+1 This could be very useful enhancement - the code completion in Visual Age for Java works in same manner.
--- Vladimir Kudinov V6.RU > -----Original Message----- > From: [EMAIL PROTECTED] > [mailto:[EMAIL PROTECTED]]On Behalf Of Gerrit Van Niekerk > Sent: Friday, November 23, 2001 2:59 PM > To: '[EMAIL PROTECTED]' > Subject: [Eap-list] Code completion bug > > > Hi, > > Let me explain by example: > if > Component c; > and I have the method > c.add(whatever); > If the caret is between the 2 d's of add, and you hit CodeCompletion > (Ctrl-space in default map), another d is inserted, thus it will read > c.addd(whatever) and the caret is after the second d. If you hit > escape, it > stays c.addd(whatever).(This is something I do often to see which methods > are available and read javadoc on them - great feature!) > > I think IDEA should check when CodeCompletion is hit whether the > characters > it wants to insert are already there, if so just move the caret on. > > #520, jdk 1.3.1_01 > > Regards > Gerrit > > > ------------------------------------------------------------ > IMPORTANT NOTICE. > > Confidentiality: This e-mail and its attachments are intended for > the above named only and may be confidential. If they have come to > you in error you must take no action based on them, nor must you copy > or show them to anyone; please reply to this e-mail and highlight the > error. > > Security Warning: Please note that this e-mail has been created in > the knowledge that Internet e-mail is not a 100% secure communications > medium. We advise that you understand and observe this lack of > security when e-mailing us. > > Viruses: Although we have taken steps to ensure that this e-mail and > attachments are free from any virus, we advise that in keeping with > good computing practice the recipient should ensure they are actually > virus free. > > Monitoring and Scanning: CeNeS has monitoring and scanning systems > in place in relation to emails sent and received to: monitor / record > business communications; prevent and detect crime; investigate the > use of the Company's internal and external email system; and provide > evidence of compliance with business practices. > > _______________________________________________ > Eap-list mailing list > [EMAIL PROTECTED] > http://www.intellij.com/mailman/listinfo/eap-list > _______________________________________________ Eap-list mailing list [EMAIL PROTECTED] http://www.intellij.com/mailman/listinfo/eap-list
