-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
[moved discussion from ticket #2065]
On Fri, Nov 30, 2018 at 11:44:21AM +0000, Patrick Schleizer wrote:
> Is it possible to make changes in Qubes packages only affecting Debian releases equal or greater than 9?
>
> Inability to do so would make development difficult. Not a secret that I am not a big fan of carrying around oldstable versions support. Lot effort for little to zero popularity? I'd not release new Qubes packages for debian-8 in order to not break them. Only debian-9 and above. Otherwise too many targets required to test / too much development effort, imo.
Actually the same problem applies to Fedora, with an exception that many
of those templates are not even supported upstream anymore (in contrast
to oldstable, which is still part of Debian LTS, until 2020).
So here are actually two questions:
1. Do we want to stop publishing new packages for templates not
supported upstream anymore?
2. Do we want to stop publishing new packages for old templates still
supported upstream?
I think the answer for the first one should be "YES". Look at the insane
count of Fedora versions for R3.2 on supported-versions[1].
We just need a process for doing that:
- an announcement? we had already some[2]
- some method for marking this on supported-versions page (simply
remove version? or should we retain what were initially supported?)
In fact, I've already went ahead and disabled building packages for old
Fedora versions[3], mostly to reduce build time. Oh, Fedora 27 upstream
support ends today, so we could drop this one from the list too. And
post a reminder to migrate to Fedora 28 (or have we already done it? I
can't find it).
Now, about the second question. It is about Debian 8 and Whonix 13
(based on Debian 8). Since Debian 8 was included originally
in both Qubes 3.2 and 4.0, many people surely do use it. I don't have
hard numbers for that (in theory we could collect such stats from our
updates server, but we don't do that right now). Since Debian 8 still
has upstream security support, there is no security-based reason for
dropping it. But as Patrick said, it makes it difficult to maintain.
Especially since Debian 8 is much older than oldest supported Fedora...
This already lead to one major problem:
https://github.com/QubesOS/qubes-issues/issues/4443
In theory, automated testing could help here. We already have a lot of
tests, and actually the problem linked above would be detected by it.
But we don't have automation to run those tests on all the supported
configurations _automatically_. It is still manual process (either on
some developer machine, or on our OpenQA instance). I think we're not
far from such setup:
- we have tests,
- we have where to run them,
- we need a script to run them automatically (periodically? when new
packages are uploaded to testing?)
- and automatic reporting back to updates-status issues - to spot the
problem and not move broken packages to stable
But in this very moment it isn't done yet.
As we can see, none of the users with testing repositories enabled
spotted the problem in time either.
So, I'm slightly leaning towards dropping support for Debian 8. But want
to hear other opinions too.
[1]
https://www.qubes-os.org/doc/supported-versions/
[2]
https://www.qubes-os.org/news/2018/05/23/fedora-26-and-debian-8-approaching-eol/
[3]
https://github.com/QubesOS/qubes-builder/commit/fb6be23df2b4707ed83a98a635bd508972d39363
- --
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-----BEGIN PGP SIGNATURE-----
iQEzBAEBCAAdFiEEhrpukzGPukRmQqkK24/THMrX1ywFAlwBwpMACgkQ24/THMrX
1yzwzggAiopOVqsBB89DZ+Ky4gJZ76quW242Pm/U/gGkEXjubMyjWazSzvqdS3/b
MNiQsFI117yKX+ShmJXOqb+YaG4UoqnfbPrxynQqr1LZFtEq+3u8w8C4jMS/zC93
unxNO0f9mC5LfWbwJLzfVFseFzEUoBp3cVQSYdgycWXxlSrkBq2dQ3SRhPBbWmS2
ZPbf5ah1tsPlEP0MTWxv94/NGLMaug63FqGALvhrBtMIbBPRAyFsbqlkMkVn5Rj0
uyqj3C6m9m7+CqY8gjhaqJn/PVxXPA9hwswKcctbUa3/kZr1/9LFMofQvPP1gnHp
+uv9IQ5Dp2HmV94A3tOU492a5sLGkQ==
=yLpO
-----END PGP SIGNATURE-----