From 6f49a16d833249fa81f4ee7c1b4297489ae1d6d5 Mon Sep 17 00:00:00 2001 From: Clement Rey Date: Mon, 22 Jan 2024 14:42:11 +0100 Subject: [PATCH] no more polars --- Cargo.toml | 3 --- deny.toml | 2 -- 2 files changed, 5 deletions(-) diff --git a/Cargo.toml b/Cargo.toml index 5c7519f26eb1..728b89cc878d 100644 --- a/Cargo.toml +++ b/Cargo.toml @@ -173,9 +173,6 @@ paste = "1.0" pathdiff = "0.2" pico-args = "0.5" ply-rs = { version = "0.1", default-features = false } -polars-core = "0.29" -polars-lazy = "0.29" -polars-ops = "0.29" poll-promise = "0.3" pollster = "0.3" prettyplease = "0.2" diff --git a/deny.toml b/deny.toml index 1870db027366..337e17bd3128 100644 --- a/deny.toml +++ b/deny.toml @@ -27,7 +27,6 @@ vulnerability = "deny" unmaintained = "warn" yanked = "deny" ignore = [ - "RUSTSEC-2020-0071", # https://rustsec.org/advisories/RUSTSEC-2020-0071 - Potential segfault in the time crate. Remove once a new polars is released with https://github.com/pola-rs/polars/pull/6979 "RUSTSEC-2023-0052", # https://rustsec.org/advisories/RUSTSEC-2023-0052 - webpki: CPU denial of service in certificate path building - can be fixed by `cargo update -p ureq`, but then we run into duplicate crates: https://github.com/algesten/ureq/issues/653 "RUSTSEC-2023-0065", # https://rustsec.org/advisories/RUSTSEC-2023-0065 - Tungstenite WebSocket server can be DOS-attacked by malicious clients ] @@ -62,7 +61,6 @@ skip = [ skip-tree = [ { name = "async-io" }, # Old version via rfd { name = "cargo-run-wasm" }, # Dev-tool - { name = "comfy-table" }, # arrow vs. polars use different major versions (polars' one is dev-dep only) { name = "core-graphics" }, # old version via arboard { name = "criterion" }, # dev-dependency { name = "objc2" }, # old version via accesskit