From d0ed7ee0b040ba45609028663d6d2c686fee7820 Mon Sep 17 00:00:00 2001 From: Michael Weiss Date: Sat, 2 Oct 2021 11:58:08 +0200 Subject: [PATCH] chromium: get-commit-message.py: Improve the parsing The latest announcement uses the following structure: "Google is aware the exploits for CVE-2021-37975 and CVE-2021-37976 exist in the wild." (https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_30.html) --- .../networking/browsers/chromium/get-commit-message.py | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/pkgs/applications/networking/browsers/chromium/get-commit-message.py b/pkgs/applications/networking/browsers/chromium/get-commit-message.py index b0fbe20db8ef..85ebb8a7b935 100755 --- a/pkgs/applications/networking/browsers/chromium/get-commit-message.py +++ b/pkgs/applications/networking/browsers/chromium/get-commit-message.py @@ -39,7 +39,7 @@ for entry in feed.entries: print('chromium: TODO -> ' + version + '\n') print(url) if fixes := re.search(r'This update includes .+ security fixes\.', content).group(0): - zero_days = re.search(r'Google is aware( of reports)? that .+ in the wild\.', content) + zero_days = re.search(r'Google is aware( of reports)? th(e|at) .+ in the wild\.', content) if zero_days: fixes += " " + zero_days.group(0) print('\n' + '\n'.join(textwrap.wrap(fixes, width=72)))