Solved

Eclipse plugin with extensions

Posted on 2004-03-29
5
248 Views
Last Modified: 2013-11-18
I'm programming a plugin and i want this plugin to be able
to use other plugins, like a plugin in a plugin. How do they
have to look like which classes can i use?
0
Comment
Question by:stdio
  • 2
  • 2
5 Comments
 
LVL 9

Expert Comment

by:mmuruganandam
ID: 10702519
This code snippet is taken from eclipse GEF plugin.


   <requires>
      <import plugin="org.eclipse.draw2d" export="true" version="2.1.1"/>
      <import plugin="org.eclipse.core.runtime" export="true"/>
      <import plugin="org.eclipse.core.resources" export="true"/>
      <import plugin="org.eclipse.ui" export="true"/>
   </requires>


within this requires tag you have place all your required (refered) plugin-ids.  export="true" suggests that
those libraries are used in the runtime.


Regards,
Muruga
0
 

Author Comment

by:stdio
ID: 10702585
Hmm i haven't tried yet, here is briefly what i wanna do:

I got a plugin which extends a view, i wanna print out the
time and the date

i wanna the user 2 be able 2 chose if he wants only 2 display
the time or the date does this work with your solution above?

i'll handle which extensions R activated or not in a preference page
i think that is possible and over this page i will modify the plugin.xml

once again is this possible with your given solution?
0
 
LVL 9

Accepted Solution

by:
mmuruganandam earned 250 total points
ID: 10702599
The given solution is for using of other plugins for your plugin.

Just try out.  Since I have done an IDE using eclipse for our server product, I am sure, it will work if you need to use the other plugins in your plugin.


Regards,
Muruga
0
 

Author Comment

by:stdio
ID: 10889081
I have no time right now to evalute on this problem but i will in a few
weeks is this a crime to hav no time =D
but the problem still persists
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

By the end of 1980s, object oriented programming using languages like C++, Simula69 and ObjectPascal gained momentum. It looked like programmers finally found the perfect language. C++ successfully combined the object oriented principles of Simula w…
In this article you will learn how to create a free basic website on Bitbucket, a git service provider. Polymer creates dynamic HTML components, which allow more flexibility than static HTML. This tutorial uses Ubuntu Linux but can also be done on W…
Viewers learn about the third conditional statement “else if” and use it in an example program. Then additional information about conditional statements is provided, covering the topic thoroughly. Viewers learn about the third conditional statement …
This theoretical tutorial explains exceptions, reasons for exceptions, different categories of exception and exception hierarchy.

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now