pysentry-rs 0.1.0__cp312-cp312-macosx_11_0_arm64.whl → 0.1.3__cp312-cp312-macosx_11_0_arm64.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of pysentry-rs might be problematic. Click here for more details.

pysentry/__init__.py ADDED
@@ -0,0 +1,60 @@
1
+ """pysentry: Security vulnerability auditing tool for Python packages."""
2
+
3
+ from ._internal import audit_python, audit_with_options
4
+
5
+ __version__ = "0.1.3"
6
+ __all__ = ["audit_python", "audit_with_options", "main"]
7
+
8
+
9
+ def main():
10
+ """CLI entry point."""
11
+ import sys
12
+ import argparse
13
+
14
+ parser = argparse.ArgumentParser(
15
+ prog="pysentry-rs", description="Audit Python packages for vulnerabilities"
16
+ )
17
+ parser.add_argument("path", help="Path to Python project")
18
+ parser.add_argument(
19
+ "--format",
20
+ choices=["human", "json", "sarif"],
21
+ default="human",
22
+ help="Output format",
23
+ )
24
+ parser.add_argument(
25
+ "--source",
26
+ choices=["pypa", "pypi", "osv"],
27
+ default="pypa",
28
+ help="Vulnerability data source",
29
+ )
30
+ parser.add_argument(
31
+ "--min-severity",
32
+ choices=["low", "medium", "high", "critical"],
33
+ default="low",
34
+ help="Minimum severity level",
35
+ )
36
+ parser.add_argument(
37
+ "--ignore",
38
+ action="append",
39
+ dest="ignore_ids",
40
+ help="Vulnerability IDs to ignore (can be used multiple times)",
41
+ )
42
+
43
+ args = parser.parse_args()
44
+
45
+ try:
46
+ if args.source != "pypa" or args.min_severity != "low" or args.ignore_ids:
47
+ result = audit_with_options(
48
+ args.path, args.format, args.source, args.min_severity, args.ignore_ids
49
+ )
50
+ else:
51
+ result = audit_python(args.path, args.format)
52
+
53
+ print(result)
54
+ except Exception as e:
55
+ print(f"Error: {e}", file=sys.stderr)
56
+ sys.exit(1)
57
+
58
+
59
+ if __name__ == "__main__":
60
+ main()
pysentry/__main__.py ADDED
@@ -0,0 +1,6 @@
1
+ """Main entry point for pysentry when run as a module."""
2
+
3
+ from . import main
4
+
5
+ if __name__ == "__main__":
6
+ main()
Binary file
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.4
2
2
  Name: pysentry-rs
3
- Version: 0.1.0
3
+ Version: 0.1.3
4
4
  Classifier: Development Status :: 4 - Beta
5
5
  Classifier: Intended Audience :: Developers
6
6
  Classifier: License :: OSI Approved :: GNU General Public License v3 (GPLv3)
@@ -0,0 +1,8 @@
1
+ pysentry/__init__.py,sha256=XweE7o45pHx2rmO523WkjFJFEjGDwwESMQtXQFZ2d6k,1633
2
+ pysentry/__main__.py,sha256=yzx36hW8FIWKDCOkP409c8wIXnK-A5tIRMw86eueJ_Q,116
3
+ pysentry/_internal.cpython-312-darwin.so,sha256=ORwZqcY1HVCDakoS6FR_4UnhKyUKK7vZW4gF7RohkRk,5675312
4
+ pysentry_rs-0.1.3.dist-info/METADATA,sha256=Wpgd9n5P8ZJa8jO_0Ry9O1eiUF1-pJDplZndnc5SHg4,8644
5
+ pysentry_rs-0.1.3.dist-info/WHEEL,sha256=EhaWXx4fd8VOPM6W-6pxsePGk73OLk2gBi7fwS90pc8,104
6
+ pysentry_rs-0.1.3.dist-info/entry_points.txt,sha256=3bJguekVEbXTn-ceDCWJaSIZScquPPP1Ux9TPVHHanE,44
7
+ pysentry_rs-0.1.3.dist-info/licenses/LICENSE,sha256=TAMtDCoJuavXz7pCEklrzjH55sdvsy5gKsXY9NsImwY,34878
8
+ pysentry_rs-0.1.3.dist-info/RECORD,,
@@ -0,0 +1,2 @@
1
+ [console_scripts]
2
+ pysentry-rs=pysentry:main
pysentry-rs/__init__.py DELETED
@@ -1,46 +0,0 @@
1
- """pysentry-rs: Security vulnerability auditing tool for Python packages."""
2
-
3
- from ._internal import audit_python, audit_with_options
4
-
5
- __version__ = "0.1.0"
6
- __all__ = ["audit_python", "audit_with_options", "main"]
7
-
8
- def main():
9
- """CLI entry point."""
10
- import sys
11
- import argparse
12
-
13
- parser = argparse.ArgumentParser(prog="pysentry-rs", description="Audit Python packages for vulnerabilities")
14
- parser.add_argument("path", help="Path to Python project")
15
- parser.add_argument("--format", choices=["human", "json", "sarif"],
16
- default="human", help="Output format")
17
- parser.add_argument("--source", choices=["pypa", "pypi", "osv"],
18
- default="pypa", help="Vulnerability data source")
19
- parser.add_argument("--min-severity", choices=["low", "medium", "high", "critical"],
20
- default="low", help="Minimum severity level")
21
- parser.add_argument("--ignore", action="append", dest="ignore_ids",
22
- help="Vulnerability IDs to ignore (can be used multiple times)")
23
-
24
- args = parser.parse_args()
25
-
26
- try:
27
- if args.source != "pypa" or args.min_severity != "low" or args.ignore_ids:
28
- # Use the more advanced function with options
29
- result = audit_with_options(
30
- args.path,
31
- args.format,
32
- args.source,
33
- args.min_severity,
34
- args.ignore_ids
35
- )
36
- else:
37
- # Use the simple function
38
- result = audit_python(args.path, args.format)
39
-
40
- print(result)
41
- except Exception as e:
42
- print(f"Error: {e}", file=sys.stderr)
43
- sys.exit(1)
44
-
45
- if __name__ == "__main__":
46
- main()
pysentry-rs/__main__.py DELETED
@@ -1,6 +0,0 @@
1
- """Main entry point for pysentry-rs when run as a module."""
2
-
3
- from . import main
4
-
5
- if __name__ == "__main__":
6
- main()
Binary file
@@ -1,8 +0,0 @@
1
- pysentry-rs/__init__.py,sha256=L1Jomq_x4SLJAt0EO1QS1AhOqLZPEMBjkbNBzq4894Q,1744
2
- pysentry-rs/__main__.py,sha256=8BuRKACl8S_gP9DIAwcbToXlRzSznK3cDXxZCenWY8M,119
3
- pysentry-rs/_internal.cpython-312-darwin.so,sha256=V5AKjoL7ah3SxQPhsB7MSTWoWv8gfI8YLIMORD1geYk,16752
4
- pysentry_rs-0.1.0.dist-info/METADATA,sha256=gBrWxeB1liR7JJu_WgTZMc8oZPfjfyn4mb8ItdGYR8k,8644
5
- pysentry_rs-0.1.0.dist-info/WHEEL,sha256=EhaWXx4fd8VOPM6W-6pxsePGk73OLk2gBi7fwS90pc8,104
6
- pysentry_rs-0.1.0.dist-info/entry_points.txt,sha256=rm30-K4cclz_0brqWJWyYuYwH5NPzdsA53bAhuoqeDw,47
7
- pysentry_rs-0.1.0.dist-info/licenses/LICENSE,sha256=TAMtDCoJuavXz7pCEklrzjH55sdvsy5gKsXY9NsImwY,34878
8
- pysentry_rs-0.1.0.dist-info/RECORD,,
@@ -1,2 +0,0 @@
1
- [console_scripts]
2
- pysentry-rs=pysentry-rs:main