pysentry-rs 0.1.0__tar.gz → 0.1.1__tar.gz

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of pysentry-rs might be problematic. Click here for more details.

Files changed (38) hide show
  1. {pysentry_rs-0.1.0 → pysentry_rs-0.1.1}/Cargo.lock +1 -1
  2. {pysentry_rs-0.1.0 → pysentry_rs-0.1.1}/Cargo.toml +1 -1
  3. {pysentry_rs-0.1.0 → pysentry_rs-0.1.1}/PKG-INFO +1 -1
  4. {pysentry_rs-0.1.0 → pysentry_rs-0.1.1}/pyproject.toml +2 -2
  5. pysentry_rs-0.1.1/python/pysentry/__init__.py +60 -0
  6. pysentry_rs-0.1.1/python/pysentry/__main__.py +6 -0
  7. pysentry_rs-0.1.0/python/pysentry-rs/__init__.py +0 -46
  8. pysentry_rs-0.1.0/python/pysentry-rs/__main__.py +0 -6
  9. {pysentry_rs-0.1.0 → pysentry_rs-0.1.1}/.gitignore +0 -0
  10. {pysentry_rs-0.1.0 → pysentry_rs-0.1.1}/CLAUDE.md +0 -0
  11. {pysentry_rs-0.1.0 → pysentry_rs-0.1.1}/LICENSE +0 -0
  12. {pysentry_rs-0.1.0 → pysentry_rs-0.1.1}/PUBLISHING.md +0 -0
  13. {pysentry_rs-0.1.0 → pysentry_rs-0.1.1}/README.md +0 -0
  14. {pysentry_rs-0.1.0 → pysentry_rs-0.1.1}/src/cache/audit.rs +0 -0
  15. {pysentry_rs-0.1.0 → pysentry_rs-0.1.1}/src/cache/mod.rs +0 -0
  16. {pysentry_rs-0.1.0 → pysentry_rs-0.1.1}/src/cache/storage.rs +0 -0
  17. {pysentry_rs-0.1.0 → pysentry_rs-0.1.1}/src/dependency/mod.rs +0 -0
  18. {pysentry_rs-0.1.0 → pysentry_rs-0.1.1}/src/dependency/scanner.rs +0 -0
  19. {pysentry_rs-0.1.0 → pysentry_rs-0.1.1}/src/error.rs +0 -0
  20. {pysentry_rs-0.1.0 → pysentry_rs-0.1.1}/src/lib.rs +0 -0
  21. {pysentry_rs-0.1.0 → pysentry_rs-0.1.1}/src/main.rs +0 -0
  22. {pysentry_rs-0.1.0 → pysentry_rs-0.1.1}/src/output/mod.rs +0 -0
  23. {pysentry_rs-0.1.0 → pysentry_rs-0.1.1}/src/output/report.rs +0 -0
  24. {pysentry_rs-0.1.0 → pysentry_rs-0.1.1}/src/output/sarif.rs +0 -0
  25. {pysentry_rs-0.1.0 → pysentry_rs-0.1.1}/src/parsers/lock.rs +0 -0
  26. {pysentry_rs-0.1.0 → pysentry_rs-0.1.1}/src/parsers/mod.rs +0 -0
  27. {pysentry_rs-0.1.0 → pysentry_rs-0.1.1}/src/parsers/pyproject.rs +0 -0
  28. {pysentry_rs-0.1.0 → pysentry_rs-0.1.1}/src/providers/mod.rs +0 -0
  29. {pysentry_rs-0.1.0 → pysentry_rs-0.1.1}/src/providers/osv.rs +0 -0
  30. {pysentry_rs-0.1.0 → pysentry_rs-0.1.1}/src/providers/pypa.rs +0 -0
  31. {pysentry_rs-0.1.0 → pysentry_rs-0.1.1}/src/providers/pypi.rs +0 -0
  32. {pysentry_rs-0.1.0 → pysentry_rs-0.1.1}/src/python.rs +0 -0
  33. {pysentry_rs-0.1.0 → pysentry_rs-0.1.1}/src/types.rs +0 -0
  34. {pysentry_rs-0.1.0 → pysentry_rs-0.1.1}/src/vulnerability/database.rs +0 -0
  35. {pysentry_rs-0.1.0 → pysentry_rs-0.1.1}/src/vulnerability/matcher.rs +0 -0
  36. {pysentry_rs-0.1.0 → pysentry_rs-0.1.1}/src/vulnerability/mod.rs +0 -0
  37. {pysentry_rs-0.1.0 → pysentry_rs-0.1.1}/test-project/pyproject.toml +0 -0
  38. {pysentry_rs-0.1.0 → pysentry_rs-0.1.1}/test-project/uv.lock +0 -0
@@ -1192,7 +1192,7 @@ dependencies = [
1192
1192
 
1193
1193
  [[package]]
1194
1194
  name = "pysentry"
1195
- version = "0.1.0"
1195
+ version = "0.1.1"
1196
1196
  dependencies = [
1197
1197
  "anyhow",
1198
1198
  "async-trait",
@@ -1,6 +1,6 @@
1
1
  [package]
2
2
  name = "pysentry"
3
- version = "0.1.0"
3
+ version = "0.1.1"
4
4
  edition = "2021"
5
5
  description = "Security vulnerability auditing for Python packages"
6
6
  license = "GPL-3.0"
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.4
2
2
  Name: pysentry-rs
3
- Version: 0.1.0
3
+ Version: 0.1.1
4
4
  Classifier: Development Status :: 4 - Beta
5
5
  Classifier: Intended Audience :: Developers
6
6
  Classifier: License :: OSI Approved :: GNU General Public License v3 (GPLv3)
@@ -33,9 +33,9 @@ Repository = "https://github.com/nyudenkov/pysentry"
33
33
  Issues = "https://github.com/nyudenkov/pysentry/issues"
34
34
 
35
35
  [project.scripts]
36
- pysentry-rs = "pysentry-rs:main"
36
+ pysentry-rs = "pysentry:main"
37
37
 
38
38
  [tool.maturin]
39
39
  features = ["pyo3/extension-module"]
40
40
  python-source = "python"
41
- module-name = "pysentry-rs._internal"
41
+ module-name = "pysentry._internal"
@@ -0,0 +1,60 @@
1
+ """pysentry: Security vulnerability auditing tool for Python packages."""
2
+
3
+ from ._internal import audit_python, audit_with_options
4
+
5
+ __version__ = "0.1.1"
6
+ __all__ = ["audit_python", "audit_with_options", "main"]
7
+
8
+
9
+ def main():
10
+ """CLI entry point."""
11
+ import sys
12
+ import argparse
13
+
14
+ parser = argparse.ArgumentParser(
15
+ prog="pysentry-rs", description="Audit Python packages for vulnerabilities"
16
+ )
17
+ parser.add_argument("path", help="Path to Python project")
18
+ parser.add_argument(
19
+ "--format",
20
+ choices=["human", "json", "sarif"],
21
+ default="human",
22
+ help="Output format",
23
+ )
24
+ parser.add_argument(
25
+ "--source",
26
+ choices=["pypa", "pypi", "osv"],
27
+ default="pypa",
28
+ help="Vulnerability data source",
29
+ )
30
+ parser.add_argument(
31
+ "--min-severity",
32
+ choices=["low", "medium", "high", "critical"],
33
+ default="low",
34
+ help="Minimum severity level",
35
+ )
36
+ parser.add_argument(
37
+ "--ignore",
38
+ action="append",
39
+ dest="ignore_ids",
40
+ help="Vulnerability IDs to ignore (can be used multiple times)",
41
+ )
42
+
43
+ args = parser.parse_args()
44
+
45
+ try:
46
+ if args.source != "pypa" or args.min_severity != "low" or args.ignore_ids:
47
+ result = audit_with_options(
48
+ args.path, args.format, args.source, args.min_severity, args.ignore_ids
49
+ )
50
+ else:
51
+ result = audit_python(args.path, args.format)
52
+
53
+ print(result)
54
+ except Exception as e:
55
+ print(f"Error: {e}", file=sys.stderr)
56
+ sys.exit(1)
57
+
58
+
59
+ if __name__ == "__main__":
60
+ main()
@@ -0,0 +1,6 @@
1
+ """Main entry point for pysentry when run as a module."""
2
+
3
+ from . import main
4
+
5
+ if __name__ == "__main__":
6
+ main()
@@ -1,46 +0,0 @@
1
- """pysentry-rs: Security vulnerability auditing tool for Python packages."""
2
-
3
- from ._internal import audit_python, audit_with_options
4
-
5
- __version__ = "0.1.0"
6
- __all__ = ["audit_python", "audit_with_options", "main"]
7
-
8
- def main():
9
- """CLI entry point."""
10
- import sys
11
- import argparse
12
-
13
- parser = argparse.ArgumentParser(prog="pysentry-rs", description="Audit Python packages for vulnerabilities")
14
- parser.add_argument("path", help="Path to Python project")
15
- parser.add_argument("--format", choices=["human", "json", "sarif"],
16
- default="human", help="Output format")
17
- parser.add_argument("--source", choices=["pypa", "pypi", "osv"],
18
- default="pypa", help="Vulnerability data source")
19
- parser.add_argument("--min-severity", choices=["low", "medium", "high", "critical"],
20
- default="low", help="Minimum severity level")
21
- parser.add_argument("--ignore", action="append", dest="ignore_ids",
22
- help="Vulnerability IDs to ignore (can be used multiple times)")
23
-
24
- args = parser.parse_args()
25
-
26
- try:
27
- if args.source != "pypa" or args.min_severity != "low" or args.ignore_ids:
28
- # Use the more advanced function with options
29
- result = audit_with_options(
30
- args.path,
31
- args.format,
32
- args.source,
33
- args.min_severity,
34
- args.ignore_ids
35
- )
36
- else:
37
- # Use the simple function
38
- result = audit_python(args.path, args.format)
39
-
40
- print(result)
41
- except Exception as e:
42
- print(f"Error: {e}", file=sys.stderr)
43
- sys.exit(1)
44
-
45
- if __name__ == "__main__":
46
- main()
@@ -1,6 +0,0 @@
1
- """Main entry point for pysentry-rs when run as a module."""
2
-
3
- from . import main
4
-
5
- if __name__ == "__main__":
6
- main()
File without changes
File without changes
File without changes
File without changes
File without changes
File without changes
File without changes
File without changes
File without changes
File without changes