config/conf.js (41 lines of code) (raw):
const fs = require("fs");
var package = require('../package.json');
var secrets = require('./customsecrets.js');
module.exports = {
// CVE automation configuration and CNA name
cveorgid: "'f0158376-9dc2-43b6-827c-5f631a4d8d09'",
cveapiheaders: secrets.cveapiheaders,
cveapiurl: "https://cveawg.mitre.org/api",
cveapishortname: "apache",
cveapiliveservice: true,
// which PMC is admin group?
admingroupname: "security",
// which PMC have a security@ address?
pmcswithsecurityemails: ["airflow","commons","couchdb","dubbo","fineract","geronimo","guacamole","hadoop","hive","httpd","ignite","jackrabbit","kafka","libcloud","logging","lucene","metron","milagro","nifi","ofbiz","openmeetings","openoffice","orc","ozone","sentry","shiro","singa","sling","solr","spamassassin","spark","struts","tomcat","trafficcontrol","trafficserver","trafodion","zeppelin","zookeeper"],
// which PMC are allowed to live allocate a CNA name from CVE Project
pmcstrustedascna: ["*","-zeppelin"],
// The Mongodb URL where CVE entries and users are stored.
// WARNING! Configure MongoDB authentication and use a strong password
// WARNING! Ensure MongoDB is not reachable from the network.
database: secrets.database,
//database: `mongodb://vulnogram:StrongLongPass@127.0.0.1:27017/vulnogram`,
// Name of the organization that should be used in page titles etc.,
orgName: ' ',
// Name of the group that should be used in page titles etc.,
groupName: ' ',
//CNA contact address
contact: 'security@apache.org',
classification: 'This tool is based on Vulnogram, contact security@apache.org with any queries or problems',
copyright: ' ',
// Uncomment this line and set a random string to allow unauthenticated access to draft CVE entries that are in review-ready or publish-ready state via /review/<token>/ or /review/<token>/CVE-ID
// This may be useful to share a link to the draft for internal reviews and only those with the link have access to the drafts.
//reviewToken: 'randomtoken',
// port where this tool is running
serverHost: process.env.VULNOGRAM_HOST || '0.0.0.0',
serverPort: process.env.VULNOGRAM_PORT || 3555,
basedir: '/',
//Uncomment this block to enable HTTPs. Configure paths for valid SSL certificates.
// Either get them from your favorite Certificate Authority or generate self signed:
// Keep these safe and secured and readable only by account running vulnogram process!
// $ openssl req -newkey rsa:2048 -nodes -keyout key.pem -x509 -days 365 -out cert.pem
httpsOptions: {
key: fs.readFileSync('/etc/letsencrypt/live/security-vm-he-fi.apache.org/privkey.pem', 'utf8'),
cert: fs.readFileSync('/etc/letsencrypt/live/security-vm-he-fi.apache.org/cert.pem', 'utf8'),
ca: fs.readFileSync('/etc/letsencrypt/live/security-vm-he-fi.apache.org/chain.pem', 'utf8'),
minVersion: 'TLSv1.2'
},
mitreURL: 'https://www.cve.org/CVERecord?id=',
defectURL: '',
publicDefectURL: '',
// ACE editor
ace: 'https://cdnjs.cloudflare.com/ajax/libs/ace/1.4.13/ace.js',
aceHash: "sha512-OMjy8oWtPbx9rJmoprdaQdS2rRovgTetHjiBf7RL7LvRSouoMLks5aIcgqHb6vGEAduuPdBTDCoztxLR+nv45g==",
// if you want this served locally, download ace editor to /public/js/ directory and point to that:
//ace: '/js/ace.js',
//aceHash: "sha512-GoORoNnxst42zE3rYPj4bNBm0Q6ZRXKNH2D9nEmNvVF/z24ywVnijAWVi/09iBiVDQVf3UlZHpzhAJIdd9BXqw==",
// JSON Editor
jsoneditor: 'https://cdnjs.cloudflare.com/ajax/libs/json-editor/2.8.0/jsoneditor.min.js',
jsoneditorHash: 'sha512-8y8kuGFzNGSgACEMNnXJGhOQaLAd4P9MdCXnJ37QjGTBPRrD5FCEVEKj/93xNihQehkO3yVKnOECFWGxxBsveQ==',
// if you want this served locally, download above jsoneditor editor to /public/js/ directory and point to that:
//jsoneditor: '/js/jsoneditor.min.js',
usernameRegex: '[a-zA-Z0-9]{3,}',
sections: [
'cve5',
'cve',
],
homepage: '/cve5',
// Configure addional custom ExpressJS routes.
/*
customRoutes: [
{
path:"/info",
route: "./customRoutes/info"
}
]*/
};