= patch_tuesday
Demo standalone Lua program by `gopher-lua+LadyLua`
== Building
----
go build
----
== Example Output
----
$ ./patch_tuesday 2021-apr
April 2021 Security Updates
[+] Found 147 vulnerabilities
Elevation of Privilege 19
Security Feature Bypass 5
Remote Code Execution 56
Information Disclosure 17
Denial of Service 9
Spoofing 2
[+] Found 5 exploited
CVE-2021-28310 Win32k Elevation of Privilege Vulnerability
----
== Note
The upstream gopher-lua is replaced for the meantime until some fixes are merged.
== Sample code (main.go)
----
package main
import (
"embed"
"os"
"github.com/tongson/LadyLua"
"github.com/yuin/gopher-lua"
)
//go:embed main/*
var mainSrc embed.FS
//go:embed src/*
var luaSrc embed.FS
func main() {
L := lua.NewState()
defer L.Close()
// See for available modules -> https://github.com/tongson/LadyLua#modules
// Also:
// https://github.com/tongson/LadyLua/blob/main/docs/go-loader.adoc
// https://github.com/tongson/LadyLua/blob/main/docs/go-helper.adoc
// Load `http` and `json` modules
ll.PreloadGo(L, "http")
ll.PreloadGo(L, "json")
ll.LoadGlobalGo(L, "extend")
// Allow loading(require) Lua code from LadyLua; found in `LadyLua/internal/lua`
ll.Preload(L)
// Load Lua source from `src`; for `require("cvrf")`
// Usually modules specific to a project or program
// Depends on the go:embed directive, any directory or filename works
ll.PreloadModule(L, "cvrf", ll.ReadFile(luaSrc, "src/cvrf.lua"))
// Capture command line arguments
ll.FillArg(L, os.Args)
// Load Lua source from `main`; the entrypoint Lua code or so-called main()
// Depends on the go:embed directive, any directory or filename works
ll.Main(L, ll.ReadFile(mainSrc, "main/main.lua"))
// If all goes well; Lua code can call `os.exit` to override exit code
os.Exit(0)
}
----