aboutsummaryrefslogtreecommitdiffstats
path: root/widgets/misc/e-bonobo-widget.h
blob: 2ccf54c8ec5b108289ec384906af0eba7b428423 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
/* -*- Mode: C; indent-tabs-mode: t; c-basic-offset: 8; tab-width: 8 -*- */
/* e-bonobo-widget.h
 *
 * Copyright (C) 2001  Ximian, Inc.
 *
 * This program is free software; you can redistribute it and/or
 * modify it under the terms of version 2 of the GNU General Public
 * License as published by the Free Software Foundation.
 *
 * This program is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 * General Public License for more details.
 *
 * You should have received a copy of the GNU General Public
 * License along with this program; if not, write to the
 * Free Software Foundation, Inc., 59 Temple Place - Suite 330,
 * Boston, MA 02111-1307, USA.
 *
 * Author: Ettore Perazzoli <ettore@ximian.com>
 */

#ifndef _E_BONOBO_WIDGET_H_
#define _E_BONOBO_WIDGET_H_

#include <bonobo/bonobo-widget.h>

#ifdef __cplusplus
extern "C" {
#pragma }
#endif /* __cplusplus */

#define E_TYPE_BONOBO_WIDGET            (e_bonobo_widget_get_type ())
#define E_BONOBO_WIDGET(obj)            (GTK_CHECK_CAST ((obj), E_TYPE_BONOBO_WIDGET, EBonoboWidget))
#define E_BONOBO_WIDGET_CLASS(klass)        (GTK_CHECK_CLASS_CAST ((klass), E_TYPE_BONOBO_WIDGET, EBonoboWidgetClass))
#define E_IS_BONOBO_WIDGET(obj)         (GTK_CHECK_TYPE ((obj), E_TYPE_BONOBO_WIDGET))
#define E_IS_BONOBO_WIDGET_CLASS(klass)     (GTK_CHECK_CLASS_TYPE ((obj), E_TYPE_BONOBO_WIDGET))


typedef struct _EBonoboWidget        EBonoboWidget;
typedef struct _EBonoboWidgetPrivate EBonoboWidgetPrivate;
typedef struct _EBonoboWidgetClass   EBonoboWidgetClass;

struct _EBonoboWidget {
    BonoboWidget parent;

    EBonoboWidgetPrivate *priv;
};

struct _EBonoboWidgetClass {
    BonoboWidgetClass parent_class;
};


#define E_BONOBO_WIDGET_TOPLEVEL_PROPERTY_ID "bonobo:toplevel"


GtkType        e_bonobo_widget_get_type                       (void);
EBonoboWidget *e_bonobo_widget_construct_control_from_objref  (EBonoboWidget      *widget,
                                   Bonobo_Control      control,
                                   Bonobo_UIContainer  uic);
EBonoboWidget *e_bonobo_widget_construct_control              (EBonoboWidget      *widget,
                                   const char         *moniker,
                                   Bonobo_UIContainer  uic);
GtkWidget     *e_bonobo_widget_new_control                    (const char         *moniker,
                                   Bonobo_UIContainer  uic);
GtkWidget     *e_bonobo_widget_new_control_from_objref        (Bonobo_Control      control,
                                   Bonobo_UIContainer  uic);

#ifdef __cplusplus
}
#endif /* __cplusplus */

#endif /* _E_BONOBO_WIDGET_H_ */
* New port: security/softetherpi2015-09-0219-0/+439 * Document recent ffmpeg/libav vulnerabilitiesjbeich2015-09-011-0/+176 * Remove configuration argument used during testing.cy2015-08-311-1/+0 * security/libressl: Update to 2.2.3brnrd2015-08-312-3/+4 * Fix build under 11-CURRENT. r378417 introduced a libreadline linkcy2015-08-312-14/+3 * - Update to 1.010sunpoet2015-08-302-5/+3 * Document graphics/graphviz vulnerabilityfeld2015-08-291-0/+26 * - Switch to @sampleamdmi32015-08-291-3/+1 * - Don't try to install empty examples directoriesamdmi32015-08-292-5/+3 * - Switch to USES=libedit as suggested by stage-qaamdmi32015-08-291-2/+3 * - Fix shebangsamdmi32015-08-281-0/+11 * Document recent mozilla vulnerabilitiesjbeich2015-08-281-0/+43 * graphics/libpgf was assigned a CVEfeld2015-08-261-0/+2 * - ensure demon starts after ldconfigdinoex2015-08-262-1/+2 * Fix security/obfsclient build with clang 3.7.0.delphij2015-08-262-1/+21 * Document multiple security advisories for go and go14junovitch2015-08-261-0/+39 * Claim ownership of security/scrypt. It's my code anyway...cperciva2015-08-261-13/+1 * - Pass maintainership to perl@sunpoet2015-08-252-2/+2 * - Fix LICENSEsunpoet2015-08-252-5/+6 * - Add LICENSEsunpoet2015-08-251-3/+6 * - Fix LICENSEsunpoet2015-08-251-5/+6 * - Strip libraryamdmi32015-08-251-2/+6 * - Strip libraryamdmi32015-08-251-1/+4 * - Strip libraryamdmi32015-08-251-1/+4 * - Add NO_ARCHamdmi32015-08-251-0/+1 * - Fix build when CC contains slashesamdmi32015-08-251-1/+1 * - Add LICENSEamdmi32015-08-251-2/+4 * Fix MFSA quote link and add libtremor commitsjbeich2015-08-251-1/+7 * Document libtremor vulnerabilities in the ancient version we providejbeich2015-08-251-0/+64 * Fix patch from r395182 on head. The patch(1) command works fine on 8.4bdrewery2015-08-251-1/+1 * - Update to 1.2.0 [1]wen2015-08-253-6/+6 * - Drop maintainershipbrix2015-08-254-4/+4 * Apply upstream fix for 'HostkeyAlgorithms +' support.bdrewery2015-08-252-1/+54 * Document devel/pcre vulnerabilityfeld2015-08-251-0/+37 * - update to 1.4eleeym2015-08-233-21/+16 * - Add LICENSEamdmi32015-08-221-0/+3 * Document drupal multiple vulnerabilities.delphij2015-08-221-0/+69 * Remove excess spacebdrewery2015-08-221-1/+1 * Document OpenSSH 7.0 PAM fixes.bdrewery2015-08-221-0/+32 * Document OpenSSH 7.0 PermitRootLogin issuebdrewery2015-08-221-0/+29 * Update to 7.1p1bdrewery2015-08-222-3/+4 * Update to 20150821 snapshotbdrewery2015-08-222-3/+3 * - Add NO_ARCHamdmi32015-08-221-0/+1 * - Add NO_ARCHamdmi32015-08-211-0/+1 * Document sysutils/tarsnap security announcementfeld2015-08-211-0/+36 * Build the pinentry-gnome3 port with libsecret support. GNOME 3.18 expects it.kwm2015-08-212-1/+2 * Fix build on FreeBSD 11.mat2015-08-211-0/+3 * - Update The Glorious Glasgow Haskell Compiler to version 7.10.2pgj2015-08-2174-153/+214 * Document vlc arbitrary pointer dereference.delphij2015-08-211-0/+35 * graphics/jasper new CVE added to entryfeld2015-08-201-1/+10 * Document vulnerability in graphics/libpgffeld2015-08-201-0/+28 * security/{,ca_root_}nss: update to 3.20jbeich2015-08-204-7/+7 * Look up a reference to a commit in 2005 that had been previously lost.peter2015-08-201-1/+1 * Update some legacy items that don't work or are using runtime remapping:peter2015-08-201-10/+9 * Extend recent QEMU related xen-tools CVEs to include the qemu-* portsjunovitch2015-08-201-3/+42 * Document CVE-2015-4491 in gdk-pixbuf2.kwm2015-08-191-0/+27 * Reset maintainererwin2015-08-191-1/+1 * Reset maintainererwin2015-08-191-1/+1 * Reset maintainererwin2015-08-191-1/+1 * Reset maintainererwin2015-08-191-1/+1 * Reset maintainer.erwin2015-08-191-1/+1 * irc/unreal fix <name> to be capitalizedfeld2015-08-191-1/+1 * - Fix shebangsamdmi32015-08-191-0/+3 * Document django vulnerabilitiesfeld2015-08-191-0/+73 * Document irc/unreal denial of servicefeld2015-08-191-0/+29 * Document graphics/jasper vulnerabilityfeld2015-08-191-0/+30 * Document freexl multiple vulnerabilities. One is still awaiting CVE assignment.feld2015-08-191-0/+66 * rt was assigned a CVEfeld2015-08-191-0/+2 * ansible was assigned a CVEfeld2015-08-191-0/+2 * gnutls was assigned a CVEfeld2015-08-191-0/+2 * - Update to OpenSSH 7.0p1bdrewery2015-08-185-115/+56 * Update to snapshot 20150817bdrewery2015-08-183-31/+33 * security/keepass: update 2.29 -> 2.30junovitch2015-08-182-3/+3 * Document mod_jk vulnerabilityfeld2015-08-181-0/+32 * Remove UNIQUENAME and LATEST_LINK.mat2015-08-1710-14/+0 * Document two QEMU related xen-tools security advisoriesjunovitch2015-08-171-0/+65 * Document PHP security issues impacting the lang/php5* ports (Core/SPL)junovitch2015-08-171-0/+77 * - Fix shebangsamdmi32015-08-171-0/+4 * Update to 2.13.nobutaka2015-08-173-4/+4 * Add more signature (locally verified).kuriyama2015-08-171-2/+2 * - Upgrade to 2.3gblach2015-08-172-4/+4 * - Update to 1.9.0amdmi32015-08-162-10/+8 * - Add NO_ARCHsunpoet2015-08-162-1/+2 * - Add NO_ARCHsunpoet2015-08-162-1/+2 * - Add NO_ARCHsunpoet2015-08-162-1/+2 * - Remove qt4-linguist dependency; add qt4-network instead.vg2015-08-161-3/+4 * Update to 1.86b.delphij2015-08-152-3/+3 * security/afl: cannonicalize MAINTAINERpgollucci2015-08-151-1/+1 * Update MASTER_SITES to fix fetching problem due to abnormal version numberfeld2015-08-151-1/+1 * Document MediaWiki multiple security vulnerabilitiesjunovitch2015-08-151-0/+45 * - Update to 3.3.17.1feld2015-08-153-4/+4 * Sync libvpx check for CVE-2015-448[56] with r394231jbeich2015-08-151-2/+2 * Document freeradius3 vulnerabilityfeld2015-08-151-0/+28 * Document gnutls vulnerabilitiesfeld2015-08-151-0/+65 * security/nss: update legacy ckbi suffix to the one used in 3.19.1jbeich2015-08-141-1/+1 * security/{,ca_root_}nss: update to 3.19.3jbeich2015-08-144-7/+7 * Update to 2.8.1garga2015-08-142-4/+3 * Update to 1.4.24arved2015-08-142-3/+3 * - Remove RG linksunpoet2015-08-142-2/+0 * - Update to 1.4.1sunpoet2015-08-143-15/+4 * - Update to 1.0.0sunpoet2015-08-142-3/+3 * - Add PORTSCOUTsunpoet2015-08-141-0/+2 * - Update to 1.1.0sunpoet2015-08-143-23/+10 * - Remove MASTER_SITE_SUBDIRsunpoet2015-08-141-1/+0 * - Switch to USES=autoreconfamdmi32015-08-131-3/+2 * Document Froxlor database password information disclosure vulnerabilityjunovitch2015-08-131-0/+40 * Document two XSS vulnerabilities in rt40, rt42.matthew2015-08-131-0/+40 * Document py-foolscap vulnerabilityfeld2015-08-131-0/+32 * Make libvpx-1.3.0 vulnerable by moving MFSA 2014-77 into separate entryjbeich2015-08-121-4/+65 * Document newest flash vulnabilities.kwm2015-08-121-0/+92 * - Upgrade to 2.1.7 (minor fixes).kuriyama2015-08-125-53/+10 * Update to version 1.17.1pawel2015-08-122-4/+4 * Oops, mark bundled libvpx v1.4.0 in firefox as vulnerable againjbeich2015-08-121-0/+9 * Move libvpx vulnerability into its own entryjbeich2015-08-121-5/+33 * Document recent mozilla vulnerabilitiesjbeich2015-08-121-0/+110 * - Switch to USES=autoreconfamdmi32015-08-121-2/+1 * - Switch to USES=autoreconfamdmi32015-08-121-2/+1 * - Add NO_ARCHamdmi32015-08-121-0/+1 * - Switch to USES=autoreconfamdmi32015-08-121-2/+1 * - Switch to USES=autoreconfamdmi32015-08-111-2/+1 * - Switch to USES=autoreconfamdmi32015-08-111-2/+1 * - Switch to USES=autoreconfamdmi32015-08-111-2/+1 * - Switch to USES=autoreconfamdmi32015-08-111-2/+1 * - Drop @dirrm* from plistamdmi32015-08-112-38/+0 * - Drop @dirrm* from plistamdmi32015-08-111-0/+15 * - Drop @dirrm* from plistamdmi32015-08-111-1/+0 * - Switch to USES=autoreconfamdmi32015-08-111-2/+1 * - Switch to USES=autoreconfamdmi32015-08-111-2/+1 * - Switch to USES=autoreconfamdmi32015-08-111-2/+1 * - Switch to USES=autoreconfamdmi32015-08-111-2/+1 * - Switch to USES=autoreconfamdmi32015-08-111-2/+1 * Document an already fixxed vulnerability in lighttpd 1.4.35 or older.madpilot2015-08-101-0/+29 * Document PCRE heap overflow vulnerability in '(?|' situationsjunovitch2015-08-101-0/+34 * Adds -fPIC to CFLAGS_aarch64 to a number of ports that already have itandrew2015-08-101-0/+1 * security/rubygem-omniauth-saml: create portswills2015-08-105-0/+39 * security/rubygem-ruby-saml: create portswills2015-08-104-0/+26 * security/rubygem-devise-two-factor: create portswills2015-08-105-0/+44 * secrutiy/rubygem-attr_encrypted: create portswills2015-08-104-0/+27 * security/rubygem-encryptor: create portswills2015-08-104-0/+25 * Re-commit ofnetchild2015-08-1033-13/+314 * Mention all CVEs that are fixed in 4.2.4. The release notes only mentionedflo2015-08-101-0/+6 * Update to signing-party 2.1 (bugfix release)johans2015-08-092-4/+3 * - editors/lazarus update to 1.4.2acm2015-08-092-2/+2 * Document recent mozilla vulnerabilitiesjbeich2015-08-071-0/+35 * Document wordpress vulnerabilitiesflo2015-08-071-0/+36 * Revert pkg-plist OPENSSL_SHLIBVER additionbrnrd2015-08-072-8/+3 * security/libressl: Update to 2.2.2brnrd2015-08-074-18/+27 * Add two security issues for subversion.lev2015-08-061-0/+35 * security/kpcli: update 2.8 -> 3.0robak2015-08-062-3/+8 * security/p5-Crypt-PWSafe3: new portrobak2015-08-065-0/+48 * Document Elasticsearch directory traversal attack and remote code executionjunovitch2015-08-061-0/+61 * The FreeBSD GNOME team proudly presents GNOME 3.16 for FreeBSD.kwm2015-08-0618-80/+331 * Bugfix upgrade to new upstream release 2.3.8.mandree2015-08-062-4/+3 * Part 2 of adding USE_GNOME=intltool to ports that require it.kwm2015-08-051-1/+1 * - Strip libraryamdmi32015-08-051-1/+2 * - Don't use / in sed regexps to allow paths, unbreaking cross-buildsamdmi32015-08-051-3/+3 * security/py-fail2ban: update 0.9.2 -> 0.9.3robak2015-08-043-4/+8 * Document xen-tools QEMU heap overflow flaw with certain ATAPI commandsjunovitch2015-08-041-0/+32 * - Drop @dirrm* from plistamdmi32015-08-041-1/+0 * - Add LICENSEamdmi32015-08-041-1/+5