Vulnerabilities | |||||
---|---|---|---|---|---|
Version | Suggest | Low | Medium | High | Critical |
0.27.0 | 0 | 0 | 0 | 0 | 0 |
0.26.3 | 0 | 0 | 0 | 0 | 0 |
0.26.2 | 0 | 0 | 0 | 0 | 0 |
0.26.1 | 0 | 0 | 0 | 0 | 0 |
0.26.0 | 0 | 0 | 0 | 0 | 0 |
0.25.0 | 0 | 0 | 0 | 0 | 0 |
0.24.0 | 0 | 0 | 0 | 0 | 0 |
0.23.0 | 0 | 0 | 0 | 0 | 0 |
0.22.0 | 0 | 0 | 0 | 0 | 0 |
0.21.0 | 0 | 0 | 0 | 0 | 0 |
0.20.0 | 0 | 0 | 0 | 0 | 0 |
0.19.0 | 0 | 0 | 0 | 0 | 0 |
0.18.0 | 0 | 0 | 0 | 0 | 0 |
0.17.0 | 0 | 0 | 0 | 0 | 0 |
0.16.0 | 0 | 0 | 0 | 0 | 0 |
0.15.1 | 0 | 0 | 0 | 0 | 0 |
0.15.0 | 0 | 0 | 0 | 0 | 0 |
0.14.1 | 0 | 0 | 0 | 0 | 0 |
0.13.0 | 0 | 0 | 0 | 0 | 0 |
0.12.0 | 0 | 0 | 0 | 0 | 0 |
0.11.0 | 0 | 0 | 0 | 0 | 0 |
0.10.1 | 0 | 0 | 0 | 0 | 0 |
0.10.0 | 0 | 0 | 0 | 0 | 0 |
0.9.0 | 0 | 0 | 0 | 0 | 0 |
0.8.7 | 0 | 0 | 0 | 0 | 0 |
0.8.5 | 0 | 0 | 0 | 0 | 0 |
0.8.4 | 0 | 0 | 0 | 0 | 0 |
0.8.3 | 0 | 0 | 0 | 0 | 0 |
0.8.2 | 0 | 0 | 0 | 0 | 0 |
0.8.0 | 0 | 0 | 0 | 0 | 0 |
0.7.8 | 0 | 0 | 0 | 0 | 0 |
0.7.7 | 0 | 0 | 0 | 0 | 0 |
0.7.4 | 0 | 0 | 0 | 0 | 0 |
0.6.4 | 0 | 0 | 0 | 0 | 0 |
0.6.2 | 0 | 0 | 0 | 0 | 0 |
0.6.1 | 0 | 0 | 0 | 0 | 0 |
0.6.0 | 0 | 0 | 0 | 0 | 0 |
0.5.0 | 0 | 0 | 0 | 0 | 0 |
0.4.1 | 0 | 0 | 0 | 0 | 0 |
0.3.12 | 0 | 0 | 0 | 0 | 0 |
0.3.11 | 0 | 0 | 0 | 0 | 0 |
0.3.10 | 0 | 0 | 0 | 0 | 0 |
0.3.9 | 0 | 0 | 0 | 0 | 0 |
0.3.8 | 0 | 0 | 0 | 0 | 0 |
0.3.7 | 0 | 0 | 0 | 0 | 0 |
0.3.6 | 0 | 0 | 0 | 0 | 0 |
0.3.5 | 0 | 0 | 0 | 0 | 0 |
0.3.4 | 0 | 0 | 0 | 0 | 0 |
0.3.3 | 0 | 0 | 0 | 0 | 0 |
0.3.2 | 0 | 0 | 0 | 0 | 0 |
0.3.1 | 0 | 0 | 0 | 0 | 0 |
0.3.0 | 0 | 0 | 0 | 0 | 0 |
0.2.3 | 0 | 0 | 0 | 0 | 0 |
0.2.2 | 0 | 0 | 0 | 0 | 0 |
0.2.1 | 0 | 0 | 0 | 0 | 0 |
0.2.0 | 0 | 0 | 0 | 0 | 0 |
0.1.2 | 0 | 0 | 0 | 0 | 0 |
0.1.1 | 0 | 0 | 0 | 0 | 0 |
0.1.0 | 0 | 0 | 0 | 0 | 0 |
0.0.1 | 0 | 0 | 0 | 0 | 0 |
0.27.0 - This version is safe to use because it has no known security vulnerabilities at this time. Find out if your coding project uses this component and get notified of any reported security vulnerabilities with Meterian-X Open Source Security Platform
Maintain your licence declarations and avoid unwanted licences to protect your IP the way you intended.
Apache-2.0 - Apache License 2.0Higher level, asynchronous, pure Rust AT-SPI2 protocol implementation using zbus.
Part of the Odilia screen reader project.
#[deny(missing_docs)]
#[deny(unsafe_code)]
#[deny(clippy:all, clippy::pedantic, clippy::cargo)]
This crate makes use of the zbus crate for dbus communication. We use the asynchronous zbus API, so to use atspi, you will need to run an async executer like tokio or async-std.
default
: proxies
, connection
.proxies
: enable re-export of the atspi-proxies
crate; this allows you to directly communicate with DBus.connection
: enable re-export of the atspi-connection
crate; this gives some nice abstractions over DBus when receiving only. proxies
will still be needed to query information actively.tokio
: enable support for the tokio
runtime; other runtimes can be used without an integration feature.tracing
: enable support for the tracing
logger.Atspi is used to send and receive data to and from applications. Sender and recipient need to agree on the shape of the data type for fruitful communication. Our best bet is to keep our types in sync with the protocol descriptions.
We employ zbus-lockstep to match types against those defined in the AT-SPI2 protocol descriptions.
Not all types can be validated (easily) with zbus_lockstep because types may not exist in the protocol descriptions, for example because they are deprecated (but still in use) or we have chosen a different representation.
A (partial) review of type validation may be found here
The atspi
library is licensed as Apache 2.0 or MIT.