Commit graph

616 commits

Author SHA1 Message Date
Ed Page 51e1058379 refactor(shell): Centralize Shell styling
This is a very rough pass at naming the styles with a focus on getting
something in and keeping the colors the same.
2023-09-11 09:51:09 -05:00
Ed Page 2d5354adc9 refactor(cli): Extract CLI style definitions 2023-09-11 09:32:13 -05:00
Ed Page dbbc5dd6eb feat(help): Add styling to help output
Traditionally, cargo has disabled clap's styled help output.  My assumed
reason is that cargo mixes custom help output with auto-generated and
you couldn't previously make it all styled to match.  Clap 4.2 allowed
users to pass in strings styled using ANSI escape codes, allowing us to
pass in styled text that matches clap, unblocking this.  In clap
4.4.1, clap gained the ability for the user to override the style,
allowing us to choose the styling as we wish.

In this PR, I decided to use the new 4.4.1 feature to style clap's
output to match the rest of cargo's output.  Alternatively, we could use
a more subdue style that clap uses by default.  That subdued style was
mostly chosen to be app theme neurtral (since we didn't have theming
support yet) and there were problems with our style and no one stepped
up to fix them (cargo has a style we can match to instead).

I decided to *not* style `Arg::help` messages because
- It might be distracting to have the descriptions lit up like a
  christmas tree
- It is a lot more work

The one exception I made was for `--list` since it is for a
psuedo-command (`...`) and I wanted to intentionally draw attention to
it.
2023-09-01 09:30:20 -05:00
Arlo Siemsen e58b84d35e breaking change(cargo-credential)
Changes the JSON format for cache:expires
2023-09-05 15:22:27 -05:00
Jacob Finkelman 16b330bc59 stop using lazy_static 2023-09-01 21:38:03 +00:00
renovate[bot] b7408c7261
chore(deps): update compatible 2023-09-01 07:44:26 +00:00
renovate[bot] fd28a0383a
chore(deps): update rust crate cargo_metadata to 0.17.0 2023-09-01 02:16:59 +00:00
Eric Huss 58b5951d9f Update git2 2023-08-28 13:17:01 -07:00
David Tolnay 3871aecf3e
Improve deserialization errors of untagged enums 2023-08-27 16:27:08 -07:00
Eric Huss 3b6a008f73 Update serde 2023-08-26 11:40:10 -07:00
Weihang Lo 907b9c8ecf
chore: add missing windows-sys features back 2023-08-26 10:59:04 +01:00
Deadbeef 3d50f47197 Add fields for bindeps on the registry 2023-08-25 01:43:29 +00:00
renovate[bot] af100af4ff
chore(deps): update latest msrv to v1.72.0 2023-08-24 16:36:51 +00:00
Ed Page 7a65c826a0 fix: Set MSRV for internal packages
For now, I'm punting on packages we generally expect others to use
2023-08-22 16:46:47 -05:00
Weihang Lo c1f7e2bb04
chore: upgrate clap to 4.3.23 2023-08-22 17:24:40 +01:00
Weihang Lo 5ab8a97645
Bump to 0.75.0 2023-08-22 11:54:44 +01:00
Ed Page 4793669b13 chore: Downgrade serde below the binary blob
As of serde 1.0.172, `serde_derive` ships a binary blog for Linux x64
for faster build times.  This blob is not yet reproducible to ensure
that the safety of it.  See serde-rs/serde#2538

This is not a judgement on serde or on dtolnay but just a precaution to
buy us more time as the community works through this since the beta cut
is coming up.  rust-1.72 branch is unaffected.
2023-08-18 19:33:32 -05:00
Arlo Siemsen 763edbab09 rename crate to cargo-credential-libsecret 2023-08-17 16:05:31 -05:00
Arlo Siemsen 3d8e8d32cd credential: make gnome-secret built-in as cargo:libsecret 2023-08-17 13:58:18 -05:00
bors 937b930a77 Auto merge of #12518 - arlosi:cred-dlopen, r=epage
cargo-credential-gnome-secret: dynamically load libsecret

Building `cargo-credential-gnome-secret` currently requires the `libsecret` development libraries to be installed and findable via `pkg-config`. This is often an extra step for users and complicates CI builds.

This loads the required functions from `libsecret` dynamically using `libloading` which uses `dlopen` internally.

Closes #12503

Testing this requires manually installing the credential provider on a system with libsecret set up. I tested it on Arch Linux.
2023-08-17 16:56:21 +00:00
Arlo Siemsen b74e5a0e7e credential: make 1password no longer built-in 2023-08-17 00:47:30 -05:00
Arlo Siemsen 627936bdf6 cargo-credential-gnome-secret: dynamically load libsecret 2023-08-17 00:18:00 -05:00
Weihang Lo 5691da2b79
chore(cargo-util): bump version to 0.2.6 2023-08-16 20:06:40 +01:00
Weihang Lo 9d707e4b9a
chore: remove log, env_logger, and pretty_env_logger 2023-08-07 12:02:19 +01:00
Weihang Lo 23561f36a1
chore: add tracing-subscriber crate 2023-08-07 11:25:41 +01:00
Weihang Lo 9f0565e985
chore: add tracing crate 2023-08-07 11:21:55 +01:00
Eric Huss 850ff884e8 Update miow from 0.5.0 to 0.6.0 2023-08-05 14:27:40 -07:00
bors bfb0d197d2 Auto merge of #12445 - ehuss:update-pretty-env-logger, r=weihanglo
Update pretty_env_logger to 0.5

This updates pretty_env_logger from 0.4.0 to 0.5.0. The primary motivation is to drop some dependencies like `atty`.

https://github.com/seanmonstar/pretty-env-logger/compare/v0.4.0...v0.5.0
I think the main change is updating to env_logger 0.7 to 0.10 which syncs with what is normally used by cargo.
2023-08-03 23:13:19 +00:00
Eric Huss c753612408 Remove build metadata from libgit2-sys dependency 2023-08-03 15:14:50 -07:00
Eric Huss 580bbf90f8 Update pretty_env_logger to 0.5 2023-08-03 15:14:02 -07:00
renovate[bot] 599fe4c9ba
chore(deps): update compatible 2023-08-01 02:18:22 +00:00
bors c86366091b Auto merge of #12399 - epage:normalize, r=weihanglo
fix(package): Recognize and normalize `cargo.toml`

### What does this PR try to resolve?

This solution is a blend of conservative and easy
- Normalizes `cargo.toml` to `Cargo.toml` on publish
  - Ensuring we publish the `prepare_for_publish` version and include `Cargo.toml.orig`
  - Avoids dealing with trying to push existing users to `Cargo.toml`
- All other cases of `Cargo.toml` are warnings
  - We could either normalize or turn this into an error in the future
  - When helping users with case previously, we've only handle the `cargo.toml` case
  - We already should have a fallback in case a manifest isn't detected
  - I didn't want to put in too much effort to make the code more complicated to handle this

As a side effect, if a Linux user has `cargo.toml` and `Cargo.toml`, we'll only put one of them in the `.crate` file.  We can extend this out to also include a warning for portability for case insensitive filesystems but I left that for after rust-lang/cargo#12235.

### How should we test and review this PR?

A PR at a time will show how the behavior changed as the source was edited

This does add a direct dependency on `unicase` to help keep case-insensitive comparisons easy / clear and to avoid riskier areas for bugs like writing an appropriate `Hash` implementation.  `unicase` is an existing transitive dependency of cargo.

### Additional information

Fixes #12384

[Discussion on Zulip](https://rust-lang.zulipchat.com/#narrow/stream/246057-t-cargo/topic/.60cargo.2Etoml.60.20on.20case.20insensitive.20filesystems)
2023-07-29 21:55:49 +00:00
Eric Huss d711c12535 Update curl-sys to pull in curl 8.2.1 2023-07-27 10:55:18 -07:00
Ed Page cc6b6c9584 fix(package): Avoid multiple package list entries
To keep things simple, especially in getting a `Hash` implementation
correct, I'm leveraging `unicase` for case-insensitive
comparisons which is an existing dependency and I've been using for
years on other projects.

This also opens the door for us to add cross-platform compatibility
hazard warnings about multiple paths that would write to the same
location on a case insensitive file system.  I held off on that because
I assume we would want #12235 first.

This does mean we can't test the "no manifest" case anymore because the
one case (no pun intended) I knew of for hitting it is now gone.
2023-07-26 11:02:47 -05:00
Eric Huss 9a5ed74983 Update curl-sys to pull in curl 8.2.0 2023-07-25 08:53:11 -07:00
Arlo Siemsen 2b39792aef Credential provider implementation 2023-07-21 16:02:24 -05:00
Weihang Lo 31b500c7c0
refactor(crates-io): use thiserror
Optionally use `thiserror` to reduce boilerplates but this part can
be dropped if we don't want.
2023-07-18 22:22:47 +01:00
Weihang Lo 6805944715
feat(crates-io): expose headers for ResponseError::Api
In response to RFC 3231 [^1], our registry client need to return headers
to caller, so that the caller (cargo binary) can continue parsing
challenge headers.

[^1]: https://rust-lang.github.io/rfcs/3231-cargo-asymmetric-tokens.html#the-authentication-process
2023-07-18 22:22:46 +01:00
abhiram 04e5675717 Fix "cargo doc --open" crash on WSL2
"cargo doc --open" does not work on WSL2 due to a bug in the 'opener'
crate. Updated 'opener' to v0.6.1 to fix this issue.
2023-07-18 15:58:22 +05:30
Josh Stone 2bb6f9eb8a Upgrade to indexmap v2
No code changes are required for the current uses of indexmap.

I also updated `toml_edit` to get its update to `indexmap 2`, and
`gix-hashtable` to align them all on `hashbrown 0.14`.
2023-07-17 14:15:29 -07:00
Ed Page 83a5859221 chore(platform): Version bump 2023-07-17 13:21:41 -05:00
Ed Page 4bd5f9ca50 chore(util): Version bump 2023-07-17 13:21:41 -05:00
Ed Page 5d80aa263d refactor: Provide workspace-level default license 2023-07-17 13:21:41 -05:00
Ed Page f358359a17 refactor: Provide a workspace-level default edition 2023-07-17 13:21:40 -05:00
Ed Page 8b02d4927e refactor: Infer package.readme 2023-07-17 13:21:10 -05:00
Weihang Lo ff644b8cac
Bump to 0.74.0 2023-07-15 00:20:53 +01:00
Arlo Siemsen d45ba88290 Bump version of crates-io due to unintentional semver-breaking change 2023-07-13 14:35:09 -05:00
Eric Huss 119fede29f Update criterion 2023-07-09 15:59:30 -07:00
dependabot[bot] ff26beca25
build(deps): bump openssl from 0.10.54 to 0.10.55
Bumps [openssl](https://github.com/sfackler/rust-openssl) from 0.10.54 to 0.10.55.
- [Release notes](https://github.com/sfackler/rust-openssl/releases)
- [Commits](https://github.com/sfackler/rust-openssl/compare/openssl-v0.10.54...openssl-v0.10.55)

---
updated-dependencies:
- dependency-name: openssl
  dependency-type: direct:production
...

Signed-off-by: dependabot[bot] <support@github.com>
2023-06-21 22:59:06 +00:00
bors 0d5370a9ae Auto merge of #12268 - epage:direct, r=weihanglo
fix(embedded): Don't create an intermediate manifest

### What does this PR try to resolve?

More immediately, this is to unblock rust-lang/rust#112601

More generally, this gets us away from hackily writing out an out-of-line manifest from an embedded manifest.  To parse the manifest, we have to write it out so our regular manifest
loading code could handle it.  This updates the manifest parsing code to
handle it.

This doesn't mean this will work everywhere in all cases though.  For
example, ephemeral workspaces parses a manifest from the SourceId and
these won't have valid SourceIds.

As a consequence, `Cargo.lock` and `CARGO_TARGET_DIR` are changing from being next to
the temp manifest to being next to the script.  This still isn't the
desired behavior but stepping stones.

### How should we test and review this PR?

A Commit at a time

### Additional information

In production code, this does not conflict with #12255 (due to #12262) but in test code, it does.
2023-06-17 08:08:50 +00:00