On Fri, 8 Jul 2011, Iván Briano (Sachiel) wrote:

2011/7/8 Vincent Torri <vto...@univ-evry.fr>:


On Fri, 8 Jul 2011, Enlightenment SVN wrote:

Log:
Don't try to build examples if dependencies are not met.

and use $PKG_CONFIG instead of pkg-config (think about cross compilation)


[edje_cc=$($PKG_CONFIG --variable=prefix edje)/bin/edje_cc]) is enough?

yes


Vincent



Author:       sachiel
Date:         2011-07-08 18:20:18 -0700 (Fri, 08 Jul 2011)
New Revision: 61163
Trac:         http://trac.enlightenment.org/e/changeset/61163

Modified:
 trunk/evas/configure.ac

Modified: trunk/evas/configure.ac
===================================================================
--- trunk/evas/configure.ac   2011-07-08 21:14:19 UTC (rev 61162)
+++ trunk/evas/configure.ac   2011-07-09 01:20:18 UTC (rev 61163)
@@ -1656,9 +1656,10 @@
       # put in here the dependencies for Evas' examples. they are
       # meant to be 'real world' usage examples, thus one will be
       # using higher level libraries on these programs
-       PKG_CHECK_MODULES([ECORE_EVAS], [ecore-evas ecore])
+       PKG_CHECK_MODULES([ECORE_EVAS], [ecore-evas ecore], [], 
[build_examples="no"])
       PKG_CHECK_MODULES([EDJE], [edje],
-        [edje_cc=$(pkg-config --variable=prefix edje)/bin/edje_cc])
+        [edje_cc=$(pkg-config --variable=prefix edje)/bin/edje_cc],
+        [build_examples="no"])
       AC_SUBST(edje_cc)
    else
       build_examples="no"


------------------------------------------------------------------------------
All of the data generated in your IT infrastructure is seriously valuable.
Why? It contains a definitive record of application performance, security
threats, fraudulent activity, and more. Splunk takes this data and makes
sense of it. IT sense. And common sense.
http://p.sf.net/sfu/splunk-d2d-c2
_______________________________________________
enlightenment-svn mailing list
enlightenment-...@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/enlightenment-svn



------------------------------------------------------------------------------
All of the data generated in your IT infrastructure is seriously valuable.
Why? It contains a definitive record of application performance, security
threats, fraudulent activity, and more. Splunk takes this data and makes
sense of it. IT sense. And common sense.
http://p.sf.net/sfu/splunk-d2d-c2
_______________________________________________
enlightenment-devel mailing list
enlightenment-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/enlightenment-devel


------------------------------------------------------------------------------
All of the data generated in your IT infrastructure is seriously valuable.
Why? It contains a definitive record of application performance, security 
threats, fraudulent activity, and more. Splunk takes this data and makes 
sense of it. IT sense. And common sense.
http://p.sf.net/sfu/splunk-d2d-c2
_______________________________________________
enlightenment-devel mailing list
enlightenment-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/enlightenment-devel

Reply via email to