From d58917dc2620bbdaf5943caede16340a725ad466 Mon Sep 17 00:00:00 2001 From: John Darrington Date: Mon, 19 Nov 2012 21:43:42 +0100 Subject: [PATCH] Updated documentation files to work with Texinfo 4.13.90 --- ChangeLog | 5 +++++ doc/recutils.texi | 40 ++++++++++++++++++++-------------------- 2 files changed, 25 insertions(+), 20 deletions(-) diff --git a/ChangeLog b/ChangeLog index 2149ee2..7bf4778 100644 --- a/ChangeLog +++ b/ChangeLog @@ -1,3 +1,8 @@ +2012-11-21 John Darrington + + doc/recutils.texi: Updated so that Texinfo 4.13.90 does not + show errors. + 2012-11-15 Jose E. Marchesi rec-mode: visiting an empty file works again. diff --git a/doc/recutils.texi b/doc/recutils.texi index f13d95e..ded15ca 100644 --- a/doc/recutils.texi +++ b/doc/recutils.texi @@ -120,12 +120,12 @@ So it looks like all the needs are covered by the existing solutions @dots{} but consider the following characteristics of the data storage systems mentioned in the previous paragraph: address@hidden @minus address@hidden @minus @item The stored data are not directly readable by humans. @item The stored data are definitely not directly writable by humans. @item They are program dependent. @item They are not easily managed by version control systems. address@hidden table address@hidden itemize @cindex readability Regarding the first point (human readability), while it is clearly @@ -3024,7 +3024,7 @@ between the recutils and other programs, such as lisp interpreters. Those options are not intended to be used by human operators. @table @samp address@hidden @address@hidden address@hidden @address@hidden Print the data using sexps instead of rec format. @end table @@ -3290,11 +3290,11 @@ intermixed with @kbd{-f @dots{} -v} pairs. @item -s @itemx @address@hidden Encrypt confidential fields with the given password. address@hidden @address@hidden address@hidden @address@hidden Don't use external record descriptors. address@hidden @address@hidden address@hidden @address@hidden Be verbose when reporting integrity problems. address@hidden @address@hidden address@hidden @address@hidden Don't generate @dfn{auto} fields. @xref{%auto}. @end table @@ -3328,7 +3328,7 @@ records are selected, @ie{} no replace mode is activated. @itemx @address@hidden Make strings case-insensitive in selection expressions. @cindex case, in selection expressions address@hidden @address@hidden address@hidden @address@hidden Insert the requested record even in potentially dangerous situations, such as when the data integrity of the database is compromised. @end table @@ -3434,15 +3434,15 @@ the records. @item -c @itemx @address@hidden Comment the matching records out instead of removing them. address@hidden @address@hidden address@hidden @address@hidden Delete even in potentially dangerous situations, such as the request to delete all the records of some type, for example. address@hidden @address@hidden address@hidden @address@hidden Don't use external record descriptors. @item -i @itemx @address@hidden Make strings case-insensitive in selection expressions. address@hidden @address@hidden address@hidden @address@hidden Be verbose when reporting integrity problems. @end table @@ -3549,11 +3549,11 @@ Delete the selected fields in the selected records. @item -c @itemx @address@hidden Comment out the selected fields in the selected records. address@hidden @address@hidden address@hidden @address@hidden Don't use external record descriptors. address@hidden @address@hidden address@hidden @address@hidden Be verbose when reporting integrity problems. address@hidden @address@hidden address@hidden @address@hidden Perform the requested operation even in potentially dangerous situations, or when the integrity of the data stored in the file is affected. @@ -3625,7 +3625,7 @@ In addition to the common options described earlier (@pxref{Common Options}) the program accepts the following global options. @table @samp address@hidden @address@hidden address@hidden @address@hidden Don't use external record descriptors. @end table @@ -3634,11 +3634,11 @@ performs. The operation mode is selected by using one of the following options. @table @samp address@hidden @address@hidden address@hidden @address@hidden Check the integrity of the database contained in the file, printing diagnostics messages in case something is not right. This is the default operation. address@hidden @address@hidden address@hidden @address@hidden Perform a physical sort of all the records contained in the file (or the standard input) after checking for its integrity. The sorting criteria are provided by the @code{%sort} special field, if any. If @@ -3646,7 +3646,7 @@ there is an integrity failure the sorting is not performed. @cindex sorting Note that this is a destructive operation. address@hidden @address@hidden address@hidden @address@hidden Encrypt all the non encrypted fields in the database which are marked as confidential. This operation requires a password. If no password is specified with @option{-s} and the program is run in a terminal, a @@ -3656,14 +3656,14 @@ If this operation is performed to a file having encrypted fields, the operation will fail unless @address@hidden is used. Note that this is a destructive operation. address@hidden @address@hidden address@hidden @address@hidden Decrypt all the encrypted fields in the database which are marked as confidential. This operation requires a password. If no password is specified with @option{-s} and the program is run in a terminal, a prompt is used to get the password from the user. Note that this is a destructive operation. address@hidden @address@hidden address@hidden @address@hidden Insert auto-generated fields as appropriate in the records which are missing them. @@ -3677,7 +3677,7 @@ described in the table below. @item -s @var{secret} @itemx @address@hidden@var{secret}} Password used to encrypt or decrypt fields. address@hidden @address@hidden address@hidden @address@hidden Force potentially dangerous operations. @end table -- 1.7.2.5