You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
rustup 1.27.0+74 (a6c9fae91 2024-04-21) dirty 1 modificationinfo: This is the version for the rustup toolchain manager, not the rustc compiler.info: The currently active `rustc` version is `rustc 1.77.2 (25ef9e3d8 2024-04-09)`
The text was updated successfully, but these errors were encountered:
I think a good approach here would be to add an integration test that can download a recent manifest, parse it, and regenerate a source file that contains current definitions of these (and fails the test if they're outdated).
I think a good approach here would be to add an integration test that can download a recent manifest, parse it, and regenerate a source file that contains current definitions of these (and fails the test if they're outdated).
@djc The current model of target triples in Rustup requires some non-code knowledge to correctly generate the list:
Looking at the original file, I think a reasonable (but possibly breaking) solution would be parsing the triples as follows:
// for `x-y`{arch: x,os: y}// special case for `x-y-w` where `y` is `none` or `linux`// e.g. `thumbv4t-none-eabi`, `i686-linux-android`// (should've been called `x-unknown-y-w`, but alas){arch: x,os: y,env: w}// for `x-y-z`{arch: x,os: y-z}// for `x-y-z-w`{arch: x,os: y-z,env: w}
Then we can get a list of triples by using things like rustc --print target-list (I assume we cannot add/remove a component without even having rustc installed, right?), or by reading the manifest (either at comptime or at runtime) and deduplicating.
Yeah, splitting is definitely not completely straightforward, but having an automated test that checks our internal code matches any targets in curent manifests still sounds good.
Verification
Problem
#3601 (comment)
Rustup version
The text was updated successfully, but these errors were encountered: