[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: Is it possible to make a deb package in non-debian system butonly dpkg installed?



Le lundi 05 novembre 2007 à 12:50 -0700, Tim Spriggs a écrit :
> 
> I'm not a dpkg guru but, you might checkout Nexenta for dpkg/apt on 
> Solaris. There is a good chance a lot of the work you are looking for is 
> already done.
> 
> Thanks,
> -Tim
> 

Yes, indeed,
I've look into nexenta,... it seems to be a good thing ;).

They patched dpkg
(http://www.gnusolaris.org/cgi-bin/trac.cgi/attachment/ticket/63/dpkg-1.13.10-nexenta.patch).
I found in this patch a lot of modifications I made.

By the way, I've less modifications since I prefered to customize
configure option whereas changing source files (either in debian/ either
in sources).

My configure options are :

../dpkg-1.14.6_mb/configure --prefix=$DPKG_ROOT --without-gnu-ld
--disable-linker-optimisations --disable-nls --disable-rpath
--without-dselect --without-start-stop-daemon --with-libiconv-prefix=
$GNU_ROOT --with-libintl-prefix=$GNU_ROOT CC=gcc CPPFLAGS="-I
$DPKG_ROOT/ssl/include -I$DPKG_ROOT/include" CFLAGS="-g -m32"
LDFLAGS="-L$DPKG_ROOT/ssl/lib -L$DPKG_ROOT/lib"

I've heard of some modification to come in dpkg regarding the
architectures. What are they? Could this be a feature like "I can
compile dpkg on my *NIX machine by specifing --host=*NIX" ???

Compiling dpkg on Solaris was like creating the first chicken. Maybe if
we could create a debbootstrap for Solaris it would be the first egg ...

Since I'm new to this discussion list, this may have been discussed in
the past, isn't it ?

Best regards,
Michel

This e-mail is intended only for the above addressee. It may contain privileged information.
If you are not the addressee you must not copy, distribute, disclose or use any of the information in it. 
If you have received it in error please delete it and immediately notify the sender.
Security Notice: all e-mail, sent to or from this address, may be accessed by someone other than the recipient, for system management and security reasons. This access is controlled under Regulation of security reasons.
This access is controlled under Regulation of Investigatory Powers Act 2000, Lawful Business Practises.




Reply to: