Skip to content

Commit f91c137

Browse files
committed
rename to use dashes instead of underscores
1 parent b790b42 commit f91c137

File tree

2 files changed

+7
-3
lines changed

2 files changed

+7
-3
lines changed

py_find_injection/__init__.py

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,9 @@
44
import ast
55
import sys
66

7+
version_info = (0, 1, 1)
8+
__version__ = '.'.join(map(str, version_info))
9+
710

811
def stringify(node):
912
if isinstance(node, ast.Name):
@@ -118,6 +121,7 @@ def main():
118121
description='Look for patterns in python source files that might indicate SQL injection vulnerabilities',
119122
epilog='Exit status is 0 if all files are okay, 1 if any files have an error. Errors are printed to stdout'
120123
)
124+
parser.add_argument('--version', action='version', version='%(prog)s ' + __version__)
121125
parser.add_argument('files', nargs='+', help='Files to check')
122126
args = parser.parse_args()
123127

setup.py

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,11 +2,11 @@
22

33

44
setup(
5-
name="py_find_injection",
6-
version="0.1",
5+
name="py-find-injection",
6+
version="0.1.1",
77
author="James Brown",
88
author_email="jbrown@uber.com",
9-
url="http://github.com/uber/py_find_injection",
9+
url="https://github.com/uber/py-find-injection",
1010
description="simple python ast consumer which searches for common SQL injection attacks",
1111
license='MIT (Expat)',
1212
classifiers=[

0 commit comments

Comments
 (0)