Re: Silence Meson warning on HEAD - Mailing list pgsql-hackers

From Peter Eisentraut
Subject Re: Silence Meson warning on HEAD
Date
Msg-id 05cbcee7-37da-451f-bf55-b37da4248e96@eisentraut.org
Whole thread Raw
In response to [MASSMAIL]Silence Meson warning on HEAD  ("Tristan Partin" <tristan@neon.tech>)
List pgsql-hackers
On 02.04.24 01:46, Tristan Partin wrote:
> A warning was recently[0] introduced into the Meson build:
> 
> WARNING: Project targets '>=0.54' but uses feature introduced in 
> '0.55.0': Passing executable/found program object to script parameter of 
> add_dist_script
> 
> There are 3 way to solve the issue that I have laid out in 3 separate 
> patches that you pick at your leisure:
> 
> 1. version-check.diff
> 
> Wrap the offending line in a Meson version check.

I committed this.

> 2. perl-string.diff
> 
> Pass the perl program as a string via its .path() method.

The problem with this is that it doesn't contain any information why the 
workaround is used, and then if we increase the meson version and clean 
up all the version checks, we won't find this one.

> 3. meson-bump.diff
> 
> Bump the minimum meson version from 0.54 to 0.55, at least.

I think the beginning of the next dev cycle would be a good time to bump 
the meson version.  For now, I'm content to leave it alone.




pgsql-hackers by date:

Previous
From: Thomas Munro
Date:
Subject: Re: Streaming read-ready sequential scan code
Next
From: Amit Kapila
Date:
Subject: Re: Synchronizing slots from primary to standby