On 7/26/12, David A. Wheeler <dwhee...@dwheeler.com> wrote:
>> But now you can't use my-subst.  You *could* replace it with
>> unsweeten.in and sweeten_header.in, and add to
>> AC_CONFIG_FILES([Makefile src/unsweeten src/sweeten_header]) or some
>> such - GUILE_PROGS automatically includes @GUILE@ in an AC_SUBST.  And
>> of course @LIBRARY_DIRECTORY@ needs to be changed to @GUILE_SITE@ (or
>> is that @GUILE_SITE_DIR@?)
>
> Sure I can use my-subst, I just have to modify it to also replace GUILE.
> Easy enough.
>
> Done.
>
> It's silly, but it's a short script & it makes sure that the substitutions
> happen at the right time.  Reusing AC_CONFIG_FILES is easy enough,  but it
> would do it at configure time, not at build time (whups).  If a *lot* of
> variables need to be replaced I'd restructure, but for a few it's not worth
> it.
>

Okay.

> Well, the *lack* of -L is annoying.  I don't have a 1.6 to test with, though.

Hmm, what distro are you using?  AFAIK Guile actively supports
parallel installation, and Ubuntu at least allows you to install
guile-1.6 guile-1.8 and guile-2.0 - the `guile` command defaults to
the latest installed version (or is it the last installed version?),
but you can access specific versions by `guile-1.6` `guile-1.8`
`guile-2.0` commands.  And if Ubuntu allows it Debian is likely to
allow it too.

>> unsweeten still has code to augment the %load-path, but this is no
>> longer necessary since you're already putting it in a -L switch (or,
>> err, rather putting the correct location into GUILE_LOAD_PATH)
>
> Well, could always getenv() something.

Uhm, guile automatically getenv()'s GUILE_LOAD_PATH and prepends it
into %load-path.  This was the only way, in 1.6, to modify %load-path
at the invocation, since guile-1.6 doesn't have -L.

Sincerely,
AmkG

------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
Readable-discuss mailing list
Readable-discuss@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/readable-discuss

Reply via email to