KConfigBase:
- remove separator argument from list entry reading/writing functions
- introduce {read,write}XdgListEntry()
- kill readPathListEntry(), add readPathEntry() overload
instead. the default value is not optional any more, as it defines the
return type. this is consistent with the readEntry() functions.
- rename clean() => markAsClean(), remove rollback()
- rename ConfigState => AccessMode, getConfigState() => accessMode()
- rename {entry,group}IsImmutable() => is{Entry,Group}Immutable()
- remove NLS alias to Localized
KConfig:
- remove setGroup() & group()
- reshuffle OpenFlag enum, introduce NoCascade for symmetry
- remove setExtraConfigFiles() alias to addConfigSources()
KConfigGroup:
- inherit KConfigBase::deleteGroup() overloads
- make convertToQVariant() private, it will probably change somehow
- KConfig & KConfigGroup: deprecate entryMap()
- remove bogus declarations: KConfigGroup::setReadDefaults(),
KConfig::readEntryUntranslated()
- apidox
- reshuffle the declarations in the headers
svn path=/trunk/KDE/kdepim/; revision=728852
https://vkrause@svn.kde.org/home/kde/branches/work/~vkrause/enterprise
........
r703856 | vkrause | 2007-08-23 14:57:25 +0200 (Thu, 23 Aug 2007) | 2 lines
Add migration infrastructure to transfer local flags to the server.
........
r703887 | vkrause | 2007-08-23 16:34:57 +0200 (Thu, 23 Aug 2007) | 5 lines
Configuration update script to trigger migration of local IMAP flags to
the server. This should solve a regression due to the recent changes to
store the seen flag on the server also for read-only folders where all
local flags were overwritten.
........
svn path=/branches/kdepim/enterprise/kdepim/; revision=703903
for the new kDebug/kError/kWarning/kFatal syntax.
You can use the following command to find 'old' code:
egrep -r -A 5 '(kDebug|kError|kWarning|kFatal).*' * | grep -v ".svn" | grep "<< *endl;"
svn path=/trunk/KDE/kdepim/; revision=695781
Now, we use enums instead of strings.
Add the names of the types to KAccount. They can now be translated.
Also, provide an update script for easy config migration.
BUG: 90509
svn path=/trunk/KDE/kdepim/; revision=689148
SVN commit 645708 by dfaure:
Fix kmail saying "I seem to be running already" upon session restoration due to a stale lock file.
Now (on linux) it checks if the pid in the lock file really belongs to a running kmail or kontact.
svn path=/branches/kdepim/enterprise/kdepim/; revision=668091
Fix kmail saying "I seem to be running already" upon session restoration due to a stale lock file.
Now (on linux) it checks if the pid in the lock file really belongs to a running kmail or kontact.
svn path=/trunk/KDE/kdepim/; revision=645744
kmail. As suggested by Ingo Kloecker and Nicolas Goutte.
Added missing catalogue "libkpgp" to knode.
svn path=/branches/KDE/3.5/kdepim/; revision=492217
Additionally, checking for config updates is sped up by only checking the application of new config updates instead of checking all config updates.
FEATURE: 79938
GUI:
svn path=/trunk/kdepim/; revision=372098
- jump to first new (old default)
- jump to first new or unread (old checkbox jump to unread)
- jump to last selected (new)
svn path=/trunk/kdepim/; revision=338393
either DontSendOnCheck, SendOnManualChecks or SendOnAllChecks
- use dropdown in the gui instead of checkbox
- port to KConfigXT
- add kmail-3.3-mish.sh update script which atm only updates the one key,
but can be used to collect key/value renames as we move the remaining
keys to KConfigXT and canonicalize (is that a word?) them
- hook in update script
CCMAIL: 79190-done@bugs.kde.org
svn path=/trunk/kdepim/; revision=320818
ae2-kconf_update:
This includes the kconf_update entries in kmstartup.cpp, kmail.upd (the scripts are
already committed, but not yet installed, this patch does the latter).
(this patch differs from the one posted to kmail-devel in that I added Ingo's
request for a separate update script for the enc/sign split)
ae2-configuredialog-security-page-rework:
This patch contains the configure dialog's Security Page rework.
This patch adds GUI config for:
- specifying whether or not to import attached certificates automatically.
This is currently only implemented for S/MIME (see later patches), but is
dead easy to implement for OpenPGP, too.
This sounds like more than it actually is, since gpgsm imports certs in
signatures anyway, to be able to check the sigs. This is just the way S/MIME
works. We still make it configurable, mainly b/c project management couldn't
establish a position on whether or not it should happen automatically :)
- Remove the GUI for enabling/disabling DSNs.
We never generated standards-conformant DSNs anyway; in addition to that,
this is an MTA-level feature. We simply lack the envelope data to create
them. Since we now have MDNs, which _are_ MUA-level, I'm on a quest to phase
out the KMail-pseudo-DSN support "bouncing". This is one part of it.
Why is this here? We needed the space occupied by that groupbox otherwise :)
- Add an option to suppress any MDN sending in case of encrypted messages.
We always sent an MDN, regardless of whether or not the decryption actually
succeeded, apparently some Win SW doesn't do it this way, which makes them
an Oracle. We never were one, but this is an option for the paranoid, of
which we have a few (HTML sidebar, attachment icons in the message list,
etc)
- Reorganise the Security Page:
(General,PGP,CryptPlug(Crypto Backends),individual CryptPlug config)
->(Reading,Composing,S/MIME Validation,Crypto Backends,
individual Crypto Backend configs)
svn path=/trunk/kdepim/; revision=316512
(better than <foo.h>, especially when systems could have an identity.h somewhere)
A kconfig_update script moves the identities from kmailrc to emailidentities
svn path=/trunk/kdepim/; revision=311347