gyptazy.ch is a Fediverse instance that uses the ActivityPub protocol. In other words, users at this host can communicate with people that use software like Mastodon, Pleroma, Friendica, etc. all around the world.

This server runs the snac software and there is no automatic sign-up process.

Admin email
contact@gyptazy.ch
Admin account
@gyptazy@gyptazy.ch

Search results for #rustlang

Rust Weekly 🦀 » 🤖
@rust_discussions@mastodon.social

Matthias Endler »
@mre@mastodon.social

I published my thoughts on
Long Term Rust Project Maintenance

corrode.dev/blog/long-term-rus

Did I forget anything?
Feedback welcome!

Toasterson boosted

Perma »
@prma@fosstodon.org

My rate for a Rust job is less than my rate for other languages.

Consider this to be not-having-to-debug-shit-at-3AM discount.

Astra Kernel »
@AstraKernel@infosec.exchange

🦀 Rust participates in OSPP 2024 (limited to students)

👉 To encourage college students to participate in developing and maintaining open source software

👉 Student registration ends on the 3rd of June

blog.rust-lang.org/2024/05/07/

Andy Balaam »
@andybalaam@mastodon.social

Orhun Parmaksız 👾 »
@orhun@fosstodon.org

Are you sick of the "dd" utility? Check out this TUI!

💽 **caligula**: A user-friendly, lightweight TUI for disk imaging

🔥 Burn & decompress files with cool graphs!
🚀 Supports verification & hash validation.
🦀 Written in Rust & built with @ratatui_rs

⭐ GitHub: github.com/ifd3f/caligula/

No description

mgorny-nyan (he) 🙀🚂🐧 »
@mgorny@social.treehouse.systems

Am I missing something or is it basically impossible to have `cargo update` actually select dependencies that are acceptable for the specific minimal `rust-version`? Like, even if you install old version, `cargo update` from this version will update `Cargo.lock` to dependencies that require a newer Rust version and render the package non-buildable?

So yeah, I suppose you either end up requiring newer Rust (but you don't really know which version, since you don't know what's the highest minimal requirement in your dependencies), or you update `Cargo.lock` by hand. Such a great tooling!

github.com/samuelcolvin/watchf

Matthias Endler »
@mre@mastodon.social

🦀 The first episode of 'Rust in Production' season 2 is live!

corrode.dev/podcast/s02e01-cur

Super excited about talking to @bagder about using Rust in curl!

NLnet Labs »
@nlnetlabs@fosstodon.org

We’re pleased to announce the release of version 0.10.0 of “domain”, our crate for interacting with the . This release results from the first three months of increased focus on the library, with three full-time developers and a one-year commitment from @sovtechfund.

We included three major new features: the client side of sending DNS messages, its server counterpart, and the machinery for representing DNS zones. Read all about it in this post. nlnetlabs.nl/news/2024/Apr/29/

Rust Weekly 🦀 » 🤖
@rust_discussions@mastodon.social

mgorny-nyan (he) 🙀🚂🐧 »
@mgorny@social.treehouse.systems

Time for your daily dose of complaints. Yep, the ecosystem is doing great.

depends on tokio-tar library. Tokio-tar is broken on , doesn't have a bug tracker (!) and seems to be quite dead, with a bunch of PRs ignored since 2022 (last activity mid-2023). Nevertheless, I've filed a PR to fix PowerPC, with little hope that it'll be merged, released and that we could get UV working on PowerPC.

On top of that, it seems that tokio-tar was forked in early 2021 from async-tar. It doesn't seem to have synced the few commits from 2021, and async-tar is dead since late 2021. But at least it has a bug tracker to keep track of how dead it is.

Rewriting stuff in Rust is great. Maintaining it afterwards for the sake of reverse dependencies isn't.

github.com/vorot93/tokio-tar/p

Rust Weekly 🦀 » 🤖
@rust_discussions@mastodon.social

Astra Kernel »
@AstraKernel@infosec.exchange

🦀 List of Resources to learn Rust - Roadmap From Beginner to Advanced Level

a curated collection of materials designed to assist learners at various stages of their journey with the Rust.

github.com/ImplFerris/LearnRus

Ferris with the text "Learn Rust"

dcz »
@dcz@fosstodon.org

A part of that doesn't get mentioned but is a ridiculous quality of life boon:

dbg!()

Just #[derive(Debug)] on a struct and print it. Suddenly you get insight into what's going on. Very rarely do you need to write your own print.

Insert a dbg in the middle of anything

let diffi = debug!(diffs).iter();

and you get a message with line number and the name of variable:

[src/lib.rs:192:19] diffs = [16, 86, 11]

Not even has that!

Delta Chat »
@delta@chaos.social

Within teams and with many collaborating experts and projects around us, we somewhat stubbornly cling to "working code wins" .... But don't forget it's powerful sibling: "maintenable code wins", especially in the longer term. Our automated testing culture, our use of at the heart of things and our usability-first focus all help maintenanbility. We don't have the treachery luxury of vc-funding which means we must be a hundred times more economical in our approaches.

Orhun Parmaksız 👾 »
@orhun@fosstodon.org

Do you type fast? Check out this TUI! 🔥

🏁 **ttyper**: Terminal-based typing test.

🚀 Supports different languages - you can test with Rust keywords!
🎨 Supports configuration and custom styles.
🦀 Written in Rust & built with @ratatui_rs

⭐ GitHub: github.com/max-niederman/ttype

david_chisnall »
@david_chisnall@infosec.exchange

LLMs are the new memory-safety bugs.

There's a good reason that everyone (even the White House!) hates memory safety bugs. Unlike most other code errors, a memory-safety bug allows an attacker to step outside of the abstract machine. When you write C, or any higher-level language, you have a model that has things like structured programming for control flow, object-level abstractions, and so on. A memory-safety bug is, by definition, one that steps outside of this model. A pointer accesses an object that, according to the abstract machine, it should not be able to reach (and which may not even exist in the abstract machine). This can make control flow jump anywhere, tamper with any bit of the program, and so on.

In the last stack of CVEs I reviewed for a project that I'm using, 80% were memory safety but, more importantly, every single one of the ones that ended with arbitrary-code execution started with violating memory safety. Most other bug classes let you explore flows in the program that maybe shouldn't be there, but at least can be reasoned about at the source level.

This is why people get so annoyed by all of the 'look, Rust didn't prevent this vulnerability' posts that are cropping up. Yes, Rust is not a magical thing that prevents all bugs, but most of the security bugs that people are finding in Rust programs have behaviour that you can reason about in Rust at the source-code level. In contrast, a memory-safety bug in one component may be exploited in a totally unrelated component that, at the source level, shares no common data or control flow with the component that introduced the bug.

That behaviour is exactly what you get with LLMs. It is impossible to articulate the set of behaviours that an LLM may have, other than that it will consume a sequence of tokens and produce a sequence of tokens. LLMs, like the systems that most engineers abandoned in the 1990s, use in-band signalling and do not separate control and data lines. Both untrusted data and trusted prompts are fed into the same inputs and both have the ability to influence the output. This may be fairly benign if a human is consuming the output (wildly inaccurate or offensive, perhaps), but it's dangerous if a machine is consuming the output and performing actions based on it. As with a memory-safety bug, you must assume that an attacker targeting the LLM can do anything that the LLM is able to do.

The Chrome team popularised the Rule of two (no, not that one): Any program may be no more than two out of: written in an unsafe language, consuming untrusted data, running outside of a sandbox.

I would suggest that anything that incorporates an LLM is treated in exactly the same way as things written in unsafe languages. If it touches untrusted data (e.g. reading your emails, or consuming documents that you did not author) then it must be assumed to be under the control of the attacker and sandboxed. If it's not sandboxed, it must consume only trusted inputs (even then, the output shouldn't be trusted, but it's no more untrusted than any other buggy bit of code).

Lup Yuen Lee 李立源 »
@lupyuen@qoto.org

Creating a Custom Target for QEMU ... So Rust Apps will build OK for Apache RTOS

Source: github.com/lupyuen/nuttx-rust-

No description

Orhun Parmaksız 👾 »
@orhun@fosstodon.org

I'm excited to announce the new version of **Ratatui**! 🐁

🦀 A Rust library that's all about cooking up terminal user interfaces (@ratatui_rs)

✨ Release highlights: ratatui.rs/highlights/v0262/

📢 I'm giving a lightning talk on Ratatui at **Rust for Lunch** tomorrow! (lunch.rs/meetups/2024-04-16)

🧀 GitHub: github.com/ratatui-org/ratatui

Lup Yuen Lee 李立源 »
@lupyuen@qoto.org

Here's how we run Apps on Apache RTOS and QEMU Emulator

lupyuen.codeberg.page/articles

Astra Kernel »
@AstraKernel@infosec.exchange

Lol so many ignorants on the recent vulnerabilities about command injection.

Btw, it is not just Rust affected. It affects most langs. Rust is the only one who cares and released a security advisory

bicycle stick meme with text:

the person who put the stick in the wheel

wh rust memory safety didn't protect me from this

Mark-Andrew »
@mark@social.vaenner.net

@stefano@bsd.cafe Probably another candidate for your list: Stalwart Mail Server (https://github.com/stalwartlabs/mail-server).

I have no personal experiences with it, but it is on my watch list.


Matthias Endler »
@mre@mastodon.social

mgorny-nyan (he) 🙀🚂🐧 »
@mgorny@social.treehouse.systems

I suppose everyone and their grandmother is now using the xz/sshd exploit to further their own agenda, so I am going to take this opportunity to further mine as well.

1. are a bad build system. If configure scripts are completely unreadable, there should be no surprise that people won't notice obfuscated malicious code in there, provided that everything else is obfuscated by design.

2. Static linking and vendoring is bad. Do you know why the prompt response was possible? Because we just had to revert to older liblzma. We didn't have to check, patch and re-release hundreds of projects. It wouldn't be this easy with and cargo.

3. You can blame for being underfunded and open to abuse in core system packages. However, no IT project can be resilient to a sufficiently powerful bad actor, and that it happened to xz is just an incident. Corporate projects aren't resilient to it, neither is proprietary, closed-source software.

So, embrace , embrace dynamic linking, embrace distribution packaging and donate to open source developers.

Toran Shaw »
@toran@pkm.social

I'm now wondering if @rust is a good first language for me to learn? There seems to be an awful lot of projects I could contribute to, if I do! 🤔

Astra Kernel »
@AstraKernel@infosec.exchange

🦀 "It is much easier to teach someone to become a good Rust programmer than teach them to be a good C++ Programmer"

open.spotify.com/episode/4y1Gl

- From "Rust in Production" podcast
- Guest: Micah Wylde from Arroyo

@modev »
@modev@emacs.ch

The power is not in the code and not in or , code is simply semantic constructs that make the machine work one way or another. It’s all dead, only the spirit inside you is alive, everything comes to life only in your perception. The romance of is only yours, but limiting yourself to only that means falling into a trap. Life is much more multifaceted, which means you should be multifaceted. You have a spirit that guides and motivates you, take care of it and develop it, train your body and mind. Maybe in ten years the world will turn into complete , we must not lose ourselves in it and play cool game at the same time... 😉

Orhun Parmaksız 👾 »
@orhun@fosstodon.org

Do you use Matrix for chatting? Do you like Vim? I got the perfect tool for you. ✨

📨 **iamb**: A Matrix client for Vim addicts.
💬 Use Vim keybindings for message editing, window navigation, and tab management in your terminal!

🔗 Docs: iamb.chat
⭐ GitHub: github.com/ulyssa/iamb

🦀 @matrix + @ratatui_rs

KubikPixel™ »
@kubikpixel@chaos.social

«Why I chose instead of »

So to say secure 's that are to run on different 's will in my opinion use / with @TauriApps for development and no longer @electronjs:

🦀 scribe.rip/why-i-chose-tauri-i

Why I chose Tauri instead of Electron 🤔

KubikPixel™ »
@kubikpixel@chaos.social

Am I the only who has never heard of ? 🤔

Of course I know and use for databases but I have never heard of SPARQL and that there are also solutions ⚙️

What do you think, should I learn and use it over in a project or do I understand it wrong? 🤷‍♂️

👉 en.wikipedia.org/wiki/SPARQL

KubikPixel™ »
@kubikpixel@chaos.social

«EdgenAI – GenAI made Local: Run Generative AI locally, no internet, completely data-private»

I am not a friend of artificial intelligence, but it may happen in the future that I "have to" use it. Do any of you know GenAI, which is developed in Rust, and if so, how is it?

edgen.co

KubikPixel™ »
@kubikpixel@chaos.social

Where am I now wasting my time when I claim to be learning @rust 😉
Seriously, an insanely great list of projects developed in . Not only implementations for my own 'elopment, but also help me to learn how to use .

🦀 trackawesomelist.com

KubikPixel™ »
@kubikpixel@chaos.social

Who of you knows or even this @torproject that is written in / and is considered ? Can you this directly into your web offer or does it run separately as a gateway to the service?

🫥 tpo.pages.torproject.net/core/

Arti: Tor writen in Rust logo

KubikPixel™ »
@kubikpixel@chaos.social

«Programmiersprache: -Entwickler fürchten sich vor Komplexität»

Da ich immer noch am lernen bin, kann ich den Artikel rel. schlecht einschätzen. Doch kommt je nach Aufgabe in jeder vor und ist mMn nicht der Sprache abhängig aber das ist nun wieder nur eine -Ansicht.

🦀 heise.de/news/Rust-Entwicklung

KubikPixel™ »
@kubikpixel@chaos.social

Thank you @andybalaam to make videos about @tweedegolf and for sharing your exercises to learn the :

Rust 101 – Exercises
🦀 101-rs.tweede.golf
📺 artificialworlds.net/blog/2023

Andy Balaam »
@andybalaam@mastodon.social

Rust 101 fans, another video for you:

diode.zone/w/9Db2EwKP8ga6A5oaB

artificialworlds.net/blog/2024

It's all about traits, which describe what a type can do.

λ[⌜Baer⌟ ⌜🍪⌟] »
@baer@shonk.social

are there any resources on how to make a fedi bot with rust?

KubikPixel™ »
@kubikpixel@chaos.social

«New macOS Linked to Prominent Ransomware Groups:
A newly identified backdoor written in / appears linked to the prominent families Black Basta and Alphv/BlackCat, cybersecurity firm Bitdefender reports.»

I won't say anything more about it, except that it is apparently more than Windows alone, it is not yet protected. Of course everything can be 'ed, but it has to reward the attackers.

🔓 securityweek.com/new-macos-bac

KubikPixel™ »
@kubikpixel@chaos.social

«Iced for Development in Rust»

Thank you @webbureaucrat for your (older) post explaining how to use in your project. I am an absolute beginner but knowing what can be used for what and how always helps.

⚙️ webbureaucrat.gitlab.io/articl

Matthias Endler »
@mre@mastodon.social

The recording of my FOSDEM talk
"The Four Horsemen of Bad Rust Code"
is now online! ▶️🦀⚙️💡🐴

video.fosdem.org/2024/h1308/fo

Feedback very welcome!

0 ★ 0 ↺

gyptazy »
@gyptazy@gyptazy.ch

Andy Balaam »
@andybalaam@mastodon.social

Rust Weekly 🦀 » 🤖
@rust_discussions@mastodon.social

Stefano Marinelli »
@stefano@mastodon.bsd.cafe

FreeBSD Considers Making Use Of Rust Within Its Base System

phoronix.com/news/FreeBSD-Cons

Rust Weekly 🦀 » 🤖
@rust_discussions@mastodon.social

NLnet Labs »
@nlnetlabs@fosstodon.org

Leading up to a major announcement, @alexband and @benno want to set the stage by laying out our vision for and our product strategy for the next five years. blog.nlnetlabs.nl/the-next-fiv

Alfonso Siciliano »
@alfonsosiciliano@mastodon.bsd.cafe

Interesting page: "Why Is SQLite Coded In C" sqlite.org/whyc.html

...it is possible that SQLite might one day be recoded in Rust. ...
Some preconditions that must occur before....

KubikPixel™ »
@kubikpixel@chaos.social

OK, now I have found a solution (look toots above) using thanks the tip from @beowulf. Although I briefly shut down , this motivates me to continue learning practically. I will something similar to but look at @rust for inspiration 🙌

«: Your one-stop static engine – Forget dependencies. Everything you need in one binary.»

🦀 getzola.org

Thorsten Leemhuis (acct. 1/4) »
@kernellogger@fosstodon.org

Andrea Righi[1] wrote a scheduler in / using sched-ext[2]; he claims he was "'"pretty shocked to see that it doesn't just work, but it can even outperform the default scheduler (EEVDF) with certain workloads (i.e., gaming):"'"

He shared it on the : twitter.com/arighi/status/1746

Github page: github.com/sched-ext/scx/

Video: youtube.com/watch?v=oCfVbz9jvV

[1] engineer @ Canonical
[2] lwn.net/Articles/922405/

No description

Orhun Parmaksız 👾 »
@orhun@fosstodon.org

Came across a terminal-based network security tool today! 🕵️‍♂️🔒

🦀 **AngryOxide**: 802.11 Attack Tool

🐭 Written in Rust / Built with @ratatui_rs

⭐ GitHub: github.com/Ragnt/AngryOxide

No description