Bug#927450: fixed in debian-security-support 2019.04.25

2019-04-26 Thread Christoph Anton Mitterer
On Fri, 2019-04-26 at 09:26 +, Holger Levsen wrote:
> I'm not really impressed by this fix either, cause it will also cause
> breakage in xx months when the next stable arrives...

Admittedly I haven't read the code in too much detail, but conceptually
I'd expect the following:
- either d-s-s is not so much dependant on the debian version, then
this should simply not cause such bad failure (but rather give a
warning or so)

- or it in fact is strongly dependant (either semantically or
technically), but then a Breaks/Conflichts/whatever is really justified
as it would strongly need the "older" version of Debian.


> IMO the code should deal more gracefully with this situation, but
> such a
> change would probably be to invasive now.
At least the above with the deps would probably solve the problem for
people upgrading to buster,... cause I guess they could still be hit by
base-files being upgraded first and then their old d-s-s failing
immediately.


Cheers,
Chris.



Bug#927450: fixed in debian-security-support 2019.04.25

2019-04-26 Thread Holger Levsen
On Fri, Apr 26, 2019 at 03:31:42PM +0200, Christoph Anton Mitterer wrote:
> Oh and btw: it still does fail on upgrade for systems which have the
> old base-files and the old d-s-s, namely when apt upgrades base-files
> before.

I think I would prefer a new bug for this. Also suggestions how to fix
this are welcome.


-- 
tschau,
Holger

---
   holger@(debian|reproducible-builds|layer-acht).org
   PGP fingerprint: B8BF 5413 7B09 D35C F026 FE9D 091A B856 069A AA1C


signature.asc
Description: PGP signature


Bug#927450: fixed in debian-security-support 2019.04.25

2019-04-26 Thread Christoph Anton Mitterer
Oh and btw: it still does fail on upgrade for systems which have the
old base-files and the old d-s-s, namely when apt upgrades base-files
before.

Cheers,
Chris.



Bug#927450: fixed in debian-security-support 2019.04.25

2019-04-26 Thread Santiago Vila
Thanks for keeping this open.

Packages should really not contain "time-bombs" like this.

On Fri, 26 Apr 2019, Holger Levsen wrote:

> control: severity -1 normal
> control: retitle -1 debian-security-support needs to be adapted to each new 
> Debian release
> thanks
> 
> On Fri, Apr 26, 2019 at 12:34:44AM +0200, Christoph Anton Mitterer wrote:
> > As if I wouldn't have written it before... o.O
> 
> talk is cheap, show me the code ;)

Just make the error to be non-fatal instead of exiting with error and
breaking the whole packaging system.

Only as a proof of concept, I believe the patch below would be better
than nothing, but of course you might want to do it with gettext and
debconf to do it properly.

Thanks.

--- a/check-support-status.in
+++ b/check-support-status.in
@@ -22,7 +22,9 @@ fi
 
 if [ "$DEBIAN_VERSION" -lt "$DEB_LOWEST_VER_ID" ] || [ "$DEBIAN_VERSION" -gt 
"$DEB_NEXT_VER_ID" ] ; then
 eval_gettext "Unknown DEBIAN_VERSION \$DEBIAN_VERSION. Valid values from 
\$DEB_LOWEST_VER_ID and \$DEB_NEXT_VER_ID"; echo
-exit 1
+echo "Warning: This package does nothing with the current installed 
version of Debian"
+sleep 5
+exit 0
 fi
 
 LIST=



Bug#927450: fixed in debian-security-support 2019.04.25

2019-04-26 Thread Holger Levsen
control: severity -1 normal
control: retitle -1 debian-security-support needs to be adapted to each new 
Debian release
thanks

On Fri, Apr 26, 2019 at 12:34:44AM +0200, Christoph Anton Mitterer wrote:
> As if I wouldn't have written it before... o.O

talk is cheap, show me the code ;)

> Now all that was done is changing the value from 9 to 10 and it will
> break again in xx months when the next-stable arrives an no one will
> remember by then that this must be adapted...
> 
> Can't you just set a Conflicts/Breaks against base-files >10 ... and
> people won't again fall into that trap in the future?

I'm not really impressed by this fix either, cause it will also cause
breakage in xx months when the next stable arrives...

IMO the code should deal more gracefully with this situation, but such a
change would probably be to invasive now.



-- 
tschau,
Holger

---
   holger@(debian|reproducible-builds|layer-acht).org
   PGP fingerprint: B8BF 5413 7B09 D35C F026 FE9D 091A B856 069A AA1C


signature.asc
Description: PGP signature


Bug#927450: fixed in debian-security-support 2019.04.25

2019-04-25 Thread Christoph Anton Mitterer
Control: reopen -1

As if I wouldn't have written it before... o.O

Now all that was done is changing the value from 9 to 10 and it will
break again in xx months when the next-stable arrives an no one will
remember by then that this must be adapted...

Can't you just set a Conflicts/Breaks against base-files >10 ... and
people won't again fall into that trap in the future?


Cheers,,
Chris.