Breaking init swtich: was Re: sysvinit_3.14-2_source.changes ACCEPTED into experimental
Mark Hindley
mark at hindley.org.uk
Sun Feb 23 09:06:43 GMT 2025
Lorenzo,
Thanks for highlighting this.
On Sat, Feb 22, 2025 at 05:18:31PM +0100, lorenzo wrote:
> Is this intended?
In short, this wasn't my primary intention, but let's tease out some detail.
Systemd's prerm already refuses removal if systemd is running. There are hacks
around it, but nothing I would recommend in public.
Iain's original submission in #940965 was about forced switch to systemd by apt
not finding a solution with sysvinit. Adding Protected: yes would appear to
prevent such behaviour.
I have just tried switching from sysvinit-core/experimental to runit-init and
the only way that succeeds for me is to use
DPKG_FORCE=remove-protected dpkg --remove sysvinit-core
followed by
apt install runit-init
So it is still possible to switch. Views may differ as to if this is too
difficult or dangerous. My personal gut feeling is that switching init on a
system is a rare occurence, so the extra dpkg --force-remove-protected step
isn't a great overhead. Also, people do not wish to discover their init has been
changed 'incidentally' by apt. But I would appreciate hearing other
perspectives.
I also see a possible small benefit. If individual packages to declared they
Provides: init
Protected: yes
the contentious init package could disappear and alternative inits would not
need to convince the systemd maintainers that they achieve whatever standard.
Best wishes
Mark
More information about the Debian-init-diversity
mailing list