Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Improve ByteString safety and add [isValid, normalise, equalFilePath] functions #17

Closed
wants to merge 6 commits into from

Conversation

hasufell
Copy link

No description provided.

Don't use OverloadedStrings, which can depend on GHC behavior.
Also use the word8 package for safe word8 literals.
This also drops the old _equalFilePath function.
@hasufell
Copy link
Author

Is this project still active?

@nh2
Copy link
Collaborator

nh2 commented Apr 30, 2016

@JohnLato Do you actively maintain posix-paths currently? If not, I might take it over (though I'm also quite busy).

@hasufell
Copy link
Author

hasufell commented May 9, 2016

I guess I'll fork this library on hackage then.

@hasufell hasufell closed this May 9, 2016
@hvr
Copy link

hvr commented May 9, 2016

@nh2 @hasufell have you tried contacting @JohnLato via other means (e.g. email) as well? He may not get/notice GitHub notifications...

@nh2
Copy link
Collaborator

nh2 commented May 9, 2016

I've pinged him on email just now.

@hasufell
Copy link
Author

hasufell commented May 9, 2016

I've forked this library (along with the path library) into hpath to create a consistent set of functionality for safe and well-typed paths. Since that includes some API breaking changes (e.g. by fixing #18) I guess it's better for me to continue there, which also allows me to move forward more quickly.

@JohnLato
Copy link
Owner

So it turns out that I wasn't getting github notifications, I need to check why but I probably have a rogue filter somewhere.

I am rather busy and not really giving any of my packages the attention they deserve (although I thought I'd already fixed #18 ). @hasufell if you're interested, why don't I add you as a collaborator and give you Hackage permissions for posix-paths?

@hasufell
Copy link
Author

Well yeah, I could give it a shot and backport what I have done in the fork.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

4 participants