Edited log from #canonical today: cprov: as a matter of higher urgency, I'd rather that the constraint be fixed -security should not be required to be > -proposed or > -updates (-updates is slightly more questionable, but I think that makes sense; in any event this debate must not hold up fixing -security) cjwatson: nascentuploads is still a wild land, but the fix is feasible. cjwatson: pitti: we already keep BACKPORTS uploads version independent from RELEASE/UPDATES/SECURITY, I think we can do the same for PROPOSED cprov: well, all non-release pockets should be > release, this check makes sense in feel words, after this fix versions in SECURITY/UPDATES version won't be required to be higher than those in BACKPORTS/PROPOSED cprov: the only constraints that IMO make obvious sense are: uploads to !RELEASE must be > RELEASE; uploads to UPDATES must be > PROPOSED cprov: none of the other constraints make any kind of sense to me cjwatson: it's not that simple, I guess, working with post-release pockets(always higher than RELEASE): uploads to UPDATES/SECURITY > (ALL - BACKPORTS)[-1] AND uploads to BACKPORTS > ALL[-1] cjwatson: I will just exclude PROPOSED version checks for UPDATES/SECURITY I mean, exclude *also* PROPOSED .. cprov: I see no justification for bothering with the extra constraints you mention there cjwatson: it prevents uploads to updates < than what we have in security and vice-versa. cjwatson: but I agree it could be caught in pkg-review time cprov: I don't see why we should bother; it just causes panics like this and doesn't really buy us anything important cjwatson: it'd if was correct, no ? cprov: there are so many corner cases in how particular packages are handled that I strongly believe the versioning constraints enforced by the archive software on pockets should err on the side of being relaxed cprov: for a start, your "vice-versa" above (preventing uploads to security < updates) is definitely wrong cprov: given that the current constraints are so wrong, I think they should be stripped back to the bare essentials and that every additional constraint should have clear thought and justification cjwatson: yes, the reality proves your right. nothing scary is going to happen if those constraints are removed cjwatson: you made you point, could you comment it on 83976 ? but we're better off defending against that sort of thing by post-facto checking (i.e. send warning mails and stuff) cprov: sure cjwatson: thanks To elaborate slightly on the -security vs. -updates check, the thing that the constraint is presumably intended to defend against is an upload to -security never making it out to users because there's already a newer version in -updates (which we assume does not contain the security fix). However, note that this can just as easily happen the other way round - an upload to -updates could be made with a higher version number than that in -security without containing the previous security fix, by an oversight. The sort of processes which defend against the latter can also defend against the former. The version check here gets in the way, because I can envisage situations where we might consider e.g. dapper and dapper-updates to be separately-maintained branches of a given package (there is already a case of this for -proposed, which is why all this came up) and might want to apply the security fix to both dapper and dapper-updates separately, but would be prevented from doing so by this constraint.