8
8
import json
9
9
import os
10
10
11
+ LiveCI = True
11
12
12
13
class TestExpansions (unittest .TestCase ):
13
14
@@ -460,8 +461,9 @@ def test_stix2_pattern_validator(self):
460
461
query = {"module" : "stix2_pattern_syntax_validator" , "stix2-pattern" : "[ipv4-addr:value = '8.8.8.8']" }
461
462
response = self .misp_modules_post (query )
462
463
self .assertEqual (self .get_values (response ), 'Syntax valid' )
463
-
464
464
def test_threatcrowd (self ):
465
+ if LiveCI :
466
+ return True
465
467
query_types = ('domain' , 'ip-src' , 'md5' , 'whois-registrant-email' )
466
468
query_values = (
'circl.lu' ,
'185.194.93.14' ,
'616eff3e9a7575ae73821b4668d2801c' ,
'[email protected] ' )
467
469
results = ('149.13.33.4' , 'cve.circl.lu' , 'devilreturns.com' , 'navabi.lu' )
@@ -471,6 +473,8 @@ def test_threatcrowd(self):
471
473
self .assertTrue (self .get_values (response ), result )
472
474
473
475
def test_threatminer (self ):
476
+ if LiveCI :
477
+ return True
474
478
query_types = ('domain' , 'ip-src' , 'md5' )
475
479
query_values = ('circl.lu' , '149.13.33.4' , 'b538dbc6160ef54f755a540e06dc27cd980fc4a12005e90b3627febb44a1a90f' )
476
480
results = ('149.13.33.14' , 'f6ecb9d5c21defb1f622364a30cb8274f817a1a2' , 'http://www.circl.lu/' )
@@ -606,6 +610,8 @@ def test_xforceexchange(self):
606
610
self .assertEqual (self .get_errors (response ), "An API authentication is required (key and password)." )
607
611
608
612
def test_xlsx (self ):
613
+ if LiveCI :
614
+ return True
609
615
filename = 'test.xlsx'
610
616
with open (f'{ self .dirname } /test_files/{ filename } ' , 'rb' ) as f :
611
617
encoded = b64encode (f .read ()).decode ()
0 commit comments