config/conf-default.js (27 lines of code) (raw):
const fs = require("fs");
var package = require('../package.json');
module.exports = {
// The Mongodb URL where CVE entries and users are stored.
// WARNING: Configure MongoDB authentication and use a strong password
// WARNING: Ensure MongoDB is not reachable from the network.
database: `mongodb://${process.env.MONGO_INITDB_ROOT_USERNAME || "admin"}:${process.env.MONGO_INITDB_ROOT_PASSWORD || "admin"}@${process.env.MONGO_HOST || "127.0.0.1"}:${process.env.MONGO_PORT || "27017"}`,
//database:'mongodb://vulnogram:StrongLongPass@127.0.0.1:27017/vulnogram',
// Name of the organization that should be used in page titles etc.,
//orgName: 'Example Org',
// Name of the group that should be used in page titles etc.,
groupName: 'Security Incident Response Team',
//CNA contact address
//contact: 'sirt@example.net',
classification: 'Confidential INTERNAL USE ONLY',
copyright: '© Example Org. Made with ' + package.name + ' ' + package.version,
// Uncomment this line and set a random string to allow unauthenticated access to draft CVE entries that are in review-ready or publish-ready state via /review/<token>/ or /review/<token>/CVE-ID
// This may be useful to share a link to the draft for internal reviews and only those with the link have access to the drafts.
//reviewToken: 'randomtoken',
// port where this tool is running
serverHost: process.env.VULNOGRAM_HOST || '127.0.0.1',
serverPort: process.env.VULNOGRAM_PORT || 3555,
basedir: '/',
//Uncomment this block to enable HTTPs. Configure paths for valid SSL certificates.
// Either get them from your favorite Certificate Authority or generate self signed:
// Keep these safe and secured and readable only by account running vulnogram process!
// $ openssl req -newkey rsa:2048 -nodes -keyout key.pem -x509 -days 365 -out cert.pem
/*
httpsOptions: {
key: fs.readFileSync("./config/key.pem"),
cert: fs.readFileSync("./config/cert.pem"),
minVersion: 'TLSv1.2'
},
*/
mitreURL: 'https://www.cve.org/CVERecord?id=',
defectURL: 'https://example.net/internal/bugs/',
publicDefectURL: 'https://example.net/bugs/',
// ACE editor
ace: 'https://cdnjs.cloudflare.com/ajax/libs/ace/1.4.13/ace.js',
aceHash: "sha512-OMjy8oWtPbx9rJmoprdaQdS2rRovgTetHjiBf7RL7LvRSouoMLks5aIcgqHb6vGEAduuPdBTDCoztxLR+nv45g==",
// if you want this served locally, download ace editor to /public/js/ directory and point to that:
//ace: '/js/ace.js',
//aceHash: "sha512-GoORoNnxst42zE3rYPj4bNBm0Q6ZRXKNH2D9nEmNvVF/z24ywVnijAWVi/09iBiVDQVf3UlZHpzhAJIdd9BXqw==",
// JSON Editor
jsoneditor: 'https://cdnjs.cloudflare.com/ajax/libs/json-editor/2.8.0/jsoneditor.min.js',
jsoneditorHash: 'sha512-8y8kuGFzNGSgACEMNnXJGhOQaLAd4P9MdCXnJ37QjGTBPRrD5FCEVEKj/93xNihQehkO3yVKnOECFWGxxBsveQ==',
// if you want this served locally, download above jsoneditor editor to /public/js/ directory and point to that:
//jsoneditor: '/js/jsoneditor.min.js', //version 2.5.4
//jsoneditorHash: 'sha512-uWu+rXQQB3W440i9GCPMZZL2/tf58decmRv8uD5KWo0CQn5Qu8JVkK1EXBmJv9Gj1q7TZeRbbntnrz1hcFkdPQ==',
// ajv - JSON schema draft-07 validation
// NOTE -- including ajv is experimental and can be excluded if desired by commenting out the next two lines
ajv: 'https://cdnjs.cloudflare.com/ajax/libs/ajv/8.12.0/ajv7.min.js',
ajvHash: 'sha512-U2SW9Ihh3GF6F8gP8QgLS+I244xnM5pFCh3cigpw7bAzUDnKDlxdlFL4kjyXTle8SJl/tJ0gdnwd44Eb3hLG/Q==',
// if you want this served locally, download above ajv to /public/js/ directory and point to that:
//ajv: '/js/ajv7.min.js',
//ajvHash: 'sha512-U2SW9Ihh3GF6F8gP8QgLS+I244xnM5pFCh3cigpw7bAzUDnKDlxdlFL4kjyXTle8SJl/tJ0gdnwd44Eb3hLG/Q==',
usernameRegex: '[a-zA-Z0-9]{3,}',
sections: [
'cve',
'cve5',
'nvd'
],
homepage: '/home',
// Configure addional custom ExpressJS routes.
/*
customRoutes: [
{
path:"/info",
route: "./customRoutes/info"
}
]
*/
};