pyvariot/pyproject.toml

49 lines
1.3 KiB
TOML
Raw Normal View History

2024-06-07 09:07:52 +00:00
[tool.poetry]
2024-06-07 13:54:49 +00:00
name = "pyvariot"
2024-06-07 14:31:58 +00:00
version = "0.1.1"
2024-06-07 13:54:49 +00:00
description = "Python CLI and module to query the VARIoT IoT vulnerabilities and exploits databases"
2024-06-07 09:07:52 +00:00
authors = ["Raphaël Vinot <raphael.vinot@circl.lu>"]
license = "BSD-3-Clause"
2024-06-07 14:31:58 +00:00
repository = "https://github.com/cve-search/pyvariot"
documentation = "https://pyvariot.readthedocs.io/en/latest/"
2024-06-07 09:07:52 +00:00
readme = "README.md"
classifiers = [
'License :: OSI Approved :: BSD License',
'Development Status :: 5 - Production/Stable',
'Environment :: Console',
'Operating System :: POSIX :: Linux',
'Intended Audience :: Science/Research',
'Intended Audience :: Telecommunications Industry',
'Intended Audience :: Information Technology',
'Programming Language :: Python :: 3',
'Programming Language :: Python :: 3.10',
'Programming Language :: Python :: 3.11',
'Programming Language :: Python :: 3.12',
'Topic :: Security',
'Topic :: Internet',
]
[tool.poetry.scripts]
2024-06-07 13:54:49 +00:00
pyvariot = 'pyvariot:main'
2024-06-07 09:07:52 +00:00
[tool.poetry.dependencies]
python = "^3.10"
requests = "^2.32.3"
Sphinx = { version = "^7.3.7", optional = true }
[tool.poetry.extras]
docs = ["Sphinx"]
[tool.poetry.group.dev.dependencies]
pylint = "^3.2.3"
mypy = "^1.10.0"
types-requests = "^2.32.0.20240602"
ipython = "^8.25.0"
pytest = "^8.2.2"
[build-system]
requires = ["poetry_core"]
build-backend = "poetry.core.masonry.api"