I found this an interesting read. It's a fairly unbiased (maybe)
review of most modern version control systems, and even some
benchmarks in the part 3...
http://ldn.linuxfoundation.org/article/dvcs-round-one-system-rule-them-all-part-1
Is there a way to list the branches in a database on a server, without
downloading the whole database?
That would be useful in deciding whether to download the whole
database, or just part of it.
I guess if the server is running ViewMTN, that would give this info?
--
-- Stephe
On Sat, 2009-08-22 at 09:44 -0400, Stephen Leake wrote:
Is there a way to list the branches in a database on a server, without
downloading the whole database?
Not yet, that happens after we move to ssl transport and enable
'automate stdio' over the network.
That would be useful in deciding
Stephen Leake schrieb:
Timothy Brownawell tbrow...@prjek.net writes:
On Sat, 2009-08-22 at 09:44 -0400, Stephen Leake wrote:
Is there a way to list the branches in a database on a server, without
downloading the whole database?
Not yet, that happens after we move to ssl transport and enable
On Sat, 2009-08-22 at 19:13 +0200, Thomas Keller wrote:
Stephen Leake schrieb:
Timothy Brownawell tbrow...@prjek.net writes:
On Sat, 2009-08-22 at 09:44 -0400, Stephen Leake wrote:
Is there a way to list the branches in a database on a server, without
downloading the whole database?
On Sat, 2009-08-22 at 12:31 -0400, Stephen Leake wrote:
Timothy Brownawell tbrow...@prjek.net writes:
On Sat, 2009-08-22 at 09:44 -0400, Stephen Leake wrote:
Is there a way to list the branches in a database on a server, without
downloading the whole database?
Not yet, that happens
Timothy Brownawell tbrow...@prjek.net writes:
On Sat, 2009-08-22 at 19:13 +0200, Thomas Keller wrote:
Stephen Leake schrieb:
Timothy Brownawell tbrow...@prjek.net writes:
On Sat, 2009-08-22 at 09:44 -0400, Stephen Leake wrote:
Is there a way to list the branches in a database on a
Timothy Brownawell tbrow...@prjek.net writes:
On Sat, 2009-08-22 at 12:31 -0400, Stephen Leake wrote:
Timothy Brownawell tbrow...@prjek.net writes:
I suppose the thing to do would be to first migrate to asio (or some
other library) with the current netsync, and then once that's working
turn
On Sat, 2009-08-22 at 14:40 -0400, Stephen Leake wrote:
Timothy Brownawell tbrow...@prjek.net writes:
So the question is, what needs to be done on the asio branch? And how
can we mitigate the problems people have with linking against boost?
Do we have a list of such problems? Maybe we can
On Sat, 2009-08-22 at 14:01 -0400, Stephen Leake wrote:
Timothy Brownawell tbrow...@prjek.net writes:
On Sat, 2009-08-22 at 19:13 +0200, Thomas Keller wrote:
Maybe we should get an idea of how to manage security here first?
Use people's monotone keys as (self-signed) client certificates
On Sat, Aug 22, 2009 at 12:59 PM, Timothy Brownawelltbrow...@prjek.net wrote:
So the question is, what needs to be done on the asio branch? And how
can we mitigate the problems people have with linking against boost?
Do we have a list of such problems? Maybe we can just assume boost got
Zack Weinberg za...@panix.com writes:
On Sat, Aug 22, 2009 at 12:59 PM, Timothy Brownawelltbrow...@prjek.net
wrote:
So the question is, what needs to be done on the asio branch? And how
can we mitigate the problems people have with linking against boost?
Do we have a list of such
Timothy Brownawell tbrow...@prjek.net writes:
On Sat, 2009-08-22 at 14:01 -0400, Stephen Leake wrote:
Timothy Brownawell tbrow...@prjek.net writes:
On the other hand, ssl already has its own access control. Do we
really need another layer?
I didn't think ssl had login names, just
On Sat, Aug 22, 2009 at 11:49 AM, Timothy Brownawell tbrow...@prjek.netwrote:
I think dscherger is looking into using boost::asio
(net.venge.monotone.asio), which includes ssl support (I think including
client certificates, which we need) but would take us back to linking
against boost
On Sat, Aug 22, 2009 at 12:40 PM, Stephen Leake
stephen_le...@stephe-leake.org wrote:
Building that branch on Debian dies in netsync.cc on:
#include netxx/address.h
#include netxx/peer.h
#include netxx/probe.h
#include netxx/socket.h
#include netxx/sockopt.h
#include netxx/stream.h
On Sat, Aug 22, 2009 at 1:59 PM, Timothy Brownawell tbrow...@prjek.netwrote:
The two that come to mind are
* different (and therefore annoying) build system
100% agree, however with plain asio we don't need to pull in boost and its
sucky build system so this shouldn't be an issue.
*
On Sat, 2009-08-22 at 21:10 -0600, Derek Scherger wrote:
On Sat, Aug 22, 2009 at 1:59 PM, Timothy Brownawell
tbrow...@prjek.net wrote:
* version skew wrt libstdc++, eg boost and monotone have
different ideas of what exactly an std::string looks like
Fantastic. Can you
On Sat, Aug 22, 2009 at 3:45 PM, Zack Weinberg za...@panix.com wrote:
I suppose I should pop back in at this point, since I started the asio
branch, and admit that I got stuck. In addition to the above
problems, asio has what is IMO a serious design flaw: its I/O channel
objects are
On Sat, Aug 22, 2009 at 9:03 PM, Derek Schergerde...@echologic.com wrote:
On Sat, Aug 22, 2009 at 3:45 PM, Zack Weinberg za...@panix.com wrote:
My impression is that libevent doesn't give us anything in the way of ssl
help, while asio does do provide some support and uses openssl under the
On Sat, Aug 22, 2009 at 8:02 PM, Derek Schergerde...@echologic.com wrote:
I have been looking at this a bit, largely staring at netsync.cc to try and
get a better idea of what it's doing though. Note that the
net.venge.monotone.asio branch that zack started a while ago does not use
In message 1250815028.4392.1.ca...@localhost on Thu, 20 Aug 2009 19:37:08
-0500, Timothy Brownawell tbrow...@prjek.net said:
tbrownaw On Fri, 2009-08-14 at 05:04 +, Timothy Brownawell wrote:
tbrownaw I think branch net.venge.monotone.keys-by-hash is ready now.
tbrownaw
tbrownaw The
On Sat, Aug 22, 2009 at 11:15 PM, Zack Weinberg za...@panix.com wrote:
I wasn't aware that SSL was on the table, to be honest :) Libevent
Yeah, what got me thinking about asio was thinking about nuskool and
wondering what we might do to support https, particularly on the client
side. We
22 matches
Mail list logo