Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

EObytes$EOor.java:46-49: This object is almost identical... #1207

Closed
0pdd opened this issue Sep 11, 2022 · 3 comments
Closed

EObytes$EOor.java:46-49: This object is almost identical... #1207

0pdd opened this issue Sep 11, 2022 · 3 comments
Assignees

Comments

@0pdd
Copy link

0pdd commented Sep 11, 2022

The puzzle 1184-826d9a05 from #1184 has to be resolved:

* @todo #1184:30m This object is almost identical to
* EOand & EOxor. Extract method for converting Phy[]
* to Bytes[] to Param. And replace duplicated
* part this call to this method.

The puzzle was created by @rultor on 11-Sep-22.

Estimate: 30 minutes, role: DEV.

If you have any technical questions, don't ask me, submit new tickets instead. The task will be "done" when the problem is fixed and the text of the puzzle is removed from the source code. Here is more about PDD and about me.

@andreoss
Copy link
Member

@yegor256 Please, assign to me

@yegor256
Copy link
Member

@andreoss go ahead

andreoss added a commit to andreoss/eo that referenced this issue Sep 18, 2022
andreoss added a commit to andreoss/eo that referenced this issue Sep 18, 2022
andreoss added a commit to andreoss/eo that referenced this issue Sep 18, 2022
@0pdd
Copy link
Author

0pdd commented Sep 18, 2022

The puzzle 1184-826d9a05 has disappeared from the source code, that's why I closed this issue.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

3 participants