pyvariot/pyproject.toml

49 lines
1.3 KiB
TOML
Raw Normal View History

2024-06-07 09:07:52 +00:00
[tool.poetry]
2024-06-07 13:54:49 +00:00
name = "pyvariot"
2024-06-10 14:39:18 +00:00
version = "0.2.0"
2024-06-07 13:54:49 +00:00
description = "Python CLI and module to query the VARIoT IoT vulnerabilities and exploits databases"
2024-06-07 09:07:52 +00:00
authors = ["Raphaël Vinot <raphael.vinot@circl.lu>"]
license = "BSD-3-Clause"
2024-06-07 14:31:58 +00:00
repository = "https://github.com/cve-search/pyvariot"
documentation = "https://pyvariot.readthedocs.io/en/latest/"
2024-06-07 09:07:52 +00:00
readme = "README.md"
classifiers = [
'License :: OSI Approved :: BSD License',
'Development Status :: 5 - Production/Stable',
'Environment :: Console',
'Operating System :: POSIX :: Linux',
'Intended Audience :: Science/Research',
'Intended Audience :: Telecommunications Industry',
'Intended Audience :: Information Technology',
'Programming Language :: Python :: 3',
'Programming Language :: Python :: 3.10',
'Programming Language :: Python :: 3.11',
'Programming Language :: Python :: 3.12',
'Topic :: Security',
'Topic :: Internet',
]
[tool.poetry.scripts]
2024-06-07 13:54:49 +00:00
pyvariot = 'pyvariot:main'
2024-06-07 09:07:52 +00:00
[tool.poetry.dependencies]
python = "^3.10"
requests = "^2.32.3"
Sphinx = { version = "^7.3.7", optional = true }
[tool.poetry.extras]
docs = ["Sphinx"]
[tool.poetry.group.dev.dependencies]
2024-07-01 08:44:03 +00:00
pylint = "^3.2.5"
mypy = "^1.10.1"
types-requests = "^2.32.0.20240622"
ipython = "^8.26.0"
2024-06-07 09:07:52 +00:00
pytest = "^8.2.2"
[build-system]
requires = ["poetry_core"]
build-backend = "poetry.core.masonry.api"