Hi, in order to test the new toolchain, on top of the standard tests, I also rebuilt a selection of packages from main in advance as well: https://launchpad.net/~maxgmr/+archive/ubuntu/rust-defaults-1.93.1-main-test2/+packages
Naturally, there will always be a risk of FTBFS, but historically it's been pretty rare due to the upstream Rust team's commitment to backwards compatibility. Over the course of the 26.04 devel cycle, we've seen just one FTBFS[1] and it was from a package that hard-coded a pre-RVA23 RISC-V target into its config. I fixed this in Debian[2] without much trouble. [1]: https://bugs.launchpad.net/ubuntu/+source/mozjs140/+bug/2143666 [2]: https://salsa.debian.org/gnome-team/mozjs/-/merge_requests/12 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2138519 Title: [FFE] Upgrade Rust to 1.93.1 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/rust-defaults/+bug/2138519/+subscriptions -- ubuntu-bugs mailing list [email protected] https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
