aboutsummaryrefslogtreecommitdiffstats
path: root/mail/evolution-mail.oafinfo
blob: 81edb07292304e8471d0b35b8a657ca11e71e922 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
<oaf_info>

<oaf_server iid="OAFIID:control-factory:evolution-mail:25902062-543b-4f44-8702-d90145fcdbf2"
            type="exe"
            location="evolution-mail">

    <oaf_attribute name="repo_ids" type="stringv">
        <item value="IDL:GNOME/GenericFactory:1.0"/>
    </oaf_attribute>

    <oaf_attribute name="description" type="string"
                       value="Evolution mail folder factory component."/>
</oaf_server>

<oaf_server iid="OAFIID:control:evolution-mail:833d5a71-a201-4a0e-b7e6-5475c5c4cb45"
            type="factory"
            location="OAFIID:control-factory:evolution-mail:25902062-543b-4f44-8702-d90145fcdbf2">

    <oaf_attribute name="repo_ids" type="stringv">
        <item value="IDL:BonoboControl/evolution-mail:1.0"/>
        <item value="IDL:GNOME/Control:1.0"/>
    </oaf_attribute>

    <oaf_attribute name="description" type="string"
                       value="Evolution mail folder display component."/>
</oaf_server>

<oaf_server iid="OAFIID:evolution-shell-component-factory:evolution-mail:0ea887d5-622b-4b8c-b525-18aa1cbe18a6"
            type="exe"
            location="evolution-mail">

    <oaf_attribute name="repo_ids" type="stringv">
        <item value="IDL:GNOME/GenericFactory:1.0"/>
    </oaf_attribute>

    <oaf_attribute name="description" type="string"
                   value="Factory for the Evolution mail component."/>

</oaf_server>

<oaf_server iid="OAFIID:evolution-shell-component:evolution-mail:d3cb3ed6-a654-4337-8aa0-f443751d6d1b"
            type="factory"
            location="OAFIID:evolution-shell-component-factory:evolution-mail:0ea887d5-622b-4b8c-b525-18aa1cbe18a6">

    <oaf_attribute name="repo_ids" type="stringv">
        <item value="IDL:Evolution/ShellComponent:1.0"/>
    </oaf_attribute>

    <oaf_attribute name="description" type="string"
                   value="Evolution component for handling mail."/>

    <oaf_attribute name="evolution:shell-component-icon" type="string"
               value="evolution-inbox.png"/>
</oaf_server>

<oaf_server iid="OAFIID:evolution-executive-summary-component-factory:evolution-mail:be210cba-0eee-4def-84fa-643d50321217"
        type="exe"
        location="evolution-mail">

    <oaf_attribute name="repo_ids" type="stringv">
        <item value="IDL:GNOME:GenericFactory:1.0"/>
    </oaf_attribute>

    <oaf_attribute name="description" type="string"
               value="Factory for the Mail Summary component."/>
</oaf_server>

<oaf_server iid="OAFIID:evolution-executive-summary-component:evolution-mail:157f86b4-ff6a-4618-86b8-4789024c4043"
        type="factory"
        location="OAFIID:evolution-executive-summary-component-factory:evolution-mail:be210cba-0eee-4def-84fa-643d50321217">

    <oaf_attribute name="repo_ids" type="stringv">
        <item value="IDL:Evolution:SummaryComponent:1.0"/>
    </oaf_attribute>

    <oaf_attribute name="description" type="string"
               value="Evolution mail executive summary component."/>
</oaf_server>

<oaf_server iid="OAFIID:evolution-composer-factory:evolution-mail:fcfda393-60ee-485f-b782-e9323434bff3"
        type="exe"
        location="evolution-mail">

    <oaf_attribute name="repo_ids" type="stringv">
        <item value="IDL:GNOME:GenericFactory:1.0"/>
    </oaf_attribute>

    <oaf_attribute name="description" type="string"
               value="Factory for the Evolution composer."/>
</oaf_server>

<oaf_server iid="OAFIID:evolution-composer:evolution-mail:cd8618ea-53e1-4b9e-88cf-ec578bdb903b"
        type="factory"
        location="OAFIID:evolution-composer-factory:evolution-mail:fcfda393-60ee-485f-b782-e9323434bff3">

    <oaf_attribute name="repo_ids" type="stringv">
        <item value="IDL:Evolution:Composer:1.0"/>
    </oaf_attribute>

    <oaf_attribute name="description" type="string"
               value="Evolution mail composer."/>
</oaf_server>


</oaf_info>
insertions'>+52 * An unrolled implementation of MD5 purely in Haskell.pgj2012-02-194-0/+26 * Security update to 3.4.10.1matthew2012-02-181-0/+26 * - document latest piwik security vulnerabilityjgh2012-02-181-0/+27 * - document recent mozilla vulnerabilitiesflo2012-02-181-1/+52 * Update to 3.0.2 - minor bugfixes.lx2012-02-172-3/+3 * Update to 1.5.3.6crees2012-02-173-50/+103 * - add PACKETSTORM mirrorrm2012-02-171-1/+2 * - Bump PORTREVISION to chase the update of multimedia/libvpxashish2012-02-162-0/+2 * Document vulnerabilities in chromium < 17.0.963.56rene2012-02-161-0/+66 * Add new port (security/tsshbatch)jgh2012-02-164-0/+64 * - Added gpg run dependencyglarkin2012-02-161-0/+3 * - Updated the recent WebCalendar entry to match <= 1.2.4 instead of < 1.2.4,glarkin2012-02-161-10/+10 * gpgr is a very light interface to the command-line GPG (GNU Privacyglarkin2012-02-164-0/+30 * - Mark broken on 7.x. Builds fine, doesn't work, according to "make test"swills2012-02-151-1/+7 * - Fix missing \n in SIZE line for distinfoscheidell2012-02-151-1/+1 * Update to 4.1.nobutaka2012-02-152-3/+3 * - Add official site to MASTER_SITESsunpoet2012-02-151-1/+2 * - Add BUILD_DEPENDSsunpoet2012-02-151-5/+5 * This vuln also affects pypyeadler2012-02-151-0/+7 * update to 0.2.3.12-alphabf2012-02-152-3/+3 * - Bump PORTREVISIONpgollucci2012-02-152-5/+22 * Update to 0.11.novel2012-02-152-3/+3 * Bump pcre library dependency due to 8.30 updatemm2012-02-1410-13/+20 * - update to 7.2rm2012-02-142-3/+3 * typoeadler2012-02-141-1/+1 * Inform users of the DoS issue in the python SimpleXMLRPCServer functioneadler2012-02-141-0/+55 * Add the recently assigned cve numbereadler2012-02-141-0/+2 * - Update to 0.0.1.0pgj2012-02-132-4/+3 * - Update to 4.2.4pgj2012-02-132-4/+3 * Update to 1.0.4jpaetzel2012-02-132-5/+8 * - Connect all the previously added hs- ports to the buildpgj2012-02-131-0/+9 * - Please welcome GHC 7.0.4pgj2012-02-131-0/+1 * Skein [1] is a family of fast secure cryptographic hash functions. Thispgj2012-02-133-0/+35 * To store passwords securely, they should be salted, then hashed with apgj2012-02-133-0/+31 * A platform independent method to obtain cryptographically strong entropypgj2012-02-133-0/+28 * A collection of crypto hashes, with a practical incremental and one-pass,pgj2012-02-133-0/+30 * Symmetrical Block, Stream, and PubKey Ciphers.pgj2012-02-133-0/+27 * Generic cryptography public keys algorithm types.pgj2012-02-133-0/+26 * A generic interface for cryptographic operations, platform independent qualitypgj2012-02-133-0/+32 * Simple crypto pseudo-random-number-generator with really good randomnesspgj2012-02-133-0/+27 * Achieves security through AES-CTR encryption and Skein-MAC-512-256pgj2012-02-133-0/+29 * - Pregenerate pw_dict since cracklib stopped distributing onepgollucci2012-02-137-5/+12 * - Patch the port to not remove /dev/nullpgollucci2012-02-132-2/+13 * - Mark BROKEN immediately: this port deletes /dev/null during compilationpav2012-02-131-0/+2 * - sync PORTREVISION to lang/php4+1 (master port)pgollucci2012-02-131-1/+1 * - convert to using PYTHON_SITELIBDIR (non-functional change)rm2012-02-138-73/+74 * - fix origin from previous commitjgh2012-02-131-1/+1 * - Update to 1.05sunpoet2012-02-123-14/+13 * - Update to 1.05sunpoet2012-02-126-44/+121 * Add new port (security/sshpass)jgh2012-02-124-0/+31 * Inform users of the XSS issue in the latest version of WebCalendar.eadler2012-02-121-0/+29 * - Change WWW to CPANsunpoet2012-02-121-1/+1 * - Update to 2.1.4pgollucci2012-02-122-4/+5 * - Update to 3.1pgollucci2012-02-123-7/+17 * - Update to 1.5.3pgollucci2012-02-122-12/+9 * Whitespace fixes.wxs2012-02-121-3/+3 * - Update to version 4.1.0 [1]pawel2012-02-122-5/+5 * - Document mozilla -- use after free in nsXBLDocumentInfo::ReadPrototypeBindingsbeat2012-02-111-0/+46 * Inform bip users of buffer overflow (CVE-2012-0806)eadler2012-02-111-0/+27 * Inform users of the private information disclosure bug in surf (CVE-2012-0842)eadler2012-02-111-0/+24 * - Update to 7.1azi2012-02-112-7/+3 * - Convert from BUILD -> LIB depends for cracklib and move to .so usagepgollucci2012-02-111-5/+3 * - Chase shlib bump for security/cracklib from .1 -> .10pgollucci2012-02-115-2/+5 * - patch swatch.rc to check for buffer overflow in cmdarg with long _flags linesscheidell2012-02-102-5/+13 * Fix stylejadawin2012-02-101-8/+8 * Document last glpi vulnerabilitiesjadawin2012-02-101-0/+27 * Update security/pam_google_authenticator to 20120119 snapshotdumbbell2012-02-102-6/+4 * Fix build with thread-safe php.ale2012-02-101-0/+10 * Document new Chromium < 17.0.963.46 vulnerabilities.rene2012-02-091-0/+86 * - Restrict USE_PYTHON rangesunpoet2012-02-091-1/+1 * - Make non-interactive and remove IS_INTERACTIVEswills2012-02-091-1/+1 * - Update to 1.54jadawin2012-02-092-3/+3 * - Update to 0.8.6pgollucci2012-02-094-13/+22 * - Update to 2.8.18pgollucci2012-02-096-95/+20 * - Mark as deprecatedjadawin2012-02-081-0/+2 * - Fix build when using GCRYPT KNOBsbz2012-02-082-0/+12 * - Update to 2.2.0pgollucci2012-02-082-3/+3 * New Port: security/binwalkjgh2012-02-084-0/+56 * Document Drupal core multiple vulnerabilities.delphij2012-02-081-0/+52 * - Update to 0.0.6miwi2012-02-072-6/+3 * Fix up 3fd040be-4f0b-11e1-9e32-0025900931f by giving a better description.wxs2012-02-071-4/+11 * Use the correct variable that was obviously the intent of the authoreadler2012-02-071-1/+1 * - Chase unixODBC shlib bumpmiwi2012-02-061-1/+2 * Document "bugzilla" - multiple vulnerabilities.skv2012-02-061-0/+50 * If you used LDAP and NOPORTDOCS then the documentation directory would bewxs2012-02-062-1/+2 * - Replace WITH_GUI with WITH_X11 to adhear to standardszi2012-02-061-2/+2 * Document PHP remote code vulnerability.delphij2012-02-041-0/+26 * - Update to 1.4.0sbz2012-02-042-3/+7 * Update to 0.9.33 release.ale2012-02-032-3/+5 * Add vuxml entry for mathopd directory traversal vulnerability.rm2012-02-031-0/+27 * - adjust ordering for latest apache entryjgh2012-02-031-12/+12 * MITRE is spelled in all capital letters.wxs2012-02-021-1/+1 * Update to 1.4.8mm2012-02-022-3/+3 * - Remove missing file in previous commitsunpoet2012-02-021-13/+0 * document latest Apache vulnerabilitiesjgh2012-02-021-0/+54 * - fix sed regular expressionjgh2012-02-021-3/+4 * - Update to 1.3.2sunpoet2012-02-022-11/+8 * - Update to 1.5jgh2012-02-025-69/+12 * - Pet portlintsunpoet2012-02-023-25/+10 * - Reassign to the heaptabthorpe2012-02-013-3/+3 * document recent mozilla vulnerabilitiesflo2012-02-011-0/+79 * add upstream patch, to fix "__GNUC_MINOR is not defined" build error thatflo2012-02-012-0/+24 * Fix PORTREVISION typo.cy2012-01-311-1/+1 * Correct versions for sudo format string vulnerability.wxs2012-01-311-1/+2 * - Upgrade to 1.14.12 (minor bugfixes).kuriyama2012-01-315-29/+30 * Update package description.cy2012-01-312-6/+5 * Update 1.0.2 --> 1.0.4cy2012-01-312-6/+5 * Update to 1.8.3p2wxs2012-01-312-4/+4 * Document sudo format string vulnerability.wxs2012-01-311-0/+38 * - Fix build due to libtool updates. [1]scheidell2012-01-303-17/+169 * - update to 1.1.1dinoex2012-01-302-3/+3 * Document missing FreeBSD Security Advisories:wxs2012-01-301-2/+195 * - Adjust formatting for 93688f8f-4935-11e1-89b4-001ec9578670zi2012-01-301-8/+10 * - Fix build on 10-current (i386) [1]kuriyama2012-01-292-0/+12 * - Mark BROKEN under FreeBSD 10zi2012-01-291-0/+4 * - Document vulnerabilities in mail/postfixadmin (CVE-2012-0811, CVE-2012-0812)zi2012-01-281-0/+39 * - Update to 1.0.1miwi2012-01-282-6/+5 * - Update to 1.7.7miwi2012-01-282-3/+3 * - Cleanup & Formatingmiwi2012-01-281-32/+32 * Additional software only options and binary package build tweaks.`cy2012-01-282-26/+76 * Fix typo.cy2012-01-271-1/+1 * - Document vulnerability in converters/mpackzi2012-01-261-0/+27 * - Document vulnerabilities in print/acroread9 (prior to 9.4.7)zi2012-01-261-0/+46 * Somehow a character got lostarved2012-01-261-1/+1 * - Update to 0.18ashish2012-01-262-3/+3 * - Update to 5.70ashish2012-01-262-3/+3 * Binary package improvements.cy2012-01-262-16/+83 * Update 2.4.1.2 --> 2.4.2.2.cy2012-01-265-10/+110 * The KDE/FreeBSD team is pleased to announce KDE SC 4.7.4, whichavilla2012-01-254-6/+6 * Apply utmp patch from ${FILESDIR} (not files) if OSVERSION < 900007jgh2012-01-251-2/+2 * - Update to 1.3.1jgh2012-01-253-13/+14 * update to 0.2.3.11-alphabf2012-01-242-3/+3 * update lang/sbcl to 1.0.55, and adjust dependent portsbf2012-01-241-1/+1 * Dancer::Plugin::Passphrase manages the hashing of passwords for Dancer apps,culot2012-01-245-0/+49 * - update entry fixed in chromium-16.0.912.75 (CVE-2011-3925)rene2012-01-241-0/+40 * Fix build while chanting "I will run make validate". :(wxs2012-01-241-1/+1 * Add CVE for recent spamdyke buffer overflows.wxs2012-01-241-0/+1 * Document multiple vulnerabilities in wireshark, all of which havewxs2012-01-241-0/+58 * Whitespace cleanup.wxs2012-01-241-2/+2 * - Document buffer overflows in spamdyke.wxs2012-01-241-0/+33 * - update to DISTVERSION 201204ohauer2012-01-243-7/+6 * Update to 4.0.1.nobutaka2012-01-232-3/+3 * Fixup to please "make tidy". No need to wrap this line.wxs2012-01-231-2/+1 * - Add CVE for spamdyke STARTTLS plaintext injection.wxs2012-01-231-0/+2 * - Fix affected rubygem-rack version: add ,3 as PORTEPOCH=3 is restoredsunpoet2012-01-221-1/+1 * - Update to 0.22culot2012-01-223-5/+8 * - Correct package range in 5c5f19ce-43af-11e1-89b4-001ec9578670zi2012-01-221-1/+5 * At the moment 1385 ports use BUILD_DEPENDS= ${RUN_DEPENDS} and 450eadler2012-01-22