ag is a tool for defining an alias for a group of commands

AG

GO Version TAG

Introduction

ag is a command line tool that similar to Makefile. with ag you can make an alias for group of commands with custom flags.

This tool is developed with golang.

Installation

You can download the latest version on the Release page, after download you must move the binary file to /usr/local/bin/ag .

Docker

In <your_config_path> you must create a .ag.yaml file

docker pull mostafahosseinime/ag
docker run -v <your_config_path>:/root -it mostafahosseinime/ag:latest <your_command>

Build from source

go build .
mv ag /usr/local/bin/ag

Config

for the first step you have to create a config file, In the file below I have created an example of a config, you can create a file with your custom config.

- name: glcp
  description: with this command you can create a goland project
  flags:
    - name: pn
      description: project name
      optional: false
      default: project 1
    - name: pt
      description: location
      optional: true
      default: "/Users/mostafahosseini/go/src/"
  cmds:
    - cd ${pt}
    - mkdir ${pn}
    - cd ${pn}
    - git init
    - touch main.go
    - git add .
    - goland .

after create the config file you must run the following command:

   $ ag init your_config.yaml

Run

after run init command with that config you can create a new golang project and finaly open in goland with this command:

   $ ag glcp --pn=example_project --pt=/users/mostafahosseini/go/src/example_project

also, I created an example file in this repository.

Owner
Mostafa Hosseini
💻 Write the code, 🌎 Change the world.
Mostafa Hosseini
Comments
  • [Snyk] Security upgrade golang from 1.17.3-buster to 1.17.13-buster

    [Snyk] Security upgrade golang from 1.17.3-buster to 1.17.13-buster

    This PR was automatically created by Snyk using the credentials of a real user.


    Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

    Changes included in this PR

    • Dockerfile

    We recommend upgrading to golang:1.17.13-buster, as this image has only 205 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

    Some of the most important vulnerabilities in your base image include:

    | Severity | Priority Score / 1000 | Issue | Exploit Maturity | | :------: | :-------------------- | :---- | :--------------- | | critical severity | 714 | Directory Traversal
    SNYK-DEBIAN10-DPKG-2847944 | No Known Exploit | | high severity | 614 | Loop with Unreachable Exit Condition ('Infinite Loop')
    SNYK-DEBIAN10-OPENSSL-2426310 | No Known Exploit | | critical severity | 714 | OS Command Injection
    SNYK-DEBIAN10-OPENSSL-2807585 | No Known Exploit | | critical severity | 714 | OS Command Injection
    SNYK-DEBIAN10-OPENSSL-2933515 | No Known Exploit | | high severity | 614 | Use After Free
    SNYK-DEBIAN10-SUBVERSION-2635642 | No Known Exploit |


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings


    Learn how to fix vulnerabilities with free interactive lessons:

    🦉 Learn about vulnerability in an interactive lesson of Snyk Learn.

  • [Snyk] Security upgrade golang from 1.17.3-buster to 1.17-buster

    [Snyk] Security upgrade golang from 1.17.3-buster to 1.17-buster

    Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

    Changes included in this PR

    • Dockerfile

    We recommend upgrading to golang:1.17-buster, as this image has only 202 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

    Some of the most important vulnerabilities in your base image include:

    | Severity | Priority Score / 1000 | Issue | Exploit Maturity | | :------: | :-------------------- | :---- | :--------------- | | critical severity | 714 | Directory Traversal
    SNYK-DEBIAN10-DPKG-2847944 | No Known Exploit | | high severity | 614 | Loop with Unreachable Exit Condition ('Infinite Loop')
    SNYK-DEBIAN10-OPENSSL-2426310 | No Known Exploit | | critical severity | 714 | OS Command Injection
    SNYK-DEBIAN10-OPENSSL-2807585 | No Known Exploit | | critical severity | 714 | OS Command Injection
    SNYK-DEBIAN10-OPENSSL-2933515 | No Known Exploit | | high severity | 614 | Use After Free
    SNYK-DEBIAN10-SUBVERSION-2635642 | No Known Exploit |


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings


    Learn how to fix vulnerabilities with free interactive lessons:

    🦉 Learn about vulnerability in an interactive lesson of Snyk Learn.

  • [Snyk] Security upgrade golang from 1.17.3-buster to 1.17.10-buster

    [Snyk] Security upgrade golang from 1.17.3-buster to 1.17.10-buster

    Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

    Changes included in this PR

    • Dockerfile

    We recommend upgrading to golang:1.17.10-buster, as this image has only 200 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

    Some of the most important vulnerabilities in your base image include:

    | Severity | Priority Score / 1000 | Issue | Exploit Maturity | | :------: | :-------------------- | :---- | :--------------- | | critical severity | 714 | Directory Traversal
    SNYK-DEBIAN10-DPKG-2847944 | No Known Exploit | | medium severity | 514 | CVE-2021-4160
    SNYK-DEBIAN10-OPENSSL-2388381 | No Known Exploit | | high severity | 678 | Loop with Unreachable Exit Condition ('Infinite Loop')
    SNYK-DEBIAN10-OPENSSL-2426310 | No Known Exploit | | critical severity | 714 | OS Command Injection
    SNYK-DEBIAN10-OPENSSL-2807585 | No Known Exploit | | high severity | 614 | Use After Free
    SNYK-DEBIAN10-SUBVERSION-2635642 | No Known Exploit |


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings


    Learn how to fix vulnerabilities with free interactive lessons:

    🦉 Learn about vulnerability in an interactive lesson of Snyk Learn.

  • [Snyk] Security upgrade golang from 1.17.3-buster to 1.18.2-buster

    [Snyk] Security upgrade golang from 1.17.3-buster to 1.18.2-buster

    Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

    Changes included in this PR

    • Dockerfile

    We recommend upgrading to golang:1.18.2-buster, as this image has only 199 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

    Some of the most important vulnerabilities in your base image include:

    | Severity | Priority Score / 1000 | Issue | Exploit Maturity | | :------: | :-------------------- | :---- | :--------------- | | high severity | 678 | Loop with Unreachable Exit Condition ('Infinite Loop')
    SNYK-DEBIAN10-OPENSSL-2426310 | No Known Exploit | | critical severity | 778 | OS Command Injection
    SNYK-DEBIAN10-OPENSSL-2807585 | No Known Exploit | | critical severity | 778 | OS Command Injection
    SNYK-DEBIAN10-OPENSSL-2807585 | No Known Exploit | | high severity | 614 | Use After Free
    SNYK-DEBIAN10-SUBVERSION-2635642 | No Known Exploit | | medium severity | 514 | Incorrect Authorization
    SNYK-DEBIAN10-SUBVERSION-2635650 | No Known Exploit |


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings


    Learn how to fix vulnerabilities with free interactive lessons:

    🦉 Learn about vulnerability in an interactive lesson of Snyk Learn.

  • [Snyk] Security upgrade golang from 1.17.3-buster to 1.17.10-buster

    [Snyk] Security upgrade golang from 1.17.3-buster to 1.17.10-buster

    This PR was automatically created by Snyk using the credentials of a real user.


    Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

    Changes included in this PR

    • Dockerfile

    We recommend upgrading to golang:1.17.10-buster, as this image has only 201 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

    Some of the most important vulnerabilities in your base image include:

    | Severity | Priority Score / 1000 | Issue | Exploit Maturity | | :------: | :-------------------- | :---- | :--------------- | | critical severity | 571 | SQL Injection
    SNYK-DEBIAN10-OPENLDAP-2808412 | No Known Exploit | | high severity | 614 | Loop with Unreachable Exit Condition ('Infinite Loop')
    SNYK-DEBIAN10-OPENSSL-2426310 | No Known Exploit | | critical severity | 786 | OS Command Injection
    SNYK-DEBIAN10-OPENSSL-2807585 | No Known Exploit | | critical severity | 786 | OS Command Injection
    SNYK-DEBIAN10-OPENSSL-2807585 | No Known Exploit | | high severity | 614 | Use After Free
    SNYK-DEBIAN10-SUBVERSION-2635642 | No Known Exploit |


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings


    Learn how to fix vulnerabilities with free interactive lessons:

    🦉 Learn about vulnerability in an interactive lesson of Snyk Learn.

  • [Snyk] Security upgrade golang from 1.17.3-buster to 1.17-buster

    [Snyk] Security upgrade golang from 1.17.3-buster to 1.17-buster

    This PR was automatically created by Snyk using the credentials of a real user.


    Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

    Changes included in this PR

    • Dockerfile

    We recommend upgrading to golang:1.17-buster, as this image has only 200 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

    Some of the most important vulnerabilities in your base image include:

    | Severity | Priority Score / 1000 | Issue | Exploit Maturity | | :------: | :-------------------- | :---- | :--------------- | | medium severity | 514 | CVE-2021-4160
    SNYK-DEBIAN10-OPENSSL-2388381 | No Known Exploit | | high severity | 678 | Loop with Unreachable Exit Condition ('Infinite Loop')
    SNYK-DEBIAN10-OPENSSL-2426310 | No Known Exploit | | high severity | 678 | Loop with Unreachable Exit Condition ('Infinite Loop')
    SNYK-DEBIAN10-OPENSSL-2426310 | No Known Exploit | | high severity | 614 | Use After Free
    SNYK-DEBIAN10-SUBVERSION-2635642 | No Known Exploit | | medium severity | 514 | Incorrect Authorization
    SNYK-DEBIAN10-SUBVERSION-2635650 | No Known Exploit |


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings


    Learn how to fix vulnerabilities with free interactive lessons:

    🦉 Learn about vulnerability in an interactive lesson of Snyk Learn.

  • [Snyk] Security upgrade golang from 1.17.3-buster to 1.18.1-buster

    [Snyk] Security upgrade golang from 1.17.3-buster to 1.18.1-buster

    This PR was automatically created by Snyk using the credentials of a real user.


    Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

    Changes included in this PR

    • Dockerfile

    We recommend upgrading to golang:1.18.1-buster, as this image has only 200 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

    Some of the most important vulnerabilities in your base image include:

    | Severity | Priority Score / 1000 | Issue | Exploit Maturity | | :------: | :-------------------- | :---- | :--------------- | | medium severity | 514 | CVE-2021-4160
    SNYK-DEBIAN10-OPENSSL-2388381 | No Known Exploit | | high severity | 678 | Loop with Unreachable Exit Condition ('Infinite Loop')
    SNYK-DEBIAN10-OPENSSL-2426310 | No Known Exploit | | high severity | 678 | Loop with Unreachable Exit Condition ('Infinite Loop')
    SNYK-DEBIAN10-OPENSSL-2426310 | No Known Exploit | | high severity | 614 | Use After Free
    SNYK-DEBIAN10-SUBVERSION-2635642 | No Known Exploit | | medium severity | 514 | Incorrect Authorization
    SNYK-DEBIAN10-SUBVERSION-2635650 | No Known Exploit |


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings


    Learn how to fix vulnerabilities with free interactive lessons:

    🦉 Learn about vulnerability in an interactive lesson of Snyk Learn.

  • [Snyk] Security upgrade golang from 1.17.3-buster to 1.17.9-buster

    [Snyk] Security upgrade golang from 1.17.3-buster to 1.17.9-buster

    This PR was automatically created by Snyk using the credentials of a real user.


    Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

    Changes included in this PR

    • Dockerfile

    We recommend upgrading to golang:1.17.9-buster, as this image has only 193 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

    Some of the most important vulnerabilities in your base image include:

    | Severity | Priority Score / 1000 | Issue | Exploit Maturity | | :------: | :-------------------- | :---- | :--------------- | | critical severity | 500 | Improper Encoding or Escaping of Output
    SNYK-DEBIAN10-EXPAT-2403513 | No Known Exploit | | critical severity | 500 | Exposure of Resource to Wrong Sphere
    SNYK-DEBIAN10-EXPAT-2403518 | No Known Exploit | | critical severity | 500 | Integer Overflow or Wraparound
    SNYK-DEBIAN10-EXPAT-2406128 | No Known Exploit | | medium severity | 514 | CVE-2021-4160
    SNYK-DEBIAN10-OPENSSL-2388381 | No Known Exploit | | high severity | 614 | Loop with Unreachable Exit Condition ('Infinite Loop')
    SNYK-DEBIAN10-OPENSSL-2426310 | No Known Exploit |


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings


    Learn how to fix vulnerabilities with free interactive lessons:

    🦉 Learn about vulnerability in an interactive lesson of Snyk Learn.

  • [Snyk] Security upgrade golang from 1.17.3-buster to 1.18.0-buster

    [Snyk] Security upgrade golang from 1.17.3-buster to 1.18.0-buster

    This PR was automatically created by Snyk using the credentials of a real user.


    Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

    Changes included in this PR

    • Dockerfile

    We recommend upgrading to golang:1.18.0-buster, as this image has only 194 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

    Some of the most important vulnerabilities in your base image include:

    | Severity | Priority Score / 1000 | Issue | Exploit Maturity | | :------: | :-------------------- | :---- | :--------------- | | critical severity | 500 | Exposure of Resource to Wrong Sphere
    SNYK-DEBIAN10-EXPAT-2403518 | No Known Exploit | | critical severity | 500 | Integer Overflow or Wraparound
    SNYK-DEBIAN10-EXPAT-2406128 | No Known Exploit | | medium severity | 514 | CVE-2021-4160
    SNYK-DEBIAN10-OPENSSL-2388381 | No Known Exploit | | high severity | 678 | Loop with Unreachable Exit Condition ('Infinite Loop')
    SNYK-DEBIAN10-OPENSSL-2426310 | No Known Exploit | | high severity | 678 | Loop with Unreachable Exit Condition ('Infinite Loop')
    SNYK-DEBIAN10-OPENSSL-2426310 | No Known Exploit |


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings


    Learn how to fix vulnerabilities with free interactive lessons:

    🦉 Learn about vulnerability in an interactive lesson of Snyk Learn.

  • [Snyk] Security upgrade golang from 1.17.3-buster to 1.17.8-buster

    [Snyk] Security upgrade golang from 1.17.3-buster to 1.17.8-buster

    Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

    Changes included in this PR

    • Dockerfile

    We recommend upgrading to golang:1.17.8-buster, as this image has only 190 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

    Some of the most important vulnerabilities in your base image include:

    | Severity | Priority Score / 1000 | Issue | Exploit Maturity | | :------: | :-------------------- | :---- | :--------------- | | critical severity | 500 | Integer Overflow or Wraparound
    SNYK-DEBIAN10-EXPAT-2406128 | No Known Exploit | | medium severity | 514 | CVE-2021-4160
    SNYK-DEBIAN10-OPENSSL-2388381 | No Known Exploit | | high severity | 678 | Loop with Unreachable Exit Condition ('Infinite Loop')
    SNYK-DEBIAN10-OPENSSL-2426310 | No Known Exploit | | high severity | 678 | Loop with Unreachable Exit Condition ('Infinite Loop')
    SNYK-DEBIAN10-OPENSSL-2426310 | No Known Exploit | | high severity | 471 | Out-of-bounds Write
    SNYK-DEBIAN10-ZLIB-2433934 | No Known Exploit |


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings


    Learn how to fix vulnerabilities with free interactive lessons:

    🦉 Learn about vulnerability in an interactive lesson of Snyk Learn.

  • [Snyk] Security upgrade golang from 1.17.3-buster to buster

    [Snyk] Security upgrade golang from 1.17.3-buster to buster

    Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

    Changes included in this PR

    • Dockerfile

    We recommend upgrading to golang:buster, as this image has only 189 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

    Some of the most important vulnerabilities in your base image include:

    | Severity | Priority Score / 1000 | Issue | Exploit Maturity | | :------: | :-------------------- | :---- | :--------------- | | critical severity | 500 | Improper Encoding or Escaping of Output
    SNYK-DEBIAN10-EXPAT-2403513 | No Known Exploit | | critical severity | 500 | Exposure of Resource to Wrong Sphere
    SNYK-DEBIAN10-EXPAT-2403518 | No Known Exploit | | critical severity | 500 | Integer Overflow or Wraparound
    SNYK-DEBIAN10-EXPAT-2406128 | No Known Exploit | | medium severity | 514 | CVE-2021-4160
    SNYK-DEBIAN10-OPENSSL-2388381 | No Known Exploit | | high severity | 733 | Loop with Unreachable Exit Condition ('Infinite Loop')
    SNYK-DEBIAN10-OPENSSL-2426310 | No Known Exploit |


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings


    Learn how to fix vulnerabilities with free interactive lessons:

    🦉 Learn about vulnerability in an interactive lesson of Snyk Learn.

  • [Snyk] Security upgrade golang from 1.17.13-buster to 1.18.9-buster

    [Snyk] Security upgrade golang from 1.17.13-buster to 1.18.9-buster

    This PR was automatically created by Snyk using the credentials of a real user.


    Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

    Changes included in this PR

    • Dockerfile

    We recommend upgrading to golang:1.18.9-buster, as this image has only 184 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

    Some of the most important vulnerabilities in your base image include:

    | Severity | Priority Score / 1000 | Issue | Exploit Maturity | | :------: | :-------------------- | :---- | :--------------- | | high severity | 614 | Link Following
    SNYK-DEBIAN10-GIT-1083853 | No Known Exploit | | high severity | 614 | CVE-2021-40330
    SNYK-DEBIAN10-GIT-1577271 | No Known Exploit | | high severity | 614 | Uncontrolled Search Path Element
    SNYK-DEBIAN10-GIT-2635966 | No Known Exploit | | high severity | 614 | Uncontrolled Search Path Element
    SNYK-DEBIAN10-GIT-2949147 | No Known Exploit | | high severity | 614 | Out-of-bounds Write
    SNYK-DEBIAN10-GIT-3051708 | No Known Exploit |


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings


    Learn how to fix vulnerabilities with free interactive lessons:

    🦉 Learn about vulnerability in an interactive lesson of Snyk Learn.

  • [Snyk] Security upgrade golang from 1.17.13-buster to 1-buster

    [Snyk] Security upgrade golang from 1.17.13-buster to 1-buster

    Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

    Changes included in this PR

    • Dockerfile

    We recommend upgrading to golang:1-buster, as this image has only 184 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

    Some of the most important vulnerabilities in your base image include:

    | Severity | Priority Score / 1000 | Issue | Exploit Maturity | | :------: | :-------------------- | :---- | :--------------- | | high severity | 614 | Link Following
    SNYK-DEBIAN10-GIT-1083853 | No Known Exploit | | high severity | 614 | CVE-2021-40330
    SNYK-DEBIAN10-GIT-1577271 | No Known Exploit | | high severity | 614 | Uncontrolled Search Path Element
    SNYK-DEBIAN10-GIT-2635966 | No Known Exploit | | high severity | 614 | Uncontrolled Search Path Element
    SNYK-DEBIAN10-GIT-2949147 | No Known Exploit | | high severity | 614 | Out-of-bounds Write
    SNYK-DEBIAN10-GIT-3051708 | No Known Exploit |


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings


    Learn how to fix vulnerabilities with free interactive lessons:

    🦉 Learn about vulnerability in an interactive lesson of Snyk Learn.

  • [Snyk] Security upgrade golang from 1.17.13-buster to 1.19.2-buster

    [Snyk] Security upgrade golang from 1.17.13-buster to 1.19.2-buster

    This PR was automatically created by Snyk using the credentials of a real user.


    Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

    Changes included in this PR

    • Dockerfile

    We recommend upgrading to golang:1.19.2-buster, as this image has only 188 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

    Some of the most important vulnerabilities in your base image include:

    | Severity | Priority Score / 1000 | Issue | Exploit Maturity | | :------: | :-------------------- | :---- | :--------------- | | high severity | 614 | Improper Authentication
    SNYK-DEBIAN10-CURL-2805484 | No Known Exploit | | high severity | 614 | Improper Certificate Validation
    SNYK-DEBIAN10-CURL-2813757 | No Known Exploit | | high severity | 614 | Loop with Unreachable Exit Condition ('Infinite Loop')
    SNYK-DEBIAN10-CURL-2813772 | No Known Exploit | | high severity | 614 | Link Following
    SNYK-DEBIAN10-GIT-1083853 | No Known Exploit | | high severity | 614 | CVE-2021-40330
    SNYK-DEBIAN10-GIT-1577271 | No Known Exploit |


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings


    Learn how to fix vulnerabilities with free interactive lessons:

    🦉 Learn about vulnerability in an interactive lesson of Snyk Learn.

  • [Snyk] Security upgrade golang from 1.17.13-buster to 1.18.8-buster

    [Snyk] Security upgrade golang from 1.17.13-buster to 1.18.8-buster

    Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

    Changes included in this PR

    • Dockerfile

    We recommend upgrading to golang:1.18.8-buster, as this image has only 188 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

    Some of the most important vulnerabilities in your base image include:

    | Severity | Priority Score / 1000 | Issue | Exploit Maturity | | :------: | :-------------------- | :---- | :--------------- | | high severity | 614 | Improper Authentication
    SNYK-DEBIAN10-CURL-2805484 | No Known Exploit | | high severity | 614 | Improper Certificate Validation
    SNYK-DEBIAN10-CURL-2813757 | No Known Exploit | | high severity | 614 | Loop with Unreachable Exit Condition ('Infinite Loop')
    SNYK-DEBIAN10-CURL-2813772 | No Known Exploit | | high severity | 614 | Link Following
    SNYK-DEBIAN10-GIT-1083853 | No Known Exploit | | high severity | 614 | CVE-2021-40330
    SNYK-DEBIAN10-GIT-1577271 | No Known Exploit |


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings


    Learn how to fix vulnerabilities with free interactive lessons:

    🦉 Learn about vulnerability in an interactive lesson of Snyk Learn.

  • [Snyk] Security upgrade golang from 1.17.13-buster to 1.19.2-buster

    [Snyk] Security upgrade golang from 1.17.13-buster to 1.19.2-buster

    Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

    Changes included in this PR

    • Dockerfile

    We recommend upgrading to golang:1.19.2-buster, as this image has only 198 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

    Some of the most important vulnerabilities in your base image include:

    | Severity | Priority Score / 1000 | Issue | Exploit Maturity | | :------: | :-------------------- | :---- | :--------------- | | high severity | 614 | Cleartext Transmission of Sensitive Information
    SNYK-DEBIAN10-CURL-1585139 | No Known Exploit | | high severity | 614 | Improper Authentication
    SNYK-DEBIAN10-CURL-2805484 | No Known Exploit | | high severity | 614 | Improper Certificate Validation
    SNYK-DEBIAN10-CURL-2813757 | No Known Exploit | | high severity | 614 | Loop with Unreachable Exit Condition ('Infinite Loop')
    SNYK-DEBIAN10-CURL-2813772 | No Known Exploit | | critical severity | 611 | Use After Free
    SNYK-DEBIAN10-EXPAT-3023032 | No Known Exploit |


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings


    Learn how to fix vulnerabilities with free interactive lessons:

    🦉 Learn about vulnerability in an interactive lesson of Snyk Learn.

  • [Snyk] Security upgrade golang from 1.17.13-buster to 1.18.6-buster

    [Snyk] Security upgrade golang from 1.17.13-buster to 1.18.6-buster

    Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

    Changes included in this PR

    • Dockerfile

    We recommend upgrading to golang:1.18.6-buster, as this image has only 203 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

    Some of the most important vulnerabilities in your base image include:

    | Severity | Priority Score / 1000 | Issue | Exploit Maturity | | :------: | :-------------------- | :---- | :--------------- | | high severity | 614 | Cleartext Transmission of Sensitive Information
    SNYK-DEBIAN10-CURL-1585139 | No Known Exploit | | high severity | 614 | Improper Authentication
    SNYK-DEBIAN10-CURL-2805484 | No Known Exploit | | high severity | 614 | Improper Certificate Validation
    SNYK-DEBIAN10-CURL-2813757 | No Known Exploit | | high severity | 614 | Loop with Unreachable Exit Condition ('Infinite Loop')
    SNYK-DEBIAN10-CURL-2813772 | No Known Exploit | | critical severity | 571 | Out-of-Bounds
    SNYK-DEBIAN10-SQLITE3-3011634 | No Known Exploit |


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings


    Learn how to fix vulnerabilities with free interactive lessons:

    🦉 Learn about vulnerability in an interactive lesson of Snyk Learn.

Related tags
A go1.18 wrapper to provide simple generics based API for defining command line flags.

gflag A go1.18 wrapper to provide simple generics based API for defining command line flags. Example package main import ( "flag" "fmt" "time" "

Dec 20, 2021
Command Line Alias Manager and Plugin System - Written in Golang
Command Line Alias Manager and Plugin System - Written in Golang

aly - Command Line Alias Manager and Packager Aly offers the simplest way to manage, share, and obtain command line aliases! Warning: This project is

Jun 16, 2022
painless task queue manager for shell commands with an intuitive cli interface (execute shell commands in distributed cloud-native queue manager).

EXEQ DOCS STILL IN PROGRESS. Execute shell commands in queues via cli or http interface. Features Simple intuitive tiny cli app. Modular queue backend

Dec 14, 2022
Just a simple CLI tool to group dependabot PRs by dependency and merge them.
Just a simple CLI tool to group dependabot PRs by dependency and merge them.

Dependabotbot Have you been the victim of a lodash update? Has your notification page in Github been assaulted by needing to update a patch version of

Jun 30, 2022
Related is a simple cli utility tool to create files or a group of files.

Related - Create files based on individual definitions or groups Related helps with common file-creation-based tasks. You can predefine single types a

Apr 16, 2022
Script to check open slot for 18+ age group in particular district and pin code area

Running instruction install go: 1.14 (might work with other versions as well) install following library for sending notifications go get -u github.com

Mar 22, 2022
Tool for shell commands execution, visualization and alerting. Configured with a simple YAML file.
Tool for shell commands execution, visualization and alerting. Configured with a simple YAML file.

Sampler. Visualization for any shell command. Sampler is a tool for shell commands execution, visualization and alerting. Configured with a simple YAM

Dec 28, 2022
miscellaneous useful commands, including 'gosh' the Go scripting tool

utilities Miscellaneous useful commands. gosh This is a tool for running Go code from the command line. See here. findCmpRm This finds files with copi

Oct 31, 2022
Command-line tool to load csv and excel (xlsx) files and run sql commands
Command-line tool to load csv and excel (xlsx) files and run sql commands

csv-sql supports loading and saving results as CSV and XLSX files with data processing with SQLite compatible sql commands including joins.

Nov 2, 2022
A CLI tool for running Go commands with colorized output
A CLI tool for running Go commands with colorized output

Goli Goli is a CLI Tool for running Go commands with colorized output. Note: Goli is still a WIP. It has very basic commands and limitations. Feel fre

Nov 24, 2022
Stack Up is a simple deployment tool that performs given set of commands on multiple hosts in parallel.
Stack Up is a simple deployment tool that performs given set of commands on multiple hosts in parallel.

Stack Up is a simple deployment tool that performs given set of commands on multiple hosts in parallel. It reads Supfile, a YAML configuration file, which defines networks (groups of hosts), commands and targets.

Jan 1, 2023
Cobra CLI tool to generate applications and commands

Cobra Generator Cobra provides its own program that will create your application and add any commands you want. It's the easiest way to incorporate Co

Jan 3, 2023
🧑‍💻📊 Show off your most used shell commands
🧑‍💻📊 Show off your most used shell commands

tsukae ??‍?? ?? Tsukae, 使え - means use in Japanese (so it refers to commands that you use) Built on top of termui and cobra Big shoutout to jokerj40 f

Dec 17, 2022
cTRL is a server for remote execution of pending tasks and commands in real time, supporting a queue with continuous thread limiting and throttling.

Документация на русском: https://github.com/eltaline/ctrl/blob/master/README-RUS.md cTRL is a server written in Go language that uses a modified versi

Mar 3, 2022
Go Library to Execute Commands Over SSH at Scale
Go Library to Execute Commands Over SSH at Scale

Go library to handle tens of thousands SSH connections and execute the command(s) with higher-level API for building network device / server automation.

Dec 9, 2022
Integrated console application library, using Go structs as commands, with menus, completions, hints, history, Vim mode, $EDITOR usage, and more ...
Integrated console application library, using Go structs as commands, with menus, completions, hints, history, Vim mode, $EDITOR usage, and more ...

Gonsole - Integrated Console Application library This package rests on a readline console library, (giving advanced completion, hint, input and histor

Nov 20, 2022
Commando - run commands against networking devices in batch mode
Commando - run commands against networking devices in batch mode

Commando is a tiny tool that enables users to collect command outputs from a single or a multiple networking devices defined in an inventory file.

Oct 30, 2022
Brigodier is a command parser & dispatcher, designed and developed for command lines such as for Discord bots or Minecraft chat commands. It is a complete port from Mojang's "brigadier" into Go.

brigodier Brigodier is a command parser & dispatcher, designed and developed to provide a simple and flexible command framework. It can be used in man

Dec 15, 2022
webify - Turn functions and commands into web services
webify - Turn functions and commands into web services

webify is a very basic CGI server which forwards all requests to a single script. A design goal is to be as zero-config as possible.

Dec 22, 2022