diff --git a/stix2/workbench.py b/stix2/workbench.py index ff5d680..dcb72fd 100644 --- a/stix2/workbench.py +++ b/stix2/workbench.py @@ -21,7 +21,9 @@ """ import functools + import stix2 + from . import AttackPattern as _AttackPattern from . import Campaign as _Campaign from . import CourseOfAction as _CourseOfAction @@ -40,24 +42,25 @@ from . import Report as _Report from . import ThreatActor as _ThreatActor from . import Tool as _Tool from . import Vulnerability as _Vulnerability -from . import ( # noqa: F401 + +from . import ( # noqa: F401 isort:skip AlternateDataStream, ArchiveExt, Artifact, AutonomousSystem, Bundle, CustomExtension, CustomMarking, CustomObservable, Directory, DomainName, EmailAddress, EmailMessage, EmailMIMEComponent, Environment, ExternalReference, File, FileSystemSource, Filter, GranularMarking, HTTPRequestExt, - ICMPExt, IPv4Address, IPv6Address, KillChainPhase, LanguageContent, MACAddress, - MarkingDefinition, MemoryStore, Mutex, NetworkTraffic, NTFSExt, - parse_observable, PDFExt, Process, RasterImageExt, Relationship, + ICMPExt, IPv4Address, IPv6Address, KillChainPhase, LanguageContent, + MACAddress, MarkingDefinition, MemoryStore, Mutex, NetworkTraffic, + NTFSExt, parse_observable, PDFExt, Process, RasterImageExt, Relationship, Sighting, SocketExt, Software, StatementMarking, TAXIICollectionSource, TCPExt, TLP_AMBER, TLP_GREEN, TLP_RED, TLP_WHITE, TLPMarking, UNIXAccountExt, URL, UserAccount, WindowsPEBinaryExt, WindowsPEOptionalHeaderType, WindowsPESection, WindowsProcessExt, WindowsRegistryKey, WindowsRegistryValueType, WindowsServiceExt, X509Certificate, - X509V3ExtensionsType + X509V3ExtensionsType, ) -from .datastore.filters import FilterSet +from .datastore.filters import FilterSet # isort:skip # Enable some adaptation to the current default supported STIX version.