ttw / app.spec
freemt
Update altair
a4a35d8
raw history blame
No virus
1.67 kB
# -*- mode: python ; coding: utf-8 -*-
block_cipher = None
a = Analysis(['app.py'],
pathex=[],
binaries=[],
datas=[],
hiddenimports=[
"gradio",
"requests",
"Flask-Login",
"markdown2",
"analytics-python",
"Flask",
"Flask-Cors",
"flask-cachebuster",
"paramiko",
"tornado",
"matplotlib",
"pycryptodome",
"pandas",
"pillow",
"pydub",
"ffmpy",
],
hookspath=[],
hooksconfig={},
runtime_hooks=[],
excludes=[
"Ipython",
"wx",
"wx",
],
win_no_prefer_redirects=False,
win_private_assemblies=False,
cipher=block_cipher,
noarchive=False)
pyz = PYZ(a.pure, a.zipped_data,
cipher=block_cipher)
exe = EXE(pyz,
a.scripts,
[],
exclude_binaries=True,
name='app',
debug=False,
bootloader_ignore_signals=False,
strip=False,
upx=True,
console=True,
disable_windowed_traceback=False,
target_arch=None,
codesign_identity=None,
entitlements_file=None )
coll = COLLECT(exe,
a.binaries,
a.zipfiles,
a.datas,
strip=False,
upx=True,
upx_exclude=[],
name='app')