blob: d962c1d00dc80a86186eabc25397aa83672005ed (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
|
%global _empty_manifest_terminate_build 0
Name: python-androguard
Version: 3.3.5
Release: 1
Summary: Androguard is a full python tool to play with Android files.
License: Apache Licence, Version 2.0
URL: https://github.com/androguard/androguard
Source0: https://mirrors.nju.edu.cn/pypi/web/packages/83/78/0f44e8f0fd10493b3118d79d60599c93e5a2cd378d83054014600a620cba/androguard-3.3.5.tar.gz
BuildArch: noarch
Requires: python3-asn1crypto
Requires: python3-click
Requires: python3-colorama
Requires: python3-future
Requires: python3-ipython
Requires: python3-lxml
Requires: python3-matplotlib
Requires: python3-networkx
Requires: python3-pydot
Requires: python3-pygments
Requires: python3-PyQt5
Requires: python3-pyperclip
Requires: python3-sphinx
Requires: python3-sphinx-rtd-theme
Requires: python3-sphinxcontrib-programoutput
Requires: python3-magic
Requires: python3-codecov
Requires: python3-coverage
Requires: python3-mock
Requires: python3-nose
Requires: python3-nose-timer
%description
Androguard is a tool and python library to interact with Android Files.
Usually they come in the form of Android Packages (APK) or Dalvik Executeable (DEX) files.
Androguard has tools to read Android's binary format for XML files (AXML) and is also suited with a decompiler for DEX.
Androguard might not only be used as a tool for reverse engineering single applications, but features a lot of functions
for automated analysis. It provides a pure python framework to build your own analysis tools.
If you encounter bugs while using androguard, please feel free to report them in our bugtracker_.
.. _bugtracker: https://github.com/androguard/androguard/issues
%package -n python3-androguard
Summary: Androguard is a full python tool to play with Android files.
Provides: python-androguard
BuildRequires: python3-devel
BuildRequires: python3-setuptools
BuildRequires: python3-pip
%description -n python3-androguard
Androguard is a tool and python library to interact with Android Files.
Usually they come in the form of Android Packages (APK) or Dalvik Executeable (DEX) files.
Androguard has tools to read Android's binary format for XML files (AXML) and is also suited with a decompiler for DEX.
Androguard might not only be used as a tool for reverse engineering single applications, but features a lot of functions
for automated analysis. It provides a pure python framework to build your own analysis tools.
If you encounter bugs while using androguard, please feel free to report them in our bugtracker_.
.. _bugtracker: https://github.com/androguard/androguard/issues
%package help
Summary: Development documents and examples for androguard
Provides: python3-androguard-doc
%description help
Androguard is a tool and python library to interact with Android Files.
Usually they come in the form of Android Packages (APK) or Dalvik Executeable (DEX) files.
Androguard has tools to read Android's binary format for XML files (AXML) and is also suited with a decompiler for DEX.
Androguard might not only be used as a tool for reverse engineering single applications, but features a lot of functions
for automated analysis. It provides a pure python framework to build your own analysis tools.
If you encounter bugs while using androguard, please feel free to report them in our bugtracker_.
.. _bugtracker: https://github.com/androguard/androguard/issues
%prep
%autosetup -n androguard-3.3.5
%build
%py3_build
%install
%py3_install
install -d -m755 %{buildroot}/%{_pkgdocdir}
if [ -d doc ]; then cp -arf doc %{buildroot}/%{_pkgdocdir}; fi
if [ -d docs ]; then cp -arf docs %{buildroot}/%{_pkgdocdir}; fi
if [ -d example ]; then cp -arf example %{buildroot}/%{_pkgdocdir}; fi
if [ -d examples ]; then cp -arf examples %{buildroot}/%{_pkgdocdir}; fi
pushd %{buildroot}
if [ -d usr/lib ]; then
find usr/lib -type f -printf "/%h/%f\n" >> filelist.lst
fi
if [ -d usr/lib64 ]; then
find usr/lib64 -type f -printf "/%h/%f\n" >> filelist.lst
fi
if [ -d usr/bin ]; then
find usr/bin -type f -printf "/%h/%f\n" >> filelist.lst
fi
if [ -d usr/sbin ]; then
find usr/sbin -type f -printf "/%h/%f\n" >> filelist.lst
fi
touch doclist.lst
if [ -d usr/share/man ]; then
find usr/share/man -type f -printf "/%h/%f.gz\n" >> doclist.lst
fi
popd
mv %{buildroot}/filelist.lst .
mv %{buildroot}/doclist.lst .
%files -n python3-androguard -f filelist.lst
%dir %{python3_sitelib}/*
%files help -f doclist.lst
%{_docdir}/*
%changelog
* Sun Apr 23 2023 Python_Bot <Python_Bot@openeuler.org> - 3.3.5-1
- Package Spec generated
|