mybatis: # 配置mapper的扫描,找到所有的mapper.xml映射文件 mapperLocations: classpath*:mapper/**/*Mapper.xml # 加载全局的配置文件 configLocation: classpath:mybatis/mybatis-config.xml logging: pattern: file: "%d{yyyy-MM-dd HH:mm:ss.SSS} [%thread] %-5level %logger{50} - %msg%n" console: "%d{yyyy-MM-dd HH:mm:ss.SSS} [%thread] %-5level %logger{50} - %msg%n" file: # 默认日志路径 path: ./fuzzintegrationlog/log level: root: info org.springframework.data.mongodb.core: debug com.ice.Application: info logback: rollingPolicy: max-file-size: 10MB aflnet: seedPath: "/usr/fuzzenv/fuzzenv/aflnet/tutorials/live555/in-rtsp"#aflnet日志 outputPath: "/home/" #D:/code/companyProjects/files/ aflnetPath: "/usr/fuzzenv/fuzzenv/"#alfnet路径 kitty: logOutPath: "/home/kittylogs/"#kitty协议模板日志生成路径 path: "/usr/fuzzenv/fuzzenv/fuzz50/kitty/renix/" #kitty项目下的各协议生成模板python文件路径 venvPath: "/usr/fuzzenv/fuzzenv/fuzz50/kitty/venv/bin/python" methodPath: "/usr/fuzzenv/fuzzenv/fuzz50/kitty/2020test/"#kitty下变异方法路径 vulnerabilityTypePath: "/usr/fuzzenv/fuzzenv/fuzz50/kitty/2020test/"#kitty下漏洞类型python路径 mutationPath: "/usr/fuzzenv/fuzzenv/fuzz50/kitty/2020test/" templateInfoHttp: "http://127.0.0.1:26001/api/template_info.json"#模板信息请求链接 statsHttp: "http://127.0.0.1:26001/api/stats.json"#运行时数据 stagesHttp: "http://127.0.0.1:26001/api/stages.json"# reportHttp: "http://127.0.0.1:26001/api/report"# spring: cloud: nacos: discovery: server-addr: http://${nacos-docker.ip}:8848 datasource: url: jdbc:mysql://${mysql-docker.ip}:${mysql-docker.port}/fuzz?allowPublicKeyRetrieval=true&useSSL=falseuseUnicode=true&characterEncoding=utf8&zeroDateTimeBehavior=convertToNull&useSSL=true&serverTimezone=GMT%2B8 username: root password: 123456 driver-class-name: com.mysql.cj.jdbc.Driver integrationpath: webSocketUri: ws://${fuzzmaster-docker.ip}:8101/websocket/testResult/ nacos-docker: ip: 192.168.50.251 fuzzmaster-docker: ip: 192.168.50.251 mysql-docker: ip: 192.168.50.251 port: 3307