pysentry-rs 0.3.10__cp311-cp311-win_amd64.whl → 0.3.11__cp311-cp311-win_amd64.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of pysentry-rs might be problematic. Click here for more details.

Binary file
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.4
2
2
  Name: pysentry-rs
3
- Version: 0.3.10
3
+ Version: 0.3.11
4
4
  Classifier: Development Status :: 4 - Beta
5
5
  Classifier: Intended Audience :: Developers
6
6
  Classifier: License :: OSI Approved :: GNU General Public License v3 (GPLv3)
@@ -199,8 +199,8 @@ pysentry /path/to/project
199
199
  pysentry --resolver uv /path/to/project
200
200
  pysentry --resolver pip-tools /path/to/project
201
201
 
202
- # Include all dependencies (main + dev + optional)
203
- pysentry --all-extras
202
+ # Exclude extra dependencies (only check main dependencies)
203
+ pysentry --exclude-extra
204
204
 
205
205
  # Filter by severity (only show high and critical)
206
206
  pysentry --severity high
@@ -212,8 +212,8 @@ pysentry --format json --output audit-results.json
212
212
  ### Advanced Usage
213
213
 
214
214
  ```bash
215
- # Using uvx for comprehensive audit
216
- uvx pysentry-rs --all-extras --format sarif --output security-report.sarif
215
+ # Using uvx for comprehensive audit (extras included by default)
216
+ uvx pysentry-rs --format sarif --output security-report.sarif
217
217
 
218
218
  # Check multiple vulnerability sources concurrently
219
219
  uvx pysentry-rs --sources pypa,osv,pypi /path/to/project
@@ -225,14 +225,17 @@ uvx pysentry-rs --format markdown --output security-report.md
225
225
  # Control CI exit codes - only fail on critical vulnerabilities
226
226
  uvx pysentry-rs --fail-on critical
227
227
 
228
- # Or with installed binary
229
- pysentry --all-extras --format sarif --output security-report.sarif
228
+ # Or with installed binary (extras included by default)
229
+ pysentry --format sarif --output security-report.sarif
230
230
  pysentry --sources pypa,osv --direct-only
231
231
  pysentry --format markdown --output security-report.md
232
232
 
233
233
  # Ignore specific vulnerabilities
234
234
  pysentry --ignore CVE-2023-12345 --ignore GHSA-xxxx-yyyy-zzzz
235
235
 
236
+ # Ignore unfixable vulnerabilities (only while they have no fix available)
237
+ pysentry --ignore-while-no-fix CVE-2025-8869
238
+
236
239
  # Disable caching for CI environments
237
240
  pysentry --no-cache
238
241
 
@@ -278,8 +281,8 @@ pysentry --sources pypa,pypi,osv --format json --output prod-security.json
278
281
  # Generate markdown report for GitHub issues/PRs
279
282
  pysentry --format markdown --output SECURITY-REPORT.md
280
283
 
281
- # Comprehensive audit with all sources and full reporting
282
- pysentry --sources pypa,pypi,osv --all-extras --format json --fail-on low
284
+ # Comprehensive audit with all sources and full reporting (extras included by default)
285
+ pysentry --sources pypa,pypi,osv --format json --fail-on low
283
286
 
284
287
  # CI environment with fresh resolution cache
285
288
  pysentry --clear-resolution-cache --sources pypa,osv --format sarif
@@ -358,8 +361,18 @@ color = "auto"
358
361
 
359
362
  [ignore]
360
363
  ids = ["CVE-2023-12345", "GHSA-xxxx-yyyy-zzzz"]
364
+ while_no_fix = ["CVE-2025-8869"]
365
+
366
+ [http]
367
+ timeout = 120
368
+ connect_timeout = 30
369
+ max_retries = 3
370
+ retry_initial_backoff = 1
371
+ retry_max_backoff = 60
372
+ show_progress = true
361
373
  ```
362
374
 
375
+
363
376
  ### Environment Variables
364
377
 
365
378
  | Variable | Description | Example |
@@ -375,10 +388,11 @@ ids = ["CVE-2023-12345", "GHSA-xxxx-yyyy-zzzz"]
375
388
  | `--severity` | Minimum severity: `low`, `medium`, `high`, `critical` | `low` |
376
389
  | `--fail-on` | Fail (exit non-zero) on vulnerabilities ≥ severity | `medium` |
377
390
  | `--sources` | Vulnerability sources: `pypa`, `pypi`, `osv` (multiple) | `pypa` |
378
- | `--all-extras` | Include all dependencies (main + dev + optional) | `false` |
391
+ | `--exclude-extra` | Exclude extra dependencies (dev, optional, etc) | `false` |
379
392
  | `--direct-only` | Check only direct dependencies | `false` |
380
393
  | `--detailed` | Show full vulnerability descriptions instead of truncated | `false` |
381
394
  | `--ignore` | Vulnerability IDs to ignore (repeatable) | `[]` |
395
+ | `--ignore-while-no-fix` | Ignore vulnerabilities only while no fix is available | `[]` |
382
396
  | `--output` | Output file path | `stdout` |
383
397
  | `--no-cache` | Disable all caching | `false` |
384
398
  | `--cache-dir` | Custom cache directory | Platform-specific |
@@ -747,6 +761,42 @@ curl -I https://osv-vulnerabilities.storage.googleapis.com/
747
761
  # Try with different or multiple sources
748
762
  pysentry --sources pypi
749
763
  pysentry --sources pypa,osv
764
+
765
+ # For slow or unstable networks, increase timeout and retries
766
+ # Create/edit .pysentry.toml in your project:
767
+ ```
768
+
769
+ ```toml
770
+ [http]
771
+ timeout = 300 # 5 minute timeout
772
+ max_retries = 5 # More retry attempts
773
+ retry_max_backoff = 120 # Longer backoff delays
774
+ ```
775
+
776
+ ```bash
777
+ # Then run again
778
+ pysentry
779
+ ```
780
+
781
+ **Network timeout errors:**
782
+
783
+ PySentry includes automatic retry with exponential backoff for network issues. If you still experience timeouts:
784
+
785
+ ```bash
786
+ # Increase timeout values in config
787
+ pysentry config init --output .pysentry.toml
788
+ # Edit .pysentry.toml and adjust [http] section
789
+ ```
790
+
791
+ **Rate limiting (HTTP 429 errors):**
792
+
793
+ PySentry automatically handles rate limiting. If rate limits persist:
794
+
795
+ ```toml
796
+ [http]
797
+ max_retries = 5 # More attempts
798
+ retry_initial_backoff = 5 # Longer initial wait
799
+ retry_max_backoff = 300 # Up to 5 minute backoff
750
800
  ```
751
801
 
752
802
  **Slow requirements.txt resolution**
@@ -0,0 +1,7 @@
1
+ pysentry/__init__.py,sha256=QO65Zis-G6ft4NLeV4DB4o9FAHOqHqbL8obCjrfblus,635
2
+ pysentry/_internal.cp311-win_amd64.pyd,sha256=WY_Z7XD4KNGdrIdEGAJRCIiZnTG5LhWwKq4-vLCRieg,10160128
3
+ pysentry_rs-0.3.11.dist-info/METADATA,sha256=Yi_dhcJkF8eRIoN0pZyHUUrVAoEWob503dK5fIJCRGg,29637
4
+ pysentry_rs-0.3.11.dist-info/WHEEL,sha256=YCZ9Vxhf2aXNyfoR2QH-PPqnUr48Igr9zjgnGhp3xTc,96
5
+ pysentry_rs-0.3.11.dist-info/entry_points.txt,sha256=3bJguekVEbXTn-ceDCWJaSIZScquPPP1Ux9TPVHHanE,44
6
+ pysentry_rs-0.3.11.dist-info/licenses/LICENSE,sha256=LeD7F50MI8vrd0IFQeSr0PAl6QnpwLVHR24waAhG9v0,35552
7
+ pysentry_rs-0.3.11.dist-info/RECORD,,
@@ -1,7 +0,0 @@
1
- pysentry/__init__.py,sha256=QO65Zis-G6ft4NLeV4DB4o9FAHOqHqbL8obCjrfblus,635
2
- pysentry/_internal.cp311-win_amd64.pyd,sha256=QBviszXwD5rtTenkkeoD3ogB-lbJSR0bte24rv-wucY,9942528
3
- pysentry_rs-0.3.10.dist-info/METADATA,sha256=Ipc4bHDl35uT-qqpNPHDQsEXJPRbgcVzC2CAw86alvI,28263
4
- pysentry_rs-0.3.10.dist-info/WHEEL,sha256=YCZ9Vxhf2aXNyfoR2QH-PPqnUr48Igr9zjgnGhp3xTc,96
5
- pysentry_rs-0.3.10.dist-info/entry_points.txt,sha256=3bJguekVEbXTn-ceDCWJaSIZScquPPP1Ux9TPVHHanE,44
6
- pysentry_rs-0.3.10.dist-info/licenses/LICENSE,sha256=LeD7F50MI8vrd0IFQeSr0PAl6QnpwLVHR24waAhG9v0,35552
7
- pysentry_rs-0.3.10.dist-info/RECORD,,