Laurențiu Nicola
Laurențiu Nicola
For anyone running into this, `dnf copr` still supports `enable` and `disable`.
Would this take into account the dependencies of the crate?
This comes up pretty often, but I think most of the crates end up depending transitively on unsafe code. That's the way things go.
@darkblue-b given your apparent recent success in building GDAL with Arrow support, do you still think this is desirable?
I see this in 0.61.0:  The strange part is that I can't reproduce it outside of `git diff`. There are no other modified files. You can try to reproduce...
It would be nice to have a better solution. I didn't check the contents of that directory, but copying data files on the fly isn't necessarily a great idea, see...
Hypothetical: if there is, say, an arbitrary code execution bug (or another security bug) in `rustc` or `cargo`, a malicious repository would still be able to ask for that version...
That depends. If it's a long-standing bug (introduced in 1.10, found today), that would be impractical.
Why not ZIP? `.tgz` is a pretty poor format for random access, and would probably require an external index.
The format itself should allow you to get a `deflate`d stream directly out of the archive. You can test this with `zip foo.zip foo.txt` and `zlib-flate -compress < foo.txt >...