Skip to content

Commit 42f61d6

Browse files
authored
Merge branch 'staging' into 5.2.0-Purl-Test
2 parents c269dc4 + 22fbfb8 commit 42f61d6

98 files changed

Lines changed: 39544 additions & 2553 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

.github/workflows/test-http.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ jobs:
2626
- name: Sleep
2727
run: bash -c "while ! docker compose --file docker/docker-compose.yml logs --tail=10 cveawg | grep -q 'Serving on port'; do sleep 1; done"
2828
- name: Load Data into MongoDb
29-
run: docker compose -f docker/docker-compose.yml exec -T cveawg npm run populate:dev y
29+
run: docker compose -f docker/docker-compose.yml exec -T cveawg npm run populate:dev y; docker compose -f docker/docker-compose.yml exec -T cveawg npm run migrate:test-black-box
3030
- name: Run Black Box Tests
3131
run: |
3232
docker compose --file test-http/docker/docker-compose.yml exec -T demon pytest src/ | tee test-http/src/testOutput.txt

README.md

Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,5 @@
1+
*6/12/2025 NOTE: the Test environment of CVE Services now includes the release candidate “User Registry” which adds many additional features. See the details at the end of this ReadMe doc.*
2+
13
# CVE-API
24

35
![CodeQL](https://github.com/CVEProject/cve-services/workflows/CodeQL/badge.svg)
@@ -124,6 +126,9 @@ When you start your local development server using `npm run start:dev` the speci
124126

125127
You can use `npm run swagger-autogen` to generate a new specification file.
126128

129+
### CVE Record Submission Validation Rules
130+
131+
As part of the submission processing, CVE Services "validates" that specific requirements are met prior to accepting the submission and posting the CVE Record to the CVE List. Validation rules for CVE Record Submission are noted [here](https://github.com/CVEProject/automation-working-group/blob/master/meeting-notes/files/CVERules.md).
127132

128133
### Unit Testing
129134

@@ -137,3 +142,34 @@ In order to run the unit tests:
137142
```sh
138143
npm run start:test
139144
```
145+
146+
### User Registry
147+
148+
The CVE Automation Working Group (on behalf of the CVE Program) is currently working on a new automation capability: the User Registry. The objective of the User Registry is to modernize how CVE Program Organizations (e.g., CNAs, Roots, Top level Roots, the Secretariat) manage/update their organizational properties and user pools. The new capability will ultimately allow CNAs, Roots, Top Level Roots to better manage their own data/user pools with more robust information. It is targeted to be implemented in a series of incremental deployments to CVE Services in the Fall/2025 through Summer/2026.
149+
150+
#### Current Status:
151+
152+
The release candidate for the first User Registry increment (termed the User Registry MVP) is now available for testing/review in the CVE Program Testing Environment. (Note that this release IS NOT a PRODUCTION Release and will not be visible in the CVE Program PRODUCTION environment).
153+
This release candidate establishes a new, more robust User/Organizations databases (and associated APIs) while maintaining full backwards compatibility with the current User/Organizational management functions (meaning that current CVE Services clients will not be required to be modified with the deployment of this candidate). It was discussed at the [6/10/2025 CVE Program AWG meeting](https://github.com/CVEProject/automation-working-group/blob/master/meeting-notes/2025-06-10.md).
154+
155+
#### HowTo:
156+
157+
Credentialed users of CVE Services Test Environment will be able to use the new capabilities via the API endpoints which are described [here](https://cveawg-test.mitre.org/api-docs/) (Be sure to scroll down to the bottom of the page to review the new User Registry interfaces).
158+
159+
Credentialed users can access the APIs by
160+
161+
- installing/using common web application API testing tools such as [curl](https://curl.se/) or [postman](https://www.postman.com/) OR
162+
163+
- installing/using the [User Registry Client](https://github.com/CVEProject/cve-user-registry-client) which provides a GUI interface to exercise the basic functions of the User Registry.
164+
165+
Note that there is no support for these new endpoints in many currently available CVE Services “client” tools (e.g, Vulnogram) and hence they should not be relied upon to examine/test these interfaces.
166+
167+
#### Next Steps:
168+
169+
The AWG is taking comments/questions on this release candidate. You can provide feedback in three ways:
170+
171+
- Send comments/questions to AWG+owner@CVE-CWE-Programs.groups.io,
172+
173+
- Post Issues/Questions to the CVE Services Issue Board (please attach a “user registry” label to your post).
174+
175+
- Attend (virtually) an AWG meeting which meets every week on Tuesday at 4:00 PM Eastern US Time. Send a request for the link to AWG+owner@CVE-CWE-Programs.groups.io.

0 commit comments

Comments
 (0)