-
```
What steps will reproduce the problem?
1. Generate an svn log
2. Transform with the attached XSLT
3. Run gource on the resulting svn log
Expected result: successful parsing of the log file
Actual…
-
```
What steps will reproduce the problem?
1. Generate an svn log
2. Transform with the attached XSLT
3. Run gource on the resulting svn log
Expected result: successful parsing of the log file
Actual…
-
```
What steps will reproduce the problem?
1. Generate an svn log
2. Transform with the attached XSLT
3. Run gource on the resulting svn log
Expected result: successful parsing of the log file
Actual…
-
```
What steps will reproduce the problem?
1. Generate an svn log
2. Transform with the attached XSLT
3. Run gource on the resulting svn log
Expected result: successful parsing of the log file
Actual…
-
```
What steps will reproduce the problem?
1. Generate an svn log
2. Transform with the attached XSLT
3. Run gource on the resulting svn log
Expected result: successful parsing of the log file
Actual…
-
```
What steps will reproduce the problem?
1. Generate an svn log
2. Transform with the attached XSLT
3. Run gource on the resulting svn log
Expected result: successful parsing of the log file
Actual…
-
```
What steps will reproduce the problem?
1. Generate an svn log
2. Transform with the attached XSLT
3. Run gource on the resulting svn log
Expected result: successful parsing of the log file
Actual…
-
version -09
This is just a question. The response may be that no change is needed.
Do we need to have a separate privacy question to highlight anything about both general privacy and pervasive moni…
-
```
What steps will reproduce the problem?
1. Generate an svn log
2. Transform with the attached XSLT
3. Run gource on the resulting svn log
Expected result: successful parsing of the log file
Actual…
-
```
What steps will reproduce the problem?
1. Generate an svn log
2. Transform with the attached XSLT
3. Run gource on the resulting svn log
Expected result: successful parsing of the log file
Actual…