-
Notifications
You must be signed in to change notification settings - Fork 519
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Increase OTP 24 readiness + move to OTP 20 min. #2515
Increase OTP 24 readiness + move to OTP 20 min. #2515
Conversation
Yeah, so this seems to be OTP-21 min. Probably it could stay open until you decide to bump min. on your end too. |
53d4fe2
to
40576ae
Compare
We can't do this. We usually deprecate the version when we have the official new release to go with, and then get rid of the old stuff when there's no way around. If we can't keep OTP-20 going, then we're more likely to just not upgrade the dependency and live with warnings. We would probably need to revisit the backwards compatibility policy to do otherwise, if we can avoid doing that for a while it would probably be good to do so, otherwise our users might find themselves with far less generous support windows than expected. If we plan to close the window and clamp it down to a lower range, we should probably give significant heads up. |
All of it, or parts of it? (I mean, I'm preparing for when you want to bump; it doesn't have to be now). 👍
Oh, OK. We can keep adding
Sure. I'm OK with that.
I'd always thought (might be wrong) that support as current-5, which would put min. at 20 once 24 comes out. If that's true not all of what was done will be trashed. 😄 Shall I put this at (prepare for) a min. 20 level, then? |
Oh wait yeah, maybe we just didn't deprecate around last bump? If we didn't get rid of 19 when we started supporting 23 because we were opportunistic then we for sure should feel free to keep the same current-5. So this could be mergeable once OTP-24 drops, and then we narrow our window to what's supportable in -5. That would be a huge quality of life improvement. Do note that we might be able to clean stuff up in bootstrap as well. |
Yeah, I noticed If we drop OTP 20, that'll be current -4, so 21, 22, 23, 24. Which is the reason for my former question "Shall I put this at (prepare for) a min. 20 level, then?". |
Yeah OTP-20 minimum makes the most sense here. We're likely to ship pre-built artifacts with OTP-21 regardless though, and leave it to people on OTP-20 to build on their own in order to get the broader coverage for users in what we ship. |
I've pushed "min. 20" (it was mostly reverting stuff) + |
026f90f
to
733a0b2
Compare
Squash-rebased and force-pushed. |
We might also want to consider TARGET_ERLANG_VERSION in the |
733a0b2
to
257a9ab
Compare
I've squashed and force-pushed a change to handle "potentially tweak TARGET_ERLANG_VERSION" (was 19; is 20). |
Sounds good. I'll merge this once OTP-24 drops, prior to that I won't deprecate versions officially. |
Sure, only needs erlware/erlware_commons#152 to be merged and tagged, IMO. |
Looking to bump erlware_commons in #2550 -- seeing if I can bump certifi in a way that gets rid of parse_trans at the same time. |
Prepare for the future (funny coincidence there on the version :-)) Compile the move away from OTP 20 while we're at it Adapt to changes in erlang:. Docker image Stay at min. OTP 20 as per support-related expectations (current-5) Adapt bootstrap to "min. OTP is 20" Broaden CI coverage Remove dead code
257a9ab
to
833949d
Compare
I'm rebasing this branch on top of |
What this pulls in:
After I saw that a bump was required, I decided to adapt to min. OTP
21(now) 20erlware_commons
(after something like Fixes for dialyzer erlware/erlware_commons#152 happens)bootstrap
to adapt to these changes too