-
```
What steps will reproduce the problem?
1. Generate an svn log
2. Transform with the attached XSLT
3. Run gource on the resulting svn log
Expected result: successful parsing of the log file
Actual…
-
```
What steps will reproduce the problem?
1. Generate an svn log
2. Transform with the attached XSLT
3. Run gource on the resulting svn log
Expected result: successful parsing of the log file
Actual…
-
I have studied what I could of the Tox protocol (which isn't easy because there is no documentation and the code isn't really readable since it grew without planning) but I believe I got a good enough…
-
```
What steps will reproduce the problem?
1. Generate an svn log
2. Transform with the attached XSLT
3. Run gource on the resulting svn log
Expected result: successful parsing of the log file
Actual…
-
```
What steps will reproduce the problem?
1. Generate an svn log
2. Transform with the attached XSLT
3. Run gource on the resulting svn log
Expected result: successful parsing of the log file
Actual…
-
```
What steps will reproduce the problem?
1. Generate an svn log
2. Transform with the attached XSLT
3. Run gource on the resulting svn log
Expected result: successful parsing of the log file
Actual…
-
We can either use google analytics or some other analytics site: https://bitdeli.com/
-
As long as the network is observable by third parties (which the internet is) encryption might obfuscate the content of communication. But as we all know by now it's just the metadata of the who and w…
-
```
What steps will reproduce the problem?
1. Generate an svn log
2. Transform with the attached XSLT
3. Run gource on the resulting svn log
Expected result: successful parsing of the log file
Actual…
-
```
What steps will reproduce the problem?
1. Generate an svn log
2. Transform with the attached XSLT
3. Run gource on the resulting svn log
Expected result: successful parsing of the log file
Actual…