On 9/16/21 2:14 PM, ste...@eissing.org wrote:
> 
>> Am 16.09.2021 um 14:04 schrieb Ruediger Pluem <rpl...@apache.org>:
>>
>>
>>
>> On 9/16/21 12:33 PM, ic...@apache.org wrote:
>>> This is an automated email from the ASF dual-hosted git repository.
>>>
>>> icing pushed a commit to branch main
>>> in repository https://gitbox.apache.org/repos/asf/httpd-site.git
>>>
>>>
>>> The following commit(s) were added to refs/heads/main by this push:
>>>     new 51476c4  publishing release httpd-2.4.49
>>> 51476c4 is described below
>>>
>>> commit 51476c4d2261ea5b68951054a50c08a249ea1306
>>> Author: Stefan Eissing <stefan.eiss...@greenbytes.de>
>>> AuthorDate: Thu Sep 16 09:58:23 2021 +0200
>>>
>>>    publishing release httpd-2.4.49
>>> ---
>>> content/doap.rdf    |  4 ++--
>>> content/download.md | 24 ++++++++++++------------
>>> content/index.md    |  6 +++---
>>> 3 files changed, 17 insertions(+), 17 deletions(-)
>>
>> The vulnerabilties page is not updated yet. I guess this can be fixed by 
>> copying the respective json files
>> to https://github.com/apache/httpd-site/tree/main/content/security/json

I just downloaded the files manually and commited them in 
645a263259cad97a39f1ba0e0689ec2476d429da. But this breaks the site.
Hence I reverted. Looks like that the downloaded json misses data.

>> Does https://cveprocess.apache.org/ provide any RESTFUL API to extract the 
>> JSON from the tool such that this can be scripted?
> 
> With links such as these it looks unguessable
> 
> blob:https://cveprocess.apache.org/3c51c80b-1d31-403a-9d1d-95c928f91574
> 
> (involuntarily learning about 'blob:' url schemes...aaahhhhh!)
> 
>>

Regards

RĂ¼diger


Reply via email to