modulepackage
0.0.0-20210714042554-680caab02d88
Repository: https://github.com/tongson/patch_tuesday.git
Documentation: pkg.go.dev
# README
= patch_tuesday
Demo standalone Lua program by gopher-lua+LadyLua
== Building
go build
== Example Output
$ ./patch_tuesday 2021-apr April 2021 Security Updates [+] Found 147 vulnerabilities Elevation of Privilege 19 Security Feature Bypass 5 Remote Code Execution 56 Information Disclosure 17 Denial of Service 9 Spoofing 2 [+] Found 5 exploited CVE-2021-28310 Win32k Elevation of Privilege Vulnerability
== Note The upstream gopher-lua is replaced for the meantime until some fixes are merged.
== Sample code (main.go)
package main
import ( "embed" "os"
"github.com/tongson/LadyLua"
"github.com/yuin/gopher-lua"
)
//go:embed main/* var mainSrc embed.FS
//go:embed src/* var luaSrc embed.FS
func main() { L := lua.NewState() defer L.Close()
// See for available modules -> https://github.com/tongson/LadyLua#modules
// Also:
// https://github.com/tongson/LadyLua/blob/main/docs/go-loader.adoc
// https://github.com/tongson/LadyLua/blob/main/docs/go-helper.adoc
// Load `http` and `json` modules
ll.PreloadGo(L, "http")
ll.PreloadGo(L, "json")
ll.LoadGlobalGo(L, "extend")
// Allow loading(require) Lua code from LadyLua; found in `LadyLua/internal/lua`
ll.Preload(L)
// Load Lua source from `src`; for `require("cvrf")`
// Usually modules specific to a project or program
// Depends on the go:embed directive, any directory or filename works
ll.PreloadModule(L, "cvrf", ll.ReadFile(luaSrc, "src/cvrf.lua"))
// Capture command line arguments
ll.FillArg(L, os.Args)
// Load Lua source from `main`; the entrypoint Lua code or so-called main()
// Depends on the go:embed directive, any directory or filename works
ll.Main(L, ll.ReadFile(mainSrc, "main/main.lua"))
// If all goes well; Lua code can call `os.exit` to override exit code
os.Exit(0)