Add __all__'s to v20 and v21/__init__.py to ensure that
star-imports from those modules get the right symbols. "base" was a problem because it was getting imported via stix2/__init__.py and overwriting stix2.base, making the actual stix2/base.py module inaccessible.pull/1/head
parent
7e418252d5
commit
7def04fd6f
|
@ -103,3 +103,33 @@ EXT_MAP = {
|
||||||
'unix-account-ext': UNIXAccountExt,
|
'unix-account-ext': UNIXAccountExt,
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
# Ensure star-imports from this module get the right symbols. "base" is a
|
||||||
|
# known problem, since there are multiple modules with that name and one can
|
||||||
|
# accidentally overwrite another.
|
||||||
|
__all__ = """
|
||||||
|
Bundle,
|
||||||
|
|
||||||
|
TLP_AMBER, TLP_GREEN, TLP_RED, TLP_WHITE, CustomMarking, ExternalReference,
|
||||||
|
GranularMarking, KillChainPhase, MarkingDefinition, StatementMarking,
|
||||||
|
TLPMarking,
|
||||||
|
|
||||||
|
URL, AlternateDataStream, ArchiveExt, Artifact, AutonomousSystem,
|
||||||
|
CustomExtension, CustomObservable, Directory, DomainName, EmailAddress,
|
||||||
|
EmailMessage, EmailMIMEComponent, File, HTTPRequestExt, ICMPExt,
|
||||||
|
IPv4Address, IPv6Address, MACAddress, Mutex, NetworkTraffic, NTFSExt,
|
||||||
|
PDFExt, Process, RasterImageExt, SocketExt, Software, TCPExt,
|
||||||
|
UNIXAccountExt, UserAccount, WindowsPEBinaryExt,
|
||||||
|
WindowsPEOptionalHeaderType, WindowsPESection, WindowsProcessExt,
|
||||||
|
WindowsRegistryKey, WindowsRegistryValueType, WindowsServiceExt,
|
||||||
|
X509Certificate, X509V3ExtenstionsType,
|
||||||
|
|
||||||
|
AttackPattern, Campaign, CourseOfAction, CustomObject, Identity, Indicator,
|
||||||
|
IntrusionSet, Malware, ObservedData, Report, ThreatActor, Tool,
|
||||||
|
Vulnerability,
|
||||||
|
|
||||||
|
Relationship, Sighting,
|
||||||
|
|
||||||
|
OBJ_MAP, OBJ_MAP_OBSERVABLE, EXT_MAP
|
||||||
|
""".replace(",", " ").split()
|
||||||
|
|
|
@ -111,3 +111,34 @@ EXT_MAP = {
|
||||||
'unix-account-ext': UNIXAccountExt,
|
'unix-account-ext': UNIXAccountExt,
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
# Ensure star-imports from this module get the right symbols. "base" is a
|
||||||
|
# known problem, since there are multiple modules with that name and one can
|
||||||
|
# accidentally overwrite another.
|
||||||
|
__all__ = """
|
||||||
|
Bundle,
|
||||||
|
|
||||||
|
TLP_AMBER, TLP_GREEN, TLP_RED, TLP_WHITE, CustomMarking, ExternalReference,
|
||||||
|
GranularMarking, KillChainPhase, LanguageContent, MarkingDefinition,
|
||||||
|
StatementMarking, TLPMarking,
|
||||||
|
|
||||||
|
URL, AlternateDataStream, ArchiveExt, Artifact, AutonomousSystem,
|
||||||
|
CustomExtension, CustomObservable, Directory, DomainName, EmailAddress,
|
||||||
|
EmailMessage, EmailMIMEComponent, File, HTTPRequestExt, ICMPExt,
|
||||||
|
IPv4Address, IPv6Address, MACAddress, Mutex, NetworkTraffic, NTFSExt,
|
||||||
|
PDFExt, Process, RasterImageExt, SocketExt, Software, TCPExt,
|
||||||
|
UNIXAccountExt, UserAccount, WindowsPEBinaryExt,
|
||||||
|
WindowsPEOptionalHeaderType, WindowsPESection, WindowsProcessExt,
|
||||||
|
WindowsRegistryKey, WindowsRegistryValueType, WindowsServiceExt,
|
||||||
|
X509Certificate, X509V3ExtenstionsType,
|
||||||
|
|
||||||
|
AttackPattern, Campaign, CourseOfAction, CustomObject, Grouping, Identity,
|
||||||
|
Indicator, Infrastructure, IntrusionSet, Location, Malware,
|
||||||
|
MalwareAnalysis, Note, ObservedData, Opinion, Report, ThreatActor, Tool,
|
||||||
|
Vulnerability,
|
||||||
|
|
||||||
|
Relationship, Sighting,
|
||||||
|
|
||||||
|
OBJ_MAP, OBJ_MAP_OBSERVABLE, EXT_MAP
|
||||||
|
""".replace(",", " ").split()
|
||||||
|
|
Loading…
Reference in New Issue