freeipa/ipaserver/setup.py
Christian Heimes 135d0b5dd1 Finish port to PyCA cryptography
* add missing default_backend
* unpad encrypted data
* use cryptography's hashes and HMAC construct
* remove hard dependency on python-nss from setup.py

Signed-off-by: Christian Heimes <cheimes@redhat.com>
Reviewed-By: Stanislav Laznicka <slaznick@redhat.com>
2017-03-01 12:51:50 +01:00

78 lines
2.3 KiB
Python
Executable File

#!/usr/bin/python2
# Authors:
# Jason Gerard DeRose <jderose@redhat.com>
#
# Copyright (C) 2008 Red Hat
# see file 'COPYING' for use and warranty information
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
"""
Python-level packaging using setuptools
"""
from os.path import abspath, dirname
import sys
if __name__ == '__main__':
# include ../ for ipasetup.py
sys.path.append(dirname(dirname(abspath(__file__))))
from ipasetup import ipasetup # noqa: E402
ipasetup(
name='ipaserver',
doc=__doc__,
package_dir={'ipaserver': ''},
packages=[
'ipaserver',
'ipaserver.advise',
'ipaserver.advise.plugins',
'ipaserver.dnssec',
'ipaserver.plugins',
'ipaserver.secrets',
'ipaserver.install',
'ipaserver.install.plugins',
'ipaserver.install.server',
],
install_requires=[
"cryptography",
"dbus-python",
"dnspython",
"dogtag-pki",
"ipaclient",
"ipalib",
"ipaplatform",
"ipapython",
"lxml",
"netaddr",
"pyasn1",
"pyldap",
"six",
# not available on PyPI
# "python-libipa_hbac",
# "python-sss",
# "python-sss-murmur",
# "python-SSSDConfig",
# "samba-python",
],
entry_points={
'custodia.authorizers': [
'IPAKEMKeys = ipaserver.secrets.kem:IPAKEMKeys',
],
'custodia.stores': [
'IPASecStore = ipaserver.secrets.store:IPASecStore',
],
},
)