prototype/src
Sam Stephenson cbf8be9869 no, really! 2007-04-28 03:53:50 +00:00
..
HEADER prototype: Update HEADER to reflect new URL. 2007-01-18 22:33:49 +00:00
ajax.js prototype: Add support for per-request onCreate callbacks to Ajax.Request. Closes #8011. 2007-04-24 03:58:34 +00:00
array.js prototype: Add extra spacing so Array#toJSON and Hash#toJSON generate YAML-loadable JSON. Closes #7883. 2007-04-24 02:50:52 +00:00
base.js prototype: Add extra spacing so Array#toJSON and Hash#toJSON generate YAML-loadable JSON. Closes #7883. 2007-04-24 02:50:52 +00:00
dom.js prototype: Fix regression in which no-argument calls to Element.addMethods() would not add the methods defined in Form.Methods and Form.Element.Methods. Closes #8206. 2007-04-28 02:32:21 +00:00
enumerable.js prototype: Set window.$continue to an Error with a helpful message for anyone who may still be using 'throw $continue'. 2007-04-28 03:00:57 +00:00
event.js Make Event.element extend the returned element. Closes #7870. 2007-04-17 17:31:20 +00:00
form.js no, really! 2007-04-28 03:53:50 +00:00
hash.js prototype: Add extra spacing so Array#toJSON and Hash#toJSON generate YAML-loadable JSON. Closes #7883. 2007-04-24 02:50:52 +00:00
position.js Prototype: Add unified Browser detection by providing Prototype.Browser.(IE|Gecko|WebKit|Opera) booleans. Closes #6800. [savetheclocktower] 2007-02-19 22:23:10 +00:00
prototype.js prototype: Automatically strip security delimiter comments from JSON strings before evaling them. The default delimiter is '/*-secure- ... */' or you can specify your own with the Prototype.JSONFilter regular expression. If you wrap your JSON response bodies in this delimiter on the server side, rogue external sites can't hijack potentially sensitive data via <script> tags. Closes #7910. 2007-04-24 03:31:14 +00:00
range.js prototype: Reorganize the source tree. 2007-01-18 22:24:27 +00:00
selector.js Fix Selector issues with :not and attribute selector double quotes, fixes #7901. [Andrew Dupont] 2007-03-27 18:20:35 +00:00
string.js prototype: Automatically strip security delimiter comments from JSON strings before evaling them. The default delimiter is '/*-secure- ... */' or you can specify your own with the Prototype.JSONFilter regular expression. If you wrap your JSON response bodies in this delimiter on the server side, rogue external sites can't hijack potentially sensitive data via <script> tags. Closes #7910. 2007-04-24 03:31:14 +00:00