Having a look at the "git shortlog -se" listing, I would say that
duplicates handling requires a human knowledge about the actual set of
contributor (who would guess than there is not any Virgile but I, and that
"Virgile" and "Virgile Fritsch" should hence be merged?). Reminds me of the
Gmail "find duplicates" interactive tool.
Thank you very much for explainations!
Virgile
On Fri, Jun 1, 2012 at 9:49 AM, Nelle Varoquaux
<[email protected]>wrote:
>
>
> On 1 June 2012 09:46, Virgile Fritsch <[email protected]> wrote:
>
>> Nelle added better matching of the names to id:
>>>
>>
>> And how did she achieve that? I mean, how did she know about the
>> different names that were used in commits?
>>
>
> I don't know if I used the correct way: I just used git shortlog -se: it
> prints the list of people in alphabetical order, and I manually checked
> there weren't any duplicates.
> I'm pretty sure we could automate this in some way.
>
> Cheers,
> N
>
>
>>
>> On Fri, Jun 1, 2012 at 9:03 AM, Gael Varoquaux <
>> [email protected]> wrote:
>>
>>> On Fri, Jun 01, 2012 at 08:12:34AM +0200, Virgile Fritsch wrote:
>>> > Going back to the .mailmap file, I would like to understand what has
>>> > changed and how Nelle has done it so that next time I may help.
>>>
>>> The .mailmap links names to email address and git ids. That way 'git
>>> shortlog -ns' does a proper count of the commit statistics. Nelle added
>>> better matching of the names to id:
>>>
>>> https://github.com/scikit-learn/scikit-learn/commit/3cacf51a333f170c611dcf89472fc1be975fc447
>>>
>>> That way I could generate amongst other things the name cloud that I put
>>> on the first slide of my presentation:
>>>
>>> http://www.slideshare.net/GaelVaroquaux/scikit-learn-dveloppement-communautaire
>>> using "git shortlog -ns", sed, the folowing code:
>>> """
>>> import numpy as np
>>> names = np.recfromcsv('skl_devs2.csv')
>>> out = file('skl_devs2.names', 'w')
>>> for nb, name in names:
>>> out.write('%s:%s\n' % (name.strip(), nb))
>>>
>>> out.close()
>>> """
>>> and http://www.wordle.net/compose
>>>
>>> G
>>>
>>>
>>> ------------------------------------------------------------------------------
>>> Live Security Virtual Conference
>>> Exclusive live event will cover all the ways today's security and
>>> threat landscape has changed and how IT managers can respond. Discussions
>>> will include endpoint security, mobile security and the latest in malware
>>> threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
>>> _______________________________________________
>>> Scikit-learn-general mailing list
>>> [email protected]
>>> https://lists.sourceforge.net/lists/listinfo/scikit-learn-general
>>>
>>
>>
>>
>> ------------------------------------------------------------------------------
>> Live Security Virtual Conference
>> Exclusive live event will cover all the ways today's security and
>> threat landscape has changed and how IT managers can respond. Discussions
>> will include endpoint security, mobile security and the latest in malware
>> threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
>> _______________________________________________
>> Scikit-learn-general mailing list
>> [email protected]
>> https://lists.sourceforge.net/lists/listinfo/scikit-learn-general
>>
>>
>
>
> ------------------------------------------------------------------------------
> Live Security Virtual Conference
> Exclusive live event will cover all the ways today's security and
> threat landscape has changed and how IT managers can respond. Discussions
> will include endpoint security, mobile security and the latest in malware
> threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
> _______________________________________________
> Scikit-learn-general mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/scikit-learn-general
>
>
------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and
threat landscape has changed and how IT managers can respond. Discussions
will include endpoint security, mobile security and the latest in malware
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
Scikit-learn-general mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/scikit-learn-general