The tests are now also parsing export packets for version 1 and 5. Version 9 received an additional test, inspecting the data inside the export. All new packet hex dumps were created by using a Docker container with alpine Linux, running a softflowd daemon inside and then pinging the Docker host IP. After review with "softflowctl dump-flows" issueing "softflowctl expire-all" sends the packets away to the collector (should be an IP address outside of the Docker bridge). The export network packets are then collected with Wireshark running in the host namespace, capturing on the Docker bridge. Bump version to v0.8.3 Resolves #13 Resolves #14 Refs #18
28 lines
802 B
Python
28 lines
802 B
Python
#!/usr/bin/env python3
|
|
|
|
from setuptools import setup
|
|
|
|
with open("README.md", "r") as fh:
|
|
long_description = fh.read()
|
|
|
|
setup(
|
|
name='netflow',
|
|
version='0.8.3',
|
|
description='NetFlow v1, v5, and v9 tool suite implemented in Python 3.',
|
|
long_description=long_description,
|
|
long_description_content_type='text/markdown',
|
|
author='Dominik Pataky',
|
|
author_email='dev@bitkeks.eu',
|
|
url='https://github.com/bitkeks/python-netflow-v9-softflowd',
|
|
packages=["netflow"],
|
|
license='MIT',
|
|
python_requires='>=3',
|
|
keywords='netflow collector parser',
|
|
classifiers=[
|
|
"Programming Language :: Python :: 3",
|
|
"License :: OSI Approved :: MIT License",
|
|
"Intended Audience :: Developers",
|
|
"Intended Audience :: System Administrators"
|
|
],
|
|
)
|