From 6d5d6dcaa66d7ccaa60807eb8b7fefa94bd32591 Mon Sep 17 00:00:00 2001
From: "jake%bugzilla.org" <>
Date: Fri, 4 Apr 2008 11:46:34 +0000
Subject: Bug 203314 - Clean up 's, links to bugs and extra spaces in
sentences. Patch by Martin Wulffeld . r,a=jake Also,
added Martin to the section about people who have made signifigant
conrtibutions.
---
docs/en/xml/installation.xml | 36 +++++++++++++++++-------------------
1 file changed, 17 insertions(+), 19 deletions(-)
(limited to 'docs/en/xml/installation.xml')
diff --git a/docs/en/xml/installation.xml b/docs/en/xml/installation.xml
index 9964b88c8..142afaba7 100644
--- a/docs/en/xml/installation.xml
+++ b/docs/en/xml/installation.xml
@@ -44,7 +44,7 @@
- Perl
+ Perl
(&min-perl-ver;, 5.6.1 is recommended if you wish to
use Bundle::Bugzilla)
@@ -209,7 +209,7 @@
MySQL
Visit the MySQL homepage at
- www.mysql.com
+
to grab and install the latest stable release of the server.
@@ -257,7 +257,7 @@
Any machine that doesn't have Perl on it is a sad machine indeed.
Perl can be got in source form from
- perl.com for the rare
+ for the rare
*nix systems which don't have it.
Although Bugzilla runs with perl &min-perl-ver;,
it's a good idea to be up to the very latest version
@@ -620,7 +620,7 @@
Next, run the magic checksetup.pl script. (Many thanks to
- Holger Schurig
+ Holger Schurig
for writing this script!)
This script is designed to make sure your MySQL database and other
configuration options are consistent with the Bugzilla CGI files.
@@ -870,10 +870,9 @@ man 5 crontab
You can also try using
OpenLDAP with Bugzilla, using any of a number of administration
- tools. You should apply the patch attached this bug:
-
- http://bugzilla.mozilla.org/show_bug.cgi?id=158630, then set
- the following object classes for your users:
+ tools. You should apply the patch attached to
+ bug 158630
+ , then set the following object classes for your users:
objectClass: person
@@ -902,8 +901,7 @@ man 5 crontab
incorporate the code changes necessary to fulfill the CERT advisory
requirements mentioned in
- http://www.cet.org/tech_tips/malicious_code_mitigation.html/#3.
+ url="http://www.cet.org/tech_tips/malicious_code_mitigation.html/#3"/>.
Executing the following code snippet from a UNIX command shell will
rectify the problem if your Bugzilla installation is intended for an
English-speaking audience. As always, be sure your Bugzilla
@@ -931,9 +929,9 @@ bash# perl -pi -e "s/Content-Type\: text\/html/Content-Type\: text\/html\; chars
Using <meta> tags to set the charset is not
recommended, as there's a bug in Netscape 4.x which causes pages
- marked up in this way to load twice. See
- bug
- 126266 for more information including progress toward making
+ marked up in this way to load twice. See
+ bug 126266
+ for more information including progress toward making
bugzilla charset aware by default.
@@ -1032,7 +1030,7 @@ bash# perl -pi -e "s/Content-Type\: text\/html/Content-Type\: text\/html\; chars
Perl for Windows can be obtained from ActiveState. You should be
able to find a compiled binary at http://aspn.activestate.com/ASPN/Downloads/ActivePerl/.
+ url="http://aspn.activestate.com/ASPN/Downloads/ActivePerl/"/>.
@@ -1059,7 +1057,7 @@ C:\perl> ppm <module name>
A complete list of modules that can be installed using ppm can
- be found at http://www.activestate.com/PPMPackages/5.6plus.
+ be found at .
@@ -1362,7 +1360,7 @@ deny from all
Personal Web Server you should be able
to. You will need to configure them to know how to run CGI scripts,
however. This is described in Microsoft Knowledge Base article
- Q245225
+ Q245225
for Internet Information Services and
Q231998
for Personal Web Server.
@@ -1415,9 +1413,9 @@ proc filter_deny { why } {
This probably doesn't account for all possible editor backup
files so you may wish to add some additional variations of
- localconfig. For more information, see
- bug
- 186383 or localconfig. For more information, see
+
+ bug 186383 or Bugtraq ID 6501.
--
cgit v1.2.3-24-g4f1b