forked from oasis-open/cti-pattern-validator
-
Notifications
You must be signed in to change notification settings - Fork 0
/
setup.py
67 lines (61 loc) · 1.75 KB
/
setup.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
#!/usr/bin/env python
from setuptools import find_packages, setup
with open('README.rst') as f:
readme = f.read()
doc_requires = [
'sphinx',
'sphinx-prompt',
]
test_requires = [
'coverage',
'pytest',
'pytest-cov',
]
dev_requires = doc_requires + test_requires + [
'bumpversion',
'check-manifest',
'pre-commit',
# test_requires are installed into every tox environment, so we don't
# want to include tox there.
'tox',
]
setup(
name='stix2-patterns',
version='1.3.2',
description='Validate STIX 2 Patterns.',
long_description=readme,
long_description_content_type='text/x-rst',
url="https://github.com/oasis-open/cti-pattern-validator",
author='OASIS Cyber Threat Intelligence Technical Committee',
author_email='[email protected]',
maintainer='Chris Lenk',
maintainer_email='[email protected]',
packages=find_packages(),
install_requires=[
'antlr4-python3-runtime~=4.8.0 ; python_version>="3"',
'six',
],
package_data={
'stix2patterns.test.v20': ['spec_examples.txt'],
'stix2patterns.test.v21': ['spec_examples.txt'],
},
entry_points={
'console_scripts': [
'validate-patterns = stix2patterns.validator:main',
],
},
classifiers=[
'Development Status :: 3 - Alpha',
'License :: OSI Approved :: BSD License',
'Programming Language :: Python :: 3',
'Programming Language :: Python :: 3.6',
'Programming Language :: Python :: 3.7',
'Programming Language :: Python :: 3.8',
'Programming Language :: Python :: 3.9',
],
extras_require={
'dev': dev_requires,
'docs': doc_requires,
'test': test_requires,
},
)