Hi,
this is just not true for Proxmox VE. It does not have the same packaging guarantees as Debian. Repeating what I already said:
No, with Proxmox VE you can break your system when just using apt upgrade
, just search the forum. Of course you should check which packages apt will remove, it will tell you.
I would take this opportunity (since this thread is already reached its end for the OP) to point out that:
1. I could not find this documented anywhere in:
https://pve.proxmox.com/wiki/Package_Repositories
It is the sole command used in major-to-major upgrade, but again this if anything implies the full-upgrade|dist-upgrade is necessary for this case only:
https://pve.proxmox.com/wiki/Upgrade_from_7_to_8
It's really A LITTLE STRANGE that even yourself could reference a Reddit post only regarding such an important distinction.
2. Considering PVE is based on Debian, even if PVE could be considered an appliance, and even if it does have DEDICATED COMMAND (which I was not aware of before), namely
pveupgrade
, but this is just a general wrapper around
dist-upgrade
, which of course will proceed to pull packages from all repos, not just PVE's - this is at the least mind-boggling, i.e. hypervisor that can have itself broken if run with the "safe"
apt upgrade
.
3. I do not even know where to start, if to consider the plain wrapper a logical bug, or if minor-to-minor upgrade require packages to be removed a bug in itself, or if to ask what is the logic behind major vs minor distinction in PVE's world.
4. Debian-based distributions seem to go the opposite way (in terms of being extra safe with
apt upgrade
, e.g. Ubuntu has even phased upgrades), i.e. they do not even dare to roll out packages to everyone at once to avoid a disaster, let alone remove packages. In fact, if running a standard "safer" upgrade command can ruin a hypervisor, why is that command not e.g. patched.
Given all of the above, I would suggest (at least some of the following):
a) update the PVE docs
b) improve the PVE wrapper (to only pull PVE and dependencies strictly)
c) patch a standard Debian command (I cannot believe this would be considered sane in any situation)
Now that I think of it, I wonder if
e.g. having e.g. unattended-upgrades
to pull just security related patches will not break PVE all of a sudden too (I guess not, but this finding did not instill confidence).