Hi, This week I:
- Looked up scrapy-inline-requests[1], went through its source and experimented with it. - Refactored my backend crawling logic for a more general approach. - Implemented a vulnerability alias determination method in the spider. - Changed Debian Security Advisory's alias determination method from parsing plain text documents on the security-tracker repository[2] to parsing security-tracker.debian.org. Cheers, Jaskaran [1]https://github.com/rmax/scrapy-inline-requests [2] https://salsa.debian.org/security-tracker-team/security-tracker/tree/master/data
