cve: Rewrite to read the JSON feed instead of the XML feed.
authorLudovic Courtès <ludo@gnu.org>
Sun, 20 Oct 2019 20:10:00 +0000 (22:10 +0200)
committerLudovic Courtès <ludo@gnu.org>
Wed, 23 Oct 2019 14:40:17 +0000 (16:40 +0200)
commit74afaa37d5dec1a9d1b83951529ba69d8947fb07
tree782fc4b5e0cd48fb90d69d97b998a37d29a1c2d6
parent59d452da401c375e7bd18d2260c2e42ee0d05b72
cve: Rewrite to read the JSON feed instead of the XML feed.

The XML feed was discontinued on Oct. 16th, 2019:

  <https://nvd.nist.gov/General/News/XML-Vulnerability-Feed-Retirement-Phase-3>

* guix/cve.scm (string->date*): New procedure.
(<cve-item>, <cve>, <cve-reference>): New record types.
(cpe-match->cve-configuration, configuration-data->cve-configurations)
(json->cve-items, version-matches?): New procedures.
(yearly-feed-uri): Change URL to refer to JSON feed.
(cpe->product-alist, %parse-vulnerability-feed)
(xml->vulnerabilities): Remove.
(cve-configuration->package-list, merge-package-lists)
(cve-item->vulnerability, json->vulnerabilities): New procedures.
(write-cache): Use 'json->vulnerabilities' instead of
'xml->vulnerabilities', and remove 'parameterize'.
(vulnerabilities->lookup-proc): Use 'version-matches?' when VERSION is
true.
* tests/cve.scm (%sample): Use 'tests/cve-sample.json'.
(%expected-vulnerabilities): Rewrite accordingly.
("json->cve-items", "cve-item-published-date")
("json->vulnerabilities"): New tests.
("xml->vulnerabilities"): Remove.
("vulnerabilities->lookup-proc"): Adjust to new vulnerabilities.
* tests/cve-sample.json: New file.
* tests/cve-sample.xml: Remove.
* Makefile.am (EXTRA_DIST): Adjust accordingly.
* doc/guix.texi (Invoking guix lint): Update nist.gov URLs.
Makefile.am
doc/guix.texi
guix/cve.scm
tests/cve-sample.json [new file with mode: 0644]
tests/cve-sample.xml [deleted file]
tests/cve.scm