playdaters , to random
@playdaters@gamedev.social avatar

I repeat, from today Support is completed 🎉
This is means that all crates works on that OS as expected, tests going on CI regularly and that CI-checks marked as required for merge from now.

https://github.com/boozook/playdate/milestone/3?closed=1

benny , to random
@benny@social.linux.pizza avatar

Hey #rustlang, #webdev, #accessibility, and #a11y folks! We have a bug in @thisweekinrust that we've been trying to figure out how to fix. If you could weigh in on this GitHub issue, I'd appreciate it! https://github.com/rust-lang/this-week-in-rust/issues/3592#issuecomment-2089478290

weiznich , to random
@weiznich@social.weiznich.de avatar

I’m happy to see the diagnostic namespace finally in a stable release. This is the result of nearly 2 years of work.

I would like to thank the Rust Foundation for funding a part of the work. I also would like to thank @ekuber and @errs for their help and guidance while designing and building this feature.

If you want to support my work on this feature or on diesel you can sponsor me on GitHub: https://github.com/sponsors/weiznich

RE: https://social.rust-lang.org/@rust/112371797442463604

predrag , to random
@predrag@hachyderm.io avatar

cargo-semver-checks now adds the latest Rust to its CI test matrix automatically 🤩

I love automating repetitive maintenance work, and Rust 1.78 is a great real-world test case to make sure this new automation works properly. It did!
https://github.com/obi1kenobi/cargo-semver-checks/pull/773

TehPenguin , to random
@TehPenguin@hachyderm.io avatar

Only took it a couple of years, but the cc-rs crate will finally use the spectre-mitigated CRT if you're building in a spectre-mitigated VS Command Prompt (or happen to set the correct env var): https://github.com/rust-lang/cc-rs/pull/673

It'll be a while before this flows into the Rust Compiler itself, so in the meantime we did publish a crate to do the same thing: https://crates.io/crates/msvc_spectre_libs

spacekookie , to random
@spacekookie@octodon.social avatar

Uuuh, I guess I need a new job soon...

Who's hiring Rust people at the moment? Preferably based in Germany/ Europe? CV is here: https://spacekookie.de/downloads/resume-kookie-2024.pdf

[ ]

imperio , to random
@imperio@toot.cat avatar

Removed some images from rustdoc and inlined them in the CSS directly: meaning less downloads and thus faster page load. :)

PR: https://github.com/rust-lang/rust/pull/123734

mo8it , to random
@mo8it@fosstodon.org avatar

v6 beta is here! 🤩🎉

Russtlings is an official Rust project offering a set of interactive exercises to practice 🦀

I have been working on the rewrite for about a month 😇
Now I hope to find some people willing to test the beta release and provide some feedback 🥰

You want to test it? 😃 Here are the instructions:
https://github.com/rust-lang/rustlings/tree/v6#getting-started

Issue for feedback ✍️
https://github.com/rust-lang/rustlings/issues/1960

A tiny demo of Rustlings v6 (beta) in Zellij

imperio , to random
@imperio@toot.cat avatar

The inline_const Rust feature has been stabilized!

Take a look at the first comment in the PR to see what it will allow you to do. :)

https://github.com/rust-lang/rust/pull/104087

epage , to random
@epage@hachyderm.io avatar

As a reminder, the Cargo team holds office hours, particularly aimed at those interested at contributing!

https://github.com/rust-lang/cargo/wiki/Office-Hours

shom , to random
@shom@fosstodon.org avatar

I'm a fan of data sovereignty, decentralization, and Fediverse but discoverability without 3rd party platforms (like Fediverse) is a challenge. I've always liked the idea of webrings and to take back more of the web, I launched one recently with the community: https://shom.dev/posts/20240417_starting-a-webring-in-2024/

Thanks to @kern for their excellent Ringfairy generator in Rust which helped knock this off the wishlist and into a real thing. Come join!

TehPenguin , (edited ) to random
@TehPenguin@hachyderm.io avatar

Finally, it's done! officially supports https://github.com/rust-lang/rust/pull/123144

Of course there's still more work to do - file an MCP to promote to tier 2, add tests to various dependencies...

playdaters , to random
@playdaters@gamedev.social avatar

🎉 Rusty Playdate Update!

Crates updated:

  1. playdate-build-utils: v0.3.1
  2. playdate-device: v0.2.4
  3. playdate-simulator-utils: v0.1.4
  4. playdate-bindgen-cfg: v0.1.4
  5. playdate-tool: v0.3.1
  6. playdate-build: v0.2.5
  7. playdate-bindgen: v0.1.8

https://github.com/boozook/playdate

anna , to random
@anna@blahaj.zone avatar

Now that I'm on a new instance, I guess I should do an .

I'm Anna, lesbian extraordinaire. I made a lot of plugins for FFXIV, I made Heliosphere (a website+plugin for FFXIV mods), I've made a pastebin... Just a lot of stuff that's caught my interest.

I use a lot of and . I like to read and on my ereader. I like TTRPGs, video games (), some TV and movies, almost all music, and my girlfriend.

I'm very left-leaning, and I believe everyone should have rights - equitable rights at that. (How is this a lefty thing to say and not just normal, basic compassion?) If you are bigoted in any way, I want nothing to do with you.

I don't know. I think I'm pretty average. If I get safe vibes from you, I'll probably approve your follow request.

TLDR: idk am gorl

nrc , to random
@nrc@hachyderm.io avatar

I'm easing myself back into work with the goal of offering freelance software engineering consultation and Rust education. More news soon, but in the meantime I have availability to take on a few clients for short-term Rust coaching/advice/mentoring/expert support over the next couple of months. If you're thinking of adopting Rust or are learning Rust and want to deepen you or your team's understanding and become more effective, lets chat!

rust_discussions Bot , to random
@rust_discussions@mastodon.social avatar
TehPenguin , to random
@TehPenguin@hachyderm.io avatar

It took me days to debug this, but I'm finally one step closer to supporting Arm64EC on : https://github.com/rust-lang/rust/pull/123467

Unfortunately there's one more fix needed in so it may take a little while longer yet...

seanmonstar , to random
@seanmonstar@masto.ai avatar

New hyper h2 v0.4.4 and v0.3.26 out to help with the new HTTP/2 Continuation Flood:

https://seanmonstar.com/blog/hyper-http2-continuation-flood/

rene_mobile , to random
@rene_mobile@infosec.exchange avatar

My current take on the situation, not having read the actual source backdoor commits yet (thanks a lot for hiding the evidence at this point...) besides reading what others have written about it (cf. https://boehs.org/node/everything-i-know-about-the-xz-backdoor for a good timeline):

  1. This is going to be an excellent teaching example for advanced supply chain attacks that I will definitely be using in the future - after much more in-depth analysis.

  2. It seems to have been a long game, executed with an impressive sequence of steps and preparation, including e.g. disabling OSSFuzz checks for the particular code path and pressuring the original maintainer into accepting the (malicious) contributions.

  3. The potential impact could have been massive, and we got incredibly lucky that it was caught and reported (https://www.openwall.com/lists/oss-security/2024/03/29/4) early. Don't count on such luck in the future.

  4. Given the luck involved in this case, we need to assume a number of other, currently unknown supply chain backdoors that were successfully deployed with comparable sophistication and are probably active in the field.

  5. Safe(r) languages like for such central library dependencies would maybe (really big maybe) have made it a bit harder to push a backdoor like this because - if and only if the safety features are used idiomatically in an open source project - reasonably looking code is (a bit?) more limited in the sneaky behavior it could include. We should still very much use those languages over C/C++ for infrastructure code because the much larger class of unintentional bugs is significantly mitigated, but I believe (without data to back it up) that even such "bugdoor" type changes will be harder to execute. However, given the sophistication in this case, it may not have helped at all. The attacker(s) have shown to be clever enough.

  6. Sandboxing library code may have helped - as the attacker(s) explicitly disabled e.g. landlock, that might already have had some impact. We should create better tooling to make it much easier to link to infrastructure libraries in a sandboxed way (although that will have performance implications in many cases).

  7. Automatic reproducible builds verification would have mitigated this particular vector of backdoor distribution, and the Debian team seems to be using the reproducibility advances of the last decade to verify/rebuild the build servers. We should build library and infrastructure code in a fully reproducible manner and automatically verify it, e.g. with added transparency logs for both source and binary artefacts. In general, it does however not prevent this kind of supply chain attack that directly targets source code at the "leaf" projects in Git commits.

  8. Verifying the real-life identity of contributors to open source projects is hard and a difficult trade-off. Something similar to the -of-trust would potentially have mitigated this style of attack somewhat, but with a different trade-off. We might have to think much harder about trust in individual accounts, and for some projects requiring a link to a real-world country-issued ID document may be the right balance (for others it wouldn't work). That is neither an easy nor a quick path, though. Also note that sophisticated nation state attackers will probably not have a problem procuring "good" fake IDs. It might still raise the bar, though.

  9. What happened here seems clearly criminal - at least under my IANAL naive understanding of EU criminal law. There was clear intent to cause harm, and that makes the specific method less important. The legal system should also be able to help in mitigating supply chain attacks; not in preventing them, but in making them more costly if attackers can be tracked down (this is difficult in itself, see point 8) and face risk of punishment after the fact.

H/T @GossiTheDog @AndresFreundTec @danderson @briankrebs @eloy

mo8it , to random
@mo8it@fosstodon.org avatar

lint idea and performance tip 🚀

Warn about a repeated call of Path::join ⚠️

This allocates a new PathBuf each time. Then Path::join is called on the new PathBuf because of the Deref implementation.

Instead, you should use extend like in the screenshot (preferably with a capacity hint).

You can also use .collect::<PathBuf>() on an iterator instead:
https://doc.rust-lang.org/stable/std/path/struct.PathBuf.html#impl-FromIterator%3CP%3E-for-PathBuf

rust let mut sysroot_src = PathBuf::with_capacity(256); sysroot_src.extend([toolchain, "lib", "rustlib", "src", "rust", "library"]);

alexzeitler , to random
@alexzeitler@mastodon.social avatar
mo8it , to random
@mo8it@fosstodon.org avatar

I am starting a Mastodon campaign :omya_mastodon:

Every time I see a post with only the tag, I will kindly ask the poster to use instead 😇

My feed is full with unrelated content about the film, the game and of course photography of rusty metal 🤬

I will also only post using the tag starting from now 😤

You can join me! 🤗

The goal is to let the usage of the tag vanish so people can only follow 😃

imperio , to random
@imperio@toot.cat avatar

Added a new rust clippy lint which detects .get().is_some() on std map types:

let s: HashSet<String> = HashSet::new();<br></br>if s.get("a").is_some() {<br></br>

Should be written:

if s.contains("a") {<br></br>

PR: https://github.com/rust-lang/rust-clippy/pull/12339

rain , to random
@rain@hachyderm.io avatar

The winnow library for is the most fun I've had writing parsers in my entire life. It's taken a thing that I've always dreaded and turned it into a joy.

I love two things about it:

  1. It uses &mut &[u8], &mut &str, &mut <token stream ref>, etc. That is simply so much nicer to use than consuming a &[u8] and returning a &[u8].

  2. It isn't all-encompassing! it encourages you to interleave imperative and functional code, just like idiomatic Rust in general.

https://docs.rs/winnow

maciekglowka , to random
@maciekglowka@mastodon.gamedev.place avatar

Finally in the Play Store.
Thanks to everybody offering help with new mandatory tests. Fortunatelly managed to avoid that, without troubling anyone :)

https://play.google.com/store/apps/details?id=com.maciejglowka.monk_tower&hl=pl&gl=US

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • test
  • worldmews
  • mews
  • All magazines