On 2007-01-15, Timothy Miller wrote:
> >If you want to provide an easy to read version for those
> >who do not have latex, please host the pdf on a webserver.
> >(it could be even generated automagicaly with a nightly
> >cron job and uploaded to the server)
>
> Can you help me with this? We can put it on traversaltech, although
> I'm sure they don't have pdflatex installed there. I'm pretty sure
> they have PHP and Ruby web backends.
I'm a much in favour of keeping repositories free from all generated
files myself, and I use a lot of generated files. My solution is to
have a target in the Makefile for installing onto the web server.
Something like
--cut--
# Specific part
htdocs_files = index.html logo.png some_subdir/very_useful_document.pdf
htdocs_target_dir = ...
# Generic part
webserver = www.traversaltech.com
htdocs_dirs = $(addprefix $(htdocs_target_dir)/, $(sort $(dir $(htdocs_files))))
webinstall: all
ssh $(webserver) mkdir -p $(htdocs_dirs)
for path in $(htdocs_files); do \
scp $$path $(webserver):$(htdocs_target_dir)/$$path; \
done
--cut--
splitting out and including the generic part if PDFs are scattered
accross multiple makefiles. (This may need debugging.)
This is only convenient if you have some way to cache the
authentication, such as public key authentication [1] or Kerberos [2].
Maintainers who have different user names on the web server and on their
workstation, might put
Host www.traversaltech.com
User = ...
into their ~/.ssh/config (after any global definitions!) to avoid
littering the scripts with "USER@". This could even be used to
parametrise out the host name:
Host trv_webinstall_host
HostName www.traversal.com
User = ...
Well, this is one solution...
> Is there any way to spoof+cache a file on the SVN server? So if
> someone tries to download the PDF, a script is run to generate it?
>
> Also, can we get SVN to store only the latest version of that one file?
I don't think so, but I'll be happy if someone proves me wrong.
[1] Add a public key to '.ssh/authorized_keys'. If the private key is
password protected, run 'ssh-add PRIVATE_KEY' before
'make webinstall'.
[2] run 'kinit -f PRINCIPAL' before 'make webinstall'
_______________________________________________
Open-graphics mailing list
[email protected]
http://lists.duskglow.com/mailman/listinfo/open-graphics
List service provided by Duskglow Consulting, LLC (www.duskglow.com)