mandiant / flare-fakenet-ng

FakeNet-NG - Next Generation Dynamic Network Analysis Tool
Apache License 2.0
1.73k stars 357 forks source link

Use executable location as base for various file operations (#180) #185

Open Donaldduck8 opened 2 months ago

Donaldduck8 commented 2 months ago

Currently, the FakeNet executable attempts to locate its files in the session's current working directory. However, this is not ideal as configuration files, for example, are actually located relative to the executable's location, not the location from which the user launched the executable. This issue was described in #180.

When inside a PyInstaller bundle, the parent directory of the executable can be retrieved using os.path.dirname(sys.executable).

I have applied this to various file operations throughout FakeNet. If I missed any, please let me know!

google-cla[bot] commented 2 months ago

Thanks for your pull request! It looks like this may be your first contribution to a Google open source project. Before we can look at your pull request, you'll need to sign a Contributor License Agreement (CLA).

View this failed invocation of the CLA check for more information.

For the most up to date status, view the checks section at the bottom of the pull request.