Just in case anyone's still stuck with the SBAT issue on the Linux systems and can't easily disable secure boot for whatever reason - boot a live Fedora image, open a terminal, run
sudo mokutil --set-sbat-policy delete
and reboot. shim should now clear the sbat policy and you're back in business. Don't allow Windows Update to run again until things are sorted.
If you need help trying to figure out what version of Node, Ruby, Postgres, Redis, Elasticsearch, Libvips, FFmpeg, ImageMagick you need to upgrade your Mastodon instance you can always check out https://www.mastoreqs.com in addition to reading through the release notes of the new version.
@raggi Hmm…
So one option would be to create Documents/rust/async-guidelines.rs and document pre-existing usage patterns in Linux. I think it would be better try not to over-engineer the document. One example would documenting async itself. It is probably the best idea to keep it compact and punctual.
All you need to do then is just modifying the existing guidelines and adding sometimes completely new guidelines based on the patches.
Now, if I send a Rust patch with some async code, it will now be less likely to be against maintainers expectations. That results less noise in the mailing list, and patches landing more quickly. Or that’s I’d see it.
Way more important benefit would be that async would be “existentially” sealed to the kernel ecosystem early on.
I think this just like basic governance and risk management, not IMHO a big deal :-)