xscanserver.spec 1.1 KB

1234567891011121314151617181920212223242526272829303132333435363738
  1. # -*- mode: python ; coding: utf-8 -*-
  2. block_cipher = None
  3. a = Analysis(['xscanserver.py'],
  4. pathex=['D:\\docxdemo'],
  5. binaries=[],
  6. datas=[],
  7. hiddenimports=['email.mime.message', 'email.mime.image', 'email.mime.text', 'email.mime.multipart', 'email.mime.audio', 'email.mime.base', 'email.mime.application', 'email.mime.nonmultipart'],
  8. hookspath=[],
  9. runtime_hooks=[],
  10. excludes=[],
  11. win_no_prefer_redirects=False,
  12. win_private_assemblies=False,
  13. cipher=block_cipher,
  14. noarchive=False)
  15. pyz = PYZ(a.pure, a.zipped_data,
  16. cipher=block_cipher)
  17. exe = EXE(pyz,
  18. a.scripts,
  19. [],
  20. exclude_binaries=True,
  21. name='xscanserver',
  22. debug=False,
  23. bootloader_ignore_signals=False,
  24. strip=False,
  25. upx=True,
  26. console=True , icon='icon.ico')
  27. coll = COLLECT(exe,
  28. a.binaries,
  29. a.zipfiles,
  30. a.datas,
  31. strip=False,
  32. upx=True,
  33. upx_exclude=[],
  34. name='xscanserver')