-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathOperationalLeverageFramework.spec
More file actions
64 lines (54 loc) · 1.23 KB
/
OperationalLeverageFramework.spec
File metadata and controls
64 lines (54 loc) · 1.23 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
# -*- mode: python ; coding: utf-8 -*-
from pathlib import Path
from PyInstaller.utils.hooks import collect_submodules
ROOT = Path.cwd()
datas = [
(str(ROOT / "templates"), "templates"),
(str(ROOT / "static"), "static"),
]
if (ROOT / "pyproject.toml").exists():
datas.append((str(ROOT / "pyproject.toml"), "."))
hiddenimports = collect_submodules("uvicorn") + collect_submodules("itsdangerous")
a = Analysis(
[str(ROOT / "src" / "operational_leverage_framework" / "packaged_app.py")],
pathex=[str(ROOT)],
binaries=[],
datas=datas,
hiddenimports=hiddenimports,
hookspath=[],
hooksconfig={},
runtime_hooks=[],
excludes=[],
noarchive=False,
optimize=0,
)
pyz = PYZ(a.pure)
exe = EXE(
pyz,
a.scripts,
[],
[],
name="TrustSurface",
exclude_binaries=True,
debug=False,
bootloader_ignore_signals=False,
strip=False,
upx=True,
upx_exclude=[],
runtime_tmpdir=None,
console=True,
disable_windowed_traceback=False,
argv_emulation=False,
target_arch=None,
codesign_identity=None,
entitlements_file=None,
)
coll = COLLECT(
exe,
a.binaries,
a.datas,
strip=False,
upx=True,
upx_exclude=[],
name="TrustSurface",
)