World: r3wp
[!REBOL3 Schemes] Implementors guide
older newer | first last |
Graham 14-Jan-2010 [1536] | Unless Brian really wants to write it all himself ... |
Rebolek 14-Jan-2010 [1537] | :) |
Graham 14-Jan-2010 [1538x3] | Meanwhile my little fix for the ftp server behind NAT has allowed me to finally open up a data connection to my fax server |
Need a little function non-addressable: func [ ip-address ][ returns true or false ] | |
syntax perhaps some like this send fax://userid:[password-:-faxipaddress] [ dial: number! retries: integer! resolution: word! notify: email! file: file! when: time! ] | |
Maxim 14-Jan-2010 [1541x3] | brian: sorry... you're right (open vs load), but if a protocol/scheme exists for torrent, read and write should work on it, just like for any other scheme, its part of the point of having this whole architecture... no? |
this could make a nice protocol ;-) http://suicidemachine.org/ | |
facebook actually sent them a cease and desist court order! | |
Graham 14-Jan-2010 [1544] | Is this what we are supposed to be doing? http://rebol.wik.is/Rebol3/Modules/Mod-network |
Andreas 15-Jan-2010 [1545] | Graham: Yes. I'd call it mod-net-util, though, in remembrance of R2 |
Graham 15-Jan-2010 [1546x9] | Ok.... everyone ... please ! |
I read this last night http://www.tcpipguide.com/free/t_TCPIPInternetMessageAccessProtocolIMAPIMAP4.htm | |
Seems that there are 3 states in IMAP4, not-authenticated, authenticated and selected state. | |
well, client states | |
the FSM diagram is here http://www.tcpipguide.com/free/t_IMAP4GeneralOperationClientServerCommunicationandS-2.htm | |
And so all you have to do is track what tags you are using with your commands.... | |
and be able to parse responses | |
The existing IMAP protocol for R2 should have the parsers written already | |
Regarding .... mod-net-util ... I guess it only needs importing once ... unless value? 'net-log [ import mod-net-log ] | |
Maxim 15-Jan-2010 [1555x2] | you don't need.. if the module has a name in its header, the import will only be performed once, even if its called several times. |
the modules are cached once they are loaded (again, only if named). | |
Graham 15-Jan-2010 [1557x2] | New scheme .. fax:// http://rebol.wik.is/Rebol3/Schemes/Fax |
Do we need a telnet:// scheme? | |
Henrik 15-Jan-2010 [1559] | that would be nice for some routers |
Pekr 15-Jan-2010 [1560] | ssh:// would be even cooler :-) |
Graham 15-Jan-2010 [1561] | Who is going to pay for that! ?? |
Pekr 15-Jan-2010 [1562] | ... pay for what? Development of SSL? |
Graham 15-Jan-2010 [1563] | yeah .. |
Pekr 15-Jan-2010 [1564x2] | Can't we just wrap any open-source stuff? |
I would not mind it being an external module ... | |
Graham 15-Jan-2010 [1566] | Dunno ... outside my experience |
Maxim 15-Jan-2010 [1567x3] | yes pekr, there is possibility out there (putty sources being one), its just a question of some competent C coder taking some time to check it out and possibly wrap it as an extension and/or as a module to load in the host directly. |
I don't have the time right now... too much work to do ... | |
(and I'm not sure I can be considered a competent C coder hehee) | |
Pekr 15-Jan-2010 [1570] | Is puty correctly (in regards to R3) licensed? BSD or LGPL? |
Maxim 15-Jan-2010 [1571] | MIT |
Graham 15-Jan-2010 [1572] | I don't care whether it's MIT or GPL ... as long as we can call it. |
Maxim 15-Jan-2010 [1573] | and its code is beautifull, it even has its own implementation of zlib... it rellies on no external lib or code. |
Pekr 15-Jan-2010 [1574] | Graham - how can't you care? If it woudl be GPL, we could not use it at all ... |
Graham 15-Jan-2010 [1575] | We as a RT may not ... but "we" as a user can ... |
Pekr 15-Jan-2010 [1576] | No, we can't. GPL is GPL. You either fit the license, or you break it, no? |
Graham 15-Jan-2010 [1577] | If I don't distibute I can do what I like ... |
Rebolek 16-Jan-2010 [1578] | Better break the license than some glass. |
Graham 16-Jan-2010 [1579] | GPL only applies to software that you distribute |
BrianH 16-Jan-2010 [1580x2] | Pekr, "just wrapping" other code is not easy to do right, and takes time and effort. Less time and effort than rewiting it from scratch in some cases (likely including SSL and SSH), but still not a trivial effort. |
Graham, a scheme that you can't distribute is of extremely limited use, too limited to justify the effort involved. | |
Graham 16-Jan-2010 [1582x4] | in your personal opinion of course |
If google developed such a scheme, and kept it within their organization, that would be in keeping with GPL .. no need to release source | |
what I was envisaging was someone linking the host code to eg. a gpl tls library and releasing instructions on how to build it yourself. | |
I don't see what is wrong with that. | |
older newer | first last |