Enter the query into the form above. You can look for specific version of a package by using @ symbol like this: gcc@10.
API method:
GET /api/packages?search=hello&page=1&limit=20
where search is your query, page is a page number and limit is a number of items on a single page. Pagination information (such as a number of pages and etc) is returned
in response headers.
If you'd like to join our channel webring send a patch to ~whereiseveryone/toys@lists.sr.ht adding your channel as an entry in channels.scm.
Avahi is a system which facilitates service discovery on a local network. It is an implementation of the mDNS (for "Multicast DNS") and DNS-SD (for "DNS-Based Service Discovery") protocols.
Nss-mdns is a plug-in for the GNU C Library's Name Service Switch (NSS) that resolves host names via multicast DNS (mDNS). It is most often used in home and other small networks without a local name server, to resolve host names in the .local top-level domain.
simavr is a new AVR simulator for GNU/Linux or any platform that uses avr-gcc. It uses avr-gcc's own register definition to simplify creating new targets for supported AVR devices. The core was made to be small and compact, and hackable so allow quick prototyping of an AVR project. The AVR core is now stable for use with parts with <= 128KB flash, and with preliminary support for the bigger parts. The simulator loads ELF files directly, and there is even a way to specify simulation parameterps directly in the emulated code using an .elf section. You can also load multipart HEX files.
UFA is a simple to use, lightweight framework which sits atop the hardware USB controller in specific AVR microcontroller models, and allows for the quick and easy creation of complex USB devices and hosts. This package contains the user-submitted projects and bootloaders for use with compatible microcontroller models, as well as the demos and the documentation.
Microscheme, or (ms) for short, is a functional programming language for the Arduino, and for Atmel 8-bit AVR microcontrollers in general. Microscheme is a subset of Scheme, in the sense that every valid (ms) program is also a valid Scheme program (with the exception of Arduino hardware-specific primitives). The (ms) compiler performs function inlining, and features an aggressive tree-shaker, eliminating unused top-level definitions. Microscheme has a robust Foreign Function Interface (FFI) meaning that C code may be invoked directly from (ms) programs.
Ksoloti is an environment for generating and processing digital audio. It can be a programmable virtual modular synthesizer, polysynth, drone box, sequencer, chord generator, multi effect, sample player, looper, granular sampler, MIDI generator/processor, CV or trigger generator, anything in between, and more.
The Ksoloti Core is a rework of the discontinued Axoloti Core board. In short, Ksoloti aims for maximum compatibility with the original Axoloti, but with some layout changes and added features.
This package provides the runtime.
Ksoloti is an environment for generating and processing digital audio. It can be a programmable virtual modular synthesizer, polysynth, drone box, sequencer, chord generator, multi effect, sample player, looper, granular sampler, MIDI generator/processor, CV or trigger generator, anything in between, and more.
The Ksoloti Core is a rework of the discontinued Axoloti Core board. In short, Ksoloti aims for maximum compatibility with the original Axoloti, but with some layout changes and added features.
This package provides the patcher application.
The Axoloti patcher offers a “patcher” environment similar to Pure Data for sketching digital audio algorithms. The patches run on a standalone powerful microcontroller board: Axoloti Core. This package provides the runtime.
Ksoloti is an environment for generating and processing digital audio. It can be a programmable virtual modular synthesizer, polysynth, drone box, sequencer, chord generator, multi effect, sample player, looper, granular sampler, MIDI generator/processor, CV or trigger generator, anything in between, and more.
The Ksoloti Core is a rework of the discontinued Axoloti Core board. In short, Ksoloti aims for maximum compatibility with the original Axoloti, but with some layout changes and added features.
This package provides the patcher application.
The Axoloti patcher offers a “patcher” environment similar to Pure Data for sketching digital audio algorithms. The patches run on a standalone powerful microcontroller board: Axoloti Core. This package provides the patcher application.
wimlib is a C library and set of command-line utilities for creating, modifying, extracting, and mounting archives in the Windows Imaging Format (WIM files). It can capture and apply WIMs directly from and to NTFS volumes using ntfs-3g, preserving NTFS-specific attributes.
Rdup is a utility inspired by rsync and the plan9 way of doing backups. Rdup itself does not backup anything, it only print a list of absolute file names to standard output. Auxiliary scripts are needed that act on this list and implement the backup strategy.
Burp is a network backup and restore program. It attempts to reduce network traffic and the amount of space that is used by each backup.
Borg is a deduplicating backup program. Optionally, it supports compression and authenticated encryption. The main goal of Borg is to provide an efficient and secure way to backup data. The data deduplication technique used makes Borg suitable for daily backups since only changes are stored. The authenticated encryption technique makes it suitable for storing backups on untrusted computers.
Restic is a program that does backups right and was designed with the following principles in mind:
Easy: Doing backups should be a frictionless process, otherwise you might be tempted to skip it. Restic should be easy to configure and use, so that, in the event of a data loss, you can just restore it. Likewise, restoring data should not be complicated.
Fast: Backing up your data with restic should only be limited by your network or hard disk bandwidth so that you can backup your files every day. Nobody does backups if it takes too much time. Restoring backups should only transfer data that is needed for the files that are to be restored, so that this process is also fast.
Verifiable: Much more important than backup is restore, so restic enables you to easily verify that all data can be restored.
Secure: Restic uses cryptography to guarantee confidentiality and integrity of your data. The location the backup data is stored is assumed not to be a trusted environment (e.g. a shared space where others like system administrators are able to access your backups). Restic is built to secure your data against such attackers.
Efficient: With the growth of data, additional snapshots should only take the storage of the actual increment. Even more, duplicate data should be de-duplicated before it is actually written to the storage back end to save precious backup space.
Duplicity backs up directories by producing encrypted tar-format volumes and uploading them to a remote or local file server. Because duplicity uses librsync, the incremental archives are space efficient and only record the parts of files that have changed since the last backup. Because duplicity uses GnuPG to encrypt and/or sign these archives, they will be safe from spying and/or modification by the server.
Vorta is a graphical backup client based on the Borg backup tool. It supports the use of remote backup repositories. It can perform scheduled backups, and has a graphical tool for browsing and extracting the Borg archives.
Grsync is a simple graphical interface using GTK for the rsync command line program. It currently supports only a limited set of the most important rsync features, but can be used effectively for local directory synchronization.
With dirvish you can maintain a set of complete images of your file systems with unattended creation and expiration. A dirvish backup vault is like a time machine for your data.
rsnapshot is a file system snapshot utility based on rsync. rsnapshot makes it easy to make periodic snapshots of local machines, and remote machines over SSH. To reduce the disk space required for each backup, rsnapshot uses hard links to deduplicate identical files.
Rdiff-backup backs up one directory to another, possibly over a network. The target directory ends up a copy of the source directory, but extra reverse diffs are stored in a special subdirectory of that target directory, so you can still recover files lost some time ago. The idea is to combine the best features of a mirror and an incremental backup. Rdiff-backup also preserves subdirectories, hard links, dev files, permissions, uid/gid ownership, modification times, extended attributes, acls, and resource forks. Also, rdiff-backup can operate in a bandwidth efficient manner over a pipe, like rsync. Thus you can use rdiff-backup and ssh to securely back a hard drive up to a remote location, and only the differences will be transmitted. Finally, rdiff-backup is easy to use and settings have sensible defaults.
SnapRAID backs up files stored across multiple storage devices, such as disk arrays, in an efficient way reminiscent of its namesake RAID level 4.
Instead of creating a complete copy of the data like classic backups do, it saves space by calculating one or more sets of parity information that's a fraction of the size. Each parity set is stored on an additional device the size of the largest single storage volume, and protects against the loss of any one device, up to a total of six. If more devices fail than there are parity sets, (only) the files they contained are lost, not the entire array. Data corruption by unreliable devices can also be detected and repaired.
SnapRAID is distinct from actual RAID in that it operates on files and creates distinct snapshots only when run. It mainly targets large collections of big files that rarely change, like home media centers. One disadvantage is that all data not in the latest snapshot may be lost if one device fails. An advantage is that accidentally deleted files can be recovered, which is not the case with RAID.
It's also more flexible than true RAID: devices can have different sizes and more can be added without disturbing others. Devices that are not in use can remain fully idle, saving power and producing less noise.
Btar is a tar-compatible archiver which allows arbitrary compression and ciphering, redundancy, differential backup, indexed extraction, multicore compression, input and output serialisation, and tolerance to partial archive errors.
The Restic REST server is a high performance HTTP server that implements restic's REST backend API. It provides a secure and efficient way to backup data remotely, using the restic backup client and a rest: URL.