From 726e18079737c51d32bf4a0b6b56988ffc3f1dd2 Mon Sep 17 00:00:00 2001 From: VakarisZ Date: Wed, 7 Jul 2021 13:02:10 +0300 Subject: [PATCH] Add a log message explaining why ransomware target directory is set to none --- monkey/infection_monkey/ransomware/ransomware_payload.py | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/monkey/infection_monkey/ransomware/ransomware_payload.py b/monkey/infection_monkey/ransomware/ransomware_payload.py index 56fd6f07f..f2e3eb476 100644 --- a/monkey/infection_monkey/ransomware/ransomware_payload.py +++ b/monkey/infection_monkey/ransomware/ransomware_payload.py @@ -46,7 +46,8 @@ class RansomwarePayload: try: return Path(expand_path(target_dir_field)) - except InvalidPath: + except InvalidPath as e: + LOG.debug(f"Target ransomware dir set to None: {e}") return None def run_payload(self):