Your message dated Thu, 01 Dec 2022 02:40:03 +0000
with message-id <[email protected]>
and subject line Bug#1025101: fixed in rust-zstd-safe 5.0.2-2
has caused the Debian Bug report #1025101,
regarding rust-zstd-safe: Disabling std feature disables code
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
1025101: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1025101
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: rust-zstd-safe
Version: 5.0.2-1
Severity: normal

Dear Maintainer,

I'm trying to build the elan package[1] against lib-rust-zstd and I'm running 
into errors like the following:
```
error[E0277]: the trait bound `Vec<_>: WriteBuf` is not satisfied
   --> 
/usr/share/cargo/registry/elan-1.4.2/debian/cargo_registry/zstd-0.11.2/src/bulk/compressor.rs:135:39
    |
135 |         self.compress_to_buffer(data, &mut buffer)?;
    |              ------------------       ^^^^^^^^^^^ the trait `WriteBuf` is 
not implemented for `Vec<_>`
    |              |
    |              required by a bound introduced by this call
    |
```
I think this is because the WriteBuf implementation for Vec<_> in the 
rust-zstd-safe Debian package is disabled by the `std` feature flag [2].

Is there a way you could get rust-zstd-safe to use the Debian libzstd without 
disabling this code that elan depends upon?

(N.B. Hitherto I have patched out zstd support in elan [3], but the lean
community are now depending on zstd support, so the elan package is useless
without it.)

Thanks,

Christopher Hoskin

[1] https://tracker.debian.org/pkg/elan
[2] https://sources.debian.org/src/rust-zstd-safe/5.0.2-1/src/lib.rs/#L1273
[3] 
https://salsa.debian.org/debian/elan/-/blob/debian/latest/debian/patches/0002-Revert-feat-support-tar.zst-archives.patch


*** Reporter, please consider answering these questions, where appropriate ***

   * What led up to the situation?
   * What exactly did you do (or not do) that was effective (or
     ineffective)?
   * What was the outcome of this action?
   * What outcome did you expect instead?

*** End of the template - remove these template lines ***


-- System Information:
Debian Release: bookworm/sid
  APT prefers testing
  APT policy: (990, 'testing'), (500, 'unstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 6.0.0-4-amd64 (SMP w/16 CPU threads; PREEMPT)
Kernel taint flags: TAINT_USER
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_GB:en
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

--- End Message ---
--- Begin Message ---
Source: rust-zstd-safe
Source-Version: 5.0.2-2
Done: Peter Michael Green <[email protected]>

We believe that the bug you reported is fixed in the latest version of
rust-zstd-safe, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Peter Michael Green <[email protected]> (supplier of updated rust-zstd-safe 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Thu, 01 Dec 2022 01:35:54 +0000
Source: rust-zstd-safe
Architecture: source
Version: 5.0.2-2
Distribution: unstable
Urgency: medium
Maintainer: Debian Rust Maintainers 
<[email protected]>
Changed-By: Peter Michael Green <[email protected]>
Closes: 1025101
Changes:
 rust-zstd-safe (5.0.2-2) unstable; urgency=medium
 .
   * Team upload.
   * Package zstd-safe 5.0.2+zstd.1.5.2 from crates.io using debcargo 2.6.0
   * Re-enable std feature (Closes: #1025101)
Checksums-Sha1:
 44b13deee2a3ac0cab0cc8798fc8e2d4df0ce7c8 2336 rust-zstd-safe_5.0.2-2.dsc
 11bf4eefaec346b208cd23d007b5fdd693d7d37f 3796 
rust-zstd-safe_5.0.2-2.debian.tar.xz
 268c400a8e8c89895f1f3b39a262014d23e3c9ce 7366 
rust-zstd-safe_5.0.2-2_source.buildinfo
Checksums-Sha256:
 9cd27ea3c5e02da4761d894c40c2329026d91b596afd5c15a7edb76f3fbfc040 2336 
rust-zstd-safe_5.0.2-2.dsc
 670ab8104af000450aec72d2fad4e024c8a6d682c9d5d413ce8f144d13da690c 3796 
rust-zstd-safe_5.0.2-2.debian.tar.xz
 e2c79fa3b2e4580c06bdde8b65641ba60278b81c4c07b40dd0058356310a6cdb 7366 
rust-zstd-safe_5.0.2-2_source.buildinfo
Files:
 20c9649aaa7667354feafe0779d4eca8 2336 rust optional rust-zstd-safe_5.0.2-2.dsc
 0539ef054fce9c053fdb2698092a9311 3796 rust optional 
rust-zstd-safe_5.0.2-2.debian.tar.xz
 c73f5cb60ecca834c73a79b5c3f8edab 7366 rust optional 
rust-zstd-safe_5.0.2-2_source.buildinfo

-----BEGIN PGP SIGNATURE-----

iQJIBAEBCAAyFiEEU0DQATYMplbjSX63DEjqKnqP/XsFAmOICrAUHHBsdWd3YXNo
QGRlYmlhbi5vcmcACgkQDEjqKnqP/XscPxAAiId9IrxxPcjQ80Now0poXcW1mCFp
m25jo6lyZuqDzieH9whZMWe4SqjdosGMNgAZ9K1kXC50wo7ZeS9It5stn0fpz1LI
Mh5bfxwSrSXjUTDtA8ZkWrWChqgJjo9axPnxd8qVtdq8DLjyy8gWQXCkmPh/Uwq0
ARhT6CWSjZmQ8JDVUpqtlZUnBwPaEqrtjW+L8ENeFvZrUunpr/tBkTUJ1qLoWFHG
3MFoRFvCnuqiMk11uG4zzZge/6AraEyk1hXpfmDnwsbuk/kvXXRo1Rjwdsa7L1Rt
hB23dHi7et5VEmQQCoLfilQ4vQYynSfOYiVxlkYoshBRAcciiE0fIjSmM+Pd/eG4
7ry0xZJAGI3JOl7KlXPAMHVrWbmteFBrywSg0Mv4OZZfidOV0s/Lr8Gpqxfw8HVq
YAdjoqsknWVWD7jZKNKbNVCv5PT4/GlvjMytg5fH0tBZcVJ82TCIN5+8dPVPEDjv
hfcu/ODZlgnzkm8Ufrthdd/nkfsuRbHM6UER9cbfGnhXsNYrOrGvKHcH9E0Oo+lN
g3tEjHVv+5IXFfri4nI/8z1sorFA/nRu3Yyr7yuQ0Rr+j0t8oQHcYrRhCVEONWwQ
0UrwsqBOvBxMhqsPseZTcEHRZQzsNkDjYjlvrR2p/xa0dVXBhM1T1Bn5ZFmlgg6K
qNrQV63g4heyRxs=
=Qphi
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to