|
MSG = "message"
|
||||||
|
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue