| From: | Andrew Dunstan <andrew(at)dunslane(dot)net> |
|---|---|
| To: | Andres Freund <andres(at)anarazel(dot)de> |
| Cc: | PostgreSQL Hackers <pgsql-hackers(at)lists(dot)postgresql(dot)org>, Muralikrishna Bandaru <muralikrishna(dot)bandaru(at)enterprisedb(dot)com>, Sandeep Thakkar <sandeep(dot)thakkar(at)enterprisedb(dot)com> |
| Subject: | Re: meson vs windows perl |
| Date: | 2024-07-20 13:41:27 |
| Message-ID: | 3b415184-91d5-4649-a44a-b9d99817401e@dunslane.net |
| Views: | Whole Thread | Raw Message | Download mbox | Resend email |
| Thread: | |
| Lists: | pgsql-hackers |
On 2024-05-28 Tu 6:13 PM, Andres Freund wrote:
> Hi,
>
> On 2024-04-05 16:12:12 -0400, Andrew Dunstan wrote:
>> OK, this has been fixed and checked. The attached is what I propose.
> The perl command is pretty hard to read. What about using python's shlex
> module instead? Rough draft attached. Still not very pretty, but seems easier
> to read?
>
> It'd be even better if we could just get perl to print out the flags in an
> easier to parse way, but I couldn't immediately see a way.
>
>
Thanks for looking.
The attached should be easier to read. The perl package similar to shlex
is Text::ParseWords, which is already a requirement.
cheers
andrew
--
Andrew Dunstan
EDB: https://www.enterprisedb.com
| Attachment | Content-Type | Size |
|---|---|---|
| ldopts4.patch | text/x-patch | 1.4 KB |
| From | Date | Subject | |
|---|---|---|---|
| Next Message | vignesh C | 2024-07-20 15:06:21 | Re: Logical Replication of sequences |
| Previous Message | Jelte Fennema-Nio | 2024-07-20 12:09:30 | Re: Report search_path value back to the client. |