%global _empty_manifest_terminate_build 0 Name: python-androguard Version: 3.3.5 Release: 1 Summary: Androguard is a full python tool to play with Android files. License: Apache Licence, Version 2.0 URL: https://github.com/androguard/androguard Source0: https://mirrors.nju.edu.cn/pypi/web/packages/83/78/0f44e8f0fd10493b3118d79d60599c93e5a2cd378d83054014600a620cba/androguard-3.3.5.tar.gz BuildArch: noarch Requires: python3-asn1crypto Requires: python3-click Requires: python3-colorama Requires: python3-future Requires: python3-ipython Requires: python3-lxml Requires: python3-matplotlib Requires: python3-networkx Requires: python3-pydot Requires: python3-pygments Requires: python3-PyQt5 Requires: python3-pyperclip Requires: python3-sphinx Requires: python3-sphinx-rtd-theme Requires: python3-sphinxcontrib-programoutput Requires: python3-magic Requires: python3-codecov Requires: python3-coverage Requires: python3-mock Requires: python3-nose Requires: python3-nose-timer %description Androguard is a tool and python library to interact with Android Files. Usually they come in the form of Android Packages (APK) or Dalvik Executeable (DEX) files. Androguard has tools to read Android's binary format for XML files (AXML) and is also suited with a decompiler for DEX. Androguard might not only be used as a tool for reverse engineering single applications, but features a lot of functions for automated analysis. It provides a pure python framework to build your own analysis tools. If you encounter bugs while using androguard, please feel free to report them in our bugtracker_. .. _bugtracker: https://github.com/androguard/androguard/issues %package -n python3-androguard Summary: Androguard is a full python tool to play with Android files. Provides: python-androguard BuildRequires: python3-devel BuildRequires: python3-setuptools BuildRequires: python3-pip %description -n python3-androguard Androguard is a tool and python library to interact with Android Files. Usually they come in the form of Android Packages (APK) or Dalvik Executeable (DEX) files. Androguard has tools to read Android's binary format for XML files (AXML) and is also suited with a decompiler for DEX. Androguard might not only be used as a tool for reverse engineering single applications, but features a lot of functions for automated analysis. It provides a pure python framework to build your own analysis tools. If you encounter bugs while using androguard, please feel free to report them in our bugtracker_. .. _bugtracker: https://github.com/androguard/androguard/issues %package help Summary: Development documents and examples for androguard Provides: python3-androguard-doc %description help Androguard is a tool and python library to interact with Android Files. Usually they come in the form of Android Packages (APK) or Dalvik Executeable (DEX) files. Androguard has tools to read Android's binary format for XML files (AXML) and is also suited with a decompiler for DEX. Androguard might not only be used as a tool for reverse engineering single applications, but features a lot of functions for automated analysis. It provides a pure python framework to build your own analysis tools. If you encounter bugs while using androguard, please feel free to report them in our bugtracker_. .. _bugtracker: https://github.com/androguard/androguard/issues %prep %autosetup -n androguard-3.3.5 %build %py3_build %install %py3_install install -d -m755 %{buildroot}/%{_pkgdocdir} if [ -d doc ]; then cp -arf doc %{buildroot}/%{_pkgdocdir}; fi if [ -d docs ]; then cp -arf docs %{buildroot}/%{_pkgdocdir}; fi if [ -d example ]; then cp -arf example %{buildroot}/%{_pkgdocdir}; fi if [ -d examples ]; then cp -arf examples %{buildroot}/%{_pkgdocdir}; fi pushd %{buildroot} if [ -d usr/lib ]; then find usr/lib -type f -printf "/%h/%f\n" >> filelist.lst fi if [ -d usr/lib64 ]; then find usr/lib64 -type f -printf "/%h/%f\n" >> filelist.lst fi if [ -d usr/bin ]; then find usr/bin -type f -printf "/%h/%f\n" >> filelist.lst fi if [ -d usr/sbin ]; then find usr/sbin -type f -printf "/%h/%f\n" >> filelist.lst fi touch doclist.lst if [ -d usr/share/man ]; then find usr/share/man -type f -printf "/%h/%f.gz\n" >> doclist.lst fi popd mv %{buildroot}/filelist.lst . mv %{buildroot}/doclist.lst . %files -n python3-androguard -f filelist.lst %dir %{python3_sitelib}/* %files help -f doclist.lst %{_docdir}/* %changelog * Sun Apr 23 2023 Python_Bot - 3.3.5-1 - Package Spec generated