Skip to main content

Tool/lib to create and parse manifests

Reason this release was yanked:

Yank old pre-release

Project description

Device Management manifest CLI tool

This document explains how to install and use the manifest tool.

Note: Please see the changelog for the list of all changes between release versions.

Manifest tool overview

Device Management lets you perform Firmware Over-the-Air (FOTA) updates on managed devices.

On the device side, the firmware update process begins when the device receives an update manifest. The OEM (original equipment manufacturer) or update author cryptographically signs the manifest with a private key paired to a public key that exists on the device, enabling the device to authenticate the manifest before it accepts the firmware update.

Device Management supports:

  • Full updates - Deliver new firmware and install it on the device.
  • Delta updates - The manifest tool executes a diff algorithm that produces a small delta patch file. The client constructs a new firmware image based on the delta patch file and the firmware currently present on the device. This technique saves traffic bandwidth.
  • Combined updates - The FOTA client lets you define a device component as consisting of several subcomponents, which the device always updates together and reports to the Update service on as a single component. For a combined update, the manifest tool creates a combined package, which includes multiple firmware images. The client parses the combined package and installs the images on the device in a predefined order you set on the device.

The manifest-tool Python package includes these command line tools:

Installing the manifest tool

We recommend installing the manifest-tool Python package in a isolated Python virtual environment.

Installing the manifest tool from PyPi

Prerequisites:

pip install manifest-tool

Installing from local source tree

Prerequisites:

$ git clone https://github.com/PelionIoT/manifest-tool.git
$ pip install <path to manifest-tool's local source tree>

Note: Run $ pip install --editable <manifest-tool> to install the package in Python setuptools development mode. For more information, please see the setuptools development mode documentation.

Using the manifest tool

This section explains how to use the CLI tools included in the manifest-tool Python package:

manifest-tool

manifest-tool commands:

Note: Run manifest-tool --help for more information about all commands, or manifest-tool <command> --help for more information about a specific command, including its parameters and how to use them.

manifest-tool create

Creates a manifest. The manifest tool receives a configuration file describing the update type.

Prerequisites

  • An update private key and public key certificate.

    Keep the private key secret because it allows installing new firmware images on your devices.

    Provision the public key to the device.

    • To generate a private key, run:

      $ openssl ecparam -genkey -name prime256v1 -outform PEM -out my.priv.key.pem
      
    • To generate a public key in uncompressed point format (X9.62), use the manifest-tool public-key command.

  • Upload the new firmware image to a server that your devices can access.

  • A configuration file in JSON or YAML format.

    Configuration file format:

    vendor:  # One of "domain" or "vendor-id" fields are expected.
      domain: pelion.com  # FW owner domain. Used to generate a vendor UUID.
                          # Expected to include a dot (".").
      # OR
      vendor-id: fa6b4a53d5ad5fdfbe9de663e4d41ffe  # Valid vendor UUID.
      custom-data-path: my.custom-data.bin # Vendor's custom data file
                                           #  to be passed to the target devices.
                                           # Only relevant for manifest v3 format.
    
    device:  # One of "model-name" or "class-id" fields are expected
      model-name: Smart Slippers  # A device model name. Used to generate a class UUID.
      # OR
      class-id: 327c726ac6e54f7a82fbf1d3beda80f0  # Valid device-class UUID.
    
    priority: 1  # Update priority as will be passed to authorization callback.
                 # Implemented by application on a device side.
    
    payload:
      url: http://some-url.com/files?id=1234  # Address from which the device downloads
                                              #  the candidate payload.
                                              # Obtained by clicking "Copy HTTP URL" on
                                              # the Firmware image details screen
                                              # in Device Management Portal,
                                              #  or by copying the `datafile` attribute.
      file-path: ./my.fw.bin  # Local path to the candidate payload file
                              #  or the delta patch file.
                              # Used for digest calculation & signing.
      format: raw-binary  # One of following:
                          #  raw-binary       - full image update campaigns.
                          #  arm-patch-stream - delta patch update campaigns.
                          # For manifest v3 only:
                          #  combined           - combined update.
                          #  encrypted-raw      - full image update with encrypted image.
                          #  encrypted-combined - combined update with encrypted image.
      encrypted:  # Required for 'encrypted-raw', 'encrypted-patch' formats.
        digest: 3725565932eb5b9fbd5767a3a534cb6a1a87813e0b4a76deacb9b36695c71307
                      # The encrypted payload digest.
                      # Obtained by copying the `encrypted_datafile_checksum` attribute
                      # from the Firmware image details screen in Device Management Portal.
        size: 471304  # The encrypted payload size.
                      # Obtained by copying the `encrypted_datafile_size` attribute
                      # from the Firmware image details screen in Device Management Portal.
    
    component: MAIN  # [Optional] The name of the component to be updated
                     #  only relevant for manifest v3 format.
                     # Set to "MAIN" by default for updating
                     #  the main application image.
    
    sign-image: True  # [Optional] Boolean field accepting True/False values.
                      # Only relevant for manifest v3 format.
                      # When Set to True - 64 Bytes raw signature over the installed
                      #  image will be added to the manifest.
                      # Image signature can be used for cases when device bootloader
                      #  expects to work with signed images (e.g. secure-boot).
                      # Set to False by default.
    

Example

  • For this configuration file, called my.config.yaml:

    vendor:
      domain: pelion.com
    device:
      model-name: Smart Flip-flops
    priority: 1
    payload:
      url: http://some-url.com/files?id=1234
      file-path: ./my.fw.bin
      format: raw-binary
    component: MAIN
    
  • Run:

    manifest-tool create \
        --config my.config.yaml \
        --key my.priv.key.pem \
        --fw-version 1.2.3 \
        --output my.manifest.bin
    

Note: The value of --fw-version refers to the firmware version of the component to be updated. The value can be between 0.0.1 and 999.999.999 and must be greater than the firmware version currently installed on the device.

manifest-tool create-v1

Older versions of Device Management update client use manifest schema V1 and assume the public key is packaged in a x.509 certificate.

Prerequisites

  • An update private key and public key certificate.

    Keep the private key secret because it allows installing new firmware images on your devices.

    Provision the public key to the device.

    • To generate a private key, run:

      $ openssl ecparam -genkey -name prime256v1 -outform PEM -out my.priv.key.pem
      
    • To generate a public key x.509 certificate, run:

      $ openssl req -new -sha256 \
            -key my.priv.key.pem \
            -inform PEM \
            -out my.csr.csr
      $ openssl req -x509 -sha256 \
            -days 7300 \
            -key my.priv.key.pem \
            -in my.csr.csr \
            -outform der \
            -out my.x509.certificate.der
      

      Note: Device Management update client treats the x.509 certificate as a container ONLY and does not enforce its validity - expiration, chain of trust, and so on - although it may be validated by other Device Management components. For production, we recommend creating a certificate with a lifespan greater than the product's expected lifespan (for example, 20 years).

  • Upload the new firmware binary to a server that your devices can access, and obtain the URL for the uploaded firmware binary.

  • A configuration file in JSON or YAML format (same as manifest-tool create).

Example

  • Run:

    manifest-tool create-v1 \
        --config my.config.yaml \
        --key my.priv.key.pem \
        --update-certificate my.x509.certificate.der \
        --output my.manifest.bin
    

manifest-tool parse

Parses and validates existing manifest files.

Prerequisites

  • A manifest file (in our example my.manifest.bin).
  • Optionally, an update private key or public key or certificate to validate the manifest signature.

Example

$ manifest-tool parse \
  my.manifest.bin \
  --private-key my.priv.key.pem
----- Manifest dump start -----
Manifest:
vendor-id=fa6b4a53d5ad5fdfbe9de663e4d41ffe
class-id=3da0f138173350eba6f665498eace1b1
update-priority=15
payload-version=1572372313
payload-digest=b5f07d6c646a7c014cc8c03d2c9caf066bd29006f1356eaeaf13b7d889d3502b
payload-size=512
payload-uri=https://my.server.com/some.file?new=1
payload-format=raw-binary
----- Manifest dump end -----
2019-10-29 20:05:13,478 INFO Signature verified!

manifest-tool schema

Prints the input validation JSON schema bundled with the current tool. The manifest tool contains an input validation schema, which you can use as a self-documenting tool to better understand and validate the manifest tool input configuration.

Example

$ manifest-tool schema

manifest-tool public-key

Create a public key file in uncompressed point format. Provisioning this file to the device enables the device to verify the manifest signature.

Example

manifest-tool public-key my.priv.key.pem --out my.pub.key.bin

manifest-delta-tool

Use this tool to generate delta patch files for delta updates.

Run manifest-delta-tool --help for more information about usage and arguments.

Prerequisites

  • The firmware currently installed on the device and the updated firmware image. Required for calculating the delta patch.

Example

$ manifest-delta-tool -c current_fw.bin -n new_fw.bin -o delta-patch.bin

Note 1: Additional configuration file with same name but with .yaml extension will be generated. Both files are required by the manifest-tool. Only the output file specified by --output argument should be uploaded to Pelion storage.

Note 2: Compression block size has a direct impact on the amount of memory required by the device receiving the update. The device requires twice the amount of RAM in runtime to decompress and apply the patch.

Note 3: Compression block must be aligned with network (COAP/HTTP) buffer size used for download. Misalignment in sizes may result in device failure to process the delta patch file.

manifest-package-tool

Use this tool to generate combined package files for combined updates.

manifest-package-tool commands:

Note: Run manifest-package-tool --help for more information about all commands, or manifest-package-tool <command> --help for more information about a specific command, including its parameters and how to use them.

manifest-package-tool create

Creates a combined package file based on a configuration file with information about firmware images for a combined update.

Prerequisites

  • A configuration file in JSON or YAML format.

    Configuration file format:

    images:  # Two or more images
    - file_name:  ./my.fw1.bin     # Local path to one of the firmware images.
      sub_comp_name:  fw1_id       # Name of the subcomponent firmware image.
      vendor_data: fw1_vend        # Vendor data for the firmware image.
    - file_name:  ./my.fw2.bin     # Local path to another firmware image.
      sub_comp_name:  fw2_id       # Name of the subcomponent firmware image.
      vendor_data: fw2_vend        # Vendor data for the firmware image.
    
  • New firmware images to be included in the combined package. In this example ./my/fw1.bin and ./my.fw2.bin.

Example

$ manifest-package-tool create --config combined_package_config.yaml --output combined_package_file

Where combined_package_config.yaml is the input configuration file.

The tool creates a tar-format combined package with the firmware images listed in the configuration file, where:

  • file_name is the local path to the image file.
  • sub_comp_name is the name the tool gives to the subcomponent firmware image file in the combined package. This must be the same as the name (sub_comp_name) defined on the device.
  • vendor_data is the vendor information of the firmware image.

In addition to firmware image files, the tool creates a descriptor __desc__ file inside the tar package, which provides information about the contents of the combined package to the FOTA update client.

Note 1: The FOTA update client reports on a combined update as an update of a single component (defined as comp_name on the device), consisting of multiple subcomponents (each defined as sub_comp_name on the device). When you create a combined package, each sub_comp_name must correspond to a sub_comp_name on the device. For more information, see Implementing combined update

Note 2: When you create a manifest for a combined update using manifest-tool, in the manifest configuration file, set the format field to combined or encrypted-combined, set the component field to the name of the component you are updating, and set the file-path field to the path of the combined package file.

Note 3: To use a combined package file with the manifest-dev-tool create or update commands, set the path of the combined package file in the -p argument and pass the --combined-image flag to indicate that the current candidate payload is a combined image.

manifest-package-tool parse

Parses and validates existing combined package files.

Prerequisites

  • A combined package file (in our example combined_package_file).

Example

$ manifest-package-tool parse --package combined_package_file
Contents of the tar package -
File name : _desc_
File name : fw1_id
File name : fw1_id
Information of update images:
OrderedDict([('id', b'fw1_id'), ('vendor-data', b'fw1_vend'), ('vendor-data-size', 8), ('image-size', 417053)])
OrderedDict([('id', b'fw2_id'), ('vendor-data', b'fw2_vend'), ('vendor-data-size', 8), ('image-size', 253482)])

manifest-dev-tool

manifest-dev-tool is a developer tool for running a simplified update campaign.

Use manifest-dev-tool for development flows only.

manifest-dev-tool commands:

Note: Run manifest-dev-tool --help for more information about all commands, or manifest-dev-tool <command> --help for more information about a specific command, including its parameters and how to use them.

manifest-dev-tool init

Initializes the developer environment.

  • Generates credentials and a configuration file in the tool's cache directory:

    • dev.key.pem - An update private key.
    • dev.cert.der - An update public key certificate.
    • dev.cfg.yaml - Developer configuration file.

    The default cache directory name is .manifest-dev-tool.

  • Generates an update resource C file with symbols that allow bypassing the provisioning step in the developer flow. Default name is update_default_resources.c.

Note 1: Use the credentials generated by manifest-dev-tool init in the development stage only.

Note 2: You can keep your access key in the .pelion-dev-presets.yaml file in your home directory and pass it using the --gw-preset option.

Example of .pelion-dev-presets.yaml:

usa:
    host: https://api.us-east-1.mbedcloud.com
    access_key: ak_SOME_VERY_SECRET_ACCESS_KEY
japan:
    host: https://api.ap-northeast-1.mbedcloud.com
    access_key: ak_SOME_OTHER_VERY_SECRET_ACCESS_KEY

To obtain an access key and API host URL, in Device Management Portal, click Access Management > Access keys > New access key. Limit access to the .pelion-dev-presets.yaml file to your user only.

Example

manifest-dev-tool init --access-key [Device Management access key]

Or

manifest-dev-tool init --gw-preset usa

manifest-dev-tool create

Creates developer manifest files without requiring an input configuration file.

Example

manifest-dev-tool create \
    --payload-url http://test.pdmc.pelion.com?fileId=1256 \
    --payload-path new_fw.bin \
    --fw-version 1.2.3 \
    --component-name MAIN \
    --output update-manifest.bin

Note: To run a delta update, specifiy the manifest-delta-tool output in the --payload-path argument and make sure the .yaml output with the same name sit next to that output file.

Note: Add the --sign-image argument to update a device with a secure bootloader, which requires an image signature.

manifest-dev-tool create-v1

Creates developer manifest files in v1 format without requiring an input configuration file.

Example

manifest-dev-tool create-v1 \
    --payload-url http://test.pdmc.pelion.com?fileId=1256 \
    --payload-path new-fw.bin \
    --output update-manifest.bin

Note: To run a delta update, specifiy the manifest-delta-tool output in the --payload-path argument and make sure the .yaml output with the same name sit next to that output file.

manifest-dev-tool update

Same as manifest-dev-tool create but also lets you interact with Device Management to run a full update campaign.

The command:

  1. Uploads the payload to Device Management and obtains the URL.
  2. Creates a manifest file with the URL from the previous step and obtains a manifest URL.
  3. Creates an update campaign with the manifest URL from the previous step.
  4. Starts the update campaign if you pass the --start-campaign or --wait-for-completion argument.
  5. If you pass the --wait-for-completion argument, the tool waits for campaign completion for the time period specified by --timeout or until the campaign reaches one of its terminating states.
  6. If you pass the --wait-for-completion argument without the --no-cleanup flag, the tool removes the uploaded test resources from Device Management before exiting.

Example

manifest-dev-tool update \
    --payload-path my_new_fw.bin \
    --fw-version 1.2.3 \
    --wait-for-completion

Note: The tool creates the device filter for the campaign based on the unique class-id and vendor-id fields the manifest-dev-tool init command generates.

manifest-dev-tool update-v1

Same as manifest-dev-tool update with a v1-format manifest.

Example

manifest-dev-tool update-v1 \
    --payload-path my_new_fw.bin \
    --wait-for-completion

Developer workflow example for mbed-os devices

  1. Clone the https://github.com/PelionIoT/mbed-cloud-client-example repository.

  2. From within the repository, execute:

    manifest-dev-tool init -a $MY_ACCESS_KEY
    

    The tool initializes the developer environment and generates a update_default_resources.c file.

  3. Build the firmware image for your device.

  4. Save the mbed-cloud-client-example_update.bin file.

  5. Flash the mbed-cloud-client-example.bin to the device.

  6. Wait for the device to register in the cloud.

  7. Make some changes to the source of the firmware application.

  8. Build the firmware update candidate for your device.

    • To test delta update, create delta patch:
      manifest-delta-tool -c <original mbed-cloud-client-example_update.bin> -n <new mbed-cloud-client-example_update.bin> -o delta.bin
      
  9. Issue an update campaign:

    manifest-dev-tool update --payload-path <new mbed-cloud-client-example_update.bin or delta.bin> --wait-for-completion
    

Upgrading from manifest tool v1.5.2 and lower

Manifest tool v2.0.0 is not compatible with previous versions.

This section explains how to migrate your existing configuration and credentials for use with manifest-tool version 2.2.0 and higher.

  • Initializing the development environment using previously-defined configuration and credentials

    Run the manifest-dev-tool init command as follow:

    manifest-dev-tool init --api-url <API URL> \
                           --access-key <Access key> \
                           --vendor-id <Vendor ID> \
                           --class-id <Class ID> \
                           --key <private key path> \
                           --update-certificate <certificate path>
    

    Where <API URL> and <Access key> are the values from the previous .mbed_cloud_config.json file, <Vendor ID> and <Class ID> are the values from the previous .manifest_tool.json file, and <private key path> and <certificate path> are the paths to your private key and update certificate, respectively.

    When the command finishes successfully, you can remove the previously-created files.

  • Adapting the create manifest configuration

    If you use manifest-tool (not manifest-dev-tool), create a new configuration file, as described in manifest-tool create, and copy the relevant information from your existing .manifest_tool.json file.

Troubleshooting

  • Getting more context on unexpected errors.

    When the tool exits with a non-zero return code, it may be helpful to get more context on the failure.

    Solution: execute the tool with the --debug flag at the top argument parser level. For example:

    manifest-dev-tool --debug update
    
  • manifest-dev-tool update ... --wait-for-completion takes longer than expected.

    manifest-dev-tool update creates a unique class-id and vendor-id generated per developer. Device Management expects a single device with these properties to connect to Device Management.

    In rare cases, during development, a device's device-id might change after you re-flash it. This may result in two devices having the same class-id and vendor-id in Device Management. In this scenario, Device Management will detect both devices and try to update them both, although one of them no longer exists

    Solution: Manually delete the unwanted device from Device Management. Alternatively, run manifest-dev-tool update ... --wait-for-completion with --device-id DEVICE_ID to override the default campaign filter and target a specific device by its ID.

  • Update fails and manifest-dev-tool update ... --wait-for-completion cleans all resources.

    You might want to leave the resources (firmware image candidate, update manifest and update campaign) on a service for further investigation/retry.

    Solution: Execute manifest-dev-tool update ... --wait-for-completion with the --no-cleanup flag.

  • Device does not support this manifest schema

    Solution: Your device does not support the created manifest schema. Switch from the create or update command to the create-v1 or update-v1 command respectively and vice versa.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

manifest-tool-2.4.0rc1.tar.gz (92.9 kB view details)

Uploaded Source

Built Distributions

manifest_tool-2.4.0rc1-cp39-cp39-win_amd64.whl (95.2 kB view details)

Uploaded CPython 3.9 Windows x86-64

manifest_tool-2.4.0rc1-cp39-cp39-win32.whl (93.4 kB view details)

Uploaded CPython 3.9 Windows x86

manifest_tool-2.4.0rc1-cp39-cp39-manylinux_2_17_x86_64.manylinux2014_x86_64.whl (338.7 kB view details)

Uploaded CPython 3.9 manylinux: glibc 2.17+ x86-64

manifest_tool-2.4.0rc1-cp39-cp39-manylinux_2_17_x86_64.manylinux2014_x86_64.manylinux_2_24_x86_64.whl (238.9 kB view details)

Uploaded CPython 3.9 manylinux: glibc 2.17+ x86-64 manylinux: glibc 2.24+ x86-64

manifest_tool-2.4.0rc1-cp39-cp39-manylinux_2_5_x86_64.manylinux1_x86_64.whl (232.3 kB view details)

Uploaded CPython 3.9 manylinux: glibc 2.5+ x86-64

manifest_tool-2.4.0rc1-cp39-cp39-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_12_x86_64.manylinux2010_x86_64.whl (350.5 kB view details)

Uploaded CPython 3.9 manylinux: glibc 2.12+ x86-64 manylinux: glibc 2.5+ x86-64

manifest_tool-2.4.0rc1-cp39-cp39-macosx_10_9_x86_64.whl (111.8 kB view details)

Uploaded CPython 3.9 macOS 10.9+ x86-64

manifest_tool-2.4.0rc1-cp38-cp38-win_amd64.whl (92.4 kB view details)

Uploaded CPython 3.8 Windows x86-64

manifest_tool-2.4.0rc1-cp38-cp38-win32.whl (93.4 kB view details)

Uploaded CPython 3.8 Windows x86

manifest_tool-2.4.0rc1-cp38-cp38-manylinux_2_17_x86_64.manylinux2014_x86_64.whl (339.0 kB view details)

Uploaded CPython 3.8 manylinux: glibc 2.17+ x86-64

manifest_tool-2.4.0rc1-cp38-cp38-manylinux_2_17_x86_64.manylinux2014_x86_64.manylinux_2_24_x86_64.whl (239.1 kB view details)

Uploaded CPython 3.8 manylinux: glibc 2.17+ x86-64 manylinux: glibc 2.24+ x86-64

manifest_tool-2.4.0rc1-cp38-cp38-manylinux_2_5_x86_64.manylinux1_x86_64.whl (232.4 kB view details)

Uploaded CPython 3.8 manylinux: glibc 2.5+ x86-64

manifest_tool-2.4.0rc1-cp38-cp38-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_12_x86_64.manylinux2010_x86_64.whl (350.7 kB view details)

Uploaded CPython 3.8 manylinux: glibc 2.12+ x86-64 manylinux: glibc 2.5+ x86-64

manifest_tool-2.4.0rc1-cp38-cp38-macosx_10_9_x86_64.whl (111.8 kB view details)

Uploaded CPython 3.8 macOS 10.9+ x86-64

manifest_tool-2.4.0rc1-cp37-cp37m-win_amd64.whl (92.4 kB view details)

Uploaded CPython 3.7m Windows x86-64

manifest_tool-2.4.0rc1-cp37-cp37m-win32.whl (93.4 kB view details)

Uploaded CPython 3.7m Windows x86

manifest_tool-2.4.0rc1-cp37-cp37m-manylinux_2_17_x86_64.manylinux2014_x86_64.whl (339.0 kB view details)

Uploaded CPython 3.7m manylinux: glibc 2.17+ x86-64

manifest_tool-2.4.0rc1-cp37-cp37m-manylinux_2_17_x86_64.manylinux2014_x86_64.manylinux_2_24_x86_64.whl (240.3 kB view details)

Uploaded CPython 3.7m manylinux: glibc 2.17+ x86-64 manylinux: glibc 2.24+ x86-64

manifest_tool-2.4.0rc1-cp37-cp37m-manylinux_2_5_x86_64.manylinux1_x86_64.whl (232.2 kB view details)

Uploaded CPython 3.7m manylinux: glibc 2.5+ x86-64

manifest_tool-2.4.0rc1-cp37-cp37m-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_12_x86_64.manylinux2010_x86_64.whl (351.8 kB view details)

Uploaded CPython 3.7m manylinux: glibc 2.12+ x86-64 manylinux: glibc 2.5+ x86-64

manifest_tool-2.4.0rc1-cp37-cp37m-macosx_10_9_x86_64.whl (111.8 kB view details)

Uploaded CPython 3.7m macOS 10.9+ x86-64

manifest_tool-2.4.0rc1-cp36-cp36m-win_amd64.whl (92.4 kB view details)

Uploaded CPython 3.6m Windows x86-64

manifest_tool-2.4.0rc1-cp36-cp36m-win32.whl (93.4 kB view details)

Uploaded CPython 3.6m Windows x86

manifest_tool-2.4.0rc1-cp36-cp36m-manylinux_2_17_x86_64.manylinux2014_x86_64.whl (339.0 kB view details)

Uploaded CPython 3.6m manylinux: glibc 2.17+ x86-64

manifest_tool-2.4.0rc1-cp36-cp36m-manylinux_2_17_x86_64.manylinux2014_x86_64.manylinux_2_24_x86_64.whl (239.2 kB view details)

Uploaded CPython 3.6m manylinux: glibc 2.17+ x86-64 manylinux: glibc 2.24+ x86-64

manifest_tool-2.4.0rc1-cp36-cp36m-manylinux_2_5_x86_64.manylinux1_x86_64.whl (232.2 kB view details)

Uploaded CPython 3.6m manylinux: glibc 2.5+ x86-64

manifest_tool-2.4.0rc1-cp36-cp36m-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_12_x86_64.manylinux2010_x86_64.whl (350.8 kB view details)

Uploaded CPython 3.6m manylinux: glibc 2.12+ x86-64 manylinux: glibc 2.5+ x86-64

manifest_tool-2.4.0rc1-cp36-cp36m-macosx_10_9_x86_64.whl (111.8 kB view details)

Uploaded CPython 3.6m macOS 10.9+ x86-64

File details

Details for the file manifest-tool-2.4.0rc1.tar.gz.

File metadata

  • Download URL: manifest-tool-2.4.0rc1.tar.gz
  • Upload date:
  • Size: 92.9 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.4.2 importlib_metadata/4.8.1 pkginfo/1.7.1 requests/2.26.0 requests-toolbelt/0.9.1 tqdm/4.62.2 CPython/3.9.0

File hashes

Hashes for manifest-tool-2.4.0rc1.tar.gz
Algorithm Hash digest
SHA256 4ccdff6570b890dd42359ddf9841bab690d313a106ac98283a51f544f1a1106e
MD5 583c672ab9867be5a9bf014304eb0ac9
BLAKE2b-256 6e971c3e05b6f7b5fc29236ff5b4d0a016d20dd01e667530534e6945fa175ee1

See more details on using hashes here.

File details

Details for the file manifest_tool-2.4.0rc1-cp39-cp39-win_amd64.whl.

File metadata

  • Download URL: manifest_tool-2.4.0rc1-cp39-cp39-win_amd64.whl
  • Upload date:
  • Size: 95.2 kB
  • Tags: CPython 3.9, Windows x86-64
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.4.2 importlib_metadata/4.8.1 pkginfo/1.7.1 requests/2.26.0 requests-toolbelt/0.9.1 tqdm/4.62.2 CPython/3.9.0

File hashes

Hashes for manifest_tool-2.4.0rc1-cp39-cp39-win_amd64.whl
Algorithm Hash digest
SHA256 5b9541a148a23e666c6f51e4aa898efc6f8001f5d70d0c4f5825faac42a22db0
MD5 f101c679ece85bcba3525d5d05ec0189
BLAKE2b-256 f83365d7aaa4920194066ba809bf8a3e0dfd8ba068830bff34945b2d8f875053

See more details on using hashes here.

File details

Details for the file manifest_tool-2.4.0rc1-cp39-cp39-win32.whl.

File metadata

  • Download URL: manifest_tool-2.4.0rc1-cp39-cp39-win32.whl
  • Upload date:
  • Size: 93.4 kB
  • Tags: CPython 3.9, Windows x86
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.4.2 importlib_metadata/4.8.1 pkginfo/1.7.1 requests/2.26.0 requests-toolbelt/0.9.1 tqdm/4.62.2 CPython/3.9.0

File hashes

Hashes for manifest_tool-2.4.0rc1-cp39-cp39-win32.whl
Algorithm Hash digest
SHA256 ce29f364433091fd8be20f7c12799ff388314c5d62330fb63c5067db2774316c
MD5 2e74a58bc9f1d3c6493f4dc7a5074aab
BLAKE2b-256 2457c87f2eb8ae232e499620aa97ae3c851f62813dec8cccb14e1325b2919f36

See more details on using hashes here.

File details

Details for the file manifest_tool-2.4.0rc1-cp39-cp39-manylinux_2_17_x86_64.manylinux2014_x86_64.whl.

File metadata

File hashes

Hashes for manifest_tool-2.4.0rc1-cp39-cp39-manylinux_2_17_x86_64.manylinux2014_x86_64.whl
Algorithm Hash digest
SHA256 7e26bb025e00bcbdf8b18f8a51f46276c6e68530a6711bea0c3002fbe3944661
MD5 95a29bc1b32735ada067745070a8e070
BLAKE2b-256 af1efec2f27e490b20e4e980bede1b714b78b8391ddbef12d7eed6b21a627e39

See more details on using hashes here.

File details

Details for the file manifest_tool-2.4.0rc1-cp39-cp39-manylinux_2_17_x86_64.manylinux2014_x86_64.manylinux_2_24_x86_64.whl.

File metadata

File hashes

Hashes for manifest_tool-2.4.0rc1-cp39-cp39-manylinux_2_17_x86_64.manylinux2014_x86_64.manylinux_2_24_x86_64.whl
Algorithm Hash digest
SHA256 9bdbce1913b63832d0366a3f837db4fe4fb3153f834bc8adf7cc3b04ae42f5e7
MD5 b5df16d54974ff9f4080aa6125d55a1e
BLAKE2b-256 a9aa7133b1471a1d93e42a613564cd19929093751175d95e5836fc8d8614540b

See more details on using hashes here.

File details

Details for the file manifest_tool-2.4.0rc1-cp39-cp39-manylinux_2_5_x86_64.manylinux1_x86_64.whl.

File metadata

File hashes

Hashes for manifest_tool-2.4.0rc1-cp39-cp39-manylinux_2_5_x86_64.manylinux1_x86_64.whl
Algorithm Hash digest
SHA256 e6d22ab8c8b5ab78a942a2011d20027cfa29cb5ea8225673fa748b9f651bfcc1
MD5 7ad2cdcc820616fa93047e47323244bf
BLAKE2b-256 6fd00e382650150d1ce65e4347eafbb14a5dff17ea470ef2e2d5d8c7827c62e2

See more details on using hashes here.

File details

Details for the file manifest_tool-2.4.0rc1-cp39-cp39-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_12_x86_64.manylinux2010_x86_64.whl.

File metadata

File hashes

Hashes for manifest_tool-2.4.0rc1-cp39-cp39-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_12_x86_64.manylinux2010_x86_64.whl
Algorithm Hash digest
SHA256 bb7a9fa84ce86f17354d988c3764b68a6d7afc59deb6a198c420ac5200f2db2e
MD5 fec60744237ee9f51cb2c33c1af2928f
BLAKE2b-256 ca7826db0da9a0380d2823203c202cf51881cc5f3c319a83b9153cc946cb46ea

See more details on using hashes here.

File details

Details for the file manifest_tool-2.4.0rc1-cp39-cp39-macosx_10_9_x86_64.whl.

File metadata

  • Download URL: manifest_tool-2.4.0rc1-cp39-cp39-macosx_10_9_x86_64.whl
  • Upload date:
  • Size: 111.8 kB
  • Tags: CPython 3.9, macOS 10.9+ x86-64
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.4.2 importlib_metadata/4.8.1 pkginfo/1.7.1 requests/2.26.0 requests-toolbelt/0.9.1 tqdm/4.62.2 CPython/3.9.0

File hashes

Hashes for manifest_tool-2.4.0rc1-cp39-cp39-macosx_10_9_x86_64.whl
Algorithm Hash digest
SHA256 b1683801cb66f34aba79b4f654c2f0ebb17dfed82406bd73407f46a24f0a2a6e
MD5 02058bdf115c02ded24e806bce7da9a9
BLAKE2b-256 f912794ac852d911dc431d7fa272a95917ce4c22df38f9e86dbcac4456926e3e

See more details on using hashes here.

File details

Details for the file manifest_tool-2.4.0rc1-cp38-cp38-win_amd64.whl.

File metadata

  • Download URL: manifest_tool-2.4.0rc1-cp38-cp38-win_amd64.whl
  • Upload date:
  • Size: 92.4 kB
  • Tags: CPython 3.8, Windows x86-64
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.4.2 importlib_metadata/4.8.1 pkginfo/1.7.1 requests/2.26.0 requests-toolbelt/0.9.1 tqdm/4.62.2 CPython/3.9.0

File hashes

Hashes for manifest_tool-2.4.0rc1-cp38-cp38-win_amd64.whl
Algorithm Hash digest
SHA256 b858e2cc8d9e0cc2ade66f762318d87c9897f92bff2d647ea0da53b1a96b73b6
MD5 88897ae8790a9b905f9f1fe4d09604ed
BLAKE2b-256 30113deffb8c63c350b114d3aef4a09f172ca694fabc469a9a2a7a3a0489e093

See more details on using hashes here.

File details

Details for the file manifest_tool-2.4.0rc1-cp38-cp38-win32.whl.

File metadata

  • Download URL: manifest_tool-2.4.0rc1-cp38-cp38-win32.whl
  • Upload date:
  • Size: 93.4 kB
  • Tags: CPython 3.8, Windows x86
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.4.2 importlib_metadata/4.8.1 pkginfo/1.7.1 requests/2.26.0 requests-toolbelt/0.9.1 tqdm/4.62.2 CPython/3.9.0

File hashes

Hashes for manifest_tool-2.4.0rc1-cp38-cp38-win32.whl
Algorithm Hash digest
SHA256 c05fcd91db5895c2ec23f139fb1bb2d76d4f366fd53312688b4bda89faded118
MD5 c57b6533df18dddb7bcb616562903578
BLAKE2b-256 f7400cf3d59e40f24efff7e56c12550320785eaf8500124293fb98953f46a8ab

See more details on using hashes here.

File details

Details for the file manifest_tool-2.4.0rc1-cp38-cp38-manylinux_2_17_x86_64.manylinux2014_x86_64.whl.

File metadata

File hashes

Hashes for manifest_tool-2.4.0rc1-cp38-cp38-manylinux_2_17_x86_64.manylinux2014_x86_64.whl
Algorithm Hash digest
SHA256 0f549aa35531c00e1f522b574ffb8f723df428fe5d7d8f64d447f528b76ba594
MD5 53879f0708176e507a63c0af7d5eec6f
BLAKE2b-256 fdbb38e96e063055e76ddc70338f7e305d24e6c5df6fe56ab3d5b6eb2f6fae59

See more details on using hashes here.

File details

Details for the file manifest_tool-2.4.0rc1-cp38-cp38-manylinux_2_17_x86_64.manylinux2014_x86_64.manylinux_2_24_x86_64.whl.

File metadata

File hashes

Hashes for manifest_tool-2.4.0rc1-cp38-cp38-manylinux_2_17_x86_64.manylinux2014_x86_64.manylinux_2_24_x86_64.whl
Algorithm Hash digest
SHA256 317f8f056d87daff0a5b01570bed890d801631b64d70a8e12c13e262e99bcc6b
MD5 9dfb5a01f4ace3eeb25e3728c2ed12bf
BLAKE2b-256 460ac8bb912ca8983d4be875e495a01a8592e8555badfbe584216b496c8ac755

See more details on using hashes here.

File details

Details for the file manifest_tool-2.4.0rc1-cp38-cp38-manylinux_2_5_x86_64.manylinux1_x86_64.whl.

File metadata

File hashes

Hashes for manifest_tool-2.4.0rc1-cp38-cp38-manylinux_2_5_x86_64.manylinux1_x86_64.whl
Algorithm Hash digest
SHA256 c70507d3043bcbe808b660db0eca6124a9fc1a7891317138a1d4903f9109a6a2
MD5 588f4daeabb9880cc6945fbbb33cebbe
BLAKE2b-256 af730cd8f707bf3a9ade336242bfcc4c5717ce423342711d1c0e0a7bb4919a99

See more details on using hashes here.

File details

Details for the file manifest_tool-2.4.0rc1-cp38-cp38-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_12_x86_64.manylinux2010_x86_64.whl.

File metadata

File hashes

Hashes for manifest_tool-2.4.0rc1-cp38-cp38-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_12_x86_64.manylinux2010_x86_64.whl
Algorithm Hash digest
SHA256 33901cd245b3450fc26609c159a9e3704b9b03ea258d814ed698fa36fad1a1e6
MD5 ca2bcdc29619e6086f4b80b91cd10af9
BLAKE2b-256 79aea5a783bb538597d3c87958258c63fe302092c17713415fea8fb4f36f2d2d

See more details on using hashes here.

File details

Details for the file manifest_tool-2.4.0rc1-cp38-cp38-macosx_10_9_x86_64.whl.

File metadata

  • Download URL: manifest_tool-2.4.0rc1-cp38-cp38-macosx_10_9_x86_64.whl
  • Upload date:
  • Size: 111.8 kB
  • Tags: CPython 3.8, macOS 10.9+ x86-64
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.4.2 importlib_metadata/4.8.1 pkginfo/1.7.1 requests/2.26.0 requests-toolbelt/0.9.1 tqdm/4.62.2 CPython/3.9.0

File hashes

Hashes for manifest_tool-2.4.0rc1-cp38-cp38-macosx_10_9_x86_64.whl
Algorithm Hash digest
SHA256 dea6b41eccef2b218619ea95c2840f560634a2235d10bd69c4c62c346da9bf9c
MD5 16ef3dd30f0b482802b7a5e9ba260725
BLAKE2b-256 c1288dc2e1d35e40412e327f6a6c7760a72faef4f169c963a107afb97798ebb2

See more details on using hashes here.

File details

Details for the file manifest_tool-2.4.0rc1-cp37-cp37m-win_amd64.whl.

File metadata

  • Download URL: manifest_tool-2.4.0rc1-cp37-cp37m-win_amd64.whl
  • Upload date:
  • Size: 92.4 kB
  • Tags: CPython 3.7m, Windows x86-64
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.4.2 importlib_metadata/4.8.1 pkginfo/1.7.1 requests/2.26.0 requests-toolbelt/0.9.1 tqdm/4.62.2 CPython/3.9.0

File hashes

Hashes for manifest_tool-2.4.0rc1-cp37-cp37m-win_amd64.whl
Algorithm Hash digest
SHA256 473f3339eea4827e909b6958b0c729b3c05b3f4bfafdb2bdb1fc1b659942f978
MD5 a5bd6b9a95f06342737c5e6c74db1bf5
BLAKE2b-256 b9d471c657e1533e607d985078f51414baf7f7c292f0a72f13e532abb887d429

See more details on using hashes here.

File details

Details for the file manifest_tool-2.4.0rc1-cp37-cp37m-win32.whl.

File metadata

  • Download URL: manifest_tool-2.4.0rc1-cp37-cp37m-win32.whl
  • Upload date:
  • Size: 93.4 kB
  • Tags: CPython 3.7m, Windows x86
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.4.2 importlib_metadata/4.8.1 pkginfo/1.7.1 requests/2.26.0 requests-toolbelt/0.9.1 tqdm/4.62.2 CPython/3.9.0

File hashes

Hashes for manifest_tool-2.4.0rc1-cp37-cp37m-win32.whl
Algorithm Hash digest
SHA256 0b244d6c082e229a31f0955088792327c2624d71af4c5022b45a560334f83723
MD5 ce22bcaa2b147fd49a0fccd2ec18d943
BLAKE2b-256 a85ce81e8f70f8361d28ba0a81594aa645f99e7c6b52c747c9d73447a328eba1

See more details on using hashes here.

File details

Details for the file manifest_tool-2.4.0rc1-cp37-cp37m-manylinux_2_17_x86_64.manylinux2014_x86_64.whl.

File metadata

File hashes

Hashes for manifest_tool-2.4.0rc1-cp37-cp37m-manylinux_2_17_x86_64.manylinux2014_x86_64.whl
Algorithm Hash digest
SHA256 730625d39c629acb9c5f151cedd1ef421367cb864818361bd614345fe4061e62
MD5 a2a922bb5cd2b717b6f1ec2ce7b35a72
BLAKE2b-256 0b18bca4d9ce095dba68eee8b4be9613e50d421923ce00476b6e5e39208d0b10

See more details on using hashes here.

File details

Details for the file manifest_tool-2.4.0rc1-cp37-cp37m-manylinux_2_17_x86_64.manylinux2014_x86_64.manylinux_2_24_x86_64.whl.

File metadata

File hashes

Hashes for manifest_tool-2.4.0rc1-cp37-cp37m-manylinux_2_17_x86_64.manylinux2014_x86_64.manylinux_2_24_x86_64.whl
Algorithm Hash digest
SHA256 5d937287f4bbc7f780b8e28ec08f3c60f73029f8ecc29b37f4e355b56dec3cf5
MD5 133be0033368f28203c1e759f6ba6fe7
BLAKE2b-256 f74ad53c9258e77c42feab903ab664b1b2b6d9c436d61dfd249d9da4a02c8fdc

See more details on using hashes here.

File details

Details for the file manifest_tool-2.4.0rc1-cp37-cp37m-manylinux_2_5_x86_64.manylinux1_x86_64.whl.

File metadata

File hashes

Hashes for manifest_tool-2.4.0rc1-cp37-cp37m-manylinux_2_5_x86_64.manylinux1_x86_64.whl
Algorithm Hash digest
SHA256 fdc520dd6e8d070b1d4f4afa8340767b2fa12c07b9b57b3313d1f1ed50772ea1
MD5 0cc8fab1a0757f4f77e6aac25bfe7283
BLAKE2b-256 56546d8a4bbce397a3185f3eff8f06809f7e3d1d02611e054f8aca5003fbeb84

See more details on using hashes here.

File details

Details for the file manifest_tool-2.4.0rc1-cp37-cp37m-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_12_x86_64.manylinux2010_x86_64.whl.

File metadata

File hashes

Hashes for manifest_tool-2.4.0rc1-cp37-cp37m-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_12_x86_64.manylinux2010_x86_64.whl
Algorithm Hash digest
SHA256 e6228af6dcc4e5a09810d89c847b1c2344c4209be3fa193d56e8b926ab247e44
MD5 6988af1266b1e48864a7289a9be9d7d8
BLAKE2b-256 7473f596b9812bb6e3a2134ba780ec8cf8425a2dd39a71a5a77a9bed88836bad

See more details on using hashes here.

File details

Details for the file manifest_tool-2.4.0rc1-cp37-cp37m-macosx_10_9_x86_64.whl.

File metadata

  • Download URL: manifest_tool-2.4.0rc1-cp37-cp37m-macosx_10_9_x86_64.whl
  • Upload date:
  • Size: 111.8 kB
  • Tags: CPython 3.7m, macOS 10.9+ x86-64
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.4.2 importlib_metadata/4.8.1 pkginfo/1.7.1 requests/2.26.0 requests-toolbelt/0.9.1 tqdm/4.62.2 CPython/3.9.0

File hashes

Hashes for manifest_tool-2.4.0rc1-cp37-cp37m-macosx_10_9_x86_64.whl
Algorithm Hash digest
SHA256 f2ec9a1bf831a4f99e723c18abcc67826be04ed4db83a50f3e241e2ac6bb8ea1
MD5 c8a8224bbf98dd54cc6c14557c0a35fd
BLAKE2b-256 d574f0e13f5015ed51dc62a8aaf8c214e44526730e66df794c8ac4c6793adec5

See more details on using hashes here.

File details

Details for the file manifest_tool-2.4.0rc1-cp36-cp36m-win_amd64.whl.

File metadata

  • Download URL: manifest_tool-2.4.0rc1-cp36-cp36m-win_amd64.whl
  • Upload date:
  • Size: 92.4 kB
  • Tags: CPython 3.6m, Windows x86-64
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.4.2 importlib_metadata/4.8.1 pkginfo/1.7.1 requests/2.26.0 requests-toolbelt/0.9.1 tqdm/4.62.2 CPython/3.9.0

File hashes

Hashes for manifest_tool-2.4.0rc1-cp36-cp36m-win_amd64.whl
Algorithm Hash digest
SHA256 ffe5de11ba1c7af865ebf8444ce00a1264015058aad1e733c70739d8761b393d
MD5 8cf0218c53861f0502cbaab2e1d9e494
BLAKE2b-256 3f138a9caa35493521ce2d38fb4e8645ff3da97fb7a69d4c93cbdfb20cb762f6

See more details on using hashes here.

File details

Details for the file manifest_tool-2.4.0rc1-cp36-cp36m-win32.whl.

File metadata

  • Download URL: manifest_tool-2.4.0rc1-cp36-cp36m-win32.whl
  • Upload date:
  • Size: 93.4 kB
  • Tags: CPython 3.6m, Windows x86
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.4.2 importlib_metadata/4.8.1 pkginfo/1.7.1 requests/2.26.0 requests-toolbelt/0.9.1 tqdm/4.62.2 CPython/3.9.0

File hashes

Hashes for manifest_tool-2.4.0rc1-cp36-cp36m-win32.whl
Algorithm Hash digest
SHA256 069f3b4e41c03013f03778fd8fed820bc8b9c76fb371a9c0c090973c10e06f6a
MD5 6f87ad5697f6427ea1513c2f243b4339
BLAKE2b-256 27027ac58499acdcde3877a01fef48b20c70e0de95ce9b4765557b383bb0a75f

See more details on using hashes here.

File details

Details for the file manifest_tool-2.4.0rc1-cp36-cp36m-manylinux_2_17_x86_64.manylinux2014_x86_64.whl.

File metadata

File hashes

Hashes for manifest_tool-2.4.0rc1-cp36-cp36m-manylinux_2_17_x86_64.manylinux2014_x86_64.whl
Algorithm Hash digest
SHA256 8c6d08da8719aa54371f4bb3bed1afc4ce6bd799c75aca494a902b67140806c8
MD5 18ed8bc3363afd6d37a5a8f49de8df43
BLAKE2b-256 232104dab0d72c5cef94604010e5852ff8b8f0685546bfbd994003e78a9b460a

See more details on using hashes here.

File details

Details for the file manifest_tool-2.4.0rc1-cp36-cp36m-manylinux_2_17_x86_64.manylinux2014_x86_64.manylinux_2_24_x86_64.whl.

File metadata

File hashes

Hashes for manifest_tool-2.4.0rc1-cp36-cp36m-manylinux_2_17_x86_64.manylinux2014_x86_64.manylinux_2_24_x86_64.whl
Algorithm Hash digest
SHA256 120e5a3323cd7fbd67fc602c71d56cf5662f2c9bc9705cde4dd2e1e09df6894d
MD5 c1cfdf2d95582bfb4878355b4e5aaf27
BLAKE2b-256 84a2864c60037ad99307d798fce8148d88b10ddb0caf2b1240ff69b433cb999f

See more details on using hashes here.

File details

Details for the file manifest_tool-2.4.0rc1-cp36-cp36m-manylinux_2_5_x86_64.manylinux1_x86_64.whl.

File metadata

File hashes

Hashes for manifest_tool-2.4.0rc1-cp36-cp36m-manylinux_2_5_x86_64.manylinux1_x86_64.whl
Algorithm Hash digest
SHA256 104bb7d6f1ff69db4e8b9ede2768b9ba0b5767d959b03f2b713c6b9a62f9efdc
MD5 ceff1bce090ef0707e758c05dead63d8
BLAKE2b-256 3cc1ed1c31b428d8c43b411a21739f56e9d14b2a0afd97ec1f95e8d3c4131431

See more details on using hashes here.

File details

Details for the file manifest_tool-2.4.0rc1-cp36-cp36m-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_12_x86_64.manylinux2010_x86_64.whl.

File metadata

File hashes

Hashes for manifest_tool-2.4.0rc1-cp36-cp36m-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_12_x86_64.manylinux2010_x86_64.whl
Algorithm Hash digest
SHA256 8575f1c1b1e3f07a148768ad830c253f13df23003ec9fad8cb9f4897f80be9e8
MD5 aa9596f1830d37018fa9fdf008e05e67
BLAKE2b-256 8c76ed7050435e425039e896d2f42c78a4d4b1f12679f8ba6d66deb918e91a71

See more details on using hashes here.

File details

Details for the file manifest_tool-2.4.0rc1-cp36-cp36m-macosx_10_9_x86_64.whl.

File metadata

  • Download URL: manifest_tool-2.4.0rc1-cp36-cp36m-macosx_10_9_x86_64.whl
  • Upload date:
  • Size: 111.8 kB
  • Tags: CPython 3.6m, macOS 10.9+ x86-64
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.4.2 importlib_metadata/4.8.1 pkginfo/1.7.1 requests/2.26.0 requests-toolbelt/0.9.1 tqdm/4.62.2 CPython/3.9.0

File hashes

Hashes for manifest_tool-2.4.0rc1-cp36-cp36m-macosx_10_9_x86_64.whl
Algorithm Hash digest
SHA256 051906129479593a79395f2192b364a2d67753cd3af5d3ceb8af41bd4ed0020f
MD5 c2893f773dcc2167adfd21893a38419a
BLAKE2b-256 209468bf814aa00d8673b30d66486d9cb654cd5eb9975d5ea39eb5ec471ea29d

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page