diff --git a/README.md b/README.md index 18b87b9cc0f3bc24275742a820aace78287a543c..701bdc5edb1123b977eebe9b7c185315d285c1ba 100644 --- a/README.md +++ b/README.md @@ -1,71 +1,33 @@ -# cvevulner +# cve-manager -#### 介绍 -{**以下是码云平台说明,您可以替换此简介** -码云是 OSCHINA 推出的基于 Git 的代码托管平台(同时支持 SVN)。专为开发者提供稳定、高效、安全的云端软件开发协作平台 -无论是个人、团队、或是企业,都能够用码云实现代码托管、项目管理、协作开发。企业项目请看 [https://gitee.com/enterprises](https://gitee.com/enterprises)} +## Introduction -#### 软件架构 -软件架构说明 -##### issue 分析评论规则 -issue分析员注意事项 -1. 分析以/analysis标识开始 -2. 分析完结以 /end 结束 -3. 分析issue后需要在评论中修改issue中的模板字段值必须用对应评论标签包裹 +This repository is used to address the code of openEuler cve manager. - | 模板字段中文名 | 模板字段英文名 | 评论标签 | - | ------------- | ------------- | ------------- | - | 漏洞编号 | Loophole number| [LN][/LN] | - | 漏洞组件 | loophole ascription component | [LAC][/LAC] | - | 漏洞版本 | loophole ascription version | [LAV][/LAV] | - | CVSS v3.0分值 | cvss v3.0 score | [CVS][/CVS] | - | CVSS 向量 | cvss V3.1 vector | [CVV][/CVV] | - | 漏洞 描述 | loophole description | [LD][/LD] | - | 影响分析说明 | impact analysis description | [IAD][/IAD] | - | 原理分析 | principle analysis | [PA][/PA] | - | openEuler评分 | openEuler score | [OES][/OES] | - | openEuler向量 | openEuler Vector | [OEV][/OEV] | - | 影响的版本 | impact version | [IV][/IV] | - | 规避方案和措施 | Circumvention plan or mitigation measures | [CPMM][/CPMM] | - | 影响的包 | impact wrap| [IW][/IW] -- 分析issue填写模板(ps 每一次分析评论必须用/analysis指令 填写项可以一次填完也可不填写完 填写完成加上/done指令 - /analysis - 影响分析说明:[IAD]此处为填写影响分析说明的内容[/IAD] - 原理分析:[PA]此处为填写原理分析的内容[/PA] - openEuler评分:[OES]此处为填写openEuler评分的内容[/OES] - openEuler向量:[OEV]此处为填写openEuler向量的内容[/OEV] - 影响的版本:[IV]此处为填写影响版本的内容[/IV] - 规避方案和措施:[IV]此处为填写规避方案和措施的内容[/IV] - 影响的包:[IW]此处为填写影响的包的内容(内容以英文逗号分隔)[/IW] - /done +## Architecture + +## Prerequisites -#### 安装教程 +You'll need to setup a MySQL Database before you are getting started. +This is an example to create Database instance. -1. xxxx -2. xxxx -3. xxxx +* Setup MySQL instance by the Huawei Cloud Relational Database Service (RDS) +* Login in MySQL with your account and password +* Create database instance by running the following command + ``` + CREATE DATABASE cvevulner; + source ./doc/sql/db_struct.sql; + ``` +The information of database instance will be used in the following Installation. -#### 使用说明 +## Getting Started -1. xxxx -2. xxxx -3. xxxx +* [Build the project](doc/md/installx.md) -#### 参与贡献 +## Process processing help -1. Fork 本仓库 -2. 新建 Feat_xxx 分支 -3. 提交代码 -4. 新建 Pull Request +See the [Process processing help](doc/md/manual.md) file for details. +> For Chinese version, please refer to [流程处理帮助](doc/md/manual.md). - -#### 码云特技 - -1. 使用 Readme\_XXX.md 来支持不同的语言,例如 Readme\_en.md, Readme\_zh.md -2. 码云官方博客 [blog.gitee.com](https://blog.gitee.com) -3. 你可以 [https://gitee.com/explore](https://gitee.com/explore) 这个地址来了解码云上的优秀开源项目 -4. [GVP](https://gitee.com/gvp) 全称是码云最有价值开源项目,是码云综合评定出的优秀开源项目 -5. 码云官方提供的使用手册 [https://gitee.com/help](https://gitee.com/help) -6. 码云封面人物是一档用来展示码云会员风采的栏目 [https://gitee.com/gitee-stars/](https://gitee.com/gitee-stars/) diff --git a/common/global.go b/common/global.go index e5315f62d21f665fb9a701d422a73fcfa2c1cedd..d9b53b0e252fe5d13e268f1e1cf4b4d41a39fcc8 100644 --- a/common/global.go +++ b/common/global.go @@ -12,14 +12,20 @@ type GlobalVal struct { GitPassword string HookPwd string GitToken string + AesKey string + LoginKey string + DbUser string } func InitGlobal() { var gVal GlobalVal - gVal.Dbpwd = os.Getenv("Dbpwd") - gVal.ClientID = os.Getenv("clientid") - gVal.ClientSecret = os.Getenv("clientsecret") - gVal.GitPassword = os.Getenv("gitpassword") - gVal.HookPwd = os.Getenv("hookpwd") - fmt.Println("globalval: ", gVal) + gVal.Dbpwd = os.Getenv("DB_PWD") + gVal.DbUser = os.Getenv("DB_USER") + gVal.AesKey = os.Getenv("AES_KEY") + gVal.ClientID = os.Getenv("GITEE_CLIENT_ID") + gVal.ClientSecret = os.Getenv("GITEE_CLIENT_SECRET") + gVal.GitPassword = os.Getenv("GITEE_PASSWORD") + gVal.HookPwd = os.Getenv("HOOK_PWD") + gVal.GitToken = os.Getenv("GITEE_TOKEN") + fmt.Println("env globalval: ", gVal) } \ No newline at end of file diff --git a/conf/app.conf b/conf/app.conf index c41a29d0df27b81cc4a126df2ecc3633311e9c7f..9c657e8ac59347b2d091d050aabd480d9dc76cd8 100644 --- a/conf/app.conf +++ b/conf/app.conf @@ -1,13 +1,16 @@ appname = cvevulner +#appname = cve_manager httpport = 80 runmode = dev autorender = false copyrequestbody = true EnableDocs = true sqlconn = -key = djS*@+8K9{J!ymk6 +# 登录双方约定的key +key = "${AES_KEY||***}" initdb = 1 -loginkey = djS*@+8K9{-!yo%64 +# 登录key +loginkey = "{${LOGIN_KEY||***}" # token 有效期,单位:天 token_expir_time=3 #分析指令 @@ -17,12 +20,12 @@ rejectCmd = "/reject" approveCmd = "/approve" - [mysql] -dbhost = 127.0.0.1 +dbhost = 159.138.2.2 dbport = 3306 #dbuser = "${DB_USER||root}" dbuser = "${DB_USER||cve}" +dbpwd = "${DB_PWD||***}" dbname = cvevulner dbprefix = cve_ maxidle = 30 @@ -69,9 +72,10 @@ client_secret = "${GITEE_CLIENT_SECRET||****}" password = "${GITEE_PASSWORD||****}" # git token -git_token = "${issueaccesstoken||xxx}" +git_token = "${GITEE_TOKEN||xxx}" [hook] +hookpwd = "${HOOK_PWD||***}" #hookurl = http://159.138.2.2:80/issue hookurl = http://159.138.2.2:80/v1/issue/hook/event @@ -84,4 +88,4 @@ cveref = https://nvd.nist.gov/vuln/detail/ openeulernum = 3000 [reflink] -comment_cmd = https://gitee.com/zhangjianjun_code/cvevulner/blob/dev/README.md +comment_cmd = https://gitee.com/openeuler/cve-manager/blob/master/doc/md/manual.md diff --git a/controllers/hook.go b/controllers/hook.go index bbae07b22cb2363dfafe5bb672164a01489066af..e51717af1329f8513b7d5b4e5cc098f6f23f45a7 100644 --- a/controllers/hook.go +++ b/controllers/hook.go @@ -203,7 +203,7 @@ func handleIssueComment(payload models.CommentPayload) { if err != nil { logs.Error(err) } - accessToken := os.Getenv("issueaccesstoken") + accessToken := os.Getenv("GITEE_TOKEN") owner := beego.AppConfig.String("gitee::owner") path := beego.AppConfig.String("gitee::path") taskhandler.AddCommentToIssue(fmt.Sprintf(ReviewRejectScore,issueTmp.Assignee,cuAccount),issueTmp.IssueNum,owner,path,accessToken) @@ -315,7 +315,7 @@ func analysisComment(issueNum string, cuAccount string, cBody string,payload *mo if msg,ok :=checkIssueAnalysisComplete(&issueTmp);!ok{ //send comment to issue msg = fmt.Sprintf(CommentAnalysisCplTpl,issueTmp.Assignee,msg) - accessToken := os.Getenv("issueaccesstoken") + accessToken := os.Getenv("GITEE_TOKEN") owner := beego.AppConfig.String("gitee::owner") path := beego.AppConfig.String("gitee::path") taskhandler.AddCommentToIssue(msg,issueTmp.IssueNum,owner,path,accessToken) @@ -348,7 +348,7 @@ func notifyAuditorReview(payload *models.CommentPayload,issueTmp models.IssueTem logs.Error(err) return } - accessToken := os.Getenv("issueaccesstoken") + accessToken := os.Getenv("GITEE_TOKEN") content := fmt.Sprintf(ReviewPrivateLettersTpl, payload.Issue.Title,payload.Issue.HtmlUrl,issueTmp.NVDScore,issueTmp.OpenEulerScore) owner := beego.AppConfig.String("gitee::owner") @@ -420,7 +420,7 @@ func checkIssueAnalysisComplete(i *models.IssueTemplate) (msg string,ok bool) { } func commentUpdateIssue(issueTmp models.IssueTemplate) { - accessToken := os.Getenv("issueaccesstoken") + accessToken := os.Getenv("GITEE_TOKEN") owner := beego.AppConfig.String("gitee::owner") path := beego.AppConfig.String("gitee::path") if accessToken != "" && owner != "" && path != "" { diff --git a/doc/image/Framework.png b/doc/image/Framework.png new file mode 100644 index 0000000000000000000000000000000000000000..4e60704a70b3c61b1d0f81751acd0acd9b68ab2f Binary files /dev/null and b/doc/image/Framework.png differ diff --git a/doc/md/installx.md b/doc/md/installx.md new file mode 100644 index 0000000000000000000000000000000000000000..2229e01d7dc04d8097e7c376016bc3c3051b77ab --- /dev/null +++ b/doc/md/installx.md @@ -0,0 +1,24 @@ +# Getting Started On Md + +## Build + + +* Before you get started, make sure to have [Go](https://golang.org/) already installed in your local machine. + +* Install beego + ```cassandraql + go get -u github.com/astaxie/beego + go get -u github.com/beego/bee + ``` + [Reference documents](https://beego.me/) + + * The configuration environment variable values are as follows: + ```cassandraql + DB_PWD,DB_USER,AES_KEY,GITEE_CLIENT_ID,GITEE_CLIENT_SECRET,GITEE_PASSWORD,HOOK_PWD,GITEE_TOKEN + ``` +## Usage + +* run + ``` + bee run + ``` \ No newline at end of file diff --git a/doc/md/manual.md b/doc/md/manual.md new file mode 100644 index 0000000000000000000000000000000000000000..5aecbc60c53effb659af6e307836d3eac240fe44 --- /dev/null +++ b/doc/md/manual.md @@ -0,0 +1,34 @@ +##### issue 分析评论规则 +issue分析员注意事项 +1. 分析以/analysis标识开始 +2. 分析完结以 /end 结束 +3. 分析issue后需要在评论中修改issue中的模板字段值必须用对应评论标签包裹 + + | 模板字段中文名 | 模板字段英文名 | 评论标签 | + | ------------- | ------------- | ------------- | + | 漏洞编号 | Loophole number| [LN][/LN] | + | 漏洞组件 | loophole ascription component | [LAC][/LAC] | + | 漏洞版本 | loophole ascription version | [LAV][/LAV] | + | CVSS v3.0分值 | cvss v3.0 score | [CVS][/CVS] | + | CVSS 向量 | cvss V3.1 vector | [CVV][/CVV] | + | 漏洞 描述 | loophole description | [LD][/LD] | + | 影响分析说明 | impact analysis description | [IAD][/IAD] | + | 原理分析 | principle analysis | [PA][/PA] | + | openEuler评分 | openEuler score | [OES][/OES] | + | openEuler向量 | openEuler Vector | [OEV][/OEV] | + | 影响的版本 | impact version | [IV][/IV] | + | 规避方案和措施 | Circumvention plan or mitigation measures | [CPMM][/CPMM] | + | 影响的包 | impact wrap| [IW][/IW] +- 分析issue填写模板(ps 每一次分析评论必须用/analysis指令 填写项可以一次填完也可不填写完 填写完成加上/done指令 + /analysis + 影响分析说明:[IAD]此处为填写影响分析说明的内容[/IAD] + 原理分析:[PA]此处为填写原理分析的内容[/PA] + openEuler评分:[OES]此处为填写openEuler评分的内容[/OES] + openEuler向量:[OEV]此处为填写openEuler向量的内容[/OEV] + 影响的版本:[IV]此处为填写影响版本的内容[/IV] + 规避方案和措施:[IV]此处为填写规避方案和措施的内容[/IV] + 影响的包:[IW]此处为填写影响的包的内容(内容以英文逗号分隔)[/IW] + /done + + #### security-committee #### + * 整理中 \ No newline at end of file diff --git a/doc/sql/db_struct.sql b/doc/sql/db_struct.sql new file mode 100644 index 0000000000000000000000000000000000000000..1c3f2ca7b33f5df1b18efd037df40fa6b74f88cb --- /dev/null +++ b/doc/sql/db_struct.sql @@ -0,0 +1,666 @@ +/* +SQLyog Community v13.1.6 (64 bit) +MySQL - 8.0.21 : Database - cvevulner +********************************************************************* +*/ + +/*!40101 SET NAMES utf8 */; + +/*!40101 SET SQL_MODE=''*/; + +/*!40014 SET @OLD_UNIQUE_CHECKS=@@UNIQUE_CHECKS, UNIQUE_CHECKS=0 */; +/*!40014 SET @OLD_FOREIGN_KEY_CHECKS=@@FOREIGN_KEY_CHECKS, FOREIGN_KEY_CHECKS=0 */; +/*!40101 SET @OLD_SQL_MODE=@@SQL_MODE, SQL_MODE='NO_AUTO_VALUE_ON_ZERO' */; +/*!40111 SET @OLD_SQL_NOTES=@@SQL_NOTES, SQL_NOTES=0 */; +CREATE DATABASE /*!32312 IF NOT EXISTS*/`cvevulner` /*!40100 DEFAULT CHARACTER SET utf8 */ /*!80016 DEFAULT ENCRYPTION='N' */; + +USE `cvevulner`; + +/*Table structure for table `cve_admin_user` */ + +DROP TABLE IF EXISTS `cve_admin_user`; + +CREATE TABLE `cve_admin_user` ( + `user_id` int NOT NULL AUTO_INCREMENT, + `user_name` varchar(64) NOT NULL DEFAULT '', + `pass_word` varchar(256) NOT NULL DEFAULT '', + `create_time` datetime NOT NULL DEFAULT CURRENT_TIMESTAMP, + PRIMARY KEY (`user_id`) +) ENGINE=InnoDB DEFAULT CHARSET=utf8; + +/*Table structure for table `cve_git_open_euler` */ + +DROP TABLE IF EXISTS `cve_git_open_euler`; + +CREATE TABLE `cve_git_open_euler` ( + `git_id` bigint NOT NULL AUTO_INCREMENT, + `package_id` bigint NOT NULL DEFAULT '0', + `package_name` varchar(256) NOT NULL DEFAULT '', + `version` varchar(64) NOT NULL DEFAULT '', + `release` varchar(128) NOT NULL DEFAULT '', + `origin_url` varchar(512) CHARACTER SET utf8 COLLATE utf8_general_ci NOT NULL DEFAULT '', + `license` varchar(4096) CHARACTER SET utf8 COLLATE utf8_general_ci NOT NULL DEFAULT '', + `feature` varchar(128) NOT NULL DEFAULT '', + `main_tainer` varchar(128) NOT NULL DEFAULT '', + `main_tain_level` tinyint NOT NULL DEFAULT '1', + `release_time` varchar(32) NOT NULL DEFAULT '', + `used_time` varchar(32) NOT NULL DEFAULT '', + `latest_version` varchar(128) NOT NULL DEFAULT '', + `latest_version_time` varchar(32) NOT NULL DEFAULT '', + `issue_count` bigint NOT NULL DEFAULT '0', + `table_id` bigint NOT NULL DEFAULT '0', + `table_name` varchar(128) NOT NULL DEFAULT '', + `status` tinyint NOT NULL DEFAULT '0', + `create_time` datetime NOT NULL DEFAULT CURRENT_TIMESTAMP, + `update_time` datetime NOT NULL DEFAULT CURRENT_TIMESTAMP ON UPDATE CURRENT_TIMESTAMP, + `delete_time` datetime DEFAULT NULL, + PRIMARY KEY (`git_id`), + UNIQUE KEY `cve_git_open_euler_package_version` (`package_name`,`version`), + KEY `cve_git_open_euler_package_id` (`package_id`), + KEY `cve_git_open_euler_version` (`version`), + KEY `cve_git_open_euler_table_id` (`table_id`) +) ENGINE=InnoDB AUTO_INCREMENT=9860 DEFAULT CHARSET=utf8; + +/*Table structure for table `cve_git_package_info` */ + +DROP TABLE IF EXISTS `cve_git_package_info`; + +CREATE TABLE `cve_git_package_info` ( + `detail_id` bigint NOT NULL AUTO_INCREMENT, + `git_id` bigint NOT NULL DEFAULT '0', + `git_ids` bigint NOT NULL DEFAULT '0', + `package_name` varchar(256) NOT NULL DEFAULT '', + `version` varchar(64) NOT NULL DEFAULT '', + `release` varchar(128) NOT NULL DEFAULT '', + `origin_url` varchar(512) NOT NULL DEFAULT '', + `license` varchar(4096) CHARACTER SET utf8 COLLATE utf8_general_ci NOT NULL DEFAULT '', + `feature` varchar(128) NOT NULL DEFAULT '', + `main_tainer` varchar(128) NOT NULL DEFAULT '', + `main_tain_level` tinyint NOT NULL DEFAULT '1', + `git_url` varchar(512) NOT NULL DEFAULT '', + `summary` varchar(1024) NOT NULL DEFAULT '', + `decription` text CHARACTER SET utf8 COLLATE utf8_general_ci NOT NULL, + `build_require` varchar(4096) CHARACTER SET utf8 COLLATE utf8_general_ci NOT NULL DEFAULT '', + `status` tinyint NOT NULL DEFAULT '0', + `create_time` datetime NOT NULL DEFAULT CURRENT_TIMESTAMP, + `update_time` datetime NOT NULL DEFAULT CURRENT_TIMESTAMP ON UPDATE CURRENT_TIMESTAMP, + `delete_time` datetime DEFAULT NULL, + PRIMARY KEY (`detail_id`), + UNIQUE KEY `cve_git_package_info_package_version` (`package_name`,`version`), + KEY `cve_git_package_info_git_id` (`git_id`), + KEY `cve_git_package_info_git_ids` (`git_ids`), + KEY `cve_git_package_info_version` (`version`) +) ENGINE=InnoDB AUTO_INCREMENT=4794 DEFAULT CHARSET=utf8; + +/*Table structure for table `cve_git_package_table` */ + +DROP TABLE IF EXISTS `cve_git_package_table`; + +CREATE TABLE `cve_git_package_table` ( + `table_id` bigint NOT NULL AUTO_INCREMENT, + `table_name` varchar(128) NOT NULL DEFAULT '', + PRIMARY KEY (`table_id`) +) ENGINE=InnoDB AUTO_INCREMENT=6 DEFAULT CHARSET=utf8; + +/*Table structure for table `cve_git_sub_pack` */ + +DROP TABLE IF EXISTS `cve_git_sub_pack`; + +CREATE TABLE `cve_git_sub_pack` ( + `sub_id` bigint NOT NULL AUTO_INCREMENT, + `detail_id` bigint NOT NULL DEFAULT '0', + `ids` bigint NOT NULL DEFAULT '0', + `sub_pack_name` varchar(256) NOT NULL DEFAULT '', + PRIMARY KEY (`sub_id`), + KEY `cve_git_sub_pack_detail_id` (`detail_id`), + KEY `cve_git_sub_pack_ids` (`ids`) +) ENGINE=InnoDB AUTO_INCREMENT=16942 DEFAULT CHARSET=utf8; + +/*Table structure for table `cve_git_sub_pack_provides` */ + +DROP TABLE IF EXISTS `cve_git_sub_pack_provides`; + +CREATE TABLE `cve_git_sub_pack_provides` ( + `provide_id` bigint NOT NULL AUTO_INCREMENT, + `sub_id` bigint NOT NULL DEFAULT '0', + `ids` bigint NOT NULL DEFAULT '0', + `provide_name` varchar(256) NOT NULL DEFAULT '', + `requiredb` varchar(4096) CHARACTER SET utf8 COLLATE utf8_general_ci NOT NULL DEFAULT '', + PRIMARY KEY (`provide_id`), + KEY `cve_git_sub_pack_provides_sub_id` (`sub_id`), + KEY `cve_git_sub_pack_provides_ids` (`ids`) +) ENGINE=InnoDB AUTO_INCREMENT=87847 DEFAULT CHARSET=utf8; + +/*Table structure for table `cve_git_sub_pack_require` */ + +DROP TABLE IF EXISTS `cve_git_sub_pack_require`; + +CREATE TABLE `cve_git_sub_pack_require` ( + `require_id` bigint NOT NULL AUTO_INCREMENT, + `sub_id` bigint NOT NULL DEFAULT '0', + `ids` bigint NOT NULL DEFAULT '0', + `require_name` varchar(256) NOT NULL DEFAULT '', + `providedb` varchar(4096) CHARACTER SET utf8 COLLATE utf8_general_ci NOT NULL DEFAULT '', + PRIMARY KEY (`require_id`), + KEY `cve_git_sub_pack_require_sub_id` (`sub_id`), + KEY `cve_git_sub_pack_require_ids` (`ids`) +) ENGINE=InnoDB AUTO_INCREMENT=110712 DEFAULT CHARSET=utf8; + +/*Table structure for table `cve_git_sub_pack_requiredby` */ + +DROP TABLE IF EXISTS `cve_git_sub_pack_requiredby`; + +CREATE TABLE `cve_git_sub_pack_requiredby` ( + `id` bigint NOT NULL AUTO_INCREMENT, + `provide_id` bigint NOT NULL DEFAULT '0', + `requiredb` varchar(256) NOT NULL DEFAULT '', + PRIMARY KEY (`id`), + KEY `cve_git_sub_pack_requiredby_provide_id` (`provide_id`) +) ENGINE=InnoDB AUTO_INCREMENT=127479 DEFAULT CHARSET=utf8; + +/*Table structure for table `cve_ip_white` */ + +DROP TABLE IF EXISTS `cve_ip_white`; + +CREATE TABLE `cve_ip_white` ( + `ip_id` int NOT NULL AUTO_INCREMENT, + `machine_name` varchar(128) NOT NULL DEFAULT '', + `machine_ip` varchar(128) NOT NULL DEFAULT '', + `access_count` bigint NOT NULL DEFAULT '0', + PRIMARY KEY (`ip_id`), + KEY `cve_ip_white_machine_ip` (`machine_ip`) +) ENGINE=InnoDB AUTO_INCREMENT=2 DEFAULT CHARSET=utf8; + +/*Table structure for table `cve_issue_hooks` */ + +DROP TABLE IF EXISTS `cve_issue_hooks`; + +CREATE TABLE `cve_issue_hooks` ( + `id` bigint NOT NULL AUTO_INCREMENT, + `cve_id` bigint NOT NULL DEFAULT '0', + `issue_id` bigint NOT NULL DEFAULT '0', + `issue_num` varchar(64) NOT NULL DEFAULT '', + `hook_id` bigint NOT NULL DEFAULT '0', + `owner` varchar(128) NOT NULL DEFAULT '', + `repo` varchar(128) NOT NULL DEFAULT '', + `hook_url` varchar(512) NOT NULL DEFAULT '', + `push_event` tinyint NOT NULL DEFAULT '1', + `tag_push_events` tinyint NOT NULL DEFAULT '1', + `issues_events` tinyint NOT NULL DEFAULT '1', + `note_events` tinyint NOT NULL DEFAULT '1', + `merge_requests_events` tinyint NOT NULL DEFAULT '1', + PRIMARY KEY (`id`), + KEY `cve_issue_hooks_issue_num` (`issue_num`), + KEY `cve_issue_hooks_Cve_id` (`cve_id`) +) ENGINE=InnoDB AUTO_INCREMENT=9 DEFAULT CHARSET=utf8; + +/*Table structure for table `cve_issue_template` */ + +DROP TABLE IF EXISTS `cve_issue_template`; + +CREATE TABLE `cve_issue_template` ( + `template_id` bigint NOT NULL AUTO_INCREMENT, + `cve_id` bigint NOT NULL DEFAULT '0', + `cve_num` varchar(256) NOT NULL DEFAULT '', + `owned_component` varchar(256) NOT NULL DEFAULT '', + `owned_version` varchar(256) NOT NULL DEFAULT '', + `nvd_score` decimal(10,1) NOT NULL DEFAULT '0.0', + `openeuler_score` decimal(10,1) NOT NULL DEFAULT '0.0', + `nvd_vector` varchar(256) NOT NULL DEFAULT '', + `openeuler_vector` varchar(256) NOT NULL DEFAULT '', + `cve_brief` varchar(4096) NOT NULL DEFAULT '', + `cve_analysis` varchar(4096) NOT NULL DEFAULT '', + `principle_analysis` varchar(4096) NOT NULL DEFAULT '', + `affected_version` varchar(256) NOT NULL DEFAULT '', + `solution` varchar(1024) NOT NULL DEFAULT '', + `issue_id` bigint NOT NULL DEFAULT '0', + `issue_num` varchar(64) NOT NULL DEFAULT '', + `issue_assignee` varchar(128) NOT NULL DEFAULT '', + `status` tinyint NOT NULL DEFAULT '0', + `status_name` varchar(128) DEFAULT NULL, + `issue_status` tinyint NOT NULL DEFAULT '0', + `issue_label` varchar(256) NOT NULL DEFAULT '', + `owner` varchar(128) NOT NULL DEFAULT '', + `repo` varchar(128) NOT NULL DEFAULT '', + `title` varchar(512) NOT NULL DEFAULT '', + `issue_type` varchar(64) NOT NULL DEFAULT '', + `collaborators` varchar(128) DEFAULT NULL, + `milestone` varchar(64) DEFAULT NULL, + `program` varchar(64) DEFAULT NULL, + `security_hole` tinyint NOT NULL DEFAULT '0', + `cve_level` varchar(32) DEFAULT NULL, + `comment_id` bigint DEFAULT NULL, + `create_time` datetime NOT NULL, + `update_time` datetime NOT NULL, + `delete_time` datetime NOT NULL, + PRIMARY KEY (`template_id`), + KEY `cve_issue_template_cve_id` (`cve_id`), + KEY `cve_issue_template_issue_num` (`issue_num`) +) ENGINE=InnoDB AUTO_INCREMENT=9 DEFAULT CHARSET=utf8; + +/*Table structure for table `cve_open_euler_s_a` */ + +DROP TABLE IF EXISTS `cve_open_euler_s_a`; + +CREATE TABLE `cve_open_euler_s_a` ( + `openeuler_id` bigint NOT NULL AUTO_INCREMENT, + `cve_id` bigint NOT NULL DEFAULT '0', + `public_date` varchar(16) DEFAULT NULL, + `openeuler_sa_num` varchar(128) NOT NULL DEFAULT '', + PRIMARY KEY (`openeuler_id`), + UNIQUE KEY `openeuler_sa_num` (`openeuler_sa_num`), + KEY `cve_open_euler_s_a_cve_id` (`cve_id`) +) ENGINE=InnoDB AUTO_INCREMENT=7 DEFAULT CHARSET=utf8; + +/*Table structure for table `cve_origin_upstream` */ + +DROP TABLE IF EXISTS `cve_origin_upstream`; + +CREATE TABLE `cve_origin_upstream` ( + `cve_id` bigint NOT NULL AUTO_INCREMENT, + `cve_un_ids` varchar(256) NOT NULL DEFAULT '', + `cve_num` varchar(256) NOT NULL DEFAULT '', + `update_type` varchar(32) NOT NULL DEFAULT '', + `cve_packname` varchar(512) DEFAULT NULL, + `git_packname` varchar(512) DEFAULT NULL, + `cve_title` varchar(1024) DEFAULT NULL, + `affect_porduct` varchar(512) DEFAULT NULL, + `cnnvd_id` varchar(256) DEFAULT NULL, + `cnvd_id` varchar(256) DEFAULT NULL, + `published_date` varchar(32) DEFAULT NULL, + `vul_status` varchar(64) DEFAULT NULL, + `cve_status` tinyint NOT NULL DEFAULT '0', + `version` varchar(64) NOT NULL, + `affected_scope` varchar(512) DEFAULT NULL, + `attack_link` varchar(512) DEFAULT NULL, + `is_exit` tinyint NOT NULL DEFAULT '1', + `create_time` varchar(32) NOT NULL DEFAULT '', + `update_time` varchar(32) DEFAULT NULL, + `delete_time` varchar(32) DEFAULT NULL, + PRIMARY KEY (`cve_id`), + UNIQUE KEY `cve_un_ids` (`cve_un_ids`), + KEY `cve_origin_upstream_cve_num` (`cve_num`), + KEY `cve_origin_upstream_cve_packname` (`cve_packname`), + KEY `cve_origin_upstream_git_packname` (`git_packname`), + KEY `cve_origin_upstream_version` (`version`) +) ENGINE=InnoDB AUTO_INCREMENT=5 DEFAULT CHARSET=utf8; + +/*Table structure for table `cve_origin_upstream_config` */ + +DROP TABLE IF EXISTS `cve_origin_upstream_config`; + +CREATE TABLE `cve_origin_upstream_config` ( + `conf_id` bigint NOT NULL AUTO_INCREMENT, + `cve_id` bigint NOT NULL DEFAULT '0', + `nodes` varchar(32) DEFAULT NULL, + PRIMARY KEY (`conf_id`), + KEY `cve_origin_upstream_config_cve_id` (`cve_id`) +) ENGINE=InnoDB AUTO_INCREMENT=5 DEFAULT CHARSET=utf8; + +/*Table structure for table `cve_origin_upstream_config_node` */ + +DROP TABLE IF EXISTS `cve_origin_upstream_config_node`; + +CREATE TABLE `cve_origin_upstream_config_node` ( + `node_id` bigint NOT NULL AUTO_INCREMENT, + `conf_id` bigint NOT NULL DEFAULT '0', + `operator` varchar(256) DEFAULT NULL, + PRIMARY KEY (`node_id`), + KEY `cve_origin_upstream_config_node_conf_id` (`conf_id`) +) ENGINE=InnoDB AUTO_INCREMENT=5 DEFAULT CHARSET=utf8; + +/*Table structure for table `cve_origin_upstream_config_node_cpe` */ + +DROP TABLE IF EXISTS `cve_origin_upstream_config_node_cpe`; + +CREATE TABLE `cve_origin_upstream_config_node_cpe` ( + `cpe_id` bigint NOT NULL AUTO_INCREMENT, + `node_id` bigint NOT NULL DEFAULT '0', + `cpe_uri` varchar(1024) DEFAULT NULL, + `cpe_match` varchar(1024) DEFAULT NULL, + `vulner_able` varchar(64) DEFAULT NULL, + PRIMARY KEY (`cpe_id`), + KEY `cve_origin_upstream_config_node_cpe_node_id` (`node_id`) +) ENGINE=InnoDB AUTO_INCREMENT=5 DEFAULT CHARSET=utf8; + +/*Table structure for table `cve_origin_upstream_desc` */ + +DROP TABLE IF EXISTS `cve_origin_upstream_desc`; + +CREATE TABLE `cve_origin_upstream_desc` ( + `desc_id` bigint NOT NULL AUTO_INCREMENT, + `cve_id` bigint NOT NULL DEFAULT '0', + `en_desc` text CHARACTER SET utf8 COLLATE utf8_general_ci, + `zh_desc` text CHARACTER SET utf8 COLLATE utf8_general_ci, + PRIMARY KEY (`desc_id`), + KEY `cve_origin_upstream_desc_cve_id` (`cve_id`) +) ENGINE=InnoDB AUTO_INCREMENT=5 DEFAULT CHARSET=utf8; + +/*Table structure for table `cve_origin_upstream_event` */ + +DROP TABLE IF EXISTS `cve_origin_upstream_event`; + +CREATE TABLE `cve_origin_upstream_event` ( + `event_id` bigint NOT NULL AUTO_INCREMENT, + `cve_id` bigint NOT NULL DEFAULT '0', + `title` varchar(512) DEFAULT NULL, + `date` varchar(32) DEFAULT NULL, + `url` varchar(512) DEFAULT NULL, + `description` text CHARACTER SET utf8 COLLATE utf8_general_ci, + PRIMARY KEY (`event_id`), + KEY `cve_origin_upstream_event_cve_id` (`cve_id`) +) ENGINE=InnoDB AUTO_INCREMENT=5 DEFAULT CHARSET=utf8; + +/*Table structure for table `cve_origin_upstream_fix_suggest` */ + +DROP TABLE IF EXISTS `cve_origin_upstream_fix_suggest`; + +CREATE TABLE `cve_origin_upstream_fix_suggest` ( + `fix_id` bigint NOT NULL AUTO_INCREMENT, + `cve_id` bigint NOT NULL DEFAULT '0', + `detail` varchar(1024) DEFAULT NULL, + PRIMARY KEY (`fix_id`), + KEY `cve_origin_upstream_fix_suggest_cve_id` (`cve_id`) +) ENGINE=InnoDB AUTO_INCREMENT=5 DEFAULT CHARSET=utf8; + +/*Table structure for table `cve_origin_upstream_fix_suggest_ref` */ + +DROP TABLE IF EXISTS `cve_origin_upstream_fix_suggest_ref`; + +CREATE TABLE `cve_origin_upstream_fix_suggest_ref` ( + `fix_ref_id` bigint NOT NULL AUTO_INCREMENT, + `fix_id` bigint NOT NULL DEFAULT '0', + `refsource` varchar(512) DEFAULT NULL, + `url` varchar(1024) DEFAULT NULL, + `name` varchar(1024) DEFAULT NULL, + PRIMARY KEY (`fix_ref_id`), + KEY `cve_origin_upstream_fix_suggest_ref_fix_id` (`fix_id`) +) ENGINE=InnoDB AUTO_INCREMENT=5 DEFAULT CHARSET=utf8; + +/*Table structure for table `cve_origin_upstream_fix_suggest_ref_tag` */ + +DROP TABLE IF EXISTS `cve_origin_upstream_fix_suggest_ref_tag`; + +CREATE TABLE `cve_origin_upstream_fix_suggest_ref_tag` ( + `tag_id` bigint NOT NULL AUTO_INCREMENT, + `fix_ref_id` bigint NOT NULL DEFAULT '0', + `name` varchar(512) DEFAULT NULL, + PRIMARY KEY (`tag_id`), + KEY `cve_origin_upstream_fix_suggest_ref_tag_fix_ref_id` (`fix_ref_id`) +) ENGINE=InnoDB AUTO_INCREMENT=13 DEFAULT CHARSET=utf8; + +/*Table structure for table `cve_origin_upstream_impact` */ + +DROP TABLE IF EXISTS `cve_origin_upstream_impact`; + +CREATE TABLE `cve_origin_upstream_impact` ( + `impact_id` bigint NOT NULL AUTO_INCREMENT, + `cve_id` bigint NOT NULL DEFAULT '0', + `impact` varchar(32) DEFAULT NULL, + PRIMARY KEY (`impact_id`), + KEY `cve_origin_upstream_impact_cve_id` (`cve_id`) +) ENGINE=InnoDB AUTO_INCREMENT=5 DEFAULT CHARSET=utf8; + +/*Table structure for table `cve_origin_upstream_impact_score` */ + +DROP TABLE IF EXISTS `cve_origin_upstream_impact_score`; + +CREATE TABLE `cve_origin_upstream_impact_score` ( + `score_id` bigint NOT NULL AUTO_INCREMENT, + `impact_id` bigint NOT NULL DEFAULT '0', + `base_met_v3` tinyint DEFAULT NULL, + `base_met_v2` tinyint DEFAULT NULL, + `cvss_v3` tinyint DEFAULT NULL, + `cvss_v2` tinyint DEFAULT NULL, + `score_status` tinyint DEFAULT '1', + PRIMARY KEY (`score_id`), + KEY `cve_origin_upstream_impact_score_impact_id` (`impact_id`) +) ENGINE=InnoDB AUTO_INCREMENT=9 DEFAULT CHARSET=utf8; + +/*Table structure for table `cve_origin_upstream_impact_score_v2` */ + +DROP TABLE IF EXISTS `cve_origin_upstream_impact_score_v2`; + +CREATE TABLE `cve_origin_upstream_impact_score_v2` ( + `v2_id` bigint NOT NULL AUTO_INCREMENT, + `score_id` bigint NOT NULL DEFAULT '0', + `acinsuf_info` varchar(64) DEFAULT NULL, + `base_score` decimal(10,1) DEFAULT NULL, + `vector_value` varchar(256) DEFAULT NULL, + `access_complexity` varchar(64) DEFAULT NULL, + `authentication` varchar(64) DEFAULT NULL, + `availability_impact` varchar(64) DEFAULT NULL, + `version` varchar(64) DEFAULT NULL, + `confidentiality_impact` varchar(64) DEFAULT NULL, + `integrity_impact` varchar(64) DEFAULT NULL, + `access_vector` varchar(64) DEFAULT NULL, + `user_interaction_required` varchar(64) DEFAULT NULL, + `severity` varchar(64) DEFAULT NULL, + `obtain_user_privilege` varchar(64) DEFAULT NULL, + `obtain_all_privilege` varchar(64) DEFAULT NULL, + `obtain_other_privilege` varchar(64) DEFAULT NULL, + `impact_score` decimal(10,1) DEFAULT NULL, + `exploitability_score` decimal(10,1) DEFAULT NULL, + `cve_level` varchar(32) DEFAULT NULL, + PRIMARY KEY (`v2_id`), + KEY `cve_origin_upstream_impact_score_v2_score_id` (`score_id`) +) ENGINE=InnoDB AUTO_INCREMENT=5 DEFAULT CHARSET=utf8; + +/*Table structure for table `cve_origin_upstream_impact_score_v3` */ + +DROP TABLE IF EXISTS `cve_origin_upstream_impact_score_v3`; + +CREATE TABLE `cve_origin_upstream_impact_score_v3` ( + `v3_id` bigint NOT NULL AUTO_INCREMENT, + `score_id` bigint NOT NULL DEFAULT '0', + `base_score` decimal(10,1) DEFAULT NULL, + `vector_value` varchar(256) DEFAULT NULL, + `attack_complexity` varchar(64) DEFAULT NULL, + `attack_vector` varchar(64) DEFAULT NULL, + `availability_impact` varchar(64) DEFAULT NULL, + `base_severity` varchar(64) DEFAULT NULL, + `user_interaction` varchar(64) DEFAULT NULL, + `privilege_required` varchar(64) DEFAULT NULL, + `version` varchar(64) DEFAULT NULL, + `confidentiality_impact` varchar(64) DEFAULT NULL, + `integrity_impact` varchar(64) DEFAULT NULL, + `scope` varchar(64) DEFAULT NULL, + `impact_score` decimal(10,1) DEFAULT NULL, + `exploitability_score` decimal(10,1) DEFAULT NULL, + `cve_level` varchar(32) DEFAULT NULL, + PRIMARY KEY (`v3_id`), + KEY `cve_origin_upstream_impact_score_v3_score_id` (`score_id`) +) ENGINE=InnoDB AUTO_INCREMENT=5 DEFAULT CHARSET=utf8; + +/*Table structure for table `cve_origin_upstream_poc` */ + +DROP TABLE IF EXISTS `cve_origin_upstream_poc`; + +CREATE TABLE `cve_origin_upstream_poc` ( + `poc_id` bigint NOT NULL AUTO_INCREMENT, + `cve_id` bigint NOT NULL DEFAULT '0', + `source` varchar(512) DEFAULT NULL, + `date` varchar(32) DEFAULT NULL, + `path` varchar(512) DEFAULT NULL, + `dbindex` varchar(512) DEFAULT NULL, + `url` varchar(512) DEFAULT NULL, + `desc` text CHARACTER SET utf8 COLLATE utf8_general_ci, + PRIMARY KEY (`poc_id`), + KEY `cve_origin_upstream_poc_cve_id` (`cve_id`) +) ENGINE=InnoDB AUTO_INCREMENT=5 DEFAULT CHARSET=utf8; + +/*Table structure for table `cve_origin_upstream_reference` */ + +DROP TABLE IF EXISTS `cve_origin_upstream_reference`; + +CREATE TABLE `cve_origin_upstream_reference` ( + `ref_id` bigint NOT NULL AUTO_INCREMENT, + `cve_id` bigint NOT NULL DEFAULT '0', + `name` varchar(512) DEFAULT NULL, + `refsource` varchar(512) DEFAULT NULL, + `url` varchar(512) DEFAULT NULL, + `tags` text CHARACTER SET utf8 COLLATE utf8_general_ci, + PRIMARY KEY (`ref_id`), + KEY `cve_origin_upstream_reference_cve_id` (`cve_id`) +) ENGINE=InnoDB AUTO_INCREMENT=37 DEFAULT CHARSET=utf8; + +/*Table structure for table `cve_origin_upstream_vul_type` */ + +DROP TABLE IF EXISTS `cve_origin_upstream_vul_type`; + +CREATE TABLE `cve_origin_upstream_vul_type` ( + `vul_id` bigint NOT NULL AUTO_INCREMENT, + `cve_id` bigint NOT NULL DEFAULT '0', + `cwe` varchar(256) DEFAULT NULL, + `en_desc` text CHARACTER SET utf8 COLLATE utf8_general_ci, + `zh_desc` text CHARACTER SET utf8 COLLATE utf8_general_ci, + PRIMARY KEY (`vul_id`), + KEY `cve_origin_upstream_vul_type_cve_id` (`cve_id`) +) ENGINE=InnoDB AUTO_INCREMENT=5 DEFAULT CHARSET=utf8; + +/*Table structure for table `cve_other_user` */ + +DROP TABLE IF EXISTS `cve_other_user`; + +CREATE TABLE `cve_other_user` ( + `user_id` int NOT NULL AUTO_INCREMENT, + `user_name` varchar(64) NOT NULL DEFAULT '', + `pass_word` varchar(256) NOT NULL DEFAULT '', + `aes_key` varchar(512) NOT NULL DEFAULT '', + `expiration_time` varchar(32) CHARACTER SET utf8 COLLATE utf8_general_ci NOT NULL DEFAULT '', + `create_time` datetime NOT NULL DEFAULT CURRENT_TIMESTAMP, + `update_time` datetime NOT NULL DEFAULT CURRENT_TIMESTAMP ON UPDATE CURRENT_TIMESTAMP, + `delete_time` datetime DEFAULT NULL, + PRIMARY KEY (`user_id`) +) ENGINE=InnoDB AUTO_INCREMENT=2 DEFAULT CHARSET=utf8; + +/*Table structure for table `cve_package` */ + +DROP TABLE IF EXISTS `cve_package`; + +CREATE TABLE `cve_package` ( + `id` bigint NOT NULL AUTO_INCREMENT, + `sec_id` bigint NOT NULL DEFAULT '0', + `pack_name` varchar(1024) DEFAULT NULL, + `pack_url` varchar(2048) DEFAULT NULL, + PRIMARY KEY (`id`), + KEY `cve_package_sec_id` (`sec_id`) +) ENGINE=InnoDB DEFAULT CHARSET=utf8; + +/*Table structure for table `cve_score` */ + +DROP TABLE IF EXISTS `cve_score`; + +CREATE TABLE `cve_score` ( + `id` bigint NOT NULL AUTO_INCREMENT, + `cve_id` bigint NOT NULL DEFAULT '0', + `cve_num` varchar(256) NOT NULL DEFAULT '', + `nvd_score` decimal(10,1) NOT NULL DEFAULT '0.0', + `openeuler_score` decimal(10,1) NOT NULL DEFAULT '0.0', + `n_vector_value` varchar(256) NOT NULL DEFAULT '', + `o_vector_value` varchar(256) NOT NULL DEFAULT '', + `n_attack_vector` varchar(64) NOT NULL DEFAULT '', + `o_attack_vector` varchar(64) NOT NULL DEFAULT '', + `n_attack_complexity` varchar(64) NOT NULL DEFAULT '', + `o_attack_complexity` varchar(64) NOT NULL DEFAULT '', + `n_privilege_required` varchar(64) NOT NULL DEFAULT '', + `o_privilege_required` varchar(64) NOT NULL DEFAULT '', + `n_user_interaction` varchar(64) NOT NULL DEFAULT '', + `o_user_interaction` varchar(64) NOT NULL DEFAULT '', + `n_scope` varchar(64) NOT NULL DEFAULT '', + `o_scope` varchar(64) NOT NULL DEFAULT '', + `n_confidentiality` varchar(64) NOT NULL DEFAULT '', + `o_confidentiality` varchar(64) NOT NULL DEFAULT '', + `n_integrity` varchar(64) NOT NULL DEFAULT '', + `o_integrity` varchar(64) NOT NULL DEFAULT '', + `n_availability` varchar(64) NOT NULL DEFAULT '', + `o_availability` varchar(64) NOT NULL DEFAULT '', + `score_type` varchar(16) NOT NULL DEFAULT '', + `openeuler_id` bigint DEFAULT NULL, + `n_score_status` tinyint NOT NULL DEFAULT '0', + `o_score_status` tinyint NOT NULL DEFAULT '0', + `create_time` datetime NOT NULL DEFAULT CURRENT_TIMESTAMP, + `update_time` datetime NOT NULL DEFAULT CURRENT_TIMESTAMP ON UPDATE CURRENT_TIMESTAMP, + `delete_time` datetime NOT NULL, + PRIMARY KEY (`id`), + UNIQUE KEY `openeuler_id` (`openeuler_id`), + KEY `cve_score_cve_id` (`cve_id`) +) ENGINE=InnoDB AUTO_INCREMENT=7 DEFAULT CHARSET=utf8; + +/*Table structure for table `cve_score_record` */ + +DROP TABLE IF EXISTS `cve_score_record`; + +CREATE TABLE `cve_score_record` ( + `id` bigint NOT NULL AUTO_INCREMENT, + `cve_id` bigint NOT NULL DEFAULT '0', + `nvd_score` decimal(10,1) NOT NULL DEFAULT '0.0', + `n_vector_value` varchar(256) NOT NULL DEFAULT '', + `status` tinyint NOT NULL DEFAULT '0', + `create_time` datetime NOT NULL DEFAULT CURRENT_TIMESTAMP, + PRIMARY KEY (`id`), + KEY `cve_score_record_cve_id` (`cve_id`) +) ENGINE=InnoDB AUTO_INCREMENT=7 DEFAULT CHARSET=utf8; + +/*Table structure for table `cve_security_notice` */ + +DROP TABLE IF EXISTS `cve_security_notice`; + +CREATE TABLE `cve_security_notice` ( + `sec_id` bigint NOT NULL AUTO_INCREMENT, + `cve_id` bigint NOT NULL DEFAULT '0', + `cve_num` varchar(256) NOT NULL DEFAULT '', + `openeuler_id` bigint DEFAULT NULL, + `introduction` varchar(256) DEFAULT NULL, + `summary` varchar(256) DEFAULT NULL, + `theme` varchar(2048) DEFAULT NULL, + `description` text CHARACTER SET utf8 COLLATE utf8_general_ci NOT NULL, + `influence_component` varchar(256) DEFAULT NULL, + `affect_product` varchar(256) DEFAULT NULL, + `reference_link` varchar(1024) DEFAULT NULL, + `sec_status` tinyint NOT NULL DEFAULT '0', + `affect_status` varchar(16) DEFAULT NULL, + `create_time` datetime NOT NULL DEFAULT CURRENT_TIMESTAMP, + `update_time` datetime NOT NULL DEFAULT CURRENT_TIMESTAMP ON UPDATE CURRENT_TIMESTAMP, + `delete_time` datetime NOT NULL, + PRIMARY KEY (`sec_id`), + UNIQUE KEY `openeuler_id` (`openeuler_id`), + KEY `cve_security_notice_cve_id` (`cve_id`) +) ENGINE=InnoDB AUTO_INCREMENT=7 DEFAULT CHARSET=utf8; + +/*Table structure for table `cve_security_reviewer` */ + +DROP TABLE IF EXISTS `cve_security_reviewer`; + +CREATE TABLE `cve_security_reviewer` ( + `id` bigint NOT NULL AUTO_INCREMENT, + `name_space` varchar(255) NOT NULL DEFAULT '', + PRIMARY KEY (`id`), + UNIQUE KEY `name_space` (`name_space`) +) ENGINE=InnoDB AUTO_INCREMENT=5 DEFAULT CHARSET=utf8; + +/*Table structure for table `cve_vuln_center` */ + +DROP TABLE IF EXISTS `cve_vuln_center`; + +CREATE TABLE `cve_vuln_center` ( + `cve_id` bigint NOT NULL AUTO_INCREMENT, + `cve_num` varchar(256) NOT NULL DEFAULT '', + `cve_level` varchar(32) DEFAULT NULL, + `cve_desc` varchar(8192) NOT NULL DEFAULT '', + `cve_status` tinyint NOT NULL DEFAULT '0', + `cve_version` varchar(128) NOT NULL DEFAULT '', + `repair_time` varchar(32) NOT NULL DEFAULT '', + `pack_name` varchar(1024) NOT NULL DEFAULT '', + `cve_url` varchar(2048) NOT NULL DEFAULT '', + `create_time` datetime NOT NULL DEFAULT CURRENT_TIMESTAMP, + `update_time` datetime NOT NULL DEFAULT CURRENT_TIMESTAMP ON UPDATE CURRENT_TIMESTAMP, + `delete_time` datetime NOT NULL, + PRIMARY KEY (`cve_id`), + UNIQUE KEY `cve_num` (`cve_num`) +) ENGINE=InnoDB AUTO_INCREMENT=8 DEFAULT CHARSET=utf8; + +/*!40101 SET SQL_MODE=@OLD_SQL_MODE */; +/*!40014 SET FOREIGN_KEY_CHECKS=@OLD_FOREIGN_KEY_CHECKS */; +/*!40014 SET UNIQUE_CHECKS=@OLD_UNIQUE_CHECKS */; +/*!40111 SET SQL_NOTES=@OLD_SQL_NOTES */; diff --git a/models/initdb.go b/models/initdb.go index 8939542de3832c02ccd50264b3731b32ebffa83b..06d3737a2aff42112b37dc2d21f65782c6e56df3 100644 --- a/models/initdb.go +++ b/models/initdb.go @@ -8,7 +8,6 @@ import ( "github.com/astaxie/beego/logs" "github.com/astaxie/beego/orm" _ "github.com/go-sql-driver/mysql" - "os" ) func Initdb() { @@ -22,7 +21,8 @@ func Initdb() { dbport := BConfig.String("mysql::dbport") dbuser := BConfig.String("mysql::dbuser") dbname := BConfig.String("mysql::dbname") - dbpwd := os.Getenv("dbpwd") + dbpwd := BConfig.String("mysql::dbpwd") + //dbpwd := os.Getenv("dbpwd") key := beego.AppConfig.String("key") key1 := []byte(key) bytes, _ := common.DePwdCode(dbpwd, key1) @@ -65,7 +65,8 @@ func ConnDb() (*sql.DB, error){ dbport := BConfig.String("mysql::dbport") dbuser := BConfig.String("mysql::dbuser") dbname := BConfig.String("mysql::dbname") - dbpwd := os.Getenv("dbpwd") + dbpwd := BConfig.String("mysql::dbpwd") + //dbpwd := os.Getenv("dbpwd") key := beego.AppConfig.String("key") key1 := []byte(key) bytes, _ := common.DePwdCode(dbpwd, key1) diff --git a/models/ymal.go b/models/ymal.go index c4411315c9323ae1c8b761be0e40d7e66e836724..7999746abb5cd6fc36f058e55b96d146a81cc5d5 100644 --- a/models/ymal.go +++ b/models/ymal.go @@ -126,7 +126,7 @@ func CreateYamlDetail(gp *GitPackageInfo, ge GitOpenEuler) (id int64, typex stri // 更新 gp.DetailId = localgp.DetailId if _, err := o.Update(gp); err == nil { - logs.Info("update cve_git_package_info success, DetailId: ", DetailId, ",packName: ", gp.PackageName) + logs.Info("update cve_git_package_info success, DetailId: ", gp.DetailId, ",packName: ", gp.PackageName) } else { logs.Error("update cve_git_package_info failed, ", "packName: ", gp.PackageName, ",err: ", err) return gp.DetailId, "update", err diff --git a/task/issuetask.go b/task/issuetask.go index 99ba761f042a50401d9db292283e3f75826c74b0..9f78c8a5e38cc8576e04b75d1870867cf1cb19f7 100644 --- a/task/issuetask.go +++ b/task/issuetask.go @@ -86,7 +86,7 @@ func CreateIssue() error{ logs.Info("无cve数据可以使用, 当前时间: ", common.GetCurTime()) return err } - accessToken := os.Getenv("issueaccesstoken") + accessToken := os.Getenv("GITEE_TOKEN") if accessToken == "" || len(accessToken) < 1 { logs.Error("issue token 获取失败, 当前时间: ", common.GetCurTime()) return err diff --git a/taskhandler/assist.go b/taskhandler/assist.go index 6afdc08a1780267035b499d7aa32beb997b1f668..b5c187de86f7a1cc871f228abc59af2af345e344 100644 --- a/taskhandler/assist.go +++ b/taskhandler/assist.go @@ -37,7 +37,7 @@ func GetOautToken(gt GiteeToken) { return } GitToken := respDict["access_token"].(string) - os.Setenv("issueaccesstoken", GitToken) + os.Setenv("GITEE_TOKEN", GitToken) } diff --git a/taskhandler/createissue.go b/taskhandler/createissue.go index 0f1cf424ec52638ce851e39984ab4993997e476b..fe49426b3e1f6e26e708d366e97bae90af5ed324 100644 --- a/taskhandler/createissue.go +++ b/taskhandler/createissue.go @@ -9,7 +9,6 @@ import ( "fmt" "github.com/astaxie/beego/config" "github.com/astaxie/beego/logs" - "os" "strconv" ) @@ -243,7 +242,8 @@ func CreateDepositHooks(accessToken string, owner string, path string, logs.Error("config init error:", err) return err } - pwd := os.Getenv("hookpwd") + //pwd := os.Getenv("hookpwd") + pwd := BConfig.String("hook::hookpwd") hookurl := BConfig.String("hook::hookurl") push_events := "true" tag_push_events := "true"