fleet/cmd/macoffice/generate.go

51 lines
1.1 KiB
Go
Raw Normal View History

package main
import (
"fmt"
"net/http"
"os"
"path/filepath"
"time"
"github.com/fleetdm/fleet/v4/server/vulnerabilities/macoffice"
)
func panicif(err error) {
if err != nil {
panic(err)
}
}
// Generates Mac Office release notes metadata in JSON format, to be used by our vulnerability process.
func main() {
wd, err := os.Getwd()
panicif(err)
outPath := filepath.Join(wd, "macoffice_rel_notes")
err = os.MkdirAll(outPath, 0o755)
panicif(err)
fmt.Println("Downloading and parsing Mac Office rel notes...")
res, err := http.Get(macoffice.RelNotesURL)
panicif(err)
defer res.Body.Close()
parsed, err := macoffice.ParseReleaseHTML(res.Body)
panicif(err)
var relNotes macoffice.ReleaseNotes
for _, rn := range parsed {
// We only care about release notes that have a version set (because we need that for
// matching software entries) and also that contain some
// security updates (because we only intented to use the release notes for vulnerability processing).
if rn.Valid() {
relNotes = append(relNotes, rn)
}
}
err = relNotes.Serialize(time.Now(), outPath)
panicif(err)
fmt.Println("Done.")
}