From 454f2ae10b46d4e40adc6f2846771a757cccce82 Mon Sep 17 00:00:00 2001 From: Bernardo Damele Date: Fri, 18 Jan 2013 13:35:27 +0000 Subject: [PATCH] ready for production - closes #311 --- extra/shutils/regressiontest.py | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-) diff --git a/extra/shutils/regressiontest.py b/extra/shutils/regressiontest.py index 2a5900263..2ca487ac2 100644 --- a/extra/shutils/regressiontest.py +++ b/extra/shutils/regressiontest.py @@ -20,17 +20,18 @@ SMTP_SERVER = "127.0.0.1" SMTP_PORT = 25 SMTP_TIMEOUT = 30 FROM = "regressiontest@sqlmap.org" -#TO = "dev@sqlmap.org" -TO = "bernardo.damele@gmail.com" +TO = "dev@sqlmap.org" SUBJECT = "Regression test results on %s" % TIME CONTENT = "" TEST_COUNTS = [] ATTACHMENTS = {} -command_line = "cd ../../ ; rm -f $REGRESSION_FILE ; python sqlmap.py --live-test --run-case 'Invalid'" +command_line = "cd ../../ ; rm -f $REGRESSION_FILE ; python sqlmap.py --live-test" proc = subprocess.Popen(command_line, shell=True, stdout=subprocess.PIPE, stderr=subprocess.PIPE) + proc.wait() stdout, stderr = proc.communicate() + failed_tests = re.findall("running live test case: (.+?) \((\d+)\/\d+\)[\r]*\n.+test failed (at parsing item \"(.+)\" )?\- scan folder: (\/.+) \- traceback: (.*?)( - SQL injection not detected)?[\r]*\n", stdout, re.M) for failed_test in failed_tests: