netflow/setup.py
Dominik Pataky 9d2bc21ae2 Extend and reformat tests, add tests for v1 and v5, bump version
The tests are now also parsing export packets for version 1 and 5.
Version 9 received an additional test, inspecting the data inside the
export.

All new packet hex dumps were created by using a Docker container with
alpine Linux, running a softflowd daemon inside and then pinging the
Docker host IP. After review with "softflowctl dump-flows" issueing
"softflowctl expire-all" sends the packets away to the collector (should
be an IP address outside of the Docker bridge). The export network
packets are then collected with Wireshark running in the host namespace,
capturing on the Docker bridge.

Bump version to v0.8.3

Resolves #13
Resolves #14
Refs #18
2020-03-29 19:57:13 +02:00

28 lines
802 B
Python

#!/usr/bin/env python3
from setuptools import setup
with open("README.md", "r") as fh:
long_description = fh.read()
setup(
name='netflow',
version='0.8.3',
description='NetFlow v1, v5, and v9 tool suite implemented in Python 3.',
long_description=long_description,
long_description_content_type='text/markdown',
author='Dominik Pataky',
author_email='dev@bitkeks.eu',
url='https://github.com/bitkeks/python-netflow-v9-softflowd',
packages=["netflow"],
license='MIT',
python_requires='>=3',
keywords='netflow collector parser',
classifiers=[
"Programming Language :: Python :: 3",
"License :: OSI Approved :: MIT License",
"Intended Audience :: Developers",
"Intended Audience :: System Administrators"
],
)