Top
Best
New

Posted by wiradikusuma 1 day ago

Log File Viewer for the Terminal(lnav.org)
295 points | 47 commentspage 3
peytongreen_dev 14 hours ago|
[flagged]
leontloveless 19 hours ago||
[dead]
Duke64 19 hours ago||
I'm a little disappointed that it's not written in Rust.
tstack 17 hours ago||
Speaking as the author, I too wish it was written in Rust. But, I started it in 2007 when I needed to get practice with C++ for work. At this point, there's so much code in lnav, rewriting would be a long process. There are some sub-components[1] that are written in Rust though.

A new project called logana[2] is written in Rust and is headed in a good direction. Use/contribute to that if you're really interested.

[1] - https://github.com/tstack/lnav/tree/master/src/third-party/l...

[2] - https://github.com/pauloremoli/logana/

Duke64 18 minutes ago||
Thanks for the reply and the tip about logana.

As I mentioned in the following comment[1], that was meant more as a joke. Thanks for your work!

[1] - https://news.ycombinator.com/item?id=47514276

kermatt 15 hours ago|||
How would this improve the functionality of lnav?
Duke64 20 minutes ago||
Just so we're clear, this was more or less a joke! As far as I'm concerned, lnav is just fine as it is. There's no urgent need to rewrite it.

Why I wrote the comment: I saw the headline, checked out the website, and thought to myself, “Hey, cool—a new handy tool.” As is typical for “cool new and handy tools,” these are usually written in Rust these days ;) That’s why I was “disappointed” (not really).

I didn’t realize until later that lnav was created in 2007.

Again: the tool is great, thanks and kudos to tstack for the work.

emmelaich 19 hours ago||
I sense an opportunity for you.
teh 20 hours ago|
Super useful tool but need to be aware that this is reading potentially untrusted input (e.g. in the case of http request logs) and written in c++, so a possible attack vector. I use lnav where I trust the logs, but do wish a safe implementation existed.
fireflash38 19 hours ago|
Memory safety doesn't mean it's safe. And C++ doesn't mean it's unsafe.

Browsers are in C++, do you not use them? Curl is in C, do you not use it? Kernel is C...

teh 17 hours ago||
Chrome uses sandboxing and a lot of safe tooling (wuffs, rust) for untrusted data.

curl is heavily fuzzed and you still mostly control what you are downloading unless the target is compromised.

With logs the attacker controls what goes into your logs.

And you don't need to really look very hard, there are a fair number of very recent stack and heap overflows: https://github.com/tstack/lnav/issues?q=is%3Aissue%20heap%20...