summaryrefslogtreecommitdiff
path: root/HACKING
diff options
context:
space:
mode:
authorAkim Demaille <akim@epita.fr>2002-09-11 08:50:55 +0000
committerAkim Demaille <akim@epita.fr>2002-09-11 08:50:55 +0000
commitf414d77d3876f559ac0af33285b9a9235f54a58f (patch)
treec7550031be7dd2bfec926c4dd09fb398cf1580e1 /HACKING
parentf25e23a6323bd60359f77b21c134842dbbd8c0e2 (diff)
downloadbison-f414d77d3876f559ac0af33285b9a9235f54a58f.tar.gz
More about Java.
Diffstat (limited to 'HACKING')
-rw-r--r--HACKING6
1 files changed, 6 insertions, 0 deletions
diff --git a/HACKING b/HACKING
index 157d7145..fa20885a 100644
--- a/HACKING
+++ b/HACKING
@@ -4,6 +4,11 @@ This file attempts to describe the rules to use when hacking Bison.
Don't put this file into the distribution. Don't mention it in the
ChangeLog.
+Everything related to the development of Bison is on Savannah:
+
+ http://savannah.gnu.org/projects/bison/
+
+
* Administrivia
** If you incorporate a change from somebody on the net:
@@ -21,6 +26,7 @@ The correct response to most actual bugs is to write a new test case
which demonstrates the bug. Then fix the bug, re-run the test suite,
and check everything in.
+
* Hacking
** Visible changes