Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package phraze for openSUSE:Factory checked 
in at 2024-12-19 21:42:17
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/phraze (Old)
 and      /work/SRC/openSUSE:Factory/.phraze.new.29675 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "phraze"

Thu Dec 19 21:42:17 2024 rev:6 rq:1232624 version:0.3.17

Changes:
--------
--- /work/SRC/openSUSE:Factory/phraze/phraze.changes    2024-09-25 
21:56:04.847243336 +0200
+++ /work/SRC/openSUSE:Factory/.phraze.new.29675/phraze.changes 2024-12-19 
21:42:36.561603982 +0100
@@ -1,0 +2,10 @@
+Thu Nov 28 10:04:08 UTC 2024 - felix.niederwan...@suse.de
+
+- Update to version 0.3.17:
+  * update and re-configure cargo-dist to (hopefully) create a musl binary
+  * a few small fixes in the reame
+  * small formatting tweaks to readme
+  * update internal version
+  * add ability to check licenses with cargo deny
+
+-------------------------------------------------------------------

Old:
----
  phraze-0.3.15.obscpio

New:
----
  phraze-0.3.17.obscpio

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ phraze.spec ++++++
--- /var/tmp/diff_new_pack.IRLXK5/_old  2024-12-19 21:42:37.257632867 +0100
+++ /var/tmp/diff_new_pack.IRLXK5/_new  2024-12-19 21:42:37.257632867 +0100
@@ -17,7 +17,7 @@
 
 
 Name:           phraze
-Version:        0.3.15
+Version:        0.3.17
 Release:        0
 Summary:        Generate random passphrases
 License:        MPL-2.0

++++++ _service ++++++
--- /var/tmp/diff_new_pack.IRLXK5/_old  2024-12-19 21:42:37.297634528 +0100
+++ /var/tmp/diff_new_pack.IRLXK5/_new  2024-12-19 21:42:37.301634694 +0100
@@ -2,7 +2,7 @@
   <service mode="disabled" name="obs_scm">
     <param name="url">https://github.com/sts10/phraze.git</param>
     <param name="scm">git</param>
-    <param name="revision">v0.3.15</param>
+    <param name="revision">v0.3.17</param>
     <param name="versionformat">@PARENT_TAG@</param>
     <param name="versionrewrite-pattern">.*v(\d+\.\d+\.\d+)</param>
     <param name="versionrewrite-replacement">\1</param>

++++++ _servicedata ++++++
--- /var/tmp/diff_new_pack.IRLXK5/_old  2024-12-19 21:42:37.321635524 +0100
+++ /var/tmp/diff_new_pack.IRLXK5/_new  2024-12-19 21:42:37.325635690 +0100
@@ -1,6 +1,6 @@
 <servicedata>
 <service name="tar_scm">
                 <param name="url">https://github.com/sts10/phraze.git</param>
-              <param 
name="changesrevision">de8e243f896e4a7987bceef6f48b1dfc4f546c87</param></service></servicedata>
+              <param 
name="changesrevision">255999ac91de399caa8f13537e3be27eb5f191ea</param></service></servicedata>
 (No newline at EOF)
 

++++++ phraze-0.3.15.obscpio -> phraze-0.3.17.obscpio ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/phraze-0.3.15/.github/workflows/release.yml 
new/phraze-0.3.17/.github/workflows/release.yml
--- old/phraze-0.3.15/.github/workflows/release.yml     2024-09-23 
01:21:47.000000000 +0200
+++ new/phraze-0.3.17/.github/workflows/release.yml     2024-11-26 
23:37:22.000000000 +0100
@@ -1,4 +1,4 @@
-# This file was autogenerated by cargo-dist: 
https://opensource.axo.dev/cargo-dist/
+# This file was autogenerated by dist: https://opensource.axo.dev/cargo-dist/
 #
 # Copyright 2022-2024, axodotdev
 # SPDX-License-Identifier: MIT or Apache-2.0
@@ -6,7 +6,7 @@
 # CI that:
 #
 # * checks for a Git Tag that looks like a release
-# * builds artifacts with cargo-dist (archives, installers, hashes)
+# * builds artifacts with dist (archives, installers, hashes)
 # * uploads those artifacts to temporary workflow zip
 # * on success, uploads the artifacts to a GitHub Release
 #
@@ -24,10 +24,10 @@
 # must be a Cargo-style SemVer Version (must have at least major.minor.patch).
 #
 # If PACKAGE_NAME is specified, then the announcement will be for that
-# package (erroring out if it doesn't have the given version or isn't 
cargo-dist-able).
+# package (erroring out if it doesn't have the given version or isn't 
dist-able).
 #
 # If PACKAGE_NAME isn't specified, then the announcement will be for all
-# (cargo-dist-able) packages in the workspace with that version (this mode is
+# (dist-able) packages in the workspace with that version (this mode is
 # intended for workspaces with only one dist-able package, or with all 
dist-able
 # packages versioned/released in lockstep).
 #
@@ -45,7 +45,7 @@
       - '**[0-9]+.[0-9]+.[0-9]+*'
 
 jobs:
-  # Run 'cargo dist plan' (or host) to determine what tasks we need to do
+  # Run 'dist plan' (or host) to determine what tasks we need to do
   plan:
     runs-on: "ubuntu-20.04"
     outputs:
@@ -59,16 +59,16 @@
       - uses: actions/checkout@v4
         with:
           submodules: recursive
-      - name: Install cargo-dist
+      - name: Install dist
         # we specify bash to get pipefail; it guards against the `curl` command
         # failing. otherwise `sh` won't catch that `curl` returned non-0
         shell: bash
-        run: "curl --proto '=https' --tlsv1.2 -LsSf 
https://github.com/axodotdev/cargo-dist/releases/download/v0.22.1/cargo-dist-installer.sh
 | sh"
-      - name: Cache cargo-dist
+        run: "curl --proto '=https' --tlsv1.2 -LsSf 
https://github.com/axodotdev/cargo-dist/releases/download/v0.25.1/cargo-dist-installer.sh
 | sh"
+      - name: Cache dist
         uses: actions/upload-artifact@v4
         with:
           name: cargo-dist-cache
-          path: ~/.cargo/bin/cargo-dist
+          path: ~/.cargo/bin/dist
       # sure would be cool if github gave us proper conditionals...
       # so here's a doubly-nested ternary-via-truthiness to try to provide the 
best possible
       # functionality based on whether this is a pull_request, and whether 
it's from a fork.
@@ -76,8 +76,8 @@
       # but also really annoying to build CI around when it needs secrets to 
work right.)
       - id: plan
         run: |
-          cargo dist ${{ (!github.event.pull_request && format('host 
--steps=create --tag={0}', github.ref_name)) || 'plan' }} --output-format=json 
> plan-dist-manifest.json
-          echo "cargo dist ran successfully"
+          dist ${{ (!github.event.pull_request && format('host --steps=create 
--tag={0}', github.ref_name)) || 'plan' }} --output-format=json > 
plan-dist-manifest.json
+          echo "dist ran successfully"
           cat plan-dist-manifest.json
           echo "manifest=$(jq -c "." plan-dist-manifest.json)" >> 
"$GITHUB_OUTPUT"
       - name: "Upload dist-manifest.json"
@@ -95,12 +95,12 @@
     if: ${{ 
fromJson(needs.plan.outputs.val).ci.github.artifacts_matrix.include != null && 
(needs.plan.outputs.publishing == 'true' || 
fromJson(needs.plan.outputs.val).ci.github.pr_run_mode == 'upload') }}
     strategy:
       fail-fast: false
-      # Target platforms/runners are computed by cargo-dist in create-release.
+      # Target platforms/runners are computed by dist in create-release.
       # Each member of the matrix has the following arguments:
       #
       # - runner: the github runner
-      # - dist-args: cli flags to pass to cargo dist
-      # - install-dist: expression to run to install cargo-dist on the runner
+      # - dist-args: cli flags to pass to dist
+      # - install-dist: expression to run to install dist on the runner
       #
       # Typically there will be:
       # - 1 "global" task that builds universal installers
@@ -117,7 +117,7 @@
       - uses: actions/checkout@v4
         with:
           submodules: recursive
-      - name: Install cargo-dist
+      - name: Install dist
         run: ${{ matrix.install_dist }}
       # Get the dist-manifest
       - name: Fetch local artifacts
@@ -132,8 +132,8 @@
       - name: Build artifacts
         run: |
           # Actually do builds and make zips and whatnot
-          cargo dist build ${{ needs.plan.outputs.tag-flag }} --print=linkage 
--output-format=json ${{ matrix.dist_args }} > dist-manifest.json
-          echo "cargo dist ran successfully"
+          dist build ${{ needs.plan.outputs.tag-flag }} --print=linkage 
--output-format=json ${{ matrix.dist_args }} > dist-manifest.json
+          echo "dist ran successfully"
       - id: cargo-dist
         name: Post-build
         # We force bash here just because github makes it really hard to get 
values up
@@ -168,12 +168,12 @@
       - uses: actions/checkout@v4
         with:
           submodules: recursive
-      - name: Install cached cargo-dist
+      - name: Install cached dist
         uses: actions/download-artifact@v4
         with:
           name: cargo-dist-cache
           path: ~/.cargo/bin/
-      - run: chmod +x ~/.cargo/bin/cargo-dist
+      - run: chmod +x ~/.cargo/bin/dist
       # Get all the local artifacts for the global tasks to use (for e.g. 
checksums)
       - name: Fetch local artifacts
         uses: actions/download-artifact@v4
@@ -184,8 +184,8 @@
       - id: cargo-dist
         shell: bash
         run: |
-          cargo dist build ${{ needs.plan.outputs.tag-flag }} 
--output-format=json "--artifacts=global" > dist-manifest.json
-          echo "cargo dist ran successfully"
+          dist build ${{ needs.plan.outputs.tag-flag }} --output-format=json 
"--artifacts=global" > dist-manifest.json
+          echo "dist ran successfully"
 
           # Parse out what we just built and upload it to scratch storage
           echo "paths<<EOF" >> "$GITHUB_OUTPUT"
@@ -217,12 +217,12 @@
       - uses: actions/checkout@v4
         with:
           submodules: recursive
-      - name: Install cached cargo-dist
+      - name: Install cached dist
         uses: actions/download-artifact@v4
         with:
           name: cargo-dist-cache
           path: ~/.cargo/bin/
-      - run: chmod +x ~/.cargo/bin/cargo-dist
+      - run: chmod +x ~/.cargo/bin/dist
       # Fetch artifacts from scratch-storage
       - name: Fetch artifacts
         uses: actions/download-artifact@v4
@@ -233,7 +233,7 @@
       - id: host
         shell: bash
         run: |
-          cargo dist host ${{ needs.plan.outputs.tag-flag }} --steps=upload 
--steps=release --output-format=json > dist-manifest.json
+          dist host ${{ needs.plan.outputs.tag-flag }} --steps=upload 
--steps=release --output-format=json > dist-manifest.json
           echo "artifacts uploaded and released successfully"
           cat dist-manifest.json
           echo "manifest=$(jq -c "." dist-manifest.json)" >> "$GITHUB_OUTPUT"
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/phraze-0.3.15/CHANGELOG.markdown 
new/phraze-0.3.17/CHANGELOG.markdown
--- old/phraze-0.3.15/CHANGELOG.markdown        2024-09-23 01:21:47.000000000 
+0200
+++ new/phraze-0.3.17/CHANGELOG.markdown        2024-11-26 23:37:22.000000000 
+0100
@@ -1,3 +1,7 @@
+# v0.3.17
+
+* Attempts to use cargo-dist to create a musl binary (see issue: #28)
+
 # v0.3.15
 
 * Upgrade some dependencies like clap, as well as the version of cargo-dist 
used to create releases. Sorry it's not more exciting!
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/phraze-0.3.15/Cargo.lock new/phraze-0.3.17/Cargo.lock
--- old/phraze-0.3.15/Cargo.lock        2024-09-23 01:21:47.000000000 +0200
+++ new/phraze-0.3.17/Cargo.lock        2024-11-26 23:37:22.000000000 +0100
@@ -418,7 +418,7 @@
 
 [[package]]
 name = "phraze"
-version = "0.3.15"
+version = "0.3.17"
 dependencies = [
  "clap",
  "clap_complete",
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/phraze-0.3.15/Cargo.toml new/phraze-0.3.17/Cargo.toml
--- old/phraze-0.3.15/Cargo.toml        2024-09-23 01:21:47.000000000 +0200
+++ new/phraze-0.3.17/Cargo.toml        2024-11-26 23:37:22.000000000 +0100
@@ -1,7 +1,7 @@
 [package]
 name = "phraze"
 description = "Random passphrase generator"
-version = "0.3.15"
+version = "0.3.17"
 edition = "2021"
 authors = ["sts10 <sschlink...@gmail.com>"]
 license = "MPL-2.0"
@@ -32,16 +32,3 @@
 [profile.dist]
 inherits = "release"
 lto = "thin"
-
-# Config for 'cargo dist'
-[workspace.metadata.dist]
-# The preferred cargo-dist version to use in CI (Cargo.toml SemVer syntax)
-cargo-dist-version = "0.22.1"
-# CI backends to support
-ci = "github"
-# The installers to generate for each app
-installers = []
-# Target platforms to build apps for (Rust target-triple syntax)
-targets = ["aarch64-apple-darwin", "x86_64-apple-darwin", 
"x86_64-unknown-linux-gnu", "x86_64-pc-windows-msvc"]
-# Which actions to run on pull requests
-pr-run-mode = "plan"
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/phraze-0.3.15/deny.toml new/phraze-0.3.17/deny.toml
--- old/phraze-0.3.15/deny.toml 1970-01-01 01:00:00.000000000 +0100
+++ new/phraze-0.3.17/deny.toml 2024-11-26 23:37:22.000000000 +0100
@@ -0,0 +1,236 @@
+# This template contains all of the possible sections and their default values
+
+# Note that all fields that take a lint level have these possible values:
+# * deny - An error will be produced and the check will fail
+# * warn - A warning will be produced, but the check will not fail
+# * allow - No warning or error will be produced, though in some cases a note
+# will be
+
+# The values provided in this template are the default values that will be used
+# when any section or field is not specified in your own configuration
+
+# Root options
+
+# The graph table configures how the dependency graph is constructed and thus
+# which crates the checks are performed against
+[graph]
+# If 1 or more target triples (and optionally, target_features) are specified,
+# only the specified targets will be checked when running `cargo deny check`.
+# This means, if a particular package is only ever used as a target specific
+# dependency, such as, for example, the `nix` crate only being used via the
+# `target_family = "unix"` configuration, that only having windows targets in
+# this list would mean the nix crate, as well as any of its exclusive
+# dependencies not shared by any other crates, would be ignored, as the target
+# list here is effectively saying which targets you are building for.
+targets = [
+    # The triple can be any string, but only the target triples built in to
+    # rustc (as of 1.40) can be checked against actual config expressions
+    #"x86_64-unknown-linux-musl",
+    # You can also specify which target_features you promise are enabled for a
+    # particular target. target_features are currently not validated against
+    # the actual valid features supported by the target architecture.
+    #{ triple = "wasm32-unknown-unknown", features = ["atomics"] },
+]
+# When creating the dependency graph used as the source of truth when checks 
are
+# executed, this field can be used to prune crates from the graph, removing 
them
+# from the view of cargo-deny. This is an extremely heavy hammer, as if a crate
+# is pruned from the graph, all of its dependencies will also be pruned unless
+# they are connected to another crate in the graph that hasn't been pruned,
+# so it should be used with care. The identifiers are [Package ID 
Specifications]
+# (https://doc.rust-lang.org/cargo/reference/pkgid-spec.html)
+#exclude = []
+# If true, metadata will be collected with `--all-features`. Note that this 
can't
+# be toggled off if true, if you want to conditionally enable `--all-features` 
it
+# is recommended to pass `--all-features` on the cmd line instead
+all-features = false
+# If true, metadata will be collected with `--no-default-features`. The same
+# caveat with `all-features` applies
+no-default-features = false
+# If set, these feature will be enabled when collecting metadata. If 
`--features`
+# is specified on the cmd line they will take precedence over this option.
+#features = []
+
+# The output table provides options for how/if diagnostics are outputted
+[output]
+# When outputting inclusion graphs in diagnostics that include features, this
+# option can be used to specify the depth at which feature edges will be added.
+# This option is included since the graphs can be quite large and the addition
+# of features from the crate(s) to all of the graph roots can be far too 
verbose.
+# This option can be overridden via `--feature-depth` on the cmd line
+feature-depth = 1
+
+# This section is considered when running `cargo deny check advisories`
+# More documentation for the advisories section can be found here:
+# https://embarkstudios.github.io/cargo-deny/checks/advisories/cfg.html
+[advisories]
+# The path where the advisory databases are cloned/fetched into
+#db-path = "$CARGO_HOME/advisory-dbs"
+# The url(s) of the advisory databases to use
+#db-urls = ["https://github.com/rustsec/advisory-db";]
+# A list of advisory IDs to ignore. Note that ignored advisories will still
+# output a note when they are encountered.
+ignore = [
+    #"RUSTSEC-0000-0000",
+    #{ id = "RUSTSEC-0000-0000", reason = "you can specify a reason the 
advisory is ignored" },
+    #"a-crate-that-is-yanked@0.1.1", # you can also ignore yanked crate 
versions if you wish
+    #{ crate = "a-crate-that-is-yanked@0.1.1", reason = "you can specify why 
you are ignoring the yanked crate" },
+]
+# If this is true, then cargo deny will use the git executable to fetch 
advisory database.
+# If this is false, then it uses a built-in git library.
+# Setting this to true can be helpful if you have special authentication 
requirements that cargo-deny does not support.
+# See Git Authentication for more information about setting up git 
authentication.
+#git-fetch-with-cli = true
+
+# This section is considered when running `cargo deny check licenses`
+# More documentation for the licenses section can be found here:
+# https://embarkstudios.github.io/cargo-deny/checks/licenses/cfg.html
+[licenses]
+# List of explicitly allowed licenses
+# See https://spdx.org/licenses/ for list of possible licenses
+# [possible values: any SPDX 3.11 short identifier (+ optional exception)].
+allow = [
+    "MPL-2.0",
+    "Apache-2.0",
+    "MIT",
+    "Unicode-DFS-2016",
+]
+# The confidence threshold for detecting a license from license text.
+# The higher the value, the more closely the license text must be to the
+# canonical license text of a valid SPDX license file.
+# [possible values: any between 0.0 and 1.0].
+confidence-threshold = 0.8
+# Allow 1 or more licenses on a per-crate basis, so that particular licenses
+# aren't accepted for every possible crate as with the normal allow list
+exceptions = [
+    # Each entry is the crate and version constraint, and its specific allow
+    # list
+    #{ allow = ["Zlib"], crate = "adler32" },
+]
+
+# Some crates don't have (easily) machine readable licensing information,
+# adding a clarification entry for it allows you to manually specify the
+# licensing information
+#[[licenses.clarify]]
+# The package spec the clarification applies to
+#crate = "ring"
+# The SPDX expression for the license requirements of the crate
+#expression = "MIT AND ISC AND OpenSSL"
+# One or more files in the crate's source used as the "source of truth" for
+# the license expression. If the contents match, the clarification will be used
+# when running the license check, otherwise the clarification will be ignored
+# and the crate will be checked normally, which may produce warnings or errors
+# depending on the rest of your configuration
+#license-files = [
+# Each entry is a crate relative path, and the (opaque) hash of its contents
+#{ path = "LICENSE", hash = 0xbd0eed23 }
+#]
+
+[licenses.private]
+# If true, ignores workspace crates that aren't published, or are only
+# published to private registries.
+# To see how to mark a crate as unpublished (to the official registry),
+# visit 
https://doc.rust-lang.org/cargo/reference/manifest.html#the-publish-field.
+ignore = false
+# One or more private registries that you might publish crates to, if a crate
+# is only published to private registries, and ignore is true, the crate will
+# not have its license(s) checked
+registries = [
+    #"https://sekretz.com/registry
+]
+
+# This section is considered when running `cargo deny check bans`.
+# More documentation about the 'bans' section can be found here:
+# https://embarkstudios.github.io/cargo-deny/checks/bans/cfg.html
+[bans]
+# Lint level for when multiple versions of the same crate are detected
+multiple-versions = "warn"
+# Lint level for when a crate version requirement is `*`
+wildcards = "allow"
+# The graph highlighting used when creating dotgraphs for crates
+# with multiple versions
+# * lowest-version - The path to the lowest versioned duplicate is highlighted
+# * simplest-path - The path to the version with the fewest edges is 
highlighted
+# * all - Both lowest-version and simplest-path are used
+highlight = "all"
+# The default lint level for `default` features for crates that are members of
+# the workspace that is being checked. This can be overridden by 
allowing/denying
+# `default` on a crate-by-crate basis if desired.
+workspace-default-features = "allow"
+# The default lint level for `default` features for external crates that are 
not
+# members of the workspace. This can be overridden by allowing/denying 
`default`
+# on a crate-by-crate basis if desired.
+external-default-features = "allow"
+# List of crates that are allowed. Use with care!
+allow = [
+    #"ansi_term@0.11.0",
+    #{ crate = "ansi_term@0.11.0", reason = "you can specify a reason it is 
allowed" },
+]
+# List of crates to deny
+deny = [
+    #"ansi_term@0.11.0",
+    #{ crate = "ansi_term@0.11.0", reason = "you can specify a reason it is 
banned" },
+    # Wrapper crates can optionally be specified to allow the crate when it
+    # is a direct dependency of the otherwise banned crate
+    #{ crate = "ansi_term@0.11.0", wrappers = 
["this-crate-directly-depends-on-ansi_term"] },
+]
+
+# List of features to allow/deny
+# Each entry the name of a crate and a version range. If version is
+# not specified, all versions will be matched.
+#[[bans.features]]
+#crate = "reqwest"
+# Features to not allow
+#deny = ["json"]
+# Features to allow
+#allow = [
+#    "rustls",
+#    "__rustls",
+#    "__tls",
+#    "hyper-rustls",
+#    "rustls",
+#    "rustls-pemfile",
+#    "rustls-tls-webpki-roots",
+#    "tokio-rustls",
+#    "webpki-roots",
+#]
+# If true, the allowed features must exactly match the enabled feature set. If
+# this is set there is no point setting `deny`
+#exact = true
+
+# Certain crates/versions that will be skipped when doing duplicate detection.
+skip = [
+    #"ansi_term@0.11.0",
+    #{ crate = "ansi_term@0.11.0", reason = "you can specify a reason why it 
can't be updated/removed" },
+]
+# Similarly to `skip` allows you to skip certain crates during duplicate
+# detection. Unlike skip, it also includes the entire tree of transitive
+# dependencies starting at the specified crate, up to a certain depth, which is
+# by default infinite.
+skip-tree = [
+    #"ansi_term@0.11.0", # will be skipped along with _all_ of its direct and 
transitive dependencies
+    #{ crate = "ansi_term@0.11.0", depth = 20 },
+]
+
+# This section is considered when running `cargo deny check sources`.
+# More documentation about the 'sources' section can be found here:
+# https://embarkstudios.github.io/cargo-deny/checks/sources/cfg.html
+[sources]
+# Lint level for what to happen when a crate from a crate registry that is not
+# in the allow list is encountered
+unknown-registry = "warn"
+# Lint level for what to happen when a crate from a git repository that is not
+# in the allow list is encountered
+unknown-git = "warn"
+# List of URLs for allowed crate registries. Defaults to the crates.io index
+# if not specified. If it is specified but empty, no registries are allowed.
+allow-registry = ["https://github.com/rust-lang/crates.io-index";]
+# List of URLs for allowed Git repositories
+allow-git = []
+
+[sources.allow-org]
+# github.com organizations to allow git sources for
+github = []
+# gitlab.com organizations to allow git sources for
+gitlab = []
+# bitbucket.org organizations to allow git sources for
+bitbucket = []
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/phraze-0.3.15/dist-workspace.toml 
new/phraze-0.3.17/dist-workspace.toml
--- old/phraze-0.3.15/dist-workspace.toml       1970-01-01 01:00:00.000000000 
+0100
+++ new/phraze-0.3.17/dist-workspace.toml       2024-11-26 23:37:22.000000000 
+0100
@@ -0,0 +1,15 @@
+[workspace]
+members = ["cargo:."]
+
+# Config for 'dist'
+[dist]
+# The preferred dist version to use in CI (Cargo.toml SemVer syntax)
+cargo-dist-version = "0.25.1"
+# CI backends to support
+ci = "github"
+# The installers to generate for each app
+installers = []
+# Target platforms to build apps for (Rust target-triple syntax)
+targets = ["aarch64-apple-darwin", "x86_64-apple-darwin", 
"x86_64-unknown-linux-gnu", "x86_64-unknown-linux-musl", 
"x86_64-pc-windows-msvc"]
+# Which actions to run on pull requests
+pr-run-mode = "plan"
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/phraze-0.3.15/readme.markdown 
new/phraze-0.3.17/readme.markdown
--- old/phraze-0.3.15/readme.markdown   2024-09-23 01:21:47.000000000 +0200
+++ new/phraze-0.3.17/readme.markdown   2024-11-26 23:37:22.000000000 +0100
@@ -102,7 +102,7 @@
 ### Changing the separator between words
 By default, Phraze separates words with a hyphen ("-"). You can change that 
with the `--sep` (or `-s`) option.
 
-`--sep` accept special inputs `_n` (random numbers), `_s` (random symbols), 
and `_b` (mix of both). Note that separator choice does _not_ effect entropy 
calculations.
+`--sep` accepts special inputs `_n` (random numbers), `_s` (random symbols), 
and `_b` (mix of both). Note that separator choice does _not_ effect entropy 
calculations.
 ```text
 $ phraze --sep ' '
 optimism daughters figures grim processors became decreasing
@@ -112,7 +112,7 @@
 
 If you don't want a separator at all, use `-s ''`:
 ```text
-phraze -s ''
+$ phraze -s ''
 theftinversiondebtsquietlysuspensionannualchocolate
 ```
 
@@ -514,6 +514,8 @@
 
 In general I welcome both pull requests and issues. See included 
[LICENSE.txt](./LICENSE.txt) file. This project doesn't have a formal Code of 
Conduct yet (it may in the future), but informally just try to be kind to each 
other.
 
+Check **license compatibility** of Phraze's dependencies: `cargo deny check 
licenses` (requires that you [have cargo-deny installed 
locally](https://github.com/EmbarkStudios/cargo-deny#install-cargo-deny)). See 
below for more on how Phraze is licensed.
+
 ### Testing and benchmarking Phraze
 Run `cargo test` to run Phraze's tests.
 

++++++ phraze.obsinfo ++++++
--- /var/tmp/diff_new_pack.IRLXK5/_old  2024-12-19 21:42:37.457641168 +0100
+++ /var/tmp/diff_new_pack.IRLXK5/_new  2024-12-19 21:42:37.461641334 +0100
@@ -1,5 +1,5 @@
 name: phraze
-version: 0.3.15
-mtime: 1727047307
-commit: de8e243f896e4a7987bceef6f48b1dfc4f546c87
+version: 0.3.17
+mtime: 1732660642
+commit: 255999ac91de399caa8f13537e3be27eb5f191ea
 

++++++ vendor.tar.xz ++++++
/work/SRC/openSUSE:Factory/phraze/vendor.tar.xz 
/work/SRC/openSUSE:Factory/.phraze.new.29675/vendor.tar.xz differ: char 15, 
line 1

Reply via email to