commit | 7cdee1a7964a085416190d1c7e785405077cd7da | [log] [tgz] |
---|---|---|
author | Jonathan Amsterdam <jba@google.com> | Fri Dec 03 16:36:09 2021 -0500 |
committer | Jonathan Amsterdam <jba@google.com> | Mon Dec 06 11:46:48 2021 +0000 |
tree | 06995f2225beafebf718a03f991c4cc74b5c5828 | |
parent | f553aa4445846cef9869d51edc1da637ea30bb77 [diff] |
{cmd,internal}/worker: create issues internal/worker: add worker.CreateIssues, which creates issues for CVE records that need them. cmd/worker: add a create-issues command. Also a command to list CVE records. For now, you must provide flags with the repo to file issues in as well as a GitHub access token, so it's hard to accidentally create issues in the wrong repo. Change-Id: I11e70a0900eba6e7f687812bf54054015926b7e6 Reviewed-on: https://go-review.googlesource.com/c/vuln/+/368860 Trust: Jonathan Amsterdam <jba@google.com> Run-TryBot: Jonathan Amsterdam <jba@google.com> Reviewed-by: Julie Qiu <julie@golang.org>
This repository contains code for hosting the Go Vulnerability Database. The actual reports can be found at x/vulndb.
Neither the code, nor the data, nor the existence of this repository is to be considered stable. See the Draft Design for details on this project.
The Go vulnerability database is rooted at https://storage.googleapis.com/go-vulndb
and provides data as JSON. We recommend using client.Client to read data from the Go vulnerability database.
Do not rely on the contents of the x/vulndb repository. The YAML files in that repository are maintained using an internal format that is subject to change without warning.
The endpoints the table below are supported. For each path:
https://storage.googleapis.com/go-vulndb
).GO-2021-1234
)Path | Description |
---|---|
$base/index.json | List of module paths in the database mapped to its last modified timestamp (link). |
$base/$module.json | List of vulnerability entries for that module (example). |
$base/ID/index.json | List of all the vulnerability entries in the database |
$base/ID/$vuln.json | An individual Go vulnerability report |
Note that these paths and format are provisional and likely to change until an approved proposal.
Some of these packages can probably be coalesced, but for now are easier to work on in a more segmented fashion.
osv
provides a package for generating OSV-style JSON vulnerability entries from a report.Report
client
contains a client for accessing HTTP/fs based vulnerability databases, as well as a minimal caching implementationcmd/dbdiff
provides a tool for comparing two different versions of the vulnerability databasecmd/gendb
provides a tool for converting YAML reports into JSON databasecmd/linter
provides a tool for linting individual reportscmd/report2cve
provides a tool for converting YAML reports into JSON CVEsUnless otherwise noted, the Go source files are distributed under the BSD-style license found in the LICENSE file.
Database entries available at https://storage.googleapis.com/go-vulndb/ are distributed under the terms of the CC-BY 4.0 license.