[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[bug#37838] [PATCH 0/2] Rewrite (guix cve) to read NIST's JSON feed
From: |
Ludovic Courtès |
Subject: |
[bug#37838] [PATCH 0/2] Rewrite (guix cve) to read NIST's JSON feed |
Date: |
Mon, 04 Nov 2019 18:32:19 +0100 |
User-agent: |
Gnus/5.13 (Gnus v5.13) Emacs/26.3 (gnu/linux) |
Hello,
Marius Bakke <address@hidden> skribis:
> Ludovic Courtès <address@hidden> writes:
>
>> Hi Marius,
>>
>> Marius Bakke <address@hidden> skribis:
>>
>>> Ludovic Courtès <address@hidden> writes:
>>>
>>>> Hello,
>>>>
>>>> Ludovic Courtès <address@hidden> skribis:
>>>>
>>>>> cve: Rewrite to read the JSON feed instead of the XML feed.
>>>>> lint: Re-enable CVE checker.
>>>>
>>>> Pushed as 9efa2c28a4f842b7ca1977e084299de441842856.
>>>>
>>>> Please let me know if you notice anything fishy with ‘guix lint -c cve’:
>>>> CVEs not showing up, CVEs showing up that should not, etc.
>>>
>>> Here is what I get (on ee42e9f9f):
>>>
>>> $ ./pre-inst-env guix lint -c cve ao
>>> fetching CVE database for 2019...]...
>>> Backtrace:
>>> 11 (apply-smob/1 #<catch-closure 7f08d6d9d900>)
>>> In ice-9/boot-9.scm:
>>> 705:2 10 (call-with-prompt _ _ #<procedure default-prompt-handler (k
>>> proc)>)
>>> In ice-9/eval.scm:
>>> 619:8 9 (_ #(#(#<directory (guile-user) 7f08d6a23140>)))
>>> In guix/ui.scm:
>>> 1730:12 8 (run-guix-command _ . _)
>>> In srfi/srfi-1.scm:
>>> 640:9 7 (for-each #<procedure 7f08d689f3c0 at
>>> guix/scripts/lint.scm:168:16 (spec)> ("ao"))
>>> In guix/scripts/lint.scm:
>>> 57:4 6 (run-checkers _ _)
>>> In srfi/srfi-1.scm:
>>> 640:9 5 (for-each #<procedure 7f08c7706480 at
>>> guix/scripts/lint.scm:57:14 (checker)> (#<<lint-checker> name: c…>))
>>> In guix/scripts/lint.scm:
>>> 64:17 4 (_ _)
>>> In guix/lint.scm:
>>> 999:4 3 (check-vulnerabilities _)
>>> 994:9 2 (_ _)
>>> In unknown file:
>>> 1 (force #<promise #<procedure 7f08d42e7928 at
>>> guix/lint.scm:982:16 ()>>)
>>> In guix/lint.scm:
>>> 983:24 0 (_)
>>>
>>> guix/lint.scm:983:24: Throw to key `srfi-34' with args `(#<condition
>>> &message [message: "invalid CVE feed"] 7f08b5a39920>)'.
>>>
>>> I tried downloading the .json.gz files manually and they seem fine.
>>
>> I don’t encounter this problem. Is it reproducible for you?
>
> I still get this when using './pre-inst-env', even after a 'make
> clean-go'. It works without the './pre-inst-env script'(!?).
Hmm hmm! Could you add some ‘pk’ calls around there in guix/lint.scm?
Ludo’.