Re: How do you hack on the bleeding edge of Gnome?



On Wed, 2012-04-18 at 17:55 -0500, Federico Mena Quintero wrote:
> I wonder how people who hack on "core Gnome" do it on a day to day
> basis. 

A lot of the time, I do it by finding cases where a dependency on some
bleeding-edge Gnome module is *entirely* gratuitous, and just changing
configure.ac to fix that "bug".

To pick an example, my network-manager-openconnect build tree almost
*always* contains a local change along the lines of...

--- a/configure.ac
+++ b/configure.ac
@@ -96,10 +96,10 @@ if test x"$with_gnome" != xno; then
 fi
 
 PKG_CHECK_MODULES(NM,
-                  NetworkManager >= 0.9.4
-                  libnm-util >= 0.9.4
-                  libnm-glib  >= 0.9.4
-                  libnm-glib-vpn >= 0.9.4)
+                  NetworkManager >= 0.9.1
+                  libnm-util >= 0.9.1
+                  libnm-glib  >= 0.9.1
+                  libnm-glib-vpn >= 0.9.1)
 AC_SUBST(NM_CFLAGS)
 AC_SUBST(NM_LIBS)
 

I *wish* we'd use version requirements properly, rather than bumping the
requirement just because there *happens* to be a new version available.

-- 
dwmw2

Attachment: smime.p7s
Description: S/MIME cryptographic signature



[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]