Howard Chu writes:Yes, we'd have to come up with a scheme that doesn't alter the configure script itself. Probably rather difficult, as there are a number of lists of items to track and shell scripts aren't great for manipulating structures...
Picking up the list of configurable overlays by examining the source
tree would be interesting...
Could get too interesting if it picks up some private hacked stuff which is not in CVS and should not be included in configure...
-- -- Howard Chu Chief Architect, Symas Corp. http://www.symas.com Director, Highland Sun http://highlandsun.com/hyc OpenLDAP Core Team http://www.openldap.org/project/