├── LICENSE
├── README.md
├── evil-fringe-mark-overlays.el
├── evil-fringe-mark.el
└── img
├── charset.png
└── window.png
/LICENSE:
--------------------------------------------------------------------------------
1 | GNU GENERAL PUBLIC LICENSE
2 | Version 3, 29 June 2007
3 |
4 | Copyright (C) 2007 Free Software Foundation, Inc.
5 | Everyone is permitted to copy and distribute verbatim copies
6 | of this license document, but changing it is not allowed.
7 |
8 | Preamble
9 |
10 | The GNU General Public License is a free, copyleft license for
11 | software and other kinds of works.
12 |
13 | The licenses for most software and other practical works are designed
14 | to take away your freedom to share and change the works. By contrast,
15 | the GNU General Public License is intended to guarantee your freedom to
16 | share and change all versions of a program--to make sure it remains free
17 | software for all its users. We, the Free Software Foundation, use the
18 | GNU General Public License for most of our software; it applies also to
19 | any other work released this way by its authors. You can apply it to
20 | your programs, too.
21 |
22 | When we speak of free software, we are referring to freedom, not
23 | price. Our General Public Licenses are designed to make sure that you
24 | have the freedom to distribute copies of free software (and charge for
25 | them if you wish), that you receive source code or can get it if you
26 | want it, that you can change the software or use pieces of it in new
27 | free programs, and that you know you can do these things.
28 |
29 | To protect your rights, we need to prevent others from denying you
30 | these rights or asking you to surrender the rights. Therefore, you have
31 | certain responsibilities if you distribute copies of the software, or if
32 | you modify it: responsibilities to respect the freedom of others.
33 |
34 | For example, if you distribute copies of such a program, whether
35 | gratis or for a fee, you must pass on to the recipients the same
36 | freedoms that you received. You must make sure that they, too, receive
37 | or can get the source code. And you must show them these terms so they
38 | know their rights.
39 |
40 | Developers that use the GNU GPL protect your rights with two steps:
41 | (1) assert copyright on the software, and (2) offer you this License
42 | giving you legal permission to copy, distribute and/or modify it.
43 |
44 | For the developers' and authors' protection, the GPL clearly explains
45 | that there is no warranty for this free software. For both users' and
46 | authors' sake, the GPL requires that modified versions be marked as
47 | changed, so that their problems will not be attributed erroneously to
48 | authors of previous versions.
49 |
50 | Some devices are designed to deny users access to install or run
51 | modified versions of the software inside them, although the manufacturer
52 | can do so. This is fundamentally incompatible with the aim of
53 | protecting users' freedom to change the software. The systematic
54 | pattern of such abuse occurs in the area of products for individuals to
55 | use, which is precisely where it is most unacceptable. Therefore, we
56 | have designed this version of the GPL to prohibit the practice for those
57 | products. If such problems arise substantially in other domains, we
58 | stand ready to extend this provision to those domains in future versions
59 | of the GPL, as needed to protect the freedom of users.
60 |
61 | Finally, every program is threatened constantly by software patents.
62 | States should not allow patents to restrict development and use of
63 | software on general-purpose computers, but in those that do, we wish to
64 | avoid the special danger that patents applied to a free program could
65 | make it effectively proprietary. To prevent this, the GPL assures that
66 | patents cannot be used to render the program non-free.
67 |
68 | The precise terms and conditions for copying, distribution and
69 | modification follow.
70 |
71 | TERMS AND CONDITIONS
72 |
73 | 0. Definitions.
74 |
75 | "This License" refers to version 3 of the GNU General Public License.
76 |
77 | "Copyright" also means copyright-like laws that apply to other kinds of
78 | works, such as semiconductor masks.
79 |
80 | "The Program" refers to any copyrightable work licensed under this
81 | License. Each licensee is addressed as "you". "Licensees" and
82 | "recipients" may be individuals or organizations.
83 |
84 | To "modify" a work means to copy from or adapt all or part of the work
85 | in a fashion requiring copyright permission, other than the making of an
86 | exact copy. The resulting work is called a "modified version" of the
87 | earlier work or a work "based on" the earlier work.
88 |
89 | A "covered work" means either the unmodified Program or a work based
90 | on the Program.
91 |
92 | To "propagate" a work means to do anything with it that, without
93 | permission, would make you directly or secondarily liable for
94 | infringement under applicable copyright law, except executing it on a
95 | computer or modifying a private copy. Propagation includes copying,
96 | distribution (with or without modification), making available to the
97 | public, and in some countries other activities as well.
98 |
99 | To "convey" a work means any kind of propagation that enables other
100 | parties to make or receive copies. Mere interaction with a user through
101 | a computer network, with no transfer of a copy, is not conveying.
102 |
103 | An interactive user interface displays "Appropriate Legal Notices"
104 | to the extent that it includes a convenient and prominently visible
105 | feature that (1) displays an appropriate copyright notice, and (2)
106 | tells the user that there is no warranty for the work (except to the
107 | extent that warranties are provided), that licensees may convey the
108 | work under this License, and how to view a copy of this License. If
109 | the interface presents a list of user commands or options, such as a
110 | menu, a prominent item in the list meets this criterion.
111 |
112 | 1. Source Code.
113 |
114 | The "source code" for a work means the preferred form of the work
115 | for making modifications to it. "Object code" means any non-source
116 | form of a work.
117 |
118 | A "Standard Interface" means an interface that either is an official
119 | standard defined by a recognized standards body, or, in the case of
120 | interfaces specified for a particular programming language, one that
121 | is widely used among developers working in that language.
122 |
123 | The "System Libraries" of an executable work include anything, other
124 | than the work as a whole, that (a) is included in the normal form of
125 | packaging a Major Component, but which is not part of that Major
126 | Component, and (b) serves only to enable use of the work with that
127 | Major Component, or to implement a Standard Interface for which an
128 | implementation is available to the public in source code form. A
129 | "Major Component", in this context, means a major essential component
130 | (kernel, window system, and so on) of the specific operating system
131 | (if any) on which the executable work runs, or a compiler used to
132 | produce the work, or an object code interpreter used to run it.
133 |
134 | The "Corresponding Source" for a work in object code form means all
135 | the source code needed to generate, install, and (for an executable
136 | work) run the object code and to modify the work, including scripts to
137 | control those activities. However, it does not include the work's
138 | System Libraries, or general-purpose tools or generally available free
139 | programs which are used unmodified in performing those activities but
140 | which are not part of the work. For example, Corresponding Source
141 | includes interface definition files associated with source files for
142 | the work, and the source code for shared libraries and dynamically
143 | linked subprograms that the work is specifically designed to require,
144 | such as by intimate data communication or control flow between those
145 | subprograms and other parts of the work.
146 |
147 | The Corresponding Source need not include anything that users
148 | can regenerate automatically from other parts of the Corresponding
149 | Source.
150 |
151 | The Corresponding Source for a work in source code form is that
152 | same work.
153 |
154 | 2. Basic Permissions.
155 |
156 | All rights granted under this License are granted for the term of
157 | copyright on the Program, and are irrevocable provided the stated
158 | conditions are met. This License explicitly affirms your unlimited
159 | permission to run the unmodified Program. The output from running a
160 | covered work is covered by this License only if the output, given its
161 | content, constitutes a covered work. This License acknowledges your
162 | rights of fair use or other equivalent, as provided by copyright law.
163 |
164 | You may make, run and propagate covered works that you do not
165 | convey, without conditions so long as your license otherwise remains
166 | in force. You may convey covered works to others for the sole purpose
167 | of having them make modifications exclusively for you, or provide you
168 | with facilities for running those works, provided that you comply with
169 | the terms of this License in conveying all material for which you do
170 | not control copyright. Those thus making or running the covered works
171 | for you must do so exclusively on your behalf, under your direction
172 | and control, on terms that prohibit them from making any copies of
173 | your copyrighted material outside their relationship with you.
174 |
175 | Conveying under any other circumstances is permitted solely under
176 | the conditions stated below. Sublicensing is not allowed; section 10
177 | makes it unnecessary.
178 |
179 | 3. Protecting Users' Legal Rights From Anti-Circumvention Law.
180 |
181 | No covered work shall be deemed part of an effective technological
182 | measure under any applicable law fulfilling obligations under article
183 | 11 of the WIPO copyright treaty adopted on 20 December 1996, or
184 | similar laws prohibiting or restricting circumvention of such
185 | measures.
186 |
187 | When you convey a covered work, you waive any legal power to forbid
188 | circumvention of technological measures to the extent such circumvention
189 | is effected by exercising rights under this License with respect to
190 | the covered work, and you disclaim any intention to limit operation or
191 | modification of the work as a means of enforcing, against the work's
192 | users, your or third parties' legal rights to forbid circumvention of
193 | technological measures.
194 |
195 | 4. Conveying Verbatim Copies.
196 |
197 | You may convey verbatim copies of the Program's source code as you
198 | receive it, in any medium, provided that you conspicuously and
199 | appropriately publish on each copy an appropriate copyright notice;
200 | keep intact all notices stating that this License and any
201 | non-permissive terms added in accord with section 7 apply to the code;
202 | keep intact all notices of the absence of any warranty; and give all
203 | recipients a copy of this License along with the Program.
204 |
205 | You may charge any price or no price for each copy that you convey,
206 | and you may offer support or warranty protection for a fee.
207 |
208 | 5. Conveying Modified Source Versions.
209 |
210 | You may convey a work based on the Program, or the modifications to
211 | produce it from the Program, in the form of source code under the
212 | terms of section 4, provided that you also meet all of these conditions:
213 |
214 | a) The work must carry prominent notices stating that you modified
215 | it, and giving a relevant date.
216 |
217 | b) The work must carry prominent notices stating that it is
218 | released under this License and any conditions added under section
219 | 7. This requirement modifies the requirement in section 4 to
220 | "keep intact all notices".
221 |
222 | c) You must license the entire work, as a whole, under this
223 | License to anyone who comes into possession of a copy. This
224 | License will therefore apply, along with any applicable section 7
225 | additional terms, to the whole of the work, and all its parts,
226 | regardless of how they are packaged. This License gives no
227 | permission to license the work in any other way, but it does not
228 | invalidate such permission if you have separately received it.
229 |
230 | d) If the work has interactive user interfaces, each must display
231 | Appropriate Legal Notices; however, if the Program has interactive
232 | interfaces that do not display Appropriate Legal Notices, your
233 | work need not make them do so.
234 |
235 | A compilation of a covered work with other separate and independent
236 | works, which are not by their nature extensions of the covered work,
237 | and which are not combined with it such as to form a larger program,
238 | in or on a volume of a storage or distribution medium, is called an
239 | "aggregate" if the compilation and its resulting copyright are not
240 | used to limit the access or legal rights of the compilation's users
241 | beyond what the individual works permit. Inclusion of a covered work
242 | in an aggregate does not cause this License to apply to the other
243 | parts of the aggregate.
244 |
245 | 6. Conveying Non-Source Forms.
246 |
247 | You may convey a covered work in object code form under the terms
248 | of sections 4 and 5, provided that you also convey the
249 | machine-readable Corresponding Source under the terms of this License,
250 | in one of these ways:
251 |
252 | a) Convey the object code in, or embodied in, a physical product
253 | (including a physical distribution medium), accompanied by the
254 | Corresponding Source fixed on a durable physical medium
255 | customarily used for software interchange.
256 |
257 | b) Convey the object code in, or embodied in, a physical product
258 | (including a physical distribution medium), accompanied by a
259 | written offer, valid for at least three years and valid for as
260 | long as you offer spare parts or customer support for that product
261 | model, to give anyone who possesses the object code either (1) a
262 | copy of the Corresponding Source for all the software in the
263 | product that is covered by this License, on a durable physical
264 | medium customarily used for software interchange, for a price no
265 | more than your reasonable cost of physically performing this
266 | conveying of source, or (2) access to copy the
267 | Corresponding Source from a network server at no charge.
268 |
269 | c) Convey individual copies of the object code with a copy of the
270 | written offer to provide the Corresponding Source. This
271 | alternative is allowed only occasionally and noncommercially, and
272 | only if you received the object code with such an offer, in accord
273 | with subsection 6b.
274 |
275 | d) Convey the object code by offering access from a designated
276 | place (gratis or for a charge), and offer equivalent access to the
277 | Corresponding Source in the same way through the same place at no
278 | further charge. You need not require recipients to copy the
279 | Corresponding Source along with the object code. If the place to
280 | copy the object code is a network server, the Corresponding Source
281 | may be on a different server (operated by you or a third party)
282 | that supports equivalent copying facilities, provided you maintain
283 | clear directions next to the object code saying where to find the
284 | Corresponding Source. Regardless of what server hosts the
285 | Corresponding Source, you remain obligated to ensure that it is
286 | available for as long as needed to satisfy these requirements.
287 |
288 | e) Convey the object code using peer-to-peer transmission, provided
289 | you inform other peers where the object code and Corresponding
290 | Source of the work are being offered to the general public at no
291 | charge under subsection 6d.
292 |
293 | A separable portion of the object code, whose source code is excluded
294 | from the Corresponding Source as a System Library, need not be
295 | included in conveying the object code work.
296 |
297 | A "User Product" is either (1) a "consumer product", which means any
298 | tangible personal property which is normally used for personal, family,
299 | or household purposes, or (2) anything designed or sold for incorporation
300 | into a dwelling. In determining whether a product is a consumer product,
301 | doubtful cases shall be resolved in favor of coverage. For a particular
302 | product received by a particular user, "normally used" refers to a
303 | typical or common use of that class of product, regardless of the status
304 | of the particular user or of the way in which the particular user
305 | actually uses, or expects or is expected to use, the product. A product
306 | is a consumer product regardless of whether the product has substantial
307 | commercial, industrial or non-consumer uses, unless such uses represent
308 | the only significant mode of use of the product.
309 |
310 | "Installation Information" for a User Product means any methods,
311 | procedures, authorization keys, or other information required to install
312 | and execute modified versions of a covered work in that User Product from
313 | a modified version of its Corresponding Source. The information must
314 | suffice to ensure that the continued functioning of the modified object
315 | code is in no case prevented or interfered with solely because
316 | modification has been made.
317 |
318 | If you convey an object code work under this section in, or with, or
319 | specifically for use in, a User Product, and the conveying occurs as
320 | part of a transaction in which the right of possession and use of the
321 | User Product is transferred to the recipient in perpetuity or for a
322 | fixed term (regardless of how the transaction is characterized), the
323 | Corresponding Source conveyed under this section must be accompanied
324 | by the Installation Information. But this requirement does not apply
325 | if neither you nor any third party retains the ability to install
326 | modified object code on the User Product (for example, the work has
327 | been installed in ROM).
328 |
329 | The requirement to provide Installation Information does not include a
330 | requirement to continue to provide support service, warranty, or updates
331 | for a work that has been modified or installed by the recipient, or for
332 | the User Product in which it has been modified or installed. Access to a
333 | network may be denied when the modification itself materially and
334 | adversely affects the operation of the network or violates the rules and
335 | protocols for communication across the network.
336 |
337 | Corresponding Source conveyed, and Installation Information provided,
338 | in accord with this section must be in a format that is publicly
339 | documented (and with an implementation available to the public in
340 | source code form), and must require no special password or key for
341 | unpacking, reading or copying.
342 |
343 | 7. Additional Terms.
344 |
345 | "Additional permissions" are terms that supplement the terms of this
346 | License by making exceptions from one or more of its conditions.
347 | Additional permissions that are applicable to the entire Program shall
348 | be treated as though they were included in this License, to the extent
349 | that they are valid under applicable law. If additional permissions
350 | apply only to part of the Program, that part may be used separately
351 | under those permissions, but the entire Program remains governed by
352 | this License without regard to the additional permissions.
353 |
354 | When you convey a copy of a covered work, you may at your option
355 | remove any additional permissions from that copy, or from any part of
356 | it. (Additional permissions may be written to require their own
357 | removal in certain cases when you modify the work.) You may place
358 | additional permissions on material, added by you to a covered work,
359 | for which you have or can give appropriate copyright permission.
360 |
361 | Notwithstanding any other provision of this License, for material you
362 | add to a covered work, you may (if authorized by the copyright holders of
363 | that material) supplement the terms of this License with terms:
364 |
365 | a) Disclaiming warranty or limiting liability differently from the
366 | terms of sections 15 and 16 of this License; or
367 |
368 | b) Requiring preservation of specified reasonable legal notices or
369 | author attributions in that material or in the Appropriate Legal
370 | Notices displayed by works containing it; or
371 |
372 | c) Prohibiting misrepresentation of the origin of that material, or
373 | requiring that modified versions of such material be marked in
374 | reasonable ways as different from the original version; or
375 |
376 | d) Limiting the use for publicity purposes of names of licensors or
377 | authors of the material; or
378 |
379 | e) Declining to grant rights under trademark law for use of some
380 | trade names, trademarks, or service marks; or
381 |
382 | f) Requiring indemnification of licensors and authors of that
383 | material by anyone who conveys the material (or modified versions of
384 | it) with contractual assumptions of liability to the recipient, for
385 | any liability that these contractual assumptions directly impose on
386 | those licensors and authors.
387 |
388 | All other non-permissive additional terms are considered "further
389 | restrictions" within the meaning of section 10. If the Program as you
390 | received it, or any part of it, contains a notice stating that it is
391 | governed by this License along with a term that is a further
392 | restriction, you may remove that term. If a license document contains
393 | a further restriction but permits relicensing or conveying under this
394 | License, you may add to a covered work material governed by the terms
395 | of that license document, provided that the further restriction does
396 | not survive such relicensing or conveying.
397 |
398 | If you add terms to a covered work in accord with this section, you
399 | must place, in the relevant source files, a statement of the
400 | additional terms that apply to those files, or a notice indicating
401 | where to find the applicable terms.
402 |
403 | Additional terms, permissive or non-permissive, may be stated in the
404 | form of a separately written license, or stated as exceptions;
405 | the above requirements apply either way.
406 |
407 | 8. Termination.
408 |
409 | You may not propagate or modify a covered work except as expressly
410 | provided under this License. Any attempt otherwise to propagate or
411 | modify it is void, and will automatically terminate your rights under
412 | this License (including any patent licenses granted under the third
413 | paragraph of section 11).
414 |
415 | However, if you cease all violation of this License, then your
416 | license from a particular copyright holder is reinstated (a)
417 | provisionally, unless and until the copyright holder explicitly and
418 | finally terminates your license, and (b) permanently, if the copyright
419 | holder fails to notify you of the violation by some reasonable means
420 | prior to 60 days after the cessation.
421 |
422 | Moreover, your license from a particular copyright holder is
423 | reinstated permanently if the copyright holder notifies you of the
424 | violation by some reasonable means, this is the first time you have
425 | received notice of violation of this License (for any work) from that
426 | copyright holder, and you cure the violation prior to 30 days after
427 | your receipt of the notice.
428 |
429 | Termination of your rights under this section does not terminate the
430 | licenses of parties who have received copies or rights from you under
431 | this License. If your rights have been terminated and not permanently
432 | reinstated, you do not qualify to receive new licenses for the same
433 | material under section 10.
434 |
435 | 9. Acceptance Not Required for Having Copies.
436 |
437 | You are not required to accept this License in order to receive or
438 | run a copy of the Program. Ancillary propagation of a covered work
439 | occurring solely as a consequence of using peer-to-peer transmission
440 | to receive a copy likewise does not require acceptance. However,
441 | nothing other than this License grants you permission to propagate or
442 | modify any covered work. These actions infringe copyright if you do
443 | not accept this License. Therefore, by modifying or propagating a
444 | covered work, you indicate your acceptance of this License to do so.
445 |
446 | 10. Automatic Licensing of Downstream Recipients.
447 |
448 | Each time you convey a covered work, the recipient automatically
449 | receives a license from the original licensors, to run, modify and
450 | propagate that work, subject to this License. You are not responsible
451 | for enforcing compliance by third parties with this License.
452 |
453 | An "entity transaction" is a transaction transferring control of an
454 | organization, or substantially all assets of one, or subdividing an
455 | organization, or merging organizations. If propagation of a covered
456 | work results from an entity transaction, each party to that
457 | transaction who receives a copy of the work also receives whatever
458 | licenses to the work the party's predecessor in interest had or could
459 | give under the previous paragraph, plus a right to possession of the
460 | Corresponding Source of the work from the predecessor in interest, if
461 | the predecessor has it or can get it with reasonable efforts.
462 |
463 | You may not impose any further restrictions on the exercise of the
464 | rights granted or affirmed under this License. For example, you may
465 | not impose a license fee, royalty, or other charge for exercise of
466 | rights granted under this License, and you may not initiate litigation
467 | (including a cross-claim or counterclaim in a lawsuit) alleging that
468 | any patent claim is infringed by making, using, selling, offering for
469 | sale, or importing the Program or any portion of it.
470 |
471 | 11. Patents.
472 |
473 | A "contributor" is a copyright holder who authorizes use under this
474 | License of the Program or a work on which the Program is based. The
475 | work thus licensed is called the contributor's "contributor version".
476 |
477 | A contributor's "essential patent claims" are all patent claims
478 | owned or controlled by the contributor, whether already acquired or
479 | hereafter acquired, that would be infringed by some manner, permitted
480 | by this License, of making, using, or selling its contributor version,
481 | but do not include claims that would be infringed only as a
482 | consequence of further modification of the contributor version. For
483 | purposes of this definition, "control" includes the right to grant
484 | patent sublicenses in a manner consistent with the requirements of
485 | this License.
486 |
487 | Each contributor grants you a non-exclusive, worldwide, royalty-free
488 | patent license under the contributor's essential patent claims, to
489 | make, use, sell, offer for sale, import and otherwise run, modify and
490 | propagate the contents of its contributor version.
491 |
492 | In the following three paragraphs, a "patent license" is any express
493 | agreement or commitment, however denominated, not to enforce a patent
494 | (such as an express permission to practice a patent or covenant not to
495 | sue for patent infringement). To "grant" such a patent license to a
496 | party means to make such an agreement or commitment not to enforce a
497 | patent against the party.
498 |
499 | If you convey a covered work, knowingly relying on a patent license,
500 | and the Corresponding Source of the work is not available for anyone
501 | to copy, free of charge and under the terms of this License, through a
502 | publicly available network server or other readily accessible means,
503 | then you must either (1) cause the Corresponding Source to be so
504 | available, or (2) arrange to deprive yourself of the benefit of the
505 | patent license for this particular work, or (3) arrange, in a manner
506 | consistent with the requirements of this License, to extend the patent
507 | license to downstream recipients. "Knowingly relying" means you have
508 | actual knowledge that, but for the patent license, your conveying the
509 | covered work in a country, or your recipient's use of the covered work
510 | in a country, would infringe one or more identifiable patents in that
511 | country that you have reason to believe are valid.
512 |
513 | If, pursuant to or in connection with a single transaction or
514 | arrangement, you convey, or propagate by procuring conveyance of, a
515 | covered work, and grant a patent license to some of the parties
516 | receiving the covered work authorizing them to use, propagate, modify
517 | or convey a specific copy of the covered work, then the patent license
518 | you grant is automatically extended to all recipients of the covered
519 | work and works based on it.
520 |
521 | A patent license is "discriminatory" if it does not include within
522 | the scope of its coverage, prohibits the exercise of, or is
523 | conditioned on the non-exercise of one or more of the rights that are
524 | specifically granted under this License. You may not convey a covered
525 | work if you are a party to an arrangement with a third party that is
526 | in the business of distributing software, under which you make payment
527 | to the third party based on the extent of your activity of conveying
528 | the work, and under which the third party grants, to any of the
529 | parties who would receive the covered work from you, a discriminatory
530 | patent license (a) in connection with copies of the covered work
531 | conveyed by you (or copies made from those copies), or (b) primarily
532 | for and in connection with specific products or compilations that
533 | contain the covered work, unless you entered into that arrangement,
534 | or that patent license was granted, prior to 28 March 2007.
535 |
536 | Nothing in this License shall be construed as excluding or limiting
537 | any implied license or other defenses to infringement that may
538 | otherwise be available to you under applicable patent law.
539 |
540 | 12. No Surrender of Others' Freedom.
541 |
542 | If conditions are imposed on you (whether by court order, agreement or
543 | otherwise) that contradict the conditions of this License, they do not
544 | excuse you from the conditions of this License. If you cannot convey a
545 | covered work so as to satisfy simultaneously your obligations under this
546 | License and any other pertinent obligations, then as a consequence you may
547 | not convey it at all. For example, if you agree to terms that obligate you
548 | to collect a royalty for further conveying from those to whom you convey
549 | the Program, the only way you could satisfy both those terms and this
550 | License would be to refrain entirely from conveying the Program.
551 |
552 | 13. Use with the GNU Affero General Public License.
553 |
554 | Notwithstanding any other provision of this License, you have
555 | permission to link or combine any covered work with a work licensed
556 | under version 3 of the GNU Affero General Public License into a single
557 | combined work, and to convey the resulting work. The terms of this
558 | License will continue to apply to the part which is the covered work,
559 | but the special requirements of the GNU Affero General Public License,
560 | section 13, concerning interaction through a network will apply to the
561 | combination as such.
562 |
563 | 14. Revised Versions of this License.
564 |
565 | The Free Software Foundation may publish revised and/or new versions of
566 | the GNU General Public License from time to time. Such new versions will
567 | be similar in spirit to the present version, but may differ in detail to
568 | address new problems or concerns.
569 |
570 | Each version is given a distinguishing version number. If the
571 | Program specifies that a certain numbered version of the GNU General
572 | Public License "or any later version" applies to it, you have the
573 | option of following the terms and conditions either of that numbered
574 | version or of any later version published by the Free Software
575 | Foundation. If the Program does not specify a version number of the
576 | GNU General Public License, you may choose any version ever published
577 | by the Free Software Foundation.
578 |
579 | If the Program specifies that a proxy can decide which future
580 | versions of the GNU General Public License can be used, that proxy's
581 | public statement of acceptance of a version permanently authorizes you
582 | to choose that version for the Program.
583 |
584 | Later license versions may give you additional or different
585 | permissions. However, no additional obligations are imposed on any
586 | author or copyright holder as a result of your choosing to follow a
587 | later version.
588 |
589 | 15. Disclaimer of Warranty.
590 |
591 | THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY
592 | APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT
593 | HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY
594 | OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO,
595 | THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
596 | PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM
597 | IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF
598 | ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
599 |
600 | 16. Limitation of Liability.
601 |
602 | IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
603 | WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS
604 | THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY
605 | GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE
606 | USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF
607 | DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD
608 | PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS),
609 | EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF
610 | SUCH DAMAGES.
611 |
612 | 17. Interpretation of Sections 15 and 16.
613 |
614 | If the disclaimer of warranty and limitation of liability provided
615 | above cannot be given local legal effect according to their terms,
616 | reviewing courts shall apply local law that most closely approximates
617 | an absolute waiver of all civil liability in connection with the
618 | Program, unless a warranty or assumption of liability accompanies a
619 | copy of the Program in return for a fee.
620 |
621 | END OF TERMS AND CONDITIONS
622 |
623 | How to Apply These Terms to Your New Programs
624 |
625 | If you develop a new program, and you want it to be of the greatest
626 | possible use to the public, the best way to achieve this is to make it
627 | free software which everyone can redistribute and change under these terms.
628 |
629 | To do so, attach the following notices to the program. It is safest
630 | to attach them to the start of each source file to most effectively
631 | state the exclusion of warranty; and each file should have at least
632 | the "copyright" line and a pointer to where the full notice is found.
633 |
634 |
635 | Copyright (C)
636 |
637 | This program is free software: you can redistribute it and/or modify
638 | it under the terms of the GNU General Public License as published by
639 | the Free Software Foundation, either version 3 of the License, or
640 | (at your option) any later version.
641 |
642 | This program is distributed in the hope that it will be useful,
643 | but WITHOUT ANY WARRANTY; without even the implied warranty of
644 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
645 | GNU General Public License for more details.
646 |
647 | You should have received a copy of the GNU General Public License
648 | along with this program. If not, see .
649 |
650 | Also add information on how to contact you by electronic and paper mail.
651 |
652 | If the program does terminal interaction, make it output a short
653 | notice like this when it starts in an interactive mode:
654 |
655 | Copyright (C)
656 | This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'.
657 | This is free software, and you are welcome to redistribute it
658 | under certain conditions; type `show c' for details.
659 |
660 | The hypothetical commands `show w' and `show c' should show the appropriate
661 | parts of the General Public License. Of course, your program's commands
662 | might be different; for a GUI interface, you would use an "about box".
663 |
664 | You should also get your employer (if you work as a programmer) or school,
665 | if any, to sign a "copyright disclaimer" for the program, if necessary.
666 | For more information on this, and how to apply and follow the GNU GPL, see
667 | .
668 |
669 | The GNU General Public License does not permit incorporating your program
670 | into proprietary programs. If your program is a subroutine library, you
671 | may consider it more useful to permit linking proprietary applications with
672 | the library. If this is what you want to do, use the GNU Lesser General
673 | Public License instead of this License. But first, please read
674 | .
675 |
--------------------------------------------------------------------------------
/README.md:
--------------------------------------------------------------------------------
1 | # evil-fringe-mark.el
2 |
3 | ## Introduction
4 |
5 | `evil-fringe-mark.el` is a GNU Emacs minor mode that displays `evil-mode` marks in the fringes of active buffers. It may be enabled globally or on a per-buffer basis as required.
6 |
7 | ## Screenshots
8 |
9 | 
10 |
11 | 
12 |
13 | ## Requirements
14 |
15 | * Emacs 25 or higher (21.0 or higher with [cl-lib](http://elpa.gnu.org/packages/cl-lib.html))
16 | * [evil-mode](https://github.com/emacs-evil/evil) (of course)
17 | * [fringe-helper.el](https://github.com/nschum/fringe-helper.el)
18 | * [goto-chg](https://github.com/emacs-evil/goto-chg)
19 |
20 | ## Installation
21 |
22 | `evil-fringe-mark` may be installed from [MELPA](https://github.com/milkypostman/melpa.git) with `package.el` (`M-x package-install evil-fringe-mark`). You may also install the package manually by placing both `evil-fringe-mark.el` and `evil-fringe-mark-overlays.el` in your `load-path` and adding the following lines in your Emacs configuration:
23 |
24 | ```
25 | (require 'evil-fringe-mark)
26 | (global-evil-fringe-mark-mode)
27 | ```
28 |
29 | ## Customisation
30 |
31 | ### Enable for only one buffer
32 |
33 | To enable or disable `evil-fringe-mark` for an individual buffer, type `M-x evil-fringe-mark-mode`. While the global mode is enabled, this command will have no effect.
34 |
35 | ### Switch display fringe
36 |
37 | To switch the fringe in which mark overlays are displayed (`left-fringe` by default), include a variation of the following in your Emacs configuration:
38 |
39 | ```
40 | ;; Use left fringe
41 | (setq-default left-fringe-width 16)
42 | (setq-default evil-fringe-mark-side 'left-fringe)
43 |
44 | ;; Use right fringe
45 | (setq-default right-fringe-width 16)
46 | (setq-default evil-fringe-mark-side 'right-fringe)
47 | ```
48 |
49 | Regardless of in which fringe you choose to display marks, it is recommended that you increase the width of that fringe to fully display wide characters.
50 |
51 | ### Switch display margin
52 |
53 | As non-graphical Emacs sessions do not support fringe display, `evil-fringe-mark` displays marks in the margin instead in such environments. To switch the margin in which marks are displayed (`left-margin` by default), include a variation of the following in your Emacs configuration:
54 |
55 | ```
56 | ;; Use left margin
57 | (setq-default left-margin-width 2)
58 | (setq-default evil-fringe-mark-margin 'left-margin)
59 |
60 | ;; Use right margin
61 | (setq-default right-margin-width 2)
62 | (setq-default evil-fringe-mark-margin 'right-margin)
63 | ```
64 |
65 | Regardless of in which margin you choose to display marks, you must set a `*-margin-width` variable to a value greater than `0` for marks to appear. Furthermore, setting one of these variables to a value greater than `1` will allow for multiple marks to be displayed per line if `evil-fringe-mark-always-overwrite` is set to `nil`.
66 |
67 | ### Display only the most recently-placed mark on each line
68 |
69 | To display only the most recently-placed mark on each line, set `evil-fringe-mark-always-overwrite` to a non-`nil` value (`t` by default). It is recommended that this variable not be set to `nil` in graphical Emacs sessions, as doing so could result in unintuitive behaviour. In non-graphical sessions, setting it to `nil` will allow multiple marks to be displayed in the margin for each line, provided that a `*-margin-width` variable is set to a value greater than `1`; multiple mark display is not supported in the graphical fringe.
70 |
71 | ### Display special marks
72 |
73 | By default, `evil-fringe-mark` does not display automatically-placed special marks in the fringe. To display these marks, set `evil-fringe-mark-show-special` to a non-`nil` value in your Emacs configuration:
74 |
75 | ```
76 | ;; Display special marks
77 | (setq-default evil-fringe-mark-show-special t)
78 |
79 | ;; Hide special marks (default)
80 | (setq-default evil-fringe-mark-show-special nil)
81 | ```
82 |
83 | The following special marks are supported:
84 |
85 | | Mark | Location |
86 | |------|------------------------------------|
87 | | `<` | Beginning of last visual selection |
88 | | `>` | End of last visual selection |
89 | | `[` | Beginning of last pasted segment |
90 | | `]` | End of last pasted segment |
91 | | `^` | End of last insertion |
92 | | `{` | Beginning of current paragraph |
93 | | `}` | End of current paragraph |
94 |
95 | ### Hide marks for a certain character
96 |
97 | To prevent fringe bitmaps from being displayed for certain characters, add the characters to the list `evil-fringe-mark-ignore-chars`:
98 |
99 | ```
100 | ;; Hide paragraph special marks and the letter A
101 | (push ?{ evil-fringe-mark-ignore-chars)
102 | (push ?} evil-fringe-mark-ignore-chars)
103 | (push ?a evil-fringe-mark-ignore-chars)
104 | (push ?A evil-fringe-mark-ignore-chars)
105 | ```
106 |
107 | ### Customise fringe bitmap styles
108 |
109 | The styles with which fringe bitmaps are displayed are controlled via variables of the form *evil-fringe-mark-{mark type}-face*, and may be customised by changing the following:
110 |
111 | | Face | Mark type | Default |
112 | |---------------------------------|--------------------------|--------------------------|
113 | | `evil-fringe-mark-local-face` | Buffer-local marks | `font-lock-keyword-face` |
114 | | `evil-fringe-mark-file-face` | File (capitalised) marks | `font-lock-type-face` |
115 | | `evil-fringe-mark-special-face` | Special marks | `fringe` |
116 |
117 | ### Customise character bitmaps
118 |
119 | To change the bitmap used to display marks for a particular character or define a new character bitmap, use `fringe-helper-define`:
120 |
121 | ```
122 | ;; Change the form of uppercase "A"
123 | (fringe-helper-define 'evil-fringe-mark-upper-a '(center)
124 | "...XX..."
125 | "..XXXX.."
126 | ".XXXXXX."
127 | "XXX..XXX"
128 | "XX....XX"
129 | "XX....XX"
130 | "XX....XX"
131 | "XX....XX"
132 | "XX....XX"
133 | "XXXXXXXX"
134 | "XXXXXXXX"
135 | "XX....XX"
136 | "XX....XX"
137 | "XX....XX"
138 | "XX....XX"
139 | "XX....XX"
140 | "XX....XX"
141 | "XX....XX")
142 | ```
143 |
144 | Note that I am not a typographer; if you believe that you have made a significant improvement to one of the default character bitmaps, feel free to submit a pull request.
145 |
--------------------------------------------------------------------------------
/evil-fringe-mark-overlays.el:
--------------------------------------------------------------------------------
1 | ;;; evil-fringe-mark-overlays.el --- Character overlays for evil-fringe-mark
2 | ;; This file is not part of GNU Emacs.
3 |
4 | ;; Copyright (C) 2019 Andrew Smith
5 |
6 | ;; Author: Andrew Smith
7 | ;; URL: https://github.com/Andrew-William-Smith/evil-fringe-mark
8 | ;; Version: 1.2.1
9 | ;; Package-Requires: ((emacs "24.3") (evil "1.0.0") (fringe-helper "0.1.1") (goto-chg "1.6"))
10 |
11 | ;; This file is part of evil-fringe-mark.
12 |
13 | ;; This program is free software; you can redistribute it and/or modify
14 | ;; it under the terms of the GNU General Public License as published by
15 | ;; the Free Software Foundation, either version 3 of the License, or
16 | ;; (at your option) any later version.
17 |
18 | ;; This program is distributed in the hope that it will be useful,
19 | ;; but WITHOUT ANY WARRANTY; without even the implied warranty of
20 | ;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
21 | ;; GNU General Public License for more details.
22 |
23 | ;; You should have received a copy of the GNU General Public License
24 | ;; along with this program. If not, see .
25 |
26 |
27 | ;;; Code:
28 | (require 'fringe-helper)
29 | (fringe-helper-define 'evil-fringe-mark-upper-a '(center)
30 | "...XX..."
31 | "..XXXX.."
32 | ".XXXXXX."
33 | "XXX..XXX"
34 | "XX....XX"
35 | "XX....XX"
36 | "XX....XX"
37 | "XX....XX"
38 | "XX....XX"
39 | "XXXXXXXX"
40 | "XXXXXXXX"
41 | "XX....XX"
42 | "XX....XX"
43 | "XX....XX"
44 | "XX....XX"
45 | "XX....XX"
46 | "XX....XX"
47 | "XX....XX")
48 |
49 | (fringe-helper-define 'evil-fringe-mark-upper-b '(center)
50 | "XXXXXXX."
51 | "XXXXXXXX"
52 | ".XX...XX"
53 | ".XX...XX"
54 | ".XX...XX"
55 | ".XX...XX"
56 | ".XX...XX"
57 | ".XX...XX"
58 | ".XXXXXX."
59 | ".XXXXXX."
60 | ".XX...XX"
61 | ".XX...XX"
62 | ".XX...XX"
63 | ".XX...XX"
64 | ".XX...XX"
65 | ".XX...XX"
66 | "XXXXXXXX"
67 | "XXXXXXX.")
68 |
69 | (fringe-helper-define 'evil-fringe-mark-upper-c '(center)
70 | "..XXXXX."
71 | ".XXXXXXX"
72 | "XXX...XX"
73 | "XX.....X"
74 | "XX......"
75 | "XX......"
76 | "XX......"
77 | "XX......"
78 | "XX......"
79 | "XX......"
80 | "XX......"
81 | "XX......"
82 | "XX......"
83 | "XX......"
84 | "XX.....X"
85 | "XXX...XX"
86 | ".XXXXXXX"
87 | "..XXXXX.")
88 |
89 | (fringe-helper-define 'evil-fringe-mark-upper-d '(center)
90 | "XXXXXX.."
91 | "XXXXXXX."
92 | ".XX..XXX"
93 | ".XX...XX"
94 | ".XX...XX"
95 | ".XX...XX"
96 | ".XX...XX"
97 | ".XX...XX"
98 | ".XX...XX"
99 | ".XX...XX"
100 | ".XX...XX"
101 | ".XX...XX"
102 | ".XX...XX"
103 | ".XX...XX"
104 | ".XX...XX"
105 | ".XX..XXX"
106 | "XXXXXXX."
107 | "XXXXXX..")
108 |
109 | (fringe-helper-define 'evil-fringe-mark-upper-e '(center)
110 | "XXXXXXXX"
111 | "XXXXXXXX"
112 | ".XX...XX"
113 | ".XX....X"
114 | ".XX....."
115 | ".XX....."
116 | ".XX....."
117 | ".XX..X.."
118 | ".XXXXX.."
119 | ".XXXXX.."
120 | ".XX..X.."
121 | ".XX....."
122 | ".XX....."
123 | ".XX....."
124 | ".XX....X"
125 | ".XX...XX"
126 | "XXXXXXXX"
127 | "XXXXXXXX")
128 |
129 | (fringe-helper-define 'evil-fringe-mark-upper-f '(center)
130 | "XXXXXXXX"
131 | "XXXXXXXX"
132 | ".XX...XX"
133 | ".XX....X"
134 | ".XX....."
135 | ".XX....."
136 | ".XX....."
137 | ".XX..X.."
138 | ".XXXXX.."
139 | ".XXXXX.."
140 | ".XX..X.."
141 | ".XX....."
142 | ".XX....."
143 | ".XX....."
144 | ".XX....."
145 | ".XX....."
146 | "XXXX...."
147 | "XXXX....")
148 |
149 | (fringe-helper-define 'evil-fringe-mark-upper-g '(center)
150 | "..XXXXX."
151 | ".XXXXXXX"
152 | "XXX...XX"
153 | "XX.....X"
154 | "XX......"
155 | "XX......"
156 | "XX......"
157 | "XX......"
158 | "XX......"
159 | "XX..XXXX"
160 | "XX..XXXX"
161 | "XX....XX"
162 | "XX....XX"
163 | "XX....XX"
164 | "XX....XX"
165 | "XXX...XX"
166 | ".XXXXXXX"
167 | "..XXX.XX")
168 |
169 | (fringe-helper-define 'evil-fringe-mark-upper-h '(center)
170 | "XX....XX"
171 | "XX....XX"
172 | "XX....XX"
173 | "XX....XX"
174 | "XX....XX"
175 | "XX....XX"
176 | "XX....XX"
177 | "XX....XX"
178 | "XXXXXXXX"
179 | "XXXXXXXX"
180 | "XX....XX"
181 | "XX....XX"
182 | "XX....XX"
183 | "XX....XX"
184 | "XX....XX"
185 | "XX....XX"
186 | "XX....XX"
187 | "XX....XX")
188 |
189 | (fringe-helper-define 'evil-fringe-mark-upper-i '(center)
190 | "XXXXXXXX"
191 | "XXXXXXXX"
192 | "...XX..."
193 | "...XX..."
194 | "...XX..."
195 | "...XX..."
196 | "...XX..."
197 | "...XX..."
198 | "...XX..."
199 | "...XX..."
200 | "...XX..."
201 | "...XX..."
202 | "...XX..."
203 | "...XX..."
204 | "...XX..."
205 | "...XX..."
206 | "XXXXXXXX"
207 | "XXXXXXXX")
208 |
209 | (fringe-helper-define 'evil-fringe-mark-upper-j '(center)
210 | "..XXXXXX"
211 | "..XXXXXX"
212 | "....XX.."
213 | "....XX.."
214 | "....XX.."
215 | "....XX.."
216 | "....XX.."
217 | "....XX.."
218 | "....XX.."
219 | "....XX.."
220 | "....XX.."
221 | "....XX.."
222 | "....XX.."
223 | "....XX.."
224 | "X...XX.."
225 | "XX..XX.."
226 | "XXXXX..."
227 | ".XXX....")
228 |
229 | (fringe-helper-define 'evil-fringe-mark-upper-k '(center)
230 | "XX....XX"
231 | "XX....XX"
232 | "XX...XX."
233 | "XX...XX."
234 | "XX..XX.."
235 | "XX..XX.."
236 | "XX.XX..."
237 | "XX.XX..."
238 | "XXXX...."
239 | "XXXX...."
240 | "XX.XX..."
241 | "XX.XX..."
242 | "XX..XX.."
243 | "XX..XX.."
244 | "XX...XX."
245 | "XX...XX."
246 | "XX....XX"
247 | "XX....XX")
248 |
249 | (fringe-helper-define 'evil-fringe-mark-upper-l '(center)
250 | "XXXX...."
251 | "XXXX...."
252 | ".XX....."
253 | ".XX....."
254 | ".XX....."
255 | ".XX....."
256 | ".XX....."
257 | ".XX....."
258 | ".XX....."
259 | ".XX....."
260 | ".XX....."
261 | ".XX....."
262 | ".XX....."
263 | ".XX....."
264 | ".XX....X"
265 | ".XX...XX"
266 | "XXXXXXXX"
267 | "XXXXXXXX")
268 |
269 | (fringe-helper-define 'evil-fringe-mark-upper-m '(center)
270 | "XX....XX"
271 | "XX....XX"
272 | "XXX..XXX"
273 | "XXX..XXX"
274 | "XXX..XXX"
275 | "XXXXXXXX"
276 | "XXXXXXXX"
277 | "XXXXXXXX"
278 | "XX.XX.XX"
279 | "XX.XX.XX"
280 | "XX.XX.XX"
281 | "XX....XX"
282 | "XX....XX"
283 | "XX....XX"
284 | "XX....XX"
285 | "XX....XX"
286 | "XX....XX"
287 | "XX....XX")
288 |
289 | (fringe-helper-define 'evil-fringe-mark-upper-n '(center)
290 | "XX....XX"
291 | "XX....XX"
292 | "XX....XX"
293 | "XXX...XX"
294 | "XXX...XX"
295 | "XXXX..XX"
296 | "XXXX..XX"
297 | "XXXX..XX"
298 | "XX.XX.XX"
299 | "XX.XX.XX"
300 | "XX..XXXX"
301 | "XX..XXXX"
302 | "XX..XXXX"
303 | "XX...XXX"
304 | "XX...XXX"
305 | "XX....XX"
306 | "XX....XX"
307 | "XX....XX")
308 |
309 | (fringe-helper-define 'evil-fringe-mark-upper-o '(center)
310 | "..XXXX.."
311 | ".XXXXXX."
312 | "XXX..XXX"
313 | "XX....XX"
314 | "XX....XX"
315 | "XX....XX"
316 | "XX....XX"
317 | "XX....XX"
318 | "XX....XX"
319 | "XX....XX"
320 | "XX....XX"
321 | "XX....XX"
322 | "XX....XX"
323 | "XX....XX"
324 | "XX....XX"
325 | "XXX..XXX"
326 | ".XXXXXX."
327 | "..XXXX..")
328 |
329 | (fringe-helper-define 'evil-fringe-mark-upper-p '(center)
330 | "XXXXX..."
331 | "XXXXXX.."
332 | ".XX..XX."
333 | ".XX...XX"
334 | ".XX...XX"
335 | ".XX...XX"
336 | ".XX...XX"
337 | ".XX..XX."
338 | ".XXXXX.."
339 | ".XXXX..."
340 | ".XX....."
341 | ".XX....."
342 | ".XX....."
343 | ".XX....."
344 | ".XX....."
345 | ".XX....."
346 | "XXXX...."
347 | "XXXX....")
348 |
349 | (fringe-helper-define 'evil-fringe-mark-upper-q '(center)
350 | "..XXXX.."
351 | ".XXXXXX."
352 | "XXX..XXX"
353 | "XX....XX"
354 | "XX....XX"
355 | "XX....XX"
356 | "XX....XX"
357 | "XX....XX"
358 | "XX....XX"
359 | "XX....XX"
360 | "XX....XX"
361 | "XX.XX.XX"
362 | "XX.XX.XX"
363 | "XXXXXXXX"
364 | ".XXXXXX."
365 | "..XXXXX."
366 | ".....XXX"
367 | "......XX")
368 |
369 | (fringe-helper-define 'evil-fringe-mark-upper-r '(center)
370 | "XXXXX..."
371 | "XXXXXX.."
372 | ".XX..XX."
373 | ".XX...XX"
374 | ".XX...XX"
375 | ".XX...XX"
376 | ".XX...XX"
377 | ".XX..XX."
378 | ".XXXXX.."
379 | ".XXXX..."
380 | ".XXXX..."
381 | ".XX.XX.."
382 | ".XX.XX.."
383 | ".XX..XX."
384 | ".XX..XX."
385 | ".XX...XX"
386 | "XXXX..XX"
387 | "XXXX..XX")
388 |
389 | (fringe-helper-define 'evil-fringe-mark-upper-s '(center)
390 | "..XXXX.."
391 | ".XXXXXX."
392 | "XX....XX"
393 | "XX.....X"
394 | "XX......"
395 | "XX......"
396 | "XXX....."
397 | ".XXX...."
398 | "..XXX..."
399 | "...XXX.."
400 | "....XXX."
401 | ".....XXX"
402 | "......XX"
403 | "......XX"
404 | "X.....XX"
405 | "XX....XX"
406 | ".XXXXXX."
407 | "..XXXX..")
408 |
409 | (fringe-helper-define 'evil-fringe-mark-upper-t '(center)
410 | "XXXXXXXX"
411 | "XXXXXXXX"
412 | "XX.XX.XX"
413 | "X..XX..X"
414 | "...XX..."
415 | "...XX..."
416 | "...XX..."
417 | "...XX..."
418 | "...XX..."
419 | "...XX..."
420 | "...XX..."
421 | "...XX..."
422 | "...XX..."
423 | "...XX..."
424 | "...XX..."
425 | "...XX..."
426 | "..XXXX.."
427 | "..XXXX..")
428 |
429 | (fringe-helper-define 'evil-fringe-mark-upper-u '(center)
430 | "XX....XX"
431 | "XX....XX"
432 | "XX....XX"
433 | "XX....XX"
434 | "XX....XX"
435 | "XX....XX"
436 | "XX....XX"
437 | "XX....XX"
438 | "XX....XX"
439 | "XX....XX"
440 | "XX....XX"
441 | "XX....XX"
442 | "XX....XX"
443 | "XX....XX"
444 | "XX....XX"
445 | "XXX..XXX"
446 | "XXXXXXXX"
447 | ".XXXXXX.")
448 |
449 | (fringe-helper-define 'evil-fringe-mark-upper-v '(center)
450 | "XX....XX"
451 | "XX....XX"
452 | "XX....XX"
453 | "XX....XX"
454 | "XX....XX"
455 | "XX....XX"
456 | "XX....XX"
457 | "XX....XX"
458 | "XX....XX"
459 | "XX....XX"
460 | "XX....XX"
461 | "XX....XX"
462 | "XXX..XXX"
463 | ".XX..XX."
464 | ".XX..XX."
465 | "..XXXX.."
466 | "..XXXX.."
467 | "...XX...")
468 |
469 | (fringe-helper-define 'evil-fringe-mark-upper-w '(center)
470 | "XX....XX"
471 | "XX....XX"
472 | "XX....XX"
473 | "XX....XX"
474 | "XX....XX"
475 | "XX....XX"
476 | "XX....XX"
477 | "XX....XX"
478 | "XX.XX.XX"
479 | "XX.XX.XX"
480 | "XX.XX.XX"
481 | "XX.XX.XX"
482 | "XX.XX.XX"
483 | "XX.XX.XX"
484 | "XXXXXXXX"
485 | ".XXXXXX."
486 | ".XX..XX."
487 | "..X..X..")
488 |
489 | (fringe-helper-define 'evil-fringe-mark-upper-x '(center)
490 | "XX....XX"
491 | "XX....XX"
492 | "XX....XX"
493 | ".XX..XX."
494 | ".XX..XX."
495 | ".XX..XX."
496 | "..XXXX.."
497 | "..XXXX.."
498 | "...XX..."
499 | "...XX..."
500 | "..XXXX.."
501 | "..XXXX.."
502 | ".XX..XX."
503 | ".XX..XX."
504 | ".XX..XX."
505 | "XX....XX"
506 | "XX....XX"
507 | "XX....XX")
508 |
509 | (fringe-helper-define 'evil-fringe-mark-upper-y '(center)
510 | "XX....XX"
511 | "XX....XX"
512 | "XX....XX"
513 | "XX....XX"
514 | "XXX..XXX"
515 | ".XX..XX."
516 | ".XX..XX."
517 | "..XXXX.."
518 | "..XXXX.."
519 | "...XX..."
520 | "...XX..."
521 | "...XX..."
522 | "...XX..."
523 | "...XX..."
524 | "...XX..."
525 | "...XX..."
526 | "..XXXX.."
527 | "..XXXX..")
528 |
529 | (fringe-helper-define 'evil-fringe-mark-upper-z '(center)
530 | "XXXXXXXX"
531 | "XXXXXXXX"
532 | "XX....XX"
533 | "X.....XX"
534 | ".....XXX"
535 | ".....XX."
536 | "....XXX."
537 | "....XX.."
538 | "...XXX.."
539 | "...XX..."
540 | "..XXX..."
541 | "..XX...."
542 | ".XXX...."
543 | ".XX....."
544 | "XXX....X"
545 | "XX....XX"
546 | "XXXXXXXX"
547 | "XXXXXXXX")
548 |
549 | (fringe-helper-define 'evil-fringe-mark-lower-a '(center)
550 | "........"
551 | "........"
552 | "........"
553 | "........"
554 | "........"
555 | "........"
556 | ".XXXXX.."
557 | "XXXXXXX."
558 | "XX...XX."
559 | "X....XX."
560 | ".....XX."
561 | ".XXXXXX."
562 | "XXXXXXX."
563 | "XX...XX."
564 | "XX...XX."
565 | "XX...XX."
566 | "XXXXXXXX"
567 | ".XXXX.XX")
568 |
569 | (fringe-helper-define 'evil-fringe-mark-lower-b '(center)
570 | "XXX....."
571 | "XXX....."
572 | ".XX....."
573 | ".XX....."
574 | ".XX....."
575 | ".XX....."
576 | ".XXXXX.."
577 | ".XXXXXX."
578 | ".XX..XXX"
579 | ".XX...XX"
580 | ".XX...XX"
581 | ".XX...XX"
582 | ".XX...XX"
583 | ".XX...XX"
584 | ".XX...XX"
585 | ".XX..XXX"
586 | "XXXXXXX."
587 | "XX.XXX..")
588 |
589 | (fringe-helper-define 'evil-fringe-mark-lower-c '(center)
590 | "........"
591 | "........"
592 | "........"
593 | "........"
594 | "........"
595 | "........"
596 | "..XXXXX."
597 | ".XXXXXXX"
598 | "XXX...XX"
599 | "XX.....X"
600 | "XX......"
601 | "XX......"
602 | "XX......"
603 | "XX......"
604 | "XX.....X"
605 | "XXX...XX"
606 | ".XXXXXXX"
607 | "..XXXXX.")
608 |
609 | (fringe-helper-define 'evil-fringe-mark-lower-d '(center)
610 | ".....XXX"
611 | ".....XXX"
612 | ".....XX."
613 | ".....XX."
614 | ".....XX."
615 | ".....XX."
616 | "..XXXXX."
617 | ".XXXXXX."
618 | "XXX..XX."
619 | "XX...XX."
620 | "XX...XX."
621 | "XX...XX."
622 | "XX...XX."
623 | "XX...XX."
624 | "XX...XX."
625 | "XXX..XX."
626 | ".XXXXXXX"
627 | "..XXX.XX")
628 |
629 | (fringe-helper-define 'evil-fringe-mark-lower-e '(center)
630 | "........"
631 | "........"
632 | "........"
633 | "........"
634 | "........"
635 | "........"
636 | "..XXXXX."
637 | ".XXXXXXX"
638 | "XXX...XX"
639 | "XX....XX"
640 | "XX....XX"
641 | "XXXXXXXX"
642 | "XXXXXXXX"
643 | "XX......"
644 | "XX......"
645 | "XXX...XX"
646 | ".XXXXXXX"
647 | "..XXXXX.")
648 |
649 | (fringe-helper-define 'evil-fringe-mark-lower-f '(center)
650 | "..XXXXX."
651 | ".XXXXXXX"
652 | ".XXX..XX"
653 | ".XX....X"
654 | ".XX....."
655 | ".XX....."
656 | ".XX....."
657 | "XXXXXX.."
658 | "XXXXXX.."
659 | ".XX....."
660 | ".XX....."
661 | ".XX....."
662 | ".XX....."
663 | ".XX....."
664 | ".XX....."
665 | ".XX....."
666 | "XXXX...."
667 | "XXXX....")
668 |
669 | (fringe-helper-define 'evil-fringe-mark-lower-g '(center)
670 | "........"
671 | "........"
672 | "........"
673 | "..XXX.XX"
674 | ".XXXXXXX"
675 | "XXX..XX."
676 | "XX...XX."
677 | "XX...XX."
678 | "XX...XX."
679 | "XX...XX."
680 | "XXX..XX."
681 | ".XXXXXX."
682 | "..XXXXX."
683 | ".....XX."
684 | "XX...XX."
685 | "XXX..XX."
686 | ".XXXXXX."
687 | "..XXXX..")
688 |
689 | (fringe-helper-define 'evil-fringe-mark-lower-h '(center)
690 | "XXX....."
691 | "XXX....."
692 | ".XX....."
693 | ".XX....."
694 | ".XX....."
695 | ".XX....."
696 | ".XX.XX.."
697 | ".XXXXXX."
698 | ".XXXXXXX"
699 | ".XX...XX"
700 | ".XX...XX"
701 | ".XX...XX"
702 | ".XX...XX"
703 | ".XX...XX"
704 | ".XX...XX"
705 | ".XX...XX"
706 | "XXX...XX"
707 | "XXX...XX")
708 |
709 | (fringe-helper-define 'evil-fringe-mark-lower-i '(center)
710 | "........"
711 | "...XX..."
712 | "..XXXX.."
713 | "...XX..."
714 | "........"
715 | "........"
716 | ".XXXX..."
717 | ".XXXX..."
718 | "...XX..."
719 | "...XX..."
720 | "...XX..."
721 | "...XX..."
722 | "...XX..."
723 | "...XX..."
724 | "...XX..."
725 | "...XX..."
726 | ".XXXXXX."
727 | ".XXXXXX.")
728 |
729 | (fringe-helper-define 'evil-fringe-mark-lower-j '(center)
730 | "....XX.."
731 | "...XXXX."
732 | "....XX.."
733 | "........"
734 | "........"
735 | "..XXXX.."
736 | "..XXXX.."
737 | "....XX.."
738 | "....XX.."
739 | "....XX.."
740 | "....XX.."
741 | "....XX.."
742 | "....XX.."
743 | "....XX.."
744 | "X...XX.."
745 | "XX.XXX.."
746 | "XXXXX..."
747 | ".XXX....")
748 |
749 | (fringe-helper-define 'evil-fringe-mark-lower-k '(center)
750 | "XXX....."
751 | "XXX....."
752 | ".XX....."
753 | ".XX....."
754 | ".XX....."
755 | ".XX....."
756 | ".XX...XX"
757 | ".XX..XX."
758 | ".XX.XX.."
759 | ".XXXX..."
760 | ".XXX...."
761 | ".XXXX..."
762 | ".XX.XX.."
763 | ".XX.XX.."
764 | ".XX..XX."
765 | ".XX..XX."
766 | "XXX...XX"
767 | "XXX...XX")
768 |
769 | (fringe-helper-define 'evil-fringe-mark-lower-l '(center)
770 | ".XXXX..."
771 | ".XXXX..."
772 | "...XX..."
773 | "...XX..."
774 | "...XX..."
775 | "...XX..."
776 | "...XX..."
777 | "...XX..."
778 | "...XX..."
779 | "...XX..."
780 | "...XX..."
781 | "...XX..."
782 | "...XX..."
783 | "...XX..."
784 | "...XX..."
785 | "...XX..."
786 | ".XXXXXX."
787 | ".XXXXXX.")
788 |
789 | (fringe-helper-define 'evil-fringe-mark-lower-m '(center)
790 | "........"
791 | "........"
792 | "........"
793 | "........"
794 | "........"
795 | "........"
796 | "XXX..XX."
797 | "XXXXXXXX"
798 | "XXXXXXXX"
799 | "XX.XX.XX"
800 | "XX.XX.XX"
801 | "XX.XX.XX"
802 | "XX.XX.XX"
803 | "XX.XX.XX"
804 | "XX.XX.XX"
805 | "XX.XX.XX"
806 | "XX.XX.XX"
807 | "XX.XX.XX")
808 |
809 | (fringe-helper-define 'evil-fringe-mark-lower-n '(center)
810 | "........"
811 | "........"
812 | "........"
813 | "........"
814 | "........"
815 | "........"
816 | "XXX.XXX."
817 | "XXXXXXXX"
818 | ".XXX.XXX"
819 | ".XX...XX"
820 | ".XX...XX"
821 | ".XX...XX"
822 | ".XX...XX"
823 | ".XX...XX"
824 | ".XX...XX"
825 | ".XX...XX"
826 | "XXX...XX"
827 | "XXX...XX")
828 |
829 | (fringe-helper-define 'evil-fringe-mark-lower-o '(center)
830 | "........"
831 | "........"
832 | "........"
833 | "........"
834 | "........"
835 | "........"
836 | "..XXXX.."
837 | ".XXXXXX."
838 | "XXX..XXX"
839 | "XX....XX"
840 | "XX....XX"
841 | "XX....XX"
842 | "XX....XX"
843 | "XX....XX"
844 | "XX....XX"
845 | "XXX..XXX"
846 | ".XXXXXX."
847 | "..XXXX..")
848 |
849 | (fringe-helper-define 'evil-fringe-mark-lower-p '(center)
850 | "........"
851 | "........"
852 | "........"
853 | "XX.XXX.."
854 | "XXXXXXX."
855 | ".XX..XXX"
856 | ".XX...XX"
857 | ".XX...XX"
858 | ".XX...XX"
859 | ".XX...XX"
860 | ".XX..XXX"
861 | ".XXXXXX."
862 | ".XXXXX.."
863 | ".XX....."
864 | ".XX....."
865 | ".XX....."
866 | "XXX....."
867 | "XXX.....")
868 |
869 | (fringe-helper-define 'evil-fringe-mark-lower-q '(center)
870 | "........"
871 | "........"
872 | "........"
873 | "..XXX.XX"
874 | ".XXXXXXX"
875 | "XXX..XX."
876 | "XX...XX."
877 | "XX...XX."
878 | "XX...XX."
879 | "XX...XX."
880 | "XXX..XX."
881 | ".XXXXXX."
882 | "..XXXXX."
883 | ".....XX."
884 | ".....XX."
885 | ".....XX."
886 | ".....XXX"
887 | ".....XXX")
888 |
889 | (fringe-helper-define 'evil-fringe-mark-lower-r '(center)
890 | "........"
891 | "........"
892 | "........"
893 | "........"
894 | "........"
895 | "........"
896 | "XXX.XXX."
897 | "XXXXXXXX"
898 | ".XXX..XX"
899 | ".XX...XX"
900 | ".XX....X"
901 | ".XX....."
902 | ".XX....."
903 | ".XX....."
904 | ".XX....."
905 | ".XX....."
906 | "XXXX...."
907 | "XXXX....")
908 |
909 | (fringe-helper-define 'evil-fringe-mark-lower-s '(center)
910 | "........"
911 | "........"
912 | "........"
913 | "........"
914 | "........"
915 | "........"
916 | "..XXXX.."
917 | ".XXXXXX."
918 | "XX....XX"
919 | "XX.....X"
920 | "XXX....."
921 | "XXXXXX.."
922 | "..XXXXX."
923 | "......XX"
924 | "X.....XX"
925 | "XX....XX"
926 | ".XXXXXX."
927 | "..XXXX..")
928 |
929 | (fringe-helper-define 'evil-fringe-mark-lower-t '(center)
930 | "........"
931 | "........"
932 | "...X...."
933 | "..XX...."
934 | "..XX...."
935 | "..XX...."
936 | "..XX...."
937 | "XXXXXXX."
938 | "XXXXXXX."
939 | "..XX...."
940 | "..XX...."
941 | "..XX...."
942 | "..XX...."
943 | "..XX...."
944 | "..XX...X"
945 | "..XXX.XX"
946 | "..XXXXXX"
947 | "...XXXX.")
948 |
949 | (fringe-helper-define 'evil-fringe-mark-lower-u '(center)
950 | "........"
951 | "........"
952 | "........"
953 | "........"
954 | "........"
955 | "........"
956 | "XX...XX."
957 | "XX...XX."
958 | "XX...XX."
959 | "XX...XX."
960 | "XX...XX."
961 | "XX...XX."
962 | "XX...XX."
963 | "XX...XX."
964 | "XX...XX."
965 | "XXX.XXX."
966 | "XXXXXXXX"
967 | ".XXX.XXX")
968 |
969 | (fringe-helper-define 'evil-fringe-mark-lower-v '(center)
970 | "........"
971 | "........"
972 | "........"
973 | "........"
974 | "........"
975 | "........"
976 | "XX....XX"
977 | "XX....XX"
978 | "XX....XX"
979 | "XX....XX"
980 | "XX....XX"
981 | "XX....XX"
982 | "XX....XX"
983 | "XXX..XXX"
984 | ".XX..XX."
985 | "..XXXX.."
986 | "..XXXX.."
987 | "...XX...")
988 |
989 | (fringe-helper-define 'evil-fringe-mark-lower-w '(center)
990 | "........"
991 | "........"
992 | "........"
993 | "........"
994 | "........"
995 | "........"
996 | "XX....XX"
997 | "XX....XX"
998 | "XX....XX"
999 | "XX.XX.XX"
1000 | "XX.XX.XX"
1001 | "XX.XX.XX"
1002 | "XX.XX.XX"
1003 | "XX.XX.XX"
1004 | "XXXXXXXX"
1005 | ".XXXXXX."
1006 | ".XX..XX."
1007 | "..X..X..")
1008 |
1009 | (fringe-helper-define 'evil-fringe-mark-lower-x '(center)
1010 | "........"
1011 | "........"
1012 | "........"
1013 | "........"
1014 | "........"
1015 | "........"
1016 | "XX....XX"
1017 | "XX....XX"
1018 | ".XX..XX."
1019 | ".XX..XX."
1020 | "..XXXX.."
1021 | "...XX..."
1022 | "...XX..."
1023 | "..XXXX.."
1024 | ".XX..XX."
1025 | ".XX..XX."
1026 | "XX....XX"
1027 | "XX....XX")
1028 |
1029 | (fringe-helper-define 'evil-fringe-mark-lower-y '(center)
1030 | "........"
1031 | "........"
1032 | "........"
1033 | "XX....XX"
1034 | "XX....XX"
1035 | "XX....XX"
1036 | "XX....XX"
1037 | "XX....XX"
1038 | "XX....XX"
1039 | "XXX...XX"
1040 | ".XXXXXXX"
1041 | "..XXXXXX"
1042 | "......XX"
1043 | "......XX"
1044 | ".....XXX"
1045 | "....XXX."
1046 | "XXXXXX.."
1047 | "XXXXX...")
1048 |
1049 | (fringe-helper-define 'evil-fringe-mark-lower-z '(center)
1050 | "........"
1051 | "........"
1052 | "........"
1053 | "........"
1054 | "........"
1055 | "........"
1056 | "XXXXXXXX"
1057 | "XXXXXXXX"
1058 | "XX....XX"
1059 | "......XX"
1060 | ".....XXX"
1061 | "....XXX."
1062 | "...XXX.."
1063 | "..XXX..."
1064 | ".XXX...."
1065 | "XXX...XX"
1066 | "XXXXXXXX"
1067 | "XXXXXXXX")
1068 |
1069 | (fringe-helper-define 'evil-fringe-mark-symbol-period '(center)
1070 | "........"
1071 | "........"
1072 | "........"
1073 | "........"
1074 | "........"
1075 | "........"
1076 | "........"
1077 | "........"
1078 | "........"
1079 | "........"
1080 | "........"
1081 | "........"
1082 | "........"
1083 | "...XX..."
1084 | "..XXXX.."
1085 | ".XXXXXX."
1086 | "..XXXX.."
1087 | "...XX...")
1088 |
1089 | (fringe-helper-define 'evil-fringe-mark-symbol-caron '(center)
1090 | "...XX..."
1091 | "..XXXX.."
1092 | ".XXXXXX."
1093 | "XXX..XXX"
1094 | "XX....XX"
1095 | "X......X"
1096 | "........"
1097 | "........"
1098 | "........"
1099 | "........"
1100 | "........"
1101 | "........"
1102 | "........"
1103 | "........"
1104 | "........"
1105 | "........"
1106 | "........"
1107 | "........")
1108 |
1109 | (fringe-helper-define 'evil-fringe-mark-symbol-lt '(center)
1110 | "........"
1111 | ".......X"
1112 | "......XX"
1113 | ".....XXX"
1114 | "....XXX."
1115 | "...XXX.."
1116 | "..XXX..."
1117 | ".XXX...."
1118 | "XXX....."
1119 | "XXX....."
1120 | ".XXX...."
1121 | "..XXX..."
1122 | "...XXX.."
1123 | "....XXX."
1124 | ".....XXX"
1125 | "......XX"
1126 | ".......X"
1127 | "........")
1128 |
1129 | (fringe-helper-define 'evil-fringe-mark-symbol-gt '(center)
1130 | "........"
1131 | "X......."
1132 | "XX......"
1133 | "XXX....."
1134 | ".XXX...."
1135 | "..XXX..."
1136 | "...XXX.."
1137 | "....XXX."
1138 | ".....XXX"
1139 | ".....XXX"
1140 | "....XXX."
1141 | "...XXX.."
1142 | "..XXX..."
1143 | ".XXX...."
1144 | "XXX....."
1145 | "XX......"
1146 | "X......."
1147 | "........")
1148 |
1149 | (fringe-helper-define 'evil-fringe-mark-symbol-gtlt '(center)
1150 | "....XXX"
1151 | "...XXX."
1152 | "..XXX.."
1153 | ".XXX..."
1154 | "XXX...."
1155 | ".XXX..."
1156 | "..XXX.."
1157 | "...XXX."
1158 | "....XXX"
1159 | "XXX...."
1160 | ".XXX..."
1161 | "..XXX.."
1162 | "...XXX."
1163 | "....XXX"
1164 | "...XXX."
1165 | "..XXX.."
1166 | ".XXX..."
1167 | "XXX....")
1168 |
1169 | (fringe-helper-define 'evil-fringe-mark-symbol-lcurly '(center)
1170 | ".....XXX"
1171 | "....XXXX"
1172 | "...XXX.."
1173 | "...XX..."
1174 | "...XX..."
1175 | "...XX..."
1176 | "...XX..."
1177 | "..XXX..."
1178 | "XXXX...."
1179 | "XXXX...."
1180 | "..XXX..."
1181 | "...XX..."
1182 | "...XX..."
1183 | "...XX..."
1184 | "...XX..."
1185 | "...XXX.."
1186 | "....XXXX"
1187 | ".....XXX")
1188 |
1189 | (fringe-helper-define 'evil-fringe-mark-symbol-rcurly '(center)
1190 | "XXX....."
1191 | "XXXX...."
1192 | "..XXX..."
1193 | "...XX..."
1194 | "...XX..."
1195 | "...XX..."
1196 | "...XX..."
1197 | "...XXX.."
1198 | "....XXXX"
1199 | "....XXXX"
1200 | "...XXX.."
1201 | "...XX..."
1202 | "...XX..."
1203 | "...XX..."
1204 | "...XX..."
1205 | "..XXX..."
1206 | "XXXX...."
1207 | "XXX.....")
1208 |
1209 | (fringe-helper-define 'evil-fringe-mark-symbol-lsquare '(center)
1210 | "XXXXXXXX"
1211 | "XXXXXXXX"
1212 | "XX......"
1213 | "XX......"
1214 | "XX......"
1215 | "XX......"
1216 | "XX......"
1217 | "XX......"
1218 | "XX......"
1219 | "XX......"
1220 | "XX......"
1221 | "XX......"
1222 | "XX......"
1223 | "XX......"
1224 | "XX......"
1225 | "XX......"
1226 | "XXXXXXXX"
1227 | "XXXXXXXX")
1228 |
1229 | (fringe-helper-define 'evil-fringe-mark-symbol-rsquare '(center)
1230 | "XXXXXXXX"
1231 | "XXXXXXXX"
1232 | "......XX"
1233 | "......XX"
1234 | "......XX"
1235 | "......XX"
1236 | "......XX"
1237 | "......XX"
1238 | "......XX"
1239 | "......XX"
1240 | "......XX"
1241 | "......XX"
1242 | "......XX"
1243 | "......XX"
1244 | "......XX"
1245 | "......XX"
1246 | "XXXXXXXX"
1247 | "XXXXXXXX")
1248 |
1249 | (fringe-helper-define 'evil-fringe-mark-symbol-lrsquare '(center)
1250 | "XXXXXXXX"
1251 | "XXXXXXXX"
1252 | "XX......"
1253 | "XX......"
1254 | "XX..XXXX"
1255 | "XX..XXXX"
1256 | "XX....XX"
1257 | "XX....XX"
1258 | "XX....XX"
1259 | "XX....XX"
1260 | "XX....XX"
1261 | "XX....XX"
1262 | "XXXX..XX"
1263 | "XXXX..XX"
1264 | "......XX"
1265 | "......XX"
1266 | "XXXXXXXX"
1267 | "XXXXXXXX")
1268 |
1269 |
1270 | (defvar evil-fringe-mark-bitmaps '(( 46 . evil-fringe-mark-symbol-period)
1271 | ( 60 . evil-fringe-mark-symbol-lt)
1272 | ( 62 . evil-fringe-mark-symbol-gt)
1273 | ( 65 . evil-fringe-mark-upper-a)
1274 | ( 66 . evil-fringe-mark-upper-b)
1275 | ( 67 . evil-fringe-mark-upper-c)
1276 | ( 68 . evil-fringe-mark-upper-d)
1277 | ( 69 . evil-fringe-mark-upper-e)
1278 | ( 70 . evil-fringe-mark-upper-f)
1279 | ( 71 . evil-fringe-mark-upper-g)
1280 | ( 72 . evil-fringe-mark-upper-h)
1281 | ( 73 . evil-fringe-mark-upper-i)
1282 | ( 74 . evil-fringe-mark-upper-j)
1283 | ( 75 . evil-fringe-mark-upper-k)
1284 | ( 76 . evil-fringe-mark-upper-l)
1285 | ( 77 . evil-fringe-mark-upper-m)
1286 | ( 78 . evil-fringe-mark-upper-n)
1287 | ( 79 . evil-fringe-mark-upper-o)
1288 | ( 80 . evil-fringe-mark-upper-p)
1289 | ( 81 . evil-fringe-mark-upper-q)
1290 | ( 82 . evil-fringe-mark-upper-r)
1291 | ( 83 . evil-fringe-mark-upper-s)
1292 | ( 84 . evil-fringe-mark-upper-t)
1293 | ( 85 . evil-fringe-mark-upper-u)
1294 | ( 86 . evil-fringe-mark-upper-v)
1295 | ( 87 . evil-fringe-mark-upper-w)
1296 | ( 88 . evil-fringe-mark-upper-x)
1297 | ( 89 . evil-fringe-mark-upper-y)
1298 | ( 90 . evil-fringe-mark-upper-z)
1299 | ( 91 . evil-fringe-mark-symbol-lsquare)
1300 | ( 93 . evil-fringe-mark-symbol-rsquare)
1301 | ( 94 . evil-fringe-mark-symbol-caron)
1302 | ( 97 . evil-fringe-mark-lower-a)
1303 | ( 98 . evil-fringe-mark-lower-b)
1304 | ( 99 . evil-fringe-mark-lower-c)
1305 | (100 . evil-fringe-mark-lower-d)
1306 | (101 . evil-fringe-mark-lower-e)
1307 | (102 . evil-fringe-mark-lower-f)
1308 | (103 . evil-fringe-mark-lower-g)
1309 | (104 . evil-fringe-mark-lower-h)
1310 | (105 . evil-fringe-mark-lower-i)
1311 | (106 . evil-fringe-mark-lower-j)
1312 | (107 . evil-fringe-mark-lower-k)
1313 | (108 . evil-fringe-mark-lower-l)
1314 | (109 . evil-fringe-mark-lower-m)
1315 | (110 . evil-fringe-mark-lower-n)
1316 | (111 . evil-fringe-mark-lower-o)
1317 | (112 . evil-fringe-mark-lower-p)
1318 | (113 . evil-fringe-mark-lower-q)
1319 | (114 . evil-fringe-mark-lower-r)
1320 | (115 . evil-fringe-mark-lower-s)
1321 | (116 . evil-fringe-mark-lower-t)
1322 | (117 . evil-fringe-mark-lower-u)
1323 | (118 . evil-fringe-mark-lower-v)
1324 | (119 . evil-fringe-mark-lower-w)
1325 | (120 . evil-fringe-mark-lower-x)
1326 | (121 . evil-fringe-mark-lower-y)
1327 | (122 . evil-fringe-mark-lower-z)
1328 | (123 . evil-fringe-mark-symbol-lcurly)
1329 | (125 . evil-fringe-mark-symbol-rcurly)
1330 | (128 . evil-fringe-mark-symbol-gtlt)
1331 | (129 . evil-fringe-mark-symbol-lrsquare))
1332 | "Alist of fringe bitmaps to display for characters.")
1333 |
1334 | (provide 'evil-fringe-mark-overlays)
1335 | ;;; evil-fringe-mark-overlays.el ends here
1336 |
--------------------------------------------------------------------------------
/evil-fringe-mark.el:
--------------------------------------------------------------------------------
1 | ;;; evil-fringe-mark.el --- Display evil-mode marks in the fringe
2 | ;; This file is not part of GNU Emacs.
3 |
4 | ;; Copyright (C) 2019 Andrew Smith
5 |
6 | ;; Author: Andrew Smith
7 | ;; URL: https://github.com/Andrew-William-Smith/evil-fringe-mark
8 | ;; Version: 1.2.1
9 | ;; Package-Requires: ((emacs "24.3") (evil "1.0.0") (fringe-helper "0.1.1") (goto-chg "1.6"))
10 |
11 | ;; This file is part of evil-fringe-mark.
12 |
13 | ;; This program is free software; you can redistribute it and/or modify
14 | ;; it under the terms of the GNU General Public License as published by
15 | ;; the Free Software Foundation, either version 3 of the License, or
16 | ;; (at your option) any later version.
17 |
18 | ;; This program is distributed in the hope that it will be useful,
19 | ;; but WITHOUT ANY WARRANTY; without even the implied warranty of
20 | ;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
21 | ;; GNU General Public License for more details.
22 |
23 | ;; You should have received a copy of the GNU General Public License
24 | ;; along with this program. If not, see .
25 |
26 | ;;; Commentary:
27 | ;; This file provides `evil-fringe-mark', which in turn provides the minor
28 | ;; modes `evil-fringe-mark-mode' and `global-evil-fringe-mark-mode'. To
29 | ;; enable either mode, run its respective command. These modes display
30 | ;; fringe bitmaps representing all `evil-mode' marks within a buffer; the
31 | ;; fringe in which bitmap overlays are placed may be changed by modifying
32 | ;; the global variable `evil-fringe-mark-side'. The mode may be configured
33 | ;; to display special marks by setting `evil-fringe-mark-show-special' to a
34 | ;; non-nil value, and certain mark characters may be omitted from fringe
35 | ;; display by adding them to the list `evil-fringe-mark-ignore-chars'.
36 |
37 | ;;; Code:
38 | (require 'cl-lib)
39 | (require 'evil)
40 | (require 'fringe-helper)
41 | (require 'evil-fringe-mark-overlays)
42 |
43 | (defgroup evil-fringe-mark nil
44 | "Display evil-mode marks in the fringe."
45 | :prefix "evil-fringe-mark-"
46 | :group 'evil)
47 |
48 | (make-variable-buffer-local
49 | (defvar evil-fringe-mark-list '()
50 | "Plist of fringe overlays for buffer-local marks."))
51 |
52 | (make-variable-buffer-local
53 | (defvar evil-fringe-mark-special-list '()
54 | "Plist of fringe overlays for buffer-local special marks."))
55 |
56 | (defvar evil-fringe-mark-file-list '()
57 | "Plist of fringe overlays for file marks.")
58 |
59 | (make-variable-buffer-local
60 | (defvar evil-fringe-mark-overwritten-list '()
61 | "List of lists of fringe characters that have been overwritten. Each list
62 | behaves as a linked list, with the most recently-placed mark at the head (car)."))
63 |
64 | (defvar evil-fringe-mark-special-chars '(?< ?> 128 ?. ?^ ?{ ?} ?\[ ?\] 129)
65 | "List of characters to consider special marks.")
66 |
67 | (defcustom evil-fringe-mark-show-special nil
68 | "Whether to display special marks (defined in `evil-fringe-mark-special-chars')
69 | in the fringe."
70 | :type 'boolean)
71 |
72 | (defcustom evil-fringe-mark-ignore-chars
73 | '(?')
74 | "Mark characters for which to never display fringe bitmaps."
75 | :type '(repeat integer))
76 |
77 | (defcustom evil-fringe-mark-always-overwrite t
78 | "Whether to always overwrite fringe bitmaps when a new mark is placed on a
79 | line or display the bitmap that is closer to the fringe, regardless of whether
80 | it was placed first."
81 | :type 'boolean)
82 |
83 | (defcustom evil-fringe-mark-side 'left-fringe
84 | "Fringe in which to place mark overlays for graphical Emacs sessions."
85 | :type '(choice (const :tag "Left fringe" left-fringe)
86 | (const :tag "Right fringe" right-fringe)))
87 |
88 | (defcustom evil-fringe-mark-margin 'left-margin
89 | "Margin in which to place mark overlays for non-graphical Emacs sessions."
90 | :type '(choice (const :tag "Left margin" left-margin)
91 | (const :tag "Right margin" right-margin)))
92 |
93 | (defface evil-fringe-mark-local-face
94 | '((t (:inherit (font-lock-keyword-face))))
95 | "Face with which to display buffer-local fringe marks.")
96 |
97 | (defface evil-fringe-mark-special-face
98 | '((t (:inherit (fringe))))
99 | "Face with which to display buffer-local special fringe marks.")
100 |
101 | (defface evil-fringe-mark-file-face
102 | '((t (:inherit (font-lock-type-face))))
103 | "Face with which to display fringe file marks.")
104 |
105 |
106 | (defun evil-fringe-mark-char-list (char)
107 | "Determine the list to which a mark represented by character CHAR should belong."
108 | (cond
109 | ((member char evil-fringe-mark-special-chars) 'evil-fringe-mark-special-list) ; Special mark
110 | ((>= char ?a) 'evil-fringe-mark-list) ; Buffer-local mark
111 | (t 'evil-fringe-mark-file-list))) ; File mark
112 |
113 | (defun evil-fringe-mark-char-face (char)
114 | "Determine the face with which to display a mark represented by character CHAR."
115 | (cond
116 | ((member char evil-fringe-mark-special-chars) 'evil-fringe-mark-special-face)
117 | ((>= char ?a) 'evil-fringe-mark-local-face)
118 | (t 'evil-fringe-mark-file-face)))
119 |
120 | (defun evil-fringe-mark-on-line (pos)
121 | "Determine what fringe indicators are on the line containing position POS."
122 | (let ((mark-on-line nil))
123 | ; Check buffer-local marks
124 | (cl-loop for (char overlay) on evil-fringe-mark-list by 'cddr do
125 | (when (and (overlay-start overlay)
126 | (eq (line-number-at-pos (overlay-start overlay))
127 | (line-number-at-pos pos)))
128 | (setq mark-on-line `(,char ,overlay))
129 | (cl-return)))
130 | ; Check file marks: Emacs has no way to combine plists
131 | (unless mark-on-line
132 | (cl-loop for (char overlay) on evil-fringe-mark-file-list by 'cddr do
133 | (when (and (overlay-start overlay)
134 | (eq (current-buffer) (overlay-buffer overlay))
135 | (eq (line-number-at-pos (overlay-start overlay))
136 | (line-number-at-pos pos)))
137 | (setq mark-on-line `(,char ,overlay))
138 | (cl-return))))
139 | mark-on-line))
140 |
141 | (defun evil-fringe-mark-put (char char-list marker &optional no-recurse)
142 | "Place an indicator for mark CHAR, of type CHAR-LIST, in the fringe at location
143 | MARKER."
144 | (unless (or (member char evil-fringe-mark-ignore-chars)
145 | (minibufferp))
146 | (when evil-fringe-mark-always-overwrite
147 | (let ((old-mark (evil-fringe-mark-on-line (marker-position marker)))
148 | (this-stack (car (cl-remove-if-not
149 | (lambda (stack) (member char stack))
150 | evil-fringe-mark-overwritten-list)))
151 | (overwrite-overlay (plist-get (symbol-value (evil-fringe-mark-char-list char)) char))
152 | (overwrite-marker (make-marker))
153 | (old-stack nil))
154 | (setq old-stack (car (cl-remove-if-not
155 | (lambda (stack) (member (car old-mark) stack))
156 | evil-fringe-mark-overwritten-list)))
157 | ; Delete current element from list
158 | (cl-delete char (car (member (car (cl-remove-if-not
159 | (lambda (stack) (member char stack))
160 | evil-fringe-mark-overwritten-list))
161 | evil-fringe-mark-overwritten-list)))
162 | ; Prepend new mark to line overwrite list
163 | (when (and old-mark (not no-recurse))
164 | (evil-fringe-mark-delete (car old-mark))
165 | ; Prevent overwriting same character
166 | (unless (eq (car old-mark) char)
167 | (if old-stack
168 | (push char (car (member old-stack evil-fringe-mark-overwritten-list)))
169 | (push `(,char ,(car old-mark)) evil-fringe-mark-overwritten-list))))
170 | ; Draw new head of line overwrite list
171 | (when this-stack
172 | (when overwrite-overlay
173 | (set-marker overwrite-marker (overlay-start overwrite-overlay))
174 | (pop (car (cl-remove-if-not (lambda (stack) (member char stack))
175 | evil-fringe-mark-overwritten-list)))
176 | (evil-fringe-mark-put (nth 1 this-stack)
177 | (evil-fringe-mark-char-list (nth 1 this-stack))
178 | overwrite-marker t))
179 | ; Handle end of list
180 | (when (eq (length this-stack) 1)
181 | (setq evil-fringe-mark-overwritten-list
182 | (cl-remove-if (lambda (stack) (eq this-stack stack))
183 | evil-fringe-mark-overwritten-list))))))
184 | (let ((old-mark (plist-get (symbol-value char-list) char)))
185 | (when old-mark (fringe-helper-remove old-mark)))
186 | (set char-list (plist-put (symbol-value char-list) char
187 | ; Place indicators in the fringe if running Emacs graphically
188 | (if (display-graphic-p)
189 | (fringe-helper-insert
190 | (cdr (assoc char evil-fringe-mark-bitmaps)) marker
191 | evil-fringe-mark-side
192 | (evil-fringe-mark-char-face char))
193 | ; Otherwise place indicators in the margin
194 | (let ((margin-ov (make-overlay
195 | (marker-position marker)
196 | (marker-position marker))))
197 | (overlay-put margin-ov 'before-string
198 | (propertize "!" 'display `((margin ,evil-fringe-mark-margin)
199 | ,(char-to-string char))
200 | 'face (evil-fringe-mark-char-face char)))
201 | margin-ov))))))
202 |
203 | (defun evil-fringe-mark-put-special (char marker)
204 | "Place an indicator for special mark CHAR in the fringe at location MARKER.
205 | Special marks will not override marks placed by the user."
206 | (unless (evil-fringe-mark-on-line (marker-position marker))
207 | (evil-fringe-mark-put char 'evil-fringe-mark-special-list marker)))
208 |
209 | (defun evil-fringe-mark-delete (char)
210 | "Delete the indicator for mark CHAR from the fringe."
211 | (let ((char-list (evil-fringe-mark-char-list char))
212 | (last-bitmap nil))
213 | (setq last-bitmap (plist-get (symbol-value char-list) char))
214 | (when last-bitmap
215 | (progn
216 | (fringe-helper-remove last-bitmap)
217 | (set char-list (evil-plist-delete char (symbol-value char-list)))))))
218 |
219 | (defun evil-fringe-mark-refresh-visual ()
220 | "Redraw all special visual mark indicators in the current buffer."
221 | ; Only attempt to create marker if evil-visual-end is defined
222 | (when (and evil-fringe-mark-show-special evil-visual-end)
223 | (let ((visual-end-pos (marker-position evil-visual-end))
224 | (visual-end-marker (make-marker)))
225 | ; Delete all visual special marks
226 | (evil-fringe-mark-delete ?<)
227 | (evil-fringe-mark-delete 128)
228 | (evil-fringe-mark-delete ?>)
229 | ; Handle line selection marker positioning
230 | (when (eq (evil-visual-type) 'line)
231 | (setq visual-end-pos (1- visual-end-pos)))
232 | (set-marker visual-end-marker visual-end-pos)
233 | ; Show special bitmap if start and end of visual selection are on same line
234 | (if (eq (line-number-at-pos (marker-position evil-visual-beginning))
235 | (line-number-at-pos visual-end-pos))
236 | (evil-fringe-mark-put-special 128 evil-visual-beginning) ; Use a nonce ASCII character
237 | (evil-fringe-mark-put-special ?< evil-visual-beginning)
238 | (evil-fringe-mark-put-special ?> visual-end-marker)))))
239 |
240 | (defun evil-fringe-mark-refresh-paste ()
241 | "Redraw all special paste (yank) mark indicators in the current buffer."
242 | (when evil-fringe-mark-show-special
243 | (let ((start-marker (make-marker))
244 | (end-marker (make-marker)))
245 | ; Delete existing paste special marks
246 | (evil-fringe-mark-delete ?\[)
247 | (evil-fringe-mark-delete 129)
248 | (evil-fringe-mark-delete ?\])
249 | ; Get paste start and end, avoiding evil-mode boundary errors
250 | (save-excursion
251 | (if (ignore-errors (evil-goto-mark ?\[))
252 | (set-marker start-marker (point))
253 | (set-marker start-marker 1))
254 | (if (ignore-errors (evil-goto-mark ?\]))
255 | (set-marker end-marker (point))
256 | (set-marker end-marker (buffer-size))))
257 | (if (eq (line-number-at-pos (marker-position start-marker))
258 | (line-number-at-pos (marker-position end-marker)))
259 | (evil-fringe-mark-put-special 129 start-marker) ; Another nonce character
260 | (evil-fringe-mark-put-special ?\[ start-marker)
261 | (evil-fringe-mark-put-special ?\] end-marker)))))
262 |
263 | (defun evil-fringe-mark-refresh-special (&rest args)
264 | "Redraw the special mark indicators for the last change in the current buffer
265 | and the start and end of the current paragraphs."
266 | (when evil-fringe-mark-show-special
267 | ; Paragraph start/end
268 | (let ((start-marker (make-marker))
269 | (end-marker (make-marker)))
270 | (evil-fringe-mark-delete ?{)
271 | (evil-fringe-mark-delete ?})
272 | (save-excursion
273 | ; Avoid evil-mode boundary errors
274 | (if (ignore-errors (evil-goto-mark ?{))
275 | (set-marker start-marker (point))
276 | (set-marker start-marker 1)))
277 | (save-excursion
278 | (if (ignore-errors (evil-goto-mark ?}))
279 | (set-marker end-marker (point))
280 | (set-marker end-marker (buffer-size))))
281 | (evil-fringe-mark-put-special ?{ start-marker)
282 | (evil-fringe-mark-put-special ?} end-marker))
283 | ; Last change
284 | ; NOTE: Disabled due to an incompatibility between Emacs 26.1 and
285 | ; undo-tree that results in the excessive proliferation of canaries
286 | ; when trying to get evil-mode mark ?.
287 | ;
288 | ; (when (and (not (eq this-command last-command))
289 | ; buffer-undo-list
290 | ; (not (eq buffer-undo-list t)))
291 | ; (let ((change-marker (make-marker)))
292 | ; (evil-fringe-mark-delete ?.)
293 | ; (save-excursion
294 | ; (ignore-errors (evil-goto-mark ?.))
295 | ; (set-marker change-marker (point)))
296 | ; (evil-fringe-mark-put-special ?. change-marker)))))
297 | ))
298 |
299 | (defun evil-fringe-mark-refresh-buffer ()
300 | "Redraw all mark indicators in the current buffer."
301 | (setq evil-fringe-mark-overwritten-list nil)
302 | ; Local marks
303 | (cl-loop for (char . marker) in evil-markers-alist do
304 | (when (and (markerp marker)
305 | (>= char ?a))
306 | (evil-fringe-mark-put char 'evil-fringe-mark-list marker)))
307 | ; Special marks
308 | (evil-fringe-mark-refresh-visual)
309 | (evil-fringe-mark-refresh-paste)
310 | (evil-fringe-mark-refresh-special)
311 | ; Global marks
312 | (cl-loop for (char . marker) in (default-value 'evil-markers-alist) do
313 | (when (and (markerp marker)
314 | (>= char ?A)
315 | (eq (current-buffer) (marker-buffer marker)))
316 | (evil-fringe-mark-put char 'evil-fringe-mark-file-list marker))))
317 |
318 | (defun evil-fringe-mark-clear-buffer ()
319 | "Delete all mark indicators from the current buffer."
320 | (setq evil-fringe-mark-overwritten-list nil)
321 | ; Local marks
322 | (cl-loop for (key _) on evil-fringe-mark-list by 'cddr do
323 | (evil-fringe-mark-delete key))
324 | ; Special marks
325 | (cl-loop for (key _) on evil-fringe-mark-special-list by 'cddr do
326 | (evil-fringe-mark-delete key))
327 | ; Global marks
328 | (cl-loop for (key overlay) on evil-fringe-mark-file-list by 'cddr do
329 | (when (eq (current-buffer) (overlay-buffer overlay))
330 | (evil-fringe-mark-delete key))))
331 |
332 | (defadvice evil-set-marker (around compile)
333 | "Advice function for `evil-fringe-mark'."
334 | (let ((char (ad-get-arg 0))
335 | (marker ad-do-it)
336 | (char-list (evil-fringe-mark-char-list char))
337 | (old-mark nil))
338 | (when (or evil-fringe-mark-mode global-evil-fringe-mark-mode)
339 | ; Handle special markers set with `evil-set-marker'
340 | (if (eq char-list 'evil-fringe-mark-special-list)
341 | (when evil-fringe-mark-show-special
342 | (evil-fringe-mark-put-special char marker))
343 | (evil-fringe-mark-put char char-list marker)))))
344 |
345 | (defadvice evil-delete-marks (after compile)
346 | "Advice function for `evil-fringe-mark'."
347 | (evil-fringe-mark-clear-buffer)
348 | (evil-fringe-mark-refresh-buffer))
349 |
350 | (defadvice evil-visual-refresh (after compile)
351 | "Advice function for `evil-fringe-mark'."
352 | (evil-fringe-mark-refresh-visual))
353 |
354 | (defadvice evil-paste-before (after compile)
355 | "Advice function for `evil-fringe-mark'."
356 | (evil-fringe-mark-refresh-paste))
357 |
358 | (defadvice evil-paste-after (after compile)
359 | "Advice function for `evil-fringe-mark'."
360 | (evil-fringe-mark-refresh-paste))
361 |
362 | ;;;###autoload
363 | (define-minor-mode evil-fringe-mark-mode
364 | "Display evil-mode marks in the fringe."
365 | :lighter " EFM"
366 | (if evil-fringe-mark-mode
367 | (progn
368 | (evil-fringe-mark-refresh-buffer)
369 | (ad-activate 'evil-set-marker)
370 | (ad-activate 'evil-delete-marks)
371 | ; Only enable special mark tracking when necessary
372 | (unless (and (member ?< evil-fringe-mark-ignore-chars)
373 | (member ?> evil-fringe-mark-ignore-chars))
374 | (ad-activate 'evil-visual-refresh))
375 | (unless (and (member ?\[ evil-fringe-mark-ignore-chars)
376 | (member ?\] evil-fringe-mark-ignore-chars))
377 | (ad-activate 'evil-paste-before)
378 | (ad-activate 'evil-paste-after))
379 | (unless (and (member ?. evil-fringe-mark-ignore-chars)
380 | (member ?{ evil-fringe-mark-ignore-chars)
381 | (member ?} evil-fringe-mark-ignore-chars))
382 | (add-hook 'post-command-hook 'evil-fringe-mark-refresh-special)))
383 | (progn
384 | (evil-fringe-mark-clear-buffer)
385 | (ad-deactivate 'evil-set-marker)
386 | (ad-deactivate 'evil-delete-marks)
387 | (ad-deactivate 'evil-visual-refresh)
388 | (ad-deactivate 'evil-paste-before)
389 | (ad-deactivate 'evil-paste-after)
390 | (remove-hook 'post-command-hook 'evil-fringe-mark-refresh-special))))
391 |
392 | ;;;###autoload
393 | (define-minor-mode global-evil-fringe-mark-mode
394 | "Display evil-mode marks in the fringe. Global version of `evil-fringe-mark-mode'."
395 | :lighter " gEFM"
396 | :global t
397 | :require 'evil-fringe-mark
398 | (if global-evil-fringe-mark-mode
399 | (progn
400 | ; Place all marks
401 | (save-current-buffer
402 | (cl-loop for buf in (buffer-list) do
403 | (set-buffer buf)
404 | (evil-fringe-mark-refresh-buffer)))
405 | (ad-activate 'evil-set-marker)
406 | (ad-activate 'evil-delete-marks)
407 | (unless (and (member ?< evil-fringe-mark-ignore-chars)
408 | (member ?> evil-fringe-mark-ignore-chars))
409 | (ad-activate 'evil-visual-refresh))
410 | (unless (and (member ?\[ evil-fringe-mark-ignore-chars)
411 | (member ?\] evil-fringe-mark-ignore-chars))
412 | (ad-activate 'evil-paste-before)
413 | (ad-activate 'evil-paste-after))
414 | (unless (and (member ?. evil-fringe-mark-ignore-chars)
415 | (member ?{ evil-fringe-mark-ignore-chars)
416 | (member ?} evil-fringe-mark-ignore-chars))
417 | (add-hook 'post-command-hook 'evil-fringe-mark-refresh-special)))
418 | (progn
419 | ; Remove all buffer-local marks
420 | (save-current-buffer
421 | (cl-loop for buf in (buffer-list) do
422 | (set-buffer buf)
423 | (evil-fringe-mark-clear-buffer)))
424 | ; Remove all global marks
425 | (ad-deactivate 'evil-set-marker)
426 | (ad-deactivate 'evil-delete-marks)
427 | (ad-deactivate 'evil-visual-refresh)
428 | (ad-deactivate 'evil-paste-before)
429 | (ad-deactivate 'evil-paste-after)
430 | (remove-hook 'post-command-hook 'evil-fringe-mark-refresh-special))))
431 |
432 | (provide 'evil-fringe-mark)
433 | ;;; evil-fringe-mark.el ends here
434 |
--------------------------------------------------------------------------------
/img/charset.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Andrew-William-Smith/evil-fringe-mark/a1689fddb7ee79aaa720a77aada1208b8afd5c20/img/charset.png
--------------------------------------------------------------------------------
/img/window.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Andrew-William-Smith/evil-fringe-mark/a1689fddb7ee79aaa720a77aada1208b8afd5c20/img/window.png
--------------------------------------------------------------------------------