> > Instead, I think
several people should make their own personal list of "libraries they
would vouch for"


Ideally along with a cabal (or otherwise) install script that would set everything up in one step.



"Neil Mitchell" <ndmitchell@gmail.com>
Sent by: haskell-cafe-bounces@haskell.org

09/18/2007 09:02 AM

To
"Ketil Malde" <ketil@ii.uib.no>
cc
haskell-cafe@haskell.org, Malcolm Wallace <Malcolm.Wallace@cs.york.ac.uk>
Subject
Re: [Haskell-cafe] Library Process (was Building "production stable"        software in Haskell)





Hi

> I think there is a niche for a subset of the hackage libraries providing
> an officially sanctioned standard library collection.  Currently,
> hackage includes, well, everything.  As such, it is a useful resource,
> but it would be useful to have a partitioning into two levels, where the
> "SLC" would only include libraries that meet specific criteria.  Maybe:
>
>  - considered stable
>  - is portable
>  - relies only on other standard libraries
>  - avoids needless duplication of functionality
>  - with a responsive, named maintainer (not libraries@)
>  - with acceptable documentation and unit tests
>  - required by at least one separate application

I think there is a niche for this, but I don't think it should be an
officially sanctioned collection - since otherwise everyone is just
going to be debating how to add their library to this collection - and
we are going to descend into voting and politics. Instead, I think
several people should make their own personal list of "libraries they
would vouch for" - which meet the criteria above AND they have
personal positive experiences of.

Off the top of my head my list would include gtk2hs, and that's about it.

Thanks

Neil
_______________________________________________
Haskell-Cafe mailing list
Haskell-Cafe@haskell.org
http://www.haskell.org/mailman/listinfo/haskell-cafe


---

This e-mail may contain confidential and/or privileged information. If you
are not the intended recipient (or have received this e-mail in error)
please notify the sender immediately and destroy this e-mail. Any
unauthorized copying, disclosure or distribution of the material in this
e-mail is strictly forbidden.