=== JanC_ is now known as JanC [04:58] JanC: it shouldn't. To build in the security pocket the dependencies have to be met [04:59] so if it is really needed, by a security update the dependency from the updates pocket will get pulled in [04:59] you can have -security without -updates [04:59] but yes you may get updated versions because over time through -security [05:02] binary packages in -updates that are dependencies of binary packages in -security get copied from -updates to -security, even if they aren't security updates themselves? [05:03] only if necessary for a security update [05:04] well, the security update might depend on an unrelated non-security API extension in -updates, or something like that :) [05:04] without doing that you couldn't have security without updates [05:04] yes, but we do try to avoid that [05:06] dependencies are a pita [05:07] that is why every body wants to containerize their apps, vendoring all their dependencies in [05:07] so instead they get to deal with the problem of their dependencies never getting proper security updates instead [05:08] "everybody" [05:09] :) [05:09] what can I say, I can't spell worth a ****. Product of the education system ;-) [05:10] I meant, that needs some quotes [05:11] ah, well yes that too [16:11] "only if necessary" ah okay, at first I was thinking that there is a direct heritage for each package going back and forth between -security and -updates without any offshoots [16:11] This all sounds... complicated, to maintain ;) [16:14] So -updates *always * integrates security fixes, and -security integrates other bug fixes as necessary? And then the -updates version is (generally) the one used when creating a new point release? [16:15] I'm not trying to oversimplify the process, I understand that a lot of this is situational ^^ [16:16] I think the thing that still confuses me is that, if there is a new -security update that is deployed, then a user would see regressions in the forms from any non-security-bug fixes that were not integrated. [16:18] e.g. package foo from xenial-updates has bugfix X, and then xenial-security has to patch vulnerability Y, and does so without integrating bugfix X - then the user gets the security fix, but is missing out on the other bugfix [18:29] codingkoopa: yes, its a trade-off between work to be done and potential for regressions [18:31] if we did a security pocket for each release, so that, that release only received the security fixes, and then a security pocket for updates. That increase the amount of work that needs to be done. Partly because you have to apply the security fix in two places, partly because the further release and updates drift the larger the potential for patches to need additional backporting work. [18:32] But it gets worse as we would then need a security pocket for each point release as well [18:34] as for seeing regressions for non-security-bug fixes that were not integrated. Its possible and has happened [18:34] security fixes go through both a build and run testing, but we can't catch everything [18:36] in those cases, we might revert until the regression is fixed or we might be able to pull in a fix right away and re-release as a regression fix, those would show up as -2 or -3 ... as part of the USN number [18:38] though we are also using -2 ... for ESM now too :( [18:39] an example of an update fixing a regression https://ubuntu.com/security/notices/USN-5487-2