[Date Prev][Date Next]
Hallvard B Furuseth wrote:
Howard Chu writes:Yes, we'd have to come up with a scheme that doesn't alter the configure
script itself. Probably rather difficult, as there are a number of lists
of items to track and shell scripts aren't great for manipulating
Picking up the list of configurable overlays by examining the source
tree would be interesting...
Could get too interesting if it picks up some private hacked stuff
which is not in CVS and should not be included in configure...
-- Howard Chu
Chief Architect, Symas Corp. http://www.symas.com
Director, Highland Sun http://highlandsun.com/hyc
OpenLDAP Core Team http://www.openldap.org/project/