[Date Prev][Date Next] [Chronological] [Thread] [Top]


Hallvard B Furuseth wrote:
Howard Chu writes:
Picking up the list of configurable overlays by examining the source
tree would be interesting...

Could get too interesting if it picks up some private hacked stuff which is not in CVS and should not be included in configure...
Yes, we'd have to come up with a scheme that doesn't alter the configure script itself. Probably rather difficult, as there are a number of lists of items to track and shell scripts aren't great for manipulating structures...

 -- Howard Chu
 Chief Architect, Symas Corp.  http://www.symas.com
 Director, Highland Sun        http://highlandsun.com/hyc
 OpenLDAP Core Team            http://www.openldap.org/project/