معرفی شرکت ها
libghc-hackage-security-prof_0.5.2.2-8build8_i386.deb
تبلیغات ما
مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.
مشاهده بیشترتبلیغات ما
مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.
مشاهده بیشترتبلیغات ما
مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.
مشاهده بیشترتبلیغات ما
مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.
مشاهده بیشترتبلیغات ما
مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.
مشاهده بیشترتوضیحات
ویژگی | مقدار |
---|---|
سیستم عامل | Linux |
توزیع | Ubuntu Bionic-18.04 |
مخزن | Ubuntu universe i386 |
نام بسته | libghc-hackage-security-prof |
نام فایل بسته | libghc-hackage-security-prof_0.5.2.2-8build8_i386.deb |
نسخه بسته | 0.5.2.2 |
انتشار بسته | 8build8 |
معماری بسته | i386 |
نگهدارنده | Ubuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com> |
تاریخ ساخت | - |
هاست سازنده | - |
نوع بسته | .deb |
آدرس صفحه اصلی | https://github.com/well-typed/hackage-security |
مجوز | - |
حجم دانلود | 614036 |
حجم نصب | 4948 |
جایگزین ها
بسته | نسخه | معماری | مخزن |
---|---|---|---|
libghc-hackage-security-prof_0.5.2.2-8build8_amd64.deb | 0.5.2.2 | amd64 | Ubuntu universe |
نیازمندی
مقدار | نام |
---|---|
= 0.5.2.2-8build8 | libghc-hackage-security-dev |
- | libghc-cabal-prof-1.24.2.0-353fc |
- | libghc-base-prof-4.9.1.0-5a696 |
- | libghc-base16-bytestring-prof-0.1.1.6-c8f62 |
- | libghc-base64-bytestring-prof-1.0.0.1-caecc |
- | libghc-bytestring-prof-0.10.8.1-a98c5 |
- | libghc-containers-prof-0.5.7.1-ed950 |
- | libghc-cryptohash-prof-0.11.9-a67fe |
- | libghc-directory-prof-1.3.0.0-b5c22 |
- | libghc-ed25519-prof-0.0.5.0-c0713 |
- | libghc-filepath-prof-1.4.1.1-32f1a |
- | libghc-ghc-prim-prof-0.5.0.0-fcda7 |
- | libghc-mtl-prof-2.2.1-93d32 |
- | libghc-network-prof-2.6.3.2-67243 |
- | libghc-network-uri-prof-2.6.1.0-5f962 |
- | libghc-parsec-prof-3.1.11-fa71e |
- | libghc-pretty-prof-1.1.3.3-92eaa |
- | libghc-tar-prof-0.5.0.3-e6bb8 |
- | libghc-template-haskell-prof-2.11.1.0-ae950 |
- | libghc-time-prof-1.6.0.1-fbdf1 |
- | libghc-transformers-prof-0.5.2.0-e204f |
- | libghc-zlib-prof-0.6.1.2-f6ce5 |
نحوه نصب
نصب پکیج deb libghc-hackage-security-prof:
sudo apt-get install libghc-hackage-security-prof_0.5.2.2-8build8_i386.deb
فایل ها
مسیرها |
---|
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/Client/Formats.p_hi |
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/Client/Repository/Cache.p_hi |
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/Client/Repository/HttpLib.p_hi |
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/Client/Repository/Local.p_hi |
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/Client/Repository/Remote.p_hi |
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/Client/Repository.p_hi |
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/Client/Verify.p_hi |
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/Client.p_hi |
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/JSON.p_hi |
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/Key/Env.p_hi |
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/Key.p_hi |
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/Server.p_hi |
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/TUF/Common.p_hi |
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/TUF/FileInfo.p_hi |
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/TUF/FileMap.p_hi |
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/TUF/Header.p_hi |
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/TUF/Layout/Cache.p_hi |
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/TUF/Layout/Index.p_hi |
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/TUF/Layout/Repo.p_hi |
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/TUF/Mirrors.p_hi |
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/TUF/Paths.p_hi |
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/TUF/Patterns.p_hi |
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/TUF/Root.p_hi |
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/TUF/Signed.p_hi |
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/TUF/Snapshot.p_hi |
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/TUF/Targets.p_hi |
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/TUF/Timestamp.p_hi |
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/TUF.p_hi |
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/Trusted/TCB.p_hi |
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/Trusted.p_hi |
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/Util/Base64.p_hi |
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/Util/Checked.p_hi |
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/Util/IO.p_hi |
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/Util/JSON.p_hi |
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/Util/Lens.p_hi |
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/Util/Path.p_hi |
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/Util/Pretty.p_hi |
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/Util/Some.p_hi |
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/Util/Stack.p_hi |
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/Util/TypedEmbedded.p_hi |
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Prelude.p_hi |
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Text/JSON/Canonical.p_hi |
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/libHShackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj_p.a |
./usr/share/doc/libghc-hackage-security-prof/copyright |
./usr/share/doc/libghc-hackage-security-prof/changelog.Debian.gz -> ../libghc-hackage-security-dev/changelog.Debian.gz |