Skip to content

Commit fba6fec

Browse files
idodeclareVladimir Kotal
authored andcommitted
Fix to escape > in JavaDoc
1 parent 5e37957 commit fba6fec

File tree

1 file changed

+10
-10
lines changed

1 file changed

+10
-10
lines changed

opengrok-indexer/src/test/java/org/opengrok/indexer/history/PerforceRepositoryTest.java

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -77,27 +77,27 @@ public static void setUpClass() {
7777
* <li>Install a Perforce server instance. I elected to install the
7878
* helix-p4d package on Ubuntu by following the instructions at
7979
* <a href="https://www.perforce.com/manuals/p4sag/Content/P4SAG/install.linux.packages.install.html">
80-
* Helix Core Server Administrator Guide > Installing the server > Linux
81-
* package-based installation > Installation</a>.
80+
* Helix Core Server Administrator Guide &gt; Installing the server &gt; Linux
81+
* package-based installation &gt; Installation</a>.
8282
* <li>Configure the Perforce server. Follow the instructions at
8383
* <a href="https://www.perforce.com/manuals/p4sag/Content/P4SAG/install.linux.packages.configure.html">
84-
* Helix Core Server Administrator Guide > Installing the server > Linux
85-
* package-based installation > Post-installation configuration</a>.
84+
* Helix Core Server Administrator Guide &gt; Installing the server &gt; Linux
85+
* package-based installation &gt; Post-installation configuration</a>.
8686
* <li>Secure the Perforce server transport layer. I deployed a private key
8787
* and certificate following the instructions at
8888
* <a href="https://www.perforce.com/manuals/p4sag/Content/P4SAG/DB5-16618.html">
89-
* Helix Core Server Administrator Guide > Securing the server > Using SSL
90-
* to encrypt connections to a Helix server > Key and certificate
89+
* Helix Core Server Administrator Guide &gt; Securing the server &gt; Using SSL
90+
* to encrypt connections to a Helix server &gt; Key and certificate
9191
* management</a>.
9292
* <li>Define an authentication method for the Perforce server. I elected to
9393
* authenticate against my home Active Directory following the instructions
9494
* at <a href="https://www.perforce.com/manuals/p4sag/Content/P4SAG/security.ldap.auth.html">
95-
* Helix Core Server Administrator Guide > Securing the server > LDAP
96-
* authentication > Authenticating against Active Directory and LDAP
95+
* Helix Core Server Administrator Guide &gt; Securing the server &gt; LDAP
96+
* authentication &gt; Authenticating against Active Directory and LDAP
9797
* servers</a> and then testing the LDAP configuration per
9898
* <a href="https://www.perforce.com/manuals/p4sag/Content/P4SAG/security.ldap.testing.html">
99-
* Helix Core Server Administrator Guide > Securing the server > LDAP
100-
* authentication > Testing and enabling LDAP configurations</a>.
99+
* Helix Core Server Administrator Guide &gt; Securing the server &gt; LDAP
100+
* authentication &gt; Testing and enabling LDAP configurations</a>.
101101
* <li>Install Perforce on the development workstation. I used Homebrew to
102102
* install: {@code admin$ brew cask install perforce}
103103
* <li>Set environment to connect to the Perforce server. My server is named

0 commit comments

Comments
 (0)