Your message dated Thu, 01 Dec 2022 02:40:03 +0000 with message-id <[email protected]> and subject line Bug#1025101: fixed in rust-zstd-safe 5.0.2-2 has caused the Debian Bug report #1025101, regarding rust-zstd-safe: Disabling std feature disables code to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [email protected] immediately.) -- 1025101: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1025101 Debian Bug Tracking System Contact [email protected] with problems
--- Begin Message ---Source: rust-zstd-safe Version: 5.0.2-1 Severity: normal Dear Maintainer, I'm trying to build the elan package[1] against lib-rust-zstd and I'm running into errors like the following: ``` error[E0277]: the trait bound `Vec<_>: WriteBuf` is not satisfied --> /usr/share/cargo/registry/elan-1.4.2/debian/cargo_registry/zstd-0.11.2/src/bulk/compressor.rs:135:39 | 135 | self.compress_to_buffer(data, &mut buffer)?; | ------------------ ^^^^^^^^^^^ the trait `WriteBuf` is not implemented for `Vec<_>` | | | required by a bound introduced by this call | ``` I think this is because the WriteBuf implementation for Vec<_> in the rust-zstd-safe Debian package is disabled by the `std` feature flag [2]. Is there a way you could get rust-zstd-safe to use the Debian libzstd without disabling this code that elan depends upon? (N.B. Hitherto I have patched out zstd support in elan [3], but the lean community are now depending on zstd support, so the elan package is useless without it.) Thanks, Christopher Hoskin [1] https://tracker.debian.org/pkg/elan [2] https://sources.debian.org/src/rust-zstd-safe/5.0.2-1/src/lib.rs/#L1273 [3] https://salsa.debian.org/debian/elan/-/blob/debian/latest/debian/patches/0002-Revert-feat-support-tar.zst-archives.patch *** Reporter, please consider answering these questions, where appropriate *** * What led up to the situation? * What exactly did you do (or not do) that was effective (or ineffective)? * What was the outcome of this action? * What outcome did you expect instead? *** End of the template - remove these template lines *** -- System Information: Debian Release: bookworm/sid APT prefers testing APT policy: (990, 'testing'), (500, 'unstable') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 6.0.0-4-amd64 (SMP w/16 CPU threads; PREEMPT) Kernel taint flags: TAINT_USER Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8), LANGUAGE=en_GB:en Shell: /bin/sh linked to /usr/bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled
--- End Message ---
--- Begin Message ---Source: rust-zstd-safe Source-Version: 5.0.2-2 Done: Peter Michael Green <[email protected]> We believe that the bug you reported is fixed in the latest version of rust-zstd-safe, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [email protected], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Peter Michael Green <[email protected]> (supplier of updated rust-zstd-safe package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [email protected]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Format: 1.8 Date: Thu, 01 Dec 2022 01:35:54 +0000 Source: rust-zstd-safe Architecture: source Version: 5.0.2-2 Distribution: unstable Urgency: medium Maintainer: Debian Rust Maintainers <[email protected]> Changed-By: Peter Michael Green <[email protected]> Closes: 1025101 Changes: rust-zstd-safe (5.0.2-2) unstable; urgency=medium . * Team upload. * Package zstd-safe 5.0.2+zstd.1.5.2 from crates.io using debcargo 2.6.0 * Re-enable std feature (Closes: #1025101) Checksums-Sha1: 44b13deee2a3ac0cab0cc8798fc8e2d4df0ce7c8 2336 rust-zstd-safe_5.0.2-2.dsc 11bf4eefaec346b208cd23d007b5fdd693d7d37f 3796 rust-zstd-safe_5.0.2-2.debian.tar.xz 268c400a8e8c89895f1f3b39a262014d23e3c9ce 7366 rust-zstd-safe_5.0.2-2_source.buildinfo Checksums-Sha256: 9cd27ea3c5e02da4761d894c40c2329026d91b596afd5c15a7edb76f3fbfc040 2336 rust-zstd-safe_5.0.2-2.dsc 670ab8104af000450aec72d2fad4e024c8a6d682c9d5d413ce8f144d13da690c 3796 rust-zstd-safe_5.0.2-2.debian.tar.xz e2c79fa3b2e4580c06bdde8b65641ba60278b81c4c07b40dd0058356310a6cdb 7366 rust-zstd-safe_5.0.2-2_source.buildinfo Files: 20c9649aaa7667354feafe0779d4eca8 2336 rust optional rust-zstd-safe_5.0.2-2.dsc 0539ef054fce9c053fdb2698092a9311 3796 rust optional rust-zstd-safe_5.0.2-2.debian.tar.xz c73f5cb60ecca834c73a79b5c3f8edab 7366 rust optional rust-zstd-safe_5.0.2-2_source.buildinfo -----BEGIN PGP SIGNATURE----- iQJIBAEBCAAyFiEEU0DQATYMplbjSX63DEjqKnqP/XsFAmOICrAUHHBsdWd3YXNo QGRlYmlhbi5vcmcACgkQDEjqKnqP/XscPxAAiId9IrxxPcjQ80Now0poXcW1mCFp m25jo6lyZuqDzieH9whZMWe4SqjdosGMNgAZ9K1kXC50wo7ZeS9It5stn0fpz1LI Mh5bfxwSrSXjUTDtA8ZkWrWChqgJjo9axPnxd8qVtdq8DLjyy8gWQXCkmPh/Uwq0 ARhT6CWSjZmQ8JDVUpqtlZUnBwPaEqrtjW+L8ENeFvZrUunpr/tBkTUJ1qLoWFHG 3MFoRFvCnuqiMk11uG4zzZge/6AraEyk1hXpfmDnwsbuk/kvXXRo1Rjwdsa7L1Rt hB23dHi7et5VEmQQCoLfilQ4vQYynSfOYiVxlkYoshBRAcciiE0fIjSmM+Pd/eG4 7ry0xZJAGI3JOl7KlXPAMHVrWbmteFBrywSg0Mv4OZZfidOV0s/Lr8Gpqxfw8HVq YAdjoqsknWVWD7jZKNKbNVCv5PT4/GlvjMytg5fH0tBZcVJ82TCIN5+8dPVPEDjv hfcu/ODZlgnzkm8Ufrthdd/nkfsuRbHM6UER9cbfGnhXsNYrOrGvKHcH9E0Oo+lN g3tEjHVv+5IXFfri4nI/8z1sorFA/nRu3Yyr7yuQ0Rr+j0t8oQHcYrRhCVEONWwQ 0UrwsqBOvBxMhqsPseZTcEHRZQzsNkDjYjlvrR2p/xa0dVXBhM1T1Bn5ZFmlgg6K qNrQV63g4heyRxs= =Qphi -----END PGP SIGNATURE-----
--- End Message ---

