cargo-udeps
scip
cargo-udeps | scip | |
---|---|---|
6 | 7 | |
1,538 | 215 | |
- | 2.3% | |
8.5 | 7.3 | |
16 days ago | 6 days ago | |
Rust | Rust | |
GNU General Public License v3.0 or later | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
cargo-udeps
-
cargo-udeps 0.1.33 release
I'm releasing cargo-udeps 0.1.33 today. The release marks a big change in the evolution of cargo-udeps, as the default backend is changed from using save-analysis to depinfo. This change was needed because the compiler is removing support for save-analysis. I will remove support for the save-analysis backend entirely in a couple of weeks, when the 1.64 release is made, and I'll update cargo-udeps to the new cargo release.
-
Why can rust-analyzer not detect unused dependencies?
rust-analyzer only provides a handful of diagnostics by itself, everything else is forwarded from cargo check (if checkOnSave is enabled). Neither tool currently emits a warning for unused dependencies, since it's pretty hard to do, but cargo-udeps can do it (though I'm not sure how reliable it is).
- Is there a tool to remove unused dependencies from a Cargo file?
-
Is the crate dependency becoming a problem?
Maybe an extension to cargo-udeps?
-
Corrode without bloat. Is detecting unnecessary features feasible?
cargo-udeps does a great job at letting us know which dependencies in our `Cargo.toml` are left unused. I am pretty impressed with it.
-
Reducing Rust Incremental Compilation Times on macOS by 70%
You can also turn off debuginfo completely. Personally, someone who does printf debugging, I mainly need it to debug segfaults, which are really rare in Rust. Sometimes the call stack of a panic is useful as well, but if I need debuginfo I can just re-enable it.
https://github.com/est31/cargo-udeps/commit/e550d93c7a6d756e...
scip
-
Show HN: GritQL, a Rust CLI for rewriting source code
security is up there, but from reading the examples in CodeQL it just seemed like it would be possible to express some truly great versions of "don't do that" rules in it. I am a total JetBrains fanboi, and their introspections are world-class, but getting Qodana to run to completion before the heat death of the universe has proven to require more glucose than I have to offer it. Thus, I'm always interested in alternate implementations, even though I am acutely aware of the computational complexity of what I'm asking
I recalled another link I wish I had included in my question from the SourceGraph folks https://github.com/sourcegraph/scip#scip-code-intelligence-p... which started out life as "Language Server Indexing Protocol" and seems to solve some similar project-wide introspection questions but TBH since their rug pull I've been a lot less willing to hitch my wagon to their train
-
Have questions/requests/issues related to the Zig Language Server?
New standards proliferate all the time and many simply cannot rely solely on a compiler language server but can rely on a custom semantic information protocol - SCIP comes to mind. :)
-
srctx: a LSIF parser for understanding what happened in every lines of your code
Over the last ~9 months or so, we've been moving away from LSIF and have been using SCIP instead. https://github.com/sourcegraph/scip (announcement blog post, which covers the reasons for why we stopped using LSIF: https://about.sourcegraph.com/blog/announcing-scip)
-
The technology behind GitHub’s new code search
This is pretty much exactly what we've built at Sourcegraph. Microsoft had introduced (but pretty much abandoned before it even started) LSIF, a static index format for LSP servers requests/responses.
We took that torch and carried it forward, building the spiritual successor called SCIP[0]. It's language agnostic, we have indexers for quite a few languages already, and we genuinely intend for it to be vendor neutral / a proper OSS project[1].
[0] https://about.sourcegraph.com/blog/announcing-scip
[1] https://github.com/sourcegraph/scip
-
Steve Yegge Joins as Head of Engineering of Sourcegraph
Created a PR to mention tools using SCIP in the README. https://github.com/sourcegraph/scip/pull/101
-
cargo-udeps 0.1.33 release
I've looked into the pull request that added SCIP support to rust-analyzer, and apparently rust-analyzer uses the scip crate. The linked PR also links to a blog post that explains the motivation for scip. The github repo of the scip crate lives here, it's not linked in Cargo.toml, probably should.
What are some alternatives?
cargo-machete - Remove unused Rust dependencies with this one weird trick!
lsif-clang - Language Server Indexing Format (LSIF) generator for C, C++ and Objective C
bmrng - An async MPSC request-response channel for Tokio
cargo-semver-checks - Scan your Rust crate for semver violations.
mold - Mold: A Modern Linker 🦠
lsif-go - Language Server Indexing Format (LSIF) generator for Go
arewefastyet - arewefastyet.rs - benchmarking the Rust compiler
hn-search - Hacker News Search
measureme - Support crate for rustc's self-profiling feature
rust-analyzer - A Rust compiler front-end for IDEs
cargo-dephell - Cargo dephell analyzes the third-party dependencies of a Rust workspace
zig-hcs-client - A simple REPL for controlling Zig's hot-code swapping compilation mode