:: Re: [DNG] reportbug default bts
Pàgina inicial
Delete this message
Reply to this message
Autor: Florian Zieboll
Data:  
A: dng
Assumpte: Re: [DNG] reportbug default bts
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256


On Sun, 14 May 2017 11:49:14 -0400
Steve Litt <slitt@???> wrote:

> This concern that you characterize as a "myth" is something I read in
> various apt package distro mailing lists on a somewhat regular basis.
> I also have one buddy from my LUG whose machine was borked immediately
> after doing a apt get dist upgrade.



Hallo Steve,

I suppose you are talking about trans-release dist-upgrades and not the
scarce but sometimes important upgrades that introduce new dependencies
within the lifetime of the installed release.

I run apt-get dist-upgrade on a regular basis (i.e. usually when my
upgrade script reports "not upgraded" packages) and can't remember to
have run into any problems.

To not accidentally upgrade to a new release, I "pin" my systems by
using the release's codename (e.g. "jessie") in the sources.list
instead of "stable" or "testing".

Regarding the "cleanup" before upgrading to a new release (mentioned
in this thread), I use to do two things immediately after the initial
minimal install, which keep my systems slim and sleek and, by the way,
deprecate this additional step when I upgrade to a new release:

1) edit apt.conf to the following

florian@nulldevice:~$ cat /etc/apt/apt.conf.d/02norecommend
APT::Install-Recommends "0";
APT::Install-Suggests "0";
APT::AutoRemove::RecommendsImportant "1";
APT::AutoRemove::SuggestsImportant "1";

2) install and run debfoster

Then I repeat running debfoster carefully after every installation of a
meta-package, starting with the removal of the meta-package itself.

libre Grüße,

Florian


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=Bzph
-----END PGP SIGNATURE-----