a_b 0.1.0
Sign up to get free protection for your applications and to get access to all the features.
- data/MIT-LICENSE +18 -0
- data/README.markdown +4 -0
- data/Rakefile +74 -0
- data/config.ru +3 -0
- data/config/database.example.yml +6 -0
- data/config/externals.yml +6 -0
- data/config/mail.example.yml +32 -0
- data/db/migrate/001_a_b_tests.rb +14 -0
- data/db/migrate/002_a_b_variants.rb +19 -0
- data/db/migrate/003_a_b_users.rb +25 -0
- data/db/migrate/004_a_b_tokens.rb +12 -0
- data/features/example.feature +10 -0
- data/features/support/env.rb +35 -0
- data/features/support/rspec.rb +11 -0
- data/features/support/webrat.rb +3 -0
- data/gemspec.rb +41 -0
- data/lib/a_b.rb +31 -0
- data/lib/a_b/boot.rb +30 -0
- data/lib/a_b/controller/api.rb +32 -0
- data/lib/a_b/controller/application.rb +6 -0
- data/lib/a_b/controller/index.rb +16 -0
- data/lib/a_b/controller/sessions.rb +28 -0
- data/lib/a_b/controller/tests.rb +37 -0
- data/lib/a_b/controller/variants.rb +14 -0
- data/lib/a_b/helper/api.rb +8 -0
- data/lib/a_b/helper/application.rb +56 -0
- data/lib/a_b/helper/index.rb +12 -0
- data/lib/a_b/model/a_b_test.rb +65 -0
- data/lib/a_b/model/a_b_variant.rb +131 -0
- data/lib/a_b/model/token.rb +22 -0
- data/lib/a_b/model/user.rb +5 -0
- data/lib/a_b/model/user_session.rb +4 -0
- data/lib/a_b/view/index.haml +129 -0
- data/lib/a_b/view/index.sass +55 -0
- data/lib/a_b/view/layout.haml +15 -0
- data/lib/a_b/view/layout.sass +34 -0
- data/lib/a_b/view/log_in.haml +15 -0
- data/lib/a_b/view/log_in.sass +11 -0
- data/public/css/blueprint/ie.css +35 -0
- data/public/css/blueprint/print.css +29 -0
- data/public/css/blueprint/screen.css +257 -0
- data/public/js/index.js +126 -0
- data/public/js/jquery.js +19 -0
- data/public/js/visit.js +59 -0
- data/script/console +2 -0
- data/script/env.rb +30 -0
- data/spec/spec.opts +1 -0
- data/spec/spec_helper.rb +16 -0
- data/vendor/authlogic/CHANGELOG.rdoc +345 -0
- data/vendor/authlogic/LICENSE +20 -0
- data/vendor/authlogic/README.rdoc +246 -0
- data/vendor/authlogic/Rakefile +42 -0
- data/vendor/authlogic/VERSION.yml +5 -0
- data/vendor/authlogic/authlogic.gemspec +217 -0
- data/vendor/authlogic/generators/session/session_generator.rb +9 -0
- data/vendor/authlogic/generators/session/templates/session.rb +2 -0
- data/vendor/authlogic/init.rb +1 -0
- data/vendor/authlogic/lib/authlogic.rb +57 -0
- data/vendor/authlogic/lib/authlogic/acts_as_authentic/base.rb +107 -0
- data/vendor/authlogic/lib/authlogic/acts_as_authentic/email.rb +110 -0
- data/vendor/authlogic/lib/authlogic/acts_as_authentic/logged_in_status.rb +60 -0
- data/vendor/authlogic/lib/authlogic/acts_as_authentic/login.rb +141 -0
- data/vendor/authlogic/lib/authlogic/acts_as_authentic/magic_columns.rb +24 -0
- data/vendor/authlogic/lib/authlogic/acts_as_authentic/password.rb +344 -0
- data/vendor/authlogic/lib/authlogic/acts_as_authentic/perishable_token.rb +105 -0
- data/vendor/authlogic/lib/authlogic/acts_as_authentic/persistence_token.rb +68 -0
- data/vendor/authlogic/lib/authlogic/acts_as_authentic/restful_authentication.rb +61 -0
- data/vendor/authlogic/lib/authlogic/acts_as_authentic/session_maintenance.rb +139 -0
- data/vendor/authlogic/lib/authlogic/acts_as_authentic/single_access_token.rb +65 -0
- data/vendor/authlogic/lib/authlogic/acts_as_authentic/validations_scope.rb +32 -0
- data/vendor/authlogic/lib/authlogic/authenticates_many/association.rb +42 -0
- data/vendor/authlogic/lib/authlogic/authenticates_many/base.rb +55 -0
- data/vendor/authlogic/lib/authlogic/controller_adapters/abstract_adapter.rb +67 -0
- data/vendor/authlogic/lib/authlogic/controller_adapters/merb_adapter.rb +30 -0
- data/vendor/authlogic/lib/authlogic/controller_adapters/rails_adapter.rb +48 -0
- data/vendor/authlogic/lib/authlogic/controller_adapters/sinatra_adapter.rb +61 -0
- data/vendor/authlogic/lib/authlogic/crypto_providers/aes256.rb +43 -0
- data/vendor/authlogic/lib/authlogic/crypto_providers/bcrypt.rb +90 -0
- data/vendor/authlogic/lib/authlogic/crypto_providers/md5.rb +34 -0
- data/vendor/authlogic/lib/authlogic/crypto_providers/sha1.rb +35 -0
- data/vendor/authlogic/lib/authlogic/crypto_providers/sha256.rb +50 -0
- data/vendor/authlogic/lib/authlogic/crypto_providers/sha512.rb +50 -0
- data/vendor/authlogic/lib/authlogic/crypto_providers/wordpress.rb +43 -0
- data/vendor/authlogic/lib/authlogic/i18n.rb +83 -0
- data/vendor/authlogic/lib/authlogic/i18n/translator.rb +15 -0
- data/vendor/authlogic/lib/authlogic/random.rb +33 -0
- data/vendor/authlogic/lib/authlogic/regex.rb +25 -0
- data/vendor/authlogic/lib/authlogic/session/activation.rb +58 -0
- data/vendor/authlogic/lib/authlogic/session/active_record_trickery.rb +61 -0
- data/vendor/authlogic/lib/authlogic/session/base.rb +37 -0
- data/vendor/authlogic/lib/authlogic/session/brute_force_protection.rb +96 -0
- data/vendor/authlogic/lib/authlogic/session/callbacks.rb +88 -0
- data/vendor/authlogic/lib/authlogic/session/cookies.rb +130 -0
- data/vendor/authlogic/lib/authlogic/session/existence.rb +93 -0
- data/vendor/authlogic/lib/authlogic/session/foundation.rb +63 -0
- data/vendor/authlogic/lib/authlogic/session/http_auth.rb +58 -0
- data/vendor/authlogic/lib/authlogic/session/id.rb +41 -0
- data/vendor/authlogic/lib/authlogic/session/klass.rb +78 -0
- data/vendor/authlogic/lib/authlogic/session/magic_columns.rb +95 -0
- data/vendor/authlogic/lib/authlogic/session/magic_states.rb +59 -0
- data/vendor/authlogic/lib/authlogic/session/params.rb +101 -0
- data/vendor/authlogic/lib/authlogic/session/password.rb +240 -0
- data/vendor/authlogic/lib/authlogic/session/perishable_token.rb +18 -0
- data/vendor/authlogic/lib/authlogic/session/persistence.rb +70 -0
- data/vendor/authlogic/lib/authlogic/session/priority_record.rb +34 -0
- data/vendor/authlogic/lib/authlogic/session/scopes.rb +101 -0
- data/vendor/authlogic/lib/authlogic/session/session.rb +62 -0
- data/vendor/authlogic/lib/authlogic/session/timeout.rb +82 -0
- data/vendor/authlogic/lib/authlogic/session/unauthorized_record.rb +50 -0
- data/vendor/authlogic/lib/authlogic/session/validation.rb +82 -0
- data/vendor/authlogic/lib/authlogic/test_case.rb +120 -0
- data/vendor/authlogic/lib/authlogic/test_case/mock_controller.rb +45 -0
- data/vendor/authlogic/lib/authlogic/test_case/mock_cookie_jar.rb +14 -0
- data/vendor/authlogic/lib/authlogic/test_case/mock_logger.rb +10 -0
- data/vendor/authlogic/lib/authlogic/test_case/mock_request.rb +19 -0
- data/vendor/authlogic/lib/authlogic/test_case/rails_request_adapter.rb +30 -0
- data/vendor/authlogic/rails/init.rb +1 -0
- data/vendor/authlogic/shoulda_macros/authlogic.rb +69 -0
- data/vendor/authlogic/test/acts_as_authentic_test/base_test.rb +18 -0
- data/vendor/authlogic/test/acts_as_authentic_test/email_test.rb +97 -0
- data/vendor/authlogic/test/acts_as_authentic_test/logged_in_status_test.rb +36 -0
- data/vendor/authlogic/test/acts_as_authentic_test/login_test.rb +109 -0
- data/vendor/authlogic/test/acts_as_authentic_test/magic_columns_test.rb +27 -0
- data/vendor/authlogic/test/acts_as_authentic_test/password_test.rb +236 -0
- data/vendor/authlogic/test/acts_as_authentic_test/perishable_token_test.rb +90 -0
- data/vendor/authlogic/test/acts_as_authentic_test/persistence_token_test.rb +55 -0
- data/vendor/authlogic/test/acts_as_authentic_test/restful_authentication_test.rb +40 -0
- data/vendor/authlogic/test/acts_as_authentic_test/session_maintenance_test.rb +84 -0
- data/vendor/authlogic/test/acts_as_authentic_test/single_access_test.rb +44 -0
- data/vendor/authlogic/test/authenticates_many_test.rb +16 -0
- data/vendor/authlogic/test/crypto_provider_test/aes256_test.rb +14 -0
- data/vendor/authlogic/test/crypto_provider_test/bcrypt_test.rb +14 -0
- data/vendor/authlogic/test/crypto_provider_test/sha1_test.rb +23 -0
- data/vendor/authlogic/test/crypto_provider_test/sha256_test.rb +14 -0
- data/vendor/authlogic/test/crypto_provider_test/sha512_test.rb +14 -0
- data/vendor/authlogic/test/fixtures/companies.yml +5 -0
- data/vendor/authlogic/test/fixtures/employees.yml +17 -0
- data/vendor/authlogic/test/fixtures/projects.yml +3 -0
- data/vendor/authlogic/test/fixtures/users.yml +24 -0
- data/vendor/authlogic/test/i18n_test.rb +33 -0
- data/vendor/authlogic/test/libs/affiliate.rb +7 -0
- data/vendor/authlogic/test/libs/company.rb +6 -0
- data/vendor/authlogic/test/libs/employee.rb +7 -0
- data/vendor/authlogic/test/libs/employee_session.rb +2 -0
- data/vendor/authlogic/test/libs/ldaper.rb +3 -0
- data/vendor/authlogic/test/libs/ordered_hash.rb +9 -0
- data/vendor/authlogic/test/libs/project.rb +3 -0
- data/vendor/authlogic/test/libs/user.rb +5 -0
- data/vendor/authlogic/test/libs/user_session.rb +6 -0
- data/vendor/authlogic/test/random_test.rb +49 -0
- data/vendor/authlogic/test/session_test/activation_test.rb +43 -0
- data/vendor/authlogic/test/session_test/active_record_trickery_test.rb +36 -0
- data/vendor/authlogic/test/session_test/brute_force_protection_test.rb +101 -0
- data/vendor/authlogic/test/session_test/callbacks_test.rb +6 -0
- data/vendor/authlogic/test/session_test/cookies_test.rb +112 -0
- data/vendor/authlogic/test/session_test/credentials_test.rb +0 -0
- data/vendor/authlogic/test/session_test/existence_test.rb +64 -0
- data/vendor/authlogic/test/session_test/http_auth_test.rb +28 -0
- data/vendor/authlogic/test/session_test/id_test.rb +17 -0
- data/vendor/authlogic/test/session_test/klass_test.rb +40 -0
- data/vendor/authlogic/test/session_test/magic_columns_test.rb +62 -0
- data/vendor/authlogic/test/session_test/magic_states_test.rb +60 -0
- data/vendor/authlogic/test/session_test/params_test.rb +53 -0
- data/vendor/authlogic/test/session_test/password_test.rb +106 -0
- data/vendor/authlogic/test/session_test/perishability_test.rb +15 -0
- data/vendor/authlogic/test/session_test/persistence_test.rb +21 -0
- data/vendor/authlogic/test/session_test/scopes_test.rb +60 -0
- data/vendor/authlogic/test/session_test/session_test.rb +59 -0
- data/vendor/authlogic/test/session_test/timeout_test.rb +52 -0
- data/vendor/authlogic/test/session_test/unauthorized_record_test.rb +13 -0
- data/vendor/authlogic/test/session_test/validation_test.rb +23 -0
- data/vendor/authlogic/test/test_helper.rb +182 -0
- metadata +325 -0
data/public/js/index.js
ADDED
@@ -0,0 +1,126 @@
|
|
1
|
+
// Case-insensitive version of contains selector
|
2
|
+
jQuery.expr[':'].Contains = function(a,i,m){
|
3
|
+
return jQuery(a).text().toUpperCase().indexOf(m[3].toUpperCase()) > -1;
|
4
|
+
};
|
5
|
+
|
6
|
+
jQuery(function($) {
|
7
|
+
var h2 = $('h2');
|
8
|
+
var new_test = $('#new_test');
|
9
|
+
var tables = $('.table');
|
10
|
+
|
11
|
+
// Toggle new test
|
12
|
+
$('a', h2).click(toggleNewTest);
|
13
|
+
$('.cancel', new_test).click(toggleNewTest);
|
14
|
+
|
15
|
+
// New test submit
|
16
|
+
$('form', new_test).submit(validate);
|
17
|
+
|
18
|
+
// Search submit
|
19
|
+
$('#search form').submit(function() {
|
20
|
+
var value = $.trim($('input', this).val());
|
21
|
+
tables.hide();
|
22
|
+
$(".table:has(.search:Contains('" + value + "'))").show();
|
23
|
+
return false;
|
24
|
+
});
|
25
|
+
|
26
|
+
// Delete test
|
27
|
+
$('.title .last').click(function() {
|
28
|
+
var question = [
|
29
|
+
"Are you sure you want to delete this test?\n\n",
|
30
|
+
"All variant data will be deleted.\n"
|
31
|
+
].join('');
|
32
|
+
if (confirm(question))
|
33
|
+
window.location.href = '/tests/' + id($(this).parents('.ab_test')) + '/destroy';
|
34
|
+
});
|
35
|
+
|
36
|
+
// Delete variant
|
37
|
+
$('.ab_variant .last').click(function() {
|
38
|
+
if (confirm("Are you sure you want to delete this variant?"))
|
39
|
+
window.location.href = '/variants/' + id($(this).parent()) + '/destroy';
|
40
|
+
});
|
41
|
+
|
42
|
+
// Edit test
|
43
|
+
$('.ab_test .edit').click(function() {
|
44
|
+
var container = $(this).parents('.ab_test');
|
45
|
+
var rows = $('.rows', container);
|
46
|
+
// Hide rows
|
47
|
+
rows.hide();
|
48
|
+
// Remove old edit container
|
49
|
+
$('.edit_container', container).remove();
|
50
|
+
// Create form
|
51
|
+
rows.before($('#edit_template').val().replace(':id', id(container)));
|
52
|
+
// Update form inputs
|
53
|
+
var data = eval('(' + $('.data', container).html() + ')');
|
54
|
+
var inputs = $('input[type=text]', container);
|
55
|
+
$(inputs.get(0)).val(data.name);
|
56
|
+
$(inputs.get(1)).val(data.ticket_url);
|
57
|
+
$(inputs.get(2)).val(data.variant_names.join(', '));
|
58
|
+
// Bind tooltips
|
59
|
+
tooltip(container);
|
60
|
+
// Bind form
|
61
|
+
$('form', container).submit(validate);
|
62
|
+
$('.cancel', container).click(function() {
|
63
|
+
$('.edit_container', container).remove();
|
64
|
+
rows.show();
|
65
|
+
return false;
|
66
|
+
});
|
67
|
+
return false;
|
68
|
+
});
|
69
|
+
|
70
|
+
// Focus first input
|
71
|
+
$('input:visible').get(0).focus();
|
72
|
+
|
73
|
+
// Bind tooltip
|
74
|
+
tooltip();
|
75
|
+
|
76
|
+
// Methods
|
77
|
+
function id(el) {
|
78
|
+
return $(el).attr("id").replace(/\D/g, "");
|
79
|
+
}
|
80
|
+
|
81
|
+
function toggleNewTest() {
|
82
|
+
h2.toggle();
|
83
|
+
new_test.toggle();
|
84
|
+
if (new_test.is(':visible'))
|
85
|
+
$('input:first', new_test).focus();
|
86
|
+
return false;
|
87
|
+
}
|
88
|
+
|
89
|
+
function tooltip(el) {
|
90
|
+
var x = 5, y = 15, el, html;
|
91
|
+
$(".tooltip", el).hover(
|
92
|
+
function(e) {
|
93
|
+
html = $(this).data('title');
|
94
|
+
$("#tooltip").remove();
|
95
|
+
if (!html) {
|
96
|
+
html = $('#tooltip_' + $(this).attr('title')).val();
|
97
|
+
$(this).data('title', html);
|
98
|
+
$(this).attr('title', '');
|
99
|
+
}
|
100
|
+
$("body").append("<div id='tooltip' class='notice'>" + html + "</div>");
|
101
|
+
$("#tooltip")
|
102
|
+
.css("top", (e.pageY + y) + "px")
|
103
|
+
.css("left", (e.pageX + x) + "px")
|
104
|
+
.fadeIn("fast");
|
105
|
+
},
|
106
|
+
function() {
|
107
|
+
$("#tooltip").remove();
|
108
|
+
}
|
109
|
+
);
|
110
|
+
$(".tooltip", el).mousemove(function(e) {
|
111
|
+
$("#tooltip")
|
112
|
+
.css("top", (e.pageY + y) + "px")
|
113
|
+
.css("left", (e.pageX + x) + "px");
|
114
|
+
});
|
115
|
+
}
|
116
|
+
|
117
|
+
function validate() {
|
118
|
+
$('input:text', this).css('background-color', '#FFFFFF');
|
119
|
+
var inputs = $('input:text[value=]', this)
|
120
|
+
.css('background-color', '#FBE3E4');
|
121
|
+
if (inputs.length) {
|
122
|
+
inputs.get(0).focus();
|
123
|
+
return false;
|
124
|
+
}
|
125
|
+
}
|
126
|
+
});
|
data/public/js/jquery.js
ADDED
@@ -0,0 +1,19 @@
|
|
1
|
+
/*
|
2
|
+
* jQuery JavaScript Library v1.3.2
|
3
|
+
* http://jquery.com/
|
4
|
+
*
|
5
|
+
* Copyright (c) 2009 John Resig
|
6
|
+
* Dual licensed under the MIT and GPL licenses.
|
7
|
+
* http://docs.jquery.com/License
|
8
|
+
*
|
9
|
+
* Date: 2009-02-19 17:34:21 -0500 (Thu, 19 Feb 2009)
|
10
|
+
* Revision: 6246
|
11
|
+
*/
|
12
|
+
(function(){var l=this,g,y=l.jQuery,p=l.$,o=l.jQuery=l.$=function(E,F){return new o.fn.init(E,F)},D=/^[^<]*(<(.|\s)+>)[^>]*$|^#([\w-]+)$/,f=/^.[^:#\[\.,]*$/;o.fn=o.prototype={init:function(E,H){E=E||document;if(E.nodeType){this[0]=E;this.length=1;this.context=E;return this}if(typeof E==="string"){var G=D.exec(E);if(G&&(G[1]||!H)){if(G[1]){E=o.clean([G[1]],H)}else{var I=document.getElementById(G[3]);if(I&&I.id!=G[3]){return o().find(E)}var F=o(I||[]);F.context=document;F.selector=E;return F}}else{return o(H).find(E)}}else{if(o.isFunction(E)){return o(document).ready(E)}}if(E.selector&&E.context){this.selector=E.selector;this.context=E.context}return this.setArray(o.isArray(E)?E:o.makeArray(E))},selector:"",jquery:"1.3.2",size:function(){return this.length},get:function(E){return E===g?Array.prototype.slice.call(this):this[E]},pushStack:function(F,H,E){var G=o(F);G.prevObject=this;G.context=this.context;if(H==="find"){G.selector=this.selector+(this.selector?" ":"")+E}else{if(H){G.selector=this.selector+"."+H+"("+E+")"}}return G},setArray:function(E){this.length=0;Array.prototype.push.apply(this,E);return this},each:function(F,E){return o.each(this,F,E)},index:function(E){return o.inArray(E&&E.jquery?E[0]:E,this)},attr:function(F,H,G){var E=F;if(typeof F==="string"){if(H===g){return this[0]&&o[G||"attr"](this[0],F)}else{E={};E[F]=H}}return this.each(function(I){for(F in E){o.attr(G?this.style:this,F,o.prop(this,E[F],G,I,F))}})},css:function(E,F){if((E=="width"||E=="height")&&parseFloat(F)<0){F=g}return this.attr(E,F,"curCSS")},text:function(F){if(typeof F!=="object"&&F!=null){return this.empty().append((this[0]&&this[0].ownerDocument||document).createTextNode(F))}var E="";o.each(F||this,function(){o.each(this.childNodes,function(){if(this.nodeType!=8){E+=this.nodeType!=1?this.nodeValue:o.fn.text([this])}})});return E},wrapAll:function(E){if(this[0]){var F=o(E,this[0].ownerDocument).clone();if(this[0].parentNode){F.insertBefore(this[0])}F.map(function(){var G=this;while(G.firstChild){G=G.firstChild}return G}).append(this)}return this},wrapInner:function(E){return this.each(function(){o(this).contents().wrapAll(E)})},wrap:function(E){return this.each(function(){o(this).wrapAll(E)})},append:function(){return this.domManip(arguments,true,function(E){if(this.nodeType==1){this.appendChild(E)}})},prepend:function(){return this.domManip(arguments,true,function(E){if(this.nodeType==1){this.insertBefore(E,this.firstChild)}})},before:function(){return this.domManip(arguments,false,function(E){this.parentNode.insertBefore(E,this)})},after:function(){return this.domManip(arguments,false,function(E){this.parentNode.insertBefore(E,this.nextSibling)})},end:function(){return this.prevObject||o([])},push:[].push,sort:[].sort,splice:[].splice,find:function(E){if(this.length===1){var F=this.pushStack([],"find",E);F.length=0;o.find(E,this[0],F);return F}else{return this.pushStack(o.unique(o.map(this,function(G){return o.find(E,G)})),"find",E)}},clone:function(G){var E=this.map(function(){if(!o.support.noCloneEvent&&!o.isXMLDoc(this)){var I=this.outerHTML;if(!I){var J=this.ownerDocument.createElement("div");J.appendChild(this.cloneNode(true));I=J.innerHTML}return o.clean([I.replace(/ jQuery\d+="(?:\d+|null)"/g,"").replace(/^\s*/,"")])[0]}else{return this.cloneNode(true)}});if(G===true){var H=this.find("*").andSelf(),F=0;E.find("*").andSelf().each(function(){if(this.nodeName!==H[F].nodeName){return}var I=o.data(H[F],"events");for(var K in I){for(var J in I[K]){o.event.add(this,K,I[K][J],I[K][J].data)}}F++})}return E},filter:function(E){return this.pushStack(o.isFunction(E)&&o.grep(this,function(G,F){return E.call(G,F)})||o.multiFilter(E,o.grep(this,function(F){return F.nodeType===1})),"filter",E)},closest:function(E){var G=o.expr.match.POS.test(E)?o(E):null,F=0;return this.map(function(){var H=this;while(H&&H.ownerDocument){if(G?G.index(H)>-1:o(H).is(E)){o.data(H,"closest",F);return H}H=H.parentNode;F++}})},not:function(E){if(typeof E==="string"){if(f.test(E)){return this.pushStack(o.multiFilter(E,this,true),"not",E)}else{E=o.multiFilter(E,this)}}var F=E.length&&E[E.length-1]!==g&&!E.nodeType;return this.filter(function(){return F?o.inArray(this,E)<0:this!=E})},add:function(E){return this.pushStack(o.unique(o.merge(this.get(),typeof E==="string"?o(E):o.makeArray(E))))},is:function(E){return !!E&&o.multiFilter(E,this).length>0},hasClass:function(E){return !!E&&this.is("."+E)},val:function(K){if(K===g){var E=this[0];if(E){if(o.nodeName(E,"option")){return(E.attributes.value||{}).specified?E.value:E.text}if(o.nodeName(E,"select")){var I=E.selectedIndex,L=[],M=E.options,H=E.type=="select-one";if(I<0){return null}for(var F=H?I:0,J=H?I+1:M.length;F<J;F++){var G=M[F];if(G.selected){K=o(G).val();if(H){return K}L.push(K)}}return L}return(E.value||"").replace(/\r/g,"")}return g}if(typeof K==="number"){K+=""}return this.each(function(){if(this.nodeType!=1){return}if(o.isArray(K)&&/radio|checkbox/.test(this.type)){this.checked=(o.inArray(this.value,K)>=0||o.inArray(this.name,K)>=0)}else{if(o.nodeName(this,"select")){var N=o.makeArray(K);o("option",this).each(function(){this.selected=(o.inArray(this.value,N)>=0||o.inArray(this.text,N)>=0)});if(!N.length){this.selectedIndex=-1}}else{this.value=K}}})},html:function(E){return E===g?(this[0]?this[0].innerHTML.replace(/ jQuery\d+="(?:\d+|null)"/g,""):null):this.empty().append(E)},replaceWith:function(E){return this.after(E).remove()},eq:function(E){return this.slice(E,+E+1)},slice:function(){return this.pushStack(Array.prototype.slice.apply(this,arguments),"slice",Array.prototype.slice.call(arguments).join(","))},map:function(E){return this.pushStack(o.map(this,function(G,F){return E.call(G,F,G)}))},andSelf:function(){return this.add(this.prevObject)},domManip:function(J,M,L){if(this[0]){var I=(this[0].ownerDocument||this[0]).createDocumentFragment(),F=o.clean(J,(this[0].ownerDocument||this[0]),I),H=I.firstChild;if(H){for(var G=0,E=this.length;G<E;G++){L.call(K(this[G],H),this.length>1||G>0?I.cloneNode(true):I)}}if(F){o.each(F,z)}}return this;function K(N,O){return M&&o.nodeName(N,"table")&&o.nodeName(O,"tr")?(N.getElementsByTagName("tbody")[0]||N.appendChild(N.ownerDocument.createElement("tbody"))):N}}};o.fn.init.prototype=o.fn;function z(E,F){if(F.src){o.ajax({url:F.src,async:false,dataType:"script"})}else{o.globalEval(F.text||F.textContent||F.innerHTML||"")}if(F.parentNode){F.parentNode.removeChild(F)}}function e(){return +new Date}o.extend=o.fn.extend=function(){var J=arguments[0]||{},H=1,I=arguments.length,E=false,G;if(typeof J==="boolean"){E=J;J=arguments[1]||{};H=2}if(typeof J!=="object"&&!o.isFunction(J)){J={}}if(I==H){J=this;--H}for(;H<I;H++){if((G=arguments[H])!=null){for(var F in G){var K=J[F],L=G[F];if(J===L){continue}if(E&&L&&typeof L==="object"&&!L.nodeType){J[F]=o.extend(E,K||(L.length!=null?[]:{}),L)}else{if(L!==g){J[F]=L}}}}}return J};var b=/z-?index|font-?weight|opacity|zoom|line-?height/i,q=document.defaultView||{},s=Object.prototype.toString;o.extend({noConflict:function(E){l.$=p;if(E){l.jQuery=y}return o},isFunction:function(E){return s.call(E)==="[object Function]"},isArray:function(E){return s.call(E)==="[object Array]"},isXMLDoc:function(E){return E.nodeType===9&&E.documentElement.nodeName!=="HTML"||!!E.ownerDocument&&o.isXMLDoc(E.ownerDocument)},globalEval:function(G){if(G&&/\S/.test(G)){var F=document.getElementsByTagName("head")[0]||document.documentElement,E=document.createElement("script");E.type="text/javascript";if(o.support.scriptEval){E.appendChild(document.createTextNode(G))}else{E.text=G}F.insertBefore(E,F.firstChild);F.removeChild(E)}},nodeName:function(F,E){return F.nodeName&&F.nodeName.toUpperCase()==E.toUpperCase()},each:function(G,K,F){var E,H=0,I=G.length;if(F){if(I===g){for(E in G){if(K.apply(G[E],F)===false){break}}}else{for(;H<I;){if(K.apply(G[H++],F)===false){break}}}}else{if(I===g){for(E in G){if(K.call(G[E],E,G[E])===false){break}}}else{for(var J=G[0];H<I&&K.call(J,H,J)!==false;J=G[++H]){}}}return G},prop:function(H,I,G,F,E){if(o.isFunction(I)){I=I.call(H,F)}return typeof I==="number"&&G=="curCSS"&&!b.test(E)?I+"px":I},className:{add:function(E,F){o.each((F||"").split(/\s+/),function(G,H){if(E.nodeType==1&&!o.className.has(E.className,H)){E.className+=(E.className?" ":"")+H}})},remove:function(E,F){if(E.nodeType==1){E.className=F!==g?o.grep(E.className.split(/\s+/),function(G){return !o.className.has(F,G)}).join(" "):""}},has:function(F,E){return F&&o.inArray(E,(F.className||F).toString().split(/\s+/))>-1}},swap:function(H,G,I){var E={};for(var F in G){E[F]=H.style[F];H.style[F]=G[F]}I.call(H);for(var F in G){H.style[F]=E[F]}},css:function(H,F,J,E){if(F=="width"||F=="height"){var L,G={position:"absolute",visibility:"hidden",display:"block"},K=F=="width"?["Left","Right"]:["Top","Bottom"];function I(){L=F=="width"?H.offsetWidth:H.offsetHeight;if(E==="border"){return}o.each(K,function(){if(!E){L-=parseFloat(o.curCSS(H,"padding"+this,true))||0}if(E==="margin"){L+=parseFloat(o.curCSS(H,"margin"+this,true))||0}else{L-=parseFloat(o.curCSS(H,"border"+this+"Width",true))||0}})}if(H.offsetWidth!==0){I()}else{o.swap(H,G,I)}return Math.max(0,Math.round(L))}return o.curCSS(H,F,J)},curCSS:function(I,F,G){var L,E=I.style;if(F=="opacity"&&!o.support.opacity){L=o.attr(E,"opacity");return L==""?"1":L}if(F.match(/float/i)){F=w}if(!G&&E&&E[F]){L=E[F]}else{if(q.getComputedStyle){if(F.match(/float/i)){F="float"}F=F.replace(/([A-Z])/g,"-$1").toLowerCase();var M=q.getComputedStyle(I,null);if(M){L=M.getPropertyValue(F)}if(F=="opacity"&&L==""){L="1"}}else{if(I.currentStyle){var J=F.replace(/\-(\w)/g,function(N,O){return O.toUpperCase()});L=I.currentStyle[F]||I.currentStyle[J];if(!/^\d+(px)?$/i.test(L)&&/^\d/.test(L)){var H=E.left,K=I.runtimeStyle.left;I.runtimeStyle.left=I.currentStyle.left;E.left=L||0;L=E.pixelLeft+"px";E.left=H;I.runtimeStyle.left=K}}}}return L},clean:function(F,K,I){K=K||document;if(typeof K.createElement==="undefined"){K=K.ownerDocument||K[0]&&K[0].ownerDocument||document}if(!I&&F.length===1&&typeof F[0]==="string"){var H=/^<(\w+)\s*\/?>$/.exec(F[0]);if(H){return[K.createElement(H[1])]}}var G=[],E=[],L=K.createElement("div");o.each(F,function(P,S){if(typeof S==="number"){S+=""}if(!S){return}if(typeof S==="string"){S=S.replace(/(<(\w+)[^>]*?)\/>/g,function(U,V,T){return T.match(/^(abbr|br|col|img|input|link|meta|param|hr|area|embed)$/i)?U:V+"></"+T+">"});var O=S.replace(/^\s+/,"").substring(0,10).toLowerCase();var Q=!O.indexOf("<opt")&&[1,"<select multiple='multiple'>","</select>"]||!O.indexOf("<leg")&&[1,"<fieldset>","</fieldset>"]||O.match(/^<(thead|tbody|tfoot|colg|cap)/)&&[1,"<table>","</table>"]||!O.indexOf("<tr")&&[2,"<table><tbody>","</tbody></table>"]||(!O.indexOf("<td")||!O.indexOf("<th"))&&[3,"<table><tbody><tr>","</tr></tbody></table>"]||!O.indexOf("<col")&&[2,"<table><tbody></tbody><colgroup>","</colgroup></table>"]||!o.support.htmlSerialize&&[1,"div<div>","</div>"]||[0,"",""];L.innerHTML=Q[1]+S+Q[2];while(Q[0]--){L=L.lastChild}if(!o.support.tbody){var R=/<tbody/i.test(S),N=!O.indexOf("<table")&&!R?L.firstChild&&L.firstChild.childNodes:Q[1]=="<table>"&&!R?L.childNodes:[];for(var M=N.length-1;M>=0;--M){if(o.nodeName(N[M],"tbody")&&!N[M].childNodes.length){N[M].parentNode.removeChild(N[M])}}}if(!o.support.leadingWhitespace&&/^\s/.test(S)){L.insertBefore(K.createTextNode(S.match(/^\s*/)[0]),L.firstChild)}S=o.makeArray(L.childNodes)}if(S.nodeType){G.push(S)}else{G=o.merge(G,S)}});if(I){for(var J=0;G[J];J++){if(o.nodeName(G[J],"script")&&(!G[J].type||G[J].type.toLowerCase()==="text/javascript")){E.push(G[J].parentNode?G[J].parentNode.removeChild(G[J]):G[J])}else{if(G[J].nodeType===1){G.splice.apply(G,[J+1,0].concat(o.makeArray(G[J].getElementsByTagName("script"))))}I.appendChild(G[J])}}return E}return G},attr:function(J,G,K){if(!J||J.nodeType==3||J.nodeType==8){return g}var H=!o.isXMLDoc(J),L=K!==g;G=H&&o.props[G]||G;if(J.tagName){var F=/href|src|style/.test(G);if(G=="selected"&&J.parentNode){J.parentNode.selectedIndex}if(G in J&&H&&!F){if(L){if(G=="type"&&o.nodeName(J,"input")&&J.parentNode){throw"type property can't be changed"}J[G]=K}if(o.nodeName(J,"form")&&J.getAttributeNode(G)){return J.getAttributeNode(G).nodeValue}if(G=="tabIndex"){var I=J.getAttributeNode("tabIndex");return I&&I.specified?I.value:J.nodeName.match(/(button|input|object|select|textarea)/i)?0:J.nodeName.match(/^(a|area)$/i)&&J.href?0:g}return J[G]}if(!o.support.style&&H&&G=="style"){return o.attr(J.style,"cssText",K)}if(L){J.setAttribute(G,""+K)}var E=!o.support.hrefNormalized&&H&&F?J.getAttribute(G,2):J.getAttribute(G);return E===null?g:E}if(!o.support.opacity&&G=="opacity"){if(L){J.zoom=1;J.filter=(J.filter||"").replace(/alpha\([^)]*\)/,"")+(parseInt(K)+""=="NaN"?"":"alpha(opacity="+K*100+")")}return J.filter&&J.filter.indexOf("opacity=")>=0?(parseFloat(J.filter.match(/opacity=([^)]*)/)[1])/100)+"":""}G=G.replace(/-([a-z])/ig,function(M,N){return N.toUpperCase()});if(L){J[G]=K}return J[G]},trim:function(E){return(E||"").replace(/^\s+|\s+$/g,"")},makeArray:function(G){var E=[];if(G!=null){var F=G.length;if(F==null||typeof G==="string"||o.isFunction(G)||G.setInterval){E[0]=G}else{while(F){E[--F]=G[F]}}}return E},inArray:function(G,H){for(var E=0,F=H.length;E<F;E++){if(H[E]===G){return E}}return -1},merge:function(H,E){var F=0,G,I=H.length;if(!o.support.getAll){while((G=E[F++])!=null){if(G.nodeType!=8){H[I++]=G}}}else{while((G=E[F++])!=null){H[I++]=G}}return H},unique:function(K){var F=[],E={};try{for(var G=0,H=K.length;G<H;G++){var J=o.data(K[G]);if(!E[J]){E[J]=true;F.push(K[G])}}}catch(I){F=K}return F},grep:function(F,J,E){var G=[];for(var H=0,I=F.length;H<I;H++){if(!E!=!J(F[H],H)){G.push(F[H])}}return G},map:function(E,J){var F=[];for(var G=0,H=E.length;G<H;G++){var I=J(E[G],G);if(I!=null){F[F.length]=I}}return F.concat.apply([],F)}});var C=navigator.userAgent.toLowerCase();o.browser={version:(C.match(/.+(?:rv|it|ra|ie)[\/: ]([\d.]+)/)||[0,"0"])[1],safari:/webkit/.test(C),opera:/opera/.test(C),msie:/msie/.test(C)&&!/opera/.test(C),mozilla:/mozilla/.test(C)&&!/(compatible|webkit)/.test(C)};o.each({parent:function(E){return E.parentNode},parents:function(E){return o.dir(E,"parentNode")},next:function(E){return o.nth(E,2,"nextSibling")},prev:function(E){return o.nth(E,2,"previousSibling")},nextAll:function(E){return o.dir(E,"nextSibling")},prevAll:function(E){return o.dir(E,"previousSibling")},siblings:function(E){return o.sibling(E.parentNode.firstChild,E)},children:function(E){return o.sibling(E.firstChild)},contents:function(E){return o.nodeName(E,"iframe")?E.contentDocument||E.contentWindow.document:o.makeArray(E.childNodes)}},function(E,F){o.fn[E]=function(G){var H=o.map(this,F);if(G&&typeof G=="string"){H=o.multiFilter(G,H)}return this.pushStack(o.unique(H),E,G)}});o.each({appendTo:"append",prependTo:"prepend",insertBefore:"before",insertAfter:"after",replaceAll:"replaceWith"},function(E,F){o.fn[E]=function(G){var J=[],L=o(G);for(var K=0,H=L.length;K<H;K++){var I=(K>0?this.clone(true):this).get();o.fn[F].apply(o(L[K]),I);J=J.concat(I)}return this.pushStack(J,E,G)}});o.each({removeAttr:function(E){o.attr(this,E,"");if(this.nodeType==1){this.removeAttribute(E)}},addClass:function(E){o.className.add(this,E)},removeClass:function(E){o.className.remove(this,E)},toggleClass:function(F,E){if(typeof E!=="boolean"){E=!o.className.has(this,F)}o.className[E?"add":"remove"](this,F)},remove:function(E){if(!E||o.filter(E,[this]).length){o("*",this).add([this]).each(function(){o.event.remove(this);o.removeData(this)});if(this.parentNode){this.parentNode.removeChild(this)}}},empty:function(){o(this).children().remove();while(this.firstChild){this.removeChild(this.firstChild)}}},function(E,F){o.fn[E]=function(){return this.each(F,arguments)}});function j(E,F){return E[0]&&parseInt(o.curCSS(E[0],F,true),10)||0}var h="jQuery"+e(),v=0,A={};o.extend({cache:{},data:function(F,E,G){F=F==l?A:F;var H=F[h];if(!H){H=F[h]=++v}if(E&&!o.cache[H]){o.cache[H]={}}if(G!==g){o.cache[H][E]=G}return E?o.cache[H][E]:H},removeData:function(F,E){F=F==l?A:F;var H=F[h];if(E){if(o.cache[H]){delete o.cache[H][E];E="";for(E in o.cache[H]){break}if(!E){o.removeData(F)}}}else{try{delete F[h]}catch(G){if(F.removeAttribute){F.removeAttribute(h)}}delete o.cache[H]}},queue:function(F,E,H){if(F){E=(E||"fx")+"queue";var G=o.data(F,E);if(!G||o.isArray(H)){G=o.data(F,E,o.makeArray(H))}else{if(H){G.push(H)}}}return G},dequeue:function(H,G){var E=o.queue(H,G),F=E.shift();if(!G||G==="fx"){F=E[0]}if(F!==g){F.call(H)}}});o.fn.extend({data:function(E,G){var H=E.split(".");H[1]=H[1]?"."+H[1]:"";if(G===g){var F=this.triggerHandler("getData"+H[1]+"!",[H[0]]);if(F===g&&this.length){F=o.data(this[0],E)}return F===g&&H[1]?this.data(H[0]):F}else{return this.trigger("setData"+H[1]+"!",[H[0],G]).each(function(){o.data(this,E,G)})}},removeData:function(E){return this.each(function(){o.removeData(this,E)})},queue:function(E,F){if(typeof E!=="string"){F=E;E="fx"}if(F===g){return o.queue(this[0],E)}return this.each(function(){var G=o.queue(this,E,F);if(E=="fx"&&G.length==1){G[0].call(this)}})},dequeue:function(E){return this.each(function(){o.dequeue(this,E)})}});
|
13
|
+
/*
|
14
|
+
* Sizzle CSS Selector Engine - v0.9.3
|
15
|
+
* Copyright 2009, The Dojo Foundation
|
16
|
+
* Released under the MIT, BSD, and GPL Licenses.
|
17
|
+
* More information: http://sizzlejs.com/
|
18
|
+
*/
|
19
|
+
(function(){var R=/((?:\((?:\([^()]+\)|[^()]+)+\)|\[(?:\[[^[\]]*\]|['"][^'"]*['"]|[^[\]'"]+)+\]|\\.|[^ >+~,(\[\\]+)+|[>+~])(\s*,\s*)?/g,L=0,H=Object.prototype.toString;var F=function(Y,U,ab,ac){ab=ab||[];U=U||document;if(U.nodeType!==1&&U.nodeType!==9){return[]}if(!Y||typeof Y!=="string"){return ab}var Z=[],W,af,ai,T,ad,V,X=true;R.lastIndex=0;while((W=R.exec(Y))!==null){Z.push(W[1]);if(W[2]){V=RegExp.rightContext;break}}if(Z.length>1&&M.exec(Y)){if(Z.length===2&&I.relative[Z[0]]){af=J(Z[0]+Z[1],U)}else{af=I.relative[Z[0]]?[U]:F(Z.shift(),U);while(Z.length){Y=Z.shift();if(I.relative[Y]){Y+=Z.shift()}af=J(Y,af)}}}else{var ae=ac?{expr:Z.pop(),set:E(ac)}:F.find(Z.pop(),Z.length===1&&U.parentNode?U.parentNode:U,Q(U));af=F.filter(ae.expr,ae.set);if(Z.length>0){ai=E(af)}else{X=false}while(Z.length){var ah=Z.pop(),ag=ah;if(!I.relative[ah]){ah=""}else{ag=Z.pop()}if(ag==null){ag=U}I.relative[ah](ai,ag,Q(U))}}if(!ai){ai=af}if(!ai){throw"Syntax error, unrecognized expression: "+(ah||Y)}if(H.call(ai)==="[object Array]"){if(!X){ab.push.apply(ab,ai)}else{if(U.nodeType===1){for(var aa=0;ai[aa]!=null;aa++){if(ai[aa]&&(ai[aa]===true||ai[aa].nodeType===1&&K(U,ai[aa]))){ab.push(af[aa])}}}else{for(var aa=0;ai[aa]!=null;aa++){if(ai[aa]&&ai[aa].nodeType===1){ab.push(af[aa])}}}}}else{E(ai,ab)}if(V){F(V,U,ab,ac);if(G){hasDuplicate=false;ab.sort(G);if(hasDuplicate){for(var aa=1;aa<ab.length;aa++){if(ab[aa]===ab[aa-1]){ab.splice(aa--,1)}}}}}return ab};F.matches=function(T,U){return F(T,null,null,U)};F.find=function(aa,T,ab){var Z,X;if(!aa){return[]}for(var W=0,V=I.order.length;W<V;W++){var Y=I.order[W],X;if((X=I.match[Y].exec(aa))){var U=RegExp.leftContext;if(U.substr(U.length-1)!=="\\"){X[1]=(X[1]||"").replace(/\\/g,"");Z=I.find[Y](X,T,ab);if(Z!=null){aa=aa.replace(I.match[Y],"");break}}}}if(!Z){Z=T.getElementsByTagName("*")}return{set:Z,expr:aa}};F.filter=function(ad,ac,ag,W){var V=ad,ai=[],aa=ac,Y,T,Z=ac&&ac[0]&&Q(ac[0]);while(ad&&ac.length){for(var ab in I.filter){if((Y=I.match[ab].exec(ad))!=null){var U=I.filter[ab],ah,af;T=false;if(aa==ai){ai=[]}if(I.preFilter[ab]){Y=I.preFilter[ab](Y,aa,ag,ai,W,Z);if(!Y){T=ah=true}else{if(Y===true){continue}}}if(Y){for(var X=0;(af=aa[X])!=null;X++){if(af){ah=U(af,Y,X,aa);var ae=W^!!ah;if(ag&&ah!=null){if(ae){T=true}else{aa[X]=false}}else{if(ae){ai.push(af);T=true}}}}}if(ah!==g){if(!ag){aa=ai}ad=ad.replace(I.match[ab],"");if(!T){return[]}break}}}if(ad==V){if(T==null){throw"Syntax error, unrecognized expression: "+ad}else{break}}V=ad}return aa};var I=F.selectors={order:["ID","NAME","TAG"],match:{ID:/#((?:[\w\u00c0-\uFFFF_-]|\\.)+)/,CLASS:/\.((?:[\w\u00c0-\uFFFF_-]|\\.)+)/,NAME:/\[name=['"]*((?:[\w\u00c0-\uFFFF_-]|\\.)+)['"]*\]/,ATTR:/\[\s*((?:[\w\u00c0-\uFFFF_-]|\\.)+)\s*(?:(\S?=)\s*(['"]*)(.*?)\3|)\s*\]/,TAG:/^((?:[\w\u00c0-\uFFFF\*_-]|\\.)+)/,CHILD:/:(only|nth|last|first)-child(?:\((even|odd|[\dn+-]*)\))?/,POS:/:(nth|eq|gt|lt|first|last|even|odd)(?:\((\d*)\))?(?=[^-]|$)/,PSEUDO:/:((?:[\w\u00c0-\uFFFF_-]|\\.)+)(?:\((['"]*)((?:\([^\)]+\)|[^\2\(\)]*)+)\2\))?/},attrMap:{"class":"className","for":"htmlFor"},attrHandle:{href:function(T){return T.getAttribute("href")}},relative:{"+":function(aa,T,Z){var X=typeof T==="string",ab=X&&!/\W/.test(T),Y=X&&!ab;if(ab&&!Z){T=T.toUpperCase()}for(var W=0,V=aa.length,U;W<V;W++){if((U=aa[W])){while((U=U.previousSibling)&&U.nodeType!==1){}aa[W]=Y||U&&U.nodeName===T?U||false:U===T}}if(Y){F.filter(T,aa,true)}},">":function(Z,U,aa){var X=typeof U==="string";if(X&&!/\W/.test(U)){U=aa?U:U.toUpperCase();for(var V=0,T=Z.length;V<T;V++){var Y=Z[V];if(Y){var W=Y.parentNode;Z[V]=W.nodeName===U?W:false}}}else{for(var V=0,T=Z.length;V<T;V++){var Y=Z[V];if(Y){Z[V]=X?Y.parentNode:Y.parentNode===U}}if(X){F.filter(U,Z,true)}}},"":function(W,U,Y){var V=L++,T=S;if(!U.match(/\W/)){var X=U=Y?U:U.toUpperCase();T=P}T("parentNode",U,V,W,X,Y)},"~":function(W,U,Y){var V=L++,T=S;if(typeof U==="string"&&!U.match(/\W/)){var X=U=Y?U:U.toUpperCase();T=P}T("previousSibling",U,V,W,X,Y)}},find:{ID:function(U,V,W){if(typeof V.getElementById!=="undefined"&&!W){var T=V.getElementById(U[1]);return T?[T]:[]}},NAME:function(V,Y,Z){if(typeof Y.getElementsByName!=="undefined"){var U=[],X=Y.getElementsByName(V[1]);for(var W=0,T=X.length;W<T;W++){if(X[W].getAttribute("name")===V[1]){U.push(X[W])}}return U.length===0?null:U}},TAG:function(T,U){return U.getElementsByTagName(T[1])}},preFilter:{CLASS:function(W,U,V,T,Z,aa){W=" "+W[1].replace(/\\/g,"")+" ";if(aa){return W}for(var X=0,Y;(Y=U[X])!=null;X++){if(Y){if(Z^(Y.className&&(" "+Y.className+" ").indexOf(W)>=0)){if(!V){T.push(Y)}}else{if(V){U[X]=false}}}}return false},ID:function(T){return T[1].replace(/\\/g,"")},TAG:function(U,T){for(var V=0;T[V]===false;V++){}return T[V]&&Q(T[V])?U[1]:U[1].toUpperCase()},CHILD:function(T){if(T[1]=="nth"){var U=/(-?)(\d*)n((?:\+|-)?\d*)/.exec(T[2]=="even"&&"2n"||T[2]=="odd"&&"2n+1"||!/\D/.test(T[2])&&"0n+"+T[2]||T[2]);T[2]=(U[1]+(U[2]||1))-0;T[3]=U[3]-0}T[0]=L++;return T},ATTR:function(X,U,V,T,Y,Z){var W=X[1].replace(/\\/g,"");if(!Z&&I.attrMap[W]){X[1]=I.attrMap[W]}if(X[2]==="~="){X[4]=" "+X[4]+" "}return X},PSEUDO:function(X,U,V,T,Y){if(X[1]==="not"){if(X[3].match(R).length>1||/^\w/.test(X[3])){X[3]=F(X[3],null,null,U)}else{var W=F.filter(X[3],U,V,true^Y);if(!V){T.push.apply(T,W)}return false}}else{if(I.match.POS.test(X[0])||I.match.CHILD.test(X[0])){return true}}return X},POS:function(T){T.unshift(true);return T}},filters:{enabled:function(T){return T.disabled===false&&T.type!=="hidden"},disabled:function(T){return T.disabled===true},checked:function(T){return T.checked===true},selected:function(T){T.parentNode.selectedIndex;return T.selected===true},parent:function(T){return !!T.firstChild},empty:function(T){return !T.firstChild},has:function(V,U,T){return !!F(T[3],V).length},header:function(T){return/h\d/i.test(T.nodeName)},text:function(T){return"text"===T.type},radio:function(T){return"radio"===T.type},checkbox:function(T){return"checkbox"===T.type},file:function(T){return"file"===T.type},password:function(T){return"password"===T.type},submit:function(T){return"submit"===T.type},image:function(T){return"image"===T.type},reset:function(T){return"reset"===T.type},button:function(T){return"button"===T.type||T.nodeName.toUpperCase()==="BUTTON"},input:function(T){return/input|select|textarea|button/i.test(T.nodeName)}},setFilters:{first:function(U,T){return T===0},last:function(V,U,T,W){return U===W.length-1},even:function(U,T){return T%2===0},odd:function(U,T){return T%2===1},lt:function(V,U,T){return U<T[3]-0},gt:function(V,U,T){return U>T[3]-0},nth:function(V,U,T){return T[3]-0==U},eq:function(V,U,T){return T[3]-0==U}},filter:{PSEUDO:function(Z,V,W,aa){var U=V[1],X=I.filters[U];if(X){return X(Z,W,V,aa)}else{if(U==="contains"){return(Z.textContent||Z.innerText||"").indexOf(V[3])>=0}else{if(U==="not"){var Y=V[3];for(var W=0,T=Y.length;W<T;W++){if(Y[W]===Z){return false}}return true}}}},CHILD:function(T,W){var Z=W[1],U=T;switch(Z){case"only":case"first":while(U=U.previousSibling){if(U.nodeType===1){return false}}if(Z=="first"){return true}U=T;case"last":while(U=U.nextSibling){if(U.nodeType===1){return false}}return true;case"nth":var V=W[2],ac=W[3];if(V==1&&ac==0){return true}var Y=W[0],ab=T.parentNode;if(ab&&(ab.sizcache!==Y||!T.nodeIndex)){var X=0;for(U=ab.firstChild;U;U=U.nextSibling){if(U.nodeType===1){U.nodeIndex=++X}}ab.sizcache=Y}var aa=T.nodeIndex-ac;if(V==0){return aa==0}else{return(aa%V==0&&aa/V>=0)}}},ID:function(U,T){return U.nodeType===1&&U.getAttribute("id")===T},TAG:function(U,T){return(T==="*"&&U.nodeType===1)||U.nodeName===T},CLASS:function(U,T){return(" "+(U.className||U.getAttribute("class"))+" ").indexOf(T)>-1},ATTR:function(Y,W){var V=W[1],T=I.attrHandle[V]?I.attrHandle[V](Y):Y[V]!=null?Y[V]:Y.getAttribute(V),Z=T+"",X=W[2],U=W[4];return T==null?X==="!=":X==="="?Z===U:X==="*="?Z.indexOf(U)>=0:X==="~="?(" "+Z+" ").indexOf(U)>=0:!U?Z&&T!==false:X==="!="?Z!=U:X==="^="?Z.indexOf(U)===0:X==="$="?Z.substr(Z.length-U.length)===U:X==="|="?Z===U||Z.substr(0,U.length+1)===U+"-":false},POS:function(X,U,V,Y){var T=U[2],W=I.setFilters[T];if(W){return W(X,V,U,Y)}}}};var M=I.match.POS;for(var O in I.match){I.match[O]=RegExp(I.match[O].source+/(?![^\[]*\])(?![^\(]*\))/.source)}var E=function(U,T){U=Array.prototype.slice.call(U);if(T){T.push.apply(T,U);return T}return U};try{Array.prototype.slice.call(document.documentElement.childNodes)}catch(N){E=function(X,W){var U=W||[];if(H.call(X)==="[object Array]"){Array.prototype.push.apply(U,X)}else{if(typeof X.length==="number"){for(var V=0,T=X.length;V<T;V++){U.push(X[V])}}else{for(var V=0;X[V];V++){U.push(X[V])}}}return U}}var G;if(document.documentElement.compareDocumentPosition){G=function(U,T){var V=U.compareDocumentPosition(T)&4?-1:U===T?0:1;if(V===0){hasDuplicate=true}return V}}else{if("sourceIndex" in document.documentElement){G=function(U,T){var V=U.sourceIndex-T.sourceIndex;if(V===0){hasDuplicate=true}return V}}else{if(document.createRange){G=function(W,U){var V=W.ownerDocument.createRange(),T=U.ownerDocument.createRange();V.selectNode(W);V.collapse(true);T.selectNode(U);T.collapse(true);var X=V.compareBoundaryPoints(Range.START_TO_END,T);if(X===0){hasDuplicate=true}return X}}}}(function(){var U=document.createElement("form"),V="script"+(new Date).getTime();U.innerHTML="<input name='"+V+"'/>";var T=document.documentElement;T.insertBefore(U,T.firstChild);if(!!document.getElementById(V)){I.find.ID=function(X,Y,Z){if(typeof Y.getElementById!=="undefined"&&!Z){var W=Y.getElementById(X[1]);return W?W.id===X[1]||typeof W.getAttributeNode!=="undefined"&&W.getAttributeNode("id").nodeValue===X[1]?[W]:g:[]}};I.filter.ID=function(Y,W){var X=typeof Y.getAttributeNode!=="undefined"&&Y.getAttributeNode("id");return Y.nodeType===1&&X&&X.nodeValue===W}}T.removeChild(U)})();(function(){var T=document.createElement("div");T.appendChild(document.createComment(""));if(T.getElementsByTagName("*").length>0){I.find.TAG=function(U,Y){var X=Y.getElementsByTagName(U[1]);if(U[1]==="*"){var W=[];for(var V=0;X[V];V++){if(X[V].nodeType===1){W.push(X[V])}}X=W}return X}}T.innerHTML="<a href='#'></a>";if(T.firstChild&&typeof T.firstChild.getAttribute!=="undefined"&&T.firstChild.getAttribute("href")!=="#"){I.attrHandle.href=function(U){return U.getAttribute("href",2)}}})();if(document.querySelectorAll){(function(){var T=F,U=document.createElement("div");U.innerHTML="<p class='TEST'></p>";if(U.querySelectorAll&&U.querySelectorAll(".TEST").length===0){return}F=function(Y,X,V,W){X=X||document;if(!W&&X.nodeType===9&&!Q(X)){try{return E(X.querySelectorAll(Y),V)}catch(Z){}}return T(Y,X,V,W)};F.find=T.find;F.filter=T.filter;F.selectors=T.selectors;F.matches=T.matches})()}if(document.getElementsByClassName&&document.documentElement.getElementsByClassName){(function(){var T=document.createElement("div");T.innerHTML="<div class='test e'></div><div class='test'></div>";if(T.getElementsByClassName("e").length===0){return}T.lastChild.className="e";if(T.getElementsByClassName("e").length===1){return}I.order.splice(1,0,"CLASS");I.find.CLASS=function(U,V,W){if(typeof V.getElementsByClassName!=="undefined"&&!W){return V.getElementsByClassName(U[1])}}})()}function P(U,Z,Y,ad,aa,ac){var ab=U=="previousSibling"&&!ac;for(var W=0,V=ad.length;W<V;W++){var T=ad[W];if(T){if(ab&&T.nodeType===1){T.sizcache=Y;T.sizset=W}T=T[U];var X=false;while(T){if(T.sizcache===Y){X=ad[T.sizset];break}if(T.nodeType===1&&!ac){T.sizcache=Y;T.sizset=W}if(T.nodeName===Z){X=T;break}T=T[U]}ad[W]=X}}}function S(U,Z,Y,ad,aa,ac){var ab=U=="previousSibling"&&!ac;for(var W=0,V=ad.length;W<V;W++){var T=ad[W];if(T){if(ab&&T.nodeType===1){T.sizcache=Y;T.sizset=W}T=T[U];var X=false;while(T){if(T.sizcache===Y){X=ad[T.sizset];break}if(T.nodeType===1){if(!ac){T.sizcache=Y;T.sizset=W}if(typeof Z!=="string"){if(T===Z){X=true;break}}else{if(F.filter(Z,[T]).length>0){X=T;break}}}T=T[U]}ad[W]=X}}}var K=document.compareDocumentPosition?function(U,T){return U.compareDocumentPosition(T)&16}:function(U,T){return U!==T&&(U.contains?U.contains(T):true)};var Q=function(T){return T.nodeType===9&&T.documentElement.nodeName!=="HTML"||!!T.ownerDocument&&Q(T.ownerDocument)};var J=function(T,aa){var W=[],X="",Y,V=aa.nodeType?[aa]:aa;while((Y=I.match.PSEUDO.exec(T))){X+=Y[0];T=T.replace(I.match.PSEUDO,"")}T=I.relative[T]?T+"*":T;for(var Z=0,U=V.length;Z<U;Z++){F(T,V[Z],W)}return F.filter(X,W)};o.find=F;o.filter=F.filter;o.expr=F.selectors;o.expr[":"]=o.expr.filters;F.selectors.filters.hidden=function(T){return T.offsetWidth===0||T.offsetHeight===0};F.selectors.filters.visible=function(T){return T.offsetWidth>0||T.offsetHeight>0};F.selectors.filters.animated=function(T){return o.grep(o.timers,function(U){return T===U.elem}).length};o.multiFilter=function(V,T,U){if(U){V=":not("+V+")"}return F.matches(V,T)};o.dir=function(V,U){var T=[],W=V[U];while(W&&W!=document){if(W.nodeType==1){T.push(W)}W=W[U]}return T};o.nth=function(X,T,V,W){T=T||1;var U=0;for(;X;X=X[V]){if(X.nodeType==1&&++U==T){break}}return X};o.sibling=function(V,U){var T=[];for(;V;V=V.nextSibling){if(V.nodeType==1&&V!=U){T.push(V)}}return T};return;l.Sizzle=F})();o.event={add:function(I,F,H,K){if(I.nodeType==3||I.nodeType==8){return}if(I.setInterval&&I!=l){I=l}if(!H.guid){H.guid=this.guid++}if(K!==g){var G=H;H=this.proxy(G);H.data=K}var E=o.data(I,"events")||o.data(I,"events",{}),J=o.data(I,"handle")||o.data(I,"handle",function(){return typeof o!=="undefined"&&!o.event.triggered?o.event.handle.apply(arguments.callee.elem,arguments):g});J.elem=I;o.each(F.split(/\s+/),function(M,N){var O=N.split(".");N=O.shift();H.type=O.slice().sort().join(".");var L=E[N];if(o.event.specialAll[N]){o.event.specialAll[N].setup.call(I,K,O)}if(!L){L=E[N]={};if(!o.event.special[N]||o.event.special[N].setup.call(I,K,O)===false){if(I.addEventListener){I.addEventListener(N,J,false)}else{if(I.attachEvent){I.attachEvent("on"+N,J)}}}}L[H.guid]=H;o.event.global[N]=true});I=null},guid:1,global:{},remove:function(K,H,J){if(K.nodeType==3||K.nodeType==8){return}var G=o.data(K,"events"),F,E;if(G){if(H===g||(typeof H==="string"&&H.charAt(0)==".")){for(var I in G){this.remove(K,I+(H||""))}}else{if(H.type){J=H.handler;H=H.type}o.each(H.split(/\s+/),function(M,O){var Q=O.split(".");O=Q.shift();var N=RegExp("(^|\\.)"+Q.slice().sort().join(".*\\.")+"(\\.|$)");if(G[O]){if(J){delete G[O][J.guid]}else{for(var P in G[O]){if(N.test(G[O][P].type)){delete G[O][P]}}}if(o.event.specialAll[O]){o.event.specialAll[O].teardown.call(K,Q)}for(F in G[O]){break}if(!F){if(!o.event.special[O]||o.event.special[O].teardown.call(K,Q)===false){if(K.removeEventListener){K.removeEventListener(O,o.data(K,"handle"),false)}else{if(K.detachEvent){K.detachEvent("on"+O,o.data(K,"handle"))}}}F=null;delete G[O]}}})}for(F in G){break}if(!F){var L=o.data(K,"handle");if(L){L.elem=null}o.removeData(K,"events");o.removeData(K,"handle")}}},trigger:function(I,K,H,E){var G=I.type||I;if(!E){I=typeof I==="object"?I[h]?I:o.extend(o.Event(G),I):o.Event(G);if(G.indexOf("!")>=0){I.type=G=G.slice(0,-1);I.exclusive=true}if(!H){I.stopPropagation();if(this.global[G]){o.each(o.cache,function(){if(this.events&&this.events[G]){o.event.trigger(I,K,this.handle.elem)}})}}if(!H||H.nodeType==3||H.nodeType==8){return g}I.result=g;I.target=H;K=o.makeArray(K);K.unshift(I)}I.currentTarget=H;var J=o.data(H,"handle");if(J){J.apply(H,K)}if((!H[G]||(o.nodeName(H,"a")&&G=="click"))&&H["on"+G]&&H["on"+G].apply(H,K)===false){I.result=false}if(!E&&H[G]&&!I.isDefaultPrevented()&&!(o.nodeName(H,"a")&&G=="click")){this.triggered=true;try{H[G]()}catch(L){}}this.triggered=false;if(!I.isPropagationStopped()){var F=H.parentNode||H.ownerDocument;if(F){o.event.trigger(I,K,F,true)}}},handle:function(K){var J,E;K=arguments[0]=o.event.fix(K||l.event);K.currentTarget=this;var L=K.type.split(".");K.type=L.shift();J=!L.length&&!K.exclusive;var I=RegExp("(^|\\.)"+L.slice().sort().join(".*\\.")+"(\\.|$)");E=(o.data(this,"events")||{})[K.type];for(var G in E){var H=E[G];if(J||I.test(H.type)){K.handler=H;K.data=H.data;var F=H.apply(this,arguments);if(F!==g){K.result=F;if(F===false){K.preventDefault();K.stopPropagation()}}if(K.isImmediatePropagationStopped()){break}}}},props:"altKey attrChange attrName bubbles button cancelable charCode clientX clientY ctrlKey currentTarget data detail eventPhase fromElement handler keyCode metaKey newValue originalTarget pageX pageY prevValue relatedNode relatedTarget screenX screenY shiftKey srcElement target toElement view wheelDelta which".split(" "),fix:function(H){if(H[h]){return H}var F=H;H=o.Event(F);for(var G=this.props.length,J;G;){J=this.props[--G];H[J]=F[J]}if(!H.target){H.target=H.srcElement||document}if(H.target.nodeType==3){H.target=H.target.parentNode}if(!H.relatedTarget&&H.fromElement){H.relatedTarget=H.fromElement==H.target?H.toElement:H.fromElement}if(H.pageX==null&&H.clientX!=null){var I=document.documentElement,E=document.body;H.pageX=H.clientX+(I&&I.scrollLeft||E&&E.scrollLeft||0)-(I.clientLeft||0);H.pageY=H.clientY+(I&&I.scrollTop||E&&E.scrollTop||0)-(I.clientTop||0)}if(!H.which&&((H.charCode||H.charCode===0)?H.charCode:H.keyCode)){H.which=H.charCode||H.keyCode}if(!H.metaKey&&H.ctrlKey){H.metaKey=H.ctrlKey}if(!H.which&&H.button){H.which=(H.button&1?1:(H.button&2?3:(H.button&4?2:0)))}return H},proxy:function(F,E){E=E||function(){return F.apply(this,arguments)};E.guid=F.guid=F.guid||E.guid||this.guid++;return E},special:{ready:{setup:B,teardown:function(){}}},specialAll:{live:{setup:function(E,F){o.event.add(this,F[0],c)},teardown:function(G){if(G.length){var E=0,F=RegExp("(^|\\.)"+G[0]+"(\\.|$)");o.each((o.data(this,"events").live||{}),function(){if(F.test(this.type)){E++}});if(E<1){o.event.remove(this,G[0],c)}}}}}};o.Event=function(E){if(!this.preventDefault){return new o.Event(E)}if(E&&E.type){this.originalEvent=E;this.type=E.type}else{this.type=E}this.timeStamp=e();this[h]=true};function k(){return false}function u(){return true}o.Event.prototype={preventDefault:function(){this.isDefaultPrevented=u;var E=this.originalEvent;if(!E){return}if(E.preventDefault){E.preventDefault()}E.returnValue=false},stopPropagation:function(){this.isPropagationStopped=u;var E=this.originalEvent;if(!E){return}if(E.stopPropagation){E.stopPropagation()}E.cancelBubble=true},stopImmediatePropagation:function(){this.isImmediatePropagationStopped=u;this.stopPropagation()},isDefaultPrevented:k,isPropagationStopped:k,isImmediatePropagationStopped:k};var a=function(F){var E=F.relatedTarget;while(E&&E!=this){try{E=E.parentNode}catch(G){E=this}}if(E!=this){F.type=F.data;o.event.handle.apply(this,arguments)}};o.each({mouseover:"mouseenter",mouseout:"mouseleave"},function(F,E){o.event.special[E]={setup:function(){o.event.add(this,F,a,E)},teardown:function(){o.event.remove(this,F,a)}}});o.fn.extend({bind:function(F,G,E){return F=="unload"?this.one(F,G,E):this.each(function(){o.event.add(this,F,E||G,E&&G)})},one:function(G,H,F){var E=o.event.proxy(F||H,function(I){o(this).unbind(I,E);return(F||H).apply(this,arguments)});return this.each(function(){o.event.add(this,G,E,F&&H)})},unbind:function(F,E){return this.each(function(){o.event.remove(this,F,E)})},trigger:function(E,F){return this.each(function(){o.event.trigger(E,F,this)})},triggerHandler:function(E,G){if(this[0]){var F=o.Event(E);F.preventDefault();F.stopPropagation();o.event.trigger(F,G,this[0]);return F.result}},toggle:function(G){var E=arguments,F=1;while(F<E.length){o.event.proxy(G,E[F++])}return this.click(o.event.proxy(G,function(H){this.lastToggle=(this.lastToggle||0)%F;H.preventDefault();return E[this.lastToggle++].apply(this,arguments)||false}))},hover:function(E,F){return this.mouseenter(E).mouseleave(F)},ready:function(E){B();if(o.isReady){E.call(document,o)}else{o.readyList.push(E)}return this},live:function(G,F){var E=o.event.proxy(F);E.guid+=this.selector+G;o(document).bind(i(G,this.selector),this.selector,E);return this},die:function(F,E){o(document).unbind(i(F,this.selector),E?{guid:E.guid+this.selector+F}:null);return this}});function c(H){var E=RegExp("(^|\\.)"+H.type+"(\\.|$)"),G=true,F=[];o.each(o.data(this,"events").live||[],function(I,J){if(E.test(J.type)){var K=o(H.target).closest(J.data)[0];if(K){F.push({elem:K,fn:J})}}});F.sort(function(J,I){return o.data(J.elem,"closest")-o.data(I.elem,"closest")});o.each(F,function(){if(this.fn.call(this.elem,H,this.fn.data)===false){return(G=false)}});return G}function i(F,E){return["live",F,E.replace(/\./g,"`").replace(/ /g,"|")].join(".")}o.extend({isReady:false,readyList:[],ready:function(){if(!o.isReady){o.isReady=true;if(o.readyList){o.each(o.readyList,function(){this.call(document,o)});o.readyList=null}o(document).triggerHandler("ready")}}});var x=false;function B(){if(x){return}x=true;if(document.addEventListener){document.addEventListener("DOMContentLoaded",function(){document.removeEventListener("DOMContentLoaded",arguments.callee,false);o.ready()},false)}else{if(document.attachEvent){document.attachEvent("onreadystatechange",function(){if(document.readyState==="complete"){document.detachEvent("onreadystatechange",arguments.callee);o.ready()}});if(document.documentElement.doScroll&&l==l.top){(function(){if(o.isReady){return}try{document.documentElement.doScroll("left")}catch(E){setTimeout(arguments.callee,0);return}o.ready()})()}}}o.event.add(l,"load",o.ready)}o.each(("blur,focus,load,resize,scroll,unload,click,dblclick,mousedown,mouseup,mousemove,mouseover,mouseout,mouseenter,mouseleave,change,select,submit,keydown,keypress,keyup,error").split(","),function(F,E){o.fn[E]=function(G){return G?this.bind(E,G):this.trigger(E)}});o(l).bind("unload",function(){for(var E in o.cache){if(E!=1&&o.cache[E].handle){o.event.remove(o.cache[E].handle.elem)}}});(function(){o.support={};var F=document.documentElement,G=document.createElement("script"),K=document.createElement("div"),J="script"+(new Date).getTime();K.style.display="none";K.innerHTML=' <link/><table></table><a href="/a" style="color:red;float:left;opacity:.5;">a</a><select><option>text</option></select><object><param/></object>';var H=K.getElementsByTagName("*"),E=K.getElementsByTagName("a")[0];if(!H||!H.length||!E){return}o.support={leadingWhitespace:K.firstChild.nodeType==3,tbody:!K.getElementsByTagName("tbody").length,objectAll:!!K.getElementsByTagName("object")[0].getElementsByTagName("*").length,htmlSerialize:!!K.getElementsByTagName("link").length,style:/red/.test(E.getAttribute("style")),hrefNormalized:E.getAttribute("href")==="/a",opacity:E.style.opacity==="0.5",cssFloat:!!E.style.cssFloat,scriptEval:false,noCloneEvent:true,boxModel:null};G.type="text/javascript";try{G.appendChild(document.createTextNode("window."+J+"=1;"))}catch(I){}F.insertBefore(G,F.firstChild);if(l[J]){o.support.scriptEval=true;delete l[J]}F.removeChild(G);if(K.attachEvent&&K.fireEvent){K.attachEvent("onclick",function(){o.support.noCloneEvent=false;K.detachEvent("onclick",arguments.callee)});K.cloneNode(true).fireEvent("onclick")}o(function(){var L=document.createElement("div");L.style.width=L.style.paddingLeft="1px";document.body.appendChild(L);o.boxModel=o.support.boxModel=L.offsetWidth===2;document.body.removeChild(L).style.display="none"})})();var w=o.support.cssFloat?"cssFloat":"styleFloat";o.props={"for":"htmlFor","class":"className","float":w,cssFloat:w,styleFloat:w,readonly:"readOnly",maxlength:"maxLength",cellspacing:"cellSpacing",rowspan:"rowSpan",tabindex:"tabIndex"};o.fn.extend({_load:o.fn.load,load:function(G,J,K){if(typeof G!=="string"){return this._load(G)}var I=G.indexOf(" ");if(I>=0){var E=G.slice(I,G.length);G=G.slice(0,I)}var H="GET";if(J){if(o.isFunction(J)){K=J;J=null}else{if(typeof J==="object"){J=o.param(J);H="POST"}}}var F=this;o.ajax({url:G,type:H,dataType:"html",data:J,complete:function(M,L){if(L=="success"||L=="notmodified"){F.html(E?o("<div/>").append(M.responseText.replace(/<script(.|\s)*?\/script>/g,"")).find(E):M.responseText)}if(K){F.each(K,[M.responseText,L,M])}}});return this},serialize:function(){return o.param(this.serializeArray())},serializeArray:function(){return this.map(function(){return this.elements?o.makeArray(this.elements):this}).filter(function(){return this.name&&!this.disabled&&(this.checked||/select|textarea/i.test(this.nodeName)||/text|hidden|password|search/i.test(this.type))}).map(function(E,F){var G=o(this).val();return G==null?null:o.isArray(G)?o.map(G,function(I,H){return{name:F.name,value:I}}):{name:F.name,value:G}}).get()}});o.each("ajaxStart,ajaxStop,ajaxComplete,ajaxError,ajaxSuccess,ajaxSend".split(","),function(E,F){o.fn[F]=function(G){return this.bind(F,G)}});var r=e();o.extend({get:function(E,G,H,F){if(o.isFunction(G)){H=G;G=null}return o.ajax({type:"GET",url:E,data:G,success:H,dataType:F})},getScript:function(E,F){return o.get(E,null,F,"script")},getJSON:function(E,F,G){return o.get(E,F,G,"json")},post:function(E,G,H,F){if(o.isFunction(G)){H=G;G={}}return o.ajax({type:"POST",url:E,data:G,success:H,dataType:F})},ajaxSetup:function(E){o.extend(o.ajaxSettings,E)},ajaxSettings:{url:location.href,global:true,type:"GET",contentType:"application/x-www-form-urlencoded",processData:true,async:true,xhr:function(){return l.ActiveXObject?new ActiveXObject("Microsoft.XMLHTTP"):new XMLHttpRequest()},accepts:{xml:"application/xml, text/xml",html:"text/html",script:"text/javascript, application/javascript",json:"application/json, text/javascript",text:"text/plain",_default:"*/*"}},lastModified:{},ajax:function(M){M=o.extend(true,M,o.extend(true,{},o.ajaxSettings,M));var W,F=/=\?(&|$)/g,R,V,G=M.type.toUpperCase();if(M.data&&M.processData&&typeof M.data!=="string"){M.data=o.param(M.data)}if(M.dataType=="jsonp"){if(G=="GET"){if(!M.url.match(F)){M.url+=(M.url.match(/\?/)?"&":"?")+(M.jsonp||"callback")+"=?"}}else{if(!M.data||!M.data.match(F)){M.data=(M.data?M.data+"&":"")+(M.jsonp||"callback")+"=?"}}M.dataType="json"}if(M.dataType=="json"&&(M.data&&M.data.match(F)||M.url.match(F))){W="jsonp"+r++;if(M.data){M.data=(M.data+"").replace(F,"="+W+"$1")}M.url=M.url.replace(F,"="+W+"$1");M.dataType="script";l[W]=function(X){V=X;I();L();l[W]=g;try{delete l[W]}catch(Y){}if(H){H.removeChild(T)}}}if(M.dataType=="script"&&M.cache==null){M.cache=false}if(M.cache===false&&G=="GET"){var E=e();var U=M.url.replace(/(\?|&)_=.*?(&|$)/,"$1_="+E+"$2");M.url=U+((U==M.url)?(M.url.match(/\?/)?"&":"?")+"_="+E:"")}if(M.data&&G=="GET"){M.url+=(M.url.match(/\?/)?"&":"?")+M.data;M.data=null}if(M.global&&!o.active++){o.event.trigger("ajaxStart")}var Q=/^(\w+:)?\/\/([^\/?#]+)/.exec(M.url);if(M.dataType=="script"&&G=="GET"&&Q&&(Q[1]&&Q[1]!=location.protocol||Q[2]!=location.host)){var H=document.getElementsByTagName("head")[0];var T=document.createElement("script");T.src=M.url;if(M.scriptCharset){T.charset=M.scriptCharset}if(!W){var O=false;T.onload=T.onreadystatechange=function(){if(!O&&(!this.readyState||this.readyState=="loaded"||this.readyState=="complete")){O=true;I();L();T.onload=T.onreadystatechange=null;H.removeChild(T)}}}H.appendChild(T);return g}var K=false;var J=M.xhr();if(M.username){J.open(G,M.url,M.async,M.username,M.password)}else{J.open(G,M.url,M.async)}try{if(M.data){J.setRequestHeader("Content-Type",M.contentType)}if(M.ifModified){J.setRequestHeader("If-Modified-Since",o.lastModified[M.url]||"Thu, 01 Jan 1970 00:00:00 GMT")}J.setRequestHeader("X-Requested-With","XMLHttpRequest");J.setRequestHeader("Accept",M.dataType&&M.accepts[M.dataType]?M.accepts[M.dataType]+", */*":M.accepts._default)}catch(S){}if(M.beforeSend&&M.beforeSend(J,M)===false){if(M.global&&!--o.active){o.event.trigger("ajaxStop")}J.abort();return false}if(M.global){o.event.trigger("ajaxSend",[J,M])}var N=function(X){if(J.readyState==0){if(P){clearInterval(P);P=null;if(M.global&&!--o.active){o.event.trigger("ajaxStop")}}}else{if(!K&&J&&(J.readyState==4||X=="timeout")){K=true;if(P){clearInterval(P);P=null}R=X=="timeout"?"timeout":!o.httpSuccess(J)?"error":M.ifModified&&o.httpNotModified(J,M.url)?"notmodified":"success";if(R=="success"){try{V=o.httpData(J,M.dataType,M)}catch(Z){R="parsererror"}}if(R=="success"){var Y;try{Y=J.getResponseHeader("Last-Modified")}catch(Z){}if(M.ifModified&&Y){o.lastModified[M.url]=Y}if(!W){I()}}else{o.handleError(M,J,R)}L();if(X){J.abort()}if(M.async){J=null}}}};if(M.async){var P=setInterval(N,13);if(M.timeout>0){setTimeout(function(){if(J&&!K){N("timeout")}},M.timeout)}}try{J.send(M.data)}catch(S){o.handleError(M,J,null,S)}if(!M.async){N()}function I(){if(M.success){M.success(V,R)}if(M.global){o.event.trigger("ajaxSuccess",[J,M])}}function L(){if(M.complete){M.complete(J,R)}if(M.global){o.event.trigger("ajaxComplete",[J,M])}if(M.global&&!--o.active){o.event.trigger("ajaxStop")}}return J},handleError:function(F,H,E,G){if(F.error){F.error(H,E,G)}if(F.global){o.event.trigger("ajaxError",[H,F,G])}},active:0,httpSuccess:function(F){try{return !F.status&&location.protocol=="file:"||(F.status>=200&&F.status<300)||F.status==304||F.status==1223}catch(E){}return false},httpNotModified:function(G,E){try{var H=G.getResponseHeader("Last-Modified");return G.status==304||H==o.lastModified[E]}catch(F){}return false},httpData:function(J,H,G){var F=J.getResponseHeader("content-type"),E=H=="xml"||!H&&F&&F.indexOf("xml")>=0,I=E?J.responseXML:J.responseText;if(E&&I.documentElement.tagName=="parsererror"){throw"parsererror"}if(G&&G.dataFilter){I=G.dataFilter(I,H)}if(typeof I==="string"){if(H=="script"){o.globalEval(I)}if(H=="json"){I=l["eval"]("("+I+")")}}return I},param:function(E){var G=[];function H(I,J){G[G.length]=encodeURIComponent(I)+"="+encodeURIComponent(J)}if(o.isArray(E)||E.jquery){o.each(E,function(){H(this.name,this.value)})}else{for(var F in E){if(o.isArray(E[F])){o.each(E[F],function(){H(F,this)})}else{H(F,o.isFunction(E[F])?E[F]():E[F])}}}return G.join("&").replace(/%20/g,"+")}});var m={},n,d=[["height","marginTop","marginBottom","paddingTop","paddingBottom"],["width","marginLeft","marginRight","paddingLeft","paddingRight"],["opacity"]];function t(F,E){var G={};o.each(d.concat.apply([],d.slice(0,E)),function(){G[this]=F});return G}o.fn.extend({show:function(J,L){if(J){return this.animate(t("show",3),J,L)}else{for(var H=0,F=this.length;H<F;H++){var E=o.data(this[H],"olddisplay");this[H].style.display=E||"";if(o.css(this[H],"display")==="none"){var G=this[H].tagName,K;if(m[G]){K=m[G]}else{var I=o("<"+G+" />").appendTo("body");K=I.css("display");if(K==="none"){K="block"}I.remove();m[G]=K}o.data(this[H],"olddisplay",K)}}for(var H=0,F=this.length;H<F;H++){this[H].style.display=o.data(this[H],"olddisplay")||""}return this}},hide:function(H,I){if(H){return this.animate(t("hide",3),H,I)}else{for(var G=0,F=this.length;G<F;G++){var E=o.data(this[G],"olddisplay");if(!E&&E!=="none"){o.data(this[G],"olddisplay",o.css(this[G],"display"))}}for(var G=0,F=this.length;G<F;G++){this[G].style.display="none"}return this}},_toggle:o.fn.toggle,toggle:function(G,F){var E=typeof G==="boolean";return o.isFunction(G)&&o.isFunction(F)?this._toggle.apply(this,arguments):G==null||E?this.each(function(){var H=E?G:o(this).is(":hidden");o(this)[H?"show":"hide"]()}):this.animate(t("toggle",3),G,F)},fadeTo:function(E,G,F){return this.animate({opacity:G},E,F)},animate:function(I,F,H,G){var E=o.speed(F,H,G);return this[E.queue===false?"each":"queue"](function(){var K=o.extend({},E),M,L=this.nodeType==1&&o(this).is(":hidden"),J=this;for(M in I){if(I[M]=="hide"&&L||I[M]=="show"&&!L){return K.complete.call(this)}if((M=="height"||M=="width")&&this.style){K.display=o.css(this,"display");K.overflow=this.style.overflow}}if(K.overflow!=null){this.style.overflow="hidden"}K.curAnim=o.extend({},I);o.each(I,function(O,S){var R=new o.fx(J,K,O);if(/toggle|show|hide/.test(S)){R[S=="toggle"?L?"show":"hide":S](I)}else{var Q=S.toString().match(/^([+-]=)?([\d+-.]+)(.*)$/),T=R.cur(true)||0;if(Q){var N=parseFloat(Q[2]),P=Q[3]||"px";if(P!="px"){J.style[O]=(N||1)+P;T=((N||1)/R.cur(true))*T;J.style[O]=T+P}if(Q[1]){N=((Q[1]=="-="?-1:1)*N)+T}R.custom(T,N,P)}else{R.custom(T,S,"")}}});return true})},stop:function(F,E){var G=o.timers;if(F){this.queue([])}this.each(function(){for(var H=G.length-1;H>=0;H--){if(G[H].elem==this){if(E){G[H](true)}G.splice(H,1)}}});if(!E){this.dequeue()}return this}});o.each({slideDown:t("show",1),slideUp:t("hide",1),slideToggle:t("toggle",1),fadeIn:{opacity:"show"},fadeOut:{opacity:"hide"}},function(E,F){o.fn[E]=function(G,H){return this.animate(F,G,H)}});o.extend({speed:function(G,H,F){var E=typeof G==="object"?G:{complete:F||!F&&H||o.isFunction(G)&&G,duration:G,easing:F&&H||H&&!o.isFunction(H)&&H};E.duration=o.fx.off?0:typeof E.duration==="number"?E.duration:o.fx.speeds[E.duration]||o.fx.speeds._default;E.old=E.complete;E.complete=function(){if(E.queue!==false){o(this).dequeue()}if(o.isFunction(E.old)){E.old.call(this)}};return E},easing:{linear:function(G,H,E,F){return E+F*G},swing:function(G,H,E,F){return((-Math.cos(G*Math.PI)/2)+0.5)*F+E}},timers:[],fx:function(F,E,G){this.options=E;this.elem=F;this.prop=G;if(!E.orig){E.orig={}}}});o.fx.prototype={update:function(){if(this.options.step){this.options.step.call(this.elem,this.now,this)}(o.fx.step[this.prop]||o.fx.step._default)(this);if((this.prop=="height"||this.prop=="width")&&this.elem.style){this.elem.style.display="block"}},cur:function(F){if(this.elem[this.prop]!=null&&(!this.elem.style||this.elem.style[this.prop]==null)){return this.elem[this.prop]}var E=parseFloat(o.css(this.elem,this.prop,F));return E&&E>-10000?E:parseFloat(o.curCSS(this.elem,this.prop))||0},custom:function(I,H,G){this.startTime=e();this.start=I;this.end=H;this.unit=G||this.unit||"px";this.now=this.start;this.pos=this.state=0;var E=this;function F(J){return E.step(J)}F.elem=this.elem;if(F()&&o.timers.push(F)&&!n){n=setInterval(function(){var K=o.timers;for(var J=0;J<K.length;J++){if(!K[J]()){K.splice(J--,1)}}if(!K.length){clearInterval(n);n=g}},13)}},show:function(){this.options.orig[this.prop]=o.attr(this.elem.style,this.prop);this.options.show=true;this.custom(this.prop=="width"||this.prop=="height"?1:0,this.cur());o(this.elem).show()},hide:function(){this.options.orig[this.prop]=o.attr(this.elem.style,this.prop);this.options.hide=true;this.custom(this.cur(),0)},step:function(H){var G=e();if(H||G>=this.options.duration+this.startTime){this.now=this.end;this.pos=this.state=1;this.update();this.options.curAnim[this.prop]=true;var E=true;for(var F in this.options.curAnim){if(this.options.curAnim[F]!==true){E=false}}if(E){if(this.options.display!=null){this.elem.style.overflow=this.options.overflow;this.elem.style.display=this.options.display;if(o.css(this.elem,"display")=="none"){this.elem.style.display="block"}}if(this.options.hide){o(this.elem).hide()}if(this.options.hide||this.options.show){for(var I in this.options.curAnim){o.attr(this.elem.style,I,this.options.orig[I])}}this.options.complete.call(this.elem)}return false}else{var J=G-this.startTime;this.state=J/this.options.duration;this.pos=o.easing[this.options.easing||(o.easing.swing?"swing":"linear")](this.state,J,0,1,this.options.duration);this.now=this.start+((this.end-this.start)*this.pos);this.update()}return true}};o.extend(o.fx,{speeds:{slow:600,fast:200,_default:400},step:{opacity:function(E){o.attr(E.elem.style,"opacity",E.now)},_default:function(E){if(E.elem.style&&E.elem.style[E.prop]!=null){E.elem.style[E.prop]=E.now+E.unit}else{E.elem[E.prop]=E.now}}}});if(document.documentElement.getBoundingClientRect){o.fn.offset=function(){if(!this[0]){return{top:0,left:0}}if(this[0]===this[0].ownerDocument.body){return o.offset.bodyOffset(this[0])}var G=this[0].getBoundingClientRect(),J=this[0].ownerDocument,F=J.body,E=J.documentElement,L=E.clientTop||F.clientTop||0,K=E.clientLeft||F.clientLeft||0,I=G.top+(self.pageYOffset||o.boxModel&&E.scrollTop||F.scrollTop)-L,H=G.left+(self.pageXOffset||o.boxModel&&E.scrollLeft||F.scrollLeft)-K;return{top:I,left:H}}}else{o.fn.offset=function(){if(!this[0]){return{top:0,left:0}}if(this[0]===this[0].ownerDocument.body){return o.offset.bodyOffset(this[0])}o.offset.initialized||o.offset.initialize();var J=this[0],G=J.offsetParent,F=J,O=J.ownerDocument,M,H=O.documentElement,K=O.body,L=O.defaultView,E=L.getComputedStyle(J,null),N=J.offsetTop,I=J.offsetLeft;while((J=J.parentNode)&&J!==K&&J!==H){M=L.getComputedStyle(J,null);N-=J.scrollTop,I-=J.scrollLeft;if(J===G){N+=J.offsetTop,I+=J.offsetLeft;if(o.offset.doesNotAddBorder&&!(o.offset.doesAddBorderForTableAndCells&&/^t(able|d|h)$/i.test(J.tagName))){N+=parseInt(M.borderTopWidth,10)||0,I+=parseInt(M.borderLeftWidth,10)||0}F=G,G=J.offsetParent}if(o.offset.subtractsBorderForOverflowNotVisible&&M.overflow!=="visible"){N+=parseInt(M.borderTopWidth,10)||0,I+=parseInt(M.borderLeftWidth,10)||0}E=M}if(E.position==="relative"||E.position==="static"){N+=K.offsetTop,I+=K.offsetLeft}if(E.position==="fixed"){N+=Math.max(H.scrollTop,K.scrollTop),I+=Math.max(H.scrollLeft,K.scrollLeft)}return{top:N,left:I}}}o.offset={initialize:function(){if(this.initialized){return}var L=document.body,F=document.createElement("div"),H,G,N,I,M,E,J=L.style.marginTop,K='<div style="position:absolute;top:0;left:0;margin:0;border:5px solid #000;padding:0;width:1px;height:1px;"><div></div></div><table style="position:absolute;top:0;left:0;margin:0;border:5px solid #000;padding:0;width:1px;height:1px;" cellpadding="0" cellspacing="0"><tr><td></td></tr></table>';M={position:"absolute",top:0,left:0,margin:0,border:0,width:"1px",height:"1px",visibility:"hidden"};for(E in M){F.style[E]=M[E]}F.innerHTML=K;L.insertBefore(F,L.firstChild);H=F.firstChild,G=H.firstChild,I=H.nextSibling.firstChild.firstChild;this.doesNotAddBorder=(G.offsetTop!==5);this.doesAddBorderForTableAndCells=(I.offsetTop===5);H.style.overflow="hidden",H.style.position="relative";this.subtractsBorderForOverflowNotVisible=(G.offsetTop===-5);L.style.marginTop="1px";this.doesNotIncludeMarginInBodyOffset=(L.offsetTop===0);L.style.marginTop=J;L.removeChild(F);this.initialized=true},bodyOffset:function(E){o.offset.initialized||o.offset.initialize();var G=E.offsetTop,F=E.offsetLeft;if(o.offset.doesNotIncludeMarginInBodyOffset){G+=parseInt(o.curCSS(E,"marginTop",true),10)||0,F+=parseInt(o.curCSS(E,"marginLeft",true),10)||0}return{top:G,left:F}}};o.fn.extend({position:function(){var I=0,H=0,F;if(this[0]){var G=this.offsetParent(),J=this.offset(),E=/^body|html$/i.test(G[0].tagName)?{top:0,left:0}:G.offset();J.top-=j(this,"marginTop");J.left-=j(this,"marginLeft");E.top+=j(G,"borderTopWidth");E.left+=j(G,"borderLeftWidth");F={top:J.top-E.top,left:J.left-E.left}}return F},offsetParent:function(){var E=this[0].offsetParent||document.body;while(E&&(!/^body|html$/i.test(E.tagName)&&o.css(E,"position")=="static")){E=E.offsetParent}return o(E)}});o.each(["Left","Top"],function(F,E){var G="scroll"+E;o.fn[G]=function(H){if(!this[0]){return null}return H!==g?this.each(function(){this==l||this==document?l.scrollTo(!F?H:o(l).scrollLeft(),F?H:o(l).scrollTop()):this[G]=H}):this[0]==l||this[0]==document?self[F?"pageYOffset":"pageXOffset"]||o.boxModel&&document.documentElement[G]||document.body[G]:this[0][G]}});o.each(["Height","Width"],function(I,G){var E=I?"Left":"Top",H=I?"Right":"Bottom",F=G.toLowerCase();o.fn["inner"+G]=function(){return this[0]?o.css(this[0],F,false,"padding"):null};o.fn["outer"+G]=function(K){return this[0]?o.css(this[0],F,false,K?"margin":"border"):null};var J=G.toLowerCase();o.fn[J]=function(K){return this[0]==l?document.compatMode=="CSS1Compat"&&document.documentElement["client"+G]||document.body["client"+G]:this[0]==document?Math.max(document.documentElement["client"+G],document.body["scroll"+G],document.documentElement["scroll"+G],document.body["offset"+G],document.documentElement["offset"+G]):K===g?(this.length?o.css(this[0],J):null):this.css(J,typeof K==="string"?K:K+"px")}})})();
|
data/public/js/visit.js
ADDED
@@ -0,0 +1,59 @@
|
|
1
|
+
/*
|
2
|
+
How this should work:
|
3
|
+
* Plugin generates visit() calls based on @a_b_selections
|
4
|
+
* convert() with a test looks
|
5
|
+
*/
|
6
|
+
|
7
|
+
window.A_B = new function() {
|
8
|
+
|
9
|
+
var $ = jQuery;
|
10
|
+
var conversions = {};
|
11
|
+
var visits = {};
|
12
|
+
var session_id, tests, token, url, visits;
|
13
|
+
|
14
|
+
$.extend(this, {
|
15
|
+
convert: convert,
|
16
|
+
setup: setup
|
17
|
+
});
|
18
|
+
|
19
|
+
window.a_b = function(variant) {
|
20
|
+
// TODO: Make this work like the Rails version
|
21
|
+
}
|
22
|
+
|
23
|
+
function convert(test_or_variant) {
|
24
|
+
var pair = test_variant_pair(test_or_variant);
|
25
|
+
console.log(pair);
|
26
|
+
if (!pair || !session_id || !token || !url)
|
27
|
+
return;
|
28
|
+
var params = [
|
29
|
+
'session_id=' + session_id,
|
30
|
+
'token=' + token,
|
31
|
+
'variant=' + pair[1].name
|
32
|
+
];
|
33
|
+
$.getJSON(url + '/convert.js?' + params.join('&'));
|
34
|
+
}
|
35
|
+
|
36
|
+
// Returns a [ test, variant ] pair given a test or variant
|
37
|
+
// Only returns if the variant has been used in a test (visited)
|
38
|
+
function test_variant_pair(test_or_variant) {
|
39
|
+
var result;
|
40
|
+
var v = visits[test_or_variant] || test_or_variant;
|
41
|
+
$.each(tests, function(i, test) {
|
42
|
+
$.each(test.variants, function(i, variant) {
|
43
|
+
if (variant.name == v && visits[test.name] == v) {
|
44
|
+
result = [ test, variant ];
|
45
|
+
return false;
|
46
|
+
}
|
47
|
+
});
|
48
|
+
});
|
49
|
+
return result;
|
50
|
+
}
|
51
|
+
|
52
|
+
function setup(options) {
|
53
|
+
session_id = options.session_id;
|
54
|
+
tests = options.tests;
|
55
|
+
token = options.token;
|
56
|
+
url = options.url;
|
57
|
+
visits = options.visits;
|
58
|
+
}
|
59
|
+
}
|
data/script/console
ADDED
data/script/env.rb
ADDED
@@ -0,0 +1,30 @@
|
|
1
|
+
require 'rubygems'
|
2
|
+
|
3
|
+
gems = [
|
4
|
+
[ 'active_wrapper', '=0.2.1' ],
|
5
|
+
[ 'authlogic', '=2.1.3' ]
|
6
|
+
]
|
7
|
+
|
8
|
+
gems.each do |name, version|
|
9
|
+
if File.exists?(path = "#{File.dirname(__FILE__)}/../vendor/#{name}/lib")
|
10
|
+
$:.unshift path
|
11
|
+
else
|
12
|
+
gem name, version
|
13
|
+
end
|
14
|
+
end
|
15
|
+
|
16
|
+
require 'authlogic'
|
17
|
+
require 'active_wrapper'
|
18
|
+
|
19
|
+
$root = File.expand_path("#{File.dirname(__FILE__)}/../")
|
20
|
+
|
21
|
+
$db, $log, $mail = ActiveWrapper.setup(
|
22
|
+
:base => $root,
|
23
|
+
:env => 'development',
|
24
|
+
:stdout => false
|
25
|
+
)
|
26
|
+
$db.establish_connection
|
27
|
+
|
28
|
+
Dir["#{$root}/lib/a_b/model/*.rb"].each do |path|
|
29
|
+
require path
|
30
|
+
end
|
data/spec/spec.opts
ADDED
@@ -0,0 +1 @@
|
|
1
|
+
--color
|
data/spec/spec_helper.rb
ADDED
@@ -0,0 +1,16 @@
|
|
1
|
+
$testing = true
|
2
|
+
SPEC = File.dirname(__FILE__)
|
3
|
+
$:.unshift File.expand_path("#{SPEC}/../lib")
|
4
|
+
|
5
|
+
require 'a_b'
|
6
|
+
require 'pp'
|
7
|
+
|
8
|
+
Spec::Runner.configure do |config|
|
9
|
+
end
|
10
|
+
|
11
|
+
# For use with rspec textmate bundle
|
12
|
+
def debug(object)
|
13
|
+
puts "<pre>"
|
14
|
+
puts object.pretty_inspect.gsub('<', '<').gsub('>', '>')
|
15
|
+
puts "</pre>"
|
16
|
+
end
|
@@ -0,0 +1,345 @@
|
|
1
|
+
== 2.1.2
|
2
|
+
|
3
|
+
* Return the newly create object for the class level create method, instead of a boolean
|
4
|
+
* Add a model_name class method for Authlogic::Session for rails 3 compatibility. Will be using ActiveModel eventually, but this should be a quick fix.
|
5
|
+
|
6
|
+
== 2.1.1 released 2009-7-04
|
7
|
+
|
8
|
+
* Use mb_chars when downcasing the login string to support international characters.
|
9
|
+
* Check for the existence of the :remember_me key before setting remember_me off of a hash.
|
10
|
+
* Added check to make sure Authlogic is not loaded too late, causing a NotActivated error.
|
11
|
+
|
12
|
+
== 2.1.0 released 2009-6-27
|
13
|
+
|
14
|
+
* Fixed bug when using act_like_restful_authentication and setting passwords, needed to add a 2nd parameter to tell if to check against the database or not.
|
15
|
+
* Don't save record if they are read only.
|
16
|
+
|
17
|
+
== 2.0.14 released 2009-6-13
|
18
|
+
|
19
|
+
* Fixed issue with using brute force protection AND generalize_credentials_error_messages. Brute force protection was looking to see if there were password errors, which generalize_credentials_error_messages was obfuscating.
|
20
|
+
* Added db_setup? method to avoid errors during rake tasks where the db might not be set up. Ex: migrations
|
21
|
+
* Stop using errors.on(key) since that is now deprecated in Rails. Use errors[key] instead.
|
22
|
+
* Use valid_password? for the method name to validate a password instead of valid_#{password_field}?.
|
23
|
+
|
24
|
+
== 2.0.13 released 2009-5-13
|
25
|
+
|
26
|
+
* Add authlogic/regex.rb to manifest
|
27
|
+
|
28
|
+
== 2.0.12 released 2009-5-13
|
29
|
+
|
30
|
+
* Added the ability to add a last_request_update_allowed? method in your controller to pragmatically tell Authlogic when and when not to update the last_request_at field in your database. This only takes effect if the method if present.
|
31
|
+
* Extracted Authlogic's regular expressions into it's own module to allow easy use of them outside of Authlogic. See Authlogic::Regex for more info.
|
32
|
+
* Made being_brute_force_protected? true for the Authlogic::Session::BruteForceProtection module.
|
33
|
+
* Added the configuration option generalize_credentials_error_messages for the Authlogic::Session::Password module. This allows you to generalize your login / password errors messages as to not reveal was the problem was when authenticating. If enabled, when an invalid login is supplied it will use the same exact error message when an invalid password is supplied.
|
34
|
+
* Update email regular expression to use A-Z0-9 instead of /w as to not allow for diacritical marks in an email address.
|
35
|
+
* Changed config() convenience method to rw_config() to be more descriptive and less vague.
|
36
|
+
|
37
|
+
== 2.0.11 released 2009-4-25
|
38
|
+
|
39
|
+
* Fix bug when password is turned off and the SingleAccessToken module calls the after_password_set callback.
|
40
|
+
* HTTP basic auth can now be toggled on or off. It also checks for the existence of a standard username and password before enabling itself.
|
41
|
+
* Added option check_passwords_against_database for Authlogic::ActsAsAuthentic::Password to toggle between checking the password against the database value or the object value. Also added the same functionality to the instance method: valid_password?("password", true), where the second argument tells Authlogic to check the password against the database value. The default for this new feature is true.
|
42
|
+
* Add a maintain_sessions configuration option to Authlogic::ActsAsAuthentic::SessionMaintenance as a "clearer" option to disable automatic session maintenance.
|
43
|
+
* single_access_allowed_request_types can also be equal to :all instead of just [:all].
|
44
|
+
* Refactor params_enabled? so that the single_access_allowed? method in controllers takes precedence.
|
45
|
+
* Added testing comments in the README and expanded on the documentation in Authlogic::TestCase
|
46
|
+
|
47
|
+
== 2.0.10 released 2009-4-21
|
48
|
+
|
49
|
+
* Mock request is now transparent to non existent methods. Since the methods calls really have no functional value when testing authlogic.
|
50
|
+
* Allow password confirmation to be disabled.
|
51
|
+
* Modified login format validation to allow for the + character since emails addresses allow that as a valid character.
|
52
|
+
* Added merge_* configuration methods for acts_as_authentic to make merging options into configuration options that default to hashes. Just a few convenience methods.
|
53
|
+
|
54
|
+
== 2.0.9 released 2009-4-9
|
55
|
+
|
56
|
+
* Fixed bug where hooks provided by the password module were called when the password module was not being used due to the fact that the password field did not exist.
|
57
|
+
* Fixed bug where the find_with_login method was not being aliased if you were using an alternate field besides login.
|
58
|
+
|
59
|
+
== 2.0.8 release 2009-4-9
|
60
|
+
|
61
|
+
* Dont reset the @password_changed instance variable to false because its halts the callback chain, instead reset it to nil.
|
62
|
+
|
63
|
+
== 2.0.7 released 2009-4-9
|
64
|
+
|
65
|
+
* Rename TestCase::ControllerAdapter to TestCase::RailsRequestAdapter to help clarify it's usage and fix a constant typo.
|
66
|
+
|
67
|
+
== 2.0.6 released 2009-4-9
|
68
|
+
|
69
|
+
* Don't use second, use [1] instead so older rails versions don't complain.
|
70
|
+
* Update email regular expression to be less TLD specific: (?:[A-Z]{2,4}|museum|travel)
|
71
|
+
* Update shoulda macro for 2.0
|
72
|
+
* validates_length_of_password_confirmation_field_options defaults to validates_confirmation_of_password_field_options
|
73
|
+
* Use MockCookieJar in tests instead of a Hash in the MockController.
|
74
|
+
* Cookies now store the record id as well, for faster lookup. Also to avoid the need to use sessions since sessions are lazily loaded in rails 2.3+
|
75
|
+
* Add configuration option for Authlogic::ActsAsAuthentic: ignore_blank_passwords
|
76
|
+
* Fix cookie_domain in rails adapter
|
77
|
+
* Make password and login fields optional. This allows you to have an alternate authentication method as your main authentication source. Such as OpenID, LDAP, or whatever you want.
|
78
|
+
* Reset the @password_changed instance variable after the record has been saved.
|
79
|
+
* Add referer and user_agent to mock requests for testing purposes.
|
80
|
+
* Add :case_sensitive => false to validates_uniqueness_of calls on the login and email fields.
|
81
|
+
* MockRequest not tries to use controller.env['REMOTE_ADDR'] for the IP address in tests.
|
82
|
+
* Add in custom find_with_email and find_with_login methods to perform case insensitive searches for databases that are case sensitive by default. This is only done if the :case_insensitive option for validates_uniqueness_of_login_field_options or validates_uniqueness_of_email_field_options is set to false. Which, as of this version, it is. If you are using MySQL this has been the default behavior all along. If you are using SQLite or Postgres this has NOT been the default behavior.
|
83
|
+
* Added in exception explaining that you are using the old configuration for acts_as_authentic with an example of the new format.
|
84
|
+
|
85
|
+
== 2.0.5 released 2009-3-30
|
86
|
+
|
87
|
+
* Stub out authenticate_with_http_basic for TestCase::ControllerAdapter.
|
88
|
+
* Added second parameter for add_acts_as_authentic module to specify the position: append or prepend.
|
89
|
+
|
90
|
+
== 2.0.4 released 2009-3-28
|
91
|
+
|
92
|
+
* Added validates_uniqueness_of_login_field_options and validates_uniqueness_of_email_field_options configuration options
|
93
|
+
* Add in checks to make sure session_class is not nil.
|
94
|
+
* Cleaned up TestCase some more and added functionality to log users in during functional tests.
|
95
|
+
|
96
|
+
== 2.0.3 released 2009-3-26
|
97
|
+
|
98
|
+
* Fixed error where default session class does not exist.
|
99
|
+
* Fixed human_name for the model to use its own human name and not delegate to the associated model. Translation should be under authlogic.models.user_session (or whatever the name of your session is).
|
100
|
+
* Fixed human_attribute_name to use Authlogic keys for translation instead of ActiveRecord: authlogic.attributes.user_session.login
|
101
|
+
* For transitioning from restful_authentication, set the REST_AUTH_SITE_KEY to '' if it doesn't exist, instead of nil.
|
102
|
+
* Completely rewrote Authlogic::Testing, it's now called Authlogic::TestCase. Testing Authlogic is much easier now. Please see Authlogic::TestCase for more info.
|
103
|
+
|
104
|
+
== 2.0.2 released 2009-3-24
|
105
|
+
|
106
|
+
* Reset failed_login_count if consecutive_failed_logins_limit has been exceed and the failed_login_ban_for has passed.
|
107
|
+
* Update test helpers to use the new configuration scheme.
|
108
|
+
* Fixed issue when logging doesn't update last_request_at, so the next persistence try would fail.
|
109
|
+
|
110
|
+
== 2.0.1 released 2009-3-23
|
111
|
+
|
112
|
+
* Validate length of password.
|
113
|
+
* Dont save sessions with a ! during session maintenance.
|
114
|
+
* Add self_and_descendants_from_active_record for Rails 2.3
|
115
|
+
* Abort acts_as_authentic if there is no DB connection or table.
|
116
|
+
|
117
|
+
== 2.0.0 released 2009-3-23
|
118
|
+
|
119
|
+
* Refactored nearly all code and tests, especially acts_as_authentic. Got rid of the meta programming and rewrote to use modules and hooks. Also moved all configuration into their related modules.
|
120
|
+
* Set up a strong API with hooks to allow you to modify behavior and most importantly, easily create "add on" modules or alternate authentication methods, etc.
|
121
|
+
* Changed configuration method for acts_as_authentic to accept a block instead of a hash.
|
122
|
+
* The record attribute will NEVER be set until after validation passes, similar to how ActiveRecord executes UPDATEs and CREATEs.
|
123
|
+
* Fixed bug with session maintenance where user would log in as new user when creating another user account, typically an admin function.
|
124
|
+
* Brute force protection is only a temporary ban by default, not a permanent one.
|
125
|
+
* Switched to Hoe for gem management instead of Echoe.
|
126
|
+
* Added MD5 crypto provider for legacy systems.
|
127
|
+
* Make password salt field optional for legacy systems.
|
128
|
+
|
129
|
+
== 1.4.4 released 2009-3-2
|
130
|
+
|
131
|
+
* Moved session maintenance to a before_save, to save on queries executed and to skip an unexpected / additional save on the user object.
|
132
|
+
* Extracted random string generation into its own class and leverages SecureRandom if it is available
|
133
|
+
* Move cookies to a higher priority when trying to find the record to help with performance since Rails 3 lazily loads the sessions
|
134
|
+
* Reset perishable token in a before_save instead of a before_validation
|
135
|
+
|
136
|
+
== 1.4.3 released 2009-2-22
|
137
|
+
|
138
|
+
* Fixed issue with brute force protection.
|
139
|
+
|
140
|
+
== 1.4.2 released 2009-2-20
|
141
|
+
|
142
|
+
* Cleaned up callbacks system to use hooks and execute in the proper order.
|
143
|
+
* Added brute force protection. See the consecutive_failed_logins_limit configuration option in Authlogic::Session::Config. Also see Authlogic::Session:BruteForceProtection
|
144
|
+
* Fixed issue with calling stale? when there is no record.
|
145
|
+
* Simon Harris fixed the issue of using lock_version with the associated record and also optimized the library for better performance.
|
146
|
+
* Implemented saving the record during the callback chain to execute as few queries as possible. This way modules can hook into Authlogic, modify the associated record, and not have to worry about saving the record.
|
147
|
+
|
148
|
+
== 1.4.1 released 2009-2-8
|
149
|
+
|
150
|
+
* Fixed I18n key misspelling.
|
151
|
+
* Added I18n keys for ORM error messages.
|
152
|
+
* Use the password_field configuration value for the alias_methods defined in acts_as_authentic/credentials.rb
|
153
|
+
* Change shoulda macros implementation to follow the shoulda documentation
|
154
|
+
* Rails >2.3 uses :domain for the session option instead of :session_domain. Authlogic now uses the proper key in the rails adapter.
|
155
|
+
* Added validate_password attribute to force password validation regardless if the password is blank. This is useful for forms explicitly changing passwords.
|
156
|
+
* The class level find method will return a session object if the session is stale. The protection is that there will be no record associated with that session. This allows you to receive an object and call the stale? method on it to determine why the user must log back in.
|
157
|
+
* Added validate callbacks in Session::Base so you can run callbacks by calling validate :my_method, just like in AR.
|
158
|
+
* Checked for blank persistence tokens when trying to validate passwords, this is where transitioning occurs. People transitioning from older systems never had a persistence token, which means it would be nil here.
|
159
|
+
* Update allowed domain name extensions for email
|
160
|
+
* Ignore default length options for validations if alternate length options are provided, since AR raises an error if 2 different length specifications are provided.
|
161
|
+
|
162
|
+
== 1.4.0 released 2009-1-28
|
163
|
+
|
164
|
+
* Added support for cookie domain, based on your frameworks session domain configuration
|
165
|
+
* Updated test helper functions to use the persistence token config value
|
166
|
+
* Check for UTC times when using Time.now for current_login_at and last_request_at
|
167
|
+
* Single access now looks for a single_access_allowed? method in your controllers to determine if single access should be allowed or not. Allowing you to define exactly when single access is allowed.
|
168
|
+
* Finding the authenticated record uses klass.primary_key instead of assuming id.
|
169
|
+
* BREAKS BACKWARDS COMPATIBILITY: New I18n solution implemented. See Authlogic::I18n for more information.
|
170
|
+
|
171
|
+
== 1.3.9 released 2009-1-9
|
172
|
+
|
173
|
+
* Added the disable_perishable_token_maintenance option to disable the automatic resetting of the perishable_token, meaning you will have to maintain this yourself.
|
174
|
+
* Changed shoulda macro to conform to standards so model is not required to be passed
|
175
|
+
* Modified method definitions for the Session class to check for already defined methods, allowing you to write your own "credential" methods, and Authlogic will not overwrite your custom methods.
|
176
|
+
* Fixed bug when passing :all to single_access_allowed_request_types
|
177
|
+
* Added logout_on_timeout configuration option for Session::Base
|
178
|
+
|
179
|
+
== 1.3.8 released 2008-12-24
|
180
|
+
|
181
|
+
* Only change persistence token if the password is not blank
|
182
|
+
* Normalize the last_request_at_threshold so that you can pass an integer or a date/time range.
|
183
|
+
* Fixed bug where password length validations were not being run because the password value was not blank. It should be run if it is a new record, the password has changed, or the password is blank.
|
184
|
+
* Added disable_magic_states option for sessions, to turn off the automatic checking of "magic states" such as active?, confirmed?, and approved?.
|
185
|
+
|
186
|
+
== 1.3.7 released 2008-11-30
|
187
|
+
|
188
|
+
* Added session generator: script/generate session UserSession
|
189
|
+
* Added Test::Unit helpers file, see testing in the README
|
190
|
+
|
191
|
+
== 1.3.6 released 2008-11-30
|
192
|
+
|
193
|
+
* Modified validates_length_of for password so that there is a fallback validation if the passed "if statement" fails
|
194
|
+
|
195
|
+
== 1.3.5 released 2008-11-30
|
196
|
+
|
197
|
+
* :transition_from_crypto_provider for acts_as_authentic now accepts an array to transition from multiple providers. Which solves the problem of a double transition.
|
198
|
+
* Added AES256 as a crypto_provider option, for those that want to use a reversible encryption method by supplying a key.
|
199
|
+
* Fixed typo for using validates_format_of_options instead of validates_length_of_options
|
200
|
+
* Fixed bug when accessing the dynamic method for accessing the session record in a namespace, since it uses class_name.underscore which replaces :: with a /
|
201
|
+
* Added minimum length requirement of 4 for the password, and removed validates_presence_of for password since validates_length_of enforces this
|
202
|
+
* Set before_validation to reset the persistence token if it is blank, since a password is not required for open id authentication
|
203
|
+
|
204
|
+
== 1.3.4 released 2008-11-24
|
205
|
+
|
206
|
+
* Delegate human_attribute_name to the ActiveRecord class to take advantage of the I18n feature.
|
207
|
+
* Fixed issue with passwords from older versions of restful_authentication, the passwords end with --
|
208
|
+
|
209
|
+
== 1.3.3 released 2008-11-23
|
210
|
+
|
211
|
+
* Updated :act_like_restful_authentication for those using the older version where no site wide key is preset (REST_AUTH_SITE_KEY), Authlogic will adjust automatically based on the presence of this constant.
|
212
|
+
* Added :transition_from_crypto_provider option for acts_as_authentic to transition your user's passwords to a new algorithm.
|
213
|
+
* Added :transition_from_restful_authentication for acts_as_authentic to transition your users from restful_authentication to the Authlogic password system. Now you can choose to keep your passwords the same by using :act_like_restful_authentication, which will *NOT* do any transitioning, or you can use :transition_from_crypto_provider which will update your users passwords as they login or new accounts are created, while still allowing users with the old password system to log in.
|
214
|
+
* Modified the "interface" for the crypto providers to only provide a class level encrypt and matches? method, instead of a class level encrypt and decrypt method.
|
215
|
+
|
216
|
+
== 1.3.2 released 2008-11-22
|
217
|
+
|
218
|
+
* Updated code to work better with BCrypt, using root level class now.
|
219
|
+
|
220
|
+
== 1.3.1 released 2008-11-22
|
221
|
+
|
222
|
+
* Fixed typo in acts_as_authentic config when passing the :scope option.
|
223
|
+
* Added :act_like_restful_authentication option for acts_as_authentic
|
224
|
+
* Added a new crypto provider: BCrypt, this is for those storing the nuclear launch codes in their apps
|
225
|
+
|
226
|
+
== 1.3.0 released 2008-11-21
|
227
|
+
|
228
|
+
* BREAKS BACKWARDS COMPATIBILITY: changed the confirm_password field to password_confirmation for acts_as_authentic, since the rails validates_confirmation_of handles creating this attribute and there is no option to change the name of this.
|
229
|
+
* BREAKS BACKWARDS COMPATIBILITY: Cleaned up all of the validation configuration for acts_as_authentic, as well as the documentation that goes with it, you can accomplish the same things as before, but this is much more flexible and much more organized. This is mainly for those implementing i18n support. Instead of :whatever_message, its now :login_field_validates_length_of_options => {:message => "your i18n friendly message"}. As a side note, with the new i18n support in rails I would not be surprised if this is already done for you since Authlogic uses the ActiveRecord validation methods.
|
230
|
+
* Got rid of simple delegator for the abstract controller, apparently this has performance issues.
|
231
|
+
* Cleaned up validations to assume ActiveRecord dirty attributes are present, I think this is a safe assumption.
|
232
|
+
|
233
|
+
== 1.2.2 released 2008-11-20
|
234
|
+
|
235
|
+
* Added allow_blank_login_and_password_field and allow_blank_email_field options to acts_as_authentic, which allows you to have alternative logins, such as OpenID
|
236
|
+
* In the session Authlogic now also stores the record id. We use this id to find the record and then check the token against the record, thus allowing for quicker database lookups, while getting the same security.
|
237
|
+
* Skip validation for reset_perishable_token!
|
238
|
+
* Added checks for uniqueness validations to only perform if the values have changed, this cuts down on DB queries
|
239
|
+
* Abstract controller adapter now uses ruby's simple delegator class
|
240
|
+
* Allow to save with a block: user_session.save { |result| }, result will either be false or self, this is useful when implementing OpenID and other methods
|
241
|
+
|
242
|
+
== 1.2.1 released 2008-11-19
|
243
|
+
|
244
|
+
* Added build method to authenticates_many association to act like AR association collections.
|
245
|
+
* Added validation boolean configuration options for acts_as_authentic: validate_field, validate_login_field, validate_password_field, validate_email_field. This turns on and off validations for their respective fields.
|
246
|
+
* Renamed all password_reset_token terms to perishable_token, including configuration, etc. I still allow for the old configurations so this will not break compatibility, but perishable token is a better name and can be used for account confirmation as well as a password reset token, or anything else you want.
|
247
|
+
* Renamed all remember_token instances to persistence_token, the term "remember token" doesn't really make sense. I still allow for the old configuration, so this will not break backwards compatibility: persistence_token fits better and makes more sense.
|
248
|
+
|
249
|
+
== 1.2.0 released 2008-11-16
|
250
|
+
|
251
|
+
* Added check for database set up in acts_as_authentic to prevent errors during migrations.
|
252
|
+
* Forced logged_in and logged_out named scopes to use seconds.
|
253
|
+
* Hardened valid_password? method to only allow raw passwords.
|
254
|
+
* controllers and scopes are no longer stored in class variables but in the Thread.current hash so their instances die out with the thread, which frees up memory.
|
255
|
+
* Removed single_access_token_field and remember_token_field from Sesson::Config, they are not needed there.
|
256
|
+
* Added password_reset_token to assist in resetting passwords.
|
257
|
+
* Added email_field, email_field_regex, email_field_regex_failed_message configuration options to acts_as_authentic. So that you can validate emails as well as a login, instead of the either-or approach.
|
258
|
+
* Added configuration for all validation messages for the session so that you can modify them and provide I18n support.
|
259
|
+
|
260
|
+
== 1.1.1 released 2008-11-13
|
261
|
+
|
262
|
+
* Removed ActiveRecord dependency.
|
263
|
+
* Removed loading shoulda macros by default, moved to shoulda_macros dir.
|
264
|
+
* Modified how params access works. Added in single_access_token_field which params now uses. See the single access section in the README. Various configuration options added as well.
|
265
|
+
* Cleaned up acts_as_authentic configuration, added new config module to do this.
|
266
|
+
* Cleaned up acts_as_authentic tests
|
267
|
+
* Moved acts_as_authentic sub modules into the proper name spaces
|
268
|
+
|
269
|
+
== 1.1.0 released 2008-11-13
|
270
|
+
|
271
|
+
* Moved Rack standards into abstract_adapter for the controllers.
|
272
|
+
* Added authenticating_with_credentials?, authenticating_with_unauthorized_record?
|
273
|
+
* Fixed typo in abstract_adapter, black to block.
|
274
|
+
* Cleaned up / reorganized tests.
|
275
|
+
* Moved ActiveRecord additions to ORM Adapters name space to make way for Data Mapper.
|
276
|
+
* Reorganized and modified acts_as_authentic to be free standing and not get info from the related session.
|
277
|
+
* The session now gets its configuration from the model, since determining which fields are present is ORM specific.
|
278
|
+
* Extracted session and cookie logic into their own modules for Session.
|
279
|
+
* Moved crypto providers into their own module and added a Sha1 provider to help with the restful_authentication transition.
|
280
|
+
* Allow the unique_token method to use the alternate crypto_provider if it is a hash algorithm, otherwise default to Sha512.
|
281
|
+
* Added last_request_at_threshold configuration option.
|
282
|
+
* Changed Scoped class to AuthenticatesManyAssociation, like AR has HasManyAssociation, etc.
|
283
|
+
* Added should_be_authentic shoulda macro.
|
284
|
+
* Removed some magic from how sessions are initialized. See the initialize documentation, this method is a little more structured now, which was required for adding in openid.
|
285
|
+
* Added in logging via a params token, which is friendly for feed URLs. Works just like cookies and sessions when persisting the session.
|
286
|
+
* Added the option to use session.user, instead of session.record. This is based off of what model your session is authenticating with.
|
287
|
+
|
288
|
+
== 1.0.0 released 2008-11-05
|
289
|
+
|
290
|
+
* Checked for blank login counts, if a default wasnt set in the migrations.
|
291
|
+
* Added check for database table in acts_as_authentic to avoid errors in initial setup.
|
292
|
+
* Completely rewrote tests to be more conventional and thorough tests, removed test_app.
|
293
|
+
* Modified how validations work so that a validate method was added as well as callbacks for that method.
|
294
|
+
* Extracted scope support into its own module to help organize code better.
|
295
|
+
* Added in salt for encryption, just like hashes and removed :crypto_provider_type option for acts_as_authentic.
|
296
|
+
* Added merb adapters.
|
297
|
+
* Improved documentation throughout.
|
298
|
+
|
299
|
+
== 0.10.4 released 2008-10-31
|
300
|
+
|
301
|
+
* Changed configuration to use inheritable attributes
|
302
|
+
* Cleaned up requires to be in their proper files
|
303
|
+
* Added in scope support.
|
304
|
+
|
305
|
+
== 0.10.3 released 2008-10-31
|
306
|
+
|
307
|
+
* Instead of raising an error when extra fields are passed in credentials=, just ignore them.
|
308
|
+
* Added remember_me config option to set the default value.
|
309
|
+
* Only call credential methods if an argument was passed.
|
310
|
+
* More unit tests
|
311
|
+
* Hardened automatic session updating. Also automatically log the user in if they change their password when logged out.
|
312
|
+
|
313
|
+
== 0.10.2 released 2008-10-24
|
314
|
+
|
315
|
+
* Added in stretches to the default Sha512 encryption algorithm.
|
316
|
+
* Use column_names instead of columns when determining if a column is present.
|
317
|
+
* Improved validation callbacks. after_validation should only be run if valid? = true. Also clear errors before the "before_validation" callback.
|
318
|
+
|
319
|
+
== 0.10.1 released 2008-10-24
|
320
|
+
|
321
|
+
* Sessions now store the "remember token" instead of the id. This is much safer and guarantees all "sessions" that are logged in are logged in with a valid password. This way stale sessions can't be persisted.
|
322
|
+
* Bumped security to Sha512 from Sha256.
|
323
|
+
* Remove attr_protected call in acts_as_authentic
|
324
|
+
* protected_password should use pasword_field configuration value
|
325
|
+
* changed magic state "inactive" to "active"
|
326
|
+
|
327
|
+
== 0.10.0 released 2008-10-24
|
328
|
+
|
329
|
+
* Do not allow instantiation if the session has not been activated with a controller object. Just like ActiveRecord won't let you do anything without a DB connection.
|
330
|
+
* Abstracted controller implementation to allow for rails, merb, etc adapters. So this is not confined to the rails framework.
|
331
|
+
* Removed create and update methods and added save, like ActiveRecord.
|
332
|
+
* after_validation should be able to change the result if it adds errors on callbacks.
|
333
|
+
* Completed tests.
|
334
|
+
|
335
|
+
== 0.9.1 released 2008-10-24
|
336
|
+
|
337
|
+
* Changed scope to id. Makes more sense to call it an id and fits better with the ActiveRecord model.
|
338
|
+
* Removed saving_from_session flag, apparently it is not needed.
|
339
|
+
* Fixed updating sessions to make more sense and be stricter.
|
340
|
+
* change last_click_at to last_request_at
|
341
|
+
* Only run "after" callbacks if the result is successful.
|
342
|
+
|
343
|
+
== 0.9.0 released 2008-10-24
|
344
|
+
|
345
|
+
* Initial release.
|