Tom Koelman [EMAIL PROTECTED] writes:
I just rosterified a database. On inspecting the contents of the new
database I found out that all certificates had been reissued with my
own e-mail-adress. This would be an issue for a trust model based on
who handed out what certificate.
Yes indeed.
In message [EMAIL PROTECTED] on Mon, 10 Apr 2006 22:36:44 +0100, Joel Crisp
[EMAIL PROTECTED] said:
jcrisp I think you might have missed the point slightly...If I
jcrisp understand this correctly, he made the changelog in the past
jcrisp incorporating reversion hashes which have now changed due
Yeah, I was talking about the manually generated changelogs.
;-)
Joel
Richard Levitte - VMS Whacker wrote:
In message [EMAIL PROTECTED] on Mon, 10 Apr 2006 22:36:44 +0100, Joel Crisp
[EMAIL PROTECTED] said:
jcrisp I think you might have missed the point slightly...If I
jcrisp understand
In message [EMAIL PROTECTED] on Mon, 10 Apr 2006 23:43:26 +0200, Henry
Nestler [EMAIL PROTECTED] said:
Henry.Ne Richard Levitte - VMS Whacker schrieb:
Henry.Ne In message [EMAIL PROTECTED] on Fri, 07 Apr 2006 15:49:46 +0200,
Henry Nestler [EMAIL PROTECTED] said:
Henry.Ne
Henry.Ne First I
I'm noticing a disturbing lack of coder discipline, there's been a lot
of changes lately that doesn't heed the following line from HACKING:
All changes to the monotone source require an accompanying ChangeLog entry.
It may be that you feel it's unnecessary, since your entry is normally
simply
On Sunday 09 April 2006 23:53, Derek Scherger wrote:
Is anyone actually using inventory in its current form?
I use it to deduce what files have been moved and renamed in maildirs.
___
Monotone-devel mailing list
Monotone-devel@nongnu.org