Thanks Antoine.

Feel free to discuss anything about the MesaTEE project.
I’m glad to answer all questions and concerns.

-
Mingshen

> On Aug 5, 2019, at 11:48 AM, Antoine Toulme <anto...@toulme.name> wrote:
> 
> I support this proposal and would like to be listed in the interested parties.
> 
> Cheers,
> 
> Antoine Toulme
> 
>> On Aug 5, 2019, at 8:14 PM, Zhijie Shen <zjshen.apa...@gmail.com> wrote:
>> 
>> BTW, I saw MSR has an interesting research work to integrate MapReduce with
>> SGX to analyze big data in an privacy-preserved way:
>> https://www.microsoft.com/en-us/research/wp-content/uploads/2016/02/vc3-oakland2015.pdf.
>> I'm looking forward to the potential integration between this project with
>> a few big data project under ASF.
>> 
>> On Sun, Aug 4, 2019 at 10:07 AM Mingshen Sun <mingshen....@gmail.com> wrote:
>> 
>>> Thanks for your interests.
>>> 
>>> Regarding to you question, no, you cannot use it to sandbox arbitrary code.
>>> Trusted computing/confidential computing is not just about isolation and
>>> sandbox.
>>> For the SGX setup, because lots of sources (e.g., system calls, IO
>>> functions, etc.)
>>> are not trusted, which will break the treat model of trusted computing.
>>> Normally, you should design a code with “trusted” part and “untrusted”
>>> part.
>>> For legacy code, it needs to be carefully tailored or separated. But
>>> sometimes,
>>> untrusted sources are still needed (e.g., a web service needs network
>>> capabilities),
>>> they should be as minimal as possible and easy to audit.
>>> 
>>> Yesterday, ted gave a very good use case (
>>> https://signal.org/blog/private-contact-discovery/).
>>> But there are others listed in the doc:
>>> https://github.com/mesalock-linux/mesatee/blob/master/docs/case_study.md
>>> 
>>> 
>>>> On Aug 4, 2019, at 8:37 AM, Matt Sicker <boa...@gmail.com> wrote:
>>>> 
>>>> I’ve read through a bit of the site and blog posts. I’m pretty interested
>>>> in the project, especially any efforts to support more programming
>>>> languages.
>>>> 
>>>> Is it possible to use this to sandbox arbitrary code?
>>>> 
>>>> On Sat, Aug 3, 2019 at 17:22, Mingshen Sun <mingshen....@gmail.com>
>>> wrote:
>>>> 
>>>>> Yes, this project can be used for securing general computations.
>>>>> You can simply use the `mesatee_core` library to write an SGX encalve.
>>>>> In addition, MesaTEE provides others features like function as a
>>> service.
>>>>> That’s why we call it a universal securing computing framework.
>>>>> 
>>>>> Best,
>>>>> Mingshen Sun
>>>>> 
>>>>> On 2019/08/03 15:27:41, Matt Sicker <b...@gmail.com> wrote:
>>>>>> Would this project be useful in securing general computations? You
>>>>> mention>
>>>>>> big data and AI a lot, though I’m wondering if this is also usable for>
>>>>>> things like, say, general multi tenant applications?>
>>>>>> 
>>>>>> On Sat, Aug 3, 2019 at 03:27, Mingshen Sun <ms...@cse.cuhk.edu.hk>
>>>>> wrote:>
>>>>>> 
>>>>>>> Hi,>
>>>>>>>> 
>>>>>>> This is Mingshen Sun from Baidu X-Lab. Recently, we have open-sourced>
>>>>>>> a universal secure computing framework called MesaTEE (>
>>>>>>> https://mesatee.org/).>
>>>>>>> The MesaTEE project enables general computing service for>
>>>>>>> security-critical scenarios,>
>>>>>>> which attracts many attentions from academia and industry.>
>>>>>>>> 
>>>>>>> To better build up the whole ecosystem, we decide to donate the
>>>>> MesaTEE>
>>>>>>> project to>
>>>>>>> Apache Foundation. Therefore, we’d like to propose our project to go>
>>>>>>> through>
>>>>>>> the incubation process.>
>>>>>>>> 
>>>>>>> Attached is our incubation proposal for open discussion. Thank you so
>>>>> much.>
>>>>>>>> 
>>>>>>> Best,>
>>>>>>> Mingshen Sun>
>>>>>>> Baidu X-Lab>
>>>>>>>> 
>>>>>>>> 
>>>>>>> Here is the proposal details:>
>>>>>>>> 
>>>>>>> ======>
>>>>>>>> 
>>>>>>> MesaTEE Apache Incubation Proposal>
>>>>>>>> 
>>>>>>> = Abstract =>
>>>>>>>> 
>>>>>>> MesaTEE is a framework for universal secure computing.>
>>>>>>>> 
>>>>>>> = Proposal =>
>>>>>>>> 
>>>>>>> MesaTEE is the next-gen solution to enable general computing service
>>>>> for>
>>>>>>> security-critical scenarios. It will allow even the most sensitive
>>>>> data to>
>>>>>>> be>
>>>>>>> securely processed to enable offshore businesses without leakage.>
>>>>>>>> 
>>>>>>> The solution combines the advanced Hybrid Memory Safety (HMS) model
>>>>> and the>
>>>>>>> power of the Trusted Computing technologies (e.g., TPM) as well as
>>>>> the>
>>>>>>> Confidential Computing technologies (e.g., Intel SGX).>
>>>>>>>> 
>>>>>>> * Code base:>
>>>>>>>  * https://github.com/mesalock-linux/mesatee>
>>>>>>>  * https://github.com/baidu/rust-sgx-sdk>
>>>>>>> * Website: https://mesatee.org>
>>>>>>> * Documentation: https://mesatee.org/doc/mesatee_sdk/>
>>>>>>>> 
>>>>>>> = Background =>
>>>>>>>> 
>>>>>>> The emerging technologies of big data analytics, machine learning,>
>>>>>>> cloud/edge>
>>>>>>> computing, and blockchain are significantly boosting our productivity,
>>>>> but>
>>>>>>> at>
>>>>>>> the same time they are bringing new confidentiality and integrity>
>>>>>>> concerns. On>
>>>>>>> public cloud and blockchain, sensitive data like health and financial>
>>>>>>> records>
>>>>>>> may be consumed at runtime by untrusted computing processes running
>>>>> on>
>>>>>>> compromised platforms; during in-house data exchange, confidential>
>>>>>>> information>
>>>>>>> may cross different clearance boundaries and possibly fall into the
>>>>> wrong>
>>>>>>> hands;>
>>>>>>> also not to mention the privacy issue arises in offshore data supply>
>>>>>>> chains.>
>>>>>>>> 
>>>>>>> Although the consequences of data breaching have been extensively>
>>>>>>> elaborated, we>
>>>>>>> should also note that proprietary computing algorithms themselves,
>>>>> such as>
>>>>>>> AI>
>>>>>>> models, also need to be well protected. Once leaked, attackers can
>>>>> steal>
>>>>>>> the>
>>>>>>> intellectual properties, or launch whitebox attacks and easily exploit
>>>>> the>
>>>>>>> weaknesses of the models.>
>>>>>>>> 
>>>>>>> Facing all these risky scenarios, we are in desperate need of a
>>>>> trusted and>
>>>>>>> secure mechanism, enabling us to protect both private data and
>>>>> proprietary>
>>>>>>> computing models during a migratable execution in potentially unsafe>
>>>>>>> environments, yet preserving functionalities, performance,
>>>>> compatibility,>
>>>>>>> and>
>>>>>>> flexibility. MesaTEE is targeting to be, as we call it, the full
>>>>> "Universal>
>>>>>>> Secure Computing" stack, so it can help users resolve these runtime>
>>>>>>> security>
>>>>>>> risks.>
>>>>>>>> 
>>>>>>> MesaTEE aims to promote the development of universal secure computing>
>>>>>>> ecosystem>
>>>>>>> through open source and openness, to provide basic support for trust>
>>>>>>> protection>
>>>>>>> for the productivity revolution brought by big data and AI, to
>>>>> completely>
>>>>>>> solve>
>>>>>>> the data exchange or multi-party computing between
>>>>> departments/companies,>
>>>>>>> to>
>>>>>>> enable privacy-crucial services such as financial and medical care
>>>>> using>
>>>>>>> blockchain/cloud services, and to convoy businesses that are closely>
>>>>>>> related to>
>>>>>>> life and safety such as autonomous driving. MesaTEE has been working>
>>>>>>> closely>
>>>>>>> with mainstream cloud computing/blockchain/chip vendors and>
>>>>>>> universities/research institutions to promote hardware TEE, software
>>>>> memory>
>>>>>>> safety, and versatile computing services to create an internationally>
>>>>>>> protected>
>>>>>>> and flexible secure computing framework. MesaTEE’s open-source release
>>>>> will>
>>>>>>> greatly accelerate the development of the next generation of big data>
>>>>>>> business>
>>>>>>> applications, and it is also of great importance to promoting AI ​​in
>>>>> all>
>>>>>>> business>
>>>>>>> areas.>
>>>>>>>> 
>>>>>>> = Rationale =>
>>>>>>>> 
>>>>>>> MesaTEE stack redefines future AI and big data analytics by providing
>>>>> a>
>>>>>>> trusted>
>>>>>>> and secure offshore computing environment. The confidentiality and
>>>>> privacy>
>>>>>>> of>
>>>>>>> data and models can be well protected with MesaTEE, even if data and
>>>>> model>
>>>>>>> originate from different parties with no mutual trust. Moreover, the>
>>>>>>> computing>
>>>>>>> platform itself is not necessarily trusted either. The Trusted
>>>>> Computing>
>>>>>>> Base>
>>>>>>> (TCB) can thus be largely reduced to MesaTEE framework alone. A
>>>>> detailed>
>>>>>>> description of target use-cases can be found at>
>>>>>>> 
>>>>> 
>>> https://github.com/mesalock-linux/mesatee/blob/master/docs/case_study.md.>
>>>>> 
>>>>>>>> 
>>>>>>> We believe that Apache way of open source community empowers MesaTEE
>>>>> to>
>>>>>>> attract>
>>>>>>> a diverse set of contributors who can bring new ideas into the
>>>>> project.>
>>>>>>>> 
>>>>>>> = Initial Goals =>
>>>>>>>> 
>>>>>>> * Move the existing codebase, website, documentation, and mailing
>>>>> lists>
>>>>>>> to an>
>>>>>>>  Apache-hosted infrastructure.>
>>>>>>> * Integrate with the Apache development process.>
>>>>>>> * Ensure all dependencies are compliant with Apache License version
>>>>> 2.0.>
>>>>>>> * Incrementally develop and release per Apache guidelines.>
>>>>>>>> 
>>>>>>> = Current Status =>
>>>>>>>> 
>>>>>>> The MesaTEE project (and its sub-project Rust SGX SDK) has been
>>>>> designed>
>>>>>>> and>
>>>>>>> developed at Baidu since 2017, and was open sourced under the Apache>
>>>>>>> License,>
>>>>>>> Version 2.0 in 2019. The source code is currently hosted at
>>> github.com>
>>>>> 
>>>>>>> (https://github.com/mesalock-linux/mesatee and>
>>>>>>> https://github.com/baidu/rust-sgx-sdk), which will seed the Apache
>>>>> git>
>>>>>>> repository.>
>>>>>>>> 
>>>>>>> == Meritocracy ==>
>>>>>>>> 
>>>>>>> We are fully committed to open, transparent, and meritocratic
>>>>> interactions>
>>>>>>> with>
>>>>>>> our community. In fact, one of the primary motivations for us to enter
>>>>> the>
>>>>>>> incubation process is to be able to rely on Apache best practices that
>>>>> can>
>>>>>>> ensure meritocracy. This will eventually help incorporate the best
>>>>> ideas>
>>>>>>> back>
>>>>>>> into the project and enable contributors to continue investing their
>>>>> time>
>>>>>>> in the>
>>>>>>> project. We already have some guidelines to help external
>>>>> contributors:>
>>>>>>>> 
>>>>>>> *>
>>>>>>> 
>>>>> 
>>> https://github.com/mesalock-linux/mesatee/blob/master/docs/rust_guideline.md
>>>> 
>>>>> 
>>>>>>> *>
>>>>>>> 
>>>>> 
>>> https://github.com/mesalock-linux/mesatee/blob/master/docs/how_to_add_your_function.md
>>>> 
>>>>> 
>>>>>>> *>
>>>>>>> 
>>>>> 
>>> https://github.com/mesalock-linux/mesatee/blob/master/CODE_OF_CONDUCT.md>
>>>>>>>> 
>>>>>>> == Community ==>
>>>>>>>> 
>>>>>>> The MesaTEE community is fairly young. Since our sub-project (Rust
>>>>> SGX>
>>>>>>> SDK) was>
>>>>>>> open sourced in 2017, we received many contributions from various>
>>>>>>> companies and>
>>>>>>> individual researchers (https://github.com/baidu/rust-sgx-sdk/pulls).
>>>>> Our>
>>>>>>> primary goal during the incubation would be to grow the community and>
>>>>>>> groom our>
>>>>>>> existing active contributors for committers.>
>>>>>>>> 
>>>>>>> == Core Developers ==>
>>>>>>>> 
>>>>>>> Current core developers work at Baidu. We are confident that
>>>>> incubation>
>>>>>>> will>
>>>>>>> help us grow a diverse community in an open and collaborative way.>
>>>>>>>> 
>>>>>>> == Alignment ==>
>>>>>>>> 
>>>>>>> MesaTEE is designed as a framework for universal secure computing.
>>>>> This is>
>>>>>>> complementary to the Apache's projects, providing a trusted and
>>>>> secure>
>>>>>>> computing>
>>>>>>> framework.>
>>>>>>>> 
>>>>>>> Our sincere hope is that being a part of the Apache foundation would>
>>>>>>> enable us>
>>>>>>> to drive the future of the project in alignment with the other Apache>
>>>>>>> projects>
>>>>>>> for the benefit of thousands of organizations that already leverage
>>>>> these>
>>>>>>> projects.>
>>>>>>>> 
>>>>>>> = Known Risks =>
>>>>>>>> 
>>>>>>> == Orphaned Products ==>
>>>>>>>> 
>>>>>>> The risk of abandonment of MesaTEE is low. MesaTEE has been incubated
>>>>> at>
>>>>>>> Baidu>
>>>>>>> for over two years. Baidu is committed to the further development of
>>>>> the>
>>>>>>> project>
>>>>>>> and will keep investing resources towards the Apache processes and>
>>>>>>> community>
>>>>>>> building, during the incubation period.>
>>>>>>>> 
>>>>>>> == Inexperience with Open Source ==>
>>>>>>>> 
>>>>>>> Even though the initial committers are new to the Apache world, some
>>>>> have>
>>>>>>> considerable open source experience - Yu Ding, Yiming Jing, Mingshen
>>>>> Sun.>
>>>>>>> We>
>>>>>>> have been successfully managing the current open source community,>
>>>>>>> answering>
>>>>>>> questions, and taking feedback already. Moreover, we hope to obtain>
>>>>>>> guidance and>
>>>>>>> mentorship from current ASF members to help us succeed in the
>>>>> incubation.>
>>>>>>>> 
>>>>>>> == Length of Incubation ==>
>>>>>>>> 
>>>>>>> We expect the project to be in incubation for 2 years or less.>
>>>>>>>> 
>>>>>>> == Homogenous Developers ==>
>>>>>>>> 
>>>>>>> Currently, the lead developers for MesaTEE are from Baidu. However,
>>>>> we>
>>>>>>> have an>
>>>>>>> active set of early contributors/collaborators from Alibaba and other>
>>>>>>> companies,>
>>>>>>> which we hope will increase the diversity going forward. Once again,
>>>>> a>
>>>>>>> primary>
>>>>>>> motivation for the incubation is to facilitate this in the Apache
>>>>> way.>
>>>>>>>> 
>>>>>>> == Reliance on Salaried Developers ==>
>>>>>>>> 
>>>>>>> Both the current committers and early contributors have several years
>>>>> of>
>>>>>>> core>
>>>>>>> expertise around designing trusted computing systems. Current
>>>>> committers>
>>>>>>> are>
>>>>>>> very passionate about the project and have already invested hundreds
>>>>> of>
>>>>>>> hours>
>>>>>>> towards helping and building the community. Thus, even with employer>
>>>>>>> changes, we>
>>>>>>> expect they will be able to actively engage in the project either
>>>>> because>
>>>>>>> they>
>>>>>>> will be working in similar areas even with newer employers or out of>
>>>>>>> belief in>
>>>>>>> the project.>
>>>>>>>> 
>>>>>>> == Relationships with Other Apache Products ==>
>>>>>>>> 
>>>>>>> To the best of our knowledge, there are no directly competing projects
>>>>> with>
>>>>>>> MesaTEE that offer all of the feature set - memory safety, secure>
>>>>>>> computing,>
>>>>>>> multi-party computation, etc. However, some projects share similar
>>>>> goals,>
>>>>>>> e.g.,>
>>>>>>> OpenWhisk which provides a serverless cloud platform. We are committed
>>>>> to>
>>>>>>> open>
>>>>>>> collaboration with such Apache projects and incorporating changes to>
>>>>>>> MesaTEE or>
>>>>>>> contributing patches to other projects, with the goal of making it
>>>>> easier>
>>>>>>> for>
>>>>>>> the community at large, to adopt these open source technologies.>
>>>>>>>> 
>>>>>>> == Excessive Fascination with the Apache Brand ==>
>>>>>>>> 
>>>>>>> The Apache Brand is very respected. We are very honored to have the>
>>>>>>> opportunity>
>>>>>>> to join ASF, with the understanding that its brand policies shall be>
>>>>>>> respected.>
>>>>>>> And we hope Apache can help us build the ecosystem around MesaTEE and>
>>>>>>> attract>
>>>>>>> more developers.>
>>>>>>>> 
>>>>>>> = Documentation =>
>>>>>>>> 
>>>>>>> * Detailed documentation: https://github.com/mesalock-linux/mesatee>
>>>>> 
>>>>>>> * MesaTEE SDK API documentation:
>>>>> https://mesatee.org/doc/mesatee_sdk/>
>>>>>>>> 
>>>>>>> = Initial Source =>
>>>>>>>> 
>>>>>>> The codebase is currently hosted on Github:>
>>>>>>>> 
>>>>>>> * https://github.com/mesalock-linux/mesatee>
>>>>>>> * https://github.com/baidu/rust-sgx-sdk>
>>>>>>>> 
>>>>>>> During incubation, the codebase will be migrated to an Apache>
>>>>>>> infrastructure.>
>>>>>>> The source code of MesaTEE is under Apache version 2.0 License, while
>>>>> Rust>
>>>>>>> SGX>
>>>>>>> SDK is under BSD 3-Clauses License.>
>>>>>>>> 
>>>>>>> = Source and Intellectual Property Submission Plan =>
>>>>>>>> 
>>>>>>> We will work with the committers to get ICLAs signed. We will provide
>>>>> a>
>>>>>>> Software>
>>>>>>> Grant Agreement from an authorized signer per>
>>>>>>> https://www.apache.org/licenses/software-grant-template.pdf>
>>>>>>>> 
>>>>>>> = External Dependencies =>
>>>>>>>> 
>>>>>>> MesaTEE directly depends on these third-party Rust crates:>
>>>>>>>> 
>>>>>>> * adler32, 1.0.3, BSD-3-Clause>
>>>>>>> * aho-corasick, 0.7.4, Unlicense/MIT>
>>>>>>> * array_tool, 1.0.3, MIT>
>>>>>>> * assert_matches, 1.3.0, MIT/Apache-2.0>
>>>>>>> * autocfg, 0.1.4, Apache-2.0/MIT>
>>>>>>> * base64, 0.10.1, MIT/Apache-2.0>
>>>>>>> * bincode, 1.1.4, MIT>
>>>>>>> * bit-vec, 0.6.1, MIT/Apache-2.0>
>>>>>>> * bitflags, 1.1.0, MIT/Apache-2.0>
>>>>>>> * byteorder, 1.3.2, MIT/Unlicense>
>>>>>>> * bytes, 0.5.0, MIT>
>>>>>>> * cc, 1.0.37, MIT/Apache-2.0>
>>>>>>> * cfg-if, 0.1.9, MIT/Apache-2.0>
>>>>>>> * chrono, 0.4.7, MIT/Apache-2.0>
>>>>>>> * color_quant, 1.0.1, MIT>
>>>>>>> * crc32fast, 1.2.0, MIT>
>>>>>>> * ctor, 0.1.9, Apache-2.0>
>>>>>>> * deflate, 0.7.20, MIT/Apache-2.0>
>>>>>>> * either, 1.5.2, MIT/Apache-2.0>
>>>>>>> * env_logger, 0.6.2, MIT/Apache-2.0>
>>>>>>> * erased-serde, 0.3.9, MIT>
>>>>>>> * fnv, 1.0.6, Apache-2.0>
>>>>>>> * getrandom, 0.1.6, MIT>
>>>>>>> * ghost, 0.1.0, MIT/Apache-2.0>
>>>>>>> * gif, 0.10.2, MIT/Apache-2.0>
>>>>>>> * gzip-header, 0.3.0, MIT/Apache-2.0>
>>>>>>> * half, 1.3.0, MIT/Apache-2.0>
>>>>>>> * hashbrown, 0.3.1, Apache-2.0/MIT>
>>>>>>> * heapsize, 0.4.2, MIT/Apache-2.0>
>>>>>>> * hex, 0.3.2, MIT>
>>>>>>> * http, 0.1.17, MIT/Apache-2.0>
>>>>>>> * httparse, 1.3.4, MIT/Apache-2.0>
>>>>>>> * humantime, 1.2.0, MIT/Apache-2.0>
>>>>>>> * image, 0.21.0, MIT>
>>>>>>> * inflate, 0.4.5, MIT>
>>>>>>> * inventory, 0.1.3, MIT>
>>>>>>> * inventory-impl, 0.1.3, MIT>
>>>>>>> * iovec, 0.2.0, MIT/Apache-2.0>
>>>>>>> * itertools, 0.8.0, MIT/Apache-2.0>
>>>>>>> * itoa, 0.4.4, MIT>
>>>>>>> * jpeg-decoder, 0.1.15, MIT>
>>>>>>> * lazy_static, 1.3.0, MIT/Apache-2.0>
>>>>>>> * libc, 0.2.59, MIT>
>>>>>>> * linked-hash-map, 0.5.2, MIT/Apache-2.0>
>>>>>>> * log, 0.4.7, MIT>
>>>>>>> * lzw, 0.10.0, MIT/Apache-2.0>
>>>>>>> * matrixmultiply, 0.2.2, MIT/Apache-2.0>
>>>>>>> * md5, 0.6.1, Apache-2.0/MIT>
>>>>>>> * memchr, 2.2.1, Unlicense/MIT>
>>>>>>> * memory_units, 0.3.0, MPL-2.0>
>>>>>>> * net2, 0.2.33, MIT/Apache-2.0>
>>>>>>> * num, 0.2.0, MIT/Apache-2.0>
>>>>>>> * num-bigint, 0.2.2, MIT/Apache-2.0>
>>>>>>> * num-complex, 0.2.3, MIT/Apache-2.0>
>>>>>>> * num-integer, 0.1.41, MIT/Apache-2.0>
>>>>>>> * num-iter, 0.1.39, MIT/Apache-2.0>
>>>>>>> * num-rational, 0.2.2, MIT/Apache-2.0>
>>>>>>> * num-traits, 0.2.8, MIT/Apache-2.0>
>>>>>>> * parity-wasm, 0.31.3, MIT/Apache-2.0>
>>>>>>> * png, 0.14.1, MIT/Apache-2.0>
>>>>>>> * proc-macro2, 0.4.30, MIT/Apache-2.0>
>>>>>>> * profiler_builtins, 0.1.0, profiler_builtins>
>>>>>>> * quick-error, 1.2.2, MIT/Apache-2.0>
>>>>>>> * quote, 0.3.15, MIT>
>>>>>>> * quote, 0.6.13, MIT>
>>>>>>> * rand, 0.6.5, MIT/Apache-2.0>
>>>>>>> * rand_core, 0.4.0, MIT/Apache-2.0>
>>>>>>> * rand_hc, 0.1.0, MIT/Apache-2.0>
>>>>>>> * rand_pcg, 0.1.2, MIT/Apache-2.0>
>>>>>>> * rawpointer, 0.1.0, MIT/Apache-2.0>
>>>>>>> * regex, 1.1.9, MIT/Apache-2.0>
>>>>>>> * regex-syntax, 0.6.8, MIT/Apache-2.0>
>>>>>>> * ring, 0.14.6, ISC-style>
>>>>>>> * rulinalg, 0.4.2, MIT>
>>>>>>> * rustls, 0.15.2, Apache-2.0/ISC/MIT>
>>>>>>> * rusty-machine, 0.5.4, MIT>
>>>>>>> * ryu, 1.0.0, Apache-2.0>
>>>>>>> * sct, 0.5.0, Apache-2.0/ISC/MIT>
>>>>>>> * serde, 1.0.94, MIT>
>>>>>>> * serde_cbor, 0.10.0, MIT/Apache-2.0>
>>>>>>> * serde_derive, 1.0.94, MIT>
>>>>>>> * serde_json, 1.0.40, MIT>
>>>>>>> * sha1, 0.6.0, BSD-3-Clause>
>>>>>>> * sha2, 0.8.0, sha2>
>>>>>>> * spin, 0.5.0, MIT>
>>>>>>> * syn, 0.11.11, MIT>
>>>>>>> * syn, 0.15.39, MIT>
>>>>>>> * synom, 0.11.3, MIT/Apache-2.0>
>>>>>>> * termcolor, 1.0.5, Unlicense>
>>>>>>> * thread_local, 0.3.6, Apache-2.0/MIT>
>>>>>>> * tiff, 0.3.
>>>>> [message truncated...]
>>>>> ---------------------------------------------------------------------
>>>>> To unsubscribe, e-mail: general-unsubscr...@incubator.apache.org
>>>>> For additional commands, e-mail: general-h...@incubator.apache.org
>>>>> 
>>>>> --
>>>> Matt Sicker <boa...@gmail.com>
>>> 
>>> 
>>> ---------------------------------------------------------------------
>>> To unsubscribe, e-mail: general-unsubscr...@incubator.apache.org
>>> For additional commands, e-mail: general-h...@incubator.apache.org
>>> 
>>> 
> 
> 
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: general-unsubscr...@incubator.apache.org
> For additional commands, e-mail: general-h...@incubator.apache.org
> 


---------------------------------------------------------------------
To unsubscribe, e-mail: general-unsubscr...@incubator.apache.org
For additional commands, e-mail: general-h...@incubator.apache.org

Reply via email to