File tree Expand file tree Collapse file tree 2 files changed +7
-3
lines changed Expand file tree Collapse file tree 2 files changed +7
-3
lines changed Original file line number Diff line number Diff line change 4
4
import ast
5
5
import sys
6
6
7
+ version_info = (0 , 1 , 1 )
8
+ __version__ = '.' .join (map (str , version_info ))
9
+
7
10
8
11
def stringify (node ):
9
12
if isinstance (node , ast .Name ):
@@ -118,6 +121,7 @@ def main():
118
121
description = 'Look for patterns in python source files that might indicate SQL injection vulnerabilities' ,
119
122
epilog = 'Exit status is 0 if all files are okay, 1 if any files have an error. Errors are printed to stdout'
120
123
)
124
+ parser .add_argument ('--version' , action = 'version' , version = '%(prog)s ' + __version__ )
121
125
parser .add_argument ('files' , nargs = '+' , help = 'Files to check' )
122
126
args = parser .parse_args ()
123
127
Original file line number Diff line number Diff line change 2
2
3
3
4
4
setup (
5
- name = "py_find_injection " ,
6
- version = "0.1" ,
5
+ name = "py-find-injection " ,
6
+ version = "0.1.1 " ,
7
7
author = "James Brown" ,
8
8
author_email = "jbrown@uber.com" ,
9
- url = "http ://github.com/uber/py_find_injection " ,
9
+ url = "https ://github.com/uber/py-find-injection " ,
10
10
description = "simple python ast consumer which searches for common SQL injection attacks" ,
11
11
license = 'MIT (Expat)' ,
12
12
classifiers = [
You can’t perform that action at this time.
0 commit comments