cvs.gedasymbols.org/archives/browse.cgi   search  
Mail Archives: geda-user/2024/04/24/09:42:27

X-Authentication-Warning: delorie.com: mail set sender to geda-user-bounces using -f
X-Recipient: geda-user AT delorie DOT com
X-Mailer: exmh version 2.8.0 04/21/2012 with nmh-1.7+dev
X-Exmh-Isig-CompType: repl
X-Exmh-Isig-Folder: inbox
From: "karl AT aspodata DOT se [via geda-user AT delorie DOT com]" <geda-user AT delorie DOT com>
To: geda-user AT delorie DOT com
Subject: Re: [geda-user] lepton netlist
In-reply-to: <s6njzknc4rc.fsf@psjt.org>
References: <s6nil076f0t DOT fsf AT psjt DOT org> <20240424112803 DOT C0DAC81AB8A3 AT turkos DOT aspodata DOT se> <s6njzknc4rc DOT fsf AT psjt DOT org>
Comments: In-reply-to "=?utf-8?Q?Stephan_B=C3=B6ttcher?= (geda AT psjt DOT org) [via geda-user AT delorie DOT com]" <geda-user AT delorie DOT com>
message dated "Wed, 24 Apr 2024 14:41:11 +0200."
Mime-Version: 1.0
Message-Id: <20240424134027.DA8B681AB8A3@turkos.aspodata.se>
Date: Wed, 24 Apr 2024 15:40:27 +0200 (CEST)
X-Virus-Scanned: ClamAV using ClamSMTP
Reply-To: geda-user AT delorie DOT com
Errors-To: nobody AT delorie DOT com
X-Mailing-List: geda-user AT delorie DOT com
X-Unsubscribes-To: listserv AT delorie DOT com

Stephan:
> I do not know any guile.  My patch was in C, but the attachment points
> were moved to scheme, I guess.

Yes, your file s_hierarchy.c doesn't exist any more. It is mentioned
in commit 597b38ef193d4249e74fea04c131af078bd9ccd5.

> I do remember that somebody implemented similar functionality, but I do
> not remember which fork that was.

From what I remember geda has it, unfortenatly I cannot compile it here.
geda commit c7ed6c5a10cbfba3001b6b2e55bbc3ed0f1e84b8 is probably what I
remember.

...
> My patch was doing simple text substitutions in attributes after the
> hierarchy was built, so the parameters cannot effect the netlist
> itself, just some output.  I used it only with value= attributes.  That
> would be the minimal functionality.

So, it would be the bom list and the like that would be affected ?
In that case an external program could do the transform, so you do your
usual stuff and then as a final step you modify some output files with a
separate program. Would that be fine (at least till it is integrated 
into lepton) ?

> Something that can also affect, e.g., source= attributes may be quite a
> bit more intrusive.

What is the idea with that ?

Regards,
/Karl Hammar


- Raw text -


  webmaster     delorie software   privacy  
  Copyright © 2019   by DJ Delorie     Updated Jul 2019