Hi, in order to test the new toolchain, on top of the standard tests, I also
rebuilt a selection of packages from main in advance as well:
https://launchpad.net/~maxgmr/+archive/ubuntu/rust-defaults-1.93.1-main-test2/+packages

Naturally, there will always be a risk of FTBFS, but historically it's been
pretty rare due to the upstream Rust team's commitment to backwards
compatibility.

Over the course of the 26.04 devel cycle, we've seen just one FTBFS[1] and
it was from a package that hard-coded a pre-RVA23 RISC-V target into its
config. I fixed this in Debian[2] without much trouble.

[1]: https://bugs.launchpad.net/ubuntu/+source/mozjs140/+bug/2143666
[2]: https://salsa.debian.org/gnome-team/mozjs/-/merge_requests/12

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2138519

Title:
  [FFE] Upgrade Rust to 1.93.1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/rust-defaults/+bug/2138519/+subscriptions


-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to