On Monday 25 June 2007 18:40:54 Axel Thimm wrote: > The reason is that if you build a security update against F7 & > updates-released in 12 months and this requires a library that has > been updated since F7's release (but not due to security), you will > end up with a broken security update on a system following only > security updates. So you're left with the following options: > > o forget about a security updates only mechanism, whether this is a > yum-plugin or a separate repo > o Elevate all dependencies of a security update to become part of the > virtual or real security-update repo > o Build security updates only against F7 & security updates, not all > the updates (and only elevate non-security updates to security > status to fulfill otherwise missing dependencies. > > At first the yum-plugin sounds like the easy way out, but it will > generate more issues than it will solve especially the more F7 will be > aging. Or simply design the yum-plugin to consider security updates only for upgrades, then depsolve from there. It would be akin to just running 'yum update <list of packages>'. It wouldn't look at your entire package set for potential updates, just what you give it, and what it needs to depsolve from there. In fact, I think that's the way the current plugin works. -- Jesse Keating Release Engineer: Fedora
Attachment:
pgptx536mSsQl.pgp
Description: PGP signature
-- Fedora-maintainers mailing list Fedora-maintainers@xxxxxxxxxx https://www.redhat.com/mailman/listinfo/fedora-maintainers
-- Fedora-maintainers-readonly mailing list Fedora-maintainers-readonly@xxxxxxxxxx https://www.redhat.com/mailman/listinfo/fedora-maintainers-readonly