sys-block/thin-provisioning-tools: drop 0.9.0-r4, 1.0.14-r2

Signed-off-by: Sam James <sam@gentoo.org>
This commit is contained in:
Sam James 2025-11-15 12:36:17 +00:00
parent 0e85f1777c
commit ab46e67405
No known key found for this signature in database
GPG Key ID: 738409F520DF9190
9 changed files with 0 additions and 1259 deletions

View File

@ -24,7 +24,6 @@ DIST bitflags-1.3.2.crate 23021 BLAKE2B eb990bb27b2bdeb66fd7212ce582cb36e1c616de
DIST bitflags-2.10.0.crate 48427 BLAKE2B 238a6da813eb2c5541ad470b97b9cf6ad8004095d2a8e865b88eb2301290b7bda22e5b062ba66a04ff0f3108a84d4799af0786b76f785fb5782bd847876549c9 SHA512 6fcdaf250ca6e74b65ecba755d62c3e78f6c02ce1a9562a3b17bb2d6068a0df480ad9c838ce427dc2d2869a9dd1f86f2fb1dc1e50a114def77fd24154b2b86b0
DIST bitflags-2.6.0.crate 45357 BLAKE2B 3a368bd2eb58c095b7b4a46680cc2d90a28e24b2e37c854bbf8647c861c4b8fb37eca827599673c5c7df763048149dd82123d1ede1f8a0e58a6bc23c8250f7e6 SHA512 f9bb3c48931ed7e7e05ec6d13305af5da6b6c18861ff307d7dc17c658f63972c87b70b0527287b3625c8592befc207cfe15550654995faf3862bb12a6d95bacf
DIST bumpalo-3.19.0.crate 96414 BLAKE2B f8c155f77cf977d72749f3cb943a6b171dfc4f67135da345a935ba603f2b52b5feafbba908b31feff391128196c7b0088f6f62d5b37bc4d2277fc0fb9c560b54 SHA512 58db27a643c55adae07061100e3604dad0056bacd42ce1142bcc34249645e9313e886c3174a755593544684fcc632f134f9c6066752ac695254fb9ecd40878cf
DIST bytemuck-1.16.1.crate 48321 BLAKE2B ae8525a829a2c981200dfbc17de7f2a4e14fc6df71328c1a62b27dfa7488fdf634b4a6f45e65104bc45b828a91d3d0a70d06e9dd4c61dcba18db09204a22a6f2 SHA512 ba9e5eaae4d4d5ffd654da0359cdb5e85ad2d111b26a3b5147bae69519963ae3118ebe2afd34e92305cad3b3e573cd5aaf175c3bf81e94126f65ca3c9320b9dd
DIST bytemuck-1.16.3.crate 49539 BLAKE2B 5e9a4c9e5bb1ec5398670edad455fa54b08955b48390d784c29c7ba153db4d0fb25c4d14f445ed28c443379a761354b1d9eb8c9c6e2a2930f5fb3f9085ad45b2 SHA512 17bf35d082c8009ce6ae24ae681715d8fd303f728f9bb2a0702096fd8635b5e7294eeea5375217a8276ba6136a16f94eb670c5d5baba9020674dc958173342f8
DIST bytemuck-1.24.0.crate 53243 BLAKE2B 472563c13565b62378576597a98c8050117940842846f2fb711fe4fc251e3bab19ed8f0d7e8215c880f06638684f1b8090afee598c730dacfe536f53287dcd69 SHA512 4e3b8071b7dc3b88104786f007f2fb8930cf252fc6cc04ff0c1a13873cd272971edcedcc9231a2a44bbdeca9c831f4c732e6917581420f209003b47761a8ced8
DIST byteorder-1.5.0.crate 23288 BLAKE2B 7f85a7948406844070a2c8202e0bd52f73b3dfc7c666a97046128044eb9352195afb80e2bf894c0742ad109e4473339de1365d09591de70dfec6c8c02a8e1453 SHA512 96caf981177f6ded9f27f025922cb94eb0cd9de5303bd91680099912d922092e77b7361efa70011e84f1595e443193e4f1b354443b9980c123f6ae573b236f7f
@ -35,10 +34,8 @@ DIST cfg-if-1.0.0.crate 7934 BLAKE2B e99a5589c11d79d77a4537b34ce0a45d37b981c123b
DIST cfg-if-1.0.4.crate 9360 BLAKE2B beadbfb273ee97cbb6e3740891fbace57511399ad203459b66b397587d794677a9515cde4e9ec4320c3795518bf1551d72b9a889f8ac4b225168f493288b7c19 SHA512 176e04df7ba783b7143bb84397b777f5c5a1305c08a5c3a218d4a66830620be89ed68992ba27686165bcd3fb2f34b2daf80b2a1d4b481ecc267c988e84d28e9d
DIST cfg_aliases-0.2.1.crate 6355 BLAKE2B a758d9c88527f0e6e7cfd6d4c83eda1bcb4d6e2438189fe08e8ecbcaa78d56afc5a4873f3b82bf7da96afd690b44cdf1e44466b6da0f37c358b340481017103e SHA512 74969d12d5d24002a29e08d52e30fbce014dd481a7c35ee0162e69333c5f2d7755f3b02439b31522e12444cf1ac8e65880ce33fe6778dac03757e362cbf8a72c
DIST clang-sys-1.8.1.crate 44009 BLAKE2B 9173de6dfbd3ef9d5d1fdc559700cd3a52f95cd77302063a97e8cf311a35825825e030b47f252c857853663ae8a16709e1f7bd0c608d67c2a74eb36ed588e778 SHA512 a68c426c20110fddb8bba07d6631517b0528fad45802e5a34a22561d7e6dad82dc5001387019a03f275e9a671b09ee0a06b6e86793c4fb4ec655700bb0f5e125
DIST clap-4.5.11.crate 56252 BLAKE2B 0d3d7e008e0848cbd66bd1fe347cbbccc77c44db49e1e4179eb0f2c292c87e178424ec82c2becf2e99162f2a199c31c31b54487c7dbfa700feeb082dee15c711 SHA512 96bb7871ef3eb167bf8869e3713d861754cf4716dcff8afe54b3d73ddeb862c75e110e1b759c72edec7cc0e274df5af881aaa8bd275978c55ec8a225c333b098
DIST clap-4.5.13.crate 56267 BLAKE2B 233f2fb4405ee2ff669220214c13b6c94858dbc375c8bf7eb83d7488690d74ebd8e1514679e02d1354b493b6e37fd7ed4b2ae32065d115a7287014aece90c2af SHA512 dd1a42ad3bf39463966c2ef76f3ec2dc5a847160bcd73de1718bd6706790f1ace183e3c9e6ee8d06f6ddea4b9bf30c884fa97d36b44f30dac26a85a52d9a0025
DIST clap-4.5.50.crate 62030 BLAKE2B cf2cf1761b2d4500ba6ce9c48e9127d83bc0eda99d111eedc5d45c9444c8cf53d15f9d56dddb1cd1d1ae464e514bd6484a15b4055a6305c5e476e80d57e090d0 SHA512 f98dc12a40453f17c733562e2d3a08dd4c073f2930665a683328100c5a09ae7d77fe535a22cce12c4eee8e2b073ebdfc156cfd4f5ebbd2f57fe779d206092264
DIST clap_builder-4.5.11.crate 164100 BLAKE2B 07cadc052133a905e2f16bfdf3c1a0d66a283df5e7bb16eeb40bf1a8a489c24758309039d8a07a0b02cf7702a3a2ba6319115940193e58306df20f53851ec537 SHA512 e647761130263d45d55c507e15893b73f70ff402185cd2ef174f7c4f67cef96c713fa4d4d60244393b9e7628667b79e56dabac0196d014740d81e5b7083ab780
DIST clap_builder-4.5.13.crate 164093 BLAKE2B f938635782ba9c1a675bc15a73a36ee7f1cbee501dd10be6f267364fde125c75474e5abe226e0eaf0c9fb224887c65bbc1be4641ca093282d3042f9980f4ab94 SHA512 ab7a29b29a15d22701550fc590ca6ec256edf03828e2b9a87072734a8f66b6e5a1843ac2ee7856c62472960af4e8f40840f840adb78ce5afca918f333e0f623f
DIST clap_builder-4.5.50.crate 171137 BLAKE2B c22e6f71df95d9cfd3c5f319d7c374ecb4879667279343e65ba35cac4308b490cacf2b2a702c4927d04412df2b1de776a38dd4081673777cf101553206fd32a0 SHA512 767b3bc14de66da6ba4cdf937b65d1f05fc34396026d8eeab39365714b26c7a2e0a7a494101ba13c97f23cbdabdedebfb62f522cce72fdb6f0fd5f45fd030cae
DIST clap_lex-0.7.2.crate 12805 BLAKE2B 952bf3f3885ae7bedd0e8add236590da5fce72a7ccd88ebda063410aef337ce7ccdb5e5e929cb870bc993891610edc0197150a3aa82a62fadc4bbfd96324fcdf SHA512 a8726397e5372fca3389748efdfdbd016b6baedad5b4bd95f33e4e820d4f40e0b94c88b1918ded3678aecf23911028e2261837e73d58ba7fd6f091eb47267380
@ -80,7 +77,6 @@ DIST fastrand-2.1.0.crate 14907 BLAKE2B f96c74c1da31bae35e5ae0a557b3cdf120099cd7
DIST fastrand-2.3.0.crate 15076 BLAKE2B 15c9a1c4f64d94c4bfd38ae139c6fe19b6b621a495c1b57209edd6d76d978eaf018ba77f356b5086c3f462a6de044fb5e3b172fc288309569911a17ec39951bc SHA512 267fecbb7459c8840f03425733d278dd6c4e7637b85b99552877117ed5e8015e094d86aa95841f77064136b7f382276c3cb2c2bef7b2881d272f4aa57c5cf947
DIST fixedbitset-0.4.2.crate 15954 BLAKE2B 91270883db5ad0e999ebbca1123d8729d3040eb936034ab8da3cda72a830e45fcb977b3fe3c2b94e870c1fbc366ee8602357bb77e8b9a40cc41a04afad1b266b SHA512 57c5d756b0a202b2506270f0d5e890f7617a1e0c015b6059ea23fab49cf7af47fd06927eb56feb03b37cb2b6c467e326b3f0da1e32cfcb6339cf11a130a3ccab
DIST fixedbitset-0.5.7.crate 26537 BLAKE2B 48b7e02d7fa3fb33f05fb2de50a829e2f25d19ac680d59c754faef754ca4678d1671fcdc66d06c39b51b4f937bca44a89b87da195e43a4a905a0d29fa95996f9 SHA512 320b1b47a9f93590f24d5c111c171c401f15a50dc29617c8715b6c9d0b3f26e17f966a87d8628661dfc62ff8dee98524f3b6f4f4391725b1b77db714eb6eef60
DIST flate2-1.0.30.crate 75511 BLAKE2B c25d9ab787ef60312523d80cf277bcaae16c7e54b1deb0fc8723a3b22c2586092343db1c538d96a37690d21e52ff822a38c90e10bc554fedb75671fdff6df309 SHA512 21528f80c1709cfa764723dce012903581dbc2b63ecad194ec601fc75103307e1b2ef17479186ad895ad957c9a33c6fd666b2981382a8a68ca78dfac7cb5d578
DIST flate2-1.0.31.crate 108176 BLAKE2B 2b0afbeec9ef08e54bfc572d7a386052d519d5bdeb220a316b67409403d229425580e33991f0a98536e6468f0e59ca87b59ff2d00425749336d4e68906d5d787 SHA512 b211254e15b38663f080552598d61d6766d6e7abc45cbac8fbdb5af65b833d2d3fbc00b5748ee12d4fc71726ab84dda9da20b6916121735c7b1c6c9d7a09fa61
DIST flate2-1.1.4.crate 77010 BLAKE2B fac509e03369218f587db1c8372fc6e7ef4aa8d5f9cbe22bc19408347544112330c5bc3f6a1545ccef964d2042c3efed0d5f5b0afcd5fd7d593ef35c85750900 SHA512 23f595b3cba18df65843ef1db2597f445bff8edea152f0e0200d13419580f8e4d20a39a492c52122f225ee6835615706456b2769d7d3fad597924d4733f57c44
DIST fnv-1.0.7.crate 11266 BLAKE2B 81da85889c91b6567e0f555e37dd915f1bd919719d1ca10c31a6861d7aec29a49ae9c1e8bc500791bf9d6b8dbb318c096d04872c5872a4b1f7d45fbd8e12842d SHA512 2195a4b34a78e2dd9838caf0ee556bf87cbb4a8ef5505aac663b614eb59dcfc0c40f432463ede41ecca57bfe7711f72673d39a85fe03d426f1324097d5628334
@ -151,7 +147,6 @@ DIST numtoa-0.2.4.crate 9167 BLAKE2B 16b0e6c26879c33c952ee0122c8d2b28cd678d3d877
DIST once_cell-1.19.0.crate 33046 BLAKE2B c14b374eaf4ac0f60acc2e02f7bba270a0e8e0a6978d749cd3cb0ab3eb26907e4fbea70dd5132982f90290381ed18ff8a87fd530f1415fabffac864f157ea380 SHA512 4154876afd34a699ee650d1a8a1c5ee5a25f0ebd9388b8bef2564e33629fae68f113d7507488c68abbe7ea1acf9bbc41813cbbf3ef3e464e3f3b9cc7a51d870c
DIST once_cell-1.21.3.crate 34534 BLAKE2B 3578aaef305cad2fdffdc40c392775a3540bfab3f3aeafd22466d9507bf8346b9fcc200929d48525b051070c0aaa423ecbcaa12868b34dca007991effb224166 SHA512 32a87506c6f4598f3ca2c88556014ef2093d5db9a08602335e847caa537a866492fa74c894e7e1da2e4289a1d3dbffcb90a9e37a4a1453203832f434b8206990
DIST once_cell_polyfill-1.70.2.crate 7448 BLAKE2B 5a90f8eeff25a555987b84b9800f9e0b2aa94fb4827f76678ef45d344c4baeae5a079a288fd02a570d0f0099e9b2842d32dd206dbd609212496e77ede47a4d21 SHA512 9e0d07bcd40e4a5c271646d6fce71677acbfa4439b4e818bb4df823eb31eff976ba78239e3a7e0ad21e80ea8d0d3af3e74a7d0a0a55b308d4c777b9b5e1ef8ad
DIST os_pipe-1.2.0.crate 10615 BLAKE2B e00c9a1d668253ee8b759ead12708d75b180abd415444fa995c18107317ad9465c11af1f6be67dd8f64bc7d289a0e12096e9593af99c1052aca644efc5d83107 SHA512 77662eabc70f034882da4662c6f9def1796e6564f0965beae961998ed29d47ddae8ef3b8c9e612b46ee6ab907db49a6259f8d586156ea88f4e0431fa306211eb
DIST os_pipe-1.2.1.crate 10691 BLAKE2B 563b108a8ce21dc4406a35bd2776b156ec77053f9449ba92acb81b9194a6df58a72a1fbbcbfe0b8d88c3fd3b4f8b1244a4d6737916f8e4050c6cd3eff7a8b130 SHA512 3a184359185495e8a931d3e875c5ebdc822e6fc76ecb9fb4264409f68d8a145406001339bdc00585f3ed7d9ecc74fc89f662fa8e08f4ed764a258302a198d4ff
DIST os_pipe-1.2.3.crate 10467 BLAKE2B 223f79114161825747792e10f073c5fc32bfc4ffa67d6d48ad73feb8589370a5260054c9cfe3b6d77dc5742b72015ff96d8271cc74c505dad0aebe8a666cec05 SHA512 19dee6ead0eb792eab5e282e595ed5c3bc741613e1a7a790c9478c63f6b179f4aa55f4ddbd768f01aa8cc502c860691836f25e00e49bf133a0153ce7c5545f3b
DIST paste-1.0.15.crate 18374 BLAKE2B 69ee7def55e658a9aa72405bad62325e8d6021a4989fbf11c88d1bf05fbac520f7b04d467bc3c6eb45043a41119f65aceecc4a6a1418a9192d73f33134545062 SHA512 5026d3ec7141ec4e2517a0b1283912d0801e9356f77b703d954b379439b8d85e3886d42fb28f7835edaeeac465582da14233564fb010c71425a59c9e1cbd46b4
@ -160,7 +155,6 @@ DIST pkg-config-0.3.32.crate 21370 BLAKE2B 74ded191f066bc223739b3d4afec58f23de57
DIST portable-atomic-1.11.1.crate 185506 BLAKE2B 953bb1f2059dc1d891305eb89945f1f6a172fa50972725aee499de72b5dd9b4ad8ccefe4e891183ff8e6b64f4d1bb45ec33b06e0f5af34c940f817b290f746d9 SHA512 4c037ae0b4aef43077bdbf803389bc078d963f20d023e2e1d339a54f67fa9b27c174e7c1b6eca8881ecf301e30c431632d2c0dcedfb5b19552892fac0f81e2e1
DIST portable-atomic-1.7.0.crate 145385 BLAKE2B 7d9622d636677e3adae0f909405090318a9d6189fc18683ed21074e9360f213b44c5213f3561e3dd1f642547c2c2e6682b9e1efa63243c1f12636bb11bd15dbe SHA512 0849edaa7a1f9ea66182443e31691e7839c857240916521bbd6009b5e692b13f5b315df36e656134651386bc50d895ecf6155a906750009514cad8bfc7e57fe2
DIST portable-atomic-util-0.2.4.crate 47043 BLAKE2B 6a8e122bb2b9eb8262e9eb790f336dbb602f6c086f8ac025740c043170360d5474af578b3842b06ec51535535de3f4d1b6753ec54a6871dd0396f5c1012b0bd4 SHA512 f2266e78576181123aaf68e7b5d3523a368fa8136d447bac68a08d65c7051dea677cea84491a1a03b9decb4704b2f9392574d68dda9427092a2ac92cfa0affe8
DIST ppv-lite86-0.2.19.crate 22498 BLAKE2B 1efbd76388380880d263d2a87869d0a3560f5ec89d3367e195f86db8db6155e38217ec40af95a5f84b84806ae51907316ddef8a2d44c8ad27967710edcd899d5 SHA512 e639830a030b35bfd123990a2228b8628a2ed0d1422c3922d5e6133f96b30742fb959919aa761299aef332d9318272cd57544f444fccf0efd7a9990cfcefc659
DIST ppv-lite86-0.2.20.crate 22478 BLAKE2B 9d68dc36d8148047d571c0147ed29f586f3c6ac9394b56bd955c8ae5bb18f5a8da5369809f7b8c3199074e23660325158c32c62e1bf69a16cb1f5da2a01f5df0 SHA512 6d171f63b42296f7765732fce3af7ea05d0d81f1541ffb3ad86e81210715ef4afe5bc9e58926e97e757aea6ff96a8012c8411eac78be0fd080898318ed21d7d1
DIST ppv-lite86-0.2.21.crate 22522 BLAKE2B 150b2ae019f296dc0a15090bcabcf4981bc58159d592b07da729565ef8976e3d1b4416381c6ecaac77874d8e259995254255c8831861ac20922b810753128cd4 SHA512 94710d5b25b67539cfa828476367849e1ecaca744f2e0429b48c05b47ec48cd57f950fb9845a361fbfd96f361ac00fd2d47cc27c584b79ce3d9d8fc133f5b7bc
DIST predicates-3.1.2.crate 23986 BLAKE2B db4209b491f82a1ef6147158fdf86c0bd8a059e61c4a1922dccba257e461be36e31d4a03440c2b80b3c7c49d612dec81fb76f648bd5837c481d93cc9ac5ede65 SHA512 50896189f39842ef424aebc12c2633112fda83eba1bdeaa3e6f398db1e28dca0cc7838948f25e67f6fceede1a91a1b0ede5d4dc4edac6da752e48c7a07bbe3ae
@ -192,7 +186,6 @@ DIST ratatui-0.29.0.crate 543514 BLAKE2B d5e7de30e0c7f077ea5a4d13ce5417ab5221e0a
DIST redox_syscall-0.2.16.crate 24012 BLAKE2B 9497a52044458b1435ea16e86ee072e379b6b11ee31602ea72d6b6072a4a99426f409c2e58108a4e9c36dc193fa49c83951e71f4fd4e158eafff18c594dc01ad SHA512 63b5d876baaf99f5cf737679bc6ac7a9e3d8a41aa93f5c59416ce7e3841e2513bff678773553cfe62fb452707f82acc384ea63aec932a31bf94679cd1caddd27
DIST redox_syscall-0.5.18.crate 30747 BLAKE2B b9507a055aa34178982f0b5861602d2e11e13c2604f905c9b747c39aa6c45f06e60cf5c9d17d914712a815fc5e9ad75bf648c300e7265fd4afbac0b0c207afa6 SHA512 69f1cfb215666f1243616366711dbd8cadd6bb411121f48f6e4ffd7b25479efa6f900dd072d7cc6e6fb8130d95cdb42f4c0cb4ba9e05b09b1fa676ca32932101
DIST redox_termios-0.1.3.crate 3240 BLAKE2B 3aa7360c9e982faf433b527605fab4cc01f74eac5f1f4698b5c7f43e5a7645fcddb39bd639c8f6935fb82db5a065630ee788fd8b111cca80be15db1a08d0b3fe SHA512 a221afea8eb1c7efe848e270a6ad5b65a97af945b4f64d3aa5346f5a61a9daaac1993446ddd78c1923b798e1659518856d7260d9d30651d91897850b0a1950d8
DIST regex-1.10.5.crate 253805 BLAKE2B 9f5418b577209051640c3614a98b15604a1e71144763a6f00caa7757f0ff67fd833a7d14fe9d6acef96386a2a4eb60cf5d490472e73fd62ca8bb0e78d4f9f125 SHA512 177fddb001e14281510e34070f88f8e5167278a46f1d93d9286d9606b7673346f504e4064d7ad53558e6988a400c728e33b663ab398fee12ae23fba7158da5fb
DIST regex-1.10.6.crate 253894 BLAKE2B 176cf6a1e86aa8a5004af5ab0d6cd4178135bdae3caeb6a8276b8739858c65e9ebcf23749398a5a91adcfee9cca3667b306c4adb6307acfe61dadba8c6f3eee4 SHA512 ec28961d226c944321d9953c42e43cf2d23b8ca0d72d6412e7b0f572c407aceb079bb82502d124af94d71d67c9e5e0c9f66ab9f31edf6023ff045ec37b770964
DIST regex-1.12.2.crate 163843 BLAKE2B 4e36124886e35c2e06ecf3310c32f45bb80fff978a99509abd7d7eb6378f81123819470c227d5c234fd6e3bc7a8e7baa331ee0ed3137f9256c76cb32413ecb7f SHA512 c459657944679350369462c3c7686dcdf412597f75bc13c450a131bfceebfe2cd1e1d7f95f0f55b4aa16bfc1acb5c777f344fcfd6a5927aa76b8a2d7aa954d3c
DIST regex-automata-0.4.13.crate 625250 BLAKE2B e8682eff5df93737430a783cd913265dd45a9692fc4623a956557cd7d6553f34eff731f6f3ec5fed5c0dc6b7f8f31236203ad9f459a998fede053d990d9faea6 SHA512 f76939dc573a88d17b4cf37fedfcdf95202171ca8607374a5c2bcdc515abd1ef9231376175c6cf11cc567eddda34e0c5f90ed1c592f2c5efbd1dee883954a932
@ -220,7 +213,6 @@ DIST serde-1.0.228.crate 83652 BLAKE2B d1909d671ea6d5c2eb4ce34ee4493ecaf665d4161
DIST serde_core-1.0.228.crate 63111 BLAKE2B 8a64e4627ad21a3d16dd37d53fb809d11171bf337ec16bb1223075cbf81b6b85cd1c8d19abadf42460d0fbea323e2f351eeb6ef823389d519121b74e68edb215 SHA512 43897e3a7ebdc85d81d1cb30cda8f0a11610f6f551529c8a21462c24fb83110652b462846aa3e1bed5fbf8b5d7927018845a524ee9e079e2c8acf2c687efd6c4
DIST serde_derive-1.0.204.crate 55871 BLAKE2B 8f0cdb244a820712d557a3273e505c4461f4d7db89e8394040b4c66ede787b6b38b4c9923b38959ab4042c9076b8af72008c0dd15ac93a0ecdeb99da8fb526ae SHA512 bbb2b5e60e2af5bc7528b937ffaf0d3ffd433dbd9cb2592c1e07090620309057e4f11cbd6112fc1d2c5557e1bb3c0f4d59eb06ff06fa021ec683ab880997140e
DIST serde_derive-1.0.228.crate 59605 BLAKE2B 166ee2f9ff9f7a0928d0a65a72db3d9226c377bca2a1771956e8ecd9c7faf0544673c9c21be2a5553e621b55c74c7b958052592a1cf6eb6427a2d4f3e3dc6bb8 SHA512 8bfdfeee10ee7ef0670972aa963ef63b13e8eb2c8a09b9e0b717f92551aa89b3dd2a0dcbae6ccf20a1caece07e6adb18f0db56fdac020e4e0281b0d24e376003
DIST shared_child-1.0.0.crate 8939 BLAKE2B dd7aa5bc4f87cab26cd0cd382fa00f42ae45ab6944e3367e355d19fd1007ded068642a35941e0cecc100120bcb1ea7d07d91bc36227261e8207b87c53de87a17 SHA512 d0e16cc7253271e6468659db0d7344c2d75772dd3428f686c49ce34bfea6ba8fa010b1ba83375241bf019e77c842001c6e1ab5096af54af03586e05c3f8fc476
DIST shared_child-1.0.1.crate 8967 BLAKE2B ff47cb9e567415976817eaa8ad7a229570036ff09214083746861eef76df7c897fee06e9ca1bec0b16e07cd6f9d7e0e6253a550e66be8dce65604f3681433158 SHA512 3596285e36724fefcbfcd8c877fd66e2179dbc47ad7ddf601ed793ed74df871eaccf15184f8355f3e355aa64583d6757872d9777864347d36922cc40b731c82a
DIST shared_child-1.1.1.crate 14191 BLAKE2B 905b72fce40712746c11119409f641697adb784859b3c13c6a342bc94db05a9c91a9c9df72cfa251de7fa4a254033d59c35459089a397b7e2a43fe33b7e21b7c SHA512 718c6ed1138f3cf2769815d504a2ed4a792defee66d3abaa65b46924e0151603bcfc81360ce451b1b8f1b3fe8f48144e046fb17e7c35ec3821c819b59c4ff384
DIST shared_thread-0.2.0.crate 6364 BLAKE2B 63e6804882db3afb83cc99a096d0ec89d423f3f9efdbc950da1cbde941b8391a05f3ed086592e18e6e32e03ae13952f9249b0c37478e791965c232c95cfb13c9 SHA512 e69dd85b70c7570fd05e38ee29d0f86b357e073c4b84a100d8c5e71b7c343cdf44c74c21b6fe1392703fc4745737be2a27959cc70fb6938a8ef36179b6b76a10
@ -236,15 +228,12 @@ DIST strum_macros-0.26.4.crate 27531 BLAKE2B 7f7d57c957a1591054288fcae6590a5e669
DIST syn-1.0.109.crate 237611 BLAKE2B e827445d00c79a8eeb91eacde472f1987addd6ce9e1df95d7abf6446a77ff4173a8006845f3ae71c1da47193cfb72e0ead9a6d6bad2573be12c17e90735d9ad9 SHA512 12816b9e8cf984024b2fbce9f0ae14cf94d4d2c06f08cc54fb793ce78770bb4cc1288eb7df0ba5e8e937756e1e8e295c53fe07a0c5dde1ea8ddba03b6203b37d
DIST syn-2.0.107.crate 301716 BLAKE2B 76ae71e40724b7ab0912df8c5d9ff571a21b6da1ed8f849395ca8565535c245894bbb1927952fa2c81891ce08d5e19336138f80c6374ca4a46c8bc8ed1ff53c7 SHA512 6c65589ad86a01307defcbfcb62d95b342135ad22636b899195784e56d476fe5eb5c7f2b54f827166e573f0a4af0ca834f4a107700417fd68edce7e423467f4a
DIST syn-2.0.72.crate 267069 BLAKE2B b0b979f78937a10a6db45f96d5d93c595427a4e158d658a2186419d89b219a4a405ade488d88d9ebdbd605ce4b706aba7088ab39a77294f3cf9847bf032d8f91 SHA512 c3d26bf9787555bc6fd8bd789855d252e80ad28a413593e13bad174adf86087ff195a6b4227bdeb6d1a1c87b0af8e965d6f2d04b8d45e7383b6de49990b92e89
DIST tempfile-3.10.1.crate 33653 BLAKE2B 819b183e7840f70270883ee8b6a91fa09861c3112eaadc65007199885abe099bd593e1cdc4d9ab48c23490a6d484cad9bf0e80cf4e718c369cc2418b72eaf09c SHA512 bac7515b85b0d01ea914b527f0fadd3a4d8e77c9eabe786977d2625d8a3e91decaec502dd15bab4d49a43597fa7cf7660fff4be1b043112d13b542a72443bf39
DIST tempfile-3.11.0.crate 34153 BLAKE2B 3a89580e05600ff2ef5637d2ed76ad8f1a769f6dae40cbd23f7bc2cb9d0807d03713ce1571df54c866c8fd9a4fb073990e4e98cc8ffee33aa4d8343c2d39733c SHA512 47d4c48c4f90d116a2f7d5ebf29ea623fb0a0fbfb1192aaaa53a83218ac910b6c836d6d4d8233b07d06e14de70fbf30d243152b7ac22a03d180905c53b6ad9e6
DIST tempfile-3.23.0.crate 43063 BLAKE2B f799368de517d83a5e42505438565c9d16217300d5c5f552e2789de4edcd493474d1d9a9e9cfdb88a776f26f403a89e0f436308b2ae7535d9b377b7c652f7cae SHA512 8e9f84400f714209eb713af5960d1de501c10520817299f0ba2fd53a7c5f0931b60d1053c2c84820aa627aa94bdefa1b0e82c787784b1960170930f0ed2d8753
DIST termion-1.5.6.crate 22677 BLAKE2B b918dc82bfa370bb9662bace34211bc7afa03a042dbd25f4456a7e3859521d4f32ab755780e58070f29eb7903f3b4f8129eb9447cda953b9190f9df3b7eb3aea SHA512 228b6fa7e2f280d6bfc7cef77e7a1d0d8f597178e66af0bde1b1fb6553857b511ba8a6786165815aac6d8a082fd37191f4ea35a47f1e1182f7f2c6086eb34a8c
DIST termion-4.0.5.crate 24766 BLAKE2B 0622af95cdeb86ba569eac27e2837c810e5978da5bed214a873b4fedaf25a033d53bd8e9b901d0a8c60763bfef28646987275c8d00d56ae03cce0ff8fd3604e8 SHA512 2577813b9b1ca4f4b669f4d79d46f44bfd53152056b78e26ce4c972dae09a7550264412be2d5932f262a7c178ce4be7e54adaf2c4853816883818f0805f77ade
DIST termtree-0.4.1.crate 4557 BLAKE2B d4300b0e6e908c519a0a76f5e08167f4467f428b2926e7739614cef5d3e294dfac15ae8576f7011a852745713c16da93346660ff96520a2bb90a4dd4c23d889c SHA512 ddbe0d3ddd79b182732359f47958ca32aa351d10b1e7d5f6456700b851aa2b5314ce005e1fd120a248b676f219fbd68039cefc071d92c5b5477d053bb6e29062
DIST termtree-0.5.1.crate 8498 BLAKE2B ebe1face80741908e28d3fbf828bd0a7a70bb317f4532fe38ac9b6adae898a7032f751718a39300ecca8c7bf0ea6cca028c02c93c7ce7a645d67656318e90172 SHA512 43d92132cef6d352c6c0190ce4a688d7cffb61ee86dbc6b49ba1f4c404661f9b329331198063d913ae52b2d4c69e6a2d9f5cd62886894c468093abd8604f0125
DIST thin-provisioning-tools-0.9.0.tar.gz 500998 BLAKE2B ac269fb6dfd1baf1572da27582ac2cd763b07aaac130a9467d05581e7a0ba1309d7dbf4c6095407111667e57af2e8183318d558ed23853f9c84b9c151c0878d9 SHA512 e1796fb3948847d72ca8247cae58017507c0a847a00201b93668eeb8fbfea4107c4c2affa5c211c149798a89b10474e83d2bd61a5545a668299be97aed591e0f
DIST thin-provisioning-tools-1.0.14.tar.gz 418406 BLAKE2B 5779a6bfb521a08ebc495ff74ced0f8515e3f02f3bb2a67de689930ebef98f0cd4af1f1c2cf3bb9b9f9ff8cf0ba9b60b9303fbd01e11917dba3483aaacc1ec54 SHA512 a421ebf732f6595dcfec93ae14671cf9e5475b3289370209a658c77fe0760bbfc316c023035775608ced217bf23c535010af97062875178558c6b922c0cd0ff3
DIST thin-provisioning-tools-1.1.0.tar.gz 418825 BLAKE2B 8bd959bb1d5c70feca306ec41450c34c4da830ca7e68d3d3c632971323e492f9e4fbc63e718c05c50caeb64bfe91fe59306275179852f82bfb397fefb87d0709 SHA512 8cf3953743334b5a34504695757fa2de5a5fb5bdb8c7aed859995154fc004f52c3ef041558d307a2309c2de8dcdcbd8a0537bd3408fd78c7ff2f641f28944c1e
DIST thin-provisioning-tools-1.3.0.tar.gz 471090 BLAKE2B 5a36385249459d87d3d1e0d2de87392f668a9f82cd8d73f370137f1785ef0ca9fa8fca1094fa0f25ab97f92c723553fb54ff71ac846783503b19ce543f4bef3d SHA512 84e364df240a43fea44edfe14cf428d79d1301891b2482599229e125768912127922377139c2117db50a5370fb08c0f52d589d11b6a90673af2d242ff4ef7920
DIST thiserror-1.0.63.crate 21537 BLAKE2B eacab5745d948416bde165d768f55c10c132572052db405ae3dd3e6e3b5ce41f36d574192ae68fecf6002ae5b14fd0aa135fe15e1614f3b51a294d5edc67c9ac SHA512 d5c2360075947cc0fff3253b5532f03f3102d6c9ef52dfeb3b400771116937e466a62ce67ccdf91532bf096f4882322522349a727588fd87b932326c8e758753

View File

@ -1,11 +0,0 @@
--- a/Makefile.in
+++ b/Makefile.in
@@ -173,7 +173,7 @@
CXXFLAGS+=@CXX_STRERROR_FLAG@
CXXFLAGS+=@LFS_FLAGS@
INCLUDES+=-I$(TOP_BUILDDIR) -I$(TOP_DIR) -I$(TOP_DIR)/thin-provisioning
-LIBS:=-laio -lexpat -lboost_iostreams -ldl
+LIBS:=-laio -lexpat -ldl
ifeq ("@DEVTOOLS@", "yes")
LIBS+=-lncurses

View File

@ -1,34 +0,0 @@
--- thin-provisioning-tools-0.7.0/Makefile.in
+++ thin-provisioning-tools-0.7.0/Makefile.in
@@ -142,9 +142,9 @@
TOP_DIR:=@top_srcdir@
TOP_BUILDDIR:=@top_builddir@
-CFLAGS+=-g -Wall -O3 -fPIC
+CFLAGS+=-fPIC
CFLAGS+=@LFS_FLAGS@
-CXXFLAGS+=-g -Wall -fPIC -fno-strict-aliasing -std=c++11
+CXXFLAGS+=-fPIC -fno-strict-aliasing -std=c++11
ifeq ("@DEVTOOLS@", "yes")
CXXFLAGS+=-DDEV_TOOLS
--- thin-provisioning-tools-0.7.0/unit-tests/Makefile.in
+++ thin-provisioning-tools-0.7.0/unit-tests/Makefile.in
@@ -25,7 +25,7 @@
-Wno-unused-local-typedefs
GMOCK_LIBS=\
- -Llib -lpdata -lgmock -lpthread -laio
+ -Llib -lpdata -lgmock -lpthread -laio -lgtest
GMOCK_DEPS=\
$(wildcard $(GMOCK_DIR)/googlemock/include/*.h) \
@@ -83,7 +83,7 @@
sed 's,\([^ :]*\)\.o[ :]*,\1.o \1.gmo $* : Makefile ,g' < $*.$$$$ > $*.d; \
$(RM) $*.$$$$
-unit-tests/unit_tests: $(TEST_OBJECTS) lib/libgmock.a lib/libpdata.a
+unit-tests/unit_tests: $(TEST_OBJECTS) lib/libpdata.a
@echo " [LD] $<"
$(V)g++ $(CXXFLAGS) $(LDFLAGS) -o $@ $(TEST_OBJECTS) $(LIBS) $(GMOCK_LIBS) $(LIBEXPAT)

View File

@ -1,622 +0,0 @@
Bug: https://bugs.gentoo.org/911775
--- a/base/base64.cc
+++ b/base/base64.cc
@@ -68,13 +68,13 @@
throw std::runtime_error("internal error, in split");
}
- optional<unsigned> char_to_index(char c) {
+ boost::optional<unsigned> char_to_index(char c) {
// FIXME: very slow
for (unsigned i = 0; i < 64; i++)
if (table_[i] == c)
- return optional<unsigned>(i);
+ return boost::optional<unsigned>(i);
- return optional<unsigned>();
+ return boost::optional<unsigned>();
}
decoded_or_error success(vector<unsigned char> const &decoded) {
@@ -92,7 +92,7 @@
}
decoded_or_error decode_quad(char c1, char c2, char c3, char c4) {
- typedef optional<unsigned> oi;
+ typedef boost::optional<unsigned> oi;
unsigned char d1, d2, d3;
vector<unsigned char> decoded;
--- a/base/run.h
+++ b/base/run.h
@@ -1,7 +1,7 @@
#ifndef BASE_DATA_RANGE_H
#define BASE_DATA_RANGE_H
-#include <boost/optional.hpp>
+#include <boost/optional/optional_io.hpp>
#include <ostream>
//----------------------------------------------------------------
--- a/block-cache/copier.cc
+++ b/block-cache/copier.cc
@@ -90,19 +90,19 @@
copier::wait_complete()
{
if (complete_.empty()) {
- return optional<copy_op>();
+ return boost::optional<copy_op>();
} else {
auto op = complete_.front();
complete_.pop_front();
- return optional<copy_op>(op);
+ return boost::optional<copy_op>(op);
}
}
void
copier::wait_(unsigned &micro)
{
- optional<io_engine::wait_result> mp;
+ boost::optional<io_engine::wait_result> mp;
if (!pending())
return;
--- a/block-cache/io_engine.cc
+++ b/block-cache/io_engine.cc
@@ -125,13 +125,13 @@
return r == 1;
}
-optional<io_engine::wait_result>
+boost::optional<io_engine::wait_result>
aio_engine::wait()
{
return wait_(NULL);
}
-optional<io_engine::wait_result>
+boost::optional<io_engine::wait_result>
aio_engine::wait(unsigned &microsec)
{
timespec start = micro_to_ts(microsec);
@@ -156,7 +156,7 @@
}
if (r == 0) {
- return optional<wait_result>();
+ return boost::optional<wait_result>();
}
iocb *cb = reinterpret_cast<iocb *>(event.obj);
@@ -164,19 +164,19 @@
if (event.res == cb->u.c.nbytes) {
cbs_.free(cb);
- return optional<wait_result>(make_pair(true, context));
+ return boost::optional<wait_result>(make_pair(true, context));
} else if (static_cast<int>(event.res) < 0) {
cbs_.free(cb);
- return optional<wait_result>(make_pair(false, context));
+ return boost::optional<wait_result>(make_pair(false, context));
} else {
cbs_.free(cb);
- return optional<wait_result>(make_pair(false, context));
+ return boost::optional<wait_result>(make_pair(false, context));
}
// shouldn't get here
- return optional<wait_result>(make_pair(false, 0));
+ return boost::optional<wait_result>(make_pair(false, 0));
}
struct timespec
--- a/caching/cache_restore.cc
+++ b/caching/cache_restore.cc
@@ -40,8 +40,8 @@
override_version(1) {
}
- optional<string> input;
- optional<string> output;
+ boost::optional<string> input;
+ boost::optional<string> output;
uint32_t metadata_version;
bool clean_shutdown;
@@ -154,11 +154,11 @@
return 0;
case 'i':
- fs.input = optional<string>(string(optarg));
+ fs.input = boost::optional<string>(string(optarg));
break;
case 'o':
- fs.output = optional<string>(string(optarg));
+ fs.output = boost::optional<string>(string(optarg));
break;
case 'q':
--- a/caching/cache_writeback.cc
+++ b/caching/cache_writeback.cc
@@ -150,7 +150,7 @@
}
void check_for_completed_copies(bool block = false) {
- optional<copy_op> mop;
+ boost::optional<copy_op> mop;
do {
if (block)
--- a/era/era_invalidate.cc
+++ b/era/era_invalidate.cc
@@ -27,7 +27,7 @@
}
bool metadata_snapshot_;
- optional<uint32_t> era_threshold_;
+ boost::optional<uint32_t> era_threshold_;
};
//--------------------------------
@@ -88,7 +88,7 @@
walk_writeset_tree(md.tm_, *md.writeset_tree_, v, dv);
}
- void mark_blocks_since(metadata const &md, optional<uint32_t> const &threshold, set<uint32_t> &result) {
+ void mark_blocks_since(metadata const &md, boost::optional<uint32_t> const &threshold, set<uint32_t> &result) {
if (!threshold)
// Can't get here, just putting in to pacify the compiler
throw std::runtime_error("threshold not set");
--- a/era/era_restore.cc
+++ b/era/era_restore.cc
@@ -28,8 +28,8 @@
: quiet(false) {
}
- optional<string> input;
- optional<string> output;
+ boost::optional<string> input;
+ boost::optional<string> output;
bool quiet;
};
@@ -99,11 +99,11 @@
return 0;
case 'i':
- fs.input = optional<string>(string(optarg));
+ fs.input = boost::optional<string>(string(optarg));
break;
case 'o':
- fs.output = optional<string>(string(optarg));
+ fs.output = boost::optional<string>(string(optarg));
break;
case 'q':
--- a/Makefile.in
+++ b/Makefile.in
@@ -162,7 +162,7 @@
TOP_BUILDDIR:=@top_builddir@
CFLAGS+=-fPIC
CFLAGS+=@LFS_FLAGS@
-CXXFLAGS+=-fPIC -fno-strict-aliasing -std=c++11
+CXXFLAGS+=-fPIC -fno-strict-aliasing
ifeq ("@DEVTOOLS@", "yes")
CXXFLAGS+=-DDEV_TOOLS
--- a/persistent-data/hex_dump.h
+++ b/persistent-data/hex_dump.h
@@ -19,6 +19,7 @@
#ifndef HEX_DUMP_H
#define HEX_DUMP_H
+#include <cstddef>
#include <iosfwd>
//----------------------------------------------------------------
--- a/persistent-data/transaction_manager.cc
+++ b/persistent-data/transaction_manager.cc
@@ -48,7 +48,7 @@
transaction_manager::write_ref
transaction_manager::new_block(validator v)
{
- optional<block_address> mb = sm_->new_block();
+ boost::optional<block_address> mb = sm_->new_block();
if (!mb)
throw runtime_error("transaction_manager::new_block() couldn't allocate new block");
@@ -67,7 +67,7 @@
return make_pair(bm_->write_lock(orig, v), need_inc);
read_ref src = bm_->read_lock(orig, v);
- optional<block_address> mb = sm_->new_block();
+ boost::optional<block_address> mb = sm_->new_block();
if (!mb)
throw runtime_error("transaction_manager::shadow() couldn't allocate new block");
--- a/thin-provisioning/metadata_checker.cc
+++ b/thin-provisioning/metadata_checker.cc
@@ -182,7 +182,7 @@
error_state examine_mapping_tree_(transaction_manager::ptr tm,
superblock_detail::superblock const &sb,
nested_output &out,
- optional<space_map::ptr> data_sm,
+ boost::optional<space_map::ptr> data_sm,
bool ignore_non_fatal) {
out << "examining mapping tree" << end_message();
nested_output::nest _ = out.push();
@@ -213,7 +213,7 @@
error_state examine_mapping_tree(transaction_manager::ptr tm,
superblock_detail::superblock const &sb,
nested_output &out,
- optional<space_map::ptr> data_sm,
+ boost::optional<space_map::ptr> data_sm,
bool ignore_non_fatal) {
error_state err = examine_devices_tree_(tm, sb, out, ignore_non_fatal);
err << examine_mapping_tree_(tm, sb, out, data_sm, ignore_non_fatal);
@@ -403,7 +403,7 @@
// until that there's a better solution in space
// and time complexity
space_map::ptr data_sm{open_disk_sm(*tm, &sb.data_space_map_root_)};
- optional<space_map::ptr> core_sm;
+ boost::optional<space_map::ptr> core_sm;
err_ << examine_data_mappings(tm, sb, options_.data_mapping_opts_, out_, core_sm);
if (err_ == FATAL)
@@ -418,7 +418,7 @@
err_ << compare_space_maps(data_sm, *core_sm, out_);
} else
err_ << examine_data_mappings(tm, sb, options_.data_mapping_opts_, out_,
- optional<space_map::ptr>());
+ boost::optional<space_map::ptr>());
metadata_checked_ = true;
}
@@ -509,7 +509,7 @@
superblock_detail::superblock const &sb,
check_options::data_mapping_options option,
nested_output &out,
- optional<space_map::ptr> data_sm) {
+ boost::optional<space_map::ptr> data_sm) {
error_state err = NO_ERROR;
switch (option) {
--- a/thin-provisioning/metadata_dumper.cc
+++ b/thin-provisioning/metadata_dumper.cc
@@ -125,7 +125,7 @@
};
// See comment on get_map_ids
- optional<set<uint32_t> >
+ boost::optional<set<uint32_t> >
get_dev_ids(transaction_manager &tm, block_address root) {
d_thin_id_extractor de;
fatal_details_damage dv;
@@ -134,7 +134,7 @@
try {
walk_device_tree(tree, de, dv, true);
} catch (...) {
- return optional<set<uint32_t>>();
+ return boost::optional<set<uint32_t>>();
}
return de.dd_;
@@ -150,7 +150,7 @@
// The walk will do more sanity checks than we did when scanning the metadata, so
// it's possible that it will fail and throw a metadata damage exception.
- optional<set<uint32_t> >
+ boost::optional<set<uint32_t> >
get_map_ids(transaction_manager &tm, block_address root) {
m_thin_id_extractor me;
fatal_mapping_damage mv;
@@ -159,7 +159,7 @@
try {
walk_mapping_tree(tree, me, mv, true);
} catch (...) {
- return optional<set<uint32_t>>();
+ return boost::optional<set<uint32_t>>();
}
return me.dd_;
@@ -288,7 +288,7 @@
uint32_t time;
};
- optional<roots>
+ boost::optional<roots>
find_best_roots(transaction_manager &tm) {
vector<node_info> mapping_roots;
vector<node_info> device_roots;
@@ -334,7 +334,7 @@
if (pairs.size())
return mk_roots(pairs[0]);
else
- return optional<roots>();
+ return boost::optional<roots>();
}
private:
@@ -623,12 +623,12 @@
}
}
- optional<node_info> lookup_info(block_address b) const {
+ boost::optional<node_info> lookup_info(block_address b) const {
auto it = infos_.find(b);
if (it == infos_.end())
- return optional<node_info>();
+ return boost::optional<node_info>();
- return optional<node_info>(it->second);
+ return boost::optional<node_info>(it->second);
}
block_manager &bm_;
@@ -846,16 +846,16 @@
return sb;
}
- optional<superblock_detail::superblock>
+ boost::optional<superblock_detail::superblock>
maybe_read_superblock(block_manager::ptr bm)
{
try {
auto sb = read_superblock(bm);
- return optional<superblock_detail::superblock>(sb);
+ return boost::optional<superblock_detail::superblock>(sb);
} catch (...) {
}
- return optional<superblock_detail::superblock>();
+ return boost::optional<superblock_detail::superblock>();
}
void
--- a/thin-provisioning/thin_dump.cc
+++ b/thin-provisioning/thin_dump.cc
@@ -50,7 +50,7 @@
string format;
bool repair;
bool use_metadata_snap;
- optional<block_address> snap_location;
+ boost::optional<block_address> snap_location;
};
metadata::ptr open_metadata(string const &path, struct flags &flags) {
--- a/thin-provisioning/thin_ls.cc
+++ b/thin-provisioning/thin_ls.cc
@@ -238,7 +238,7 @@
void pass1(metadata::ptr md, mapping_set &mappings, ::uint64_t dev_id) {
dev_tree::key k = {dev_id};
- optional<::uint64_t> dev_root = md->mappings_top_level_->lookup(k);
+ boost::optional<::uint64_t> dev_root = md->mappings_top_level_->lookup(k);
if (!dev_root)
throw runtime_error("couldn't find mapping tree root");
@@ -254,7 +254,7 @@
block_address count_exclusives(metadata::ptr md, mapping_set const &mappings, ::uint64_t dev_id) {
dev_tree::key k = {dev_id};
- optional<::uint64_t> dev_root = md->mappings_top_level_->lookup(k);
+ boost::optional<::uint64_t> dev_root = md->mappings_top_level_->lookup(k);
if (!dev_root)
throw runtime_error("couldn't find mapping tree root");
@@ -324,7 +324,7 @@
metadata::ptr md;
if (flags.use_metadata_snap)
- md.reset(new metadata(bm, optional<block_address>()));
+ md.reset(new metadata(bm, boost::optional<block_address>()));
else
md.reset(new metadata(bm));
--- a/unit-tests/bitset_t.cc
+++ b/unit-tests/bitset_t.cc
@@ -60,14 +60,14 @@
tm_(bm_, sm_) {
}
- bitset::ptr
+ persistent_data::bitset::ptr
create_bitset() {
- return bitset::ptr(new bitset(tm_));
+ return persistent_data::bitset::ptr(new persistent_data::bitset(tm_));
}
- bitset::ptr
+ persistent_data::bitset::ptr
open_bitset(block_address root, unsigned count) {
- return bitset::ptr(new bitset(tm_, root, count));
+ return persistent_data::bitset::ptr(new persistent_data::bitset(tm_, root, count));
}
private:
@@ -81,7 +81,7 @@
TEST_F(BitsetTests, create_empty_bitset)
{
- bitset::ptr bs = create_bitset();
+ persistent_data::bitset::ptr bs = create_bitset();
ASSERT_THROW(bs->get(0), runtime_error);
}
@@ -89,7 +89,7 @@
{
unsigned const COUNT = 100000;
- bitset::ptr bs = create_bitset();
+ persistent_data::bitset::ptr bs = create_bitset();
bs->grow(COUNT, false);
for (unsigned i = 0; i < COUNT; i++)
@@ -100,7 +100,7 @@
{
unsigned const COUNT = 100000;
- bitset::ptr bs = create_bitset();
+ persistent_data::bitset::ptr bs = create_bitset();
bs->grow(COUNT, true);
for (unsigned i = 0; i < COUNT; i++)
@@ -111,7 +111,7 @@
{
unsigned const COUNT = 100000;
- bitset::ptr bs = create_bitset();
+ persistent_data::bitset::ptr bs = create_bitset();
bs->grow(COUNT, false);
ASSERT_THROW(bs->grow(COUNT / 2, false), runtime_error);
}
@@ -120,7 +120,7 @@
{
unsigned const COUNT = 100000;
unsigned const STEP = 37;
- bitset::ptr bs = create_bitset();
+ persistent_data::bitset::ptr bs = create_bitset();
vector<unsigned> chunks;
unsigned c;
@@ -150,7 +150,7 @@
TEST_F(BitsetTests, set_out_of_bounds_throws)
{
unsigned const COUNT = 100000;
- bitset::ptr bs = create_bitset();
+ persistent_data::bitset::ptr bs = create_bitset();
ASSERT_THROW(bs->set(0, true), runtime_error);
bs->grow(COUNT, true);
@@ -160,7 +160,7 @@
TEST_F(BitsetTests, set_works)
{
unsigned const COUNT = 100000;
- bitset::ptr bs = create_bitset();
+ persistent_data::bitset::ptr bs = create_bitset();
bs->grow(COUNT, true);
for (unsigned i = 0; i < COUNT; i += 7)
@@ -176,7 +176,7 @@
block_address root;
{
- bitset::ptr bs = create_bitset();
+ persistent_data::bitset::ptr bs = create_bitset();
bs->grow(COUNT, true);
for (unsigned i = 0; i < COUNT; i += 7)
@@ -186,7 +186,7 @@
}
{
- bitset::ptr bs = open_bitset(root, COUNT);
+ persistent_data::bitset::ptr bs = open_bitset(root, COUNT);
for (unsigned i = 0; i < COUNT; i++)
ASSERT_THAT(bs->get(i), Eq(i % 7 ? true : false));
}
@@ -198,7 +198,7 @@
block_address root;
{
- bitset::ptr bs = create_bitset();
+ persistent_data::bitset::ptr bs = create_bitset();
bs->grow(COUNT, true);
for (unsigned i = 0; i < COUNT; i += 7)
@@ -211,7 +211,7 @@
}
{
- bitset::ptr bs = open_bitset(root, COUNT);
+ persistent_data::bitset::ptr bs = open_bitset(root, COUNT);
bitset_checker c(COUNT, 7);
bs->walk_bitset(c);
}
--- a/unit-tests/copier_t.cc
+++ b/unit-tests/copier_t.cc
@@ -32,23 +32,27 @@
namespace {
unsigned const BLOCK_SIZE = 64u;
using wait_result = io_engine::wait_result;
+}
- ostream &operator <<(ostream &out, optional<wait_result> const &mwr) {
+namespace boost {
+ ostream &operator <<(ostream &out, boost::optional<wait_result> const &mwr) {
if (mwr) {
out << "Just[wait_result[" << mwr->first << ", " << mwr->second << "]]";
} else
out << "Nothing";
return out;
}
+}
+namespace {
class io_engine_mock : public io_engine {
public:
MOCK_METHOD3(open_file, handle(string const &, mode, sharing));
MOCK_METHOD1(close_file, void(handle));
MOCK_METHOD6(issue_io, bool(handle, dir, sector_t, sector_t, void *, unsigned));
- MOCK_METHOD0(wait, optional<wait_result>());
- MOCK_METHOD1(wait, optional<wait_result>(unsigned &));
+ MOCK_METHOD0(wait, boost::optional<wait_result>());
+ MOCK_METHOD1(wait, boost::optional<wait_result>(unsigned &));
};
class CopierTests : public Test {
@@ -72,8 +76,8 @@
BLOCK_SIZE, 1 * 1024 * 1024));
}
- static optional<wait_result> make_wr(bool success, unsigned context) {
- return optional<wait_result>(wait_result(success, context));
+ static boost::optional<wait_result> make_wr(bool success, unsigned context) {
+ return boost::optional<wait_result>(wait_result(success, context));
}
void issue_successful_op(copier &c, copy_op &op, unsigned context) {
@@ -258,7 +262,7 @@
WillOnce(Return(true));
EXPECT_CALL(engine_, wait(micro)).
- WillOnce(DoAll(SetArgReferee<0>(0u), Return(optional<wait_result>())));
+ WillOnce(DoAll(SetArgReferee<0>(0u), Return(boost::optional<wait_result>())));
auto mop = c->wait(micro);
ASSERT_FALSE(mop);
--- a/unit-tests/rolling_hash_t.cc
+++ b/unit-tests/rolling_hash_t.cc
@@ -127,10 +127,10 @@
unsigned min = 100000, max = 0;
bytes bs = random_bytes(1024 * 1024 * 100);
- vector<unsigned> counts(window_size_, 0);
+ vector<unsigned> counts(window_size_ + 1, 0);
for (unsigned i = 0; i < bs.size(); i++) {
- optional<unsigned> b = h_.step(bs[i]);
+ boost::optional<unsigned> b = h_.step(bs[i]);
if (b) {
counts[*b]++;
--- a/unit-tests/span_iterator_t.cc
+++ b/unit-tests/span_iterator_t.cc
@@ -81,7 +81,9 @@
base::run_set<block_address> forbidden;
};
+}
+namespace boost {
ostream &operator <<(ostream &out, maybe_span const &m) {
out << "maybe_span[";
if (m)

View File

@ -1,25 +0,0 @@
From f912f6630eada34dcfb1320bb46b02d149c32ad4 Mon Sep 17 00:00:00 2001
From: Gwendal Grignou <gwendal@chromium.org>
Date: Wed, 28 Jun 2023 16:08:41 -0700
Subject: [PATCH] [base] Never use gcc directly
---
Makefile.in | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/Makefile.in b/Makefile.in
index b1fd4aa..342daf7 100644
--- a/Makefile.in
+++ b/Makefile.in
@@ -363,7 +363,7 @@ LIBFT_OBJECTS=$(subst .c,.o,$(LIBFT_SOURCE))
lib/libft.so: $(LIBFT_OBJECTS)
@echo " [LD]" $@
- $(V) gcc -shared -o $@ $+ -laio
+ $(V) $(CXX) $(CXXFLAGS) $(LDFLAGS) -shared -o $@ $+ -laio
.PHONEY: functional-test unit-test
--
2.41.0.255.g8b1d071c50-goog

View File

@ -1,66 +0,0 @@
From 9f3823c97dc0b5d4a94a6179d45a3b45c045cff8 Mon Sep 17 00:00:00 2001
From: Ming-Hung Tsai <mtsai@redhat.com>
Date: Wed, 12 Aug 2020 23:25:24 +0800
Subject: [PATCH] [metadata_checker] Rename function to reflect command line
changes
---
thin-provisioning/metadata_checker.cc | 6 +++---
thin-provisioning/metadata_checker.h | 2 +-
thin-provisioning/thin_check.cc | 2 +-
3 files changed, 5 insertions(+), 5 deletions(-)
diff --git a/thin-provisioning/metadata_checker.cc b/thin-provisioning/metadata_checker.cc
index e81e22c..0b26eca 100644
--- a/thin-provisioning/metadata_checker.cc
+++ b/thin-provisioning/metadata_checker.cc
@@ -603,8 +603,9 @@ void check_options::set_ignore_non_fatal() {
ignore_non_fatal_ = true;
}
-void check_options::set_fix_metadata_leaks() {
+void check_options::set_auto_repair() {
fix_metadata_leaks_ = true;
+ clear_needs_check_ = true;
}
void check_options::set_clear_needs_check() {
@@ -650,8 +651,7 @@ thin_provisioning::check_metadata(std::string const &path,
checker.check();
if (check_opts.fix_metadata_leaks_)
checker.fix_metadata_leaks(check_opts.open_transaction_);
- if (check_opts.fix_metadata_leaks_ ||
- check_opts.clear_needs_check_)
+ if (check_opts.clear_needs_check_)
checker.clear_needs_check_flag();
return checker.get_status();
diff --git a/thin-provisioning/metadata_checker.h b/thin-provisioning/metadata_checker.h
index 5569d27..b4afbdc 100644
--- a/thin-provisioning/metadata_checker.h
+++ b/thin-provisioning/metadata_checker.h
@@ -45,7 +45,7 @@ namespace thin_provisioning {
void set_override_mapping_root(bcache::block_address b);
void set_metadata_snap();
void set_ignore_non_fatal();
- void set_fix_metadata_leaks();
+ void set_auto_repair();
void set_clear_needs_check();
bool use_metadata_snap_;
diff --git a/thin-provisioning/thin_check.cc b/thin-provisioning/thin_check.cc
index 60f7838..e3c9db3 100644
--- a/thin-provisioning/thin_check.cc
+++ b/thin-provisioning/thin_check.cc
@@ -166,7 +166,7 @@ thin_check_cmd::run(int argc, char **argv)
case 6:
// auto-repair
- fs.check_opts.set_fix_metadata_leaks();
+ fs.check_opts.set_auto_repair();
break;
default:
--
2.41.0.255.g8b1d071c50-goog

View File

@ -1,187 +0,0 @@
From 1fe8a0dbde9f5e004b11430a9097a61b327967fe Mon Sep 17 00:00:00 2001
From: Ming-Hung Tsai <mtsai@redhat.com>
Date: Fri, 21 Aug 2020 18:26:48 +0800
Subject: [PATCH] [thin_check] Allow using --clear-needs-check and
--skip-mappings together
Although it is not recommended to clear the flag without a full
examination, however, the usage has been documented as an approach
to reduce lvchange run time [1]. For the purpose of backward
compatibility and avoiding boot failure after upgrading thin_check [2],
the limitation is now removed.
[1] https://wiki.archlinux.org/index.php/LVM#Thinly-provisioned_root_volume_device_times_out
[2] Community feedback on previous commit:
https://github.com/jthornber/thin-provisioning-tools/commit/b278f4f
---
tests/thin_check.rs | 18 +++++--
thin-provisioning/metadata_checker.cc | 71 ++++++++++++++-------------
thin-provisioning/metadata_checker.h | 3 ++
3 files changed, 53 insertions(+), 39 deletions(-)
diff --git a/thin-provisioning/metadata_checker.cc b/thin-provisioning/metadata_checker.cc
index 0b26eca..a398ce8 100644
--- a/thin-provisioning/metadata_checker.cc
+++ b/thin-provisioning/metadata_checker.cc
@@ -371,7 +371,8 @@ namespace {
out_(cerr, 2),
info_out_(cout, 0),
expected_rc_(true), // set stop on the first error
- err_(NO_ERROR) {
+ err_(NO_ERROR),
+ metadata_checked_(false) {
if (output_opts == OUTPUT_QUIET) {
out_.disable();
@@ -381,6 +382,22 @@ namespace {
sb_location_ = get_superblock_location();
}
+ void check_and_repair() {
+ check();
+ if (options_.fix_metadata_leaks_)
+ fix_metadata_leaks(options_.open_transaction_);
+ if (options_.clear_needs_check_)
+ clear_needs_check_flag();
+ }
+
+ bool get_status() const {
+ if (options_.ignore_non_fatal_)
+ return (err_ == FATAL) ? false : true;
+
+ return (err_ == NO_ERROR) ? true : false;
+ }
+
+ private:
void check() {
block_manager::ptr bm = open_bm(path_, block_manager::READ_ONLY,
!options_.use_metadata_snap_);
@@ -419,10 +436,12 @@ namespace {
} else
err_ << examine_data_mappings(tm, sb, options_.data_mapping_opts_, out_,
optional<space_map::ptr>());
+
+ metadata_checked_ = true;
}
bool fix_metadata_leaks(bool open_transaction) {
- if (!verify_preconditions_before_fixing()) {
+ if (!metadata_checked_) {
out_ << "metadata has not been fully examined" << end_message();
return false;
}
@@ -458,7 +477,7 @@ namespace {
}
bool clear_needs_check_flag() {
- if (!verify_preconditions_before_fixing()) {
+ if (!metadata_checked_) {
out_ << "metadata has not been fully examined" << end_message();
return false;
}
@@ -480,14 +499,6 @@ namespace {
return true;
}
- bool get_status() const {
- if (options_.ignore_non_fatal_)
- return (err_ == FATAL) ? false : true;
-
- return (err_ == NO_ERROR) ? true : false;
- }
-
- private:
block_address
get_superblock_location() {
block_address sb_location = superblock_detail::SUPERBLOCK_LOCATION;
@@ -545,19 +556,6 @@ namespace {
return err;
}
- bool verify_preconditions_before_fixing() const {
- if (options_.use_metadata_snap_ ||
- !!options_.override_mapping_root_ ||
- options_.sm_opts_ != check_options::SPACE_MAP_FULL ||
- options_.data_mapping_opts_ != check_options::DATA_MAPPING_LEVEL2)
- return false;
-
- if (!expected_rc_.get_counts().size())
- return false;
-
- return true;
- }
-
std::string const &path_;
check_options options_;
nested_output out_;
@@ -565,6 +563,7 @@ namespace {
block_address sb_location_;
block_counter expected_rc_;
base::error_state err_; // metadata state
+ bool metadata_checked_;
};
}
@@ -628,12 +627,22 @@ bool check_options::check_conformance() {
cerr << "cannot perform fix with an overridden mapping root" << endl;
return false;
}
+ }
+
+ if (fix_metadata_leaks_ &&
+ (data_mapping_opts_ != DATA_MAPPING_LEVEL2 || sm_opts_ != SPACE_MAP_FULL)) {
+ cerr << "cannot perform fix without a full examination" << endl;
+ return false;
+ }
- if (data_mapping_opts_ != DATA_MAPPING_LEVEL2 ||
- sm_opts_ != SPACE_MAP_FULL) {
- cerr << "cannot perform fix without a full examination" << endl;
+ if (clear_needs_check_) {
+ if (data_mapping_opts_ == DATA_MAPPING_NONE) {
+ cerr << "cannot perform fix without partially examination" << endl;
return false;
}
+
+ if (data_mapping_opts_ != DATA_MAPPING_LEVEL2 || sm_opts_ != SPACE_MAP_FULL)
+ cerr << "clearing needs_check without a full examination is not suggested" << endl;
}
return true;
@@ -647,13 +656,7 @@ thin_provisioning::check_metadata(std::string const &path,
output_options output_opts)
{
metadata_checker checker(path, check_opts, output_opts);
-
- checker.check();
- if (check_opts.fix_metadata_leaks_)
- checker.fix_metadata_leaks(check_opts.open_transaction_);
- if (check_opts.clear_needs_check_)
- checker.clear_needs_check_flag();
-
+ checker.check_and_repair();
return checker.get_status();
}
diff --git a/thin-provisioning/metadata_checker.h b/thin-provisioning/metadata_checker.h
index b4afbdc..ea66dc3 100644
--- a/thin-provisioning/metadata_checker.h
+++ b/thin-provisioning/metadata_checker.h
@@ -48,11 +48,14 @@ namespace thin_provisioning {
void set_auto_repair();
void set_clear_needs_check();
+ // flags for checking
bool use_metadata_snap_;
data_mapping_options data_mapping_opts_;
space_map_options sm_opts_;
boost::optional<bcache::block_address> override_mapping_root_;
bool ignore_non_fatal_;
+
+ // flags for repairing
bool fix_metadata_leaks_;
bool clear_needs_check_;
bool open_transaction_;
--
2.41.0.255.g8b1d071c50-goog

View File

@ -1,70 +0,0 @@
# Copyright 1999-2025 Gentoo Authors
# Distributed under the terms of the GNU General Public License v2
EAPI=7
inherit autotools flag-o-matic
DESCRIPTION="A suite of tools for thin provisioning on Linux"
HOMEPAGE="https://github.com/jthornber/thin-provisioning-tools"
if [[ ${PV} != *9999 ]]; then
SRC_URI="https://github.com/jthornber/${PN}/archive/v${PV}.tar.gz -> ${P}.tar.gz"
KEYWORDS="~alpha amd64 arm arm64 ~hppa ~loong ~m68k ~mips ppc ppc64 ~riscv ~s390 ~sparc x86 ~amd64-linux ~x86-linux"
else
inherit git-r3
EGIT_REPO_URI='https://github.com/jthornber/thin-provisioning-tools.git'
fi
LICENSE="GPL-3"
SLOT="0"
IUSE="static test"
RESTRICT="!test? ( test )"
LIB_DEPEND="dev-libs/expat[static-libs(+)]
dev-libs/libaio[static-libs(+)]"
RDEPEND="!static? ( ${LIB_DEPEND//\[static-libs(+)]} )"
DEPEND="${RDEPEND}
static? ( ${LIB_DEPEND} )
test? (
>=dev-cpp/gtest-1.8.0
)
dev-libs/boost"
PATCHES=(
"${FILESDIR}"/${PN}-0.7.0-build-fixes.patch
"${FILESDIR}"/${PN}-0.9.0-build-fixes.patch
"${FILESDIR}"/0.9.0-remove-boost_iostreams.patch
"${FILESDIR}"/${PN}-0.9.0-metadata_checker-Rename-function-to-reflect-command-.patch
"${FILESDIR}"/${PN}-0.9.0-thin_check-Allow-using-clear-needs-check-and-skip-ma.patch
"${FILESDIR}"/${PN}-0.9.0-boost-gtest.patch
)
src_prepare() {
default
eautoreconf
}
src_configure() {
use static && append-ldflags -static
local myeconfargs=(
--prefix="${EPREFIX}"/
--bindir="${EPREFIX}"/sbin
--with-optimisation=''
$(use_enable test testing)
)
STRIP=true econf "${myeconfargs[@]}"
}
src_compile() {
emake V=
}
src_test() {
emake V= unit-test
}
src_install() {
emake V= DESTDIR="${D}" DATADIR="${ED}/usr/share" install
dodoc README.md TODO.org
}

View File

@ -1,233 +0,0 @@
# Copyright 1999-2025 Gentoo Authors
# Distributed under the terms of the GNU General Public License v2
EAPI=8
# bug #964273
RUST_MAX_VER=1.88.0
CRATES="
adler@1.0.2
aho-corasick@1.1.3
anstream@0.6.15
anstyle-parse@0.2.5
anstyle-query@1.1.1
anstyle-wincon@3.0.4
anstyle@1.0.8
anyhow@1.0.86
atty@0.2.14
autocfg@1.3.0
base64@0.22.1
bindgen@0.69.4
bitflags@1.3.2
bitflags@2.6.0
bytemuck@1.16.1
byteorder@1.5.0
cassowary@0.3.0
cexpr@0.6.0
cfg-if@1.0.0
cfg_aliases@0.2.1
clang-sys@1.8.1
clap@4.5.11
clap_builder@4.5.11
clap_lex@0.7.2
colorchoice@1.0.2
console@0.15.8
crc32c@0.6.8
crc32fast@1.4.2
data-encoding@2.6.0
devicemapper-sys@0.3.0
devicemapper@0.34.3
downcast@0.11.0
duct@0.13.7
either@1.13.0
encode_unicode@0.3.6
env_filter@0.1.2
env_logger@0.11.5
env_logger@0.8.4
errno@0.3.9
exitcode@1.1.2
fastrand@2.1.0
fixedbitset@0.4.2
flate2@1.0.30
fragile@2.0.0
getrandom@0.2.15
glob@0.3.1
hermit-abi@0.1.19
hermit-abi@0.3.9
humantime@2.1.0
indicatif@0.17.8
instant@0.1.13
iovec@0.1.4
is_terminal_polyfill@1.70.1
itertools@0.12.1
lazy_static@1.5.0
lazycell@1.3.0
libc@0.2.155
libloading@0.8.5
libudev-sys@0.1.4
linux-raw-sys@0.4.14
log@0.4.22
memchr@2.7.4
minimal-lexical@0.2.1
miniz_oxide@0.7.4
mockall@0.13.0
mockall_derive@0.13.0
nix@0.29.0
nom@7.1.3
num-derive@0.4.2
num-traits@0.2.19
num_cpus@1.16.0
number_prefix@0.4.0
numtoa@0.1.0
once_cell@1.19.0
os_pipe@1.2.0
pkg-config@0.3.30
portable-atomic@1.7.0
ppv-lite86@0.2.19
predicates-core@1.0.8
predicates-tree@1.0.11
predicates@3.1.2
proc-macro2@1.0.86
quick-xml@0.36.1
quickcheck@1.0.3
quickcheck_macros@1.0.0
quote@1.0.36
rand@0.8.5
rand_chacha@0.3.1
rand_core@0.6.4
rangemap@1.5.1
redox_syscall@0.2.16
redox_termios@0.1.3
regex-automata@0.4.7
regex-syntax@0.8.4
regex@1.10.5
retry@2.0.0
roaring@0.10.6
rustc-hash@1.1.0
rustc_version@0.4.0
rustix@0.38.34
safemem@0.3.3
semver@1.0.23
serde@1.0.204
serde_derive@1.0.204
shared_child@1.0.0
shlex@1.3.0
strsim@0.11.1
syn@1.0.109
syn@2.0.72
tempfile@3.10.1
termion@1.5.6
termtree@0.4.1
thiserror-impl@1.0.63
thiserror@1.0.63
threadpool@1.8.1
tui@0.19.0
udev@0.7.0
unicode-ident@1.0.12
unicode-segmentation@1.11.0
unicode-width@0.1.13
utf8parse@0.2.2
wasi@0.11.0+wasi-snapshot-preview1
winapi-i686-pc-windows-gnu@0.4.0
winapi-x86_64-pc-windows-gnu@0.4.0
winapi@0.3.9
windows-sys@0.52.0
windows-targets@0.52.6
windows_aarch64_gnullvm@0.52.6
windows_aarch64_msvc@0.52.6
windows_i686_gnu@0.52.6
windows_i686_gnullvm@0.52.6
windows_i686_msvc@0.52.6
windows_x86_64_gnu@0.52.6
windows_x86_64_gnullvm@0.52.6
windows_x86_64_msvc@0.52.6
zerocopy-derive@0.7.35
zerocopy@0.7.35
"
declare -A GIT_CRATES=(
[rio]='https://github.com/jthornber/rio;2979a720f671e836302c01546f9cc9f7988610c8;rio-%commit%'
)
LLVM_COMPAT=( {17..18} )
inherit cargo llvm-r1
DESCRIPTION="A suite of tools for thin provisioning on Linux"
HOMEPAGE="https://github.com/jthornber/thin-provisioning-tools"
if [[ ${PV} == *9999 ]]; then
EGIT_REPO_URI="https://github.com/jthornber/thin-provisioning-tools.git"
inherit git-r3
else
SRC_URI="
https://github.com/jthornber/${PN}/archive/v${PV}.tar.gz -> ${P}.tar.gz
${CARGO_CRATE_URIS}
"
KEYWORDS="amd64 arm arm64 ~loong ppc64 ~riscv ~sparc x86 ~amd64-linux ~x86-linux"
fi
LICENSE="GPL-3"
# Dependent crate licenses
LICENSE+=" Apache-2.0 BSD GPL-3 ISC MIT MPL-2.0 Unicode-DFS-2016"
SLOT="0"
IUSE="io-uring"
RDEPEND="virtual/libudev:="
# libdevmapper.h needed for devicemapper-sys crate
DEPEND="
${RDEPEND}
sys-fs/lvm2
"
# Needed for bindgen
BDEPEND="
$(llvm_gen_dep '
llvm-core/clang:${LLVM_SLOT}
')
virtual/pkgconfig
"
DOCS=(
CHANGES
COPYING
README.md
doc/TODO.md
doc/thinp-version-2/notes.md
)
# Rust
QA_FLAGS_IGNORED="usr/sbin/pdata_tools"
PATCHES=(
"${FILESDIR}/${PN}-1.0.6-build-with-cargo.patch"
)
pkg_setup() {
llvm-r1_pkg_setup
rust_pkg_setup
}
src_unpack() {
if [[ ${PV} == 9999 ]] ; then
git-r3_src_unpack
cargo_live_src_unpack
else
cargo_src_unpack
fi
}
src_configure() {
local myfeatures=( $(usev io-uring io_uring) )
cargo_src_configure
}
src_install() {
emake \
DESTDIR="${D}" \
DATADIR="${ED}/usr/share" \
PDATA_TOOLS="$(cargo_target_dir)/pdata_tools" \
install
einstalldocs
}