depot
PublicRun full CI pipeline of the depot, TVL's monorepo.
feat(tvix/castore): add Directory::try_from_iter()
Failed in 18m 27s


โ๏ธ ๐ protoCheck (from nix/bufCheck)

โ๏ธ depot formatting check (from tools/depotfmt)
โ๏ธ Check all crates used in depot for advisories (from tools/rust-crates-advisory:tree-lock-file-report)










โ๏ธ ๐ ensure generated protobuf files match (from tvix/build-go)


















โ๏ธ ๐ ensure generated protobuf files match (from tvix/castore-go)






















โ๏ธ :nix :import tvix/docs/src/store with tvix-store import (from tvix/store)

































































โ๏ธ ๐ ensure generated protobuf files match (from tvix/store-go)



๐ฆ
โคต๏ธ
-
//corp/rih/backend
: 2 advisories for Cargo.lock- rustls 0.20.8: RUSTSEC-2024-0336 (CVE-2024-32650, GHSA-6g7w-8wpp-frhj), patched:
>=0.23.5
;>=0.22.4, <0.23.0
;>=0.21.11, <0.22.0
- webpki 0.22.0: RUSTSEC-2023-0052 (GHSA-8qv2-5vq6-g2g7), patched:
>=0.22.2
- rustls 0.20.8: RUSTSEC-2024-0336 (CVE-2024-32650, GHSA-6g7w-8wpp-frhj), patched:
-
//net/alcoholic_jwt
: 1 advisories for Cargo.lock- openssl 0.10.59: RUSTSEC-2024-0357, patched:
>=0.10.66
- openssl 0.10.59: RUSTSEC-2024-0357, patched:
-
//fun/paroxysm
: 2 advisories for Cargo.lock- openssl 0.10.64: RUSTSEC-2024-0357, patched:
>=0.10.66
- tokio 0.1.22: RUSTSEC-2021-0124 (CVE-2021-45710, GHSA-fg7r-2g4j-5cgr), patched:
>=1.8.4, <1.9.0
;>=1.13.1
- openssl 0.10.64: RUSTSEC-2024-0357, patched:
-
//web/converse
: 13 advisories for Cargo.lock- brotli-sys 0.3.2: RUSTSEC-2021-0131 (CVE-2020-8927), no unaffected version available
- comrak 0.2.14: RUSTSEC-2021-0026 (CVE-2021-27671, GHSA-xmr7-v725-2jjr), patched:
>=0.9.1
- comrak 0.2.14: RUSTSEC-2021-0063 (CVE-2021-38186, GHSA-6wj2-g87r-pm62), patched:
>=0.10.1
- h2 0.1.26: RUSTSEC-2024-0332 (GHSA-q6cp-qfwq-4gcv), patched:
^0.3.26
;>=0.4.4
- h2 0.1.26: RUSTSEC-2023-0034 (CVE-2023-26964, GHSA-f8vr-r385-rh5r), patched:
>=0.3.17
- h2 0.1.26: RUSTSEC-2024-0003 (GHSA-8r5v-vm4m-4g25), patched:
^0.3.24
;>=0.4.2
- hyper 0.11.27: RUSTSEC-2021-0079 (CVE-2021-32714, GHSA-5h46-h7hh-c6x9), patched:
>=0.14.10
- hyper 0.11.27: RUSTSEC-2021-0078 (CVE-2021-32715, GHSA-f3pg-qwvg-p99c), patched:
>=0.14.10
- hyper 0.11.27: RUSTSEC-2020-0008 (CVE-2020-35863, GHSA-h3qr-rq2j-74w4), patched:
>=0.12.34
- owning_ref 0.4.1: RUSTSEC-2022-0040 (GHSA-9qxh-258v-666c), no unaffected version available
- remove_dir_all 0.5.3: RUSTSEC-2023-0018 (GHSA-mc8h-8q98-g5hr), patched:
>=0.8.0
- time 0.1.45: RUSTSEC-2020-0071 (CVE-2020-26235, GHSA-wcg3-cvx6-7396), patched:
>=0.2.23
- tokio 0.1.22: RUSTSEC-2021-0124 (CVE-2021-45710, GHSA-fg7r-2g4j-5cgr), patched:
>=1.8.4, <1.9.0
;>=1.13.1
-
//tvix/tools/weave
: 2 advisories for Cargo.lock- mio 0.8.10: RUSTSEC-2024-0019 (CVE-2024-27308, GHSA-r8w9-5wcg-vfj7), patched:
>=0.8.11
- owning_ref 0.4.1: RUSTSEC-2022-0040 (GHSA-9qxh-258v-666c), no unaffected version available
- mio 0.8.10: RUSTSEC-2024-0019 (CVE-2024-27308, GHSA-r8w9-5wcg-vfj7), patched:
-
//tvix/tools/turbofetch
: 5 advisories for Cargo.lock- h2 0.3.21: RUSTSEC-2024-0332 (GHSA-q6cp-qfwq-4gcv), patched:
^0.3.26
;>=0.4.4
- h2 0.3.21: RUSTSEC-2024-0003 (GHSA-8r5v-vm4m-4g25), patched:
^0.3.24
;>=0.4.2
- mio 0.8.9: RUSTSEC-2024-0019 (CVE-2024-27308, GHSA-r8w9-5wcg-vfj7), patched:
>=0.8.11
- rustls 0.20.9: RUSTSEC-2024-0336 (CVE-2024-32650, GHSA-6g7w-8wpp-frhj), patched:
>=0.23.5
;>=0.22.4, <0.23.0
;>=0.21.11, <0.22.0
- shlex 1.2.0: RUSTSEC-2024-0006 (GHSA-r7qv-8r2h-pg27), patched:
>=1.3.0
- h2 0.3.21: RUSTSEC-2024-0332 (GHSA-q6cp-qfwq-4gcv), patched:
-
//tvix/tools/crunch-v2
: 6 advisories for Cargo.lock- h2 0.3.22: RUSTSEC-2024-0332 (GHSA-q6cp-qfwq-4gcv), patched:
^0.3.26
;>=0.4.4
- h2 0.3.22: RUSTSEC-2024-0003 (GHSA-8r5v-vm4m-4g25), patched:
^0.3.24
;>=0.4.2
- mio 0.8.9: RUSTSEC-2024-0019 (CVE-2024-27308, GHSA-r8w9-5wcg-vfj7), patched:
>=0.8.11
- rustls 0.20.9: RUSTSEC-2024-0336 (CVE-2024-32650, GHSA-6g7w-8wpp-frhj), patched:
>=0.23.5
;>=0.22.4, <0.23.0
;>=0.21.11, <0.22.0
- shlex 1.2.0: RUSTSEC-2024-0006 (GHSA-r7qv-8r2h-pg27), patched:
>=1.3.0
- zerocopy 0.7.26: RUSTSEC-2023-0074 (GHSA-3mv5-343c-w2qg, GHSA-rjhf-4mh8-9xjq), patched:
>=0.2.9, <0.3.0
;>=0.3.2, <0.4.0
;>=0.4.1, <0.5.0
;>=0.5.2, <0.6.0
;>=0.6.6, <0.7.0
;>=0.7.31
- h2 0.3.22: RUSTSEC-2024-0332 (GHSA-q6cp-qfwq-4gcv), patched:
-
//ops/yandex-cloud-rs
: 5 advisories for Cargo.lock- h2 0.3.19: RUSTSEC-2024-0332 (GHSA-q6cp-qfwq-4gcv), patched:
^0.3.26
;>=0.4.4
- h2 0.3.19: RUSTSEC-2024-0003 (GHSA-8r5v-vm4m-4g25), patched:
^0.3.24
;>=0.4.2
- mio 0.8.8: RUSTSEC-2024-0019 (CVE-2024-27308, GHSA-r8w9-5wcg-vfj7), patched:
>=0.8.11
- rustls 0.21.1: RUSTSEC-2024-0336 (CVE-2024-32650, GHSA-6g7w-8wpp-frhj), patched:
>=0.23.5
;>=0.22.4, <0.23.0
;>=0.21.11, <0.22.0
- rustls-webpki 0.100.1: RUSTSEC-2023-0053 (GHSA-fh2r-99q2-6mmg), patched:
>=0.100.2, <0.101.0
;>=0.101.4
- h2 0.3.19: RUSTSEC-2024-0332 (GHSA-q6cp-qfwq-4gcv), patched:
-
//ops/journaldriver
: 1 advisories for Cargo.lock- openssl 0.10.59: RUSTSEC-2024-0357, patched:
>=0.10.66
- openssl 0.10.59: RUSTSEC-2024-0357, patched:
-
//users/tazjin/finito
: 4 advisories for Cargo.lock- chrono 0.4.11: RUSTSEC-2020-0159, patched:
>=0.4.20
- generic-array 0.9.0: RUSTSEC-2020-0146 (CVE-2020-36465, GHSA-3358-4f7f-p4j4), patched:
>=0.8.4, <0.9.0
;>=0.9.1, <0.10.0
;>=0.10.1, <0.11.0
;>=0.11.2, <0.12.0
;>=0.12.4, <0.13.0
;>=0.13.3
- smallvec 1.4.0: RUSTSEC-2021-0003 (CVE-2021-25900, GHSA-43w2-9j62-hq99), patched:
>=0.6.14, <1.0.0
;>=1.6.1
- time 0.1.43: RUSTSEC-2020-0071 (CVE-2020-26235, GHSA-wcg3-cvx6-7396), patched:
>=0.2.23
- chrono 0.4.11: RUSTSEC-2020-0159, patched:
-
//users/tazjin/tgsa
: 1 advisories for Cargo.lock- openssl 0.10.64: RUSTSEC-2024-0357, patched:
>=0.10.66
- openssl 0.10.64: RUSTSEC-2024-0357, patched:
-
//users/tazjin/yddns
: 4 advisories for Cargo.lock- h2 0.3.21: RUSTSEC-2024-0332 (GHSA-q6cp-qfwq-4gcv), patched:
^0.3.26
;>=0.4.4
- h2 0.3.21: RUSTSEC-2024-0003 (GHSA-8r5v-vm4m-4g25), patched:
^0.3.24
;>=0.4.2
- mio 0.8.9: RUSTSEC-2024-0019 (CVE-2024-27308, GHSA-r8w9-5wcg-vfj7), patched:
>=0.8.11
- rustls 0.21.8: RUSTSEC-2024-0336 (CVE-2024-32650, GHSA-6g7w-8wpp-frhj), patched:
>=0.23.5
;>=0.22.4, <0.23.0
;>=0.21.11, <0.22.0
- h2 0.3.21: RUSTSEC-2024-0332 (GHSA-q6cp-qfwq-4gcv), patched:
-
//users/picnoir/tvix-daemon
: 2 advisories for Cargo.lock- curve25519-dalek 4.1.2: RUSTSEC-2024-0344, patched:
>=4.1.3
- h2 0.4.2: RUSTSEC-2024-0332 (GHSA-q6cp-qfwq-4gcv), patched:
^0.3.26
;>=0.4.4
- curve25519-dalek 4.1.2: RUSTSEC-2024-0344, patched:
-
//users/aspen/xanthous/server
: 3 advisories for Cargo.lock- mio 0.8.4: RUSTSEC-2024-0019 (CVE-2024-27308, GHSA-r8w9-5wcg-vfj7), patched:
>=0.8.11
- remove_dir_all 0.5.3: RUSTSEC-2023-0018 (GHSA-mc8h-8q98-g5hr), patched:
>=0.8.0
- tokio 1.21.2: RUSTSEC-2023-0001 (CVE-2023-22466, GHSA-7rrj-xr53-82p7), patched:
>=1.18.4, <1.19.0
;>=1.20.3, <1.21.0
;>=1.23.1
- mio 0.8.4: RUSTSEC-2024-0019 (CVE-2024-27308, GHSA-r8w9-5wcg-vfj7), patched:
-
//users/aspen/achilles
: 2 advisories for Cargo.lock- regex 1.4.6: RUSTSEC-2022-0013 (CVE-2022-24713, GHSA-m5pq-gvj9-9vr8), patched:
>=1.5.5
- remove_dir_all 0.5.3: RUSTSEC-2023-0018 (GHSA-mc8h-8q98-g5hr), patched:
>=0.8.0
- regex 1.4.6: RUSTSEC-2022-0013 (CVE-2022-24713, GHSA-m5pq-gvj9-9vr8), patched:
This is a build of cl/12225 (at patchset #6)
๐ฆset -ueo pipefail && readonly FAILED_JOBS=$(curl 'https://graphql.buildkite.com/v1' \ && --silent \ && -H "Authorization: Bearer $(cat /run/agenix/buildkite-graphql-token)" \ && -d "{\"query\": \"query BuildStatusQuery { build(uuid: \\\"01916630-e98b-457c-93d9-367be38c2dca\\\") { jobs(passed: false) { count } } }\"}" | \ && jq -r '.data.build.jobs.count') && echo "$FAILED_JOBS build jobs failed." && if (( $FAILED_JOBS > 0 )); then && exit 1 && fi
Waited 2s
Ran in 2s
Total Job Run Time: 5h 35m