%global _empty_manifest_terminate_build 0
Name:		python-androguard
Version:	3.3.5
Release:	1
Summary:	Androguard is a full python tool to play with Android files.
License:	Apache Licence, Version 2.0
URL:		https://github.com/androguard/androguard
Source0:	https://mirrors.nju.edu.cn/pypi/web/packages/83/78/0f44e8f0fd10493b3118d79d60599c93e5a2cd378d83054014600a620cba/androguard-3.3.5.tar.gz
BuildArch:	noarch

Requires:	python3-asn1crypto
Requires:	python3-click
Requires:	python3-colorama
Requires:	python3-future
Requires:	python3-ipython
Requires:	python3-lxml
Requires:	python3-matplotlib
Requires:	python3-networkx
Requires:	python3-pydot
Requires:	python3-pygments
Requires:	python3-PyQt5
Requires:	python3-pyperclip
Requires:	python3-sphinx
Requires:	python3-sphinx-rtd-theme
Requires:	python3-sphinxcontrib-programoutput
Requires:	python3-magic
Requires:	python3-codecov
Requires:	python3-coverage
Requires:	python3-mock
Requires:	python3-nose
Requires:	python3-nose-timer

%description
Androguard is a tool and python library to interact with Android Files.

Usually they come in the form of Android Packages (APK) or Dalvik Executeable (DEX) files.
Androguard has tools to read Android's binary format for XML files (AXML) and is also suited with a decompiler for DEX.

Androguard might not only be used as a tool for reverse engineering single applications, but features a lot of functions
for automated analysis. It provides a pure python framework to build your own analysis tools.

If you encounter bugs while using androguard, please feel free to report them in our bugtracker_.

.. _bugtracker: https://github.com/androguard/androguard/issues




%package -n python3-androguard
Summary:	Androguard is a full python tool to play with Android files.
Provides:	python-androguard
BuildRequires:	python3-devel
BuildRequires:	python3-setuptools
BuildRequires:	python3-pip
%description -n python3-androguard
Androguard is a tool and python library to interact with Android Files.

Usually they come in the form of Android Packages (APK) or Dalvik Executeable (DEX) files.
Androguard has tools to read Android's binary format for XML files (AXML) and is also suited with a decompiler for DEX.

Androguard might not only be used as a tool for reverse engineering single applications, but features a lot of functions
for automated analysis. It provides a pure python framework to build your own analysis tools.

If you encounter bugs while using androguard, please feel free to report them in our bugtracker_.

.. _bugtracker: https://github.com/androguard/androguard/issues




%package help
Summary:	Development documents and examples for androguard
Provides:	python3-androguard-doc
%description help
Androguard is a tool and python library to interact with Android Files.

Usually they come in the form of Android Packages (APK) or Dalvik Executeable (DEX) files.
Androguard has tools to read Android's binary format for XML files (AXML) and is also suited with a decompiler for DEX.

Androguard might not only be used as a tool for reverse engineering single applications, but features a lot of functions
for automated analysis. It provides a pure python framework to build your own analysis tools.

If you encounter bugs while using androguard, please feel free to report them in our bugtracker_.

.. _bugtracker: https://github.com/androguard/androguard/issues




%prep
%autosetup -n androguard-3.3.5

%build
%py3_build

%install
%py3_install
install -d -m755 %{buildroot}/%{_pkgdocdir}
if [ -d doc ]; then cp -arf doc %{buildroot}/%{_pkgdocdir}; fi
if [ -d docs ]; then cp -arf docs %{buildroot}/%{_pkgdocdir}; fi
if [ -d example ]; then cp -arf example %{buildroot}/%{_pkgdocdir}; fi
if [ -d examples ]; then cp -arf examples %{buildroot}/%{_pkgdocdir}; fi
pushd %{buildroot}
if [ -d usr/lib ]; then
	find usr/lib -type f -printf "/%h/%f\n" >> filelist.lst
fi
if [ -d usr/lib64 ]; then
	find usr/lib64 -type f -printf "/%h/%f\n" >> filelist.lst
fi
if [ -d usr/bin ]; then
	find usr/bin -type f -printf "/%h/%f\n" >> filelist.lst
fi
if [ -d usr/sbin ]; then
	find usr/sbin -type f -printf "/%h/%f\n" >> filelist.lst
fi
touch doclist.lst
if [ -d usr/share/man ]; then
	find usr/share/man -type f -printf "/%h/%f.gz\n" >> doclist.lst
fi
popd
mv %{buildroot}/filelist.lst .
mv %{buildroot}/doclist.lst .

%files -n python3-androguard -f filelist.lst
%dir %{python3_sitelib}/*

%files help -f doclist.lst
%{_docdir}/*

%changelog
* Sun Apr 23 2023 Python_Bot <Python_Bot@openeuler.org> - 3.3.5-1
- Package Spec generated