Skip to content
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: nats-io/nats-top
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: v0.5.2
Choose a base ref
...
head repository: nats-io/nats-top
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: v0.5.3
Choose a head ref
  • 4 commits
  • 6 files changed
  • 4 contributors

Commits on May 25, 2022

  1. #69 new flag --display-subscriptions-column (#70)

    * chore (.gitignore): ignore .vscode folder and any *.code-workspace files
    
    * feat (--version): add support for printing version via the --version flag
    
    * feat (--display-subscriptions-column): new flag
    
    * feat (version): bump to 0.5.3 (old was: 0.5.2)
    
    * fix (csv output): when emitting csv output via '-o' the subs will be printed separated by whitespace chars instead of ',' because the ',' is frequently reserved to separate entire csv-columns in the resulting output
    
    * fix (nats-top.go): fix a bug which was causing the SUBSCRIPTIONS column to not be delimiter-separator when the --display-subscriptions-column flag would be used in conjunction with -o
    
    Co-authored-by: Kyriakos Sidiropoulos <kyriakos.sidiropoulos@laerdal.com>
    dsidirop and ksidirop-laerdal authored May 25, 2022
    Configuration menu
    Copy the full SHA
    94feb2b View commit details
    Browse the repository at this point in the history

Commits on May 26, 2022

  1. #69 new flag display subscriptions column - addendum for README.md (#71)

    * feat (display-subscriptions-column): add the '-u' shorthand for the long option '--display-subscriptions-column' and updated the README.md file accordingly to mention these new options
    
    Co-authored-by: Kyriakos Sidiropoulos <kyriakos.sidiropoulos@laerdal.com>
    dsidirop and ksidirop-laerdal authored May 26, 2022
    Configuration menu
    Copy the full SHA
    2fce567 View commit details
    Browse the repository at this point in the history

Commits on Aug 16, 2022

  1. Update dependencies.md

    Signed-off-by: Waldemar Quevedo <wally@nats.io>
    wallyqs committed Aug 16, 2022
    Configuration menu
    Copy the full SHA
    3e91644 View commit details
    Browse the repository at this point in the history

Commits on Oct 3, 2022

  1. fix: Upgrade packages to latest version (#75)

    By checking the code there were some security vulnerabities present in
    the net-tools binary such has:
    
    usr/local/bin/nats-top (gobinary)
    
    Total: 3 (UNKNOWN: 1, LOW: 0, MEDIUM: 1, HIGH: 1, CRITICAL: 0)
    
    ┌─────────────────────┬─────────────────────┬──────────┬────────────────────────────────────┬───────────────────────────────────┬────────────────────────────────────────────────────────────┐
    │       Library       │    Vulnerability    │ Severity │         Installed Version          │           Fixed Version           │                           Title                            │
    ├─────────────────────┼─────────────────────┼──────────┼────────────────────────────────────┼───────────────────────────────────┼────────────────────────────────────────────────────────────┤
    │ golang.org/x/crypto │ CVE-2022-27191      │ HIGH     │ v0.0.0-20220112180741-5e0467b6c7ce │ 0.0.0-20220314234659-1baeb1ce4c0b │ golang: crash in a golang.org/x/crypto/ssh server          │
    │                     │                     │          │                                    │                                   │ https://avd.aquasec.com/nvd/cve-2022-27191                 │
    │                     ├─────────────────────┼──────────┤                                    │                                   ├────────────────────────────────────────────────────────────┤
    │                     │ GHSA-8c26-wmh5-6g9v │ UNKNOWN  │                                    │                                   │ Attackers can cause a crash in SSH servers when the server │
    │                     │                     │          │                                    │                                   │ has...                                                     │
    │                     │                     │          │                                    │                                   │ GHSA-8c26-wmh5-6g9v          │
    ├─────────────────────┼─────────────────────┼──────────┼────────────────────────────────────┼───────────────────────────────────┼────────────────────────────────────────────────────────────┤
    │ golang.org/x/sys    │ CVE-2022-29526      │ MEDIUM   │ v0.0.0-20220111092808-5a964db01320 │ 0.0.0-20220412211240-33da011f77ad │ golang: syscall: faccessat checks wrong group              │
    │                     │                     │          │                                    │                                   │ https://avd.aquasec.com/nvd/cve-2022-29526                 │
    └─────────────────────┴─────────────────────┴──────────┴────────────────────────────────────┴───────────────────────────────────┴────────────────────────────────────────────────────────────┘
    
    These results come from Trivy from the nats-box image. Upgrading the
    packages fixed inner dependencies and these crypto and sys packages were
    upgraded to the latest version.
    danielcibrao-form3 authored Oct 3, 2022
    Configuration menu
    Copy the full SHA
    f48bc85 View commit details
    Browse the repository at this point in the history
Loading