Remove "__author__" lines from the source code

The "__author__" lines in numerous Python files serve little purpose.
At best, they are redundant. At worst, they are incorrect and
misleading.

The VCS (i.e. git) tracks all changes to files. Storing the author in
the files is redundant violates the DRY principle.

If the file changes, whose name belongs in the __author__ field? What if
it changes so drastically that it's almost unrecognizable? If there's
any circumstance where the __author__ name should change, what enforces
that this change takes place? Given the ambiguity of these scenarios,
the __author__ field could be misleading or incorrect.

Resolves #1345
This commit is contained in:
Mike Salvatore 2021-07-06 13:58:08 -04:00
parent cefc450b35
commit bfd7d3cfbf
156 changed files with 10 additions and 306 deletions

View File

@ -1 +0,0 @@
__author__ = "itay.mizeretz"

View File

@ -1 +0,0 @@
__author__ = "itay.mizeretz"

View File

@ -1 +0,0 @@
__author__ = "itay.mizeretz"

View File

@ -7,8 +7,6 @@ import requests
from common.cloud.environment_names import Environment
from common.cloud.instance import CloudInstance
__author__ = "itay.mizeretz"
AWS_INSTANCE_METADATA_LOCAL_IP_ADDRESS = "169.254.169.254"
AWS_LATEST_METADATA_URI_PREFIX = "http://{0}/latest/".format(AWS_INSTANCE_METADATA_LOCAL_IP_ADDRESS)
ACCOUNT_ID_KEY = "accountId"

View File

@ -5,8 +5,6 @@ import botocore
from common.cloud.aws.aws_instance import AwsInstance
__author__ = ["itay.mizeretz", "shay.nehmad"]
INSTANCE_INFORMATION_LIST_KEY = "InstanceInformationList"
INSTANCE_ID_KEY = "InstanceId"
COMPUTER_NAME_KEY = "ComputerName"

View File

@ -1,7 +1,5 @@
from common.cmd.cmd_result import CmdResult
__author__ = "itay.mizeretz"
class AwsCmdResult(CmdResult):
"""

View File

@ -5,8 +5,6 @@ from common.cmd.aws.aws_cmd_result import AwsCmdResult
from common.cmd.cmd_runner import CmdRunner
from common.cmd.cmd_status import CmdStatus
__author__ = "itay.mizeretz"
logger = logging.getLogger(__name__)

View File

@ -1,6 +1,3 @@
__author__ = "itay.mizeretz"
class Cmd(object):
"""
Class representing a command

View File

@ -1,6 +1,3 @@
__author__ = "itay.mizeretz"
class CmdResult(object):
"""
Class representing a command result

View File

@ -5,8 +5,6 @@ from abc import abstractmethod
from common.cmd.cmd_result import CmdResult
from common.cmd.cmd_status import CmdStatus
__author__ = "itay.mizeretz"
logger = logging.getLogger(__name__)

View File

@ -1,7 +1,5 @@
from enum import Enum
__author__ = "itay.mizeretz"
class CmdStatus(Enum):
IN_PROGRESS = 0

View File

@ -1 +0,0 @@
__author__ = "itay.mizeretz"

View File

@ -5,8 +5,6 @@ import socket
import struct
from abc import ABCMeta, abstractmethod
__author__ = "itamar"
LOG = logging.getLogger(__name__)

View File

@ -4,8 +4,6 @@ if sys.platform == "win32":
import win32com
import wmi
__author__ = "maor.rayzin"
class MongoUtils:
def __init__(self):

View File

@ -8,8 +8,6 @@ if sys.platform.startswith("win"):
from .mongo_utils import MongoUtils
__author__ = "maor.rayzin"
class WMIUtils:
def __init__(self):

View File

@ -1 +0,0 @@
__author__ = "itay.mizeretz"

View File

@ -5,8 +5,6 @@ import uuid
from abc import ABCMeta
from itertools import product
__author__ = "itamar"
GUID = str(uuid.getnode())
EXTERNAL_CONFIG_FILE = os.path.join(os.path.abspath(os.path.dirname(sys.argv[0])), "monkey.bin")

View File

@ -24,8 +24,6 @@ from infection_monkey.transport.http import HTTPConnectProxy
from infection_monkey.transport.tcp import TcpProxy
from infection_monkey.utils.exceptions.planned_shutdown_exception import PlannedShutdownException
__author__ = "hoffer"
requests.packages.urllib3.disable_warnings()
LOG = logging.getLogger(__name__)

View File

@ -32,7 +32,6 @@ except NameError:
# noinspection PyShadowingBuiltins
WindowsError = IOError
__author__ = "itamar"
LOG = logging.getLogger(__name__)

View File

@ -8,8 +8,6 @@ from common.utils.exploit_enum import ExploitType
from infection_monkey.config import WormConfiguration
from infection_monkey.utils.plugins.plugin import Plugin
__author__ = "itamar"
logger = logging.getLogger(__name__)

View File

@ -15,8 +15,6 @@ from common.network.network_utils import remove_port
from infection_monkey.exploit.web_rce import WebRCE
from infection_monkey.model import ID_STRING
__author__ = "Ophir Harpaz"
LOG = logging.getLogger(__name__)

View File

@ -25,8 +25,6 @@ from infection_monkey.model import (
from infection_monkey.network.elasticfinger import ES_PORT
from infection_monkey.telemetry.attack.t1197_telem import T1197Telem
__author__ = "danielg, VakarisZ"
LOG = logging.getLogger(__name__)

View File

@ -24,8 +24,6 @@ from infection_monkey.model import (
)
from infection_monkey.utils.commands import build_monkey_commandline
__author__ = "VakarisZ"
LOG = logging.getLogger(__name__)

View File

@ -44,8 +44,6 @@ from infection_monkey.pyinstaller_utils import get_binary_file_path
from infection_monkey.telemetry.attack.t1105_telem import T1105Telem
from infection_monkey.utils.commands import build_monkey_commandline
__author__ = "itay.mizeretz"
LOG = logging.getLogger(__name__)

View File

@ -16,8 +16,6 @@ from infection_monkey.model import DROPPER_ARG
from infection_monkey.telemetry.attack.t1222_telem import T1222Telem
from infection_monkey.utils.commands import build_monkey_commandline
__author__ = "danielg"
LOG = logging.getLogger(__name__)
TIMEOUT = 2
TEST_COMMAND = "/bin/uname -a"

View File

@ -16,8 +16,6 @@ from infection_monkey.telemetry.attack.t1105_telem import T1105Telem
from infection_monkey.telemetry.attack.t1222_telem import T1222Telem
from infection_monkey.utils.commands import build_monkey_commandline
__author__ = "hoffer"
LOG = logging.getLogger(__name__)
SSH_PORT = 22
TRANSFER_UPDATE_RATE = 15

View File

@ -13,8 +13,6 @@ import urllib.request
from infection_monkey.exploit.web_rce import WebRCE
__author__ = "VakarisZ"
LOG = logging.getLogger(__name__)
DOWNLOAD_TIMEOUT = 300

View File

@ -13,8 +13,6 @@ from infection_monkey.network.info import get_free_tcp_port
from infection_monkey.network.tools import get_interface_to_target
from infection_monkey.transport import HTTPServer, LockedHTTPServer
__author__ = "itamar"
LOG = logging.getLogger(__name__)

View File

@ -13,8 +13,6 @@ from infection_monkey.config import Configuration
from infection_monkey.network.tools import get_interface_to_target
from infection_monkey.telemetry.attack.t1105_telem import T1105Telem
__author__ = "itamar"
LOG = logging.getLogger(__name__)

View File

@ -5,8 +5,6 @@ from impacket.dcerpc.v5.dcom.wmi import DCERPCSessionError
from impacket.dcerpc.v5.dcomrt import DCOMConnection
from impacket.dcerpc.v5.dtypes import NULL
__author__ = "itamar"
LOG = logging.getLogger(__name__)

View File

@ -25,7 +25,6 @@ from infection_monkey.utils.commands import build_monkey_commandline
LOG = getLogger(__name__)
__author__ = "D3fa1t"
FTP_PORT = 21 # port at which vsftpd runs
BACKDOOR_PORT = 6200 # backdoor port

View File

@ -26,8 +26,6 @@ from infection_monkey.telemetry.attack.t1197_telem import T1197Telem
from infection_monkey.telemetry.attack.t1222_telem import T1222Telem
from infection_monkey.utils.commands import build_monkey_commandline
__author__ = "VakarisZ"
LOG = logging.getLogger(__name__)
# Command used to check if monkeys already exists
LOOK_FOR_FILE = "ls %s"

View File

@ -11,8 +11,6 @@ from infection_monkey.exploit.web_rce import WebRCE
from infection_monkey.network.info import get_free_tcp_port
from infection_monkey.network.tools import get_interface_to_target
__author__ = "VakarisZ"
LOG = logging.getLogger(__name__)
# How long server waits for get request in seconds
SERVER_TIMEOUT = 4

View File

@ -18,8 +18,6 @@ from infection_monkey.model import DROPPER_ARG, MONKEY_ARG
from infection_monkey.monkey import InfectionMonkey
from infection_monkey.utils.monkey_log_path import get_dropper_log_path, get_monkey_log_path
__author__ = "itamar"
LOG = None
LOG_CONFIG = {

View File

@ -1,7 +1,5 @@
from infection_monkey.model.host import VictimHost # noqa: F401
__author__ = "itamar"
MONKEY_ARG = "m0nk3y"
DROPPER_ARG = "dr0pp3r"
ID_STRING = "M0NK3Y3XPL0ITABLE"

View File

@ -1,6 +1,3 @@
__author__ = "itamar"
class VictimHost(object):
def __init__(self, ip_addr, domain_name=""):
self.ip_addr = ip_addr

View File

@ -42,7 +42,6 @@ from infection_monkey.windows_upgrader import WindowsUpgrader
MAX_DEPTH_REACHED_MESSAGE = "Reached max depth, shutting down"
__author__ = "itamar"
LOG = logging.getLogger(__name__)

View File

@ -3,7 +3,7 @@ import os
import platform
import sys
__author__ = 'itay.mizeretz'
from PyInstaller.utils.hooks import collect_data_files

View File

@ -1,8 +1,6 @@
import os
from io import BytesIO
__author__ = "hoffer"
MONKEYFS_PREFIX = "monkeyfs://"
open_orig = open

View File

@ -1 +0,0 @@
__author__ = "itamar"

View File

@ -12,7 +12,6 @@ from infection_monkey.network.HostFinger import HostFinger
ES_PORT = 9200
ES_HTTP_TIMEOUT = 5
LOG = logging.getLogger(__name__)
__author__ = "danielg"
class ElasticFinger(HostFinger):

View File

@ -5,8 +5,6 @@ import socket
import infection_monkey.config
from infection_monkey.network.HostFinger import HostFinger
__author__ = "Maor Rayzin"
LOG = logging.getLogger(__name__)

View File

@ -8,8 +8,6 @@ import infection_monkey.config
from infection_monkey.network.HostFinger import HostFinger
from infection_monkey.network.HostScanner import HostScanner
__author__ = "itamar"
PING_COUNT_FLAG = "-n" if "win32" == sys.platform else "-c"
PING_TIMEOUT_FLAG = "-w" if "win32" == sys.platform else "-W"
TTL_REGEX_STR = r"(?<=TTL\=)[0-9]+"

View File

@ -6,8 +6,6 @@ from infection_monkey.network.HostFinger import HostFinger
from infection_monkey.network.HostScanner import HostScanner
from infection_monkey.network.tools import check_tcp_ports, tcp_port_to_service
__author__ = "itamar"
BANNER_READ = 1024

View File

@ -1 +0,0 @@
__author__ = "danielg"

View File

@ -13,7 +13,6 @@ from infection_monkey.utils.monkey_dir import get_monkey_dir_path
LOG = logging.getLogger(__name__)
__author__ = "VakarisZ"
DIR_CHANGE_WINDOWS = "cd %s & "
DIR_CHANGE_LINUX = "cd %s ; "

View File

@ -11,8 +11,6 @@ from infection_monkey.utils.plugins.plugin import Plugin
LOG = logging.getLogger(__name__)
__author__ = "VakarisZ"
class PBA(Plugin):
"""

View File

@ -6,8 +6,6 @@ from infection_monkey.post_breach.pba import PBA
LOG = logging.getLogger(__name__)
__author__ = "VakarisZ"
class PostBreach(object):
"""

View File

@ -1,8 +1,6 @@
import os
import sys
__author__ = "itay.mizeretz"
def get_binaries_dir_path():
"""

View File

@ -6,8 +6,6 @@ import pwd
from common.utils.attack_utils import ScanStatus
from infection_monkey.telemetry.attack.t1005_telem import T1005Telem
__author__ = "VakarisZ"
LOG = logging.getLogger(__name__)

View File

@ -19,8 +19,6 @@ except NameError:
# noinspection PyShadowingBuiltins
WindowsError = psutil.AccessDenied
__author__ = "uri"
class OperatingSystem(IntEnum):
Windows = 0

View File

@ -9,8 +9,6 @@ from common.utils.attack_utils import ScanStatus
from infection_monkey.telemetry.attack.t1005_telem import T1005Telem
from infection_monkey.telemetry.attack.t1064_telem import T1064Telem
__author__ = "danielg"
LOG = logging.getLogger(__name__)

View File

@ -3,8 +3,6 @@ import logging
from infection_monkey.system_info import InfoCollector
from infection_monkey.system_info.SSH_info_collector import SSHCollector
__author__ = "uri"
LOG = logging.getLogger(__name__)

View File

@ -7,8 +7,6 @@ from socket import AF_INET, SOCK_DGRAM, SOCK_STREAM
import psutil
__author__ = "itay.mizeretz"
LOG = logging.getLogger(__name__)

View File

@ -17,8 +17,6 @@ from infection_monkey.system_info.wmi_consts import WMI_CLASSES # noqa: E402
LOG = logging.getLogger(__name__)
LOG.info("started windows info collector")
__author__ = "uri"
class WindowsInfoCollector(InfoCollector):
"""

View File

@ -5,8 +5,6 @@ from abc import ABCMeta, abstractmethod
from infection_monkey.config import WormConfiguration
__author__ = "itamar"
LOG = logging.getLogger(__name__)

View File

@ -1,8 +1,6 @@
from common.common_consts.telem_categories import TelemCategoryEnum
from infection_monkey.telemetry.base_telem import BaseTelem
__author__ = "VakarisZ"
class AttackTelem(BaseTelem):
def __init__(self, technique, status):

View File

@ -1,7 +1,5 @@
from infection_monkey.telemetry.attack.victim_host_telem import VictimHostTelem
__author__ = "itay.mizeretz"
class T1197Telem(VictimHostTelem):
def __init__(self, status, machine, usage):

View File

@ -1,7 +1,5 @@
from infection_monkey.telemetry.attack.attack_telem import AttackTelem
__author__ = "VakarisZ"
class VictimHostTelem(AttackTelem):
def __init__(self, technique, status, machine):

View File

@ -8,8 +8,6 @@ from infection_monkey.telemetry.i_telem import ITelem
logger = logging.getLogger(__name__)
LOGGED_DATA_LENGTH = 300 # How many characters of telemetry data will be logged
__author__ = "itay.mizeretz"
# TODO: Rework the interface for telemetry; this class has too many responsibilities
# (i.e. too many reasons to change):

View File

@ -1,8 +1,6 @@
from common.common_consts.telem_categories import TelemCategoryEnum
from infection_monkey.telemetry.base_telem import BaseTelem
__author__ = "itay.mizeretz"
class ExploitTelem(BaseTelem):
def __init__(self, exploiter, result):

View File

@ -3,8 +3,6 @@ import socket
from common.common_consts.telem_categories import TelemCategoryEnum
from infection_monkey.telemetry.base_telem import BaseTelem
__author__ = "itay.mizeretz"
class PostBreachTelem(BaseTelem):
def __init__(self, pba, result):

View File

@ -1,8 +1,6 @@
from common.common_consts.telem_categories import TelemCategoryEnum
from infection_monkey.telemetry.base_telem import BaseTelem
__author__ = "itay.mizeretz"
class ScanTelem(BaseTelem):
def __init__(self, machine):

View File

@ -1,8 +1,6 @@
from common.common_consts.telem_categories import TelemCategoryEnum
from infection_monkey.telemetry.base_telem import BaseTelem
__author__ = "itay.mizeretz"
class StateTelem(BaseTelem):
def __init__(self, is_done, version="Unknown"):

View File

@ -1,8 +1,6 @@
from common.common_consts.telem_categories import TelemCategoryEnum
from infection_monkey.telemetry.base_telem import BaseTelem
__author__ = "itay.mizeretz"
class SystemInfoTelem(BaseTelem):
def __init__(self, system_info):

View File

@ -3,8 +3,6 @@ import logging
from common.common_consts.telem_categories import TelemCategoryEnum
from infection_monkey.telemetry.base_telem import BaseTelem
__author__ = "itay.mizeretz"
LOG = logging.getLogger(__name__)

View File

@ -2,8 +2,6 @@ from common.common_consts.telem_categories import TelemCategoryEnum
from infection_monkey.control import ControlClient
from infection_monkey.telemetry.base_telem import BaseTelem
__author__ = "itay.mizeretz"
class TunnelTelem(BaseTelem):
def __init__(self):

View File

@ -15,8 +15,6 @@ from common.common_consts.timeouts import SHORT_REQUEST_TIMEOUT
from infection_monkey.network.tools import get_interface_to_target
from infection_monkey.transport.base import TransportProxyBase, update_last_serve_time
__author__ = "hoffer"
LOG = getLogger(__name__)

View File

@ -10,8 +10,6 @@ from infection_monkey.network.info import get_free_tcp_port, local_ips
from infection_monkey.network.tools import check_tcp_port, get_interface_to_target
from infection_monkey.transport.base import get_last_serve_time
__author__ = "hoffer"
LOG = logging.getLogger(__name__)
MCAST_GROUP = "224.1.1.1"

View File

@ -13,8 +13,6 @@ from infection_monkey.utils.commands import (
)
from infection_monkey.utils.environment import is_64bit_python, is_64bit_windows_os, is_windows_os
__author__ = "itay.mizeretz"
LOG = logging.getLogger(__name__)
if "win32" == sys.platform:

View File

@ -1 +0,0 @@
__author__ = "itay.mizeretz"

View File

@ -1 +0,0 @@
__author__ = "Barak"

View File

@ -58,8 +58,6 @@ from monkey_island.cc.services.database import Database
from monkey_island.cc.services.remote_run_aws import RemoteRunAwsService
from monkey_island.cc.services.representations import output_json
__author__ = "Barak"
HOME_FILE = "index.html"

View File

@ -2,8 +2,6 @@ import gridfs
from flask_pymongo import MongoClient, PyMongo
from pymongo.errors import ServerSelectionTimeoutError
__author__ = "Barak"
mongo = PyMongo()

View File

@ -2,8 +2,6 @@ import logging
from abc import ABCMeta, abstractmethod
from datetime import timedelta
__author__ = "itay.mizeretz"
from common.utils.exceptions import (
AlreadyRegisteredError,
CredentialsNotRequiredError,

View File

@ -1,8 +1,6 @@
from common.cloud.aws.aws_instance import AwsInstance
from monkey_island.cc.environment import Environment
__author__ = "itay.mizeretz"
class AwsEnvironment(Environment):
_credentials_required = True

View File

@ -3,8 +3,6 @@ import logging
import monkey_island.cc.resources.auth.user_store as user_store
from monkey_island.cc.environment import EnvironmentConfig, aws, password, standard
__author__ = "itay.mizeretz"
logger = logging.getLogger(__name__)
AWS = "aws"

View File

@ -1,7 +1,5 @@
from monkey_island.cc.environment import Environment
__author__ = "itay.mizeretz"
class PasswordEnvironment(Environment):
_credentials_required = True

View File

@ -1,8 +1,6 @@
from monkey_island.cc.environment import Environment
from monkey_island.cc.resources.auth.auth_user import User
__author__ = "itay.mizeretz"
class StandardEnvironment(Environment):
_credentials_required = False

View File

@ -1 +0,0 @@
__author__ = "Barak"

View File

@ -1 +0,0 @@
__author__ = "VakarisZ"

View File

@ -4,8 +4,6 @@ from flask import current_app, json, jsonify, request
from monkey_island.cc.resources.auth.auth import jwt_required
from monkey_island.cc.services.attack.attack_config import AttackConfig
__author__ = "VakarisZ"
class AttackConfiguration(flask_restful.Resource):
@jwt_required

View File

@ -5,8 +5,6 @@ from monkey_island.cc.resources.auth.auth import jwt_required
from monkey_island.cc.services.attack.attack_report import AttackReportService
from monkey_island.cc.services.attack.attack_schema import SCHEMA
__author__ = "VakarisZ"
class AttackReport(flask_restful.Resource):
@jwt_required

View File

@ -1,6 +1,3 @@
__author__ = "itay.mizeretz"
class User(object):
def __init__(self, user_id, username, secret):
self.id = user_id

View File

@ -5,8 +5,6 @@ from flask import jsonify, request
from monkey_island.cc.services.node import NodeService
__author__ = "itay.mizeretz"
logger = logging.getLogger(__name__)

View File

@ -3,8 +3,6 @@ from flask import request
from monkey_island.cc.services.edge.displayed_edge import DisplayedEdgeService
__author__ = "Barak"
class Edge(flask_restful.Resource):
def get(self):

View File

@ -5,8 +5,6 @@ import flask_restful
from monkey_island.cc.resources.auth.auth import jwt_required
from monkey_island.cc.services.island_logs import IslandLogService
__author__ = "Maor.Rayzin"
logger = logging.getLogger(__name__)

View File

@ -10,8 +10,6 @@ from monkey_island.cc.resources.blackbox.utils.telem_store import TestTelemStore
from monkey_island.cc.services.log import LogService
from monkey_island.cc.services.node import NodeService
__author__ = "itay.mizeretz"
class Log(flask_restful.Resource):
@jwt_required

View File

@ -13,9 +13,6 @@ from monkey_island.cc.services.config import ConfigService
from monkey_island.cc.services.edge.edge import EdgeService
from monkey_island.cc.services.node import NodeService
__author__ = "Barak"
# TODO: separate logic from interface

View File

@ -6,8 +6,6 @@ from flask import abort, jsonify, request
from monkey_island.cc.resources.auth.auth import jwt_required
from monkey_island.cc.services.config import ConfigService
__author__ = "Barak"
class MonkeyConfiguration(flask_restful.Resource):
@jwt_required

View File

@ -8,8 +8,6 @@ from flask import request, send_from_directory
from monkey_island.cc.server_utils.consts import MONKEY_ISLAND_ABS_PATH
__author__ = "Barak"
logger = logging.getLogger(__name__)
MONKEY_DOWNLOADS = [

View File

@ -4,8 +4,6 @@ from monkey_island.cc.resources.auth.auth import jwt_required
from monkey_island.cc.services.netmap.net_edge import NetEdgeService
from monkey_island.cc.services.netmap.net_node import NetNodeService
__author__ = "Barak"
class NetMap(flask_restful.Resource):
@jwt_required

View File

@ -4,8 +4,6 @@ from flask import request
from monkey_island.cc.resources.auth.auth import jwt_required
from monkey_island.cc.services.node import NodeService
__author__ = "Barak"
class Node(flask_restful.Resource):
@jwt_required

View File

@ -3,8 +3,6 @@ from flask import send_from_directory
from monkey_island.cc.services.post_breach_files import PostBreachFilesService
__author__ = "VakarisZ"
class PBAFileDownload(flask_restful.Resource):
"""

View File

@ -11,8 +11,6 @@ from monkey_island.cc.resources.auth.auth import jwt_required
from monkey_island.cc.services.config import ConfigService
from monkey_island.cc.services.post_breach_files import PostBreachFilesService
__author__ = "VakarisZ"
LOG = logging.getLogger(__name__)
# Front end uses these strings to identify which files to work with (linux or windows)
LINUX_PBA_TYPE = "PBAlinux"

View File

@ -9,8 +9,6 @@ from monkey_island.cc.services.database import Database
from monkey_island.cc.services.infection_lifecycle import InfectionLifecycle
from monkey_island.cc.services.utils.network_utils import local_ip_addresses
__author__ = "Barak"
logger = logging.getLogger(__name__)

View File

@ -14,8 +14,6 @@ from monkey_island.cc.resources.blackbox.utils.telem_store import TestTelemStore
from monkey_island.cc.services.node import NodeService
from monkey_island.cc.services.telemetry.processing.processing import process_telemetry
__author__ = "Barak"
logger = logging.getLogger(__name__)

View File

@ -13,8 +13,6 @@ from monkey_island.cc.services.node import NodeService
logger = logging.getLogger(__name__)
__author__ = "itay.mizeretz"
class TelemetryFeed(flask_restful.Resource):
@jwt_required

View File

@ -5,8 +5,6 @@ import flask_restful
from common.version import get_version
from monkey_island.cc.services.version_update import VersionUpdateService
__author__ = "itay.mizeretz"
logger = logging.getLogger(__name__)

View File

@ -4,8 +4,6 @@ from pathlib import Path
from common.utils.file_utils import expand_path
from monkey_island.cc.server_utils.file_utils import is_windows_os
__author__ = "itay.mizeretz"
def get_default_data_dir() -> str:
if is_windows_os():

Some files were not shown because too many files have changed in this diff Show More