A big thanks to Eelco Dolstra, who designed and implemented Nix. Transposing functional programming discipline to package management proved to be inspiring and fruitful. Thanks to the following people who contributed to GNU Guix through suggestions, bug reports, patches, internationalization, or general infrastructure help: Lluís Batlle i Rossell Sylvain Beucler Carlos Carleos Felipe Castro Daniel Clark Alexandru Cojocaru Aleix Conchillo Flaqué Malcolm Cook Thomas Danckaert Rafael Ferreira Christian Grothoff Eric Hanchrow Konrad Hinsen Brandon Invergo Anders Jonsson Jeffrin Jose Kete Daniel Kochmański Matthew Lien Dave Love Chris Marusich Niels Möller Cyprien Nicolas Yutaka Niibe Andrei Osipov Petter Adam Pribyl Pjotr Prins Yakkala Yagnesh Raghava Joshua Randall Bruno Félix Rezende Ribeiro Benno Schulenberg Thomas Schwinge Alexander Shendi Alen Skondro Jan Synáček Matthias Wachs Christine Lemmer-Webber Philip Woods GNU Guix also includes non-software works. Thanks to the following people who contributed the logo and general artwork and themes: Nikita Karetnikov Felipe López ass='list nowrap'>AgeCommit message (Expand)Author 2020-12-21tests: Fix malformed JSON....Guile-JSON 4.3.2 would parse in spite of these typos, but 4.4.1 is stricter. * tests/swh.scm (%directory-entries): Add missing comma. * tests/cve-sample.json: Likewise. Ludovic Courtès 2019-10-23cve: Rewrite to read the JSON feed instead of the XML feed....The XML feed was discontinued on Oct. 16th, 2019: <https://nvd.nist.gov/General/News/XML-Vulnerability-Feed-Retirement-Phase-3> * guix/cve.scm (string->date*): New procedure. (<cve-item>, <cve>, <cve-reference>): New record types. (cpe-match->cve-configuration, configuration-data->cve-configurations) (json->cve-items, version-matches?): New procedures. (yearly-feed-uri): Change URL to refer to JSON feed. (cpe->product-alist, %parse-vulnerability-feed) (xml->vulnerabilities): Remove. (cve-configuration->package-list, merge-package-lists) (cve-item->vulnerability, json->vulnerabilities): New procedures. (write-cache): Use 'json->vulnerabilities' instead of 'xml->vulnerabilities', and remove 'parameterize'. (vulnerabilities->lookup-proc): Use 'version-matches?' when VERSION is true. * tests/cve.scm (%sample): Use 'tests/cve-sample.json'. (%expected-vulnerabilities): Rewrite accordingly. ("json->cve-items", "cve-item-published-date") ("json->vulnerabilities"): New tests. ("xml->vulnerabilities"): Remove. ("vulnerabilities->lookup-proc"): Adjust to new vulnerabilities. * tests/cve-sample.json: New file. * tests/cve-sample.xml: Remove. * Makefile.am (EXTRA_DIST): Adjust accordingly. * doc/guix.texi (Invoking guix lint): Update nist.gov URLs. Ludovic Courtès