content
stringlengths
228
999k
pred_label
stringclasses
1 value
pred_score
float64
0.5
1
Understanding The Calculus Ab Worksheet On Continuity And The Intermediate Value Theorem AP Calc AB Unit 3 Continuity, Intermediate Value Theorem from www.youtube.com Understanding the Calculus AB Worksheet on Continuity and the Intermediate Value Theorem What is the Intermediate Value Theorem? The Intermediate Value Theorem is an important concept in Calculus. It states that if a continuous function f(x) is defined on a closed interval [a,b] and y is a number between f(a) and f(b), then there must be at least one number c in the interval [a,b] such that f(c)=y. This theorem is useful for finding points of intersection between two functions and for analyzing the behavior of a function over an interval. What is Continuity? Continuity is a property of a function that states that a function is continuous if it is defined at every point in its domain and the values of the function do not jump or change abruptly. A continuous function is continuous throughout its domain, meaning that the function is defined at every point in its domain and the values of the function do not jump or change abruptly. This means that a continuous function can be graphed without breaks or jumps. Calculus AB Worksheet on Continuity and the Intermediate Value Theorem Calculus AB worksheets can help students learn and review the Intermediate Value Theorem and the concept of continuity. These worksheets typically include questions that ask students to identify and explain the theorem, as well as to graph functions for which the theorem applies. The worksheets also give students practice in analyzing the behavior of a function over an interval. Using the Intermediate Value Theorem to Determine Points of Intersection The Intermediate Value Theorem can be used to determine points of intersection between two functions. To do this, the student must first find the intervals on which the two functions are continuous. Then, the student can use the theorem to determine if the two functions intersect on any of the intervals. If they do, then the student can use the theorem to find the point of intersection. Conclusion In summary, the Intermediate Value Theorem and concept of continuity are important concepts in Calculus. Calculus AB worksheets can be used to help students learn and review these concepts. The Intermediate Value Theorem can also be used to determine points of intersection between two functions. Understanding these concepts can help students gain a deeper understanding of Calculus.
__label__pos
1
/[jscoverage]/trunk/instrument-js.cpp ViewVC logotype Diff of /trunk/instrument-js.cpp Parent Directory Parent Directory | Revision Log Revision Log | View Patch Patch revision 95 by siliconforks, Wed May 7 22:50:00 2008 UTC revision 372 by siliconforks, Mon Oct 27 20:36:23 2008 UTC # Line 17  Line 17  17      51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.      51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. 18  */  */ 19     20    #include <config.h> 21     22  #include "instrument-js.h"  #include "instrument-js.h" 23     24  #include <assert.h>  #include <assert.h> # Line 24  Line 26  26  #include <string.h>  #include <string.h> 27     28  #include <jsapi.h>  #include <jsapi.h> 29    #include <jsarena.h> 30  #include <jsatom.h>  #include <jsatom.h> 31    #include <jsemit.h> 32    #include <jsexn.h> 33  #include <jsfun.h>  #include <jsfun.h> 34  #include <jsinterp.h>  #include <jsinterp.h> 35    #include <jsiter.h> 36  #include <jsparse.h>  #include <jsparse.h> 37  #include <jsregexp.h>  #include <jsregexp.h> 38  #include <jsscope.h>  #include <jsscope.h> 39  #include <jsstr.h>  #include <jsstr.h> 40     41    #include "encoding.h" 42    #include "global.h" 43    #include "highlight.h" 44    #include "resource-manager.h" 45  #include "util.h"  #include "util.h" 46     47    struct IfDirective { 48      const jschar * condition_start; 49      const jschar * condition_end; 50      uint16_t start_line; 51      uint16_t end_line; 52      struct IfDirective * next; 53    }; 54     55    bool jscoverage_mozilla = false; 56     57    static bool * exclusive_directives = NULL; 58     59  static JSRuntime * runtime = NULL;  static JSRuntime * runtime = NULL; 60  static JSContext * context = NULL;  static JSContext * context = NULL; 61  static JSObject * global = NULL;  static JSObject * global = NULL; 62    static JSVersion js_version = JSVERSION_ECMA_3; 63     64  /*  /* 65  JSParseNode objects store line numbers starting from 1.  JSParseNode objects store line numbers starting from 1. # Line 44  Line 67  67  */  */ 68  static const char * file_id = NULL;  static const char * file_id = NULL; 69  static char * lines = NULL;  static char * lines = NULL; 70    static uint16_t num_lines = 0; 71     72    void jscoverage_set_js_version(const char * version) { 73      js_version = JS_StringToVersion(version); 74      if (js_version != JSVERSION_UNKNOWN) { 75        return; 76      } 77     78      char * end; 79      js_version = (JSVersion) strtol(version, &end, 10); 80      if ((size_t) (end - version) != strlen(version)) { 81        fatal("invalid version: %s", version); 82      } 83    } 84     85  void jscoverage_init(void) {  void jscoverage_init(void) { 86    runtime = JS_NewRuntime(8L * 1024L * 1024L);    runtime = JS_NewRuntime(8L * 1024L * 1024L); # Line 56  Line 93  93      fatal("cannot create context");      fatal("cannot create context"); 94    }    } 95     96      JS_SetVersion(context, js_version); 97     98    global = JS_NewObject(context, NULL, NULL, NULL);    global = JS_NewObject(context, NULL, NULL, NULL); 99    if (global == NULL) {    if (global == NULL) { 100      fatal("cannot create global object");      fatal("cannot create global object"); # Line 71  Line 110  110    JS_DestroyRuntime(runtime);    JS_DestroyRuntime(runtime); 111  }  } 112     113    static void print_javascript(const jschar * characters, size_t num_characters, Stream * f) { 114      for (size_t i = 0; i < num_characters; i++) { 115        jschar c = characters[i]; 116        /* 117        XXX does not handle no-break space, other unicode "space separator" 118        */ 119        switch (c) { 120        case 0x9: 121        case 0xB: 122        case 0xC: 123          Stream_write_char(f, c); 124          break; 125        default: 126          if (32 <= c && c <= 126) { 127            Stream_write_char(f, c); 128          } 129          else { 130            Stream_printf(f, "\\u%04x", c); 131          } 132          break; 133        } 134      } 135    } 136     137  static void print_string(JSString * s, Stream * f) {  static void print_string(JSString * s, Stream * f) { 138    for (int i = 0; i < s->length; i++) {    size_t length = JSSTRING_LENGTH(s); 139      char c = s->chars[i];    jschar * characters = JSSTRING_CHARS(s); 140      Stream_write_char(f, c);    for (size_t i = 0; i < length; i++) { 141        jschar c = characters[i]; 142        if (32 <= c && c <= 126) { 143          switch (c) { 144          case '"': 145            Stream_write_string(f, "\\\""); 146            break; 147    /* 148          case '\'': 149            Stream_write_string(f, "\\'"); 150            break; 151    */ 152          case '\\': 153            Stream_write_string(f, "\\\\"); 154            break; 155          default: 156            Stream_write_char(f, c); 157            break; 158          } 159        } 160        else { 161          switch (c) { 162          case 0x8: 163            Stream_write_string(f, "\\b"); 164            break; 165          case 0x9: 166            Stream_write_string(f, "\\t"); 167            break; 168          case 0xa: 169            Stream_write_string(f, "\\n"); 170            break; 171          /* IE doesn't support this */ 172          /* 173          case 0xb: 174            Stream_write_string(f, "\\v"); 175            break; 176          */ 177          case 0xc: 178            Stream_write_string(f, "\\f"); 179            break; 180          case 0xd: 181            Stream_write_string(f, "\\r"); 182            break; 183          default: 184            Stream_printf(f, "\\u%04x", c); 185            break; 186          } 187        } 188    }    } 189  }  } 190     # Line 84  Line 194  194    print_string(s, f);    print_string(s, f); 195  }  } 196     197  static void print_string_jsval(jsval value, Stream * f) {  static void print_regex(jsval value, Stream * f) { 198    assert(JSVAL_IS_STRING(value));    assert(JSVAL_IS_STRING(value)); 199    JSString * s = JSVAL_TO_STRING(value);    JSString * s = JSVAL_TO_STRING(value); 200    print_string(s, f);    size_t length = JSSTRING_LENGTH(s); 201      jschar * characters = JSSTRING_CHARS(s); 202      for (size_t i = 0; i < length; i++) { 203        jschar c = characters[i]; 204        if (32 <= c && c <= 126) { 205          Stream_write_char(f, c); 206        } 207        else { 208          Stream_printf(f, "\\u%04x", c); 209        } 210      } 211  }  } 212     213  static void print_quoted_string_atom(JSAtom * atom, Stream * f) {  static void print_quoted_string_atom(JSAtom * atom, Stream * f) { 214    assert(ATOM_IS_STRING(atom));    assert(ATOM_IS_STRING(atom)); 215    JSString * s = ATOM_TO_STRING(atom);    JSString * s = ATOM_TO_STRING(atom); 216    JSString * quoted = js_QuoteString(context, s, '"');    Stream_write_char(f, '"'); 217    print_string(quoted, f);    print_string(s, f); 218      Stream_write_char(f, '"'); 219  }  } 220     221  static const char * get_op(uint8 op) {  static const char * get_op(uint8 op) { 222    switch(op) {    switch(op) { 223      case JSOP_OR: 224        return "||"; 225      case JSOP_AND: 226        return "&&"; 227    case JSOP_BITOR:    case JSOP_BITOR: 228      return "|";      return "|"; 229    case JSOP_BITXOR:    case JSOP_BITXOR: # Line 109  Line 234  234      return "==";      return "=="; 235    case JSOP_NE:    case JSOP_NE: 236      return "!=";      return "!="; 237    case JSOP_NEW_EQ:    case JSOP_STRICTEQ: 238      return "===";      return "==="; 239    case JSOP_NEW_NE:    case JSOP_STRICTNE: 240      return "!==";      return "!=="; 241    case JSOP_LT:    case JSOP_LT: 242      return "<";      return "<"; # Line 143  Line 268  268  }  } 269     270  static void instrument_expression(JSParseNode * node, Stream * f);  static void instrument_expression(JSParseNode * node, Stream * f); 271  static void instrument_statement(JSParseNode * node, Stream * f, int indent);  static void instrument_statement(JSParseNode * node, Stream * f, int indent, bool is_jscoverage_if); 272    static void output_statement(JSParseNode * node, Stream * f, int indent, bool is_jscoverage_if); 273     274  static void instrument_function(JSParseNode * node, Stream * f, int indent) {  enum FunctionType { 275      assert(node->pn_arity == PN_FUNC);    FUNCTION_NORMAL, 276      assert(ATOM_IS_OBJECT(node->pn_funAtom));    FUNCTION_GETTER_OR_SETTER 277      JSObject * object = ATOM_TO_OBJECT(node->pn_funAtom);  }; 278      assert(JS_ObjectIsFunction(context, object));   279      JSFunction * function = (JSFunction *) JS_GetPrivate(context, object);  static void output_for_in(JSParseNode * node, Stream * f) { 280      assert(function);    assert(node->pn_type == TOK_FOR); 281      assert(object == function->object);    assert(node->pn_arity == PN_BINARY); 282      Stream_printf(f, "%*s", indent, "");    Stream_write_string(f, "for "); 283      Stream_write_string(f, "function");    if (node->pn_iflags & JSITER_FOREACH) { 284        Stream_write_string(f, "each "); 285      } 286      Stream_write_char(f, '('); 287      instrument_expression(node->pn_left, f); 288      Stream_write_char(f, ')'); 289    } 290     291      /* function name */  static void output_array_comprehension_or_generator_expression(JSParseNode * node, Stream * f) { 292      if (function->atom) {    assert(node->pn_type == TOK_LEXICALSCOPE); 293        Stream_write_char(f, ' ');    assert(node->pn_arity == PN_NAME); 294        print_string_atom(function->atom, f);    JSParseNode * for_node = node->pn_expr; 295      }    assert(for_node->pn_type == TOK_FOR); 296      assert(for_node->pn_arity == PN_BINARY); 297      JSParseNode * p = for_node; 298      while (p->pn_type == TOK_FOR) { 299        p = p->pn_right; 300      } 301      JSParseNode * if_node = NULL; 302      if (p->pn_type == TOK_IF) { 303        if_node = p; 304        assert(if_node->pn_arity == PN_TERNARY); 305        p = if_node->pn_kid2; 306      } 307      assert(p->pn_arity == PN_UNARY); 308      p = p->pn_kid; 309      if (p->pn_type == TOK_YIELD) { 310        /* for generator expressions */ 311        p = p->pn_kid; 312      } 313     314      /* function parameters */    instrument_expression(p, f); 315      Stream_write_string(f, "(");    p = for_node; 316      JSAtom ** params = xmalloc(function->nargs * sizeof(JSAtom *));    while (p->pn_type == TOK_FOR) { 317      for (int i = 0; i < function->nargs; i++) {      Stream_write_char(f, ' '); 318        /* initialize to NULL for sanity check */      output_for_in(p, f); 319        params[i] = NULL;      p = p->pn_right; 320      }    } 321      JSScope * scope = OBJ_SCOPE(object);    if (if_node) { 322      for (JSScopeProperty * scope_property = SCOPE_LAST_PROP(scope); scope_property != NULL; scope_property = scope_property->parent) {      Stream_write_string(f, " if ("); 323        if (scope_property->getter != js_GetArgument) {      instrument_expression(if_node->pn_kid1, f); 324          continue;      Stream_write_char(f, ')'); 325        }    } 326        assert(scope_property->flags & SPROP_HAS_SHORTID);  } 327        assert((uint16) scope_property->shortid < function->nargs);   328        assert(JSID_IS_ATOM(scope_property->id));  static void instrument_function(JSParseNode * node, Stream * f, int indent, enum FunctionType type) { 329        params[(uint16) scope_property->shortid] = JSID_TO_ATOM(scope_property->id);    assert(node->pn_type == TOK_FUNCTION); 330      assert(node->pn_arity == PN_FUNC); 331      JSObject * object = node->pn_funpob->object; 332      assert(JS_ObjectIsFunction(context, object)); 333      JSFunction * function = (JSFunction *) JS_GetPrivate(context, object); 334      assert(function); 335      assert(object == &function->object); 336      Stream_printf(f, "%*s", indent, ""); 337      if (type == FUNCTION_NORMAL) { 338        Stream_write_string(f, "function "); 339      } 340     341      /* function name */ 342      if (function->atom) { 343        print_string_atom(function->atom, f); 344      } 345     346      /* 347      function parameters - see JS_DecompileFunction in jsapi.cpp, which calls 348      js_DecompileFunction in jsopcode.cpp 349      */ 350      Stream_write_char(f, '('); 351      JSArenaPool pool; 352      JS_INIT_ARENA_POOL(&pool, "instrument_function", 256, 1, &context->scriptStackQuota); 353      jsuword * local_names = NULL; 354      if (JS_GET_LOCAL_NAME_COUNT(function)) { 355        local_names = js_GetLocalNameArray(context, function, &pool); 356        if (local_names == NULL) { 357          fatal("out of memory"); 358      }      } 359      for (int i = 0; i < function->nargs; i++) {    } 360        assert(params[i] != NULL);    for (int i = 0; i < function->nargs; i++) { 361        if (i > 0) {      if (i > 0) { 362          Stream_write_string(f, ", ");        Stream_write_string(f, ", ");        }          if (ATOM_IS_STRING(params[i])) {            print_string_atom(params[i], f);          }   363      }      } 364      Stream_write_string(f, ") {\n");      JSAtom * param = JS_LOCAL_NAME_TO_ATOM(local_names[i]); 365      free(params);      if (param == NULL) { 366          fatal_source(file_id, node->pn_pos.begin.lineno, "unsupported parameter type for function"); 367        } 368        print_string_atom(param, f); 369      } 370      JS_FinishArenaPool(&pool); 371      Stream_write_string(f, ") {\n"); 372     373      /* function body */    /* function body */ 374      instrument_statement(node->pn_body, f, indent + 2);    if (function->flags & JSFUN_EXPR_CLOSURE) { 375        /* expression closure */ 376        output_statement(node->pn_body, f, indent + 2, false); 377      } 378      else { 379        instrument_statement(node->pn_body, f, indent + 2, false); 380      } 381     382      Stream_write_string(f, "}\n");    Stream_write_string(f, "}\n"); 383  }  } 384     385  static void instrument_function_call(JSParseNode * node, Stream * f) {  static void instrument_function_call(JSParseNode * node, Stream * f) { 386    instrument_expression(node->pn_head, f);    JSParseNode * function_node = node->pn_head; 387      if (function_node->pn_type == TOK_FUNCTION) { 388        JSObject * object = function_node->pn_funpob->object; 389        assert(JS_ObjectIsFunction(context, object)); 390        JSFunction * function = (JSFunction *) JS_GetPrivate(context, object); 391        assert(function); 392        assert(object == &function->object); 393     394        if (function_node->pn_flags & TCF_GENEXP_LAMBDA) { 395          /* it's a generator expression */ 396          Stream_write_char(f, '('); 397          output_array_comprehension_or_generator_expression(function_node->pn_body, f); 398          Stream_write_char(f, ')'); 399          return; 400        } 401        else { 402          Stream_write_char(f, '('); 403          instrument_expression(function_node, f); 404          Stream_write_char(f, ')'); 405        } 406      } 407      else { 408        instrument_expression(function_node, f); 409      } 410    Stream_write_char(f, '(');    Stream_write_char(f, '('); 411    for (struct JSParseNode * p = node->pn_head->pn_next; p != NULL; p = p->pn_next) {    for (struct JSParseNode * p = function_node->pn_next; p != NULL; p = p->pn_next) { 412      if (p != node->pn_head->pn_next) {      if (p != node->pn_head->pn_next) { 413        Stream_write_string(f, ", ");        Stream_write_string(f, ", "); 414      }      } # Line 209  Line 417  417    Stream_write_char(f, ')');    Stream_write_char(f, ')'); 418  }  } 419     420    static void instrument_declarations(JSParseNode * list, Stream * f) { 421      assert(list->pn_arity == PN_LIST); 422      for (JSParseNode * p = list->pn_head; p != NULL; p = p->pn_next) { 423        switch (p->pn_type) { 424        case TOK_NAME: 425          assert(p->pn_arity == PN_NAME); 426          if (p != list->pn_head) { 427            Stream_write_string(f, ", "); 428          } 429          print_string_atom(p->pn_atom, f); 430          if (p->pn_expr != NULL) { 431            Stream_write_string(f, " = "); 432            instrument_expression(p->pn_expr, f); 433          } 434          break; 435        case TOK_ASSIGN: 436        case TOK_RB: 437        case TOK_RC: 438          /* destructuring */ 439          instrument_expression(p, f); 440          break; 441        default: 442          abort(); 443          break; 444        } 445      } 446    } 447     448  /*  /* 449  See <Expressions> in jsparse.h.  See <Expressions> in jsparse.h. 450  TOK_FUNCTION is handled as a statement and as an expression.  TOK_FUNCTION is handled as a statement and as an expression. # Line 225  Line 461  461  static void instrument_expression(JSParseNode * node, Stream * f) {  static void instrument_expression(JSParseNode * node, Stream * f) { 462    switch (node->pn_type) {    switch (node->pn_type) { 463    case TOK_FUNCTION:    case TOK_FUNCTION: 464      instrument_function(node, f, 0);      instrument_function(node, f, 0, FUNCTION_NORMAL); 465      break;      break; 466    case TOK_COMMA:    case TOK_COMMA: 467      for (struct JSParseNode * p = node->pn_head; p != NULL; p = p->pn_next) {      for (struct JSParseNode * p = node->pn_head; p != NULL; p = p->pn_next) { # Line 267  Line 503  503      instrument_expression(node->pn_kid3, f);      instrument_expression(node->pn_kid3, f); 504      break;      break; 505    case TOK_OR:    case TOK_OR:      instrument_expression(node->pn_left, f);        Stream_write_string(f, " || ");        instrument_expression(node->pn_right, f);        break;   506    case TOK_AND:    case TOK_AND:      instrument_expression(node->pn_left, f);        Stream_write_string(f, " && ");        instrument_expression(node->pn_right, f);        break;   507    case TOK_BITOR:    case TOK_BITOR: 508    case TOK_BITXOR:    case TOK_BITXOR: 509    case TOK_BITAND:    case TOK_BITAND: # Line 331  Line 559  559        instrument_expression(node->pn_kid, f);        instrument_expression(node->pn_kid, f); 560        break;        break; 561      default:      default: 562        abort();        fatal_source(file_id, node->pn_pos.begin.lineno, "unknown operator (%d)", node->pn_op); 563        break;        break; 564      }      } 565      break;      break; # Line 388  Line 616  616      assert(ATOM_IS_STRING(node->pn_atom));      assert(ATOM_IS_STRING(node->pn_atom)); 617      {      { 618        JSString * s = ATOM_TO_STRING(node->pn_atom);        JSString * s = ATOM_TO_STRING(node->pn_atom); 619        /* XXX - semantics changed in 1.7 */        bool must_quote; 620        if (! ATOM_KEYWORD(node->pn_atom) && js_IsIdentifier(s)) {        if (JSSTRING_LENGTH(s) == 0) { 621          Stream_write_char(f, '.');          must_quote = true; 622          print_string_atom(node->pn_atom, f);        } 623          else if (js_CheckKeyword(JSSTRING_CHARS(s), JSSTRING_LENGTH(s)) != TOK_EOF) { 624            must_quote = true; 625          } 626          else if (! js_IsIdentifier(s)) { 627            must_quote = true; 628        }        } 629        else {        else { 630            must_quote = false; 631          } 632          if (must_quote) { 633          Stream_write_char(f, '[');          Stream_write_char(f, '['); 634          print_quoted_string_atom(node->pn_atom, f);          print_quoted_string_atom(node->pn_atom, f); 635          Stream_write_char(f, ']');          Stream_write_char(f, ']'); 636        }        } 637          else { 638            Stream_write_char(f, '.'); 639            print_string_atom(node->pn_atom, f); 640          } 641      }      } 642      break;      break; 643    case TOK_LB:    case TOK_LB: # Line 428  Line 668  668    case TOK_RC:    case TOK_RC: 669      Stream_write_char(f, '{');      Stream_write_char(f, '{'); 670      for (struct JSParseNode * p = node->pn_head; p != NULL; p = p->pn_next) {      for (struct JSParseNode * p = node->pn_head; p != NULL; p = p->pn_next) { 671        assert(p->pn_type == TOK_COLON);        if (p->pn_type != TOK_COLON) { 672            fatal_source(file_id, p->pn_pos.begin.lineno, "unsupported node type (%d)", p->pn_type); 673          } 674        if (p != node->pn_head) {        if (p != node->pn_head) { 675          Stream_write_string(f, ", ");          Stream_write_string(f, ", "); 676        }        } 677        instrument_expression(p->pn_left, f);   678        Stream_write_string(f, ": ");        /* check whether this is a getter or setter */ 679        instrument_expression(p->pn_right, f);        switch (p->pn_op) { 680          case JSOP_GETTER: 681          case JSOP_SETTER: 682            if (p->pn_op == JSOP_GETTER) { 683              Stream_write_string(f, "get "); 684            } 685            else { 686              Stream_write_string(f, "set "); 687            } 688            instrument_expression(p->pn_left, f); 689            if (p->pn_right->pn_type != TOK_FUNCTION) { 690              fatal_source(file_id, p->pn_pos.begin.lineno, "expected function"); 691            } 692            instrument_function(p->pn_right, f, 0, FUNCTION_GETTER_OR_SETTER); 693            break; 694          default: 695            instrument_expression(p->pn_left, f); 696            Stream_write_string(f, ": "); 697            instrument_expression(p->pn_right, f); 698            break; 699          } 700      }      } 701      Stream_write_char(f, '}');      Stream_write_char(f, '}'); 702      break;      break; # Line 449  Line 711  711    case TOK_STRING:    case TOK_STRING: 712      print_quoted_string_atom(node->pn_atom, f);      print_quoted_string_atom(node->pn_atom, f); 713      break;      break; 714    case TOK_OBJECT:    case TOK_REGEXP: 715      switch (node->pn_op) {      assert(node->pn_op == JSOP_REGEXP); 716      case JSOP_OBJECT:      { 717        /* I assume this is JSOP_REGEXP */        JSObject * object = node->pn_pob->object; 718        abort();        jsval result; 719        break;        js_regexp_toString(context, object, &result); 720      case JSOP_REGEXP:        print_regex(result, f);        assert(ATOM_IS_OBJECT(node->pn_atom));          {            JSObject * object = ATOM_TO_OBJECT(node->pn_atom);            jsval result;            js_regexp_toString(context, object, 0, NULL, &result);            print_string_jsval(result, f);          }          break;        default:          abort();          break;   721      }      } 722      break;      break; 723    case TOK_NUMBER:    case TOK_NUMBER: # Line 512  Line 763  763      Stream_write_string(f, " in ");      Stream_write_string(f, " in "); 764      instrument_expression(node->pn_right, f);      instrument_expression(node->pn_right, f); 765      break;      break; 766    default:    case TOK_LEXICALSCOPE: 767      fatal("unsupported node type in file %s: %d", file_id, node->pn_type);      assert(node->pn_arity == PN_NAME); 768    }      assert(node->pn_expr->pn_type == TOK_LET); 769  }      assert(node->pn_expr->pn_arity == PN_BINARY); 770        Stream_write_string(f, "let("); 771  static void instrument_var_statement(JSParseNode * node, Stream * f, int indent) {      assert(node->pn_expr->pn_left->pn_type == TOK_LP); 772    assert(node->pn_arity == PN_LIST);      assert(node->pn_expr->pn_left->pn_arity == PN_LIST); 773    Stream_printf(f, "%*s", indent, "");      instrument_declarations(node->pn_expr->pn_left, f); 774    Stream_write_string(f, "var ");      Stream_write_string(f, ") "); 775    for (struct JSParseNode * p = node->pn_u.list.head; p != NULL; p = p->pn_next) {      instrument_expression(node->pn_expr->pn_right, f); 776      assert(p->pn_type == TOK_NAME);      break; 777      assert(p->pn_arity == PN_NAME);    case TOK_YIELD: 778      if (p != node->pn_head) {      assert(node->pn_arity == PN_UNARY); 779        Stream_write_string(f, ", ");      Stream_write_string(f, "yield"); 780        if (node->pn_kid != NULL) { 781          Stream_write_char(f, ' '); 782          instrument_expression(node->pn_kid, f); 783      }      } 784      print_string_atom(p->pn_atom, f);      break; 785      if (p->pn_expr != NULL) {    case TOK_ARRAYCOMP: 786        Stream_write_string(f, " = ");      assert(node->pn_arity == PN_LIST); 787        instrument_expression(p->pn_expr, f);      { 788          JSParseNode * block_node; 789          switch (node->pn_count) { 790          case 1: 791            block_node = node->pn_head; 792            break; 793          case 2: 794            block_node = node->pn_head->pn_next; 795            break; 796          default: 797            abort(); 798            break; 799          } 800          Stream_write_char(f, '['); 801          output_array_comprehension_or_generator_expression(block_node, f); 802          Stream_write_char(f, ']'); 803      }      } 804        break; 805      case TOK_VAR: 806        assert(node->pn_arity == PN_LIST); 807        Stream_write_string(f, "var "); 808        instrument_declarations(node, f); 809        break; 810      case TOK_LET: 811        assert(node->pn_arity == PN_LIST); 812        Stream_write_string(f, "let "); 813        instrument_declarations(node, f); 814        break; 815      default: 816        fatal_source(file_id, node->pn_pos.begin.lineno, "unsupported node type (%d)", node->pn_type); 817    }    } 818  }  } 819     820  static void output_statement(JSParseNode * node, Stream * f, int indent) {  static void output_statement(JSParseNode * node, Stream * f, int indent, bool is_jscoverage_if) { 821    switch (node->pn_type) {    switch (node->pn_type) { 822    case TOK_FUNCTION:    case TOK_FUNCTION: 823      instrument_function(node, f, indent);      instrument_function(node, f, indent, FUNCTION_NORMAL); 824      break;      break; 825    case TOK_LC:    case TOK_LC: 826      assert(node->pn_arity == PN_LIST);      assert(node->pn_arity == PN_LIST); # Line 546  Line 828  828      Stream_write_string(f, "{\n");      Stream_write_string(f, "{\n"); 829  */  */ 830      for (struct JSParseNode * p = node->pn_u.list.head; p != NULL; p = p->pn_next) {      for (struct JSParseNode * p = node->pn_u.list.head; p != NULL; p = p->pn_next) { 831        instrument_statement(p, f, indent);        instrument_statement(p, f, indent, false); 832      }      } 833  /*  /* 834      Stream_printf(f, "%*s", indent, "");      Stream_printf(f, "%*s", indent, ""); # Line 554  Line 836  836  */  */ 837      break;      break; 838    case TOK_IF:    case TOK_IF: 839      { 840      assert(node->pn_arity == PN_TERNARY);      assert(node->pn_arity == PN_TERNARY); 841     842        uint16_t line = node->pn_pos.begin.lineno; 843        if (! is_jscoverage_if) { 844          if (line > num_lines) { 845            fatal("file %s contains more than 65,535 lines", file_id); 846          } 847          if (line >= 2 && exclusive_directives[line - 2]) { 848            is_jscoverage_if = true; 849          } 850        } 851     852      Stream_printf(f, "%*s", indent, "");      Stream_printf(f, "%*s", indent, ""); 853      Stream_write_string(f, "if (");      Stream_write_string(f, "if ("); 854      instrument_expression(node->pn_kid1, f);      instrument_expression(node->pn_kid1, f); 855      Stream_write_string(f, ") {\n");      Stream_write_string(f, ") {\n"); 856      instrument_statement(node->pn_kid2, f, indent + 2);      if (is_jscoverage_if && node->pn_kid3) { 857          uint16_t else_start = node->pn_kid3->pn_pos.begin.lineno; 858          uint16_t else_end = node->pn_kid3->pn_pos.end.lineno + 1; 859          Stream_printf(f, "%*s", indent + 2, ""); 860          Stream_printf(f, "_$jscoverage['%s'].conditionals[%d] = %d;\n", file_id, else_start, else_end); 861        } 862        instrument_statement(node->pn_kid2, f, indent + 2, false); 863      Stream_printf(f, "%*s", indent, "");      Stream_printf(f, "%*s", indent, ""); 864      Stream_write_string(f, "}\n");      Stream_write_string(f, "}\n"); 865      if (node->pn_kid3) {   866        if (node->pn_kid3 || is_jscoverage_if) { 867        Stream_printf(f, "%*s", indent, "");        Stream_printf(f, "%*s", indent, ""); 868        Stream_write_string(f, "else {\n");        Stream_write_string(f, "else {\n"); 869        instrument_statement(node->pn_kid3, f, indent + 2);   870          if (is_jscoverage_if) { 871            uint16_t if_start = node->pn_kid2->pn_pos.begin.lineno + 1; 872            uint16_t if_end = node->pn_kid2->pn_pos.end.lineno + 1; 873            Stream_printf(f, "%*s", indent + 2, ""); 874            Stream_printf(f, "_$jscoverage['%s'].conditionals[%d] = %d;\n", file_id, if_start, if_end); 875          } 876     877          if (node->pn_kid3) { 878            instrument_statement(node->pn_kid3, f, indent + 2, is_jscoverage_if); 879          } 880     881        Stream_printf(f, "%*s", indent, "");        Stream_printf(f, "%*s", indent, ""); 882        Stream_write_string(f, "}\n");        Stream_write_string(f, "}\n"); 883      }      } 884     885      break;      break; 886      } 887    case TOK_SWITCH:    case TOK_SWITCH: 888      assert(node->pn_arity == PN_BINARY);      assert(node->pn_arity == PN_BINARY); 889      Stream_printf(f, "%*s", indent, "");      Stream_printf(f, "%*s", indent, ""); 890      Stream_write_string(f, "switch (");      Stream_write_string(f, "switch ("); 891      instrument_expression(node->pn_left, f);      instrument_expression(node->pn_left, f); 892      Stream_write_string(f, ") {\n");      Stream_write_string(f, ") {\n"); 893      for (struct JSParseNode * p = node->pn_right->pn_head; p != NULL; p = p->pn_next) {      { 894        Stream_printf(f, "%*s", indent, "");        JSParseNode * list = node->pn_right; 895        switch (p->pn_type) {        if (list->pn_type == TOK_LEXICALSCOPE) { 896        case TOK_CASE:          list = list->pn_expr; 897          Stream_write_string(f, "case ");        } 898          instrument_expression(p->pn_left, f);        for (struct JSParseNode * p = list->pn_head; p != NULL; p = p->pn_next) { 899          Stream_write_string(f, ":\n");          Stream_printf(f, "%*s", indent, ""); 900          break;          switch (p->pn_type) { 901        case TOK_DEFAULT:          case TOK_CASE: 902          Stream_write_string(f, "default:\n");            Stream_write_string(f, "case "); 903          break;            instrument_expression(p->pn_left, f); 904        default:            Stream_write_string(f, ":\n"); 905          abort();            break; 906          break;          case TOK_DEFAULT: 907              Stream_write_string(f, "default:\n"); 908              break; 909            default: 910              abort(); 911              break; 912            } 913            instrument_statement(p->pn_right, f, indent + 2, false); 914        }        }        instrument_statement(p->pn_right, f, indent + 2);   915      }      } 916      Stream_printf(f, "%*s", indent, "");      Stream_printf(f, "%*s", indent, ""); 917      Stream_write_string(f, "}\n");      Stream_write_string(f, "}\n"); # Line 606  Line 926  926      Stream_write_string(f, "while (");      Stream_write_string(f, "while ("); 927      instrument_expression(node->pn_left, f);      instrument_expression(node->pn_left, f); 928      Stream_write_string(f, ") {\n");      Stream_write_string(f, ") {\n"); 929      instrument_statement(node->pn_right, f, indent + 2);      instrument_statement(node->pn_right, f, indent + 2, false); 930      Stream_write_string(f, "}\n");      Stream_write_string(f, "}\n"); 931      break;      break; 932    case TOK_DO:    case TOK_DO: 933      assert(node->pn_arity == PN_BINARY);      assert(node->pn_arity == PN_BINARY); 934      Stream_printf(f, "%*s", indent, "");      Stream_printf(f, "%*s", indent, ""); 935      Stream_write_string(f, "do {\n");      Stream_write_string(f, "do {\n"); 936      instrument_statement(node->pn_left, f, indent + 2);      instrument_statement(node->pn_left, f, indent + 2, false); 937      Stream_write_string(f, "}\n");      Stream_write_string(f, "}\n"); 938      Stream_printf(f, "%*s", indent, "");      Stream_printf(f, "%*s", indent, ""); 939      Stream_write_string(f, "while (");      Stream_write_string(f, "while ("); # Line 623  Line 943  943    case TOK_FOR:    case TOK_FOR: 944      assert(node->pn_arity == PN_BINARY);      assert(node->pn_arity == PN_BINARY); 945      Stream_printf(f, "%*s", indent, "");      Stream_printf(f, "%*s", indent, "");      Stream_write_string(f, "for (");   946      switch (node->pn_left->pn_type) {      switch (node->pn_left->pn_type) { 947      case TOK_IN:      case TOK_IN: 948        /* for/in */        /* for/in */ 949        assert(node->pn_left->pn_arity == PN_BINARY);        assert(node->pn_left->pn_arity == PN_BINARY); 950        switch (node->pn_left->pn_left->pn_type) {        output_for_in(node, f);        case TOK_VAR:            instrument_var_statement(node->pn_left->pn_left, f, 0);            break;          case TOK_NAME:            instrument_expression(node->pn_left->pn_left, f);            break;          default:            /* this is undocumented: for (x.value in y) */            instrument_expression(node->pn_left->pn_left, f);            break;    /*          default:            fprintf(stderr, "unexpected node type: %d\n", node->pn_left->pn_left->pn_type);            abort();            break;    */          }          Stream_write_string(f, " in ");          instrument_expression(node->pn_left->pn_right, f);   951        break;        break; 952      case TOK_RESERVED:      case TOK_RESERVED: 953        /* for (;;) */        /* for (;;) */ 954        assert(node->pn_left->pn_arity == PN_TERNARY);        assert(node->pn_left->pn_arity == PN_TERNARY); 955          Stream_write_string(f, "for ("); 956        if (node->pn_left->pn_kid1) {        if (node->pn_left->pn_kid1) { 957          if (node->pn_left->pn_kid1->pn_type == TOK_VAR) {          instrument_expression(node->pn_left->pn_kid1, f);            instrument_var_statement(node->pn_left->pn_kid1, f, 0);            }            else {              instrument_expression(node->pn_left->pn_kid1, f);            }   958        }        } 959        Stream_write_string(f, ";");        Stream_write_string(f, ";"); 960        if (node->pn_left->pn_kid2) {        if (node->pn_left->pn_kid2) { # Line 670  Line 966  966          Stream_write_char(f, ' ');          Stream_write_char(f, ' '); 967          instrument_expression(node->pn_left->pn_kid3, f);          instrument_expression(node->pn_left->pn_kid3, f); 968        }        } 969          Stream_write_char(f, ')'); 970        break;        break; 971      default:      default: 972        abort();        abort(); 973        break;        break; 974      }      } 975      Stream_write_string(f, ") {\n");      Stream_write_string(f, " {\n"); 976      instrument_statement(node->pn_right, f, indent + 2);      instrument_statement(node->pn_right, f, indent + 2, false); 977      Stream_write_string(f, "}\n");      Stream_write_string(f, "}\n"); 978      break;      break; 979    case TOK_THROW:    case TOK_THROW: # Line 689  Line 986  986    case TOK_TRY:    case TOK_TRY: 987      Stream_printf(f, "%*s", indent, "");      Stream_printf(f, "%*s", indent, ""); 988      Stream_write_string(f, "try {\n");      Stream_write_string(f, "try {\n"); 989      instrument_statement(node->pn_kid1, f, indent + 2);      instrument_statement(node->pn_kid1, f, indent + 2, false); 990      Stream_printf(f, "%*s", indent, "");      Stream_printf(f, "%*s", indent, ""); 991      Stream_write_string(f, "}\n");      Stream_write_string(f, "}\n"); 992      {      if (node->pn_kid2) { 993        for (JSParseNode * catch = node->pn_kid2; catch != NULL; catch = catch->pn_kid2) {        assert(node->pn_kid2->pn_type == TOK_RESERVED); 994          for (JSParseNode * scope = node->pn_kid2->pn_head; scope != NULL; scope = scope->pn_next) { 995            assert(scope->pn_type == TOK_LEXICALSCOPE); 996            JSParseNode * catch = scope->pn_expr; 997          assert(catch->pn_type == TOK_CATCH);          assert(catch->pn_type == TOK_CATCH); 998          Stream_printf(f, "%*s", indent, "");          Stream_printf(f, "%*s", indent, ""); 999          Stream_write_string(f, "catch (");          Stream_write_string(f, "catch ("); 1000            /* this may not be a name - destructuring assignment */ 1001            /* 1002          assert(catch->pn_kid1->pn_arity == PN_NAME);          assert(catch->pn_kid1->pn_arity == PN_NAME); 1003          print_string_atom(catch->pn_kid1->pn_atom, f);          print_string_atom(catch->pn_kid1->pn_atom, f); 1004          if (catch->pn_kid1->pn_expr) {          */ 1005            instrument_expression(catch->pn_kid1, f); 1006            if (catch->pn_kid2) { 1007            Stream_write_string(f, " if ");            Stream_write_string(f, " if "); 1008            instrument_expression(catch->pn_kid1->pn_expr, f);            instrument_expression(catch->pn_kid2, f); 1009          }          } 1010          Stream_write_string(f, ") {\n");          Stream_write_string(f, ") {\n"); 1011          instrument_statement(catch->pn_kid3, f, indent + 2);          instrument_statement(catch->pn_kid3, f, indent + 2, false); 1012          Stream_printf(f, "%*s", indent, "");          Stream_printf(f, "%*s", indent, ""); 1013          Stream_write_string(f, "}\n");          Stream_write_string(f, "}\n"); 1014        }        } # Line 712  Line 1016  1016      if (node->pn_kid3) {      if (node->pn_kid3) { 1017        Stream_printf(f, "%*s", indent, "");        Stream_printf(f, "%*s", indent, ""); 1018        Stream_write_string(f, "finally {\n");        Stream_write_string(f, "finally {\n"); 1019        instrument_statement(node->pn_kid3, f, indent + 2);        instrument_statement(node->pn_kid3, f, indent + 2, false); 1020        Stream_printf(f, "%*s", indent, "");        Stream_printf(f, "%*s", indent, ""); 1021        Stream_write_string(f, "}\n");        Stream_write_string(f, "}\n"); 1022      }      } # Line 738  Line 1042  1042      Stream_write_string(f, "with (");      Stream_write_string(f, "with ("); 1043      instrument_expression(node->pn_left, f);      instrument_expression(node->pn_left, f); 1044      Stream_write_string(f, ") {\n");      Stream_write_string(f, ") {\n"); 1045      instrument_statement(node->pn_right, f, indent + 2);      instrument_statement(node->pn_right, f, indent + 2, false); 1046      Stream_printf(f, "%*s", indent, "");      Stream_printf(f, "%*s", indent, ""); 1047      Stream_write_string(f, "}\n");      Stream_write_string(f, "}\n"); 1048      break;      break; 1049    case TOK_VAR:    case TOK_VAR: 1050      instrument_var_statement(node, f, indent);      Stream_printf(f, "%*s", indent, ""); 1051        instrument_expression(node, f); 1052      Stream_write_string(f, ";\n");      Stream_write_string(f, ";\n"); 1053      break;      break; 1054    case TOK_RETURN:    case TOK_RETURN: # Line 776  Line 1081  1081      /*      /* 1082      ... use output_statement instead of instrument_statement.      ... use output_statement instead of instrument_statement. 1083      */      */ 1084      output_statement(node->pn_expr, f, indent);      output_statement(node->pn_expr, f, indent, false); 1085        break; 1086      case TOK_LEXICALSCOPE: 1087        /* let statement */ 1088        assert(node->pn_arity == PN_NAME); 1089        switch (node->pn_expr->pn_type) { 1090        case TOK_LET: 1091          /* let statement */ 1092          assert(node->pn_expr->pn_arity == PN_BINARY); 1093          instrument_statement(node->pn_expr, f, indent, false); 1094          break; 1095        case TOK_LC: 1096          /* block */ 1097          Stream_printf(f, "%*s", indent, ""); 1098          Stream_write_string(f, "{\n"); 1099          instrument_statement(node->pn_expr, f, indent + 2, false); 1100          Stream_printf(f, "%*s", indent, ""); 1101          Stream_write_string(f, "}\n"); 1102          break; 1103        case TOK_FOR: 1104          instrument_statement(node->pn_expr, f, indent, false); 1105          break; 1106        default: 1107          abort(); 1108          break; 1109        } 1110        break; 1111      case TOK_LET: 1112        switch (node->pn_arity) { 1113        case PN_BINARY: 1114          /* let statement */ 1115          Stream_printf(f, "%*s", indent, ""); 1116          Stream_write_string(f, "let ("); 1117          assert(node->pn_left->pn_type == TOK_LP); 1118          assert(node->pn_left->pn_arity == PN_LIST); 1119          instrument_declarations(node->pn_left, f); 1120          Stream_write_string(f, ") {\n"); 1121          instrument_statement(node->pn_right, f, indent + 2, false); 1122          Stream_printf(f, "%*s", indent, ""); 1123          Stream_write_string(f, "}\n"); 1124          break; 1125        case PN_LIST: 1126          /* let definition */ 1127          Stream_printf(f, "%*s", indent, ""); 1128          instrument_expression(node, f); 1129          Stream_write_string(f, ";\n"); 1130          break; 1131        default: 1132          abort(); 1133          break; 1134        } 1135        break; 1136      case TOK_DEBUGGER: 1137        Stream_printf(f, "%*s", indent, ""); 1138        Stream_write_string(f, "debugger;\n"); 1139      break;      break; 1140    default:    default: 1141      fatal("unsupported node type in file %s: %d", file_id, node->pn_type);      fatal_source(file_id, node->pn_pos.begin.lineno, "unsupported node type (%d)", node->pn_type); 1142    }    } 1143  }  } 1144     # Line 788  Line 1147  1147  TOK_FUNCTION is handled as a statement and as an expression.  TOK_FUNCTION is handled as a statement and as an expression. 1148  TOK_EXPORT, TOK_IMPORT are not handled.  TOK_EXPORT, TOK_IMPORT are not handled. 1149  */  */ 1150  static void instrument_statement(JSParseNode * node, Stream * f, int indent) {  static void instrument_statement(JSParseNode * node, Stream * f, int indent, bool is_jscoverage_if) { 1151    if (node->pn_type != TOK_LC) {    if (node->pn_type != TOK_LC && node->pn_type != TOK_LEXICALSCOPE) { 1152      int line = node->pn_pos.begin.lineno;      uint16_t line = node->pn_pos.begin.lineno; 1153        if (line > num_lines) { 1154          fatal("file %s contains more than 65,535 lines", file_id); 1155        } 1156     1157      /* the root node has line number 0 */      /* the root node has line number 0 */ 1158      if (line != 0) {      if (line != 0) { 1159        Stream_printf(f, "%*s", indent, "");        Stream_printf(f, "%*s", indent, ""); # Line 798  Line 1161  1161        lines[line - 1] = 1;        lines[line - 1] = 1; 1162      }      } 1163    }    } 1164    output_statement(node, f, indent);    output_statement(node, f, indent, is_jscoverage_if); 1165  }  } 1166     1167  void jscoverage_instrument_js(const char * id, Stream * input, Stream * output) {  static bool characters_start_with(const jschar * characters, size_t line_start, size_t line_end, const char * prefix) { 1168    file_id = id;    const jschar * characters_end = characters + line_end; 1169      const jschar * cp = characters + line_start; 1170    /* scan the javascript */    const char * bp = prefix; 1171    size_t input_length = input->length;    for (;;) { 1172    jschar * base = js_InflateString(context, input->data, &input_length);      if (*bp == '\0') { 1173    if (base == NULL) {        return true; 1174      fatal("out of memory");      } 1175        else if (cp == characters_end) { 1176          return false; 1177        } 1178        else if (*cp != *bp) { 1179          return false; 1180        } 1181        bp++; 1182        cp++; 1183    }    } 1184    JSTokenStream * token_stream = js_NewTokenStream(context, base, input_length, NULL, 1, NULL);  } 1185    if (token_stream == NULL) {   1186      fatal("cannot create token stream from file: %s", file_id);  static bool characters_are_white_space(const jschar * characters, size_t line_start, size_t line_end) { 1187      /* XXX - other Unicode space */ 1188      const jschar * end = characters + line_end; 1189      for (const jschar * p = characters + line_start; p < end; p++) { 1190        jschar c = *p; 1191        if (c == 0x9 || c == 0xB || c == 0xC || c == 0x20 || c == 0xA0) { 1192          continue; 1193        } 1194        else { 1195          return false; 1196        } 1197    }    } 1198      return true; 1199    } 1200     1201    static void error_reporter(JSContext * context, const char * message, JSErrorReport * report) { 1202      warn_source(file_id, report->lineno, "%s", message); 1203    } 1204     1205    void jscoverage_instrument_js(const char * id, const uint16_t * characters, size_t num_characters, Stream * output) { 1206      file_id = id; 1207     1208    /* parse the javascript */    /* parse the javascript */ 1209    JSParseNode * node = js_ParseTokenStream(context, global, token_stream);    JSParseContext parse_context; 1210      if (! js_InitParseContext(context, &parse_context, NULL, NULL, characters, num_characters, NULL, NULL, 1)) { 1211        fatal("cannot create token stream from file %s", file_id); 1212      } 1213      JSErrorReporter old_error_reporter = JS_SetErrorReporter(context, error_reporter); 1214      JSParseNode * node = js_ParseScript(context, global, &parse_context); 1215    if (node == NULL) {    if (node == NULL) { 1216      fatal("parse error in file: %s", file_id);      js_ReportUncaughtException(context); 1217        fatal("parse error in file %s", file_id); 1218    }    } 1219    int num_lines = node->pn_pos.end.lineno;    JS_SetErrorReporter(context, old_error_reporter); 1220      num_lines = node->pn_pos.end.lineno; 1221    lines = xmalloc(num_lines);    lines = xmalloc(num_lines); 1222    for (int i = 0; i < num_lines; i++) {    for (unsigned int i = 0; i < num_lines; i++) { 1223      lines[i] = 0;      lines[i] = 0; 1224    }    } 1225     1226      /* search code for conditionals */ 1227      exclusive_directives = xnew(bool, num_lines); 1228      for (unsigned int i = 0; i < num_lines; i++) { 1229        exclusive_directives[i] = false; 1230      } 1231     1232      bool has_conditionals = false; 1233      struct IfDirective * if_directives = NULL; 1234      size_t line_number = 0; 1235      size_t i = 0; 1236      while (i < num_characters) { 1237        if (line_number == UINT16_MAX) { 1238          fatal("file %s contains more than 65,535 lines", file_id); 1239        } 1240        line_number++; 1241        size_t line_start = i; 1242        jschar c; 1243        bool done = false; 1244        while (! done && i < num_characters) { 1245          c = characters[i]; 1246          switch (c) { 1247          case '\r': 1248          case '\n': 1249          case 0x2028: 1250          case 0x2029: 1251            done = true; 1252            break; 1253          default: 1254            i++; 1255          } 1256        } 1257        size_t line_end = i; 1258        if (i < num_characters) { 1259          i++; 1260          if (c == '\r' && i < num_characters && characters[i] == '\n') { 1261            i++; 1262          } 1263        } 1264     1265        if (characters_start_with(characters, line_start, line_end, "//#JSCOVERAGE_IF")) { 1266          has_conditionals = true; 1267     1268          if (characters_are_white_space(characters, line_start + 16, line_end)) { 1269            exclusive_directives[line_number - 1] = true; 1270          } 1271          else { 1272            struct IfDirective * if_directive = xnew(struct IfDirective, 1); 1273            if_directive->condition_start = characters + line_start + 16; 1274            if_directive->condition_end = characters + line_end; 1275            if_directive->start_line = line_number; 1276            if_directive->end_line = 0; 1277            if_directive->next = if_directives; 1278            if_directives = if_directive; 1279          } 1280        } 1281        else if (characters_start_with(characters, line_start, line_end, "//#JSCOVERAGE_ENDIF")) { 1282          for (struct IfDirective * p = if_directives; p != NULL; p = p->next) { 1283            if (p->end_line == 0) { 1284              p->end_line = line_number; 1285              break; 1286            } 1287          } 1288        } 1289      } 1290     1291    /*    /* 1292    An instrumented JavaScript file has 3 sections:    An instrumented JavaScript file has 4 sections: 1293    1. initialization    1. initialization 1294    2. instrumented source code    2. instrumented source code 1295    3. original source code (TODO)    3. conditionals 1296      4. original source code 1297    */    */ 1298     1299    Stream * instrumented = Stream_new(0);    Stream * instrumented = Stream_new(0); 1300    instrument_statement(node, instrumented, 0);    instrument_statement(node, instrumented, 0, false); 1301      js_FinishParseContext(context, &parse_context); 1302     1303    /* write line number info to the output */    /* write line number info to the output */ 1304    Stream_write_string(output, "/* automatically generated by JSCoverage - do not edit */\n");    Stream_write_string(output, "/* automatically generated by JSCoverage - do not edit */\n"); 1305    Stream_write_string(output, "if (! top._$jscoverage) {\n  top._$jscoverage = {};\n}\n");    if (jscoverage_mozilla) { 1306    Stream_write_string(output, "var _$jscoverage = top._$jscoverage;\n");      Stream_write_string(output, "try {\n"); 1307        Stream_write_string(output, "  Components.utils.import('resource://gre/modules/jscoverage.jsm');\n"); 1308        Stream_printf(output, "  dump('%s: successfully imported jscoverage module\\n');\n", id); 1309        Stream_write_string(output, "}\n"); 1310        Stream_write_string(output, "catch (e) {\n"); 1311        Stream_write_string(output, "  _$jscoverage = {};\n"); 1312        Stream_printf(output, "  dump('%s: failed to import jscoverage module - coverage not available for this file\\n');\n", id); 1313        Stream_write_string(output, "}\n"); 1314      } 1315      else { 1316        Stream_write_string(output, "if (! top._$jscoverage) {\n  top._$jscoverage = {};\n}\n"); 1317        Stream_write_string(output, "var _$jscoverage = top._$jscoverage;\n"); 1318      } 1319    Stream_printf(output, "if (! _$jscoverage['%s']) {\n", file_id);    Stream_printf(output, "if (! _$jscoverage['%s']) {\n", file_id); 1320    Stream_printf(output, "  _$jscoverage['%s'] = [];\n", file_id);    Stream_printf(output, "  _$jscoverage['%s'] = [];\n", file_id); 1321    for (int i = 0; i < num_lines; i++) {    for (int i = 0; i < num_lines; i++) { # Line 850  Line 1326  1326    Stream_write_string(output, "}\n");    Stream_write_string(output, "}\n"); 1327    free(lines);    free(lines); 1328    lines = NULL;    lines = NULL; 1329      free(exclusive_directives); 1330      exclusive_directives = NULL; 1331     1332      /* conditionals */ 1333      if (has_conditionals) { 1334        Stream_printf(output, "_$jscoverage['%s'].conditionals = [];\n", file_id); 1335      } 1336     1337    /* copy the instrumented source code to the output */    /* copy the instrumented source code to the output */ 1338    Stream_write(output, instrumented->data, instrumented->length);    Stream_write(output, instrumented->data, instrumented->length); 1339    Stream_write_char(output, '\n');   1340      /* conditionals */ 1341      for (struct IfDirective * if_directive = if_directives; if_directive != NULL; if_directive = if_directive->next) { 1342        Stream_write_string(output, "if (!("); 1343        print_javascript(if_directive->condition_start, if_directive->condition_end - if_directive->condition_start, output); 1344        Stream_write_string(output, ")) {\n"); 1345        Stream_printf(output, "  _$jscoverage['%s'].conditionals[%d] = %d;\n", file_id, if_directive->start_line, if_directive->end_line); 1346        Stream_write_string(output, "}\n"); 1347      } 1348     1349      /* free */ 1350      while (if_directives != NULL) { 1351        struct IfDirective * if_directive = if_directives; 1352        if_directives = if_directives->next; 1353        free(if_directive); 1354      } 1355     1356    /* copy the original source to the output */    /* copy the original source to the output */ 1357    size_t i = 0;    Stream_printf(output, "_$jscoverage['%s'].source = ", file_id); 1358    while (i < input_length) {    jscoverage_write_source(id, characters, num_characters, output); 1359      Stream_write_string(output, "// ");    Stream_printf(output, ";\n");      size_t line_start = i;        while (i < input_length && base[i] != '\r' && base[i] != '\n') {          i++;        }   1360     1361      size_t line_end = i;    Stream_delete(instrumented); 1362      if (i < input_length) {   1363        if (base[i] == '\r') {    file_id = NULL; 1364          line_end = i;  } 1365     1366    void jscoverage_write_source(const char * id, const jschar * characters, size_t num_characters, Stream * output) { 1367      Stream_write_string(output, "["); 1368      if (jscoverage_highlight) { 1369        Stream * highlighted_stream = Stream_new(num_characters); 1370        jscoverage_highlight_js(context, id, characters, num_characters, highlighted_stream); 1371        size_t i = 0; 1372        while (i < highlighted_stream->length) { 1373          if (i > 0) { 1374            Stream_write_char(output, ','); 1375          } 1376     1377          Stream_write_char(output, '"'); 1378          bool done = false; 1379          while (! done) { 1380            char c = highlighted_stream->data[i]; 1381            switch (c) { 1382            case 0x8: 1383              /* backspace */ 1384              Stream_write_string(output, "\\b"); 1385              break; 1386            case 0x9: 1387              /* horizontal tab */ 1388              Stream_write_string(output, "\\t"); 1389              break; 1390            case 0xa: 1391              /* line feed (new line) */ 1392              done = true; 1393              break; 1394            /* IE doesn't support this */ 1395            /* 1396            case 0xb: 1397              Stream_write_string(output, "\\v"); 1398              break; 1399            */ 1400            case 0xc: 1401              /* form feed */ 1402              Stream_write_string(output, "\\f"); 1403              break; 1404            case 0xd: 1405              /* carriage return */ 1406              done = true; 1407              if (i + 1 < highlighted_stream->length && highlighted_stream->data[i + 1] == '\n') { 1408                i++; 1409              } 1410              break; 1411            case '"': 1412              Stream_write_string(output, "\\\""); 1413              break; 1414            case '\\': 1415              Stream_write_string(output, "\\\\"); 1416              break; 1417            default: 1418              Stream_write_char(output, c); 1419              break; 1420            } 1421          i++;          i++; 1422          if (i < input_length && base[i] == '\n') {          if (i >= highlighted_stream->length) { 1423            i++;            done = true; 1424          }          } 1425        }        } 1426        else if (base[i] == '\n') {        Stream_write_char(output, '"'); 1427          line_end = i;      } 1428        Stream_delete(highlighted_stream); 1429      } 1430      else { 1431        size_t i = 0; 1432        while (i < num_characters) { 1433          if (i > 0) { 1434            Stream_write_char(output, ','); 1435          } 1436     1437          Stream_write_char(output, '"'); 1438          bool done = false; 1439          while (! done) { 1440            jschar c = characters[i]; 1441            switch (c) { 1442            case 0x8: 1443              /* backspace */ 1444              Stream_write_string(output, "\\b"); 1445              break; 1446            case 0x9: 1447              /* horizontal tab */ 1448              Stream_write_string(output, "\\t"); 1449              break; 1450            case 0xa: 1451              /* line feed (new line) */ 1452              done = true; 1453              break; 1454            /* IE doesn't support this */ 1455            /* 1456            case 0xb: 1457              Stream_write_string(output, "\\v"); 1458              break; 1459            */ 1460            case 0xc: 1461              /* form feed */ 1462              Stream_write_string(output, "\\f"); 1463              break; 1464            case 0xd: 1465              /* carriage return */ 1466              done = true; 1467              if (i + 1 < num_characters && characters[i + 1] == '\n') { 1468                i++; 1469              } 1470              break; 1471            case '"': 1472              Stream_write_string(output, "\\\""); 1473              break; 1474            case '\\': 1475              Stream_write_string(output, "\\\\"); 1476              break; 1477            case '&': 1478              Stream_write_string(output, "&amp;"); 1479              break; 1480            case '<': 1481              Stream_write_string(output, "&lt;"); 1482              break; 1483            case '>': 1484              Stream_write_string(output, "&gt;"); 1485              break; 1486            case 0x2028: 1487            case 0x2029: 1488              done = true; 1489              break; 1490            default: 1491              if (32 <= c && c <= 126) { 1492                Stream_write_char(output, c); 1493              } 1494              else { 1495                Stream_printf(output, "&#%d;", c); 1496              } 1497              break; 1498            } 1499          i++;          i++; 1500            if (i >= num_characters) { 1501              done = true; 1502            } 1503        }        } 1504        else {        Stream_write_char(output, '"'); 1505          abort();      } 1506      } 1507      Stream_write_string(output, "]"); 1508    } 1509     1510    void jscoverage_copy_resources(const char * destination_directory) { 1511      copy_resource("jscoverage.html", destination_directory); 1512      copy_resource("jscoverage.css", destination_directory); 1513      copy_resource("jscoverage.js", destination_directory); 1514      copy_resource("jscoverage-ie.css", destination_directory); 1515      copy_resource("jscoverage-throbber.gif", destination_directory); 1516      copy_resource("jscoverage-highlight.css", destination_directory); 1517    } 1518     1519    /* 1520    coverage reports 1521    */ 1522     1523    struct FileCoverageList { 1524      FileCoverage * file_coverage; 1525      struct FileCoverageList * next; 1526    }; 1527     1528    struct Coverage { 1529      JSHashTable * coverage_table; 1530      struct FileCoverageList * coverage_list; 1531    }; 1532     1533    static int compare_strings(const void * p1, const void * p2) { 1534      return strcmp(p1, p2) == 0; 1535    } 1536     1537    Coverage * Coverage_new(void) { 1538      Coverage * result = xmalloc(sizeof(Coverage)); 1539      result->coverage_table = JS_NewHashTable(1024, JS_HashString, compare_strings, NULL, NULL, NULL); 1540      if (result->coverage_table == NULL) { 1541        fatal("cannot create hash table"); 1542      } 1543      result->coverage_list = NULL; 1544      return result; 1545    } 1546     1547    void Coverage_delete(Coverage * coverage) { 1548      JS_HashTableDestroy(coverage->coverage_table); 1549      struct FileCoverageList * p = coverage->coverage_list; 1550      while (p != NULL) { 1551        free(p->file_coverage->coverage_lines); 1552        if (p->file_coverage->source_lines != NULL) { 1553          for (uint32 i = 0; i < p->file_coverage->num_source_lines; i++) { 1554            free(p->file_coverage->source_lines[i]); 1555        }        } 1556          free(p->file_coverage->source_lines); 1557      }      } 1558        free(p->file_coverage->id); 1559        free(p->file_coverage); 1560        struct FileCoverageList * q = p; 1561        p = p->next; 1562        free(q); 1563      } 1564      free(coverage); 1565    } 1566     1567    struct EnumeratorArg { 1568      CoverageForeachFunction f; 1569      void * p; 1570    }; 1571     1572    static intN enumerator(JSHashEntry * entry, intN i, void * arg) { 1573      struct EnumeratorArg * enumerator_arg = arg; 1574      enumerator_arg->f(entry->value, i, enumerator_arg->p); 1575      return 0; 1576    } 1577     1578    void Coverage_foreach_file(Coverage * coverage, CoverageForeachFunction f, void * p) { 1579      struct EnumeratorArg enumerator_arg; 1580      enumerator_arg.f = f; 1581      enumerator_arg.p = p; 1582      JS_HashTableEnumerateEntries(coverage->coverage_table, enumerator, &enumerator_arg); 1583    } 1584     1585    int jscoverage_parse_json(Coverage * coverage, const uint8_t * json, size_t length) { 1586      int result = 0; 1587     1588      char * line = js_DeflateString(context, base + line_start, line_end - line_start);    jschar * base = js_InflateString(context, (char *) json, &length); 1589      Stream_write_string(output, line);    if (base == NULL) { 1590      Stream_write_char(output, '\n');      fatal("out of memory");      JS_free(context, line);   1591    }    } 1592     1593    Stream_delete(instrumented);    jschar * parenthesized_json = xnew(jschar, addst(length, 2)); 1594      parenthesized_json[0] = '('; 1595      memcpy(parenthesized_json + 1, base, mulst(length, sizeof(jschar))); 1596      parenthesized_json[length + 1] = ')'; 1597     1598    JS_free(context, base);    JS_free(context, base); 1599     1600    file_id = NULL;    JSParseContext parse_context; 1601      if (! js_InitParseContext(context, &parse_context, NULL, NULL, parenthesized_json, length + 2, NULL, NULL, 1)) { 1602        free(parenthesized_json); 1603        return -1; 1604      } 1605      JSParseNode * root = js_ParseScript(context, global, &parse_context); 1606      free(parenthesized_json); 1607      if (root == NULL) { 1608        result = -1; 1609        goto done; 1610      } 1611     1612      /* root node must be TOK_LC */ 1613      if (root->pn_type != TOK_LC) { 1614        result = -1; 1615        goto done; 1616      } 1617      JSParseNode * semi = root->pn_u.list.head; 1618     1619      /* the list must be TOK_SEMI and it must contain only one element */ 1620      if (semi->pn_type != TOK_SEMI || semi->pn_next != NULL) { 1621        result = -1; 1622        goto done; 1623      } 1624      JSParseNode * parenthesized = semi->pn_kid; 1625     1626      /* this must be a parenthesized expression */ 1627      if (parenthesized->pn_type != TOK_RP) { 1628        result = -1; 1629        goto done; 1630      } 1631      JSParseNode * object = parenthesized->pn_kid; 1632     1633      /* this must be an object literal */ 1634      if (object->pn_type != TOK_RC) { 1635        result = -1; 1636        goto done; 1637      } 1638     1639      for (JSParseNode * p = object->pn_head; p != NULL; p = p->pn_next) { 1640        /* every element of this list must be TOK_COLON */ 1641        if (p->pn_type != TOK_COLON) { 1642          result = -1; 1643          goto done; 1644        } 1645     1646        /* the key must be a string representing the file */ 1647        JSParseNode * key = p->pn_left; 1648        if (key->pn_type != TOK_STRING || ! ATOM_IS_STRING(key->pn_atom)) { 1649          result = -1; 1650          goto done; 1651        } 1652        char * id_bytes = JS_GetStringBytes(ATOM_TO_STRING(key->pn_atom)); 1653     1654        /* the value must be an object literal OR an array */ 1655        JSParseNode * value = p->pn_right; 1656        if (! (value->pn_type == TOK_RC || value->pn_type == TOK_RB)) { 1657          result = -1; 1658          goto done; 1659        } 1660     1661        JSParseNode * array = NULL; 1662        JSParseNode * source = NULL; 1663        if (value->pn_type == TOK_RB) { 1664          /* an array */ 1665          array = value; 1666        } 1667        else if (value->pn_type == TOK_RC) { 1668          /* an object literal */ 1669          if (value->pn_count != 2) { 1670            result = -1; 1671            goto done; 1672          } 1673          for (JSParseNode * element = value->pn_head; element != NULL; element = element->pn_next) { 1674            if (element->pn_type != TOK_COLON) { 1675              result = -1; 1676              goto done; 1677            } 1678            JSParseNode * left = element->pn_left; 1679            if (left->pn_type != TOK_STRING || ! ATOM_IS_STRING(left->pn_atom)) { 1680              result = -1; 1681              goto done; 1682            } 1683            const char * s = JS_GetStringBytes(ATOM_TO_STRING(left->pn_atom)); 1684            if (strcmp(s, "coverage") == 0) { 1685              array = element->pn_right; 1686              if (array->pn_type != TOK_RB) { 1687                result = -1; 1688                goto done; 1689              } 1690            } 1691            else if (strcmp(s, "source") == 0) { 1692              source = element->pn_right; 1693              if (source->pn_type != TOK_RB) { 1694                result = -1; 1695                goto done; 1696              } 1697            } 1698            else { 1699              result = -1; 1700              goto done; 1701            } 1702          } 1703        } 1704        else { 1705          result = -1; 1706          goto done; 1707        } 1708     1709        if (array == NULL) { 1710          result = -1; 1711          goto done; 1712        } 1713     1714        /* look up the file in the coverage table */ 1715        FileCoverage * file_coverage = JS_HashTableLookup(coverage->coverage_table, id_bytes); 1716        if (file_coverage == NULL) { 1717          /* not there: create a new one */ 1718          char * id = xstrdup(id_bytes); 1719          file_coverage = xmalloc(sizeof(FileCoverage)); 1720          file_coverage->id = id; 1721          file_coverage->num_coverage_lines = array->pn_count; 1722          file_coverage->coverage_lines = xnew(int, array->pn_count); 1723          file_coverage->source_lines = NULL; 1724     1725          /* set coverage for all lines */ 1726          uint32 i = 0; 1727          for (JSParseNode * element = array->pn_head; element != NULL; element = element->pn_next, i++) { 1728            if (element->pn_type == TOK_NUMBER) { 1729              file_coverage->coverage_lines[i] = (int) element->pn_dval; 1730            } 1731            else if (element->pn_type == TOK_PRIMARY && element->pn_op == JSOP_NULL) { 1732              file_coverage->coverage_lines[i] = -1; 1733            } 1734            else { 1735              result = -1; 1736              goto done; 1737            } 1738          } 1739          assert(i == array->pn_count); 1740     1741          /* add to the hash table */ 1742          JS_HashTableAdd(coverage->coverage_table, id, file_coverage); 1743          struct FileCoverageList * coverage_list = xmalloc(sizeof(struct FileCoverageList)); 1744          coverage_list->file_coverage = file_coverage; 1745          coverage_list->next = coverage->coverage_list; 1746          coverage->coverage_list = coverage_list; 1747        } 1748        else { 1749          /* sanity check */ 1750          assert(strcmp(file_coverage->id, id_bytes) == 0); 1751          if (file_coverage->num_coverage_lines != array->pn_count) { 1752            result = -2; 1753            goto done; 1754          } 1755     1756          /* merge the coverage */ 1757          uint32 i = 0; 1758          for (JSParseNode * element = array->pn_head; element != NULL; element = element->pn_next, i++) { 1759            if (element->pn_type == TOK_NUMBER) { 1760              if (file_coverage->coverage_lines[i] == -1) { 1761                result = -2; 1762                goto done; 1763              } 1764              file_coverage->coverage_lines[i] += (int) element->pn_dval; 1765            } 1766            else if (element->pn_type == TOK_PRIMARY && element->pn_op == JSOP_NULL) { 1767              if (file_coverage->coverage_lines[i] != -1) { 1768                result = -2; 1769                goto done; 1770              } 1771            } 1772            else { 1773              result = -1; 1774              goto done; 1775            } 1776          } 1777          assert(i == array->pn_count); 1778        } 1779     1780        /* if this JSON file has source, use it */ 1781        if (file_coverage->source_lines == NULL && source != NULL) { 1782          file_coverage->num_source_lines = source->pn_count; 1783          file_coverage->source_lines = xnew(char *, source->pn_count); 1784          uint32 i = 0; 1785          for (JSParseNode * element = source->pn_head; element != NULL; element = element->pn_next, i++) { 1786            if (element->pn_type != TOK_STRING) { 1787              result = -1; 1788              goto done; 1789            } 1790            file_coverage->source_lines[i] = xstrdup(JS_GetStringBytes(ATOM_TO_STRING(element->pn_atom))); 1791          } 1792          assert(i == source->pn_count); 1793        } 1794      } 1795     1796    done: 1797      js_FinishParseContext(context, &parse_context); 1798      return result; 1799  }  } Legend: Removed from v.95   changed lines   Added in v.372   ViewVC Help Powered by ViewVC 1.1.24  
__label__pos
0.999827
[PATCH 3/4] drm/radeon/kms: add support for Llano Fusion APUs Alex Deucher alexdeucher at gmail.com Tue May 31 12:42:48 PDT 2011 - add gpu init support - add blit support - add ucode loader Signed-off-by: Alex Deucher <alexdeucher at gmail.com> --- drivers/gpu/drm/radeon/evergreen.c | 58 +++++++++++++++++++++++++++ drivers/gpu/drm/radeon/evergreen_blit_kms.c | 46 +++++++++++++++++++++ drivers/gpu/drm/radeon/r600.c | 12 ++++++ 3 files changed, 116 insertions(+), 0 deletions(-) diff --git a/drivers/gpu/drm/radeon/evergreen.c b/drivers/gpu/drm/radeon/evergreen.c index 5f0c345..98ea597 100644 --- a/drivers/gpu/drm/radeon/evergreen.c +++ b/drivers/gpu/drm/radeon/evergreen.c @@ -1433,6 +1433,8 @@ static u32 evergreen_get_tile_pipe_to_backend_map(struct radeon_device *rdev, case CHIP_CEDAR: case CHIP_REDWOOD: case CHIP_PALM: + case CHIP_SUMO: + case CHIP_SUMO2: case CHIP_TURKS: case CHIP_CAICOS: force_no_swizzle = false; @@ -1562,6 +1564,8 @@ static void evergreen_program_channel_remap(struct radeon_device *rdev) case CHIP_REDWOOD: case CHIP_CEDAR: case CHIP_PALM: + case CHIP_SUMO: + case CHIP_SUMO2: case CHIP_TURKS: case CHIP_CAICOS: default: @@ -1707,6 +1711,54 @@ static void evergreen_gpu_init(struct radeon_device *rdev) rdev->config.evergreen.sc_hiz_tile_fifo_size = 0x30; rdev->config.evergreen.sc_earlyz_tile_fifo_size = 0x130; break; + case CHIP_SUMO: + rdev->config.evergreen.num_ses = 1; + rdev->config.evergreen.max_pipes = 4; + rdev->config.evergreen.max_tile_pipes = 2; + if (rdev->pdev->device == 0x9648) + rdev->config.evergreen.max_simds = 3; + else if ((rdev->pdev->device == 0x9647) || + (rdev->pdev->device == 0x964a)) + rdev->config.evergreen.max_simds = 4; + else + rdev->config.evergreen.max_simds = 5; + rdev->config.evergreen.max_backends = 2 * rdev->config.evergreen.num_ses; + rdev->config.evergreen.max_gprs = 256; + rdev->config.evergreen.max_threads = 248; + rdev->config.evergreen.max_gs_threads = 32; + rdev->config.evergreen.max_stack_entries = 256; + rdev->config.evergreen.sx_num_of_sets = 4; + rdev->config.evergreen.sx_max_export_size = 256; + rdev->config.evergreen.sx_max_export_pos_size = 64; + rdev->config.evergreen.sx_max_export_smx_size = 192; + rdev->config.evergreen.max_hw_contexts = 8; + rdev->config.evergreen.sq_num_cf_insts = 2; + + rdev->config.evergreen.sc_prim_fifo_size = 0x40; + rdev->config.evergreen.sc_hiz_tile_fifo_size = 0x30; + rdev->config.evergreen.sc_earlyz_tile_fifo_size = 0x130; + break; + case CHIP_SUMO2: + rdev->config.evergreen.num_ses = 1; + rdev->config.evergreen.max_pipes = 4; + rdev->config.evergreen.max_tile_pipes = 4; + rdev->config.evergreen.max_simds = 2; + rdev->config.evergreen.max_backends = 1 * rdev->config.evergreen.num_ses; + rdev->config.evergreen.max_gprs = 256; + rdev->config.evergreen.max_threads = 248; + rdev->config.evergreen.max_gs_threads = 32; + rdev->config.evergreen.max_stack_entries = 512; + rdev->config.evergreen.sx_num_of_sets = 4; + rdev->config.evergreen.sx_max_export_size = 256; + rdev->config.evergreen.sx_max_export_pos_size = 64; + rdev->config.evergreen.sx_max_export_smx_size = 192; + rdev->config.evergreen.max_hw_contexts = 8; + rdev->config.evergreen.sq_num_cf_insts = 2; + + rdev->config.evergreen.sc_prim_fifo_size = 0x40; + rdev->config.evergreen.sc_hiz_tile_fifo_size = 0x30; + rdev->config.evergreen.sc_earlyz_tile_fifo_size = 0x130; + break; case CHIP_BARTS: rdev->config.evergreen.num_ses = 2; rdev->config.evergreen.max_pipes = 4; @@ -2057,6 +2109,8 @@ static void evergreen_gpu_init(struct radeon_device *rdev) switch (rdev->family) { case CHIP_CEDAR: case CHIP_PALM: + case CHIP_SUMO: + case CHIP_SUMO2: case CHIP_CAICOS: /* no vertex cache */ sq_config &= ~VC_ENABLE; @@ -2078,6 +2132,8 @@ static void evergreen_gpu_init(struct radeon_device *rdev) switch (rdev->family) { case CHIP_CEDAR: case CHIP_PALM: + case CHIP_SUMO: + case CHIP_SUMO2: ps_thread_count = 96; break; default: @@ -2117,6 +2173,8 @@ static void evergreen_gpu_init(struct radeon_device *rdev) switch (rdev->family) { case CHIP_CEDAR: case CHIP_PALM: + case CHIP_SUMO: + case CHIP_SUMO2: case CHIP_CAICOS: vgt_cache_invalidation = CACHE_INVALIDATION(TC_ONLY); break; diff --git a/drivers/gpu/drm/radeon/evergreen_blit_kms.c b/drivers/gpu/drm/radeon/evergreen_blit_kms.c index a60ad28..57f3bc1 100644 --- a/drivers/gpu/drm/radeon/evergreen_blit_kms.c +++ b/drivers/gpu/drm/radeon/evergreen_blit_kms.c @@ -153,6 +153,8 @@ set_vtx_resource(struct radeon_device *rdev, u64 gpu_addr) if ((rdev->family == CHIP_CEDAR) || (rdev->family == CHIP_PALM) || + (rdev->family == CHIP_SUMO) || + (rdev->family == CHIP_SUMO2) || (rdev->family == CHIP_CAICOS)) cp_set_surface_sync(rdev, PACKET3_TC_ACTION_ENA, 48, gpu_addr); @@ -379,6 +381,48 @@ set_default_state(struct radeon_device *rdev) num_hs_stack_entries = 42; num_ls_stack_entries = 42; break; + case CHIP_SUMO: + num_ps_gprs = 93; + num_vs_gprs = 46; + num_temp_gprs = 4; + num_gs_gprs = 31; + num_es_gprs = 31; + num_hs_gprs = 23; + num_ls_gprs = 23; + num_ps_threads = 96; + num_vs_threads = 25; + num_gs_threads = 25; + num_es_threads = 25; + num_hs_threads = 25; + num_ls_threads = 25; + num_ps_stack_entries = 42; + num_vs_stack_entries = 42; + num_gs_stack_entries = 42; + num_es_stack_entries = 42; + num_hs_stack_entries = 42; + num_ls_stack_entries = 42; + break; + case CHIP_SUMO2: + num_ps_gprs = 93; + num_vs_gprs = 46; + num_temp_gprs = 4; + num_gs_gprs = 31; + num_es_gprs = 31; + num_hs_gprs = 23; + num_ls_gprs = 23; + num_ps_threads = 96; + num_vs_threads = 25; + num_gs_threads = 25; + num_es_threads = 25; + num_hs_threads = 25; + num_ls_threads = 25; + num_ps_stack_entries = 85; + num_vs_stack_entries = 85; + num_gs_stack_entries = 85; + num_es_stack_entries = 85; + num_hs_stack_entries = 85; + num_ls_stack_entries = 85; + break; case CHIP_BARTS: num_ps_gprs = 93; num_vs_gprs = 46; @@ -446,6 +490,8 @@ set_default_state(struct radeon_device *rdev) if ((rdev->family == CHIP_CEDAR) || (rdev->family == CHIP_PALM) || + (rdev->family == CHIP_SUMO) || + (rdev->family == CHIP_SUMO2) || (rdev->family == CHIP_CAICOS)) sq_config = 0; else diff --git a/drivers/gpu/drm/radeon/r600.c b/drivers/gpu/drm/radeon/r600.c index 6f27593..d74d4d7 100644 --- a/drivers/gpu/drm/radeon/r600.c +++ b/drivers/gpu/drm/radeon/r600.c @@ -87,6 +87,10 @@ MODULE_FIRMWARE("radeon/CYPRESS_rlc.bin"); MODULE_FIRMWARE("radeon/PALM_pfp.bin"); MODULE_FIRMWARE("radeon/PALM_me.bin"); MODULE_FIRMWARE("radeon/SUMO_rlc.bin"); +MODULE_FIRMWARE("radeon/SUMO_pfp.bin"); +MODULE_FIRMWARE("radeon/SUMO_me.bin"); +MODULE_FIRMWARE("radeon/SUMO2_pfp.bin"); +MODULE_FIRMWARE("radeon/SUMO2_me.bin"); int r600_debugfs_mc_info_init(struct radeon_device *rdev); @@ -2024,6 +2028,14 @@ int r600_init_microcode(struct radeon_device *rdev) chip_name = "PALM"; rlc_chip_name = "SUMO"; break; + case CHIP_SUMO: + chip_name = "SUMO"; + rlc_chip_name = "SUMO"; + break; + case CHIP_SUMO2: + chip_name = "SUMO2"; + rlc_chip_name = "SUMO"; + break; default: BUG(); } -- 1.7.1.1 More information about the dri-devel mailing list
__label__pos
0.962058
Best Practices for Storing Your Recovery Phrase The recovery phrase is a crucial element for the security of your Trust Wallet. If your device is lost, damaged or stolen, you can use your recovery phrase to restore access to your entire wallet. Therefore, it is important to keep your recovery phrase or private keys safe. Best practices: • Write it down on a piece of paper and store it in a safe and secure place. If you are looking for something more durable then a piece of paper, use Billfodl or Cryptosteel • Store it inside a Password Manager. If you aren’t already using one, you should probably do so anyway. Your recovery phrase will be stored inside an encrypted database either locally on the user’s device or remotely through an online cloud service. Solutions like Lastpass, 1Password or KeePassXC are a safe choice. • Note taking Apps like Notes for iOS, Samsung Notes for Android or OneNote let you create notes protected with a password. If you don’t want to use a Password manager, storing it inside a password protected (and encrypted) note also works. Redundancy is important: Store your recovery phrase in different places to have a backup of your backup. An accident may destroy one backup, but is unlikely to affect the other if they are in different locations. Here is another good read for keeping your wallet secure: 1 Like Always keep in mind these two goals when storing your recovery phrase: 1. It should never get lost, you should always have it 2. No one else should get hold of it, who is not supposed to 2 Likes
__label__pos
0.511131
Files @ 3735f65dbacb Branch filter: Location: website/www/conservancy/manage.py bkuhn s/GPL/GPL Compliance/ in menu Karen and Tony prefer this. #!/usr/bin/env python import sys sys.path += ('/var/www',) from django.core.management import execute_manager try: from conservancy import settings except ImportError: sys.stderr.write("Error: Can't find the file 'settings.py' in the directory containing %r. It appears you've customized things.\nYou'll have to run django-admin.py, passing it your settings module.\n(If the file settings.py does indeed exist, it's causing an ImportError somehow.)\n" % __file__) sys.exit(1) if __name__ == "__main__": execute_manager(settings)
__label__pos
0.54833
How to rename an application on Android: detailed instructions Table of contents: How to rename an application on Android: detailed instructions How to rename an application on Android: detailed instructions Anonim Quite a few smartphone owners are wondering: is it possible to rename an application on Android? This desire may arise for a number of reasons. The fact is that software developers prefer to give their products sonorous and easily recognizable names, and there are not so many of the latter in every area. Hence the lack of uniqueness. Take the same "Yandex" with "Google". Neither the first nor the second bother with names and call the applications as they are: “Music”, “Maps”, “Browser”, etc. As a result, chaos starts to happen on your desktop from different programs with the same name. How to change the name of programs? Standard firmware of the platform, alas, does not allow you to rename the names of applications on Android, so you have to turn to third-party solutions. There are not so few of them, so many are experiencing serious difficulties in choosing the best option. We will try to identify the most effective solutions that will allow you to rename the application on Android without any problems. Consider the featureseach method and possible difficulties. So let's get started. Launchers You can rename an application on Android using third-party shells, or, as they are also called, launchers. Google Play has plenty of this kind of software, but two products in particular are the Nova Launcher and Apex Launcher. is it possible to rename an app on android is it possible to rename an app on android Both shells equally effectively allow you to rename the application on Android. Downloading and installing shouldn't be a problem. The installation takes place in the normal mode for the platform. how to rename app name on android how to rename app name on android To change the name of the program, you must: 1. Click on the program shortcut and hold your finger until a pop-up menu appears. 2. From the list that appears, select "Edit" ("Change"/Edit). 3. In the dialog box, click on the old name and type in the new one. 4. Click on the "Done" button ("Accept"/Done). This way you can rename the application on Android in both Nova Launcher and Apex Launcher. In some versions of the shells, the names of the items may change, but the process itself remains the same. QuickShortcutMaker This is a free product, with which you can also change the name of the application to any other. You can find it on the same Google Play or on the official website of the developer. Installation shouldn't be a problem. During the installation of the application, you mustagree to grant rights to edit filenames. Otherwise, the platform will "resist" the actions of the program. The utility itself has a wide range of capabilities, but we are interested in the function of renaming applications. Quick Shortcut Maker Quick Shortcut Maker To change names, follow the steps below: 1. Start the utility and agree to scan the internal drive (about 15 seconds). 2. Go to the Applications section and find what you need in the list. 3. Open it and click on Change label. 4. In the pop-up window, enter a new application name and click OK. 5. Next, click on "Create" (Create). You now have the old app with a new name on your desktop. It is also worth noting that if you remove the utility, then all changes will be saved. Xposed Another multi-module utility aimed at configuring the platform. Again, we are only interested in renaming programs, and we will omit the review of other possibilities. It is worth noting right away that administrator rights (Root) are required for the correct operation of the utility. The installation of the program takes place in the normal mode for the platform. Xposed xRenamer Xposed xRenamer To change the name of the application, you must: 1. Launch Xposed, go to the "Download" section and click on the xRenamer module icon. 2. In the "Modules" section, find the running component and activate it. 3. After the phone will reboot and the xRenamer shortcut will appear on the desktop. 4. After launching the module, a list of all shortcuts and applications will appear. 5. Select the one you need and rename it with a double tap. This method is somewhat confusing, so it's worth trying the previous two options first. Popular topic Editor's choice • What is a proxy server and what is it for? What is a proxy server and what is it for? The word "proxy" has ever been heard by any of us, but not everyone knows what a proxy server is and what its purpose is • Google Chrome not working. What to do? Google Chrome not working. What to do? So why doesn't Chrome launch when we click on its desktop icon? Google Chrome not working for several reasons • Recovery console. Main benefits of using Recovery console. Main benefits of using Computers are quite technically complex devices. In this regard, many users from time to time encounter failures in the operation of the operating system and other programs. In most cases, you can fix problems in a matter of minutes, especially if the computer technician has the necessary skills. If a critical failure occurs, it is recommended to use the recovery console • What is the cluster size? What is the cluster size? The space of any storage medium (hard drive or flash drive) is not a whole piece, but a system of memory cells called clusters • What is defragmentation and why is it needed? What is defragmentation and why is it needed? Modern users are often spoiled by powerful computers and inexpensive components to such an extent that they do not even know the basic concepts. That is why they often find themselves in a situation where the car begins to shamelessly “slow down” and respond with extreme reluctance to any commands. As a rule, “evil viruses” that have entered the computer are blamed for everything, but sometimes the reality turns out to be much more prosaic
__label__pos
0.57401
Nick Knauer Nick Knauer - 3 months ago 29 R Question Bold a column in knitr::kable(df) I have a dataframe that looks as follows: --- title: "Untitled" output: html_document --- ```{r} employee <- c('John Doe','Peter Gynn','Jolie Hope') salary <- c(21000, 23400, 26800) startdate <- as.Date(c('2010-11-1','2008-3-25','2007-3-14')) employ.data <- data.frame(employee, salary, startdate) knitr::kable(employ.data) ``` Does anyone know how to bold the salary column? It's going to be in an html format in the end. enter image description here Thanks! Answer You can use CSS to do it, as described here: Using CSS how to change only the 2nd column of a table. You can just put the CSS directly into the text, outside of the code chunk, or in a separate file mentioned in the YAML header. For example, <style> table td:nth-child(2){ font-weight: bold; } </style> ```{r} employee <- c('John Doe','Peter Gynn','Jolie Hope') salary <- c(21000, 23400, 26800) startdate <- as.Date(c('2010-11-1','2008-3-25','2007-3-14')) employ.data <- data.frame(employee, salary, startdate) knitr::kable(employ.data) ``` This will change every table in the document; you may want a more specific selector. I don't know a simple way to add a class to a particular table using kable() in R Markdown, but this kludge will do it. In the CSS, use <style> table.salarytable td:nth-child(2){ font-weight: bold; } </style> to restrict the change to class salarytable, then in the code chunk use knitr::kable(employ.data, "html", table.attr = 'class="table table-condensed salarytable"' to tell knitr to output HTML and give the table the usual class for an R Markdown table, as well as your own salarytable class.
__label__pos
0.913363
Koes, Derrick wrote: Does tomcat not report the correct header info or something to FOP? I don't understand why there should be a difference. Does the authentication interfere in some way? Sure. How do you think FOP can authentificate itself in your application? -- Oleg Tkachenko eXperanto team Multiconn Technologies, Israel --------------------------------------------------------------------- To unsubscribe, e-mail: [EMAIL PROTECTED] For additional commands, e-mail: [EMAIL PROTECTED] Reply via email to
__label__pos
0.88027
269 Views Photon legal Patents in Facial Recognition Author – Swanand Khonde and Amit Koshal Facial recognition software is a technology that can detect and identify a human face by an image or by a video stream or a live stream through cameras. Though the term facial recognition looks fairly simple, it is not! The term facial detection and facial recognition are often confused as being synonymous and are used interchangeably. However, there is a major difference between the two. A facial detection program only detects a face whereas facial recognition detects a face as well as identifies the person. Figure 1 – Shows the Feature Points of the Face. The first semi-automatic face recognition system was developed by Woodrow W. Bledsoe under contract to the US Government. This system relied entirely on the potential of the administrator to identify and extract feature points such as eyes, nose, ears and mouth on photographs. This basic idea has been developed upon further by UTC Fire and Security Americas Corp Inc who have patented a “system and method for passive face recognition”. Under this technology that is often used for unlocking phones, the software captures the face of a person and registers its features as a model face. With continued use, it begins to fit images with the registered features and generate variations of the registered model face. These variations help the phone in recognising an individual from varied angles and features that were not initially registered. Thus, the software transforms the registered face model to a desired orientation to generate a transformed model face. A question that you must have pondered upon is whether the facial recognition software shown in Hollywood movies is real? Yes, but to some extent. The idea of facial recognition software in the movies is highly advanced and such technology is still being developed. Facial recognition software as shown in the movie Mission Impossible Are the softwares as efficient in real life? No, at present development levels, some factors can throw off face recognition systems. For example, low illumination, image or video quality can lead to false positives. According to a study by the Massachusetts Institute of Technology, misidentifications are rampant and even slight changes in camera angles can lead to a false positive result. However, these softwares could be used in simple tasks of our day to day lives. Organisations can prepare themselves for a post COVID work atmosphere by replacing finger prints for attendance logs with facial recognition software. Further, with the education system which has currently shifted learning online, facial recognition could be integrated with video conferencing platforms to track students’ attention on the screen. Facial recognition installed in CCTV cameras can help in ensuring safety and security near banks and ATM’s. Such technology could also be imbibed in online payment applications to ensure maximum safety. The future of technology is hands free and facial recognition is the platform towards it. Various companies have developed technologies in the field of face recognition that cover the above given examples. Uncanny Vision is one such company which has developed a facial recognition product that can be installed in the perimeter of an ATM and is useful for safety and security of the ATM. More than 900 facial recognition patents have been filed in China. This number is 10 times more than patents filed in the US. China has been plenty vocal about its plans to be the global leader in artificial intelligence by 2030, a market where the facial recognition piece alone is expected to garner $9.6 billion by 2022. The figure above shows the rise in face recognition patents published in China from 2012-2017. This growth in facial recognition patents can be attributed to the emphasis placed on surveillance by Chinese authorities. This is reinforced by the number of patents found by a simple keyword search on worldwide patent database Espacenet. Over 530 patents related to video surveillance and surveillance cameras were published in China in 2017 alone, compared to just 96 in the United States (based on keyword searches of title and abstract). Facial recognition softwares are being continually developed to be incorporated into our daily lives. From out dated face unlocking mechanisms that would be easily fooled by photographs, advancements have been made to recognizing changing features on our faces. The percentage of false positives has also come down by a larger number. Google has been a pioneer in introducing facial recognition in Google photos where individuals are recognised through photos by automatic tagging and stored in separate folders. With this feature you can just type a particular name if you want to search any picture of someone and Google will automatically filter out all the images of that person. Google in its latest patent has invented a way for multiple Android users to use face-unlocking on a single device. It obtained a new patent for a method that requires users to make a series of facial expressions to gain access to a system. Essentially, the patent claims a method where a device captures two images of a user, then compares the differences in the images to identify a facial gesture and authenticate the user. Even though several patents have been filed in the field of facial recognition, it must be noted that softwares are not easily patentable. In order for them to be patentable, they need to cause a “technical effect” or a material effect. This means that the innovation must have the potential to create an impact on the society. Though this position is widely accepted worldwide, substantive legislations regarding patentability of softwares and computer programs and their interpretation by courts vary under different jurisdictions. For Example, In Australia, there is no particular exclusion for patents relating to software. The IT sector in India is flourishing since past few years and has a bright future as a ton of industries from the US and Europe are looking to establish their presence in the Indian market. In addition to this, over 1300 start-ups were added in the year 2019. A lot of start-ups have emerged in the AI and facial recognition field in India like AIndra Labs, FaceX, Parallel Dots, Staqu, etc., and a lot more are in the process. AI empowered facial recognition innovations still remain to be unlocked to its fullest potential. Maybe the release of 5G technology  will fuel this innovations up to its potential in the coming future. Read our previous blog on “The Emergence of 5G in 2020” For any legal advice regarding your business, please reach out to us on- [email protected]  Stay in, Stay safe and continue to work. Team Photon Legal. Cover Image Source – freepik.com. About: Photon legal Open chat
__label__pos
0.579439
Tk::Canvas - Leinwand zum Zeichnen Wie in HTML5 gibt es auch für Perl/Tk eine Canvas. Eine Tk::Canvas stellt eine Zeichenfläche dar, auf der beliebige Objekte gezeichnet werden können. Die Objekte können nicht nur Formen und Text sein, sondern auch andere Perl/Tk-Widgets. Scrollbalken an den Canvas-Inhalt anpassen Eine Canvas kann mit Bildlaufleisten versehen werden, wenn mehr Inhalt in der Canvas enthalten wird, als im sichtbaren Bereich angezeigt werden kann. Einfach per Scrollable Bildlaufleisten an die Canvas ankonfigurieren ist aber nur der erste Schritt. Damit die Bildlaufleisten funktionieren, muss man über die Option -scrollregion angeben, wie groß die zu Grunde liegende Fläche ist. Erst dann passen sich die Scrollbalken an den von der Canvas sichtbaren Bereich an. #!perl use strict; use warnings; use utf8; use Tk; my $mw = tkinit(); my $canvas = $mw->Scrolled('Canvas', -bg => 'white', # Bildlaufleisten unten und rechts -scrollbars => 'se', )->pack( -fill => 'both', -expand => 1, ); # Element im sichtbaren Bereich: my $oval = $canvas->createOval(10, 10, 60, 60, -fill => 'orange', ); # Element teilweise außerhalb des sichtbaren Bereichs: my $line = $canvas->createRectangle(250, 200, 700, 700, -fill => 'blue', -width => 4, ); # Bildlaufleisten der tatsächlichen Größe der Canvas anpassen $canvas->configure(-scrollregion => [ $canvas->bbox("all") ]); $mw->MainLoop(); raise() und lower bei einer Scrolled Canvas Ein kleiner Fallstrick bei einer Canvas, die per Scrollable mit Bildlaufleisten versehen wurde, ist, dass die Methoden raise und lower nicht auf das Objekt angewandt werden können, das von der Widget-Erzeugung mit Scrolled zurückgeliefert wird: my $scrolled_canvas = $mw->Scrolled('Canvas',); $canvas->lower($move_this_widget_id, $below_this_one); Die Fehlermeldung sieht dann in etwa so aus: wrong # args: should be "lower window ?belowThis?" at path\scrolled-canvas.pl line ... Die Lösung ist, die Methoden direkt auf das Canvas-Widget anzuwenden, nicht auf das gescrollte Canvas-Mega-Widget. Die zu Grunde liegende Canvas erhält man mittels Subwidget. Das Argument scrolled liefert übrigens immer das gescrollte Widget zurück. So muss nicht der exakte Widget-Name eingegeben werden. my $scrolled_canvas = $mw->Scrolled('Canvas',); my $canvas = $scrolled_canvas->Subwidget('scrolled'); Hover-Effekt auf der Canvas Aus CSS ist der sog. Hover-Effekt bekannt. Fährt ein Nutzer mit der Maus über einen bestimmten Bereich, wird dieser hervorgehoben. Das geht auch bei einer Canvas. Es gilt dafür den Moment abzufangen, in dem die Maus über einen definierten Bereich fährt bzw. ihn wieder verlässt. Das geschieht über den Befehl bind(), mit dem man auf Ereignisse (engl. Events) reagieren kann. Der bind()-Befehl ist bei der Canvas ziemlich mächtig. Man kann ein einzelnes Objekt binden, eine Gruppe von Objekten, alle Objekte mit bestimmten Tags usw. Der nachfolgende Code veranschaulicht, wie mit bind() die beiden Ereignisse Maus fährt über ein Element und Maus verlässt eine Element gebunden werden. Das Ereignis, bei dem die Maus über das Objekt fährt, ist <Enter>. Das Ereignis, welches beim Verlassen des Objektes mit der Maus ausgelöst wird, ist <Leave>. Zuvor soll definiert werden, was dabei passieren soll: Ereignis Aktion Maus befindet sich nicht über einem Objekt Keine Hervorhebung von irgendeinem Objekt. Alle Objekte haben ihre Standardfarben. Maus befindet sich über einem Objekt Das Objekt, über dem sich die Maus befindet, soll hervorgehoben werden. Dazu werden die Hintergrundfarbe und die Rahmenfarbe geändert. Maus verlässt ein hervorgehobenes Objekt Die farbliche Hervorhebung soll wieder rückgängig gemacht werden. Das Objekt erhält die Standard-Farben für Hintergrund und Rahmen. Mit diesem Wissen gewappnet kann man sich nun überlegen, wie die Hervorhebung genau gestaltet werden soll. Für das folgende Beispiel gibt es also zwei Zustände für ein Objekt: normal (Maus ist nicht drüber) und hover (Maus ist drüber). Pro Zustand gibt es im Beispiel-Code zwei Farben: Füllfarbe (Hintergrundfarbe) und Rahmenfarbe. Kombiniert sieht das ganz nett aus. Hier ein Beispiel für eine leichte Hervorhebung im Microsoft-Office-Orange: Status Hintergrundfarbe Rahmenfarbe Beispiel normal #FFD86C #C0C0C0 #FFD86C hover #FFE169 #E0E0E0 #FFE169 Das Ereignis <Enter> und die Objekt-Füllfläche Achtung! Objekte besitzen standardmäßig keine Füllung. Der Hover-Effekt in diesem Beispiel tritt nur dann ein, wenn die Maus über dem vom Objekt gefüllten Bereich schwebt. Wird also nur ein Rahmen angezeigt, so ist der Hover-Effekt auch nur sichtbar, wenn die Maus über dem Rahmen steht. Das animierte Gif auf dieser Seite zeigt diesen Effekt. Steht die Maus genau auf dem Rahmen, wird der Rahmen rot. Steht die Maus hingegen im Rahmen auf der transparenten Fläche, so ist der Rahmen wieder schwarz. Ist die Fläche gefüllt, klappt der Effekt wie vorgesehen. #!perl use strict; use warnings; use utf8; use Tk; use Tk::Canvas; =comment Canvas-Demo: zeigt den Hover-Effekt für eine Form. Wenn die Maus über dem Objekt schwebt, wird es hervorgehoben. =cut my $mw = tkinit(-title => 'Canvas-Hover-Effekt'); my $canvas = $mw->Canvas( -bg => 'white', -width => 410, )->pack(-fill => 'both', -expand => 1); # --------------------------------------------------------------- # -- Rechteck ohne Füllung, Hover-Effekt tritt bei Maus über # Rahmen auf my $rect = $canvas->createRectangle(50, 50, 180, 100); $canvas->bind( $rect, '<Enter>' => sub{ $canvas->itemconfigure( $rect, -outline => 'red'); }); $canvas->bind( $rect, '<Leave>' => sub{ $canvas->itemconfigure( $rect, -outline => 'black'); }); # --------------------------------------------------------------- # -- gefülltes Rechteck, Hover-Effekt tritt bei Maus über der # gesamten Fläche auf my $rect_filled = $canvas->createRectangle( 230, 50, 360, 100, -outline => '#C0C0C0', -fill => '#FFEC73', ); $canvas->bind( $rect_filled, '<Enter>' => sub{ $canvas->itemconfigure( $rect_filled, -outline => '#E0E0E0', -fill => '#FFF196', ); }); $canvas->bind( $rect_filled, '<Leave>' => sub{ $canvas->itemconfigure( $rect_filled, -outline => '#C0C0C0', -fill => '#FFEC73', ); }); # --------------------------------------------------------------- # -- gefüllte überlappende Rechtecke, Hover-Effekt tritt bei # Maus über der gesamten Fläche auf my $rect_overlapping_left = $canvas->createRectangle( 50, 150, 180, 200, -outline => '#C0C0C0', -fill => '#FFD86C', ); $canvas->bind( $rect_overlapping_left, '<Enter>' => sub{ $canvas->itemconfigure( $rect_overlapping_left, -outline => '#E0E0E0', -fill => '#FFE169', ); }); $canvas->bind( $rect_overlapping_left, '<Leave>' => sub{ $canvas->itemconfigure( $rect_overlapping_left, -outline => '#C0C0C0', -fill => '#FFD86C', ); }); my $rect_overlapping_right = $canvas->createRectangle( 150, 180, 230, 230, -outline => '#C0C0C0', -fill => '#FFEC73', ); $canvas->bind( $rect_overlapping_right, '<Enter>' => sub{ $canvas->itemconfigure( $rect_overlapping_right, -outline => '#E0E0E0', -fill => '#FFF196', ); }); $canvas->bind( $rect_overlapping_right, '<Leave>' => sub{ $canvas->itemconfigure( $rect_overlapping_right, -outline => '#C0C0C0', -fill => '#FFEC73', ); }); $mw->MainLoop(); Top
__label__pos
0.627797
Muki Muki - 1 year ago 47 MySQL Question How to check if datetime is x seconds different for the same id I got the following table: https://i.gyazo.com/0ff46d51d29aed52d92434df9e91e178.png I got the following query which doesn't work: select * from viewed u1 inner join viewed u2 on (u2.user_id = u1.user_id) where TIMESTAMPDIFF(SECOND, u1.date_reg, u2.date_reg) < 5; I am trying to find out which user got entries where the date_reg time is less than x seconds. If we look at the image, both of the users should be selected since they got rows where the date_reg differs 0-1 seconds. The problem is that the query doesn't work as intended since it selects almost all rows in the table. Does someone have any idea how I find out which user has x seconds differencte between their entires in the table? Answer Source You need another condition so timestampdiff() is always positive. I would suggest: select * from viewed u1 inner join viewed u2 on u2.user_id = u1.user_id where u1.date_reg < u2.date_reg and TIMESTAMPDIFF(SECOND, u1.date_reg, u2.date_reg) < 5;
__label__pos
0.971327
Question Crazy average value on measure • 12 October 2022 • 2 replies • 109 views Looker is generating a crazy average SQL and I don't understand why.    In my view, I have a number field which records assignment grades for students:     dimension: step_grade {     type: number     sql: ${TABLE}.step_grade ;;   }   This field is correctly populated in BigQuery with numbers only. It's a FLOAT column.      When I query it for average, it returns properly:      So, I created a measure in the same view to bring out the average value for this field:     measure: average_step_grade {     type: average     sql:  ${TABLE}.step_grade ;;     value_format: "0.00\%"   }   Sometimes it works well. Other times, it gives me a non-sense result.      I noticed that it generates a crazy query for this field.      (ROUND(COALESCE(CAST( ( SUM(DISTINCT (CAST(ROUND(COALESCE( enrollments.step_grade  ,0)*(1/1000*1.0), 9) AS NUMERIC) + (cast(cast(concat('0x', substr(to_hex(md5(CAST( enrollments.enrollment_id   AS STRING))), 1, 15)) as int64) as numeric) * 4294967296 + cast(cast(concat('0x', substr(to_hex(md5(CAST( enrollments.enrollment_id   AS STRING))), 16, 8)) as int64) as numeric)) * 0.000000001 )) - SUM(DISTINCT (cast(cast(concat('0x', substr(to_hex(md5(CAST( enrollments.enrollment_id   AS STRING))), 1, 15)) as int64) as numeric) * 4294967296 + cast(cast(concat('0x', substr(to_hex(md5(CAST( enrollments.enrollment_id   AS STRING))), 16, 8)) as int64) as numeric)) * 0.000000001) )  / (1/1000*1.0) AS FLOAT64), 0), 6) / NULLIF(CAST(COUNT(DISTINCT CASE WHEN   enrollments.step_grade   IS NOT NULL THEN  enrollments.enrollment_id   ELSE NULL END) AS FLOAT64), 0.0)) AS enrollments_average_step_grade   In my understanding, it should just be AVG(field_name).   The whole calculation is wrong and I am not sure how to fix this.    Any ideas?   This topic has been closed for comments 2 replies Userlevel 2 I’d check your joins to this table in your explore. Is this the primary table in the explore? Userlevel 6 Badge Read this: https://cloud.google.com/looker/docs/best-practices/understanding-symmetric-aggregates
__label__pos
0.916335
What is a blockchain? Blockchain is an irreplaceable resource innovation that is virtually revolutionizing the global business market. Its evolution has brought not only business but also greater benefits to its beneficiaries. However, as it is revealed to the world, the vision of its operational activities is still unclear. The main question in everyone’s mind is – what is blockchain? To begin with, blockchain technology acts as a platform that allows the transit of digital information without the risk of being copied. It has, in a way, laid the foundation for a new kind of Internet space. Originally designed to work with Bitcoin – trying to explain to the general public its algorithms, hash functions and digital signature properties, today TechnologyTalks is looking for other potential uses for this unique discovery that could pave the way for a completely new world Business process. Blockchain, to define in all cases, a kind of algorithm and data distribution structure for managing electronic cash without any centralized administration intervention, programmed to record all financial transactions as well as everything valuable. Blockchain work Blockchain is understood as a laser technology that was originally created to support Bitcoin cryptocurrency. However, after heavy criticism and rejection, the technology was revised for use in more productive things. To give a clearer picture, imagine a spreadsheet that practically adds tons to a plethora of computer systems. And then imagine that these networks are designed to update this spreadsheet from time to time. This is the blockchain. The information stored in a blockchain is a shared sheet whose data is aggregated from time to time. This is a practical way to talk about the many obvious benefits. To be with, blockchain data does not exist in a single place. This means that everything stored there is open to the public for viewing and verification. Moreover, there is no central data storage platform that hackers can corrupt. It has access to virtually one million computing systems as well, and its data can be consulted by anyone with an Internet connection. Stability and blockchain authenticity Blockchain technology is one of the things that minimizes Internet space. It is strong in nature. Similar to providing data to the general public through the World Wide Web, blocks of authentic information are stored on a blockchain platform that is uniformly visible across all networks. Importantly, blockchain cannot be controlled by any single person, entity or identity and there is no point of failure. Just as the Internet has proven itself to be a sustainable place for the past 30 years, blockchain will serve as an authentic, reliable global platform for business transactions as it continues to evolve. Transparency and uninterrupted nature Industry veterans claim that blockchain lives in a conscious state. It is often and then practically tested. It is similar to a self-monitoring technology where its network adapts to each transaction, known as a block, which flows at regular intervals. This gives rise to two main features of the blockchain – it is extremely transparent and at the same time it cannot be corrupt. Every transaction that takes place on this server is embedded in the network, so the whole thing is always publicly visible. In addition, blockchain requires a lot of effort and a strong computing to edit or delete data. Of these, frauds can be easily identified. Therefore, it has been described as inseparable. Blockchain users There are no definite rules or controls about who will use or be able to use this flawless technology. Although its potential users are currently only banks, commercial giants and the global economy, the technology is also open to the day-to-day transactions of the general public. Global recognition is the only failure blockchain.
__label__pos
0.804439
 VB.NET tutorial: Arrays-Two-Dimensional Array VB.NET tutorial: Arrays-Two-Dimensional Array VB.NET Arrays Two-Dimensional Array Another frequently used array is two-dimensional array. A two-dimensional array stores values in rows and columns. The row index starts from 0. The column index also starts from 0. You will use the New keyword to allocate a two-dimensional array. Index  0 1 2 0 1 2 3 1 4 5 6 Example: Module Module1       Sub Main()        'Declaring and allocating the 2D-array of 2 rows and 3 columns         Dim arr(,) As Integer         arr = New Integer(1, 2) {{1, 2, 3}, {4, 5, 6}}         For i = 0 To arr.GetUpperBound(0) 'max row index             For j = 0 To arr.GetUpperBound(1) 'max column index                 Console.Write(arr(i, j) & vbTab)             Next             Console.WriteLine()' print new line         Next         Console.ReadLine()       End Sub End Module Comments CAPTCHA image  This website intents to provide free and high quality tutorials, examples, exercises and solutions, questions and answers of programming and scripting languages: C, C++, C#, Java, VB.NET, Python, VBA,PHP & Mysql, SQL, JSP, ASP.NET,HTML, CSS, JQuery, JavaScript and other applications such as MS Excel, MS Access, and MS Word. However, we don't guarantee all things of the web are accurate. If you find any error, please report it then we will take actions to correct it as soon as possible.
__label__pos
0.725567
1. Limited time only! Sign up for a free 30min personal tutor trial with Chegg Tutors Dismiss Notice Dismiss Notice Join Physics Forums Today! The friendliest, high quality science and math community on the planet! Everyone who loves science is here! Distributing into a square root 1. Sep 25, 2012 #1 Its been a while since I have taken any kind of math class, I am a bit rusty in general algebra. Can someone explain how I would multiply an equation like this (2x-1)sqrtof x-3x is it just like normal distribution? Would I just put the answer underneath the square root? sqrt2x^2-6x^2-x+3x?   2. jcsd 3. Sep 25, 2012 #2 all of these things are equal: a*sqrt(b) = sqrt(a*a) * sqrt(b) = sqrt(a*a*b)   4. Sep 25, 2012 #3 To figure something like this out, try it with regular old numbers. For example [itex]5 \sqrt{4} = 5 * 2 = 10[/itex]. But if you just put the 5 under the square root sign to make it sqrt(5*2) = sqrt(10), then that's not the same thing as 10 so you can't do that. Why not? Well, [itex]\sqrt{a^2b^2} = ab[/itex], right? That's because (ab)2 = a2b2. So, what's the fix? If we have 5 * sqrt(4) we can put the 5 under the radical by squaring it: [itex]5 \sqrt{4} = \sqrt{5^2*4} = \sqrt{100} = 10[/itex] as it should be.   Last edited: Sep 25, 2012 5. Sep 26, 2012 #4 Ok so let me know if im the right track if I have (9y+1)sqrt 82 i just square 9y+1 and put it under the square root with 82 and then times them both together?   6. Sep 26, 2012 #5 Yes, but now you have to be careful. If 9y+1 is negative, squaring it will lose information. So this depends on the context. In other words it is not always true that [itex]\sqrt{x^2} = x[/itex]. That's because the meaning of the square root symbol is the positive number that squares to what's under the radical. So if you start with x = -5, you'll end up introducing an error. Why do you want to put this expression under the radical? In general, doing so will change the meaning and introduce an error.   7. Sep 26, 2012 #6 Ahh I see well I am finding the area of a surface and I need to distribute this expression into the square root due to the formula I was given A= 2pi integral from a to b f(x)sqrt 1+ f(x) prime^2 that is the forumula that I have to use   8. Sep 27, 2012 #7 HallsofIvy User Avatar Science Advisor I think you mean "f(x)sqrt(1+ f(x) prime^2)". Please use parentheses! [tex]\int_a^b f(x)\sqrt{1+ f'^2(x)}dx[/tex] Yes, you can write that as [tex]\int_a^b \sqrt{f^2(x)(1+ f'^2(x))}dx[/tex] Whether that is a good idea or not depends upon f.   Share this great discussion with others via Reddit, Google+, Twitter, or Facebook
__label__pos
0.999107
Practical Solution to SQL Server Performance Monitoring • When the monitoring process is completed, you can transfer the performance log file data to your SQL Server. For this purpose, create a table in which to save the monitoring data using the following script: CREATE TABLE [PerfmonDataCustomer01] (      [CounterDateTime] [datetime] NOT NULL,      [Page Reads/sec] [numeric](18, 2) NULL,      [Pages/sec] [numeric](18, 2) NULL,      [Avg Disk0 Queue Length] [numeric](18, 2) NULL,      [Avg Disk0 sec/Transfer] [numeric](18, 2) NULL,      [Avg Disk1 Queue Length] [numeric](18, 2) NULL,      [Avg Disk1 sec/Transfer] [numeric](18, 2) NULL,      [Processor Time] [numeric](18, 2) NULL,      [Page Splits/sec] [numeric](18, 2) NULL,      [Cache Hit Ratio] [numeric](18, 2) NULL,      [User Connections] [numeric](18, 2) NULL,      [Processor Queue Length] [numeric](18, 2) NULL ) GO ALTER TABLE [dbo].[PerfmonDataCustomer01] WITH NOCHECK ADD      CONSTRAINT [PK_PerfmonDataCustomer01] PRIMARY KEY CLUSTERED      (       [CounterDateTime]      ) GO • I use the OpenDataSource function in the import script because in my opinion it is a more flexible solution than the BCP utility, a DTS package, or a BULK INSERT statement. The following script imports data from the C:PerfLogsSQLperfmon_02271405.csv file into the PerfmonDataCustomer01 table: INSERT INTO [PerfmonDataCustomer01] (      [CounterDateTime]      ,[Page Reads/sec]      ,[Pages/sec]      ,[Avg Disk0 Queue Length]      ,[Avg Disk0 sec/Transfer]      ,[Avg Disk1 Queue Length]      ,[Avg Disk1 sec/Transfer]      ,[Processor Time]      ,[Page Splits/sec]      ,[Cache Hit Ratio]      ,[User Connections]      ,[Processor Queue Length] ) SELECT      [(PDH-CSV 4#0) (Pacific Standard Time)(480)]      ,cast([MemoryPage Reads/sec] as float)      ,cast([MemoryPages/sec] as float)      ,cast([PhysicalDisk(0 C:)Avg# Disk Queue Length] as float)      ,cast([PhysicalDisk(0 C:)Avg# Disk sec/Transfer] as float)      ,cast([PhysicalDisk(1 D:)Avg# Disk Queue Length] as float)      ,cast([PhysicalDisk(1 D:)Avg# Disk sec/Transfer] as float)      ,cast([Processor(_Total)% Processor Time] as float)      ,cast([SQLServer:Access MethodsPage Splits/sec] as float)      ,cast([SQLServer:Buffer ManagerBuffer cache hit ratio] as float)      ,cast([SQLServer:General StatisticsUser Connections] as float)      ,cast([SystemProcessor Queue Length] as float) FROM OpenDataSource( ‘Microsoft.Jet.OLEDB.4.0′, – csv file on a local drive ‘Data Source=C:PerfLogs;Extended properties=Text’)…SQLperfmon_02271405#csv If your performance log file is stored in a location that is different from the one specified in the script, then the last line of the script that specifies the file name and the Data Source parameter should be modified. Please note that you should use the “#” character instead of “.” in the file name. If the performance log file is stored in the shared folder on the remote server the Data Source part could look like this: – csv file on a shared folder ‘Data Source=\server01PerfLogs;Extended properties=Text’)…SQLperfmon_02271405#csv Please note that the monitoring server’s time zone defines the first field name of the Performance Log file. The field names shown in the first line of the .csv file must match the first field name in the SELECT statement of the import script. If not, you need to edit the first selected item in the script above. Again, please make sure that you use the “#” character instead of “.” in the field name. For example, if the field name in the .csv file is “(PDH-CSV 4.0) (Pacific Standard Time)(480)” you should use “[(PDH-CSV 4#0) (Pacific Standard Time)(480)]” in this script. • When the import is completed, you can compare the performance data of different servers, analyze recorded data using Microsoft recommendations, and decide how to resolve the issues that were found. Several sample queries for the data analysis are provided below: SELECT AVG([Processor Time]) FROM PerfmonDataCustomer01 SELECT AVG([Processor Queue Length]) FROM PerfmonDataCustomer01 SELECT TOP 10 [Processor Time], [Processor Queue Length] FROM PerfmonDataCustomer01 ORDER BY [Processor Queue Length] DESC • Another monitoring setup that could be useful for SQL Server performance monitoring was recommended in “Performance Monitoring — Basic Counters” by Steve Jones. It also uses the Counter Log file with the corresponding table and import scripts. I included all the counters recommended in that article except the “Network Interface Object” because it uses a particular network card name, which may not be the same on different servers. The following script assumes that the monitored server has a physical disk, “0 C:”, and that the Transactions/Sec counter will check the “pubs” database. Continues… Pages: 1 2 3 4 5 Array No comments yet... Be the first to leave a reply! Software Reviews | Book Reviews | FAQs | Tips | Articles | Performance Tuning | Audit | BI | Clustering | Developer | Reporting | DBA | ASP.NET Ado | Views tips | | Developer FAQs | Replication Tips | OS Tips | Misc Tips | Index Tuning Tips | Hints Tips | High Availability Tips | Hardware Tips | ETL Tips | Components Tips | Configuration Tips | App Dev Tips | OLAP Tips | Admin Tips | Software Reviews | Error | Clustering FAQs | Performance Tuning FAQs | DBA FAQs |
__label__pos
0.764058
Jump to content • Log In with Google      Sign In    • Create Account Light position problem Old topic! Guest, the last post of this topic is over 60 days old and at this point you may not reply in this topic. If you wish to continue this conversation start a new topic. • You cannot reply to this topic 20 replies to this topic #21 kauna   Crossbones+   -  Reputation: 2852 Like 1Likes Like Posted 07 September 2012 - 11:18 AM Ok, I took a look into your project. There were several problems: - some of them preventing the light source from creating lighting effect. - one which crashes the program under debug builds. The errors are: - Your vertex format doesn't have normals in them. For some reason you have commented out the normals. Actually your vertex format isn't the same on the program side and on the HLSL side. Fix this. You need the normals and the format has to be same in the program side and HLSL side. You can't expect the calculations to make sense if the input values aren't defined. Normals in this case aren't defined. You'll need to change the FVF declaration to include the normals. - Your lighting calculation uses "Diffuse" multiplier. I didn't look into it so closely, but it seems to be 0 or close to it. Multiplying anything with 0 results 0 = black. - Spaces : some of your values are in view space and some are in world space. Mixing those values won't give you correct result. Ie. Light position in world space and vertex position in view space. - You are clearing the screen twice. It crashes the program because of invalid parameters or so. What is it with the stencil? Where do you need the stencil buffer? Most of these things could have been debugged quite easily such as : - use PIX - narrow down the problem - split complex calculations/functions in parts and inspect each of them separately to find out parts which don't behave as intended. - make the pixel shader output the value your want to inspect (this way I noticed that your normals are missing) - Use debug builds and D3D debug libraries to catch invalid function calls. Best regards! Edited by kauna, 07 September 2012 - 11:39 AM. Sponsor: Old topic! Guest, the last post of this topic is over 60 days old and at this point you may not reply in this topic. If you wish to continue this conversation start a new topic. PARTNERS
__label__pos
0.678062
Background Image and Duplicated View Controllers in iOS App Development Introduction When it comes to iOS app development, creating an engaging and visually appealing user interface is essential. Adding background images and duplicating view controllers are two powerful techniques that can elevate the user experience. In this article, we will explore the step-by-step process of incorporating background images into your view controllers and duplicating view controllers to enhance both the aesthetics and functionality of your iOS app. Adding a Background Image The first technique we'll delve into is adding a background image to a view controller. By carefully selecting and implementing a captivating background image, you can create a visually stunning backdrop that sets the tone for your app's interface. 1. Choose an Image: Begin by selecting an image that aligns with your app's theme and resonates with your target audience. This image can be sourced from your project's asset catalog or added directly to your project folder. 2. Import the Image: If the image is not part of your project, you must import it. You can do this by adding it to your project's asset catalog or by directly placing it in the appropriate location within your project folder. 3. Configure the View Controller: Open the storyboard or XIB file that contains the view controller to which you want to add the background image. Drag and drop an ImageView component onto the view controller's canvas, adjusting its size and position to cover the entire view. 4. Set the Background Image: With the ImageView selected, navigate to the Attributes inspector and locate the Image field. Select the background image you imported earlier from the available options. This will effectively set the image as the background for your view controller, enhancing the visual appeal of your app's interface. Duplicating View Controllers The second technique we'll explore is duplicating view controllers. This method is particularly useful when you want to reuse existing view controller designs, streamline development, or create multiple instances of a particular screen. 1. Access the View Controller: Open the storyboard or XIB file that contains the view controller you wish to duplicate. Identify the specific view controller scene that you want to replicate. 2. Duplicate the View Controller: Select the desired view controller in the canvas or Document Outline and copy it using the "Copy" option in the Edit menu or by pressing Command+C (Mac) or Ctrl+C (Windows). Then, paste the copied view controller by using the "Paste" option in the Edit menu or by pressing Command+V (Mac) or Ctrl+V (Windows). The duplicated view controller will appear as a separate entity within your interface. 3. Customize the Duplicated View Controller: Position the duplicated view controller within the storyboard or XIB file, arranging it to suit your desired layout and flow. You can modify its title, content, connections, and other properties to create a unique and differentiated user experience. Conclusion By incorporating background images and duplicating view controllers, you can significantly enhance the visual appeal and functionality of your iOS app. Adding captivating background images helps create an immersive environment while duplicating view controllers streamlines development and allows for consistent and efficient design reuse. By mastering these techniques, you can create visually stunning and user-friendly iOS applications that captivate your users and leave a lasting impression. Remember, the key is choosing images that align with your app's theme and purpose and customizing duplicated view controllers to cater to specific user interactions and requirements. With these techniques in your arsenal, you're well on your way to creating exceptional iOS apps that stand out in a competitive marketplace. Whether you're a Swift beginner or an experienced developer looking to enhance your text manipulation skills, this article has got you covered! 😎🎓 So, don't miss out! Check it out here. Happy coding! 🚀 Previous Post Next Post
__label__pos
0.961743
Take the 2-minute tour × Mathematics Stack Exchange is a question and answer site for people studying math at any level and professionals in related fields. It's 100% free, no registration required. How do I evaluate the integral by using substitution? $$\int (3x-2)^{20} dx $$ I'm just wanting to know the basics of how to do such problems, as this is the upcoming section for me. What do I choose to use as a substitution? And where do I go from there? share|improve this question 1   It helps to consult a standard textbook in calculus. :) –  Amitabh Udayiman May 7 '12 at 6:18 2 Answers 2 up vote 11 down vote accepted Let $u=3x-2$. Then $\frac{du}{dx}=3$ and "therefore" $dx=\frac{du}{3}$. Our integral becomes $\int\frac{1}{3}u^{20}\,du$. This is a standard integral, we get $\frac{1}{63}u^{21}+C$. Finally, replace $u$ by $3x-2$. There is an old joke that one replaces whatever is ugly by $u$, because $u$ is the first letter of the word "ugly." But in fact it is hard to give general rules for the strategy to use to attack an integral. Experience helps a lot: if you practice, after a while you recognize close relatives of problems you have already solved before. You would use a very similar substitution if you wanted, for example, $\int\cos(17x-12)\,dx$. Just replace the ugly $17x -12$ by $u$. Note that $dx$ turns out to be $\frac{1}{17}du$. Here is a fancier version of your problem. Find $\int(3x-6)(3x-2)^{20}\,dx$. Note that we could have solved your original problem by expanding $(3x-2)^{20}$, but that would have been a lot of work. We can also solve the new problem in the same way, but it would be. painful So let $3x-2=u$. Then $dx=\frac{du}{3}$, and $3x-6=u-4$. So our integral becomes $$\int \frac{1}{3}(u-4)u^{20}\,du.$$ Now we can multiply $(u-4)$ by $u^{20}$, getting $u^{21}-4u^{20}$. So our integral becomes $$\int \frac{1}{3}\left(u^{21}-4u^{20}\right)\,du,$$ not hard. A last example! We want $\int x\sin(x^2)\,dx$. Substitute for the ugly inner function $x^2$, letting $u=x^2$. Then $\frac{du}{dx}=2x$, "so" $x\,dx=\frac{1}{2}du$. Substituting, we get $\int\frac{1}{2}\sin(u)\,du$, a standard integral. Remember, when we substitute, all traces of $x$ must disappear, meaning that $dx$ has to be expressed in terms of $du$. Note that in this case the $x$ in front helps, because it is almost $\frac{du}{dx}$, where $u=x^2$. share|improve this answer      Great, especially the old joke part. –  Gigili May 7 '12 at 6:19      Might be worth mentioning explicitly, though you suggested it with your quotation marks, that when splitting the $du$ and $dx$, we've moved from mathematics to bookkeeping: it works and there's a reason why it works, but a statement like $dx=\frac{du}{3}$, read mathematically, is not strictly true. This is a confusing point for beginners that's often unsaid. –  Korgan Rivera May 7 '12 at 14:55      @KorganRivera: Good point. Because of the nature of the question, I was concentrating on the "how to" and formal manipulations, in the style the OP might be expected to perform them in an elementary calculus course. A better but much longer approach would be to start with guessing say $(3x-2)^{21}$, differentiating, adjusting the guess, and gradually building up experience and insight about connection with Chain Rule. –  André Nicolas May 7 '12 at 16:34 I will try to show how you can deal with the general case $$I=\int (ax+b)^n dx$$ where $n$ $a$ and $b$ are constants. Putting $u=ax+b$, we obtain $du=a dx$ i.e. $dx=\frac{1}{a} du$ . So, $$I=\int u^n \frac{1}{a}du=\frac{1}{a}\int u^n du=\frac{1}{a}\frac{u^{n+1}}{n+1}+C=\frac{1}{a}\frac{(ax+b)^{n+1}}{n+1}+C$$.Hope that helps as well. share|improve this answer Your Answer   discard By posting your answer, you agree to the privacy policy and terms of service. Not the answer you're looking for? Browse other questions tagged or ask your own question.
__label__pos
0.984089
Fractions and Mixed Numbers Students learn how to calculate equivalent fractions and convert between mixed numbers as a top-heavy fractions.  They use this knowledge to add, subtract, multiply and divide with fractions and mixed numbers. This topic takes place in Term 4 of Year 9 and follows properties of number. Fractions and Mixed Numbers Lessons Revision Lessons Prerequisite Knowledge • Recognise, find and name a half as one of two equal parts of an object, shape or quantity • Recognise, find and name a quarter as one of four equal parts of an object, shape or quantity.  Success Criteria • order positive fractions • apply the four operations, including formal written methods, simple fractions (proper and improper) • express one quantity as a fraction of another, where the fraction is less than 1 or greater than 1 • apply the four operations, including formal written methods, to mixed numbers both positive and negative; • interpret fractions as operators • express a multiplicative relationship between two quantities as a fraction • calculate exactly with fractions Key Concepts • Fractions represent a proportion of an amount hence the equivalence with decimals and percentages. • A fraction is equivalent to a division • All rational numbers are written using exact proper or improper fractions. • When adding or subtracting fractions the denominators need to be equal. • Dividing fractions is equivalent to multiplying by a reciprocal. Common Misconceptions • A shape that is split in two is not necessarily split in half. A half must be two equal proportions of a shape. • A fraction with a larger denominator has the greater value. • A fraction with a smaller denominator has a lesser value. • Fractions such as 3/5 incorrectly have a decimal equivalence of 3.5. Mr Mathematics Blog Trigonometric Identities Sin, Cos and Tan How to introduce the sin, cos and tan trigonometric identities. Calculating a Reverse Percentage How to teach calculating the original amount after a percentage change. Comparing Datasets using the Mean and Range The importance of the range when comparing comparing datasets.
__label__pos
0.832354
IP address details 105.207.192.227 🇪🇬 N/A Cairo, Cairo Governorate, Egypt 105.207.192.227 IP Address Information ASN AS36992 ETISALAT MISR AS Name ETISALAT-MISR Hostname host-105.207.192.227.etisalat.com.eg Range Route 105.207.192.0/18 Company Etisalat 2G/3G Organization N/A IP Type Cellular IP Register Date Friday, 19 November 2010 IP Register Description Allocated to AfriNIC Privacy IP Privacy True What is IP address information? Lookup details about an IP address including location, ISP, hostname, type, proxy, blacklist status and more. Trace, Track and Locate an IP address. A detailed IP address report for 105.207.192.227 (AS36992 ETISALAT MISR) is here! Including geolocation and map, hostname, ip type, proxy and whois details. 1. 105.207.192.227 IP Information 2. 105.207.192.227 IP Geolocation 3. 105.207.192.227 IP Privacy 4. 105.207.192.227 IP Whois 5. 105.207.192.227 IP Summary 6. 105.207.192.227 Related IP Numbers 105.207.192.227 Geolocation Data Continent Africa Country Egypt 🇪🇬 State Cairo Governorate City Cairo (N/A) Postal Code Local time 11:16 AM, Friday, 01 December 2023 Timezone Africa/Cairo Coordinates 30.0444, 31.2357 30.0444 ● 31.2357 What is IP geolocation data? IP geolocation lookup is the identification of an 105.207.192.227 IP address geographic location in the real world. IP geolocation is the mapping of an IP address to the geographic location of the internet from the connected device. By geographically mapping the IP address, it provides you with location information such as the country, state, city, zip code, latitude/longitude, ISP, area code, and other information. Useful for web personalization and financial technology! 105.207.192.227 Privacy Detection VPN VPN Proxy Proxy Tor Tor Relay Relay Mobile Mobile Hosting Hosting What is privacy detection? Detects various methods used to mask a user's true IP address, including VPN detection, proxy detection, tor usage, relay usage, or a connection via a hosting provider. Personal information is information about an identifiable individual. The answer to whether an IP address is personal information is ‘it depends’. An IP address identifies a particular computer, generally, and sometimes might not even be that specific when the IP address is assigned dynamically. Useful for cybersecurity, and financial technology. 105.207.192.227 WHOIS Details What is IP whois? An IP WHOIS Lookup determines ownership information of any IP address. Find WHOIS information about an 105.207.192.227 ip address by performing an IP WHOIS Lookup. Find as much information as possible about a given IP address using the IP WHOIS Lookup tool, fetched from the Regional Internet Registry (RIR) to which the IP address belongs. Find out who owns an IP address. Discover the 105.207.192.227 owner's contact information. 105.207.192.227 IP No Summary A detailed IP address report for 105.207.192.227 is here. Additional IP location information, as well as network tools are available. The IP address 105.207.192.227 was found in Cairo, Cairo Governorate, مصر‎. Geographic coordinates are 30.0444, 31.2357. It is allocated to Etisalat 2G/3G and using for Cellular. The phone area code is +20. The postcode is . Currency name is Egyptian Pound and currency code EGP. The timezone of 105.207.192.227 is Africa/Cairo. The current local time is 11:12. Ipno hostname is host-105.207.192.227.etisalat.com.eg and range is 105.207.192.0/18. This ip number consists of 12 digits. 105 - 207 - 192 - 227 (One Hundred Five, two hundred seven, one hundred ninety-two, one hundred ninety-two, two hundred twenty-seven). Do you want hide your ip address? Surf anonymously, prevent hackers from acquiring your IP address, send anonymous email, and encrypt your Internet connection. High speed, ultra secure, and easy to use. Instant setup.
__label__pos
0.784535
mastodon/mastodon View on GitHub .github/workflows/linter.yml Summary Maintainability Test Coverage --- ################################# ################################# ## Super Linter GitHub Actions ## ################################# ################################# name: Lint Code Base # # Documentation: # https://docs.github.com/en/actions/learn-github-actions/workflow-syntax-for-github-actions # ############################# # Start the job on all push # ############################# on: push: branches-ignore: [main] # Remove the line above to run when pushing to master pull_request: branches: [main] ############### # Set the Job # ############### permissions: checks: write contents: read pull-requests: write statuses: write jobs: build: # Name the Job name: Lint Code Base # Set the agent to run on runs-on: ubuntu-latest ################## # Load all steps # ################## steps: ########################## # Checkout the code base # ########################## - name: Checkout Code uses: actions/checkout@v3 with: # Full git history is needed to get a proper list of changed files within `super-linter` fetch-depth: 0 - name: Set-up Node.js uses: actions/setup-node@v3 with: node-version: 16.x cache: yarn - name: Install dependencies run: yarn install --frozen-lockfile - name: Set-up RuboCop Problem Mathcher uses: r7kamura/rubocop-problem-matchers-action@v1 - name: Set-up Stylelint Problem Matcher uses: xt0rted/stylelint-problem-matcher@v1 # https://github.com/xt0rted/stylelint-problem-matcher/issues/360 - run: echo "::add-matcher::.github/stylelint-matcher.json" ################################ # Run Linter against code base # ################################ - name: Lint Code Base uses: github/super-linter@v4 env: CSS_FILE_NAME: stylelint.config.js DEFAULT_BRANCH: main NO_COLOR: 1 # https://github.com/xt0rted/stylelint-problem-matcher/issues/360 GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }} JAVASCRIPT_ES_CONFIG_FILE: .eslintrc.js LINTER_RULES_PATH: . RUBY_CONFIG_FILE: .rubocop.yml VALIDATE_ALL_CODEBASE: false VALIDATE_CSS: true VALIDATE_JAVASCRIPT_ES: true VALIDATE_RUBY: true
__label__pos
0.948667
8 Tenho as classes Versao, que uma versão geral, VersaoFirmware e VersaoSoftware. Na prática o usuário pode adicionar uma ou mais versões para um equipamento. Porém, no primeiro momento, ainda não se sabe qual o tipo de versão. Então vou adicionando as versões com new Versao(). Quando ele terminar de adicionar as versões, ele deve selecionar qual é o tipo das versões, VersaoFirmware ou VersaoSoftware. O que eu tentei: De cara, vi o esquema e pensei: "Trata-se claramente de um caso de herança. Tenho uma superclasse Versao que tem as propriedades comuns a todos os tipos de versão. E tenho as subclasses VersaoFirmware e VersaoSoftware que herdam da superclasse, pois elas têm tudo que a Versao tem, mais um ou outro método diferente.". class Versao { private int id; private String name; public Versao() {} public int getId() { return id; } public void setId(int id) { this.id = id; } public String getName() { return name; } public void setName(String name) { this.name = name; } } class VersaoFirmware extends Versao { private String outraCoisa; public VersaoFirmware() {} public String fazOutraCoisa() { return outraCoisa; } } class VersaoSoftware extends Versao { private String outraCoisa; public VersaoSoftware () {} public String fazOutraCoisa() { return outraCoisa; } } Porém, deparei-me com o seguinte problema: depois que o usuário selecionar o tipo da versão, como transformo a versão geral, para a versão específica? Devo criar novas instâncias de cada tipo e passar os atributos manualmente? Por exemplo: Versao versao = new Versao(); versao.setName("Versao"); VersaoSoftware versaoSoft = new VersaoSoftware(); versaoSoft.setName(versao.getName()); versaoSoft.setId(versao.getId()); // .... Mas e se Versao tiver 50 propriedades, vou ter que passar todas manualmente? E assim também me parece sem sentido o uso de herança. Complementando o título da pergunta, tentei inverter a hierarquia das classes, resolveu o problema, mas fica totalmente sem sentido deixar exposto métodos específicos para a versão geral. Li a respeito sobre Cópia de Construtor, que resumidamente cria uma subclasse a partir de uma superclasse. Mas da mesma maneira, teria que passar todos as propriedades manualmente. Como faço para modelar esse sistema? Há alguma outra estratégia para resolver este problema? 7 • Fiz uma pergunta parecido no SO: stackoverflow.com/questions/27134754/…. Apesar de eu aceitar a resposta, fiz essa pergunta aqui com mais detalhes, pra ver se é correta essa estratégia. – Franchesco 26/11/2014 às 18:01 • 1 Use um método reflexivo para copiar as propriedades. Uma das classes mais conhecidas é a BeanUtils.copyProperties – utluiz 26/11/2014 às 18:11 • Peça pro usuário informar antes o tipo da versão; então você saberá o tipo de objeto a instanciar antes de o usuário começar a entrar com os detalhes de cada versão. Se cada tipo de versão tem informações específicas, nem faz sentido o usuário informar o tipo das versões depois de informar as próprias versões. – Caffé 26/11/2014 às 20:25 • @Caffé Concordo com você. Mas sabe como é: "O chefe pediu". Aí nosso maior trabalho é tentar convencer o chefe que essa não é a melhor maneira. Caso não consiga, o programador que se vire. – Franchesco 27/11/2014 às 9:43 • 1 Relacionado: "É correto dar maior preferência a composição do que herança?" Eu diria que esse é um caso onde se justifica abrir mão da herança, ainda que a sintaxe da linguagem não ajude (se você quer um único objeto com todas as propriedades relevantes, alguma coisa você vai ter que fazer à mão). A propósito, você precisa mesmo criar o objeto da classe antes mesmo do usuário terminar de preencher os campos na tela? Não dá pra fazer isso no final? E o que acontece se o usuário escolher o tipo errado, ele vai ter que cancelar tudo e começar de novo? – mgibsonbr 4/12/2014 às 19:03 4 Respostas 4 11 +50 Bom, o conceito de herança é um pouco mal compreendido apesar de simples. Herança em O.O. não é apenas reutilizar código (diferente do que muitos costumam dizer), isso é apenas uma consequência. Herança deve ser aplicada quando uma classe claramente se tratar de uma extensão de outra classe. Na sua situação, você poderia não utilizar herança, pois pelo que percebo, se a ideia é apenas reutilizar atributos (e não comportamentos), você poderia optar pela composição: public class DadosVersao { private Tipo atributoA; private Tipo atributoB; } public class VersaoSoftware { private DadosVersao atributos = new DadosVersao(); } public class VersaoHardware { private DadosVersao atributos = new DadosVersao(); } Você poderia receber os atributos no construtor das classes. Mas se realmente quer utilizar herança, creio que faça sentido sua classe Versao ser abstrata, pois sozinha não faz sentido existir. public abstract class Versao { ... } Se quiser criar um esteriótipo para a versão, basta criar um método abstrato que obrigue as classes filhas a implementarem: public abstract class Versao { public abstract String getTipo(); } public class VersaoSoftware extends Versao { @Override public String getTipo() { return "software"; } } E, ainda, se for popular dados da classe filha com atributos da mãe, simples: public class VersaoSoftware extends Versao { public VersaoSoftware(Atributo atributoEspecificoSoftware, Atributo atributoVersao) { this.atributoEspecificoSoftware = atributoEspecificoSoftware; super.setAtributoVersao(atributoVersao); //pode usar um atributo protected diretamente ou, ainda, não precisa do super se for o setter publico ;P } @Override public String getTipo() { return "software"; } } Existem muitas opções para isso, mas o ideal é utilizar herança quando fazer sentido a especialização da classe no aspecto comportamental e não apenas no característico. 2 Acho que você já achou a solução. A melhor maneira, e uma prática bem conceituada de arquitetura, é a cópia de construtor. Algo como: Versao versao = new Versao(); versao.setName("Versao"); VersaoSoftware versaoSoft = new VersaoSoftware(versao); VersaoFirmware versaoFirm = new VersaoFirmware(versao); Na classe base, você faria um função que seria chamada pelas funções construtores: public Clone(Versao origem) { this.prop1 = origem.prop1; this.prop2 = origem.prop2; // etc... } Isso faz com que você possa alterar a classe base sem afetar os outros construtores, afinal eles iriam chamar sempre a mesma função não importa em que versão do software. Você poderia seguir essa mesma arquitetura para eventuais mudanças futuras nas suas classes filhas (ou filhas estendendo as filhas). Assim você não precisa se preocupar em setar as propriedades da classe mãe nas classes filhas, o que seria repetição perigosa de código se algum dia alguém estender a classe mãe e esquecer de olhar para todas as filhas. 2 • No meu caso acho que é isso mesmo. Mas fiquei pensando, "e se eu tivesse muuuitas propriedades? Teria que passar todas manualmente? Será que não existe uma solução melhor para isso?" Mas pelo jeito esse é a melhor maneira mesmo. – Franchesco 26/11/2014 às 18:06 • @Earendul acho que você tem razão na maioria das propriedades, mas nem todas elas são triviais. As vezes você precisa fazer alguma operação para setar cada uma delas, etc. Somente uma coisa que esqueci de falar e logo complemento minha resposta: a Clone deve ser chamada sempre como base.Clone(origem); em todos os construtores das classes filhas (talvez em um método Clone também). É importante que não hava um override da classe mãe inicial por uma classe mãe intermediária, deve ter uma sequência de chamados. – rodrigogq 26/11/2014 às 18:22 2 Problema Creio que você esteja pensando de maneira errada (você deveria escrever para nós o seu requisíto e não o que você já pensou). Vou tentar me focar na descrição do seu problema. Indo por partes, você disse que: • Tem um Equipamento • Na prática o usuário pode adicionar uma ou mais versões para um equipamento • Quando ele terminar de adicionar as versões, ele deve selecionar qual é o tipo das versões, VersaoFirmware ou VersaoSoftware (esta daqui ficou confusa, afinal um equipamento tem N versões ou equipamento tem 1 Versão?. Usei o pior cenário, sendo 1 equipamento para N versão, se necessário, você adapta depois) Veja seu diagrama: diagrama Sendo: • 1 Versão tem 1 TipoVersao (usei enum para simplificar, mas você pode trocar por uma entidade de mais alto nível) • 1 Versão tem N PropriedadesVersao Saída que eu imagino que você queira saida esperada Classes para teste public class Equipamento { public String nome; public List<Versao> versoes = new ArrayList<Versao>(); } public class Versao { public TipoVersao tipoVersao; public List<PropriedadeVersao> propriedadesVersao = new ArrayList<PropriedadeVersao>(); } public enum TipoVersao { HARDWARE, SOFTWARE } public class PropriedadeVersao { public String nome; public String valor; } Trecho de amostra com as classes Equipamento equipamento = new Equipamento(); equipamento.nome = "TV Samsung"; // VERSAO DE HARDWARE Versao versaoHardware = new Versao(); versaoHardware.tipoVersao = TipoVersao.HARDWARE; PropriedadeVersao propriedadeVersaoChipset = new PropriedadeVersao(); propriedadeVersaoChipset.nome = "Chipset"; propriedadeVersaoChipset.valor = "111.1"; versaoHardware.propriedadesVersao.add(propriedadeVersaoChipset); PropriedadeVersao propriedadeVersaoAquecimentoMaximo = new PropriedadeVersao(); propriedadeVersaoAquecimentoMaximo.nome = "Aquecimento Maximo"; propriedadeVersaoAquecimentoMaximo.valor = "20º"; versaoHardware.propriedadesVersao.add(propriedadeVersaoAquecimentoMaximo); equipamento.versoes.add(versaoHardware); // VERSAO DE SOFTWARE Versao versaoSoftware = new Versao(); versaoSoftware.tipoVersao = TipoVersao.SOFTWARE; PropriedadeVersao propriedadeVersaoFabricante = new PropriedadeVersao(); propriedadeVersaoFabricante.nome = "Fabricante"; propriedadeVersaoFabricante.valor = "Microsoft"; versaoSoftware.propriedadesVersao.add(propriedadeVersaoFabricante); equipamento.versoes.add(versaoSoftware); // IMPRIME DADOS System.out.println("Equipamento: " + equipamento.nome); for (Versao versao : equipamento.versoes) { System.out.println("- Versao: " + versao.tipoVersao.toString()); for (PropriedadeVersao propriedadeVersao : versao.propriedadesVersao) { System.out.println("-- " + propriedadeVersao.nome + " = " + propriedadeVersao.valor); } } 2 Utilize composição: // coisas comuns, ainda não definiu se firmware/software Versao versao = new Versao(1, "0.0.1"); // se firmware... VersaoFirmware firmware = new VersaoFirmware(versao, "Firmware"); // se software... VersaoSoftware software = new VersaoSoftware(versao, "software"); Tendo como superclasse: abstract class PossuiVersao { final Versao versao; PossuiVersao(Versao versao) { this.versao = versao; } // métodos delegam para Versao, // assim PossuiVersao comporta-se como Versao. public int getId() { return versao.getId(); } public String getName() { return versao.getName(); } } E as subclasses: class VersaoFirmware extends PossuiVersao { final String coisaFirmware; VersaoFirmware(Versao versao, String coisaFirmware) { super(versao); this.coisaFirmware = coisaFirmware; } void somenteFirmware() { // comportamento específico firmware } } class VersaoSoftware extends PossuiVersao { final String coisaSoftware; VersaoSoftware(Versao versao, String coisaSoftware) { super(versao); this.coisaSoftware = coisaSoftware; } void somenteSoftware() { // comportamento específico software } } Você deve fazer log-in para responder a esta pergunta. Esta não é a resposta que você está procurando? Pesquise outras perguntas com a tag .
__label__pos
0.597824
 element-ui试用手记_web前端_网页制作_码蚁之家 - 齐发国际登录 ASP源码.NET源码PHP源码JSP源码JAVA源码DELPHI源码PB源码VC源码VB源码Android源码 当前位置:首页 >> 网页制作 >> web前端 >> element-ui试用手记 齐发国际登录 来源:网络整理     时间:2018-10-31     关键词: 本篇文章主要介绍了" element-ui试用手记",主要涉及到方面的内容,对于web前端感齐发国际游戏的同学可以参考一下: element-ui、iviewui都以vue.js为基础,以前用过iviewui,感觉很好上手javascript代码套路基本是一样的,模板标签名称有所区别、... element-ui、iviewui都以vue.js为基础,以前用过iviewui,感觉很好上手javascript代码套路基本是一样的,模板标签名称有所区别、具体的设计理念也有点区别。   简单试了一下table及pagination组件的使用。 一、网页代码如下: <!DOCTYPE html> <html> <head> <meta charset="utf-8"> <meta http-equiv="X-UA-Compatible" c c href="http://www.codes51.com/article/detail_4595468.html/../res/lib/element-ui.v2.4.9/theme-chalk/index.css"> <style type="text/css"> .center{ text-align:center; } </style> </head> <body> <div> <h3></h3> <div> 时间:<el-date-picker v-model="form.payTime1" type="date" placeholder="起时时间"></el-date-picker>-<el-date-picker v-model="form.payTime2" type="date" placeholder="结束时间"></el-date-picker><br> <el-button icon="el-icon-search" @click="loadTableData" type="primary"></el-button> </div> <el-table :data="tableData.items" border stripe> <el-table-column type="index" width="50" label="序号"></el-table-column> <el-table-column label="时间"> <template slot-scope="scope"> {{ scope.row.payYear }}-{{ scope.row.payMonth }}-{{ scope.row.payDay }} </template> </el-table-column> <el-table-column prop="agentName" label="代理商名称" width="120"></el-table-column> <el-table-column label="总收入(元)"> <template slot-scope="scope">{{ scope.row.payMoney/100 }}</template> </el-table-column> </el-table> <el-pagination background layout="prev, pager, next" @current-change="gotoPage" :current-page="tableData.page" :page-size="tableData.limit" :total="tableData.totalCount" > </el-pagination> </div> <script type="text/javascript" src="http://www.codes51.com/article/detail_4595468.html/../res/lib/vue.js"></script> <script type="text/javascript" src="http://www.codes51.com/article/detail_4595468.html/../res/lib/vue-resource.js"></script> <!-- 引入组件库 --> <script src="http://www.codes51.com/article/detail_4595468.html/../res/lib/element-ui.v2.4.9/index.js"></script> <script type="text/javascript"> // Vue实例化 var doit = new Vue({ el:'#app', data: { tableData: [], statData:{}, form:{ limit:50, page:1, statType:"day", payTime1:'2018-10-01', payTime2:null } }, created: function(){ this.loadTableData(); }, methods: { loadTableData: function(){ var self = this; self.$http.post("json.js",self.form).then(function(res){ console.log(res); self.tableData = res.data.list; self.statData = res.data.stat; }); }, gotoPage: function(page){ this.form.page=page; this.loadTableData(); } } }); </script> </body> </html> 二、JSON数据如下: { "slider": [ 1 ], "hasPrePage": false, "startRow": 1, "offset": 0, "lastPage": true, "prePage": 1, "hasNextPage": false, "nextPage": 1, "endRow": 1, "totalCount": 1, "firstPage": true, "totalPages": 1, "limit": 10, "page": 1, "items": [ { "pileId": 1, "payYear": 2018, "payMonth": 10, "payDay": 19, "payMoney": 3, "payWeek": null, "chargeUserCount": 1, "chargeMinutes": 6, "chargeCount": 1, "pileBarcode": null, "pileName": "测试", "pilePlugs": 8, "isHighPower": null, "stationId": 1, "stationName": "1", "agentId": 3, "agentCode": null, "agentName": "8" } ] }   感觉element-ui易用性要好一些,表格输出一些自定义内容要方便一些,组件功能要强一些。其它没有仔细试,只是简单测试的感觉。   element-ui的HTML页面直接可用的源码不太好下载,我是下载了node.js,然后用npm下载的,从其中找出js及css文件,放在前端使用的。放在下面做为附件,如果需要,自行取用。 以上就介绍了 element-ui试用手记,包括了方面的内容,希望对web前端有齐发国际游戏的朋友有所帮助。 本文网址链接:http://www.machineofchina.com/article/detail_4595468.html 相关图片 相关文章
__label__pos
0.92175
Function node to check multiple light switch states I am not that familiar with the language for function nodes, I mainly use the other nodes to perform the functions I need without worrying about the specific syntax. What I am trying to get is a function node that gets triggered when a light switch is turned ON or OFF. I know that would be in the msg.payload information sent to the function node. What I want in the function node is it checks if the msg.payload is on or off and then it also checks multiple other light switches current state and depending on their states it changes other light switches states. Currently, I am doing with cascading state nodes checking each light switch in order. Is there a better way to do this in a function node or doesn't it really matter? You can give each switch a topic, then join them to create a object containing all switch states. You would then be returned an object every time a switch changed state. You can then use the oibject for comparisons etc. e.g. [{"id":"511279040ece5903","type":"inject","z":"da8a6ef0b3c9a5c8","name":"one 0","props":[{"p":"payload"},{"p":"topic","vt":"str"}],"repeat":"","crontab":"","once":false,"onceDelay":0.1,"topic":"one","payload":"0","payloadType":"num","x":150,"y":1100,"wires":[["6a0c16c833aee61c"]]},{"id":"6a0c16c833aee61c","type":"rbe","z":"da8a6ef0b3c9a5c8","name":"","func":"rbe","gap":"","start":"","inout":"out","septopics":true,"property":"payload","topi":"topic","x":330,"y":1200,"wires":[["54d60b9bef3ea2e5"]]},{"id":"686bd12b66c4befc","type":"inject","z":"da8a6ef0b3c9a5c8","name":"one 1","props":[{"p":"payload"},{"p":"topic","vt":"str"}],"repeat":"","crontab":"","once":false,"onceDelay":0.1,"topic":"one","payload":"1","payloadType":"num","x":150,"y":1140,"wires":[["6a0c16c833aee61c"]]},{"id":"c01a726c2759e556","type":"inject","z":"da8a6ef0b3c9a5c8","name":"two 0","props":[{"p":"payload"},{"p":"topic","vt":"str"}],"repeat":"","crontab":"","once":false,"onceDelay":0.1,"topic":"two","payload":"0","payloadType":"num","x":150,"y":1240,"wires":[["6a0c16c833aee61c"]]},{"id":"ac378acc7ed24a10","type":"inject","z":"da8a6ef0b3c9a5c8","name":"two 1","props":[{"p":"payload"},{"p":"topic","vt":"str"}],"repeat":"","crontab":"","once":false,"onceDelay":0.1,"topic":"two","payload":"1","payloadType":"num","x":150,"y":1280,"wires":[["6a0c16c833aee61c"]]},{"id":"54d60b9bef3ea2e5","type":"join","z":"da8a6ef0b3c9a5c8","name":"","mode":"custom","build":"object","property":"payload","propertyType":"msg","key":"topic","joiner":"\\n","joinerType":"str","accumulate":true,"timeout":"","count":"2","reduceRight":false,"reduceExp":"","reduceInit":"","reduceInitType":"","reduceFixup":"","x":470,"y":1200,"wires":[["217e27fd051a937f"]]},{"id":"217e27fd051a937f","type":"debug","z":"da8a6ef0b3c9a5c8","name":"debug 118","active":true,"tosidebar":true,"console":false,"tostatus":false,"complete":"false","statusVal":"","statusType":"auto","x":470,"y":1320,"wires":[]}] Just up the count in the join node when you add a switch. This topic was automatically closed 60 days after the last reply. New replies are no longer allowed.
__label__pos
0.628021
Bug 1435360 - Baldr: remove wasm async interrupt support (r=jandem) ☠☠ backed out by 55c87e7ea09d ☠ ☠ authorLuke Wagner <[email protected]> Fri, 09 Mar 2018 13:04:15 -0600 changeset 765589 a463d224c412529aa8d7b02103506f9a714a6dd9 parent 765588 6405d9287056dc18fd0002fc6e404ad4031f502f child 765590 8cdf945be534dacae33245106e6718055a80bd7f push id102114 push userbmo:[email protected] push dateFri, 09 Mar 2018 22:13:16 +0000 reviewersjandem bugs1435360 milestone60.0a1 Bug 1435360 - Baldr: remove wasm async interrupt support (r=jandem) js/src/jit/AsyncInterrupt.cpp js/src/jit/AsyncInterrupt.h js/src/jit/Ion.cpp js/src/jit/JitOptions.cpp js/src/jit/JitOptions.h js/src/jit/Lowering.cpp js/src/jit/arm/Simulator-arm.cpp js/src/jit/arm/Simulator-arm.h js/src/jit/arm64/vixl/MozSimulator-vixl.cpp js/src/jit/arm64/vixl/Simulator-vixl.h js/src/jit/mips32/Simulator-mips32.cpp js/src/jit/mips32/Simulator-mips32.h js/src/jit/mips64/Simulator-mips64.cpp js/src/jit/mips64/Simulator-mips64.h js/src/jsapi.cpp js/src/moz.build js/src/vm/JSCompartment.cpp js/src/vm/JSContext.cpp js/src/vm/Runtime.cpp js/src/vm/Runtime.h js/src/vm/Stack.cpp js/src/vm/Stack.h js/src/wasm/WasmBaselineCompile.cpp js/src/wasm/WasmBuiltins.cpp js/src/wasm/WasmCode.cpp js/src/wasm/WasmCode.h js/src/wasm/WasmFrameIter.cpp js/src/wasm/WasmFrameIter.h js/src/wasm/WasmGenerator.cpp js/src/wasm/WasmIonCompile.cpp js/src/wasm/WasmModule.h js/src/wasm/WasmProcess.cpp js/src/wasm/WasmProcess.h js/src/wasm/WasmSignalHandlers.cpp js/src/wasm/WasmSignalHandlers.h js/src/wasm/WasmStubs.cpp js/src/wasm/WasmTypes.cpp js/src/wasm/WasmTypes.h new file mode 100644 --- /dev/null +++ b/js/src/jit/AsyncInterrupt.cpp @@ -0,0 +1,186 @@ +/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 4 -*- + * vim: set ts=8 sts=4 et sw=4 tw=99: + * This Source Code Form is subject to the terms of the Mozilla Public + * License, v. 2.0. If a copy of the MPL was not distributed with this + * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ + +#include "jit/AsyncInterrupt.h" + +#include "jit/JitCompartment.h" +#include "util/Windows.h" + +#if defined(ANDROID) +# include <sys/system_properties.h> +#endif + +using namespace js; +using namespace js::jit; + +using mozilla::PodArrayZero; + +static void +RedirectIonBackedgesToInterruptCheck(JSContext* cx) +{ + // Jitcode may only be modified on the runtime's active thread. + if (cx != cx->runtime()->activeContext()) + return; + + // The faulting thread is suspended so we can access cx fields that can + // normally only be accessed by the cx's active thread. + AutoNoteSingleThreadedRegion anstr; + + Zone* zone = cx->zoneRaw(); + if (zone && !zone->isAtomsZone()) { + jit::JitRuntime* jitRuntime = cx->runtime()->jitRuntime(); + if (!jitRuntime) + return; + + // If the backedge list is being mutated, the pc must be in C++ code and + // thus not in a JIT iloop. We assume that the interrupt flag will be + // checked at least once before entering JIT code (if not, no big deal; + // the browser will just request another interrupt in a second). + if (!jitRuntime->preventBackedgePatching()) { + jit::JitZoneGroup* jzg = zone->group()->jitZoneGroup; + jzg->patchIonBackedges(cx, jit::JitZoneGroup::BackedgeInterruptCheck); + } + } +} + +#if !defined(XP_WIN) +// For the interrupt signal, pick a signal number that: +// - is not otherwise used by mozilla or standard libraries +// - defaults to nostop and noprint on gdb/lldb so that noone is bothered +// SIGVTALRM a relative of SIGALRM, so intended for user code, but, unlike +// SIGALRM, not used anywhere else in Mozilla. +static const int sJitAsyncInterruptSignal = SIGVTALRM; + +static void +JitAsyncInterruptHandler(int signum, siginfo_t*, void*) +{ + MOZ_RELEASE_ASSERT(signum == sJitAsyncInterruptSignal); + + JSContext* cx = TlsContext.get(); + if (!cx) + return; + +#if defined(JS_SIMULATOR_ARM) || defined(JS_SIMULATOR_MIPS32) || defined(JS_SIMULATOR_MIPS64) + SimulatorProcess::ICacheCheckingDisableCount++; +#endif + + RedirectIonBackedgesToInterruptCheck(cx); + +#if defined(JS_SIMULATOR_ARM) || defined(JS_SIMULATOR_MIPS32) || defined(JS_SIMULATOR_MIPS64) + SimulatorProcess::cacheInvalidatedBySignalHandler_ = true; + SimulatorProcess::ICacheCheckingDisableCount--; +#endif + + cx->finishHandlingJitInterrupt(); +} +#endif + +static bool sTriedInstallAsyncInterrupt = false; +static bool sHaveAsyncInterrupt = false; + +bool +jit::EnsureAsyncInterrupt(JSContext* cx) +{ + // We assume that there are no races creating the first JSRuntime of the process. + if (sTriedInstallAsyncInterrupt) + return sHaveAsyncInterrupt; + sTriedInstallAsyncInterrupt = true; + +#if defined(ANDROID) && !defined(__aarch64__) + // Before Android 4.4 (SDK version 19), there is a bug + // https://android-review.googlesource.com/#/c/52333 + // in Bionic's pthread_join which causes pthread_join to return early when + // pthread_kill is used (on any thread). Nobody expects the pthread_cond_wait + // EINTRquisition. + char version_string[PROP_VALUE_MAX]; + PodArrayZero(version_string); + if (__system_property_get("ro.build.version.sdk", version_string) > 0) { + if (atol(version_string) < 19) + return false; + } +#endif + +#if defined(XP_WIN) + // Windows uses SuspendThread to stop the active thread from another thread. +#else + struct sigaction interruptHandler; + interruptHandler.sa_flags = SA_SIGINFO; + interruptHandler.sa_sigaction = &JitAsyncInterruptHandler; + sigemptyset(&interruptHandler.sa_mask); + struct sigaction prev; + if (sigaction(sJitAsyncInterruptSignal, &interruptHandler, &prev)) + MOZ_CRASH("unable to install interrupt handler"); + + // There shouldn't be any other handlers installed for + // sJitAsyncInterruptSignal. If there are, we could always forward, but we + // need to understand what we're doing to avoid problematic interference. + if ((prev.sa_flags & SA_SIGINFO && prev.sa_sigaction) || + (prev.sa_handler != SIG_DFL && prev.sa_handler != SIG_IGN)) + { + MOZ_CRASH("contention for interrupt signal"); + } +#endif // defined(XP_WIN) + + sHaveAsyncInterrupt = true; + return true; +} + +bool +jit::HaveAsyncInterrupt() +{ + MOZ_ASSERT(sTriedInstallAsyncInterrupt); + return sHaveAsyncInterrupt; +} + +// JSRuntime::requestInterrupt sets interrupt_ (which is checked frequently by +// C++ code at every Baseline JIT loop backedge) and jitStackLimit_ (which is +// checked at every Baseline and Ion JIT function prologue). The remaining +// sources of potential iloops (Ion loop backedges) are handled by this +// function: Ion loop backedges are patched to instead point to a stub that +// handles the interrupt; +void +jit::InterruptRunningCode(JSContext* cx) +{ + // If signal handlers weren't installed, then Ion emit normal interrupt + // checks and don't need asynchronous interruption. + MOZ_ASSERT(sTriedInstallAsyncInterrupt); + if (!sHaveAsyncInterrupt) + return; + + // Do nothing if we're already handling an interrupt here, to avoid races + // below and in JitRuntime::patchIonBackedges. + if (!cx->startHandlingJitInterrupt()) + return; + + // If we are on context's thread, then we can patch Ion backedges without + // any special synchronization. + if (cx == TlsContext.get()) { + RedirectIonBackedgesToInterruptCheck(cx); + cx->finishHandlingJitInterrupt(); + return; + } + + // We are not on the runtime's active thread, so we need to halt the + // runtime's active thread first. +#if defined(XP_WIN) + // On Windows, we can simply suspend the active thread. SuspendThread can + // sporadically fail if the thread is in the middle of a syscall. Rather + // than retrying in a loop, just wait for the next request for interrupt. + HANDLE thread = (HANDLE)cx->threadNative(); + if (SuspendThread(thread) != (DWORD)-1) { + RedirectIonBackedgesToInterruptCheck(cx); + ResumeThread(thread); + } + cx->finishHandlingJitInterrupt(); +#else + // On Unix, we instead deliver an async signal to the active thread which + // halts the thread and callers our JitAsyncInterruptHandler (which has + // already been installed by EnsureSignalHandlersInstalled). + pthread_t thread = (pthread_t)cx->threadNative(); + pthread_kill(thread, sJitAsyncInterruptSignal); +#endif +} + new file mode 100644 --- /dev/null +++ b/js/src/jit/AsyncInterrupt.h @@ -0,0 +1,32 @@ +/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 4 -*- + * vim: set ts=8 sts=4 et sw=4 tw=99: + * This Source Code Form is subject to the terms of the Mozilla Public + * License, v. 2.0. If a copy of the MPL was not distributed with this + * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ + +#ifndef jit_AsyncInterrupt_h +#define jit_AsyncInterrupt_h + +#include "NamespaceImports.h" + +namespace js { +namespace jit { + +// Ensure the given JSRuntime is set up to use async interrupts. Failure to +// enable signal handlers indicates some catastrophic failure and creation of +// the runtime must fail. +MOZ_MUST_USE bool +EnsureAsyncInterrupt(JSContext* cx); + +// Return whether the async interrupt can be used to interrupt Ion code. +bool +HaveAsyncInterrupt(); + +// Force any currently-executing JIT code to call HandleExecutionInterrupt. +extern void +InterruptRunningCode(JSContext* cx); + +} // namespace jit +} // namespace js + +#endif // jit_AsyncInterrupt_h --- a/js/src/jit/Ion.cpp +++ b/js/src/jit/Ion.cpp @@ -387,17 +387,17 @@ void JitZoneGroup::patchIonBackedges(JSContext* cx, BackedgeTarget target) { if (target == BackedgeLoopHeader) { // We must be on the active thread. The caller must use // AutoPreventBackedgePatching to ensure we don't reenter. MOZ_ASSERT(cx->runtime()->jitRuntime()->preventBackedgePatching()); MOZ_ASSERT(CurrentThreadCanAccessRuntime(cx->runtime())); } else { - // We must be called from InterruptRunningJitCode, or a signal handler + // We must be called from jit::InterruptRunningCode, or a signal handler // triggered there. rt->handlingJitInterrupt() ensures we can't reenter // this code. MOZ_ASSERT(!cx->runtime()->jitRuntime()->preventBackedgePatching()); MOZ_ASSERT(cx->handlingJitInterrupt()); } // Do nothing if we know all backedges are already jumping to `target`. if (backedgeTarget_ == target) --- a/js/src/jit/JitOptions.cpp +++ b/js/src/jit/JitOptions.cpp @@ -182,20 +182,16 @@ DefaultJitOptions::DefaultJitOptions() // The bytecode length limit for small function. SET_DEFAULT(smallFunctionMaxBytecodeLength_, 130); // An artificial testing limit for the maximum supported offset of // pc-relative jump and call instructions. SET_DEFAULT(jumpThreshold, UINT32_MAX); - // Whether the (ARM) simulators should always interrupt before executing any - // instruction. - SET_DEFAULT(simulatorAlwaysInterrupt, false); - // Branch pruning heuristic is based on a scoring system, which is look at // different metrics and provide a score. The score is computed as a // projection where each factor defines the weight of each metric. Then this // score is compared against a threshold to prevent a branch from being // removed. SET_DEFAULT(branchPruningHitCountFactor, 1); SET_DEFAULT(branchPruningInstFactor, 10); SET_DEFAULT(branchPruningBlockSpanFactor, 100); --- a/js/src/jit/JitOptions.h +++ b/js/src/jit/JitOptions.h @@ -71,17 +71,16 @@ struct DefaultJitOptions bool forceInlineCaches; bool fullDebugChecks; bool limitScriptSize; bool osr; bool asmJSAtomicsEnable; bool wasmFoldOffsets; bool wasmDelayTier2; bool ionInterruptWithoutSignals; - bool simulatorAlwaysInterrupt; uint32_t baselineWarmUpThreshold; uint32_t exceptionBailoutThreshold; uint32_t frequentBailoutThreshold; uint32_t maxStackArgs; uint32_t osrPcMismatchesBeforeRecompile; uint32_t smallFunctionMaxBytecodeLength_; uint32_t jumpThreshold; uint32_t branchPruningHitCountFactor; --- a/js/src/jit/Lowering.cpp +++ b/js/src/jit/Lowering.cpp @@ -4,21 +4,21 @@ * License, v. 2.0. If a copy of the MPL was not distributed with this * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ #include "jit/Lowering.h" #include "mozilla/DebugOnly.h" #include "mozilla/EndianUtils.h" +#include "jit/AsyncInterrupt.h" #include "jit/JitSpewer.h" #include "jit/LIR.h" #include "jit/MIR.h" #include "jit/MIRGraph.h" -#include "wasm/WasmSignalHandlers.h" #include "jit/shared/Lowering-shared-inl.h" #include "vm/BytecodeUtil-inl.h" #include "vm/JSObject-inl.h" using namespace js; using namespace jit; @@ -88,18 +88,18 @@ void LIRGenerator::visitIsConstructing(MIsConstructing* ins) { define(new(alloc()) LIsConstructing(), ins); } static void TryToUseImplicitInterruptCheck(MIRGraph& graph, MBasicBlock* backedge) { - // Implicit interrupt checks require wasm signal handlers to be installed. - if (!wasm::HaveSignalHandlers() || JitOptions.ionInterruptWithoutSignals) + // Implicit interrupt checks require JIT async interrupt support. + if (!jit::HaveAsyncInterrupt() || JitOptions.ionInterruptWithoutSignals) return; // To avoid triggering expensive interrupts (backedge patching) in // requestMajorGC and requestMinorGC, use an implicit interrupt check only // if the loop body can not trigger GC or affect GC state like the store // buffer. We do this by checking there are no safepoints attached to LIR // instructions inside the loop. --- a/js/src/jit/arm/Simulator-arm.cpp +++ b/js/src/jit/arm/Simulator-arm.cpp @@ -1155,17 +1155,16 @@ Simulator::Simulator(JSContext* cx) // Note, allocation and anything that depends on allocated memory is // deferred until init(), in order to handle OOM properly. stack_ = nullptr; stackLimit_ = 0; pc_modified_ = false; icount_ = 0L; - wasm_interrupt_ = false; break_pc_ = nullptr; break_instr_ = 0; single_stepping_ = false; single_step_callback_ = nullptr; single_step_callback_arg_ = nullptr; skipCalleeSavedRegsCheck = false; // Set up architecture state. @@ -1589,39 +1588,16 @@ Simulator::registerState() wasm::RegisterState state; state.pc = (void*) get_pc(); state.fp = (void*) get_register(fp); state.sp = (void*) get_register(sp); state.lr = (void*) get_register(lr); return state; } -// The signal handler only redirects the PC to the interrupt stub when the PC is -// in function code. However, this guard is racy for the ARM simulator since the -// signal handler samples PC in the middle of simulating an instruction and thus -// the current PC may have advanced once since the signal handler's guard. So we -// re-check here. -void -Simulator::handleWasmInterrupt() -{ - if (!wasm::CodeExists) - return; - - uint8_t* pc = (uint8_t*)get_pc(); - - const wasm::ModuleSegment* ms = nullptr; - if (!wasm::InInterruptibleCode(cx_, pc, &ms)) - return; - - if (!cx_->activation()->asJit()->startWasmInterrupt(registerState())) - return; - - set_pc(int32_t(ms->interruptCode())); -} - static inline JitActivation* GetJitActivation(JSContext* cx) { if (!wasm::CodeExists) return nullptr; if (!cx->activation() || !cx->activation()->isJit()) return nullptr; return cx->activation()->asJit(); @@ -1654,17 +1630,17 @@ Simulator::handleWasmSegFault(int32_t ad MOZ_RELEASE_ASSERT(&instance->code() == &moduleSegment->code()); if (!instance->memoryAccessInGuardRegion((uint8_t*)addr, numBytes)) return false; const wasm::MemoryAccess* memoryAccess = instance->code().lookupMemoryAccess(pc); if (!memoryAccess) { - MOZ_ALWAYS_TRUE(act->asJit()->startWasmInterrupt(registerState())); + act->asJit()->startWasmTrap(wasm::Trap::OutOfBounds, 0, registerState()); if (!instance->code().containsCodePC(pc)) MOZ_CRASH("Cannot map PC to trap handler"); set_pc(int32_t(moduleSegment->outOfBoundsCode())); return true; } MOZ_ASSERT(memoryAccess->hasTrapOutOfLineCode()); set_pc(int32_t(memoryAccess->trapOutOfLineCode(moduleSegment->base()))); @@ -4920,29 +4896,16 @@ Simulator::disable_single_stepping() if (!single_stepping_) return; single_step_callback_(single_step_callback_arg_, this, (void*)get_pc()); single_stepping_ = false; single_step_callback_ = nullptr; single_step_callback_arg_ = nullptr; } -static void -FakeInterruptHandler() -{ - JSContext* cx = TlsContext.get(); - uint8_t* pc = cx->simulator()->get_pc_as<uint8_t*>(); - - const wasm::ModuleSegment* ms= nullptr; - if (!wasm::InInterruptibleCode(cx, pc, &ms)) - return; - - cx->simulator()->trigger_wasm_interrupt(); -} - template<bool EnableStopSimAt> void Simulator::execute() { if (single_stepping_) single_step_callback_(single_step_callback_arg_, this, nullptr); // Get the PC to simulate. Cannot use the accessor here as we need the raw @@ -4952,26 +4915,19 @@ Simulator::execute() while (program_counter != end_sim_pc) { if (EnableStopSimAt && (icount_ == Simulator::StopSimAt)) { fprintf(stderr, "\nStopped simulation at icount %lld\n", icount_); ArmDebugger dbg(this); dbg.debug(); } else { if (single_stepping_) single_step_callback_(single_step_callback_arg_, this, (void*)program_counter); - if (MOZ_UNLIKELY(JitOptions.simulatorAlwaysInterrupt)) - FakeInterruptHandler(); SimInstruction* instr = reinterpret_cast<SimInstruction*>(program_counter); instructionDecode(instr); icount_++; - - if (MOZ_UNLIKELY(wasm_interrupt_)) { - handleWasmInterrupt(); - wasm_interrupt_ = false; - } } program_counter = get_pc(); } if (single_stepping_) single_step_callback_(single_step_callback_arg_, this, nullptr); } --- a/js/src/jit/arm/Simulator-arm.h +++ b/js/src/jit/arm/Simulator-arm.h @@ -192,23 +192,16 @@ class Simulator // Special case of set_register and get_register to access the raw PC value. void set_pc(int32_t value); int32_t get_pc() const; template <typename T> T get_pc_as() const { return reinterpret_cast<T>(get_pc()); } - void trigger_wasm_interrupt() { - // This can be called several times if a single interrupt isn't caught - // and handled by the simulator, but this is fine; once the current - // instruction is done executing, the interrupt will be handled anyhow. - wasm_interrupt_ = true; - } - void enable_single_stepping(SingleStepCallback cb, void* arg); void disable_single_stepping(); uintptr_t stackLimit() const; bool overRecursed(uintptr_t newsp = 0) const; bool overRecursedWithExtra(uint32_t extra) const; // Executes ARM instructions until the PC reaches end_sim_pc. @@ -288,17 +281,16 @@ class Simulator inline bool isWatchedStop(uint32_t bkpt_code); inline bool isEnabledStop(uint32_t bkpt_code); inline void enableStop(uint32_t bkpt_code); inline void disableStop(uint32_t bkpt_code); inline void increaseStopCounter(uint32_t bkpt_code); void printStopInfo(uint32_t code); // Handle a wasm interrupt triggered by an async signal handler. - void handleWasmInterrupt(); JS::ProfilingFrameIterator::RegisterState registerState(); // Handle any wasm faults, returning true if the fault was handled. bool handleWasmSegFault(int32_t addr, unsigned numBytes); bool handleWasmIllFault(); // Read and write memory. inline uint8_t readBU(int32_t addr); @@ -421,19 +413,16 @@ class Simulator bool inexact_vfp_flag_; // Simulator support. char* stack_; uintptr_t stackLimit_; bool pc_modified_; int64_t icount_; - // wasm async interrupt / fault support - bool wasm_interrupt_; - // Debugger input. char* lastDebuggerInput_; // Registered breakpoints. SimInstruction* break_pc_; Instr break_instr_; // Single-stepping support --- a/js/src/jit/arm64/vixl/MozSimulator-vixl.cpp +++ b/js/src/jit/arm64/vixl/MozSimulator-vixl.cpp @@ -81,17 +81,16 @@ Simulator::~Simulator() { void Simulator::ResetState() { // Reset the system registers. nzcv_ = SimSystemRegister::DefaultValueFor(NZCV); fpcr_ = SimSystemRegister::DefaultValueFor(FPCR); // Reset registers to 0. pc_ = nullptr; pc_modified_ = false; - wasm_interrupt_ = false; for (unsigned i = 0; i < kNumberOfRegisters; i++) { set_xreg(i, 0xbadbeef); } // Set FP registers to a value that is a NaN in both 32-bit and 64-bit FP. uint64_t nan_bits = UINT64_C(0x7ff0dead7f8beef1); VIXL_ASSERT(IsSignallingNaN(rawbits_to_double(nan_bits & kDRegMask))); VIXL_ASSERT(IsSignallingNaN(rawbits_to_float(nan_bits & kSRegMask))); for (unsigned i = 0; i < kNumberOfFPRegisters; i++) { @@ -190,25 +189,16 @@ void Simulator::Destroy(Simulator* sim) } void Simulator::ExecuteInstruction() { // The program counter should always be aligned. VIXL_ASSERT(IsWordAligned(pc_)); decoder_->Decode(pc_); increment_pc(); - - if (MOZ_UNLIKELY(wasm_interrupt_)) { - handle_wasm_interrupt(); - // Just calling set_pc turns the pc_modified_ flag on, which means it doesn't - // auto-step after executing the next instruction. Force that to off so it - // will auto-step after executing the first instruction of the handler. - pc_modified_ = false; - wasm_interrupt_ = false; - } } uintptr_t Simulator::stackLimit() const { return reinterpret_cast<uintptr_t>(stack_limit_); } @@ -225,22 +215,16 @@ bool Simulator::overRecursed(uintptr_t n bool Simulator::overRecursedWithExtra(uint32_t extra) const { uintptr_t newsp = get_sp() - extra; return newsp <= stackLimit(); } -void Simulator::trigger_wasm_interrupt() { - MOZ_ASSERT(!wasm_interrupt_); - wasm_interrupt_ = true; -} - - static inline JitActivation* GetJitActivation(JSContext* cx) { if (!js::wasm::CodeExists) return nullptr; if (!cx->activation() || !cx->activation()->isJit()) return nullptr; return cx->activation()->asJit(); @@ -252,42 +236,16 @@ Simulator::registerState() JS::ProfilingFrameIterator::RegisterState state; state.pc = (uint8_t*) get_pc(); state.fp = (uint8_t*) get_fp(); state.lr = (uint8_t*) get_lr(); state.sp = (uint8_t*) get_sp(); return state; } -// The signal handler only redirects the PC to the interrupt stub when the PC is -// in function code. However, this guard is racy for the ARM simulator since the -// signal handler samples PC in the middle of simulating an instruction and thus -// the current PC may have advanced once since the signal handler's guard. So we -// re-check here. -void Simulator::handle_wasm_interrupt() -{ - if (!js::wasm::CodeExists) - return; - - uint8_t* pc = (uint8_t*)get_pc(); - - const js::wasm::ModuleSegment* ms = nullptr; - if (!js::wasm::InInterruptibleCode(cx_, pc, &ms)) - return; - - JitActivation* act = GetJitActivation(cx_); - if (!act) - return; - - if (!act->startWasmInterrupt(registerState())) - return; - - set_pc((Instruction*)ms->interruptCode()); -} - bool Simulator::handle_wasm_seg_fault(uintptr_t addr, unsigned numBytes) { JitActivation* act = GetJitActivation(cx_); if (!act) return false; uint8_t* pc = (uint8_t*)get_pc(); @@ -304,18 +262,17 @@ Simulator::handle_wasm_seg_fault(uintptr MOZ_RELEASE_ASSERT(&instance->code() == &moduleSegment->code()); if (!instance->memoryAccessInGuardRegion((uint8_t*)addr, numBytes)) return false; const js::wasm::MemoryAccess* memoryAccess = instance->code().lookupMemoryAccess(pc); if (!memoryAccess) { - if (!act->startWasmInterrupt(registerState())) - MOZ_CRASH("Cannot start interrupt"); + act->startWasmTrap(wasm::Trap::OutOfBounds, 0, registerState()); if (!instance->code().containsCodePC(pc)) MOZ_CRASH("Cannot map PC to trap handler"); set_pc((Instruction*)moduleSegment->outOfBoundsCode()); return true; } MOZ_ASSERT(memoryAccess->hasTrapOutOfLineCode()); set_pc((Instruction*)memoryAccess->trapOutOfLineCode(moduleSegment->base())); --- a/js/src/jit/arm64/vixl/Simulator-vixl.h +++ b/js/src/jit/arm64/vixl/Simulator-vixl.h @@ -741,18 +741,16 @@ class Simulator : public DecoderVisitor template <typename T> T get_pc_as() const { return reinterpret_cast<T>(const_cast<Instruction*>(pc())); } void set_pc(const Instruction* new_pc) { pc_ = Memory::AddressUntag(new_pc); pc_modified_ = true; } - void trigger_wasm_interrupt(); - void handle_wasm_interrupt(); bool handle_wasm_ill_fault(); bool handle_wasm_seg_fault(uintptr_t addr, unsigned numBytes); void increment_pc() { if (!pc_modified_) { pc_ = pc_->NextInstruction(); } @@ -2578,17 +2576,16 @@ class Simulator : public DecoderVisitor static const int stack_size_ = (2 * MBytes) + (2 * stack_protection_size_); byte* stack_limit_; Decoder* decoder_; // Indicates if the pc has been modified by the instruction and should not be // automatically incremented. bool pc_modified_; const Instruction* pc_; - bool wasm_interrupt_; static const char* xreg_names[]; static const char* wreg_names[]; static const char* sreg_names[]; static const char* dreg_names[]; static const char* vreg_names[]; static const Instruction* kEndOfSimAddress; --- a/js/src/jit/mips32/Simulator-mips32.cpp +++ b/js/src/jit/mips32/Simulator-mips32.cpp @@ -1264,17 +1264,16 @@ Simulator::Simulator() // Note, allocation and anything that depends on allocated memory is // deferred until init(), in order to handle OOM properly. stack_ = nullptr; stackLimit_ = 0; pc_modified_ = false; icount_ = 0; break_count_ = 0; - wasm_interrupt_ = false; break_pc_ = nullptr; break_instr_ = 0; // Set up architecture state. // All registers are initialized to zero to start with. for (int i = 0; i < Register::kNumSimuRegisters; i++) { registers_[i] = 0; } @@ -1637,42 +1636,16 @@ Simulator::registerState() wasm::RegisterState state; state.pc = (void*) get_pc(); state.fp = (void*) getRegister(fp); state.sp = (void*) getRegister(sp); state.lr = (void*) getRegister(ra); return state; } -// The signal handler only redirects the PC to the interrupt stub when the PC is -// in function code. However, this guard is racy for the simulator since the -// signal handler samples PC in the middle of simulating an instruction and thus -// the current PC may have advanced once since the signal handler's guard. So we -// re-check here. -void -Simulator::handleWasmInterrupt() -{ - if (!wasm::CodeExists) - return; - - void* pc = (void*)get_pc(); - void* fp = (void*)getRegister(Register::fp); - - JitActivation* activation = TlsContext.get()->activation()->asJit(); - const wasm::CodeSegment* segment = wasm::LookupCodeSegment(pc); - if (!segment || !segment->isModule() || !segment->containsCodePC(pc)) - return; - - if (!activation->startWasmInterrupt(registerState())) - return; - - set_pc(int32_t(segment->asModule()->interruptCode())); -} - - // WebAssembly memories contain an extra region of guard pages (see // WasmArrayRawBuffer comment). The guard pages catch out-of-bounds accesses // using a signal handler that redirects PC to a stub that safely reports an // error. However, if the handler is hit by the simulator, the PC is in C++ code // and cannot be redirected. Therefore, we must avoid hitting the handler by // redirecting in the simulator before the real handler would have been hit. bool Simulator::handleWasmFault(int32_t addr, unsigned numBytes) @@ -1701,17 +1674,17 @@ Simulator::handleWasmFault(int32_t addr, if (!instance->memoryAccessInGuardRegion((uint8_t*)addr, numBytes)) return false; LLBit_ = false; const wasm::MemoryAccess* memoryAccess = instance->code().lookupMemoryAccess(pc); if (!memoryAccess) { - MOZ_ALWAYS_TRUE(act->startWasmInterrupt(registerState())); + act->startWasmTrap(wasm::Trap::OutOfBounds, 0, registerState()); if (!instance->code().containsCodePC(pc)) MOZ_CRASH("Cannot map PC to trap handler"); set_pc(int32_t(moduleSegment->outOfBoundsCode())); return true; } MOZ_ASSERT(memoryAccess->hasTrapOutOfLineCode()); set_pc(int32_t(memoryAccess->trapOutOfLineCode(moduleSegment->base()))); @@ -3668,52 +3641,32 @@ Simulator::branchDelayInstructionDecode( } if (instr->isForbiddenInBranchDelay()) { MOZ_CRASH("Eror:Unexpected opcode in a branch delay slot."); } instructionDecode(instr); } -static void -FakeInterruptHandler() -{ - JSContext* cx = TlsContext.get(); - uint8_t* pc = cx->simulator()->get_pc_as<uint8_t*>(); - - const wasm::ModuleSegment* ms = nullptr; - if (!wasm::InInterruptibleCode(cx, pc, &ms)) - return; - - cx->simulator()->trigger_wasm_interrupt(); -} - template<bool enableStopSimAt> void Simulator::execute() { // Get the PC to simulate. Cannot use the accessor here as we need the // raw PC value and not the one used as input to arithmetic instructions. int program_counter = get_pc(); while (program_counter != end_sim_pc) { if (enableStopSimAt && (icount_ == Simulator::StopSimAt)) { MipsDebugger dbg(this); dbg.debug(); } else { - if (MOZ_UNLIKELY(JitOptions.simulatorAlwaysInterrupt)) - FakeInterruptHandler(); SimInstruction* instr = reinterpret_cast<SimInstruction*>(program_counter); instructionDecode(instr); icount_++; - - if (MOZ_UNLIKELY(wasm_interrupt_)) { - handleWasmInterrupt(); - wasm_interrupt_ = false; - } } program_counter = get_pc(); } } void Simulator::callInternal(uint8_t* entry) { --- a/js/src/jit/mips32/Simulator-mips32.h +++ b/js/src/jit/mips32/Simulator-mips32.h @@ -197,23 +197,16 @@ class Simulator { // Special case of set_register and get_register to access the raw PC value. void set_pc(int32_t value); int32_t get_pc() const; template <typename T> T get_pc_as() const { return reinterpret_cast<T>(get_pc()); } - void trigger_wasm_interrupt() { - // This can be called several times if a single interrupt isn't caught - // and handled by the simulator, but this is fine; once the current - // instruction is done executing, the interrupt will be handled anyhow. - wasm_interrupt_ = true; - } - // Accessor to the internal simulator stack area. uintptr_t stackLimit() const; bool overRecursed(uintptr_t newsp = 0) const; bool overRecursedWithExtra(uint32_t extra) const; // Executes MIPS instructions until the PC reaches end_sim_pc. template<bool enableStopSimAt> void execute(); @@ -299,18 +292,16 @@ class Simulator { void handleStop(uint32_t code, SimInstruction* instr); bool isStopInstruction(SimInstruction* instr); bool isEnabledStop(uint32_t code); void enableStop(uint32_t code); void disableStop(uint32_t code); void increaseStopCounter(uint32_t code); void printStopInfo(uint32_t code); - // Handle a wasm interrupt triggered by an async signal handler. - void handleWasmInterrupt(); JS::ProfilingFrameIterator::RegisterState registerState(); // Handle any wasm faults, returning true if the fault was handled. bool handleWasmFault(int32_t addr, unsigned numBytes); bool handleWasmTrapFault(); // Executes one instruction. void instructionDecode(SimInstruction* instr); @@ -360,19 +351,16 @@ class Simulator { // Simulator support. char* stack_; uintptr_t stackLimit_; bool pc_modified_; int icount_; int break_count_; - // wasm async interrupt / fault support - bool wasm_interrupt_; - // Debugger input. char* lastDebuggerInput_; // Registered breakpoints. SimInstruction* break_pc_; Instr break_instr_; // A stop is watched if its code is less than kNumOfWatchedStops. --- a/js/src/jit/mips64/Simulator-mips64.cpp +++ b/js/src/jit/mips64/Simulator-mips64.cpp @@ -1273,17 +1273,16 @@ Simulator::Simulator() // Note, allocation and anything that depends on allocated memory is // deferred until init(), in order to handle OOM properly. stack_ = nullptr; stackLimit_ = 0; pc_modified_ = false; icount_ = 0; break_count_ = 0; - wasm_interrupt_ = false; break_pc_ = nullptr; break_instr_ = 0; single_stepping_ = false; single_step_callback_ = nullptr; single_step_callback_arg_ = nullptr; // Set up architecture state. // All registers are initialized to zero to start with. @@ -1640,45 +1639,16 @@ Simulator::registerState() wasm::RegisterState state; state.pc = (void*) get_pc(); state.fp = (void*) getRegister(fp); state.sp = (void*) getRegister(sp); state.lr = (void*) getRegister(ra); return state; } -// The signal handler only redirects the PC to the interrupt stub when the PC is -// in function code. However, this guard is racy for the simulator since the -// signal handler samples PC in the middle of simulating an instruction and thus -// the current PC may have advanced once since the signal handler's guard. So we -// re-check here. -void -Simulator::handleWasmInterrupt() -{ - if (!wasm::CodeExists) - return; - - void* pc = (void*)get_pc(); - void* fp = (void*)getRegister(Register::fp); - - JitActivation* activation = TlsContext.get()->activation()->asJit(); - const wasm::CodeSegment* segment = wasm::LookupCodeSegment(pc); - if (!segment || !segment->isModule() || !segment->containsCodePC(pc)) - return; - - // fp can be null during the prologue/epilogue of the entry function. - if (!fp) - return; - - if (!activation->startWasmInterrupt(registerState())) - return; - - set_pc(int64_t(segment->asModule()->interruptCode())); -} - // WebAssembly memories contain an extra region of guard pages (see // WasmArrayRawBuffer comment). The guard pages catch out-of-bounds accesses // using a signal handler that redirects PC to a stub that safely reports an // error. However, if the handler is hit by the simulator, the PC is in C++ code // and cannot be redirected. Therefore, we must avoid hitting the handler by // redirecting in the simulator before the real handler would have been hit. bool Simulator::handleWasmFault(uint64_t addr, unsigned numBytes) @@ -1707,17 +1677,17 @@ Simulator::handleWasmFault(uint64_t addr if (!instance->memoryAccessInGuardRegion((uint8_t*)addr, numBytes)) return false; LLBit_ = false; const wasm::MemoryAccess* memoryAccess = instance->code().lookupMemoryAccess(pc); if (!memoryAccess) { - MOZ_ALWAYS_TRUE(act->startWasmInterrupt(registerState())); + act->startWasmTrap(wasm::Trap::OutOfBounds, 0, registerState()); if (!instance->code().containsCodePC(pc)) MOZ_CRASH("Cannot map PC to trap handler"); set_pc(int64_t(moduleSegment->outOfBoundsCode())); return true; } MOZ_ASSERT(memoryAccess->hasTrapOutOfLineCode()); set_pc(int64_t(memoryAccess->trapOutOfLineCode(moduleSegment->base()))); @@ -4057,29 +4027,16 @@ Simulator::disable_single_stepping() if (!single_stepping_) return; single_step_callback_(single_step_callback_arg_, this, (void*)get_pc()); single_stepping_ = false; single_step_callback_ = nullptr; single_step_callback_arg_ = nullptr; } -static void -FakeInterruptHandler() -{ - JSContext* cx = TlsContext.get(); - uint8_t* pc = cx->simulator()->get_pc_as<uint8_t*>(); - - const wasm::ModuleSegment* ms = nullptr; - if (!wasm::InInterruptibleCode(cx, pc, &ms)) - return; - - cx->simulator()->trigger_wasm_interrupt(); -} - template<bool enableStopSimAt> void Simulator::execute() { if (single_stepping_) single_step_callback_(single_step_callback_arg_, this, nullptr); // Get the PC to simulate. Cannot use the accessor here as we need the @@ -4088,26 +4045,19 @@ Simulator::execute() while (program_counter != end_sim_pc) { if (enableStopSimAt && (icount_ == Simulator::StopSimAt)) { MipsDebugger dbg(this); dbg.debug(); } else { if (single_stepping_) single_step_callback_(single_step_callback_arg_, this, (void*)program_counter); - if (MOZ_UNLIKELY(JitOptions.simulatorAlwaysInterrupt)) - FakeInterruptHandler(); SimInstruction* instr = reinterpret_cast<SimInstruction *>(program_counter); instructionDecode(instr); icount_++; - - if (MOZ_UNLIKELY(wasm_interrupt_)) { - handleWasmInterrupt(); - wasm_interrupt_ = false; - } } program_counter = get_pc(); } if (single_stepping_) single_step_callback_(single_step_callback_arg_, this, nullptr); } --- a/js/src/jit/mips64/Simulator-mips64.h +++ b/js/src/jit/mips64/Simulator-mips64.h @@ -201,23 +201,16 @@ class Simulator { // Special case of set_register and get_register to access the raw PC value. void set_pc(int64_t value); int64_t get_pc() const; template <typename T> T get_pc_as() const { return reinterpret_cast<T>(get_pc()); } - void trigger_wasm_interrupt() { - // This can be called several times if a single interrupt isn't caught - // and handled by the simulator, but this is fine; once the current - // instruction is done executing, the interrupt will be handled anyhow. - wasm_interrupt_ = true; - } - void enable_single_stepping(SingleStepCallback cb, void* arg); void disable_single_stepping(); // Accessor to the internal simulator stack area. uintptr_t stackLimit() const; bool overRecursed(uintptr_t newsp = 0) const; bool overRecursedWithExtra(uint32_t extra) const; @@ -314,18 +307,16 @@ class Simulator { void handleStop(uint32_t code, SimInstruction* instr); bool isStopInstruction(SimInstruction* instr); bool isEnabledStop(uint32_t code); void enableStop(uint32_t code); void disableStop(uint32_t code); void increaseStopCounter(uint32_t code); void printStopInfo(uint32_t code); - // Handle a wasm interrupt triggered by an async signal handler. - void handleWasmInterrupt(); JS::ProfilingFrameIterator::RegisterState registerState(); // Handle any wasm faults, returning true if the fault was handled. bool handleWasmFault(uint64_t addr, unsigned numBytes); bool handleWasmTrapFault(); // Executes one instruction. void instructionDecode(SimInstruction* instr); @@ -373,19 +364,16 @@ class Simulator { // Simulator support. char* stack_; uintptr_t stackLimit_; bool pc_modified_; int64_t icount_; int64_t break_count_; - // wasm async interrupt support - bool wasm_interrupt_; - // Debugger input. char* lastDebuggerInput_; // Registered breakpoints. SimInstruction* break_pc_; Instr break_instr_; // Single-stepping support --- a/js/src/jsapi.cpp +++ b/js/src/jsapi.cpp @@ -7267,19 +7267,16 @@ JS_SetGlobalJitCompilerOption(JSContext* break; case JSJITCOMPILER_JUMP_THRESHOLD: if (value == uint32_t(-1)) { jit::DefaultJitOptions defaultValues; value = defaultValues.jumpThreshold; } jit::JitOptions.jumpThreshold = value; break; - case JSJITCOMPILER_SIMULATOR_ALWAYS_INTERRUPT: - jit::JitOptions.simulatorAlwaysInterrupt = !!value; - break; case JSJITCOMPILER_SPECTRE_INDEX_MASKING: jit::JitOptions.spectreIndexMasking = !!value; break; case JSJITCOMPILER_SPECTRE_OBJECT_MITIGATIONS_BARRIERS: jit::JitOptions.spectreObjectMitigationsBarriers = !!value; break; case JSJITCOMPILER_SPECTRE_STRING_MITIGATIONS: jit::JitOptions.spectreStringMitigations = !!value; --- a/js/src/moz.build +++ b/js/src/moz.build @@ -207,16 +207,17 @@ UNIFIED_SOURCES += [ 'irregexp/RegExpEngine.cpp', 'irregexp/RegExpInterpreter.cpp', 'irregexp/RegExpMacroAssembler.cpp', 'irregexp/RegExpParser.cpp', 'irregexp/RegExpStack.cpp', 'jit/AliasAnalysis.cpp', 'jit/AliasAnalysisShared.cpp', 'jit/AlignmentMaskAnalysis.cpp', + 'jit/AsyncInterrupt.cpp', 'jit/BacktrackingAllocator.cpp', 'jit/Bailouts.cpp', 'jit/BaselineBailouts.cpp', 'jit/BaselineCacheIRCompiler.cpp', 'jit/BaselineCompiler.cpp', 'jit/BaselineDebugModeOSR.cpp', 'jit/BaselineFrame.cpp', 'jit/BaselineFrameInfo.cpp', --- a/js/src/vm/JSCompartment.cpp +++ b/js/src/vm/JSCompartment.cpp @@ -178,17 +178,17 @@ JSRuntime::createJitRuntime(JSContext* c ReportOutOfMemory(cx); return nullptr; } jit::JitRuntime* jrt = cx->new_<jit::JitRuntime>(cx->runtime()); if (!jrt) return nullptr; - // Protect jitRuntime_ from being observed (by InterruptRunningJitCode) + // Protect jitRuntime_ from being observed (by jit::InterruptRunningCode) // while it is being initialized. Unfortunately, initialization depends on // jitRuntime_ being non-null, so we can't just wait to assign jitRuntime_. JitRuntime::AutoPreventBackedgePatching apbp(cx->runtime(), jrt); jitRuntime_ = jrt; AutoEnterOOMUnsafeRegion noOOM; if (!jitRuntime_->initialize(cx, atomsLock)) { // Handling OOM here is complicated: if we delete jitRuntime_ now, we --- a/js/src/vm/JSContext.cpp +++ b/js/src/vm/JSContext.cpp @@ -30,16 +30,17 @@ #include "jsexn.h" #include "jspubtd.h" #include "jstypes.h" #include "builtin/String.h" #include "gc/FreeOp.h" #include "gc/Marking.h" +#include "jit/AsyncInterrupt.h" #include "jit/Ion.h" #include "jit/PcScriptCache.h" #include "js/CharacterEncoding.h" #include "js/Printf.h" #include "util/DoubleToString.h" #include "util/NativeStack.h" #include "util/Windows.h" #include "vm/BytecodeUtil.h" @@ -47,17 +48,16 @@ #include "vm/HelperThreads.h" #include "vm/Iteration.h" #include "vm/JSAtom.h" #include "vm/JSCompartment.h" #include "vm/JSFunction.h" #include "vm/JSObject.h" #include "vm/JSScript.h" #include "vm/Shape.h" -#include "wasm/WasmSignalHandlers.h" #include "vm/JSObject-inl.h" #include "vm/JSScript-inl.h" #include "vm/Stack-inl.h" using namespace js; using namespace js::gc; @@ -97,17 +97,17 @@ js::AutoCycleDetector::~AutoCycleDetecto } } bool JSContext::init(ContextKind kind) { // Skip most of the initialization if this thread will not be running JS. if (kind == ContextKind::Cooperative) { - // Get a platform-native handle for this thread, used by js::InterruptRunningJitCode. + // Get a platform-native handle for this thread, used by jit::InterruptRunningCode. #ifdef XP_WIN size_t openFlags = THREAD_GET_CONTEXT | THREAD_SET_CONTEXT | THREAD_SUSPEND_RESUME | THREAD_QUERY_INFORMATION; HANDLE self = OpenThread(openFlags, false, GetCurrentThreadId()); if (!self) return false; static_assert(sizeof(HANDLE) <= sizeof(threadNative_), "need bigger field"); threadNative_ = (size_t)self; @@ -118,21 +118,23 @@ JSContext::init(ContextKind kind) if (!regexpStack.ref().init()) return false; if (!fx.initInstance()) return false; #ifdef JS_SIMULATOR - simulator_ = js::jit::Simulator::Create(this); + simulator_ = jit::Simulator::Create(this); if (!simulator_) return false; #endif + if (!jit::EnsureAsyncInterrupt(this)) + return false; if (!wasm::EnsureSignalHandlers(this)) return false; } // Set the ContextKind last, so that ProtectedData checks will allow us to // initialize this context before it becomes the runtime's active context. kind_ = kind; --- a/js/src/vm/Runtime.cpp +++ b/js/src/vm/Runtime.cpp @@ -25,31 +25,31 @@ #include "jsmath.h" #include "builtin/Promise.h" #include "gc/FreeOp.h" #include "gc/GCInternals.h" #include "gc/PublicIterators.h" #include "jit/arm/Simulator-arm.h" #include "jit/arm64/vixl/Simulator-vixl.h" +#include "jit/AsyncInterrupt.h" #include "jit/JitCompartment.h" #include "jit/mips32/Simulator-mips32.h" #include "jit/mips64/Simulator-mips64.h" #include "js/Date.h" #include "js/MemoryMetrics.h" #include "js/SliceBudget.h" #include "js/Wrapper.h" #include "util/Windows.h" #include "vm/Debugger.h" #include "vm/JSAtom.h" #include "vm/JSObject.h" #include "vm/JSScript.h" #include "vm/TraceLogging.h" #include "vm/TraceLoggingGraph.h" -#include "wasm/WasmSignalHandlers.h" #include "gc/GC-inl.h" #include "vm/JSContext-inl.h" using namespace js; using namespace js::gc; using mozilla::Atomic; @@ -593,17 +593,17 @@ JSContext::requestInterrupt(InterruptMod // additional steps to interrupt corner cases where the above fields are // not regularly polled. Wake ilooping Ion code, irregexp JIT code and // Atomics.wait() interruptRegExpJit_ = true; fx.lock(); if (fx.isWaiting()) fx.wake(FutexThread::WakeForJSInterrupt); fx.unlock(); - InterruptRunningJitCode(this); + jit::InterruptRunningCode(this); } } bool JSContext::handleInterrupt() { MOZ_ASSERT(CurrentThreadCanAccessRuntime(runtime())); if (interrupt_ || jitStackLimit == UINTPTR_MAX) { --- a/js/src/vm/Runtime.h +++ b/js/src/vm/Runtime.h @@ -994,28 +994,19 @@ struct JSRuntime : public js::MallocProv friend class js::gc::AutoTraceSession; friend class JS::AutoEnterCycleCollection; private: js::ActiveThreadData<js::RuntimeCaches> caches_; public: js::RuntimeCaches& caches() { return caches_.ref(); } - // When wasm traps or is interrupted, the signal handler records some data - // for unwinding purposes. Wasm code can't interrupt or trap reentrantly. - js::ActiveThreadData< - mozilla::MaybeOneOf<js::wasm::TrapData, js::wasm::InterruptData> - > wasmUnwindData; - - js::wasm::TrapData& wasmTrapData() { - return wasmUnwindData.ref().ref<js::wasm::TrapData>(); - } - js::wasm::InterruptData& wasmInterruptData() { - return wasmUnwindData.ref().ref<js::wasm::InterruptData>(); - } + // When wasm traps, the signal handler records some data for unwinding + // purposes. Wasm code can't trap reentrantly. + js::ActiveThreadData<mozilla::Maybe<js::wasm::TrapData>> wasmTrapData; public: #if defined(NIGHTLY_BUILD) // Support for informing the embedding of any error thrown. // This mechanism is designed to let the embedding // log/report/fail in case certain errors are thrown // (e.g. SyntaxError, ReferenceError or TypeError // in critical code). --- a/js/src/vm/Stack.cpp +++ b/js/src/vm/Stack.cpp @@ -1569,17 +1569,17 @@ jit::JitActivation::~JitActivation() // All reocvered value are taken from activation during the bailout. MOZ_ASSERT(ionRecovery_.empty()); // The BailoutFrameInfo should have unregistered itself from the // JitActivations. MOZ_ASSERT(!bailoutData_); - MOZ_ASSERT(!isWasmInterrupted()); + // Traps get handled immediately. MOZ_ASSERT(!isWasmTrapping()); clearRematerializedFrames(); js_delete(rematerializedFrames_); } void jit::JitActivation::setBailoutData(jit::BailoutFrameInfo* bailoutData) @@ -1737,96 +1737,16 @@ jit::JitActivation::removeIonFrameRecove void jit::JitActivation::traceIonRecovery(JSTracer* trc) { for (RInstructionResults* it = ionRecovery_.begin(); it != ionRecovery_.end(); it++) it->trace(trc); } -bool -jit::JitActivation::startWasmInterrupt(const JS::ProfilingFrameIterator::RegisterState& state) -{ - // fp may be null when first entering wasm code from an interpreter entry - // stub. - if (!state.fp) - return false; - - MOZ_ASSERT(state.pc); - - // Execution can only be interrupted in function code. Afterwards, control - // flow does not reenter function code and thus there can be no - // interrupt-during-interrupt. - - bool unwound; - wasm::UnwindState unwindState; - MOZ_ALWAYS_TRUE(wasm::StartUnwinding(state, &unwindState, &unwound)); - - void* pc = unwindState.pc; - - if (unwound) { - // In the prologue/epilogue, FP might have been fixed up to the - // caller's FP, and the caller could be the jit entry. Ignore this - // interrupt, in this case, because FP points to a jit frame and not a - // wasm one. - if (!wasm::LookupCode(pc)->lookupFuncRange(pc)) - return false; - } - - cx_->runtime()->wasmUnwindData.ref().construct<wasm::InterruptData>(pc, state.pc); - setWasmExitFP(unwindState.fp); - - MOZ_ASSERT(compartment() == unwindState.fp->tls->instance->compartment()); - MOZ_ASSERT(isWasmInterrupted()); - return true; -} - -void -jit::JitActivation::finishWasmInterrupt() -{ - MOZ_ASSERT(isWasmInterrupted()); - - cx_->runtime()->wasmUnwindData.ref().destroy(); - packedExitFP_ = nullptr; -} - -bool -jit::JitActivation::isWasmInterrupted() const -{ - JSRuntime* rt = cx_->runtime(); - if (!rt->wasmUnwindData.ref().constructed<wasm::InterruptData>()) - return false; - - Activation* act = cx_->activation(); - while (act && !act->hasWasmExitFP()) - act = act->prev(); - - if (act != this) - return false; - - DebugOnly<const wasm::Frame*> fp = wasmExitFP(); - DebugOnly<void*> unwindPC = rt->wasmInterruptData().unwindPC; - MOZ_ASSERT(fp->instance()->code().containsCodePC(unwindPC)); - return true; -} - -void* -jit::JitActivation::wasmInterruptUnwindPC() const -{ - MOZ_ASSERT(isWasmInterrupted()); - return cx_->runtime()->wasmInterruptData().unwindPC; -} - -void* -jit::JitActivation::wasmInterruptResumePC() const -{ - MOZ_ASSERT(isWasmInterrupted()); - return cx_->runtime()->wasmInterruptData().resumePC; -} - void jit::JitActivation::startWasmTrap(wasm::Trap trap, uint32_t bytecodeOffset, const wasm::RegisterState& state) { bool unwound; wasm::UnwindState unwindState; MOZ_ALWAYS_TRUE(wasm::StartUnwinding(state, &unwindState, &unwound)); MOZ_ASSERT(unwound == (trap == wasm::Trap::IndirectCallBadSig)); @@ -1837,61 +1757,61 @@ jit::JitActivation::startWasmTrap(wasm:: const wasm::Code& code = fp->tls->instance->code(); MOZ_RELEASE_ASSERT(&code == wasm::LookupCode(pc)); // If the frame was unwound, the bytecodeOffset must be recovered from the // callsite so that it is accurate. if (unwound) bytecodeOffset = code.lookupCallSite(pc)->lineOrBytecode(); - cx_->runtime()->wasmUnwindData.ref().construct<wasm::TrapData>(pc, trap, bytecodeOffset); + cx_->runtime()->wasmTrapData.ref().emplace(pc, trap, bytecodeOffset); setWasmExitFP(fp); } void jit::JitActivation::finishWasmTrap() { MOZ_ASSERT(isWasmTrapping()); - cx_->runtime()->wasmUnwindData.ref().destroy(); + cx_->runtime()->wasmTrapData.ref().reset(); packedExitFP_ = nullptr; } bool jit::JitActivation::isWasmTrapping() const { JSRuntime* rt = cx_->runtime(); - if (!rt->wasmUnwindData.ref().constructed<wasm::TrapData>()) + if (!rt->wasmTrapData.ref()) return false; Activation* act = cx_->activation(); while (act && !act->hasWasmExitFP()) act = act->prev(); if (act != this) return false; DebugOnly<const wasm::Frame*> fp = wasmExitFP(); - DebugOnly<void*> unwindPC = rt->wasmTrapData().pc; + DebugOnly<void*> unwindPC = rt->wasmTrapData->pc; MOZ_ASSERT(fp->instance()->code().containsCodePC(unwindPC)); return true; } void* jit::JitActivation::wasmTrapPC() const { MOZ_ASSERT(isWasmTrapping()); - return cx_->runtime()->wasmTrapData().pc; + return cx_->runtime()->wasmTrapData->pc; } uint32_t jit::JitActivation::wasmTrapBytecodeOffset() const { MOZ_ASSERT(isWasmTrapping()); - return cx_->runtime()->wasmTrapData().bytecodeOffset; + return cx_->runtime()->wasmTrapData->bytecodeOffset; } InterpreterFrameIterator& InterpreterFrameIterator::operator++() { MOZ_ASSERT(!done()); if (fp_ != activation_->entryFrame_) { pc_ = fp_->prevpc(); --- a/js/src/vm/Stack.h +++ b/js/src/vm/Stack.h @@ -1705,27 +1705,16 @@ class JitActivation : public Activation wasm::ExitReason wasmExitReason() const { MOZ_ASSERT(hasWasmExitFP()); return wasm::ExitReason::Decode(encodedWasmExitReason_); } static size_t offsetOfEncodedWasmExitReason() { return offsetof(JitActivation, encodedWasmExitReason_); } - // Interrupts are started from the interrupt signal handler (or the ARM - // simulator) and cleared by WasmHandleExecutionInterrupt or WasmHandleThrow - // when the interrupt is handled. - - // Returns true iff we've entered interrupted state. - bool startWasmInterrupt(const wasm::RegisterState& state); - void finishWasmInterrupt(); - bool isWasmInterrupted() const; - void* wasmInterruptUnwindPC() const; - void* wasmInterruptResumePC() const; - void startWasmTrap(wasm::Trap trap, uint32_t bytecodeOffset, const wasm::RegisterState& state); void finishWasmTrap(); bool isWasmTrapping() const; void* wasmTrapPC() const; uint32_t wasmTrapBytecodeOffset() const; }; // A filtering of the ActivationIterator to only stop at JitActivations. --- a/js/src/wasm/WasmBaselineCompile.cpp +++ b/js/src/wasm/WasmBaselineCompile.cpp @@ -3368,18 +3368,17 @@ class BaseCompiler final : public BaseCo } void moveImmF64(double d, RegF64 dest) { masm.loadConstantDouble(d, dest); } void addInterruptCheck() { - // Always use signals for interrupts with Asm.JS/Wasm - MOZ_RELEASE_ASSERT(HaveSignalHandlers()); + // TODO } void jumpTable(const LabelVector& labels, Label* theTable) { // Flush constant pools to ensure that the table is never interrupted by // constant pool entries. masm.flush(); masm.bind(theTable); @@ -9486,18 +9485,16 @@ BaseCompiler::init() !SigPILL_.append(MIRType::Int64) || !SigPILL_.append(MIRType::Int64)) { return false; } if (!fr.setupLocals(locals_, sig().args(), debugEnabled_, &localInfo_)) return false; - addInterruptCheck(); - return true; } FuncOffsets BaseCompiler::finish() { MOZ_ASSERT(done(), "all bytes must be consumed"); MOZ_ASSERT(func_.callSiteLineNums.length() == lastReadCallSite_); --- a/js/src/wasm/WasmBuiltins.cpp +++ b/js/src/wasm/WasmBuiltins.cpp @@ -64,38 +64,16 @@ extern MOZ_EXPORT int64_t static JitActivation* CallingActivation() { Activation* act = TlsContext.get()->activation(); MOZ_ASSERT(act->asJit()->hasWasmExitFP()); return act->asJit(); } -static void* -WasmHandleExecutionInterrupt() -{ - JitActivation* activation = CallingActivation(); - MOZ_ASSERT(activation->isWasmInterrupted()); - - if (!CheckForInterrupt(activation->cx())) { - // If CheckForInterrupt failed, it is time to interrupt execution. - // Returning nullptr to the caller will jump to the throw stub which - // will call HandleThrow. The JitActivation must stay in the - // interrupted state until then so that stack unwinding works in - // HandleThrow. - return nullptr; - } - - // If CheckForInterrupt succeeded, then execution can proceed and the - // interrupt is over. - void* resumePC = activation->wasmInterruptResumePC(); - activation->finishWasmInterrupt(); - return resumePC; -} - static bool WasmHandleDebugTrap() { JitActivation* activation = CallingActivation(); JSContext* cx = activation->cx(); Frame* fp = activation->wasmExitFP(); Instance* instance = fp->tls->instance; const Code& code = instance->code(); @@ -214,17 +192,16 @@ wasm::HandleThrow(JSContext* cx, WasmFra // Unexpected success from the handler onLeaveFrame -- raising error // since throw recovery is not yet implemented in the wasm baseline. // TODO properly handle success and resume wasm execution. JS_ReportErrorASCII(cx, "Unexpected success from onLeaveFrame"); } frame->leave(cx); } - MOZ_ASSERT(!cx->activation()->asJit()->isWasmInterrupted(), "unwinding clears the interrupt"); MOZ_ASSERT(!cx->activation()->asJit()->isWasmTrapping(), "unwinding clears the trapping state"); return iter.unwoundAddressOfReturnAddress(); } static void* WasmHandleThrow() { @@ -282,17 +259,17 @@ WasmOldReportTrap(int32_t trapIndex) } JS_ReportErrorNumberUTF8(cx, GetErrorMessage, nullptr, errorNumber); } static void WasmReportTrap() { - Trap trap = TlsContext.get()->runtime()->wasmTrapData().trap; + Trap trap = TlsContext.get()->runtime()->wasmTrapData->trap; WasmOldReportTrap(int32_t(trap)); } static void WasmReportOutOfBounds() { JSContext* cx = TlsContext.get(); JS_ReportErrorNumberUTF8(cx, GetErrorMessage, nullptr, JSMSG_WASM_OUT_OF_BOUNDS); @@ -506,19 +483,16 @@ FuncCast(F* funcPtr, ABIFunctionType abi #endif return pf; } void* wasm::AddressOf(SymbolicAddress imm, ABIFunctionType* abiType) { switch (imm) { - case SymbolicAddress::HandleExecutionInterrupt: - *abiType = Args_General0; - return FuncCast(WasmHandleExecutionInterrupt, *abiType); case SymbolicAddress::HandleDebugTrap: *abiType = Args_General0; return FuncCast(WasmHandleDebugTrap, *abiType); case SymbolicAddress::HandleThrow: *abiType = Args_General0; return FuncCast(WasmHandleThrow, *abiType); case SymbolicAddress::ReportTrap: *abiType = Args_General0; @@ -687,17 +661,16 @@ wasm::AddressOf(SymbolicAddress imm, ABI } bool wasm::NeedsBuiltinThunk(SymbolicAddress sym) { // Some functions don't want to a thunk, because they already have one or // they don't have frame info. switch (sym) { - case SymbolicAddress::HandleExecutionInterrupt: // GenerateInterruptExit case SymbolicAddress::HandleDebugTrap: // GenerateDebugTrapStub case SymbolicAddress::HandleThrow: // GenerateThrowStub case SymbolicAddress::ReportTrap: // GenerateTrapExit case SymbolicAddress::OldReportTrap: // GenerateOldTrapExit case SymbolicAddress::ReportOutOfBounds: // GenerateOutOfBoundsExit case SymbolicAddress::ReportUnalignedAccess: // GenerateUnalignedExit case SymbolicAddress::CallImport_Void: // GenerateImportInterpExit case SymbolicAddress::CallImport_I32: @@ -869,18 +842,18 @@ PopulateTypedNatives(TypedNativeToFuncPt // ============================================================================ // Process-wide builtin thunk set // // Thunks are inserted between wasm calls and the C++ callee and achieve two // things: // - bridging the few differences between the internal wasm ABI and the external // native ABI (viz. float returns on x86 and soft-fp ARM) -// - executing an exit prologue/epilogue which in turn allows any asynchronous -// interrupt to see the full stack up to the wasm operation that called out +// - executing an exit prologue/epilogue which in turn allows any profiling +// iterator to see the full stack up to the wasm operation that called out // // Thunks are created for two kinds of C++ callees, enumerated above: // - SymbolicAddress: for statically compiled calls in the wasm module // - Imported JS builtins: optimized calls to imports // // All thunks are created up front, lazily, when the first wasm module is // compiled in the process. Thunks are kept alive until the JS engine shuts down // in the process. No thunks are created at runtime after initialization. This --- a/js/src/wasm/WasmCode.cpp +++ b/js/src/wasm/WasmCode.cpp @@ -330,25 +330,23 @@ ModuleSegment::initialize(Tier tier, UniqueCodeBytes codeBytes, uint32_t codeLength, const ShareableBytes& bytecode, const LinkDataTier& linkData, const Metadata& metadata, const CodeRangeVector& codeRanges) { MOZ_ASSERT(bytes_ == nullptr); - MOZ_ASSERT(linkData.interruptOffset); MOZ_ASSERT(linkData.outOfBoundsOffset); MOZ_ASSERT(linkData.unalignedAccessOffset); MOZ_ASSERT(linkData.trapOffset); tier_ = tier; bytes_ = Move(codeBytes); length_ = codeLength; - interruptCode_ = bytes_.get() + linkData.interruptOffset; outOfBoundsCode_ = bytes_.get() + linkData.outOfBoundsOffset; unalignedAccessCode_ = bytes_.get() + linkData.unalignedAccessOffset; trapCode_ = bytes_.get() + linkData.trapOffset; if (!StaticallyLink(*this, linkData)) return false; ExecutableAllocator::cacheFlush(bytes_.get(), RoundupCodeLength(codeLength)); --- a/js/src/wasm/WasmCode.h +++ b/js/src/wasm/WasmCode.h @@ -139,19 +139,18 @@ class CodeSegment typedef UniquePtr<ModuleSegment> UniqueModuleSegment; typedef UniquePtr<const ModuleSegment> UniqueConstModuleSegment; class ModuleSegment : public CodeSegment { Tier tier_; - // These are pointers into code for stubs used for asynchronous - // signal-handler control-flow transfer. - uint8_t* interruptCode_; + // These are pointers into code for stubs used for signal-handler + // control-flow transfer. uint8_t* outOfBoundsCode_; uint8_t* unalignedAccessCode_; uint8_t* trapCode_; bool initialize(Tier tier, UniqueCodeBytes bytes, uint32_t codeLength, const ShareableBytes& bytecode, @@ -168,17 +167,16 @@ class ModuleSegment : public CodeSegment const CodeRangeVector& codeRanges); public: ModuleSegment(const ModuleSegment&) = delete; void operator=(const ModuleSegment&) = delete; ModuleSegment() : CodeSegment(), tier_(Tier(-1)), - interruptCode_(nullptr), outOfBoundsCode_(nullptr), unalignedAccessCode_(nullptr), trapCode_(nullptr) {} static UniqueModuleSegment create(Tier tier, jit::MacroAssembler& masm, const ShareableBytes& bytecode, @@ -190,17 +188,16 @@ class ModuleSegment : public CodeSegment const Bytes& unlinkedBytes, const ShareableBytes& bytecode, const LinkDataTier& linkData, const Metadata& metadata, const CodeRangeVector& codeRanges); Tier tier() const { return tier_; } - uint8_t* interruptCode() const { return interruptCode_; } uint8_t* outOfBoundsCode() const { return outOfBoundsCode_; } uint8_t* unalignedAccessCode() const { return unalignedAccessCode_; } uint8_t* trapCode() const { return trapCode_; } // Structured clone support: size_t serializedSize() const; uint8_t* serialize(uint8_t* cursor, const LinkDataTier& linkDataTier) const; --- a/js/src/wasm/WasmFrameIter.cpp +++ b/js/src/wasm/WasmFrameIter.cpp @@ -56,37 +56,16 @@ WasmFrameIter::WasmFrameIter(JitActivati MOZ_ASSERT(codeRange_); lineOrBytecode_ = activation->wasmTrapBytecodeOffset(); MOZ_ASSERT(!done()); return; } - // When asynchronously interrupted, exitFP is set to the interrupted frame - // itself and so we do not want to skip it. Instead, we can recover the - // Code and CodeRange from the JitActivation, which are set when control - // flow was interrupted. There is no CallSite (b/c the interrupt was - // async), but this is fine because CallSite is only used for line number - // for which we can use the beginning of the function from the CodeRange - // instead. - - if (activation->isWasmInterrupted()) { - code_ = &fp_->tls->instance->code(); - MOZ_ASSERT(code_ == LookupCode(activation->wasmInterruptUnwindPC())); - - codeRange_ = code_->lookupFuncRange(activation->wasmInterruptUnwindPC()); - MOZ_ASSERT(codeRange_); - - lineOrBytecode_ = codeRange_->funcLineOrBytecode(); - - MOZ_ASSERT(!done()); - return; - } - // Otherwise, execution exits wasm code via an exit stub which sets exitFP // to the exit stub's frame. Thus, in this case, we want to start iteration // at the caller of the exit frame, whose Code, CodeRange and CallSite are // indicated by the returnAddress of the exit stub's frame. If the caller // was Ion, we can just skip the wasm frames. popFrame(); MOZ_ASSERT(!done() || unwoundIonCallerFP_); @@ -106,24 +85,22 @@ WasmFrameIter::operator++() MOZ_ASSERT(!done()); // When the iterator is set to unwind, each time the iterator pops a frame, // the JitActivation is updated so that the just-popped frame is no longer // visible. This is necessary since Debugger::onLeaveFrame is called before // popping each frame and, once onLeaveFrame is called for a given frame, // that frame must not be visible to subsequent stack iteration (or it // could be added as a "new" frame just as it becomes garbage). When the - // frame is "interrupted", then exitFP is included in the callstack - // (otherwise, it is skipped, as explained above). So to unwind the - // innermost frame, we just clear the interrupt state. + // frame is trapping, then exitFP is included in the callstack (otherwise, + // it is skipped, as explained above). So to unwind the innermost frame, we + // just clear the trapping state. if (unwind_ == Unwind::True) { - if (activation_->isWasmInterrupted()) - activation_->finishWasmInterrupt(); - else if (activation_->isWasmTrapping()) + if (activation_->isWasmTrapping()) activation_->finishWasmTrap(); activation_->setWasmExitFP(fp_); } popFrame(); } void @@ -727,20 +704,18 @@ ProfilingFrameIterator::initFromExitFP(c code_ = LookupCode(pc, &codeRange_); MOZ_ASSERT(code_); MOZ_ASSERT(codeRange_); // Since we don't have the pc for fp, start unwinding at the caller of fp. // This means that the innermost frame is skipped. This is fine because: // - for import exit calls, the innermost frame is a thunk, so the first // frame that shows up is the function calling the import; - // - for Math and other builtin calls as well as interrupts, we note the - // absence of an exit reason and inject a fake "builtin" frame; and - // - for async interrupts, we just accept that we'll lose the innermost - // frame. + // - for Math and other builtin calls, we note the absence of an exit + // reason and inject a fake "builtin" frame; and switch (codeRange_->kind()) { case CodeRange::InterpEntry: callerPC_ = nullptr; callerFP_ = nullptr; codeRange_ = nullptr; exitReason_ = ExitReason(ExitReason::Fixed::FakeInterpEntry); break; case CodeRange::JitEntry: @@ -758,17 +733,16 @@ ProfilingFrameIterator::initFromExitFP(c case CodeRange::ImportInterpExit: case CodeRange::BuiltinThunk: case CodeRange::TrapExit: case CodeRange::OldTrapExit: case CodeRange::DebugTrap: case CodeRange::OutOfBoundsExit: case CodeRange::UnalignedExit: case CodeRange::Throw: - case CodeRange::Interrupt: case CodeRange::FarJumpIsland: MOZ_CRASH("Unexpected CodeRange kind"); } MOZ_ASSERT(!done()); } bool @@ -956,21 +930,16 @@ js::wasm::StartUnwinding(const RegisterS if (intptr_t(fixedFP) == (FailFP & ~JitActivation::ExitFpWasmBit)) return false; break; case CodeRange::Throw: // The throw stub executes a small number of instructions before popping // the entire activation. To simplify testing, we simply pretend throw // stubs have already popped the entire stack. return false; - case CodeRange::Interrupt: - // When the PC is in the async interrupt stub, the fp may be garbage and - // so we cannot blindly unwind it. Since the percent of time spent in - // the interrupt stub is extremely small, just ignore the stack. - return false; } unwindState->code = code; unwindState->codeRange = codeRange; unwindState->fp = fixedFP; unwindState->pc = fixedPC; return true; } @@ -1086,30 +1055,28 @@ ProfilingFrameIterator::operator++() callerPC_ = callerFP_->returnAddress; AssertMatchesCallSite(callerPC_, callerFP_->callerFP); callerFP_ = callerFP_->callerFP; break; case CodeRange::InterpEntry: MOZ_CRASH("should have had null caller fp"); case CodeRange::JitEntry: MOZ_CRASH("should have been guarded above"); - case CodeRange::Interrupt: case CodeRange::Throw: MOZ_CRASH("code range doesn't have frame"); } MOZ_ASSERT(!done()); } static const char* ThunkedNativeToDescription(SymbolicAddress func) { MOZ_ASSERT(NeedsBuiltinThunk(func)); switch (func) { - case SymbolicAddress::HandleExecutionInterrupt: case SymbolicAddress::HandleDebugTrap: case SymbolicAddress::HandleThrow: case SymbolicAddress::ReportTrap: case SymbolicAddress::OldReportTrap: case SymbolicAddress::ReportOutOfBounds: case SymbolicAddress::ReportUnalignedAccess: case SymbolicAddress::CallImport_Void: case SymbolicAddress::CallImport_I32: @@ -1255,18 +1222,17 @@ ProfilingFrameIterator::label() const case CodeRange::BuiltinThunk: return builtinNativeDescription; case CodeRange::ImportInterpExit: return importInterpDescription; case CodeRange::TrapExit: return trapDescription; case CodeRange::OldTrapExit: return trapDescription; case CodeRange::DebugTrap: return debugTrapDescription; case CodeRange::OutOfBoundsExit: return "out-of-bounds stub (in wasm)"; case CodeRange::UnalignedExit: return "unaligned trap stub (in wasm)"; case CodeRange::FarJumpIsland: return "interstitial (in wasm)"; - case CodeRange::Throw: MOZ_FALLTHROUGH; - case CodeRange::Interrupt: MOZ_CRASH("does not have a frame"); + case CodeRange::Throw: MOZ_CRASH("does not have a frame"); } MOZ_CRASH("bad code range kind"); } Instance* wasm::LookupFaultingInstance(const ModuleSegment& codeSegment, void* pc, void* fp) { --- a/js/src/wasm/WasmFrameIter.h +++ b/js/src/wasm/WasmFrameIter.h @@ -44,22 +44,16 @@ struct FuncOffsets; struct CallableOffsets; // Iterates over a linear group of wasm frames of a single wasm JitActivation, // called synchronously from C++ in the wasm thread. It will stop at the first // frame that is not of the same kind, or at the end of an activation. // // If you want to handle every kind of frames (including JS jit frames), use // JitFrameIter. -// -// The one exception is that this iterator may be called from the interrupt -// callback which may be called asynchronously from asm.js code; in this case, -// the backtrace may not be correct. That being said, we try our best printing -// an informative message to the user and at least the name of the innermost -// function stack frame. class WasmFrameIter { public: enum class Unwind { True, False }; private: jit::JitActivation* activation_; @@ -153,17 +147,17 @@ class ExitReason } SymbolicAddress symbolic() const { MOZ_ASSERT(!isFixed()); return SymbolicAddress(payload_ >> 1); } }; // Iterates over the frames of a single wasm JitActivation, given an -// asynchronously-interrupted thread's state. +// asynchronously-profiled thread's state. class ProfilingFrameIterator { const Code* code_; const CodeRange* codeRange_; Frame* callerFP_; void* callerPC_; void* stackAddress_; uint8_t* unwoundIonCallerFP_; --- a/js/src/wasm/WasmGenerator.cpp +++ b/js/src/wasm/WasmGenerator.cpp @@ -545,20 +545,16 @@ ModuleGenerator::noteCodeRange(uint32_t case CodeRange::OutOfBoundsExit: MOZ_ASSERT(!linkDataTier_->outOfBoundsOffset); linkDataTier_->outOfBoundsOffset = codeRange.begin(); break; case CodeRange::UnalignedExit: MOZ_ASSERT(!linkDataTier_->unalignedAccessOffset); linkDataTier_->unalignedAccessOffset = codeRange.begin(); break; - case CodeRange::Interrupt: - MOZ_ASSERT(!linkDataTier_->interruptOffset); - linkDataTier_->interruptOffset = codeRange.begin(); - break; case CodeRange::TrapExit: MOZ_ASSERT(!linkDataTier_->trapOffset); linkDataTier_->trapOffset = codeRange.begin(); break; case CodeRange::Throw: // Jumped to by other stubs, so nothing to do. break; case CodeRange::FarJumpIsland: --- a/js/src/wasm/WasmIonCompile.cpp +++ b/js/src/wasm/WasmIonCompile.cpp @@ -246,18 +246,16 @@ class FunctionCompiler } curBlock_->add(ins); curBlock_->initSlot(info().localSlot(i), ins); if (!mirGen_.ensureBallast()) return false; } - addInterruptCheck(); - return true; } void finish() { mirGen().initWasmMaxStackArgBytes(maxStackArgBytes_); MOZ_ASSERT(callStack_.empty()); @@ -1030,18 +1028,17 @@ class FunctionCompiler { if (inDeadCode()) return; curBlock_->add(MWasmStoreGlobalVar::New(alloc(), globalDataOffset, v, tlsPointer_)); } void addInterruptCheck() { - // We rely on signal handlers for interrupts on Asm.JS/Wasm - MOZ_RELEASE_ASSERT(wasm::HaveSignalHandlers()); + // TODO } MDefinition* extractSimdElement(unsigned lane, MDefinition* base, MIRType type, SimdSign sign) { if (inDeadCode()) return nullptr; MOZ_ASSERT(IsSimdType(base->type())); --- a/js/src/wasm/WasmModule.h +++ b/js/src/wasm/WasmModule.h @@ -37,17 +37,16 @@ struct CompileArgs; // // LinkData is built incrementally by ModuleGenerator and then stored immutably // in Module. LinkData is distinct from Metadata in that LinkData is owned and // destroyed by the Module since it is not needed after instantiation; Metadata // is needed at runtime. struct LinkDataTierCacheablePod { - uint32_t interruptOffset; uint32_t outOfBoundsOffset; uint32_t unalignedAccessOffset; uint32_t trapOffset; LinkDataTierCacheablePod() { mozilla::PodZero(this); } }; struct LinkDataTier : LinkDataTierCacheablePod --- a/js/src/wasm/WasmProcess.cpp +++ b/js/src/wasm/WasmProcess.cpp @@ -45,25 +45,24 @@ class ProcessCodeSegmentMap // Since writes (insertions or removals) can happen on any background // thread at the same time, we need a lock here. Mutex mutatorsMutex_; CodeSegmentVector segments1_; CodeSegmentVector segments2_; - // Because of sampling/interruptions/stack iteration in general, the - // thread running wasm might need to know to which CodeSegment the - // current PC belongs, during a call to lookup(). A lookup is a - // read-only operation, and we don't want to take a lock then + // Because of profiling, the thread running wasm might need to know to which + // CodeSegment the current PC belongs, during a call to lookup(). A lookup + // is a read-only operation, and we don't want to take a lock then // (otherwise, we could have a deadlock situation if an async lookup // happened on a given thread that was holding mutatorsMutex_ while getting - // interrupted/sampled). Since the writer could be modifying the data that - // is getting looked up, the writer functions use spin-locks to know if - // there are any observers (i.e. calls to lookup()) of the atomic data. + // sampled). Since the writer could be modifying the data that is getting + // looked up, the writer functions use spin-locks to know if there are any + // observers (i.e. calls to lookup()) of the atomic data. Atomic<size_t> observers_; // Except during swapAndWait(), there are no lookup() observers of the // vector pointed to by mutableCodeSegments_ CodeSegmentVector* mutableCodeSegments_; Atomic<const CodeSegmentVector*> readonlyCodeSegments_; --- a/js/src/wasm/WasmProcess.h +++ b/js/src/wasm/WasmProcess.h @@ -25,17 +25,17 @@ namespace js { namespace wasm { class Code; class CodeRange; class CodeSegment; // These methods return the wasm::CodeSegment (resp. wasm::Code) containing // the given pc, if any exist in the process. These methods do not take a lock, -// and thus are safe to use in a profiling or async interrupt context. +// and thus are safe to use in a profiling context. const CodeSegment* LookupCodeSegment(const void* pc, const CodeRange** codeRange = nullptr); const Code* LookupCode(const void* pc, const CodeRange** codeRange = nullptr); // A bool member that can be used as a very fast lookup to know if there is any --- a/js/src/wasm/WasmSignalHandlers.cpp +++ b/js/src/wasm/WasmSignalHandlers.cpp @@ -26,30 +26,42 @@ #include "jit/AtomicOperations.h" #include "jit/Disassembler.h" #include "vm/Runtime.h" #include "wasm/WasmBuiltins.h" #include "wasm/WasmInstance.h" #include "vm/ArrayBufferObject-inl.h" +#if defined(XP_WIN) +# include "util/Windows.h" +#else +# include <signal.h> +# include <sys/mman.h> +#endif + +#if defined(__FreeBSD__) || defined(__FreeBSD_kernel__) +# include <sys/ucontext.h> // for ucontext_t, mcontext_t +#endif + +#if defined(__x86_64__) +# if defined(__DragonFly__) +# include <machine/npx.h> // for union savefpu +# elif defined(__FreeBSD__) || defined(__FreeBSD_kernel__) || \ + defined(__NetBSD__) || defined(__OpenBSD__) +# include <machine/fpu.h> // for struct savefpu/fxsave64 +# endif +#endif + using namespace js; using namespace js::jit; using namespace js::wasm; using JS::GenericNaN; using mozilla::DebugOnly; -using mozilla::PodArrayZero; - -#if defined(ANDROID) -# include <sys/system_properties.h> -# if defined(MOZ_LINKER) -extern "C" MFBT_API bool IsSignalHandlingBroken(); -# endif -#endif // Crashing inside the signal handler can cause the handler to be recursively // invoked, eventually blowing the stack without actually showing a crash // report dialog via Breakpad. To guard against this we watch for such // recursion and fall through to the next handler immediately rather than // trying to handle it. static MOZ_THREAD_LOCAL(bool) sAlreadyInSignalHandler; @@ -252,48 +264,30 @@ struct AutoSignalHandler # define RLR_sig(p) ((p)->uc_mcontext.mc_gpregs.gp_lr) # define R31_sig(p) ((p)->uc_mcontext.mc_gpregs.gp_sp) # endif # if defined(__FreeBSD__) && defined(__mips__) # define EPC_sig(p) ((p)->uc_mcontext.mc_pc) # define RFP_sig(p) ((p)->uc_mcontext.mc_regs[30]) # endif #elif defined(XP_DARWIN) -# define EIP_sig(p) ((p)->uc_mcontext->__ss.__eip) -# define EBP_sig(p) ((p)->uc_mcontext->__ss.__ebp) -# define ESP_sig(p) ((p)->uc_mcontext->__ss.__esp) -# define RIP_sig(p) ((p)->uc_mcontext->__ss.__rip) -# define RBP_sig(p) ((p)->uc_mcontext->__ss.__rbp) -# define RSP_sig(p) ((p)->uc_mcontext->__ss.__rsp) -# define R14_sig(p) ((p)->uc_mcontext->__ss.__lr) -# define R15_sig(p) ((p)->uc_mcontext->__ss.__pc) +# define EIP_sig(p) ((p)->thread.uts.ts32.__eip) +# define EBP_sig(p) ((p)->thread.uts.ts32.__ebp) +# define ESP_sig(p) ((p)->thread.uts.ts32.__esp) +# define RIP_sig(p) ((p)->thread.__rip) +# define RBP_sig(p) ((p)->thread.__rbp) +# define RSP_sig(p) ((p)->thread.__rsp) +# define R11_sig(p) ((p)->thread.__r[11]) +# define R13_sig(p) ((p)->thread.__sp) +# define R14_sig(p) ((p)->thread.__lr) +# define R15_sig(p) ((p)->thread.__pc) #else # error "Don't know how to read/write to the thread state via the mcontext_t." #endif -#if defined(XP_WIN) -# include "util/Windows.h" -#else -# include <signal.h> -# include <sys/mman.h> -#endif - -#if defined(__FreeBSD__) || defined(__FreeBSD_kernel__) -# include <sys/ucontext.h> // for ucontext_t, mcontext_t -#endif - -#if defined(__x86_64__) -# if defined(__DragonFly__) -# include <machine/npx.h> // for union savefpu -# elif defined(__FreeBSD__) || defined(__FreeBSD_kernel__) || \ - defined(__NetBSD__) || defined(__OpenBSD__) -# include <machine/fpu.h> // for struct savefpu/fxsave64 -# endif -#endif - #if defined(ANDROID) // Not all versions of the Android NDK define ucontext_t or mcontext_t. // Detect this and provide custom but compatible definitions. Note that these // follow the GLibc naming convention to access register values from // mcontext_t. // // See: https://chromiumcodereview.appspot.com/10829122/ // See: http://code.google.com/p/android/issues/detail?id=34784 @@ -364,48 +358,40 @@ typedef struct ucontext { mcontext_t uc_mcontext; // Other fields are not used by V8, don't define them here. } ucontext_t; enum { REG_EIP = 14 }; # endif // defined(__i386__) # endif // !defined(__BIONIC_HAVE_UCONTEXT_T) #endif // defined(ANDROID) -#if !defined(XP_WIN) -# define CONTEXT ucontext_t -#endif - -// Define a context type for use in the emulator code. This is usually just -// the same as CONTEXT, but on Mac we use a different structure since we call -// into the emulator code from a Mach exception handler rather than a -// sigaction-style signal handler. #if defined(XP_DARWIN) # if defined(__x86_64__) struct macos_x64_context { x86_thread_state64_t thread; x86_float_state64_t float_; }; -# define EMULATOR_CONTEXT macos_x64_context +# define CONTEXT macos_x64_context # elif defined(__i386__) struct macos_x86_context { x86_thread_state_t thread; x86_float_state_t float_; }; -# define EMULATOR_CONTEXT macos_x86_context +# define CONTEXT macos_x86_context # elif defined(__arm__) struct macos_arm_context { arm_thread_state_t thread; arm_neon_state_t float_; }; -# define EMULATOR_CONTEXT macos_arm_context +# define CONTEXT macos_arm_context # else # error Unsupported architecture # endif -#else -# define EMULATOR_CONTEXT CONTEXT +#elif !defined(XP_WIN) +# define CONTEXT ucontext_t #endif #if defined(_M_X64) || defined(__x86_64__) # define PC_sig(p) RIP_sig(p) # define FP_sig(p) RBP_sig(p) # define SP_sig(p) RSP_sig(p) #elif defined(_M_IX86) || defined(__i386__) # define PC_sig(p) EIP_sig(p) @@ -423,144 +409,72 @@ struct macos_arm_context { # define LR_sig(p) RLR_sig(p) #elif defined(__mips__) # define PC_sig(p) EPC_sig(p) # define FP_sig(p) RFP_sig(p) # define SP_sig(p) RSP_sig(p) # define LR_sig(p) R31_sig(p) #endif -#if defined(PC_sig) && defined(FP_sig) && defined(SP_sig) -# define KNOWS_MACHINE_STATE -#endif - static uint8_t** ContextToPC(CONTEXT* context) { -#ifdef KNOWS_MACHINE_STATE +#ifdef PC_sig return reinterpret_cast<uint8_t**>(&PC_sig(context)); #else MOZ_CRASH(); #endif } static uint8_t* ContextToFP(CONTEXT* context) { -#ifdef KNOWS_MACHINE_STATE +#ifdef FP_sig return reinterpret_cast<uint8_t*>(FP_sig(context)); #else MOZ_CRASH(); #endif } -#ifdef KNOWS_MACHINE_STATE static uint8_t* ContextToSP(CONTEXT* context) { +#ifdef SP_sig return reinterpret_cast<uint8_t*>(SP_sig(context)); +#else + MOZ_CRASH(); +#endif } -# if defined(__arm__) || defined(__aarch64__) || defined(__mips__) +#if defined(__arm__) || defined(__aarch64__) || defined(__mips__) static uint8_t* ContextToLR(CONTEXT* context) { +# ifdef LR_sig return reinterpret_cast<uint8_t*>(LR_sig(context)); -} -# endif -#endif // KNOWS_MACHINE_STATE - -#if defined(XP_DARWIN) - -static uint8_t** -ContextToPC(EMULATOR_CONTEXT* context) -{ -# if defined(__x86_64__) - static_assert(sizeof(context->thread.__rip) == sizeof(void*), - "stored IP should be compile-time pointer-sized"); - return reinterpret_cast<uint8_t**>(&context->thread.__rip); -# elif defined(__i386__) - static_assert(sizeof(context->thread.uts.ts32.__eip) == sizeof(void*), - "stored IP should be compile-time pointer-sized"); - return reinterpret_cast<uint8_t**>(&context->thread.uts.ts32.__eip); -# elif defined(__arm__) - static_assert(sizeof(context->thread.__pc) == sizeof(void*), - "stored IP should be compile-time pointer-sized"); - return reinterpret_cast<uint8_t**>(&context->thread.__pc); # else -# error Unsupported architecture + MOZ_CRASH(); # endif } - -static uint8_t* -ContextToFP(EMULATOR_CONTEXT* context) -{ -# if defined(__x86_64__) - return (uint8_t*)context->thread.__rbp; -# elif defined(__i386__) - return (uint8_t*)context->thread.uts.ts32.__ebp; -# elif defined(__arm__) - return (uint8_t*)context->thread.__r[11]; -# else -# error Unsupported architecture -# endif -} - -# if defined(__arm__) || defined(__aarch64__) -static uint8_t* -ContextToLR(EMULATOR_CONTEXT* context) -{ - return (uint8_t*)context->thread.__lr; -} -# endif - -static uint8_t* -ContextToSP(EMULATOR_CONTEXT* context) -{ -# if defined(__x86_64__) - return (uint8_t*)context->thread.__rsp; -# elif defined(__i386__) - return (uint8_t*)context->thread.uts.ts32.__esp; -# elif defined(__arm__) - return (uint8_t*)context->thread.__sp; -# else -# error Unsupported architecture -# endif -} +#endif static JS::ProfilingFrameIterator::RegisterState -ToRegisterState(EMULATOR_CONTEXT* context) +ToRegisterState(CONTEXT* context) { JS::ProfilingFrameIterator::RegisterState state; state.fp = ContextToFP(context); state.pc = *ContextToPC(context); state.sp = ContextToSP(context); -# if defined(__arm__) || defined(__aarch64__) +#if defined(__arm__) || defined(__aarch64__) || defined(__mips__) state.lr = ContextToLR(context); -# endif +#else + state.lr = (void*)UINTPTR_MAX; +#endif return state; } -#endif // XP_DARWIN - -static JS::ProfilingFrameIterator::RegisterState -ToRegisterState(CONTEXT* context) -{ -#ifdef KNOWS_MACHINE_STATE - JS::ProfilingFrameIterator::RegisterState state; - state.fp = ContextToFP(context); - state.pc = *ContextToPC(context); - state.sp = ContextToSP(context); -# if defined(__arm__) || defined(__aarch64__) || defined(__mips__) - state.lr = ContextToLR(context); -# endif - return state; -#else - MOZ_CRASH(); -#endif -} #if defined(WASM_HUGE_MEMORY) MOZ_COLD static void SetFPRegToNaN(size_t size, void* fp_reg) { MOZ_RELEASE_ASSERT(size <= Simd128DataSize); memset(fp_reg, 0, Simd128DataSize); switch (size) { @@ -648,17 +562,17 @@ AddressOfFPRegisterSlot(CONTEXT* context case X86Encoding::xmm14: return &XMM_sig(context, 14); case X86Encoding::xmm15: return &XMM_sig(context, 15); default: break; } MOZ_CRASH(); } MOZ_COLD static void* -AddressOfGPRegisterSlot(EMULATOR_CONTEXT* context, Registers::Code code) +AddressOfGPRegisterSlot(CONTEXT* context, Registers::Code code) { switch (code) { case X86Encoding::rax: return &RAX_sig(context); case X86Encoding::rcx: return &RCX_sig(context); case X86Encoding::rdx: return &RDX_sig(context); case X86Encoding::rbx: return &RBX_sig(context); case X86Encoding::rsp: return &RSP_sig(context); case X86Encoding::rbp: return &RBP_sig(context); @@ -673,17 +587,17 @@ AddressOfGPRegisterSlot(EMULATOR_CONTEXT case X86Encoding::r14: return &R14_sig(context); case X86Encoding::r15: return &R15_sig(context); default: break; } MOZ_CRASH(); } # else MOZ_COLD static void* -AddressOfFPRegisterSlot(EMULATOR_CONTEXT* context, FloatRegisters::Encoding encoding) +AddressOfFPRegisterSlot(CONTEXT* context, FloatRegisters::Encoding encoding) { switch (encoding) { case X86Encoding::xmm0: return &context->float_.__fpu_xmm0; case X86Encoding::xmm1: return &context->float_.__fpu_xmm1; case X86Encoding::xmm2: return &context->float_.__fpu_xmm2; case X86Encoding::xmm3: return &context->float_.__fpu_xmm3; case X86Encoding::xmm4: return &context->float_.__fpu_xmm4; case X86Encoding::xmm5: return &context->float_.__fpu_xmm5; @@ -698,17 +612,17 @@ AddressOfFPRegisterSlot(EMULATOR_CONTEXT case X86Encoding::xmm14: return &context->float_.__fpu_xmm14; case X86Encoding::xmm15: return &context->float_.__fpu_xmm15; default: break; } MOZ_CRASH(); } MOZ_COLD static void* -AddressOfGPRegisterSlot(EMULATOR_CONTEXT* context, Registers::Code code) +AddressOfGPRegisterSlot(CONTEXT* context, Registers::Code code) { switch (code) { case X86Encoding::rax: return &context->thread.__rax; case X86Encoding::rcx: return &context->thread.__rcx; case X86Encoding::rdx: return &context->thread.__rdx; case X86Encoding::rbx: return &context->thread.__rbx; case X86Encoding::rsp: return &context->thread.__rsp; case X86Encoding::rbp: return &context->thread.__rbp; @@ -724,69 +638,69 @@ AddressOfGPRegisterSlot(EMULATOR_CONTEXT case X86Encoding::r15: return &context->thread.__r15; default: break; } MOZ_CRASH(); } # endif // !XP_DARWIN #elif defined(JS_CODEGEN_ARM64) MOZ_COLD static void* -AddressOfFPRegisterSlot(EMULATOR_CONTEXT* context, FloatRegisters::Encoding encoding) +AddressOfFPRegisterSlot(CONTEXT* context, FloatRegisters::Encoding encoding) { MOZ_CRASH("NYI - asm.js not supported yet on this platform"); } MOZ_COLD static void* -AddressOfGPRegisterSlot(EMULATOR_CONTEXT* context, Registers::Code code) +AddressOfGPRegisterSlot(CONTEXT* context, Registers::Code code) { MOZ_CRASH("NYI - asm.js not supported yet on this platform"); } #endif MOZ_COLD static void -SetRegisterToCoercedUndefined(EMULATOR_CONTEXT* context, size_t size, +SetRegisterToCoercedUndefined(CONTEXT* context, size_t size, const Disassembler::OtherOperand& value) { if (value.kind() == Disassembler::OtherOperand::FPR) SetFPRegToNaN(size, AddressOfFPRegisterSlot(context, value.fpr())); else SetGPRegToZero(AddressOfGPRegisterSlot(context, value.gpr())); } MOZ_COLD static void -SetRegisterToLoadedValue(EMULATOR_CONTEXT* context, SharedMem<void*> addr, size_t size, +SetRegisterToLoadedValue(CONTEXT* context, SharedMem<void*> addr, size_t size, const Disassembler::OtherOperand& value) { if (value.kind() == Disassembler::OtherOperand::FPR) SetFPRegToLoadedValue(addr, size, AddressOfFPRegisterSlot(context, value.fpr())); else SetGPRegToLoadedValue(addr, size, AddressOfGPRegisterSlot(context, value.gpr())); } MOZ_COLD static void -SetRegisterToLoadedValueSext32(EMULATOR_CONTEXT* context, SharedMem<void*> addr, size_t size, +SetRegisterToLoadedValueSext32(CONTEXT* context, SharedMem<void*> addr, size_t size, const Disassembler::OtherOperand& value) { SetGPRegToLoadedValueSext32(addr, size, AddressOfGPRegisterSlot(context, value.gpr())); } MOZ_COLD static void -StoreValueFromRegister(EMULATOR_CONTEXT* context, SharedMem<void*> addr, size_t size, +StoreValueFromRegister(CONTEXT* context, SharedMem<void*> addr, size_t size, const Disassembler::OtherOperand& value) { if (value.kind() == Disassembler::OtherOperand::FPR) StoreValueFromFPReg(addr, size, AddressOfFPRegisterSlot(context, value.fpr())); else if (value.kind() == Disassembler::OtherOperand::GPR) StoreValueFromGPReg(addr, size, AddressOfGPRegisterSlot(context, value.gpr())); else StoreValueFromGPImm(addr, size, value.imm()); } MOZ_COLD static uint8_t* -ComputeAccessAddress(EMULATOR_CONTEXT* context, const Disassembler::ComplexAddress& address) +ComputeAccessAddress(CONTEXT* context, const Disassembler::ComplexAddress& address) { MOZ_RELEASE_ASSERT(!address.isPCRelative(), "PC-relative addresses not supported yet"); uintptr_t result = address.disp(); if (address.hasBase()) { uintptr_t base; StoreValueFromGPReg(SharedMem<void*>::unshared(&base), sizeof(uintptr_t), @@ -801,29 +715,29 @@ ComputeAccessAddress(EMULATOR_CONTEXT* c MOZ_ASSERT(address.scale() < 32, "address shift overflow"); result += index * (uintptr_t(1) << address.scale()); } return reinterpret_cast<uint8_t*>(result); } MOZ_COLD static void -HandleMemoryAccess(EMULATOR_CONTEXT* context, uint8_t* pc, uint8_t* faultingAddress, +HandleMemoryAccess(CONTEXT* context, uint8_t* pc, uint8_t* faultingAddress, const ModuleSegment* segment, const Instance& instance, JitActivation* activation, uint8_t** ppc) { MOZ_RELEASE_ASSERT(instance.code().containsCodePC(pc)); const MemoryAccess* memoryAccess = instance.code().lookupMemoryAccess(pc); if (!memoryAccess) { // If there is no associated MemoryAccess for the faulting PC, this must be // experimental SIMD.js or Atomics. When these are converted to // non-experimental wasm features, this case, as well as outOfBoundsCode, // can be removed. - MOZ_ALWAYS_TRUE(activation->startWasmInterrupt(ToRegisterState(context))); + activation->startWasmTrap(wasm::Trap::OutOfBounds, 0, ToRegisterState(context)); *ppc = segment->outOfBoundsCode(); return; } MOZ_RELEASE_ASSERT(memoryAccess->insnOffset() == (pc - segment->base())); // On WASM_HUGE_MEMORY platforms, asm.js code may fault. asm.js does not // trap on fault and so has no trap out-of-line path. Instead, stores are @@ -957,26 +871,26 @@ HandleMemoryAccess(EMULATOR_CONTEXT* con } *ppc = end; } #else // WASM_HUGE_MEMORY MOZ_COLD static void -HandleMemoryAccess(EMULATOR_CONTEXT* context, uint8_t* pc, uint8_t* faultingAddress, +HandleMemoryAccess(CONTEXT* context, uint8_t* pc, uint8_t* faultingAddress, const ModuleSegment* segment, const Instance& instance, JitActivation* activation, uint8_t** ppc) { MOZ_RELEASE_ASSERT(instance.code().containsCodePC(pc)); const MemoryAccess* memoryAccess = instance.code().lookupMemoryAccess(pc); if (!memoryAccess) { // See explanation in the WASM_HUGE_MEMORY HandleMemoryAccess. - MOZ_ALWAYS_TRUE(activation->startWasmInterrupt(ToRegisterState(context))); + activation->startWasmTrap(wasm::Trap::OutOfBounds, 0, ToRegisterState(context)); *ppc = segment->outOfBoundsCode(); return; } MOZ_RELEASE_ASSERT(memoryAccess->hasTrapOutOfLineCode()); *ppc = memoryAccess->trapOutOfLineCode(segment->base()); } @@ -1014,43 +928,18 @@ HandleFault(PEXCEPTION_POINTERS exceptio return false; const ModuleSegment* moduleSegment = codeSegment->asModule(); JitActivation* activation = TlsContext.get()->activation()->asJit(); MOZ_ASSERT(activation); const Instance* instance = LookupFaultingInstance(*moduleSegment, pc, ContextToFP(context)); - if (!instance) { - // On Windows, it is possible for InterruptRunningJitCode to execute - // between a faulting instruction and the handling of the fault due - // to InterruptRunningJitCode's use of SuspendThread. When this happens, - // after ResumeThread, the exception handler is called with pc equal to - // ModuleSegment.interrupt, which is logically wrong. The Right Thing would - // be for the OS to make fault-handling atomic (so that CONTEXT.pc was - // always the logically-faulting pc). Fortunately, we can detect this - // case and silence the exception ourselves (the exception will - // retrigger after the interrupt jumps back to resumePC). - return activation->isWasmInterrupted() && - pc == moduleSegment->interruptCode() && - moduleSegment->containsCodePC(activation->wasmInterruptResumePC()); - } - - // In the same race-with-interrupt situation above, it's *also* possible - // that the reported 'pc' is the pre-interrupt pc, not post-interrupt - // moduleSegment->interruptCode (this may be windows-version-specific). In - // this case, lookupTrap()/lookupMemoryAccess() will all succeed causing the - // pc to be redirected *again* (to a trap stub), leading to the interrupt - // stub never being called. Since the goal of the async interrupt is to break - // out iloops and trapping does just that, this is fine, we just clear the - // "interrupted" state. - if (activation->isWasmInterrupted()) { - MOZ_ASSERT(activation->wasmInterruptResumePC() == pc); - activation->finishWasmInterrupt(); - } + if (!instance) + return false; if (record->ExceptionCode == EXCEPTION_ILLEGAL_INSTRUCTION) { Trap trap; BytecodeOffset bytecode; if (!moduleSegment->code().lookupTrap(pc, &trap, &bytecode)) return false; activation->startWasmTrap(trap, bytecode.offset, ToRegisterState(context)); @@ -1120,17 +1009,17 @@ struct ExceptionRequest static bool HandleMachException(JSContext* cx, const ExceptionRequest& request) { // Get the port of the JSContext's thread from the message. mach_port_t cxThread = request.body.thread.name; // Read out the JSRuntime thread's register state. - EMULATOR_CONTEXT context; + CONTEXT context; # if defined(__x86_64__) unsigned int thread_state_count = x86_THREAD_STATE64_COUNT; unsigned int float_state_count = x86_FLOAT_STATE64_COUNT; int thread_state = x86_THREAD_STATE64; int float_state = x86_FLOAT_STATE64; # elif defined(__i386__) unsigned int thread_state_count = x86_THREAD_STATE_COUNT; unsigned int float_state_count = x86_FLOAT_STATE_COUNT; @@ -1441,17 +1330,17 @@ HandleFault(int signum, siginfo_t* info, } #ifdef JS_CODEGEN_ARM if (signum == SIGBUS) { // TODO: We may see a bus error for something that is an unaligned access that // partly overlaps the end of the heap. In this case, it is an out-of-bounds // error and we should signal that properly, but to do so we must inspect // the operand of the failed access. - MOZ_ALWAYS_TRUE(activation->startWasmInterrupt(ToRegisterState(context))); + activation->startWasmTrap(wasm::Trap::UnalignedAccess, 0, ToRegisterState(context)); *ppc = moduleSegment->unalignedAccessCode(); return true; } #endif HandleMemoryAccess(context, pc, faultingAddress, moduleSegment, *instance, activation, ppc); return true; } @@ -1490,240 +1379,91 @@ WasmFaultHandler(int signum, siginfo_t* previousSignal->sa_sigaction(signum, info, context); else if (previousSignal->sa_handler == SIG_DFL || previousSignal->sa_handler == SIG_IGN) sigaction(signum, previousSignal, nullptr); else previousSignal->sa_handler(signum); } # endif // XP_WIN || XP_DARWIN || assume unix -static void -RedirectIonBackedgesToInterruptCheck(JSContext* cx) -{ - if (!cx->runtime()->hasJitRuntime()) - return; - jit::JitRuntime* jitRuntime = cx->runtime()->jitRuntime(); - Zone* zone = cx->zoneRaw(); - if (zone && !zone->isAtomsZone()) { - // If the backedge list is being mutated, the pc must be in C++ code and - // thus not in a JIT iloop. We assume that the interrupt flag will be - // checked at least once before entering JIT code (if not, no big deal; - // the browser will just request another interrupt in a second). - if (!jitRuntime->preventBackedgePatching()) { - jit::JitZoneGroup* jzg = zone->group()->jitZoneGroup; - jzg->patchIonBackedges(cx, jit::JitZoneGroup::BackedgeInterruptCheck); - } - } -} - -bool -wasm::InInterruptibleCode(JSContext* cx, uint8_t* pc, const ModuleSegment** ms) -{ - // Only interrupt in function code so that the frame iterators have the - // invariant that resumePC always has a function CodeRange and we can't - // get into any weird interrupt-during-interrupt-stub cases. - - if (!cx->compartment()) - return false; - - const CodeSegment* cs = LookupCodeSegment(pc); - if (!cs || !cs->isModule()) - return false; - - *ms = cs->asModule(); - return !!(*ms)->code().lookupFuncRange(pc); -} - -// The return value indicates whether the PC was changed, not whether there was -// a failure. -static bool -RedirectJitCodeToInterruptCheck(JSContext* cx, CONTEXT* context) -{ - // Jitcode may only be modified on the runtime's active thread. - if (cx != cx->runtime()->activeContext()) - return false; - - // The faulting thread is suspended so we can access cx fields that can - // normally only be accessed by the cx's active thread. - AutoNoteSingleThreadedRegion anstr; - - RedirectIonBackedgesToInterruptCheck(cx); - -#ifdef JS_SIMULATOR - uint8_t* pc = cx->simulator()->get_pc_as<uint8_t*>(); -#else - uint8_t* pc = *ContextToPC(context); -#endif - - const ModuleSegment* moduleSegment = nullptr; - if (!InInterruptibleCode(cx, pc, &moduleSegment)) - return false; - -#ifdef JS_SIMULATOR - // The checks performed by the !JS_SIMULATOR path happen in - // Simulator::handleWasmInterrupt. - cx->simulator()->trigger_wasm_interrupt(); -#else - // Only probe cx->activation() after we know the pc is in wasm code. This - // way we don't depend on signal-safe update of cx->activation(). - JitActivation* activation = cx->activation()->asJit(); - - // The out-of-bounds/unaligned trap paths which call startWasmInterrupt() go - // through function code, so test if already interrupted. These paths are - // temporary though, so this case can be removed later. - if (activation->isWasmInterrupted()) - return false; - - if (!activation->startWasmInterrupt(ToRegisterState(context))) - return false; - - *ContextToPC(context) = moduleSegment->interruptCode(); -#endif - - return true; -} - -#if !defined(XP_WIN) -// For the interrupt signal, pick a signal number that: -// - is not otherwise used by mozilla or standard libraries -// - defaults to nostop and noprint on gdb/lldb so that noone is bothered -// SIGVTALRM a relative of SIGALRM, so intended for user code, but, unlike -// SIGALRM, not used anywhere else in Mozilla. -static const int sInterruptSignal = SIGVTALRM; - -static void -JitInterruptHandler(int signum, siginfo_t* info, void* context) -{ - if (JSContext* cx = TlsContext.get()) { - -#if defined(JS_SIMULATOR_ARM) || defined(JS_SIMULATOR_MIPS32) || defined(JS_SIMULATOR_MIPS64) - SimulatorProcess::ICacheCheckingDisableCount++; -#endif - - RedirectJitCodeToInterruptCheck(cx, (CONTEXT*)context); - -#if defined(JS_SIMULATOR_ARM) || defined(JS_SIMULATOR_MIPS32) || defined(JS_SIMULATOR_MIPS64) - SimulatorProcess::cacheInvalidatedBySignalHandler_ = true; - SimulatorProcess::ICacheCheckingDisableCount--; -#endif - - cx->finishHandlingJitInterrupt(); - } -} +#if defined(ANDROID) && defined(MOZ_LINKER) +extern "C" MFBT_API bool IsSignalHandlingBroken(); #endif static bool sTriedInstallSignalHandlers = false; static bool sHaveSignalHandlers = false; static bool ProcessHasSignalHandlers() { // We assume that there are no races creating the first JSRuntime of the process. if (sTriedInstallSignalHandlers) return sHaveSignalHandlers; sTriedInstallSignalHandlers = true; -#if defined(ANDROID) -# if !defined(__aarch64__) - // Before Android 4.4 (SDK version 19), there is a bug - // https://android-review.googlesource.com/#/c/52333 - // in Bionic's pthread_join which causes pthread_join to return early when - // pthread_kill is used (on any thread). Nobody expects the pthread_cond_wait - // EINTRquisition. - char version_string[PROP_VALUE_MAX]; - PodArrayZero(version_string); - if (__system_property_get("ro.build.version.sdk", version_string) > 0) { - if (atol(version_string) < 19) - return false; - } -# endif -# if defined(MOZ_LINKER) +#if defined(ANDROID) && defined(MOZ_LINKER) // Signal handling is broken on some android systems. if (IsSignalHandlingBroken()) return false; -# endif #endif - // The interrupt handler allows the active thread to be paused from another - // thread (see InterruptRunningJitCode). -#if defined(XP_WIN) - // Windows uses SuspendThread to stop the active thread from another thread. -#else - struct sigaction interruptHandler; - interruptHandler.sa_flags = SA_SIGINFO; - interruptHandler.sa_sigaction = &JitInterruptHandler; - sigemptyset(&interruptHandler.sa_mask); - struct sigaction prev; - if (sigaction(sInterruptSignal, &interruptHandler, &prev)) - MOZ_CRASH("unable to install interrupt handler"); - - // There shouldn't be any other handlers installed for sInterruptSignal. If - // there are, we could always forward, but we need to understand what we're - // doing to avoid problematic interference. - if ((prev.sa_flags & SA_SIGINFO && prev.sa_sigaction) || - (prev.sa_handler != SIG_DFL && prev.sa_handler != SIG_IGN)) - { - MOZ_CRASH("contention for interrupt signal"); - } -#endif // defined(XP_WIN) - // Initalize ThreadLocal flag used by WasmFaultHandler sAlreadyInSignalHandler.infallibleInit(); // Install a SIGSEGV handler to handle safely-out-of-bounds asm.js heap // access and/or unaligned accesses. -# if defined(XP_WIN) -# if defined(MOZ_ASAN) +#if defined(XP_WIN) +# if defined(MOZ_ASAN) // Under ASan we need to let the ASan runtime's ShadowExceptionHandler stay // in the first handler position. This requires some coordination with // MemoryProtectionExceptionHandler::isDisabled(). const bool firstHandler = false; -# else +# else // Otherwise, WasmFaultHandler needs to go first, so that we can recover // from wasm faults and continue execution without triggering handlers // such as MemoryProtectionExceptionHandler that assume we are crashing. const bool firstHandler = true; -# endif +# endif if (!AddVectoredExceptionHandler(firstHandler, WasmFaultHandler)) return false; -# elif defined(XP_DARWIN) +#elif defined(XP_DARWIN) // OSX handles seg faults via the Mach exception handler above, so don't // install WasmFaultHandler. -# else +#else // SA_NODEFER allows us to reenter the signal handler if we crash while // handling the signal, and fall through to the Breakpad handler by testing // handlingSegFault. // Allow handling OOB with signals on all architectures struct sigaction faultHandler; faultHandler.sa_flags = SA_SIGINFO | SA_NODEFER | SA_ONSTACK; faultHandler.sa_sigaction = WasmFaultHandler; sigemptyset(&faultHandler.sa_mask); if (sigaction(SIGSEGV, &faultHandler, &sPrevSEGVHandler)) MOZ_CRASH("unable to install segv handler"); -# if defined(JS_CODEGEN_ARM) +# if defined(JS_CODEGEN_ARM) // On Arm Handle Unaligned Accesses struct sigaction busHandler; busHandler.sa_flags = SA_SIGINFO | SA_NODEFER | SA_ONSTACK; busHandler.sa_sigaction = WasmFaultHandler; sigemptyset(&busHandler.sa_mask); if (sigaction(SIGBUS, &busHandler, &sPrevSIGBUSHandler)) MOZ_CRASH("unable to install sigbus handler"); -# endif +# endif // Install a handler to handle the instructions that are emitted to implement // wasm traps. struct sigaction wasmTrapHandler; wasmTrapHandler.sa_flags = SA_SIGINFO | SA_NODEFER | SA_ONSTACK; wasmTrapHandler.sa_sigaction = WasmFaultHandler; sigemptyset(&wasmTrapHandler.sa_mask); if (sigaction(kWasmTrapSignal, &wasmTrapHandler, &sPrevWasmTrapHandler)) MOZ_CRASH("unable to install wasm trap handler"); -# endif +#endif sHaveSignalHandlers = true; return true; } bool wasm::EnsureSignalHandlers(JSContext* cx) { @@ -1741,66 +1481,8 @@ wasm::EnsureSignalHandlers(JSContext* cx } bool wasm::HaveSignalHandlers() { MOZ_ASSERT(sTriedInstallSignalHandlers); return sHaveSignalHandlers; } - -// JSRuntime::requestInterrupt sets interrupt_ (which is checked frequently by -// C++ code at every Baseline JIT loop backedge) and jitStackLimit_ (which is -// checked at every Baseline and Ion JIT function prologue). The remaining -// sources of potential iloops (Ion loop backedges and all wasm code) are -// handled by this function: -// 1. Ion loop backedges are patched to instead point to a stub that handles -// the interrupt; -// 2. if the active thread's pc is inside wasm code, the pc is updated to point -// to a stub that handles the interrupt. -void -js::InterruptRunningJitCode(JSContext* cx) -{ - // If signal handlers weren't installed, then Ion and wasm emit normal - // interrupt checks and don't need asynchronous interruption. - if (!HaveSignalHandlers()) - return; - - // Do nothing if we're already handling an interrupt here, to avoid races - // below and in JitRuntime::patchIonBackedges. - if (!cx->startHandlingJitInterrupt()) - return; - - // If we are on context's thread, then: pc is not in wasm code (so nothing - // to do for wasm) and we can patch Ion backedges without any special - // synchronization. - if (cx == TlsContext.get()) { - RedirectIonBackedgesToInterruptCheck(cx); - cx->finishHandlingJitInterrupt(); - return; - } - - // We are not on the runtime's active thread, so to do 1 and 2 above, we need - // to halt the runtime's active thread first. -#if defined(XP_WIN) - // On Windows, we can simply suspend the active thread and work directly on - // its context from this thread. SuspendThread can sporadically fail if the - // thread is in the middle of a syscall. Rather than retrying in a loop, - // just wait for the next request for interrupt. - HANDLE thread = (HANDLE)cx->threadNative(); - if (SuspendThread(thread) != (DWORD)-1) { - CONTEXT context; - context.ContextFlags = CONTEXT_FULL; - if (GetThreadContext(thread, &context)) { - if (RedirectJitCodeToInterruptCheck(cx, &context)) - SetThreadContext(thread, &context); - } - ResumeThread(thread); - } - cx->finishHandlingJitInterrupt(); -#else - // On Unix, we instead deliver an async signal to the active thread which - // halts the thread and callers our JitInterruptHandler (which has already - // been installed by EnsureSignalHandlersInstalled). - pthread_t thread = (pthread_t)cx->threadNative(); - pthread_kill(thread, sInterruptSignal); -#endif -} --- a/js/src/wasm/WasmSignalHandlers.h +++ b/js/src/wasm/WasmSignalHandlers.h @@ -25,41 +25,29 @@ # include <mach/mach.h> #endif #include "js/TypeDecls.h" #include "threading/Thread.h" #include "wasm/WasmTypes.h" namespace js { - -// Force any currently-executing asm.js/ion code to call HandleExecutionInterrupt. -extern void -InterruptRunningJitCode(JSContext* cx); - namespace wasm { // Ensure the given JSRuntime is set up to use signals. Failure to enable signal // handlers indicates some catastrophic failure and creation of the runtime must // fail. MOZ_MUST_USE bool EnsureSignalHandlers(JSContext* cx); -// Return whether signals can be used in this process for interrupts or -// asm.js/wasm out-of-bounds. +// Return whether signals can be used in this process for asm.js/wasm +// out-of-bounds. bool HaveSignalHandlers(); -class ModuleSegment; - -// Returns true if wasm code is on top of the activation stack (and fills out -// the code segment outparam in this case), or false otherwise. -bool -InInterruptibleCode(JSContext* cx, uint8_t* pc, const ModuleSegment** ms); - #if defined(XP_DARWIN) // On OSX we are forced to use the lower-level Mach exception mechanism instead // of Unix signals. Mach exceptions are not handled on the victim's stack but // rather require an extra thread. For simplicity, we create one such thread // per JSContext (upon the first use of wasm in the JSContext). This thread // and related resources are owned by AsmJSMachExceptionHandler which is owned // by JSContext. class MachExceptionHandler @@ -74,33 +62,17 @@ class MachExceptionHandler MachExceptionHandler(); ~MachExceptionHandler() { uninstall(); } mach_port_t port() const { return port_; } bool installed() const { return installed_; } bool install(JSContext* cx); }; #endif -// Typed wrappers encapsulating the data saved by the signal handler on async -// interrupt or trap. On interrupt, the PC at which to resume is saved. On trap, -// the bytecode offset to be reported in callstacks is saved. - -struct InterruptData -{ - // The pc to use for unwinding purposes which is kept consistent with fp at - // call boundaries. - void* unwindPC; - - // The pc at which we should return if the interrupt doesn't stop execution. - void* resumePC; - - InterruptData(void* unwindPC, void* resumePC) - : unwindPC(unwindPC), resumePC(resumePC) - {} -}; +// On trap, the bytecode offset to be reported in callstacks is saved. struct TrapData { void* pc; Trap trap; uint32_t bytecodeOffset; TrapData(void* pc, Trap trap, uint32_t bytecodeOffset) --- a/js/src/wasm/WasmStubs.cpp +++ b/js/src/wasm/WasmStubs.cpp @@ -1125,18 +1125,16 @@ GenerateImportJitExit(MacroAssembler& ma masm.callJitNoProfiler(callee); // Note that there might be a GC thing in the JSReturnOperand now. // In all the code paths from here: // - either the value is unboxed because it was a primitive and we don't // need to worry about rooting anymore. // - or the value needs to be rooted, but nothing can cause a GC between // here and CoerceInPlace, which roots before coercing to a primitive. - // In particular, this is true because wasm::InInterruptibleCode will - // return false when PC is in the jit exit. // The JIT callee clobbers all registers, including WasmTlsReg and // FramePointer, so restore those here. During this sequence of // instructions, FP can't be trusted by the profiling frame iterator. offsets->untrustedFPStart = masm.currentOffset(); AssertStackAlignment(masm, JitStackAlignment, sizeOfRetAddr); masm.loadWasmTlsRegFromFrame(); @@ -1477,189 +1475,30 @@ static const LiveRegisterSet AllUserRegs FloatRegisterSet(FloatRegisters::AllDoubleMask)); static_assert(!SupportsSimd, "high lanes of SIMD registers need to be saved too."); #else static const LiveRegisterSet AllRegsExceptSP( GeneralRegisterSet(Registers::AllMask & ~(uint32_t(1) << Registers::StackPointer)), FloatRegisterSet(FloatRegisters::AllMask)); #endif -// The async interrupt-callback exit is called from arbitrarily-interrupted wasm -// code. It calls into the WasmHandleExecutionInterrupt to determine whether we must -// really halt execution which can reenter the VM (e.g., to display the slow -// script dialog). If execution is not interrupted, this stub must carefully -// preserve *all* register state. If execution is interrupted, the entire -// activation will be popped by the throw stub, so register state does not need -// to be restored. -static bool -GenerateInterruptExit(MacroAssembler& masm, Label* throwLabel, Offsets* offsets) -{ - masm.haltingAlign(CodeAlignment); - - offsets->begin = masm.currentOffset(); - -#if defined(JS_CODEGEN_X86) || defined(JS_CODEGEN_X64) - // Be very careful here not to perturb the machine state before saving it - // to the stack. In particular, add/sub instructions may set conditions in - // the flags register. - masm.push(Imm32(0)); // space used as return address, updated below - masm.setFramePushed(0); // set to 0 now so that framePushed is offset of return address - masm.PushFlags(); // after this we are safe to use sub - masm.PushRegsInMask(AllRegsExceptSP); // save all GP/FP registers (except SP) - - // We know that StackPointer is word-aligned, but not necessarily - // stack-aligned, so we need to align it dynamically. - masm.moveStackPtrTo(ABINonVolatileReg); - masm.andToStackPtr(Imm32(~(ABIStackAlignment - 1))); - if (ShadowStackSpace) - masm.subFromStackPtr(Imm32(ShadowStackSpace)); - - // Make the call to C++, which preserves ABINonVolatileReg. - masm.assertStackAlignment(ABIStackAlignment); - masm.call(SymbolicAddress::HandleExecutionInterrupt); - - // HandleExecutionInterrupt returns null if execution is interrupted and - // the resumption pc otherwise. - masm.branchTestPtr(Assembler::Zero, ReturnReg, ReturnReg, throwLabel); - - // Restore the stack pointer then store resumePC into the stack slow that - // will be popped by the 'ret' below. - masm.moveToStackPtr(ABINonVolatileReg); - masm.storePtr(ReturnReg, Address(StackPointer, masm.framePushed())); - - // Restore the machine state to before the interrupt. After popping flags, - // no instructions can be executed which set flags. - masm.PopRegsInMask(AllRegsExceptSP); - masm.PopFlags(); - - // Return to the resumePC stored into this stack slot above. - MOZ_ASSERT(masm.framePushed() == 0); - masm.ret(); -#elif defined(JS_CODEGEN_MIPS32) || defined(JS_CODEGEN_MIPS64) - // Reserve space to store resumePC and HeapReg. - masm.subFromStackPtr(Imm32(2 * sizeof(intptr_t))); - // Set to zero so we can use masm.framePushed() below. - masm.setFramePushed(0); - - // Save all registers, except sp. - masm.PushRegsInMask(AllUserRegsExceptSP); - - // Save the stack pointer and FCSR in a non-volatile registers. - masm.moveStackPtrTo(s0); - masm.as_cfc1(s1, Assembler::FCSR); - - // Align the stack. - masm.ma_and(StackPointer, StackPointer, Imm32(~(ABIStackAlignment - 1))); - - // Store HeapReg into the reserved space. - masm.storePtr(HeapReg, Address(s0, masm.framePushed() + sizeof(intptr_t))); - -# ifdef USES_O32_ABI - // MIPS ABI requires rewserving stack for registes $a0 to $a3. - masm.subFromStackPtr(Imm32(4 * sizeof(intptr_t))); -# endif - - masm.assertStackAlignment(ABIStackAlignment); - masm.call(SymbolicAddress::HandleExecutionInterrupt); - - masm.branchTestPtr(Assembler::Zero, ReturnReg, ReturnReg, throwLabel); - - // This will restore stack to the address before the call. - masm.moveToStackPtr(s0); - - // Restore FCSR. - masm.as_ctc1(s1, Assembler::FCSR); - - // Store resumePC into the reserved space. - masm.storePtr(ReturnReg, Address(s0, masm.framePushed())); - - masm.PopRegsInMask(AllUserRegsExceptSP); - - // Pop resumePC into PC. Clobber HeapReg to make the jump and restore it - // during jump delay slot. - masm.loadPtr(Address(StackPointer, 0), HeapReg); - // Reclaim the reserve space. - masm.addToStackPtr(Imm32(2 * sizeof(intptr_t))); - masm.as_jr(HeapReg); - masm.loadPtr(Address(StackPointer, -int32_t(sizeof(intptr_t))), HeapReg); -#elif defined(JS_CODEGEN_ARM) - { - // Be careful not to clobber scratch registers before they are saved. - ScratchRegisterScope scratch(masm); - SecondScratchRegisterScope secondScratch(masm); - - // Reserve a word to receive the return address. - masm.as_alu(StackPointer, StackPointer, Imm8(4), OpSub); - - // Set framePushed to 0 now so that framePushed can be used later as the - // stack offset to the return-address space reserved above. - masm.setFramePushed(0); - - // Save all GP/FP registers (except PC and SP). - masm.PushRegsInMask(AllRegsExceptPCSP); - } - - // Save SP, APSR and FPSCR in non-volatile registers. - masm.as_mrs(r4); - masm.as_vmrs(r5); - masm.mov(sp, r6); - - // We know that StackPointer is word-aligned, but not necessarily - // stack-aligned, so we need to align it dynamically. - masm.andToStackPtr(Imm32(~(ABIStackAlignment - 1))); - - // Make the call to C++, which preserves the non-volatile registers. - masm.assertStackAlignment(ABIStackAlignment); - masm.call(SymbolicAddress::HandleExecutionInterrupt); - - // HandleExecutionInterrupt returns null if execution is interrupted and - // the resumption pc otherwise. - masm.branchTestPtr(Assembler::Zero, ReturnReg, ReturnReg, throwLabel); - - // Restore the stack pointer then store resumePC into the stack slot that - // will be popped by the 'ret' below. - masm.mov(r6, sp); - masm.storePtr(ReturnReg, Address(sp, masm.framePushed())); - - // Restore the machine state to before the interrupt. After popping flags, - // no instructions can be executed which set flags. - masm.as_vmsr(r5); - masm.as_msr(r4); - masm.PopRegsInMask(AllRegsExceptPCSP); - - // Return to the resumePC stored into this stack slot above. - MOZ_ASSERT(masm.framePushed() == 0); - masm.ret(); -#elif defined(JS_CODEGEN_ARM64) - MOZ_CRASH(); -#elif defined (JS_CODEGEN_NONE) - MOZ_CRASH(); -#else -# error "Unknown architecture!" -#endif - - return FinishOffsets(masm, offsets); -} - // Generate a stub that restores the stack pointer to what it was on entry to // the wasm activation, sets the return register to 'false' and then executes a // return which will return from this wasm activation to the caller. This stub -// should only be called after the caller has reported an error (or, in the case -// of the interrupt stub, intends to interrupt execution). +// should only be called after the caller has reported an error. static bool GenerateThrowStub(MacroAssembler& masm, Label* throwLabel, Offsets* offsets) { masm.haltingAlign(CodeAlignment); masm.bind(throwLabel); offsets->begin = masm.currentOffset(); - // The throw stub can be jumped to from an async interrupt that is halting - // execution. Thus the stack pointer can be unaligned and we must align it + // Conservatively, the stack pointer can be unaligned and we must align it // dynamically. masm.andToStackPtr(Imm32(~(ABIStackAlignment - 1))); if (ShadowStackSpace) masm.subFromStackPtr(Imm32(ShadowStackSpace)); // WasmHandleThrow unwinds JitActivation::wasmExitFP() and returns the // address of the return address on the stack this stub should return to. // Set the FramePointer to a magic value to indicate a return by throw. @@ -1830,28 +1669,21 @@ wasm::GenerateStubs(const ModuleEnvironm if (!code->codeRanges.emplaceBack(CodeRange::UnalignedExit, offsets)) return false; if (!GenerateTrapExit(masm, &throwLabel, &offsets)) return false; if (!code->codeRanges.emplaceBack(CodeRange::TrapExit, offsets)) return false; - if (!GenerateInterruptExit(masm, &throwLabel, &offsets)) - return false; - if (!code->codeRanges.emplaceBack(CodeRange::Interrupt, offsets)) + CallableOffsets callableOffsets; + if (!GenerateDebugTrapStub(masm, &throwLabel, &callableOffsets)) return false; - - { - CallableOffsets offsets; - if (!GenerateDebugTrapStub(masm, &throwLabel, &offsets)) - return false; - if (!code->codeRanges.emplaceBack(CodeRange::DebugTrap, offsets)) - return false; - } + if (!code->codeRanges.emplaceBack(CodeRange::DebugTrap, callableOffsets)) + return false; if (!GenerateThrowStub(masm, &throwLabel, &offsets)) return false; if (!code->codeRanges.emplaceBack(CodeRange::Throw, offsets)) return false; masm.finish(); if (masm.oom()) --- a/js/src/wasm/WasmTypes.cpp +++ b/js/src/wasm/WasmTypes.cpp @@ -779,17 +779,16 @@ CodeRange::CodeRange(Kind kind, Offsets PodZero(&u); #ifdef DEBUG switch (kind_) { case FarJumpIsland: case OutOfBoundsExit: case UnalignedExit: case TrapExit: case Throw: - case Interrupt: break; default: MOZ_CRASH("should use more specific constructor"); } #endif } CodeRange::CodeRange(Kind kind, uint32_t funcIndex, Offsets offsets) --- a/js/src/wasm/WasmTypes.h +++ b/js/src/wasm/WasmTypes.h @@ -1059,17 +1059,16 @@ class CodeRange BuiltinThunk, // fast-path calling from wasm into a C++ native TrapExit, // calls C++ to report and jumps to throw stub OldTrapExit, // calls C++ to report and jumps to throw stub DebugTrap, // calls C++ to handle debug event FarJumpIsland, // inserted to connect otherwise out-of-range insns OutOfBoundsExit, // stub jumped to by non-standard asm.js SIMD/Atomics UnalignedExit, // stub jumped to by wasm Atomics and non-standard // ARM unaligned trap - Interrupt, // stub executes asynchronously to interrupt wasm Throw // special stack-unwinding stub jumped to by other stubs }; private: // All fields are treated as cacheable POD: uint32_t begin_; uint32_t ret_; uint32_t end_; @@ -1368,17 +1367,16 @@ enum class SymbolicAddress TruncD, TruncF, NearbyIntD, NearbyIntF, ExpD, LogD, PowD, ATan2D, - HandleExecutionInterrupt, HandleDebugTrap, HandleThrow, ReportTrap, OldReportTrap, ReportOutOfBounds, ReportUnalignedAccess, ReportInt64JSCall, CallImport_Void,
__label__pos
0.952024
SQL 抽取各級學生在不同測考的所有科目分數、平均分、班名紙及級名紙的SQL 本文由 Frankie 在 2019-06-26 發表於 "WebSAMS 討論區" 討論區 1. 10362662 Frankie Expand Collapse 文章: 28 讚: 0 想抽取各級學生在不同測考中的所有科目分數、平均分、班名紙及級名紙的SQL (包括學號、中、英文姓名、各科成績、平均分、班名紙及級名紙等資料)。謝謝!   #1 Frankie, 2019-06-26 2. 58416300 edb-gma Expand Collapse 文章: 25 讚: 0 #2 edb-gma, 2019-06-27 3. 10362662 Frankie Expand Collapse 文章: 28 讚: 0 唔好意思,因未能在 CDR 找到其中一個SQL合本校適用。本校現欲抽取中四至中六級學生於某評核 (如T2A3) 的所有科目的分數,並以ROW的形式顯示中文姓名、中文、英文、數學、數學延伸、所有修讀的選修科、音樂、美術、體育、平均分、班名次、級名次)等資料。謝謝!   #3 Frankie, 2019-07-08 4. 58685934 edb-ds Expand Collapse 文章: 19 讚: 0 select a.regno '學生編號', a.classcode '班別', a.classno '班號', a.chname '姓名', g4.sysscore '中文', i.sysscore '英文', j.sysscore '數學T1', l.sysscore '通識', ll.sysscore '數學-延伸', m.sysscore '生物', n.sysscore '化學', o.sysscore '經濟', p.sysscore '視藝', q.sysscore '音樂', r.sysscore '體育', d1.syspercscore as '平均分', d1.omclasslvl as '級名次', d1.omclass as '班名次' from wsadmin.vw_stu_lateststudent a left outer join wsadmin.TB_ASR_SUBJASSESSDATA g4 on a.SUID = g4.SUID and a.STUID = g4.STUID and a.SCHYEAR = g4.SCHYEAR and g4.TIMESEQ = 1203 and g4.SUBJCODE = '80' left outer join wsadmin.TB_ASR_SUBJASSESSDATA i on a.SUID = i.SUID and a.STUID = i.STUID and a.SCHYEAR = i.SCHYEAR and i.TIMESEQ = 1203 and i.SUBJCODE = '165' left outer join wsadmin.TB_ASR_SUBJASSESSDATA j on a.SUID = j.SUID and a.STUID = j.STUID and a.SCHYEAR = j.SCHYEAR and j.TIMESEQ = 1203 and j.SUBJCODE = '22S' left outer join wsadmin.TB_ASR_SUBJASSESSDATA l on a.SUID = l.SUID and a.STUID = l.STUID and a.SCHYEAR = l.SCHYEAR and l.TIMESEQ = 1203 and l.SUBJCODE = '265' left outer join wsadmin.TB_ASR_SUBJASSESSDATA ll on a.SUID = ll.SUID and a.STUID = ll.STUID and a.SCHYEAR = ll.SCHYEAR and ll.TIMESEQ = 1203 and ll.SUBJCODE = '23S' //可任意修改選修科目的代碼表 left outer join wsadmin.TB_ASR_SUBJASSESSDATA m on a.SUID = m.SUID and a.STUID = m.STUID and a.SCHYEAR = m.SCHYEAR and m.TIMESEQ = 1203 and m.SUBJCODE = '045' //可任意修改選修科目的代碼表 left outer join wsadmin.TB_ASR_SUBJASSESSDATA n on a.SUID = n.SUID and a.STUID = n.STUID and a.SCHYEAR = n.SCHYEAR and n.TIMESEQ = 1203 and n.SUBJCODE = '070' //可任意修改選修科目的代碼表 left outer join wsadmin.TB_ASR_SUBJASSESSDATA o on a.SUID = o.SUID and a.STUID = o.STUID and a.SCHYEAR = o.SCHYEAR and o.TIMESEQ = 1203 and o.SUBJCODE = '135' //可任意修改選修科目的代碼表 left outer join wsadmin.TB_ASR_SUBJASSESSDATA p on a.SUID = o.SUID and a.STUID = o.STUID and a.SCHYEAR = o.SCHYEAR and o.TIMESEQ = 1203 and p.SUBJCODE = '432' //視藝 left outer join wsadmin.TB_ASR_SUBJASSESSDATA q on a.SUID = q.SUID and a.STUID = q.STUID and a.SCHYEAR = q.SCHYEAR and q.TIMESEQ = 1203 and q.SUBJCODE = '300' //音樂 left outer join wsadmin.TB_ASR_SUBJASSESSDATA r on a.SUID = r.SUID and a.STUID = r.STUID and a.SCHYEAR = r.SCHYEAR and o.TIMESEQ = 1203 and r.SUBJCODE = '310' //體育 left outer join wsadmin.tb_hse_common b on a.suid = b.SUID and b.CODE_ID=a.SCHHOUSE and b.TB_ID = 'SCHHUS' left outer join wsadmin.tb_asr_studassessdata d1 on a.suid=d1.suid and a.stuid=d1.stuid and a.schyear=d1.schyear and a.schlvl=d1.schlevel and a.schsess=d1.schsession and a.classlvl=d1.classlevel and d1.TIMESEQ = 1203 where a.schyear=? and a.classlvl=? //可改成S4 , S5 和 S6 group by a.regno,a.classcode,a.classno,a.chname, g4.sysscore,i.sysscore,j.sysscore,l.sysscore,ll.sysscore,m.sysscore,n.sysscore,o.sysscore,p.sysscore,q.sysscore,r.sysscore,d1.syspercscore ,d1.omclasslvl, d1.omclass order by a.classcode,a.classno asc   #4 edb-ds, 2019-07-15 , 12:04 下午 Last edited: 2019-07-16 , 2:52 下午
__label__pos
0.588764
Passwordless OTP endpoint is returning Extensibility error I am trying to utilize the passwordless feature by making a POST request to /passwordless/start. This is the body I’m passing { “client_id”:“XXXX”, “client_secret”:“XXXXXX”, “connection”:“sms”, “phone_number”:“+16822509199”, “send”:“code”, “authParams”: { “scope”: “remove-authenticators” } } I’m getting the following error, { “error”: “extensibility_error”, “error_description”: “Extensibility error” } I have made the grant type has Passwordless OTP. I’ve also tried setting connection to email and passing the email in the body and that did’t work either. Can somebody please help me with this? Hi @abhayathapa , The extensibility_error is usually due to an uncaught error in rules, hooks, or actions. What happens if you switch off all rules/hooks/actions, does the same error happen? Thanks! I’ve turned off Rues and there are no hooks. How do I turn off Actions? I only see a delete option but no disable option. image
__label__pos
1
Sizing a Label Node I have a node type that is just a label that looks like this: <DataTemplate x:Key="Label"> <go:NodePanel Sizing="Auto" go:Part.Resizable="True" go:Part.ResizeElementName="LabelText" go:Part.Rotatable="True" go:Node.RotationAngle="{Binding Path=Data.Angle, Mode=TwoWay}" go:Part.SelectionAdorned="True" go:Part.SelectionElementName="LabelText" go:Node.Location="{Binding Path=Data.Location, Mode=TwoWay}" go:Node.LocationSpot="Center" Cursor="SizeAll"> <TextBox Name="LabelText" IsEnabled="False" AcceptsReturn="True" Text="{Binding Path=Data.Text, Mode=TwoWay}" TextAlignment="Center" Padding="5"/> </go:NodePanel> </DataTemplate> The node resizes itself as the TextBox’s size changes (which is what we are looking for), but once the node has been manually resized it no longer automatically resizes when the TextBox grows larger than the container. Any suggestions on how to achieve this behavior after the node has been manually resized? Thanks Ryan Why are you using a go:NodePanel at all? Just move all of those attributes onto the TextBox. (Other than Sizing, of course.) You might need to implement a Diagram.TextEdited event handler to clear the Width and Height properties under the conditions you determine.
__label__pos
0.987233
Example of nonvolatile storage media One of the example is magnetized disk or tape is nonvolatile, because no source of power is needed to maintain data storage. Digital Memory Terms and Concepts Chapter 15 - Digital Storage (Memory) PDF Version When we store information in some kind of circuit or device, we not only need some way to store and retrieve it, but also to locate precisely where in the device that it is. Most, if not all, memory devices can be thought of as a series of mail boxes, folders in a file cabinet, or some other metaphor where information can be located in a variety of places. When we refer to the actual information being stored in the memory device, we usually refer to it as the data. The location of this data within the storage device is typically called the address, in a manner reminiscent of the postal service. With some types of memory devices, the address in which certain data is stored can be called up by means of parallel data lines in a digital circuit (we’ll discuss this in more detail later in this lesson). With other types of devices, data is addressed in terms of an actual physical location on the surface of some type of media (the tracks and sectors of circular computer disks, for instance). However, some memory devices such as magnetic tapes have a one-dimensional type of data addressing: if you want to play your favorite song in the middle of a cassette tape album, you have to fast-forward to that spot in the tape, arriving at the proper spot by means of trial-and-error, judging the approximate area by means of a counter that keeps track of tape position, and/or by the amount of time it takes to get there from the beginning of the tape. The access of data from a storage device falls roughly into two categories: random access and sequential access. Random access means that you can quickly and precisely address a specific data location within the device, and non-random simply means that you cannot. A vinyl record platter is an example of a random-access device: to skip to any song, you just position the stylus arm at whatever location on the record that you want (compact audio disks so the same thing, only they do it automatically for you). Cassette tape, on the other hand, is sequential. You have to wait to go past the other songs in sequence before you can access or address the song that you want to skip to. The process of storing a piece of data to a memory device is called writing, and the process of retrieving data is called reading. Memory devices allowing both reading and writing are equipped with a way to distinguish between the two tasks, so that no mistake is made by the user (writing new information to a device when all you wanted to do is see what was stored there). Some devices do not allow for the writing of new data, and are purchased “pre-written” from the manufacturer. Such is the case for vinyl records and compact audio disks, and this is typically referred to in the digital world as read-only memory, or ROM. Cassette audio and video tape, on the other hand, can be re-recorded (re-written) or purchased blank and recorded fresh by the user. This is often called read-write memory. Another distinction to be made for any particular memory technology is its volatility, or data storage permanence without power. Many electronic memory devices store binary data by means of circuits that are either latched in a “high” or “low” state, and this latching effect holds only as long as electric power is maintained to those circuits. Such memory would be properly referred to as volatile. Storage media such as magnetized disk or tape is nonvolatile, because no source of power is needed to maintain data storage. This is often confusing for new students of computer technology, because the volatile electronic memory typically used for the construction of computer devices is commonly and distinctly referred to as RAM (Random Access Memory). While RAM memory is typically randomly-accessed, so is virtually every other kind of memory device in the computer! What “RAM” really refers to is the volatility of the memory, and not its mode of access. Nonvolatile memory integrated circuits in personal computers are commonly (and properly) referred to as ROM (Read-Only Memory), but their data contents are accessed randomly, just like the volatile memory circuits. Finally, there needs to be a way to denote how much data can be stored by any particular memory device. This, fortunately for us, is very simple and straightforward: just count up the number of bits (or bytes, 1 byte = 8 bits) of total data storage space. Due to the high capacity of modern data storage devices, metric prefixes are generally affixed to the unit of bytes in order to represent storage space: 1.6 Gigabytes is equal to 1.6 billion bytes, or 12.8 billion bits, of data storage capacity. The only caveat here is to be aware of rounded numbers. Because the storage mechanisms of many random-access memory devices are typically arranged so that the number of “cells” in which bits of data can be stored appears in binary progression (powers of 2), a “one kilobyte” memory device most likely contains 1024 (2 to the power of 10) locations for data bytes rather than exactly 1000. A “64 kbyte” memory device actually holds 65,536 bytes of data (2 to the 16th power), and should probably be called a “66 Kbyte” device to be more precise. When we round numbers in our base-10 system, we fall out of step with the round equivalents in the base-2 system.   RELATED WORKSHEETS:
__label__pos
0.803823
Xe - Blog - Contact - Gallery - Resume - Talks - Signal Boost - Feeds | GraphViz - When Then Zen Paranoid NixOS Setup A 32 minute read. Most of the time you can get away with a fairly simple security posture on NixOS. Don't run services as root, separate each service into its own systemd units, don't run packages you don't trust the heritage of and most importantly don't give random people shell access with passwordless sudo. Sometimes however, you have good reasons to want to lock everything down as much as humanly possible. This could happen when you want to create production servers for something security-critical such as a bastion host. In this post I'm going to show you a defense-in-depth model for making a NixOS server that is a bit more paranoid than usual, as well as explanations of all the moving parts. High-level Ideas At a high-level I'm assuming the following things about this setup: Some additional goals: Cadey is enby <Cadey> Disclaimer: I am a Tailscale employee. Tailscale did not review this post for accuracy or content, though this setup is based on conversations I've had with a coworker at Tailscale. Along the way we'll be making a system that I'm naming meeka. We'll put its configuration in a folder named meeka: # hosts/meeka/configuation.nix { ... }: { networking.hostName = "meeka"; services.openssh.enable = true; } Low-hanging Fruit There are some easy things we can get out of the way. One of the biggest ways that people get in is to make services visible to attack in the first place. The Firewall Let's get one of the lowest-hanging fruits out of the way: the firewall. Most of the background radiation of the internet is in the form of automated probes to development ports and SSH traffic. NixOS actually includes a firewall by default! You can see more information on how to configure it here, but here's a good collection of values to use by default: # hosts/meeka/firewall.nix { ... }: { networking.firewall.enable = true; } VPN for Access Generally, it's probably okay to use SSH over the unprotected internet for accessing your machines. However, this is all about maximum paranoia, so we're going to use a VPN to get into the machine. Tailscale is a fairly direct thing to set up in NixOS: # hosts/meeka/tailscale.nix { ... }: { services.tailscale.enable = true; # Tell the firewall to implicitly trust packets routed over Tailscale: networking.firewall.trustedInterfaces = [ "tailscale0" ]; } When you boot into the server, you can log in like normal using the tailscale up command. You can probably isolate down the server using ACLs if you want to make sure things are a bit more paranoid. It may be good to set up a second way to get into the machine, just in case. I personally try to leave at least 3 ways into my servers, but the super paranoid production-facing servers should probably only be able to be connected to over a VPN of some kind. If you want to see more about how to set up WireGuard on NixOS, see here for more information. Locking Down the Hatches Now that we're getting out of the easy stuff, let's go to the more defense in depth stuff. Here we're going to talk about separation of concerns and all those other fun things. Each Service Gets its own User Account I am going to use the word "service" annoyingly vague here. In this world, a "service" is a human-oriented view of "computer does the thing I want it to do". This website you're reading this post on could be one service, and it should have a separate account from other services. See here for more information on how to set this up. Lock Down Services Within Systemd systemd is a suite of tools that NixOS uses to manage a huge chunk of the system. It is kinda complicated and very large in scope, however this also means that you get access to a lot of convenient security management features. One of them is the Protect* unit options in systemd.exec(5), which can be used to lock down permissions to the resource and system call level. Let's cover some of my favorites that you can slipstream into services: Also take a look at systemd-analyze security yourservicename.service, that will give you a lot more things to search through the systemd documentation for. ProtectHome/ProtectSystem These options allow you to change how systemd presents critical system files and /home to a given process. You can use this to remove the ability for a service to modify system files or peek into user's home directories, even as root. This allows you to put a lot more limits on a service's power. NoNewPrivileges If this is set, child processes of this service cannot gain more privileges period. Even if the child process is a suid binary. Mara is hacker <Mara> A suid binary is a binary that has the suid flag set. This makes the Linux kernel change the active user field of that binary to the owner of the binary when you run it. This is a huge part of how the magic behind sudo and ping works. ProtectKernel{Logs,Modules,Tuneables} These ones are fairly simple so I'm gonna use some bullet trees for them: Mara is hmm <Mara> Why should I bother making all of these changes to my services though? Isn't it overkill to have a webapp running as a service user get denied access to even look at the kernel log? Cadey is enby <Cadey> To be honest, it can look like paranoid overkill, but this isn't just for the service itself. This is for defense in depth, which means that you want to make sure that things are reasonably secure even if an attacker manages to get code execution on one of your services. These settings prevent the service's view of the system from having too much detail, which can make the attacking process more annoying. Remember that the goal here isn't to make the system attack-proof, nothing is. The goal is to annoy the attacker enough that they give up. This is not perfect and probably will fall apart if your enemy is the Mossad, but it's at least an attempt to lock things down just in case the attackers aren't sending their "A" game. You may also want to look into InaccessiblePaths to block away other folders that you deem "forbidden" as facts and circumstances demand. Lock Down Nix Access Nix is the package manager for NixOS. Nix can be invoked by users. Nix lets users access things like compilers and scripting languages. These can be used to run exploit tools. This can be understandably problematic from a security standpoint. NixOS has an option called nix.allowedUsers that lets you specify which users or groups are allowed to do anything with the Nix daemon, and by extension the Nix package manager. For a fairly standard setup, you can probably get away with the following which allows everyone that can sudo to access the Nix daemon: # configuration/meeka/nix.nix { ... }: { nix.allowedUsers = [ "@wheel" ]; } However if you want to prevent everyone but root, you can use a configuration like this: # configuration/meeka/nix.nix { ... }: { nix.allowedUsers = [ "root" ]; } You may also want to block access to the NixOS cache CDN with an external firewall rule if you really don't trust things. You can block it by blocking the fastly IP range 151.101.0.0/16. Mara is hacker <Mara> I'd suggest doing this firewall change on the level above the NixOS machine itself, just in case the machine gets owned and then they ditch your firewall rules in an effort to aid in exfiltration. Making the System Amnesiac Most of these steps go way deep down the security rabbit hole. A lot of these are focused on limiting access to persistent storage so that persistence is opted into, not opted out of. These steps will essentially mount the root filesystem on a tmpfs that is cleared out on every reboot, with persistent data written to a subfolder in /nix that a symlink/bindmount farm is linked to. Most of these steps will require you to reprovision your NixOS machines and may require you to build your own custom images for cloud providers. Your experience and mileage may vary. These steps will be based on the excellent work done in these posts/projects: Partitioning/Setup Normally the NixOS partition setup looks a bit like this: Mara is hacker <Mara> It's worth noting that technically NixOS works fine if you make only one big filesystem and put /boot on there directly, but this may only pan out for BIOS booting systems. Given that / is going to become an in-memory tmpfs, we can instead move the partitioning to look like this: Assuming you are installing NixOS from scratch in a VM to test this part out, the partitioning setup commands could look something like this: dev=/dev/vda # replace me with the actual device parted ${dev} -- mklabel msdos parted ${dev} -- mkpart primary ext4 1M 512M parted ${dev} -- set 1 boot on parted ${dev} -- mkpart primary ext4 512MiB 100% mkfs.ext4 -L boot ${dev}1 mkfs.ext4 -L nix ${dev}2 Mara is hmm <Mara> Wait, ext4? I thought you were a zfs stan? Cadey is enby <Cadey> I normally am, however in this case it's probably better to keep the scary production servers as boring and vanilla as possible, especially when doing a more weird setup like this The exact size of your /boot partition may vary based on facts and circumstances, however in practice I've found 512 MB to be a not-terrible default. Make your "root mount" with a tmpfs: mount -t tmpfs none /mnt Then you need to create the persistent folders on /nix/persist. I've found these defaults to be not-horrible: mkdir -p /mnt/{boot,nix,etc/{nixos,ssh},var/{lib,log},srv} Mara is hacker <Mara> We use /srv as the home for our services. Adjust this as your facts and circumstances demand. Then mount those two partitions to your tmpfs: mount ${dev}1 /mnt/boot mount ${dev}2 /mnt/nix And create matching folders in /mnt/nix/persist: mkdir -p /mnt/nix/persist/{etc/{nixos,ssh},var/{lib,log},srv} Then finally create some bind mounts to tie everything together for the meantime. These bindmounts will be handled by impermanence in the future, however for now the quick and dirty method will suffice: mount -o bind /mnt/nix/persist/etc/nixos /mnt/etc/nixos mount -o bind /mnt/nix/persist/var/log /mnt/var/log Then generate a base config with nixos-generate-config: nixos-generate-config --root /mnt And open /etc/nixos/hardware-configuration.nix to edit the settings for the tmpfs mount on /. At a high level you'll need to change this: fileSystems."/" = { device = "none"; fsType = "tmpfs"; options = [ "defaults" "mode=755" ]; }; to this: fileSystems."/" = { device = "none"; fsType = "tmpfs"; options = [ "defaults" "size=2G" "mode=755" ]; }; This will limit / to taking up 2 GB of storage at most. This will mostly contain temporary files and the like, but you should adjust this as makes sense given the amount of ram your systems have. I personally think that 512 MB could make sense depending on what you are doing. Using Impermanence Now we get to add impermanence to the mix to handle making all of those pesky bind mounts for us on boot. One of the easiest ways you can add its module to the nix search path is to set the NIX_PATH environment variable like this: export NIX_PATH=nixpkgs=channel:nixos-21.05:impermanence=https://github.com/nix-community/impermanence/archive/refs/heads/master.tar.gz:nixos-config=/etc/nixos/configuration.nix This will set the import path <impermanence> to point to the git repository for impermanence. Depending on your security needs you may want to mirror the impermanence git repo, but keep in mind it needs to point to a tarball for Nix to understand what to do with it. Once you have that added, you can add the impermanence configuration to your /etc/nixos/configuration.nix: environment.persistence."/nix/persist" = { directories = [ "/etc/nixos" # nixos system config files, can be considered optional "/srv" # service data "/var/lib" # system service persistent data "/var/log" # the place that journald dumps it logs to ]; }; Finally you'll want to set these configuration lines for files in /etc/sshd. I've tried doing it directly in environment.persistence.<name>.directories directly but it seems to make sshd.service unable to generate its host keys, which is slightly important for sshd to work at all. These lines will point the files to the right places: environment.etc."ssh/ssh_host_rsa_key".source = "/nix/persist/etc/ssh/ssh_host_rsa_key"; environment.etc."ssh/ssh_host_rsa_key.pub".source = "/nix/persist/etc/ssh/ssh_host_rsa_key.pub"; environment.etc."ssh/ssh_host_ed25519_key".source = "/nix/persist/etc/ssh/ssh_host_ed25519_key"; environment.etc."ssh/ssh_host_ed25519_key.pub".source = "/nix/persist/etc/ssh/ssh_host_ed25519_key.pub"; The machine ID may be important too if you want to read logs locally after you reboot, or if you have any services that expect the machine ID to not change. environment.etc."machine-id".source = "/nix/persist/etc/machine-id"; From here you can continue with nixos-install like normal (though you may want to add --no-root-passwd if you added a default root password to your config for bootstrap reasons only). However if you want to be lazy you can read below where I show you how to automatically create an ISO that does all this for you. Repeatable Base Image with an ISO Using the setup I mentioned in a past post, you can create an automatic install ISO that will take a blank disk to a state where you can SSH into it and configure it further using a tool like morph. Take a look at this folder in my nixos-configs repo for more information. Most of the magic is done with the build script. It's basically the last few sections of this article turned into nix files. If you build it yourself you'll want to take care with the line that looks like this: users.users.root.initialPassword = "hunter2"; users.users.root.openssh.authorizedKeys.keyFiles = [ (fetchKeys "Xe") ]; This sets the root password to hunter2 (a reasonably secure default for bootstrapping systems only, holy crap do not use this in production) so you can log in with the console and the list of SSH keys from here. Replace Xe with your GitHub username. This is not the most deterministic, but if GitHub is down you probably have bigger problems. It's also a decent crutch to help you bootstrap things. If this bothers you you can set authorized keys as normal: users.users.root.openssh.authorizedKeys.keys = [ "ssh-yolo swag420blazeit" ]; You can turn this into an EC2 image with something like packer. Audit Tracing The Linux kernel has some fancy auditing powers that are criminally under-used. Mara is happy <Mara> Isn't that because the audit subsystem has the ergonomics of driving a submarine down a road? Well, yes but until I learn how to summon the right kinds of daemons, I can start with this audit rule to log every single time a program is attempted to be run: # hosts/meeka/auditd.nix { ... }: { security.auditd.enable = true; security.audit.enable = true; security.audit.rules = [ "-a exit,always -F arch=b64 -S execve" ]; } You can monitor these logs with journalctl -f. If you don't see any audit logs show up, ssh in from another window and run some commands like ls. You should see a flurry of them show up. Send All Logs Off-Machine You should really treat all system-local logs as radioactive. They are liabilities and in some cases can present problematic situations when faced with questionable interpretations of things like the GDPR. Not to mention attackers will be tempted to wipe all record of their attacks from them. I don't really have a suggestion for the best practice here, but I'm sure that people smarter than me have come up with good suggestions in my place. Either way, get them off the system as fast as possible. You should probably have some process scraping the audit logs to check for programs outside of /nix/store being executed. That can sometimes point to signs of a break-in. Numa is delet <Numa> Quis custodiet ipsos custodes? Optional Steps Normally a lot of these suggestions are aimed at not totally interfering with normal usability so that in case you need to debug things you can do so with surgical precision. However, depending on your level of paranoia you may want to go a step further and disable some things that most may consider to be a "core part of basic usability". Just be aware that these things may make debugging an errant system difficult. Rip Out sudo sudo is a commonly used tool that allows users to assume superuser powers for a short amount of time. The things they do with sudo are logged to the system, but this project has been known to occasionally have security issues. Mara is hmm <Mara> Isn't that because it's written in C and C is inherently unsafe even though hordes of "experts" decry otherwise? Cadey is facepalm <Cadey> Don't say that, you'll incite the horde. NixOS lets us rip that out if we want to: # hosts/meeka/sudo.nix { ... }: { security.sudo.enable = false; } If you want to keep it around but instead limit its use to users that are in the wheel group, you can instead opt for something like this: # hosts/meeka/sudo.nix { ... }: { security.sudo.execWheelOnly = true; } Rip Out Default Packages By default NixOS comes with a few packages like nano, perl and rsync to help you get started using it. These are great and all, but can be slightly incredibly problematic from a security standpoint. Rip them out like this: # hosts/meeka/no-defaults.nix { lib, ... }: { environment.defaultPackages = lib.mkForce []; } Mara is hacker <Mara> The lib.mkForce function forcibly overrides the contents of that value to what you give as an argument. This is useful for saying "no, heck you, I want it to be set to this no matter what anyone else says". This can be a useful hammer when correcting the security model of NixOS services when you have a good reason to. Disable sshd Features sshd is great. You can use it to log into systems, proxy traffic and more. sshd is also horrible because you can proxy traffic and more, turning a machine into an unexpected jumpbox for attackers. This is not ideal for machines that you don't expect to be jumpboxes. Disable this feature and some more (such as X11 forwarding, SSH agent forwarding and stream-local forwarding) like this: # configuration/meeka/sshd.nix { ... }: { services.openssh = { passwordAuthentication = false; allowSFTP = false; # Don't set this if you need sftp challengeResponseAuthentication = false; extraConfig = '' AllowTcpForwarding yes X11Forwarding no AllowAgentForwarding no AllowStreamLocalForwarding no AuthenticationMethods publickey ''; }; } Mark All Partitions but /nix/store as noexec This is the most paranoid of the ideas in this post. The idea is that if you lock down the package manager so random services can't install software and you also make it impossible for them to write and run executable files outside of /nix/store, it becomes very difficult to exploit kernel bugs to get root. Add this with the other systemd isolation features that disable access to device nodes and twiddly system flags and you have a defense in depth setup that will make an attacker's life hard. They will have to get code execution in your services to do any damage. Keep in mind that doing this will likely break the heck out of Nix when it needs to build things. In my testing it's been fine, however I am not an expert in these things. Something else to keep in mind is that you should configure your services to be denied access to /nix/persist and instead only allow them access to individual paths in the bind mounts on /, just in case they do that to try and sneak an executable through. This will not stop them from making a shell script and running it with bash ./foo.sh, but it will make it annoying to run things like C executables, which is much more important in this case. For this you can set the following NixOS options: # hosts/meeka/noexec.nix { ... }: { fileSystems."/".options = [ "noexec" ]; fileSystems."/etc/nixos".options = [ "noexec" ]; fileSystems."/srv".options = [ "noexec" ]; fileSystems."/var/log".options = [ "noexec" ]; } This will make /nix/store (or symlinks to files in /nix/store) the only binaries that are allowed to be executed. This is a rather extreme step, but it should fairly sufficiently prevent any attacker from getting very far with exploits written in languages like C (which also means that it prevents bitcoin miner bots from running). PCI Compliance Tip PCI Compliance requires you to have an antivirus program installed on every server. It doesn't say anything about the program running, but just it being installed is enough. Get one step closer to PCI compliance with this one neat trick: # hosts/meeka/pci-compliance-pass.nix { pkgs, ... }: { environment.systemPackages = with pkgs; [ clamav ]; } Mara is hmm <Mara> ...doesn't that defeat the spirit of the thing? Cadey is coffee <Cadey> To be honest, if you get to the end of those post and have an "all yes config" of this setup, installing an antivirus program to satisfy requirements that were primarily written for windows servers is probably one of the easiest steps you can take. All in all, this entire setup will let you get a rather paranoid configuration that will reject everything outside of the golden path of what you told the machines to do. It will take some work to get to here (as well as being willing to experiment with a few virtual machines to test this process a few times before feeling safe enough to put this into production), but the end result should be a decently secure setup. Obligatory warning: don't put this directly into production unless you know what you are doing, or at least can claim you know what you are doing with enough certainty to make servers difficult to debug. Have a way to "break the glass" and go back to a less noexec setup if you need to, it will save your ass. Mara is hacker <Mara> Oh, also be sure to import all of those random .nix files if you want to use it in one cohesive system config. That may be a slight bit entirely essential. _ This article was posted on M07 18 2021. Facts and circumstances may have changed since publication. Please contact me before jumping to conclusions if something seems wrong or unclear. Series: nixos Tags: paranoid noexec This post was WebMentioned at the following URLs: The art for Mara was drawn by Selicre. The art for Cadey was drawn by ArtZora Studios.
__label__pos
0.556485
Optimize Your Gameplay: Reduce Input Lag on GeForce Now Find AI Tools No difficulty No complicated process Find ai tools Optimize Your Gameplay: Reduce Input Lag on GeForce Now Table of Contents 1. Introduction 2. The Importance of Reducing Lag in Games 3. Method 1: Optimizing GeForce Now Settings in the Browser 4. Method 2: Optimizing GeForce Now Settings in the App 5. Additional Software Settings for Fortnite 6. Improving Latency from Your Side 7. Hardwired Connection vs. Wi-Fi 8. 5G Network vs. Lower Frequencies 9. Port Forwarding for Better Performance 10. Avoiding the Use of VPN 11. Checking Wi-Fi Channels and Adjusting 12. Checking Firewalls for Potential Blocks 13. Conclusion 🔥Reducing Lag When Using GeForce Now to Play Games🔥 Are you tired of experiencing lag while playing games, especially on GeForce Now? Lag can be frustrating and significantly affect your gaming experience. However, there are several methods you can employ to reduce lag and optimize your gameplay. In this article, we will guide you through the steps to minimize lag when playing games like Fortnite on GeForce Now. So, let's dive in! 1️⃣ Method 1: Optimizing GeForce Now Settings in the Browser When using the browser-based version of GeForce Now, you can make a few adjustments to improve your streaming quality. Start by opening the settings menu and navigating to "Stream Quality and Server Location." By default, the server location is set to "auto." However, to reduce lag, it is recommended to choose the location nearest to you. Additionally, you can adjust the stream quality based on your internet speeds. 2️⃣ Method 2: Optimizing GeForce Now Settings in the App For a smoother gaming experience, it is advisable to use the GeForce Now app instead of the browser-based version. The app provides more options to customize your settings. After downloading and opening the app, access the settings menu. Here, you'll find additional stream quality options. Ensure to set the stream quality, bit rate, resolution, and frames per Second according to your preferences and internet connection. You may also want to consider turning off v-sync and motion blur for improved performance. 3️⃣ Additional Software Settings for Fortnite To further enhance your gameplay experience on GeForce Now, pay attention to the in-game settings of Fortnite itself. First, access the settings menu in Fortnite and navigate to the graphics section. Here, you can adjust the frame rate limit, graphical quality, and disable settings like shadows and anti-aliasing. Disable v-sync and motion blur in the advanced graphics settings to reduce screen tearing and input lag. Applying these configurations will optimize your gameplay performance in Fortnite. 4️⃣ Improving Latency from Your Side Aside from optimizing GeForce Now and Fortnite settings, there are steps you can take to improve your connection's latency. If possible, try using a hardwired connection instead of relying on Wi-Fi. For devices without an Ethernet connection, you can purchase a USB-C or USB-A to Ethernet adapter. If using Wi-Fi, connect to the 5G network for better performance. Additionally, consider adjusting your router settings, such as disabling QoS (Quality of Service) and implementing port forwarding. 5️⃣ Hardwired Connection vs. Wi-Fi Using a hardwired connection offers several advantages over a Wi-Fi connection when it comes to reducing lag in gaming. A hardwired connection provides a more stable and reliable connection, minimizing latency and potential interference. On the other HAND, Wi-Fi connections can experience fluctuations and interference from other devices, leading to increased lag and inconsistent gameplay. If possible, always opt for a hardwired connection for the best gaming experience. 6️⃣ 5G Network vs. Lower Frequencies When utilizing Wi-Fi for gaming on GeForce Now, connecting to the 5G network can significantly improve performance. Compared to lower frequencies, the 5G network provides faster data transfer speeds and lower latency, resulting in smoother gameplay. However, if your Wi-Fi does not support the 5G network, consider upgrading your equipment or positioning yourself closer to the router to minimize lag. 7️⃣ Port Forwarding for Better Performance Port forwarding is a technique that can enhance your gaming performance, not only on GeForce Now but also on other platforms like PS4, PS5, and Xbox. By freeing up specific ports, you allow for more efficient data transmission, reducing lag and improving overall gameplay. numerous resources are available online that provide step-by-step guides on implementing port forwarding for various router models. Consider exploring this option to optimize your gaming experience. 8️⃣ Avoiding the Use of VPN While using a Virtual Private Network (VPN) may be advantageous in certain situations, it is not recommended for gaming on GeForce Now. VPNs can introduce additional latency and hinder the direct connection between the cloud and your network. To achieve the best gaming performance and reduce lag, avoid using VPN services while playing games on GeForce Now. 9️⃣ Checking Wi-Fi Channels and Adjusting To further optimize your Wi-Fi connection and minimize interference, consider checking the Wi-Fi channels in use around your area. By using Wi-Fi analyzer apps, you can identify the channel your network is currently on and determine if there is congestion or overlapping with neighboring networks. If necessary, switch to a less crowded channel to improve your Wi-Fi connection's stability and reduce lag while gaming. 1️⃣0️⃣ Checking Firewalls for Potential Blocks Firewalls can sometimes block specific ports or applications, resulting in increased lag during gameplay. Make sure to review your firewall settings, both on your router and computer, to ensure they do not interfere with GeForce Now or Fortnite. If necessary, create exceptions or disable certain firewall settings to allow for smooth and uninterrupted gaming Sessions. 🌟Highlights: • Optimizing GeForce Now settings on both the browser and the app versions. • Additional software settings within Fortnite for enhanced performance. • Improving latency through hardwired connections and 5G networks. • Utilizing port forwarding to optimize data transmission. • The importance of avoiding VPN and checking firewall settings. • Checking Wi-Fi channels for better signal quality. 📝FAQs: Q: Can I reduce lag in games other than Fortnite? A: Yes, the methods discussed in this article can be applied to various games on GeForce Now, not just Fortnite. Q: Are there any disadvantages to using Wi-Fi instead of a hardwired connection? A: While Wi-Fi can provide convenience, it may introduce more latency and potential interference compared to a hardwired connection. Hardwired connections offer more stable and reliable performance for gaming. Q: Is port forwarding necessary for optimizing gameplay? A: Port forwarding can help improve connectivity and reduce lag, but it is not essential for all users. It primarily benefits those experiencing specific network issues or playing on devices that require it. Resources: Most people like Are you spending too much time looking for ai tools? App rating 4.9 AI Tools 100k+ Trusted Users 5000+ WHY YOU SHOULD CHOOSE TOOLIFY TOOLIFY is the best ai tool source. Browse More Content
__label__pos
0.861367
WHAT IS SOCIAL ENGINEERING? ATTACKS, TECHNIQUES & PREVENTION What is social engineering? Social engineering is the art of tampering with the users of a computer system to reveal a confidential system that can be used to gain unauthorized access to a computer system. The term may also include activities such as accessing restricted access buildings to use human kindness, greed and curiosity, or having users install backdoor software. Knowing the tricks used by hackers to protect computer systems is necessary to provide users with important login information among others. In this tutorial, we will introduce you to common social engineering techniques and how you can find security measures to counter them. Topics covered in this tutorial How does social engineering work? General Social Engineering Techniques Social Engineering Countermeasures How does social engineering work? How to hack using social engineering here, Gather Information: This is the first step, he learns as much as he can about the intended victim. The information is collected by talking with company websites, other publications, and sometimes, users of the target system. Plan of attack: The attackers describe how they want to execute the attack. Acquisition Tool: Include computer programs that an attacker will use when launching an attack. Attack: exploits weaknesses in the target system. Use acquired knowledge: Information gathered during the strategy of social engineering, such as pet names, birth dates of the founders of the organization, etc., is used in attacks such as password guessing. Common Social Engineering Techniques: Social engineering techniques can take many forms. The following is a list of commonly used techniques. Family abuse: Users are less distrustful of people they are familiar with. An attacker may be familiar with users of the target system before a social engineering attack. The attacker may interact with users during meals, users may be involved in social events when they are smoking, etc. This introduces the attacker to the users. Suppose the user works in a building that needs an access code or card to gain access; Upon entering these locations the attacker can follow the users. Users prefer to keep the door open so that the attacker can enter, as they are familiar with them. The attacker can also ask questions such as where he met his spouse, the name of his high school math teacher, etc. Users are more likely to reveal answers because they rely on familiar faces. This information can be used to hack email accounts and other accounts that ask similar questions if you forget your password. Scaring situations: People avoid people who scare others around them. Using this technique, the attacker may pretend to have a heated argument over the phone or with a partner in the plan. Then, the attacker can ask users for information that will be used to compromise the security of the user system. Users are likely to provide the correct answer to avoid a collision with the attacker. This technique can also be used to prevent this in a security checkpoint. Phishing: This technique uses tricks and tricks to obtain private data from users. Social engineers can try to place an actual website like Yahoo and then ask the user to confirm their account name and password. This technique can also be used to obtain credit card information or any other valuable personal information. Wheel Sucking: This technique involves following users after entering restricted areas. As a human etiquette, the user is very likely to let the social engineer enter the restricted area. Exploiting human curiosity: Using this technology, social engineers can intentionally place a flash disk infected with a virus into an area where users can easily pick it up. Most likely, the user connects the flash disk to the computer. The flash disk can run the virus automatically, or the user may be tempted to open a file, such as the Employee Revival Report 2013.docx, which may actually be an infected file. Exploiting human greed: Using this technology, the social engineer can lure the user with the promise of making a lot of money online by filling a form and verifying using their data Leave a Comment
__label__pos
0.954992
Sends a behavior to a device. Behaviors might not reach the device instantly based on the priority. • Low priority behaviors are placed in a queue, and handled to the device whenever the device communicates with the platform. Devices communicate with the platform based on their fixed reporting schedule, or whenever a specific event is triggered. • For high priority behaviors, the platform will make its best effort to deliver the behavior as soon as possible. The following behavior defines how to update the reporting frequency of a device { "name": "REPORT_FREQ", "description": "Change Reporting Frequency", "parameters": [ { "name": "frequency", "type": "number", "min": 5, "max": 60 } ] } To send this behavior to a device, the following POST body should be sent: { "name": "REPORT_FREQ", "parameters": { "frequency": 45 }, "highPriority": false } Sending a behavior to a device returns a task identifier that can later be used to query the status of a behavior. Language Authorization OAuth2 URL Click Try It! to start a request and see the response here!
__label__pos
0.998099
Image Download button Hey there I am trying to provide a download button in my frontend component to download images from a image gallery. its embarassing but i stuck with just downloading corrupt files. i tried it like s: <a href={downloadlink} download="img.png">some link</a> for the downloadlink i try to use the media.url prop what am i missing? thanks Hey Michael, I'm more than happy to help! The download attribute doesn't seem right, it goes by itself. So maybe something like this: <a href={downloadlink} download> Some link </a> Using the download attribute in the anchor isn't something that isn't working as it used to anymore. There are many resources online explaining why; this one, for example, outlines why browsers don't support this attribute as a security measurement. Basically, if your resource to be downloaded isn't served from the same origin or same server as your app, it won't get downloaded. A quick workaround would be to just add a target="_blank" attribute to the anchor tag so that the page at least opens in a new tab. <a href={media.url} download target="_blank">some link</a> Let me know if this helps you This topic was automatically closed 24 hours after the last reply. New replies are no longer allowed.
__label__pos
0.61191
How to retrieve SObject using Schema.SObjectType class? 190    Asked by Aalapprabhakaran in Salesforce , Asked on May 4, 2023 I am trying to create a dynamic class to retrieve a record for update. I struggle with the following part of the code: targetSObject = new sor.getSObjectType()(ID = sObjectID); For example, if this were an account record, I would want the result to be: targetSobject = new Account(ID = '0016A000003tqQfQAI') Essentially what I am asking is how do I recreate the above example using the Schema class. Also, I am curious what the community thinks about retrieving records using the new Sobject(ID = '...') public with sharing class UpdateAccountGoalsFromOpp {     Map> sorToUpdate = new Map>();     public SObject getSObject(ID sObjectID)     {         Schema.DescribeSObjectResult sor = sObjectID.getSobjectType().getDescribe();         String recObject = String.valueOf(sor.getName());         if(!sorToUpdate.containsKey(recObject))         {             sorToUpdate.put(recObject, new Map());         }         SObject targetSObject = sorToUpdate.get(recObject).get(sObjectID);         if(targetSObject == null)         {             targetSObject = new sor.getSObjectType()(ID = sObjectID);             sorToUpdate.get(recObject).put(sObjectID, targetSObject);         }         return targetSObject;     } } After doing research: targetSObject = Schema.getGlobalDescribe().get(recObject).newSObject(sObjectID); ^ I think the above code may be the equivalent to: targetSobject = new Account(ID = '0016A000003tqQfQAI') Answered by Buffy Heaton To retrieve SObject using Schema.SObjectType class- From the sObjectType object, use the newSobject method to create a new record in memory. It accepts a single optional parameter for the record Id: targetSObject = new sor.getSObjectType().newSobject(sObjectID); As an aside, if you already know the Id, you don't need the describe: targetSObject = sObjectID.getSobjectType().newSobject(sObjectID); Also, you can use an sObjectType token instead of a string to avoid a describe call entirely: Map> sorToUpdate = new Map>(); ... sObjectType sot = sObjectID.getSobjectType(); if(!sorToUpdate.containsKey(sot)) {   sorToUpdate.put(sot, new Map()); } Your Answer Interviews Parent Categories
__label__pos
0.9999
Take the 2-minute tour × Stack Overflow is a question and answer site for professional and enthusiast programmers. It's 100% free, no registration required. I tried var process = new Process { StartInfo = new ProcessStartInfo { FileName = filename, UserName = "System", UseShellExecute = false, }, }; process.Start(); but it yields Win32Exception was unhandled Login failed: unknown user name or wrong password I will have to use CreateProcessAsUser? How can I get the appropriate parameters to pass to that method? share|improve this question add comment 2 Answers 2 up vote 5 down vote accepted The System accounts password is maintained interally by Windows (I think) i.e. attempting to start a process as the System account by supplying credentials in this way is ultimately destined to failure. I did however find a forum post that describes a neat trick that can be used to run processes under the system account by (ab)using windows services: Tip: Run process in system account (sc.exe) Alternatively the Windows Sysinternals tool PsExec appears to allow you to run a process under the System account by using the -s switch. share|improve this answer 1   psexec -s is my usual approach. Remember that psexec does require an elevated launcher itself. –  Richard Jul 13 '11 at 13:47 add comment The Username should be LocalSystem if you want to run your process with high privileges (it's a member of Administrators group) or LocalService for normal privileges EDIT: My mistake LocalSystem & LocalService are not regulary users and, therefore, they cannot be provided as a username. Kragen's solution is the right one share|improve this answer      Thanks! But it showed the same error –  Jader Dias Jul 13 '11 at 13:45 add comment Your Answer   discard By posting your answer, you agree to the privacy policy and terms of service. Not the answer you're looking for? Browse other questions tagged or ask your own question.
__label__pos
0.847316
blob: f94e220c0f0a60ed54a96c36493daff661f92695 [file] [log] [blame] // Copyright 2014 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #include "cc/raster/bitmap_raster_buffer_provider.h" #include <stddef.h> #include <stdint.h> #include <algorithm> #include "base/strings/stringprintf.h" #include "base/trace_event/process_memory_dump.h" #include "base/trace_event/trace_event.h" #include "base/trace_event/traced_value.h" #include "cc/raster/raster_source.h" #include "cc/trees/layer_tree_frame_sink.h" #include "components/viz/common/resources/bitmap_allocation.h" #include "components/viz/common/resources/platform_color.h" namespace cc { namespace { class BitmapSoftwareBacking : public ResourcePool::SoftwareBacking { public: ~BitmapSoftwareBacking() override { frame_sink->DidDeleteSharedBitmap(shared_bitmap_id); } void OnMemoryDump( base::trace_event::ProcessMemoryDump* pmd, const base::trace_event::MemoryAllocatorDumpGuid& buffer_dump_guid, uint64_t tracing_process_id, int importance) const override { pmd->CreateSharedMemoryOwnershipEdge( buffer_dump_guid, shared_memory->mapped_id(), importance); } LayerTreeFrameSink* frame_sink; std::unique_ptr<base::SharedMemory> shared_memory; }; class BitmapRasterBufferImpl : public RasterBuffer { public: BitmapRasterBufferImpl(const gfx::Size& size, const gfx::ColorSpace& color_space, void* pixels, uint64_t resource_content_id, uint64_t previous_content_id) : resource_size_(size), color_space_(color_space), pixels_(pixels), resource_has_previous_content_( resource_content_id && resource_content_id == previous_content_id) { } BitmapRasterBufferImpl(const BitmapRasterBufferImpl&) = delete; BitmapRasterBufferImpl& operator=(const BitmapRasterBufferImpl&) = delete; // Overridden from RasterBuffer: void Playback(const RasterSource* raster_source, const gfx::Rect& raster_full_rect, const gfx::Rect& raster_dirty_rect, uint64_t new_content_id, const gfx::AxisTransform2d& transform, const RasterSource::PlaybackSettings& playback_settings, const GURL& url) override { TRACE_EVENT0("cc", "BitmapRasterBuffer::Playback"); gfx::Rect playback_rect = raster_full_rect; if (resource_has_previous_content_) { playback_rect.Intersect(raster_dirty_rect); } DCHECK(!playback_rect.IsEmpty()) << "Why are we rastering a tile that's not dirty?"; size_t stride = 0u; RasterBufferProvider::PlaybackToMemory( pixels_, viz::RGBA_8888, resource_size_, stride, raster_source, raster_full_rect, playback_rect, transform, color_space_, /*gpu_compositing=*/false, playback_settings); } private: const gfx::Size resource_size_; const gfx::ColorSpace color_space_; void* const pixels_; bool resource_has_previous_content_; }; } // namespace BitmapRasterBufferProvider::BitmapRasterBufferProvider( LayerTreeFrameSink* frame_sink) : frame_sink_(frame_sink) {} BitmapRasterBufferProvider::~BitmapRasterBufferProvider() = default; std::unique_ptr<RasterBuffer> BitmapRasterBufferProvider::AcquireBufferForRaster( const ResourcePool::InUsePoolResource& resource, uint64_t resource_content_id, uint64_t previous_content_id) { DCHECK_EQ(resource.format(), viz::RGBA_8888); const gfx::Size& size = resource.size(); const gfx::ColorSpace& color_space = resource.color_space(); if (!resource.software_backing()) { auto backing = std::make_unique<BitmapSoftwareBacking>(); backing->frame_sink = frame_sink_; backing->shared_bitmap_id = viz::SharedBitmap::GenerateId(); backing->shared_memory = viz::bitmap_allocation::AllocateMappedBitmap(size, viz::RGBA_8888); mojo::ScopedSharedBufferHandle handle = viz::bitmap_allocation::DuplicateAndCloseMappedBitmap( backing->shared_memory.get(), size, viz::RGBA_8888); frame_sink_->DidAllocateSharedBitmap(std::move(handle), backing->shared_bitmap_id); resource.set_software_backing(std::move(backing)); } BitmapSoftwareBacking* backing = static_cast<BitmapSoftwareBacking*>(resource.software_backing()); return std::make_unique<BitmapRasterBufferImpl>( size, color_space, backing->shared_memory->memory(), resource_content_id, previous_content_id); } void BitmapRasterBufferProvider::Flush() {} viz::ResourceFormat BitmapRasterBufferProvider::GetResourceFormat() const { return viz::RGBA_8888; } bool BitmapRasterBufferProvider::IsResourceSwizzleRequired() const { // This value only used by gpu compositing. Software compositing resources // are all in the native skia byte ordering, and the display compositor will // do its drawing in the same order. return false; } bool BitmapRasterBufferProvider::IsResourcePremultiplied() const { return true; } bool BitmapRasterBufferProvider::CanPartialRasterIntoProvidedResource() const { return true; } bool BitmapRasterBufferProvider::IsResourceReadyToDraw( const ResourcePool::InUsePoolResource& resource) const { // Bitmap resources are immediately ready to draw. return true; } uint64_t BitmapRasterBufferProvider::SetReadyToDrawCallback( const std::vector<const ResourcePool::InUsePoolResource*>& resources, base::OnceClosure callback, uint64_t pending_callback_id) const { // Bitmap resources are immediately ready to draw. return 0; } void BitmapRasterBufferProvider::Shutdown() {} bool BitmapRasterBufferProvider::CheckRasterFinishedQueries() { return false; } } // namespace cc
__label__pos
0.999749
You are reading an old version of the documentation (v2.2.5). For the latest version see https://matplotlib.org/stable/ Version 2.2.5 matplotlib Fork me on GitHub Related Topics Embedding in Tk Canvas Embedding plots in a Tk Canvas. import matplotlib as mpl import numpy as np import sys if sys.version_info[0] < 3: import Tkinter as tk else: import tkinter as tk import matplotlib.backends.tkagg as tkagg from matplotlib.backends.backend_agg import FigureCanvasAgg def draw_figure(canvas, figure, loc=(0, 0)): """ Draw a matplotlib figure onto a Tk canvas loc: location of top-left corner of figure on canvas in pixels. Inspired by matplotlib source: lib/matplotlib/backends/backend_tkagg.py """ figure_canvas_agg = FigureCanvasAgg(figure) figure_canvas_agg.draw() figure_x, figure_y, figure_w, figure_h = figure.bbox.bounds figure_w, figure_h = int(figure_w), int(figure_h) photo = tk.PhotoImage(master=canvas, width=figure_w, height=figure_h) # Position: convert from top-left anchor to center anchor canvas.create_image(loc[0] + figure_w/2, loc[1] + figure_h/2, image=photo) # Unfortunately, there's no accessor for the pointer to the native renderer tkagg.blit(photo, figure_canvas_agg.get_renderer()._renderer, colormode=2) # Return a handle which contains a reference to the photo object # which must be kept live or else the picture disappears return photo # Create a canvas w, h = 300, 200 window = tk.Tk() window.title("A figure in a canvas") canvas = tk.Canvas(window, width=w, height=h) canvas.pack() # Generate some example data X = np.linspace(0, 2 * np.pi, 50) Y = np.sin(X) # Create the figure we desire to add to an existing canvas fig = mpl.figure.Figure(figsize=(2, 1)) ax = fig.add_axes([0, 0, 1, 1]) ax.plot(X, Y) # Keep this handle alive, or else figure will disappear fig_x, fig_y = 100, 100 fig_photo = draw_figure(canvas, fig, loc=(fig_x, fig_y)) fig_w, fig_h = fig_photo.width(), fig_photo.height() # Add more elements to the canvas, potentially on top of the figure canvas.create_line(200, 50, fig_x + fig_w / 2, fig_y + fig_h / 2) canvas.create_text(200, 50, text="Zero-crossing", anchor="s") # Let Tk take over tk.mainloop() Keywords: matplotlib code example, codex, python plot, pyplot Gallery generated by Sphinx-Gallery
__label__pos
0.996971
1 /* 2 * CDDL HEADER START 3 * 4 * The contents of this file are subject to the terms of the 5 * Common Development and Distribution License (the "License"). 6 * You may not use this file except in compliance with the License. 7 * 8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 9 * or http://www.opensolaris.org/os/licensing. 10 * See the License for the specific language governing permissions 11 * and limitations under the License. 12 * 13 * When distributing Covered Code, include this CDDL HEADER in each 14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 15 * If applicable, add the following below this CDDL HEADER, with the 16 * fields enclosed by brackets "[]" replaced with your own identifying 17 * information: Portions Copyright [yyyy] [name of copyright owner] 18 * 19 * CDDL HEADER END 20 */ 21 /* 22 * Copyright 2010 Sun Microsystems, Inc. All rights reserved. 23 * Use is subject to license terms. 24 */ 25 26 27 /* 28 * The ioctl interface for administrative commands. 29 */ 30 31 #include <sys/types.h> 32 #include <sys/modctl.h> 33 #include <sys/conf.h> 34 #include <sys/stat.h> 35 #include <sys/ddi.h> 36 #include <sys/sunddi.h> 37 #include <sys/kmem.h> 38 #include <sys/errno.h> 39 #include <sys/ksynch.h> 40 #include <sys/file.h> 41 #include <sys/open.h> 42 #include <sys/cred.h> 43 #include <sys/model.h> 44 #include <sys/sysmacros.h> 45 #include <sys/crypto/common.h> 46 #include <sys/crypto/api.h> 47 #include <sys/crypto/impl.h> 48 #include <sys/crypto/sched_impl.h> 49 #include <sys/crypto/ioctladmin.h> 50 #include <c2/audit.h> 51 #include <sys/disp.h> 52 53 /* 54 * DDI entry points. 55 */ 56 static int cryptoadm_attach(dev_info_t *, ddi_attach_cmd_t); 57 static int cryptoadm_detach(dev_info_t *, ddi_detach_cmd_t); 58 static int cryptoadm_getinfo(dev_info_t *, ddi_info_cmd_t, void *, void **); 59 static int cryptoadm_open(dev_t *, int, int, cred_t *); 60 static int cryptoadm_close(dev_t, int, int, cred_t *); 61 static int cryptoadm_ioctl(dev_t, int, intptr_t, int, cred_t *, int *); 62 63 extern void audit_cryptoadm(int, char *, crypto_mech_name_t *, uint_t, 64 uint_t, uint32_t, int); 65 66 /* 67 * Module linkage. 68 */ 69 static struct cb_ops cbops = { 70 cryptoadm_open, /* cb_open */ 71 cryptoadm_close, /* cb_close */ 72 nodev, /* cb_strategy */ 73 nodev, /* cb_print */ 74 nodev, /* cb_dump */ 75 nodev, /* cb_read */ 76 nodev, /* cb_write */ 77 cryptoadm_ioctl, /* cb_ioctl */ 78 nodev, /* cb_devmap */ 79 nodev, /* cb_mmap */ 80 nodev, /* cb_segmap */ 81 nochpoll, /* cb_chpoll */ 82 ddi_prop_op, /* cb_prop_op */ 83 NULL, /* cb_streamtab */ 84 D_MP, /* cb_flag */ 85 CB_REV, /* cb_rev */ 86 nodev, /* cb_aread */ 87 nodev, /* cb_awrite */ 88 }; 89 90 static struct dev_ops devops = { 91 DEVO_REV, /* devo_rev */ 92 0, /* devo_refcnt */ 93 cryptoadm_getinfo, /* devo_getinfo */ 94 nulldev, /* devo_identify */ 95 nulldev, /* devo_probe */ 96 cryptoadm_attach, /* devo_attach */ 97 cryptoadm_detach, /* devo_detach */ 98 nodev, /* devo_reset */ 99 &cbops, /* devo_cb_ops */ 100 NULL, /* devo_bus_ops */ 101 NULL, /* devo_power */ 102 ddi_quiesce_not_needed, /* devo_quiesce */ 103 }; 104 105 static struct modldrv modldrv = { 106 &mod_driverops, /* drv_modops */ 107 "Cryptographic Administrative Interface", /* drv_linkinfo */ 108 &devops, 109 }; 110 111 static struct modlinkage modlinkage = { 112 MODREV_1, /* ml_rev */ 113 &modldrv, /* ml_linkage */ 114 NULL 115 }; 116 117 static dev_info_t *cryptoadm_dip = NULL; 118 119 /* 120 * DDI entry points. 121 */ 122 int 123 _init(void) 124 { 125 return (mod_install(&modlinkage)); 126 } 127 128 int 129 _fini(void) 130 { 131 return (mod_remove(&modlinkage)); 132 } 133 134 int 135 _info(struct modinfo *modinfop) 136 { 137 return (mod_info(&modlinkage, modinfop)); 138 } 139 140 /* ARGSUSED */ 141 static int 142 cryptoadm_getinfo(dev_info_t *dip, ddi_info_cmd_t cmd, void *arg, void **result) 143 { 144 switch (cmd) { 145 case DDI_INFO_DEVT2DEVINFO: 146 *result = (void *)cryptoadm_dip; 147 return (DDI_SUCCESS); 148 149 case DDI_INFO_DEVT2INSTANCE: 150 *result = (void *)0; 151 return (DDI_SUCCESS); 152 } 153 return (DDI_FAILURE); 154 } 155 156 static int 157 cryptoadm_attach(dev_info_t *dip, ddi_attach_cmd_t cmd) 158 { 159 if (cmd != DDI_ATTACH) { 160 return (DDI_FAILURE); 161 } 162 if (ddi_get_instance(dip) != 0) { 163 /* we only allow instance 0 to attach */ 164 return (DDI_FAILURE); 165 } 166 167 /* create the minor node */ 168 if (ddi_create_minor_node(dip, "cryptoadm", S_IFCHR, 0, 169 DDI_PSEUDO, 0) != DDI_SUCCESS) { 170 cmn_err(CE_WARN, "cryptoadm: failed creating minor node"); 171 ddi_remove_minor_node(dip, NULL); 172 return (DDI_FAILURE); 173 } 174 175 cryptoadm_dip = dip; 176 177 return (DDI_SUCCESS); 178 } 179 180 static int 181 cryptoadm_detach(dev_info_t *dip, ddi_detach_cmd_t cmd) 182 { 183 if (cmd != DDI_DETACH) 184 return (DDI_FAILURE); 185 186 cryptoadm_dip = NULL; 187 ddi_remove_minor_node(dip, NULL); 188 189 return (DDI_SUCCESS); 190 } 191 192 /* ARGSUSED */ 193 static int 194 cryptoadm_open(dev_t *devp, int flag, int otyp, cred_t *credp) 195 { 196 if (otyp != OTYP_CHR || cryptoadm_dip == NULL) 197 return (ENXIO); 198 199 /* exclusive opens are not supported */ 200 if (flag & FEXCL) 201 return (ENOTSUP); 202 203 *devp = makedevice(getmajor(*devp), 0); 204 205 kcf_sched_start(); 206 207 return (0); 208 } 209 210 /* ARGSUSED */ 211 static int 212 cryptoadm_close(dev_t dev, int flag, int otyp, cred_t *credp) 213 { 214 return (0); 215 } 216 217 /* 218 * Returns TRUE if array of size MAXNAMELEN contains a '\0' 219 * termination character, otherwise, it returns FALSE. 220 */ 221 static boolean_t 222 null_terminated(char *array) 223 { 224 int i; 225 226 for (i = 0; i < MAXNAMELEN; i++) 227 if (array[i] == '\0') 228 return (B_TRUE); 229 230 return (B_FALSE); 231 } 232 233 /* 234 * This ioctl returns an array of hardware providers. Each entry 235 * contains a device name, device instance, and number of 236 * supported mechanisms. 237 */ 238 /* ARGSUSED */ 239 static int 240 get_dev_list(dev_t dev, caddr_t arg, int mode, int *rval) 241 { 242 crypto_get_dev_list_t dev_list; 243 crypto_dev_list_entry_t *entries; 244 size_t copyout_size; 245 uint_t count; 246 ulong_t offset; 247 248 if (copyin(arg, &dev_list, sizeof (dev_list)) != 0) 249 return (EFAULT); 250 251 /* get the list from the core module */ 252 if (crypto_get_dev_list(&count, &entries) != 0) { 253 dev_list.dl_return_value = CRYPTO_FAILED; 254 if (copyout(&dev_list, arg, sizeof (dev_list)) != 0) { 255 return (EFAULT); 256 } 257 return (0); 258 } 259 260 /* check if buffer is too small */ 261 if (count > dev_list.dl_dev_count) { 262 dev_list.dl_dev_count = count; 263 dev_list.dl_return_value = CRYPTO_BUFFER_TOO_SMALL; 264 crypto_free_dev_list(entries, count); 265 if (copyout(&dev_list, arg, sizeof (dev_list)) != 0) { 266 return (EFAULT); 267 } 268 return (0); 269 } 270 271 dev_list.dl_dev_count = count; 272 dev_list.dl_return_value = CRYPTO_SUCCESS; 273 274 copyout_size = count * sizeof (crypto_dev_list_entry_t); 275 276 /* copyout the first stuff */ 277 if (copyout(&dev_list, arg, sizeof (dev_list)) != 0) { 278 crypto_free_dev_list(entries, count); 279 return (EFAULT); 280 } 281 282 /* copyout entries */ 283 offset = offsetof(crypto_get_dev_list_t, dl_devs); 284 if (count > 0 && copyout(entries, arg + offset, copyout_size) != 0) { 285 crypto_free_dev_list(entries, count); 286 return (EFAULT); 287 } 288 crypto_free_dev_list(entries, count); 289 return (0); 290 } 291 292 /* 293 * This ioctl returns a buffer containing the null terminated names 294 * of software providers. 295 */ 296 /* ARGSUSED */ 297 static int 298 get_soft_list(dev_t dev, caddr_t arg, int mode, int *rval) 299 { 300 STRUCT_DECL(crypto_get_soft_list, soft_list); 301 char *names; 302 size_t len; 303 uint_t count; 304 305 STRUCT_INIT(soft_list, mode); 306 307 if (copyin(arg, STRUCT_BUF(soft_list), STRUCT_SIZE(soft_list)) != 0) 308 return (EFAULT); 309 310 /* get the list from the core module */ 311 if (crypto_get_soft_list(&count, &names, &len) != 0) { 312 STRUCT_FSET(soft_list, sl_return_value, CRYPTO_FAILED); 313 if (copyout(STRUCT_BUF(soft_list), arg, 314 STRUCT_SIZE(soft_list)) != 0) { 315 return (EFAULT); 316 } 317 return (0); 318 } 319 320 /* check if buffer is too small */ 321 if (len > STRUCT_FGET(soft_list, sl_soft_len)) { 322 STRUCT_FSET(soft_list, sl_soft_count, count); 323 STRUCT_FSET(soft_list, sl_soft_len, len); 324 STRUCT_FSET(soft_list, sl_return_value, 325 CRYPTO_BUFFER_TOO_SMALL); 326 kmem_free(names, len); 327 if (copyout(STRUCT_BUF(soft_list), arg, 328 STRUCT_SIZE(soft_list)) != 0) { 329 return (EFAULT); 330 } 331 return (0); 332 } 333 334 STRUCT_FSET(soft_list, sl_soft_count, count); 335 STRUCT_FSET(soft_list, sl_soft_len, len); 336 STRUCT_FSET(soft_list, sl_return_value, CRYPTO_SUCCESS); 337 338 if (count > 0 && copyout(names, 339 STRUCT_FGETP(soft_list, sl_soft_names), len) != 0) { 340 kmem_free(names, len); 341 return (EFAULT); 342 } 343 kmem_free(names, len); 344 345 if (copyout(STRUCT_BUF(soft_list), arg, STRUCT_SIZE(soft_list)) != 0) { 346 return (EFAULT); 347 } 348 349 return (0); 350 } 351 352 /* 353 * This ioctl returns an array of mechanisms supported by the 354 * specified device. 355 */ 356 /* ARGSUSED */ 357 static int 358 get_dev_info(dev_t dev, caddr_t arg, int mode, int *rval) 359 { 360 crypto_get_dev_info_t dev_info; 361 crypto_mech_name_t *entries; 362 size_t copyout_size; 363 uint_t count; 364 ulong_t offset; 365 char *dev_name; 366 int rv; 367 368 if (copyin(arg, &dev_info, sizeof (dev_info)) != 0) 369 return (EFAULT); 370 371 dev_name = dev_info.di_dev_name; 372 /* make sure the device name is null terminated */ 373 if (!null_terminated(dev_name)) { 374 dev_info.di_return_value = CRYPTO_ARGUMENTS_BAD; 375 if (copyout(&dev_info, arg, sizeof (dev_info)) != 0) { 376 return (EFAULT); 377 } 378 return (0); 379 } 380 381 /* get mechanism names from the core module */ 382 if ((rv = crypto_get_dev_info(dev_name, dev_info.di_dev_instance, 383 &count, &entries)) != CRYPTO_SUCCESS) { 384 dev_info.di_return_value = rv; 385 if (copyout(&dev_info, arg, sizeof (dev_info)) != 0) { 386 return (EFAULT); 387 } 388 return (0); 389 } 390 391 /* check if buffer is too small */ 392 if (count > dev_info.di_count) { 393 dev_info.di_count = count; 394 dev_info.di_return_value = CRYPTO_BUFFER_TOO_SMALL; 395 crypto_free_mech_list(entries, count); 396 if (copyout(&dev_info, arg, sizeof (dev_info)) != 0) { 397 return (EFAULT); 398 } 399 return (0); 400 } 401 402 dev_info.di_count = count; 403 dev_info.di_return_value = CRYPTO_SUCCESS; 404 405 copyout_size = count * sizeof (crypto_mech_name_t); 406 407 /* copyout the first stuff */ 408 if (copyout(&dev_info, arg, sizeof (dev_info)) != 0) { 409 crypto_free_mech_list(entries, count); 410 return (EFAULT); 411 } 412 413 /* copyout entries */ 414 offset = offsetof(crypto_get_dev_info_t, di_list); 415 if (copyout(entries, arg + offset, copyout_size) != 0) { 416 crypto_free_mech_list(entries, count); 417 return (EFAULT); 418 } 419 crypto_free_mech_list(entries, count); 420 return (0); 421 } 422 423 /* 424 * This ioctl returns an array of mechanisms supported by the 425 * specified cryptographic module. 426 */ 427 /* ARGSUSED */ 428 static int 429 get_soft_info(dev_t dev, caddr_t arg, int mode, int *rval) 430 { 431 crypto_get_soft_info_t soft_info; 432 crypto_mech_name_t *entries; 433 size_t copyout_size; 434 uint_t count; 435 ulong_t offset; 436 char *name; 437 438 if (copyin(arg, &soft_info, sizeof (soft_info)) != 0) 439 return (EFAULT); 440 441 name = soft_info.si_name; 442 /* make sure the provider name is null terminated */ 443 if (!null_terminated(name)) { 444 soft_info.si_return_value = CRYPTO_ARGUMENTS_BAD; 445 if (copyout(&soft_info, arg, sizeof (soft_info)) != 0) { 446 return (EFAULT); 447 } 448 return (0); 449 } 450 451 /* get mechanism names from the core module */ 452 if (crypto_get_soft_info(name, &count, &entries) != 0) { 453 soft_info.si_return_value = CRYPTO_FAILED; 454 if (copyout(&soft_info, arg, sizeof (soft_info)) != 0) { 455 return (EFAULT); 456 } 457 return (0); 458 } 459 460 /* check if buffer is too small */ 461 if (count > soft_info.si_count) { 462 soft_info.si_count = count; 463 soft_info.si_return_value = CRYPTO_BUFFER_TOO_SMALL; 464 crypto_free_mech_list(entries, count); 465 if (copyout(&soft_info, arg, sizeof (soft_info)) != 0) { 466 return (EFAULT); 467 } 468 return (0); 469 } 470 471 soft_info.si_count = count; 472 soft_info.si_return_value = CRYPTO_SUCCESS; 473 copyout_size = count * sizeof (crypto_mech_name_t); 474 475 /* copyout the first stuff */ 476 if (copyout(&soft_info, arg, sizeof (soft_info)) != 0) { 477 crypto_free_mech_list(entries, count); 478 return (EFAULT); 479 } 480 481 /* copyout entries */ 482 offset = offsetof(crypto_get_soft_info_t, si_list); 483 if (copyout(entries, arg + offset, copyout_size) != 0) { 484 crypto_free_mech_list(entries, count); 485 return (EFAULT); 486 } 487 crypto_free_mech_list(entries, count); 488 return (0); 489 } 490 491 /* 492 * This ioctl disables mechanisms supported by the specified device. 493 */ 494 /* ARGSUSED */ 495 static int 496 load_dev_disabled(dev_t dev, caddr_t arg, int mode, int *rval) 497 { 498 crypto_load_dev_disabled_t dev_disabled; 499 crypto_mech_name_t *entries; 500 size_t size; 501 ulong_t offset; 502 uint_t count; 503 uint_t instance; 504 char *dev_name; 505 uint32_t rv; 506 int error = 0; 507 508 if (copyin(arg, &dev_disabled, sizeof (dev_disabled)) != 0) { 509 error = EFAULT; 510 goto out2; 511 } 512 513 dev_name = dev_disabled.dd_dev_name; 514 /* make sure the device name is null terminated */ 515 if (!null_terminated(dev_name)) { 516 rv = CRYPTO_ARGUMENTS_BAD; 517 goto out; 518 } 519 520 count = dev_disabled.dd_count; 521 instance = dev_disabled.dd_dev_instance; 522 if (count == 0) { 523 /* remove the entry */ 524 if (crypto_load_dev_disabled(dev_name, instance, 0, NULL) != 0) 525 rv = CRYPTO_FAILED; 526 else 527 rv = CRYPTO_SUCCESS; 528 goto out; 529 } 530 531 if (count > KCF_MAXMECHS) { 532 rv = CRYPTO_ARGUMENTS_BAD; 533 goto out; 534 } 535 536 size = count * sizeof (crypto_mech_name_t); 537 entries = kmem_alloc(size, KM_SLEEP); 538 539 offset = offsetof(crypto_load_dev_disabled_t, dd_list); 540 if (copyin(arg + offset, entries, size) != 0) { 541 kmem_free(entries, size); 542 error = EFAULT; 543 goto out2; 544 } 545 546 /* 'entries' consumed (but not freed) by crypto_load_dev_disabled() */ 547 if (crypto_load_dev_disabled(dev_name, instance, count, entries) != 0) { 548 kmem_free(entries, size); 549 rv = CRYPTO_FAILED; 550 goto out; 551 } 552 rv = CRYPTO_SUCCESS; 553 out: 554 dev_disabled.dd_return_value = rv; 555 556 if (copyout(&dev_disabled, arg, sizeof (dev_disabled)) != 0) { 557 error = EFAULT; 558 } 559 out2: 560 if (AU_AUDITING()) 561 audit_cryptoadm(CRYPTO_LOAD_DEV_DISABLED, dev_name, entries, 562 count, instance, rv, error); 563 return (error); 564 } 565 566 /* 567 * This ioctl disables mechanisms supported by the specified 568 * cryptographic module. 569 */ 570 /* ARGSUSED */ 571 static int 572 load_soft_disabled(dev_t dev, caddr_t arg, int mode, int *rval) 573 { 574 crypto_load_soft_disabled_t soft_disabled; 575 crypto_mech_name_t *entries; 576 size_t size; 577 uint_t count; 578 ulong_t offset; 579 char *name; 580 uint32_t rv; 581 int error = 0; 582 583 if (copyin(arg, &soft_disabled, sizeof (soft_disabled)) != 0) { 584 error = EFAULT; 585 goto out2; 586 } 587 588 name = soft_disabled.sd_name; 589 /* make sure the name is null terminated */ 590 if (!null_terminated(name)) { 591 soft_disabled.sd_return_value = CRYPTO_ARGUMENTS_BAD; 592 if (copyout(&soft_disabled, arg, sizeof (soft_disabled)) != 0) { 593 return (EFAULT); 594 } 595 return (0); 596 } 597 598 count = soft_disabled.sd_count; 599 if (count == 0) { 600 /* remove the entry */ 601 if (crypto_load_soft_disabled(name, 0, NULL) != 0) { 602 rv = CRYPTO_FAILED; 603 } else { 604 rv = CRYPTO_SUCCESS; 605 } 606 goto out; 607 } 608 609 if (count > KCF_MAXMECHS) { 610 rv = CRYPTO_ARGUMENTS_BAD; 611 goto out; 612 } 613 614 size = count * sizeof (crypto_mech_name_t); 615 entries = kmem_alloc(size, KM_SLEEP); 616 617 offset = offsetof(crypto_load_soft_disabled_t, sd_list); 618 if (copyin(arg + offset, entries, size) != 0) { 619 kmem_free(entries, size); 620 error = EFAULT; 621 goto out2; 622 } 623 624 /* 'entries' is consumed by crypto_load_soft_disabled() */ 625 if (crypto_load_soft_disabled(name, count, entries) != 0) { 626 kmem_free(entries, size); 627 rv = CRYPTO_FAILED; 628 goto out; 629 } 630 rv = CRYPTO_SUCCESS; 631 out: 632 soft_disabled.sd_return_value = rv; 633 634 if (copyout(&soft_disabled, arg, sizeof (soft_disabled)) != 0) { 635 error = EFAULT; 636 } 637 out2: 638 if (AU_AUDITING()) 639 audit_cryptoadm(CRYPTO_LOAD_SOFT_DISABLED, name, entries, 640 count, 0, rv, error); 641 return (error); 642 } 643 644 /* 645 * This ioctl loads the supported mechanisms of the specfied cryptographic 646 * module. This is so, at boot time, all software providers do not 647 * have to be opened in order to cause them to register their 648 * supported mechanisms. 649 */ 650 /* ARGSUSED */ 651 static int 652 load_soft_config(dev_t dev, caddr_t arg, int mode, int *rval) 653 { 654 crypto_load_soft_config_t soft_config; 655 crypto_mech_name_t *entries; 656 size_t size; 657 uint_t count; 658 ulong_t offset; 659 char *name; 660 uint32_t rv; 661 int error = 0; 662 663 if (copyin(arg, &soft_config, sizeof (soft_config)) != 0) { 664 error = EFAULT; 665 goto out2; 666 } 667 668 name = soft_config.sc_name; 669 /* make sure the name is null terminated */ 670 if (!null_terminated(name)) { 671 soft_config.sc_return_value = CRYPTO_ARGUMENTS_BAD; 672 if (copyout(&soft_config, arg, sizeof (soft_config)) != 0) { 673 return (EFAULT); 674 } 675 return (0); 676 } 677 678 count = soft_config.sc_count; 679 if (count == 0) { 680 if (crypto_load_soft_config(name, 0, NULL) != 0) { 681 rv = CRYPTO_FAILED; 682 } else { 683 rv = CRYPTO_SUCCESS; 684 } 685 goto out; 686 } 687 688 if (count > KCF_MAXMECHS) { 689 rv = CRYPTO_ARGUMENTS_BAD; 690 goto out; 691 } 692 693 size = count * sizeof (crypto_mech_name_t); 694 entries = kmem_alloc(size, KM_SLEEP); 695 696 offset = offsetof(crypto_load_soft_config_t, sc_list); 697 if (copyin(arg + offset, entries, size) != 0) { 698 kmem_free(entries, size); 699 error = EFAULT; 700 goto out2; 701 } 702 703 /* 704 * 'entries' is consumed (but not freed) by 705 * crypto_load_soft_config() 706 */ 707 if (crypto_load_soft_config(name, count, entries) != 0) { 708 kmem_free(entries, size); 709 rv = CRYPTO_FAILED; 710 goto out; 711 } 712 rv = CRYPTO_SUCCESS; 713 out: 714 soft_config.sc_return_value = rv; 715 716 if (copyout(&soft_config, arg, sizeof (soft_config)) != 0) { 717 error = EFAULT; 718 } 719 out2: 720 if (AU_AUDITING()) 721 audit_cryptoadm(CRYPTO_LOAD_SOFT_CONFIG, name, entries, count, 722 0, rv, error); 723 return (error); 724 } 725 726 /* 727 * This ioctl unloads the specfied cryptographic module and removes 728 * its table of supported mechanisms. 729 */ 730 /* ARGSUSED */ 731 static int 732 unload_soft_module(dev_t dev, caddr_t arg, int mode, int *rval) 733 { 734 crypto_unload_soft_module_t unload_soft_module; 735 char *name; 736 uint32_t rv; 737 int error = 0; 738 739 if (copyin(arg, &unload_soft_module, 740 sizeof (unload_soft_module)) != 0) { 741 error = EFAULT; 742 goto out2; 743 } 744 745 name = unload_soft_module.sm_name; 746 /* make sure the name is null terminated */ 747 if (!null_terminated(name)) { 748 unload_soft_module.sm_return_value = CRYPTO_ARGUMENTS_BAD; 749 if (copyout(&unload_soft_module, arg, 750 sizeof (unload_soft_module)) != 0) { 751 return (EFAULT); 752 } 753 return (0); 754 } 755 756 rv = crypto_unload_soft_module(name); 757 out: 758 unload_soft_module.sm_return_value = rv; 759 760 if (copyout(&unload_soft_module, arg, 761 sizeof (unload_soft_module)) != 0) { 762 error = EFAULT; 763 } 764 out2: 765 if (AU_AUDITING()) 766 audit_cryptoadm(CRYPTO_UNLOAD_SOFT_MODULE, name, NULL, 0, 0, 767 rv, error); 768 769 return (error); 770 } 771 772 static int 773 cryptoadm_ioctl(dev_t dev, int cmd, intptr_t arg, int mode, cred_t *c, 774 int *rval) 775 { 776 int error; 777 #define ARG ((caddr_t)arg) 778 779 switch (cmd) { 780 case CRYPTO_LOAD_DEV_DISABLED: 781 case CRYPTO_LOAD_SOFT_DISABLED: 782 case CRYPTO_LOAD_SOFT_CONFIG: 783 case CRYPTO_UNLOAD_SOFT_MODULE: 784 case CRYPTO_LOAD_DOOR: 785 case CRYPTO_FIPS140_SET: 786 if ((error = drv_priv(c)) != 0) 787 return (error); 788 default: 789 break; 790 } 791 792 switch (cmd) { 793 case CRYPTO_GET_DEV_LIST: 794 return (get_dev_list(dev, ARG, mode, rval)); 795 796 case CRYPTO_GET_DEV_INFO: 797 return (get_dev_info(dev, ARG, mode, rval)); 798 799 case CRYPTO_GET_SOFT_LIST: 800 return (get_soft_list(dev, ARG, mode, rval)); 801 802 case CRYPTO_GET_SOFT_INFO: 803 return (get_soft_info(dev, ARG, mode, rval)); 804 805 case CRYPTO_LOAD_DEV_DISABLED: 806 return (load_dev_disabled(dev, ARG, mode, rval)); 807 808 case CRYPTO_LOAD_SOFT_DISABLED: 809 return (load_soft_disabled(dev, ARG, mode, rval)); 810 811 case CRYPTO_LOAD_SOFT_CONFIG: 812 return (load_soft_config(dev, ARG, mode, rval)); 813 814 case CRYPTO_UNLOAD_SOFT_MODULE: 815 return (unload_soft_module(dev, ARG, mode, rval)); 816 } 817 818 return (EINVAL); 819 }
__label__pos
0.992232
iXorcist Ap for iPhone Discussion in 'Apple' started by Will_B, Apr 7, 2009. 1. Will_B Will_B Producer Joined: Mar 6, 2001 Messages: 4,731 Likes Received: 1 Trophy Points: 0 2. Ronald Epstein Ronald Epstein Founder Owner Joined: Jul 3, 1997 Messages: 49,049 Likes Received: 5,884 Trophy Points: 9,110 Real Name: Ronald Epstein Okay. Put that one on my download list.   3. TonyD TonyD Who do we think I am? Supporter Joined: Dec 1, 1999 Messages: 17,528 Likes Received: 577 Trophy Points: 9,110 Location: Gulf Coast Real Name: Tony D. That's just another joke app that doesn't really do anything. Is this really something that would be used more then once? It just reminds me that I need to go into my itunes and get rid of the other apps that don't really do anything. Plus it isn't a typical app, it's just a web site that runs from the safari browser.   4. Will_B Will_B Producer Joined: Mar 6, 2001 Messages: 4,731 Likes Received: 1 Trophy Points: 0 I didn't even realize there was an actual (simulated) ap, I thought it was just a commercial for it. I guess it's like screensavers -- they're just for fun these days.   Share This Page
__label__pos
0.987166
Question: How Do I Remove My House From Google Maps? How do I remove pictures of my house from Zillow? Once you’ve claimed your home’s property page, select Edit photos from the More drop-down menu.To add photos, click the Upload photos button under Photos & media.You will be prompted to select photo files stored on your computer.To remove a photo, click on an individual photo and click Remove Photo.More items…•. Why is Zillow so inaccurate? There may be mistakes in property taxes paid or tax assessments, and Zestimates may not include any upgrades or improvements made by homeowners. Zillow also accounts for turnover rate, so an area where people keep their homes for longer periods of time may not be as accurate. Why is Zillow bad? Inaccurate information For buyers: Many of the homes listed on Zillow may not be for sale. … Another way Zillow can provide inaccurate information is through the agent listed with the property. You would think this is the “listing agent” or the “seller’s agent.” Wrong. Why would a house be blurred out on Google Maps? Google Maps Street View captures anything from landmarks to houses and more as it helps people navigate the world. When Google wishes to protect the privacy of people, it can blur out number plates and faces as well as house numbers. Can I remove my house from Zillow? Sign into your Zillow account. Navigate to the property page, this can be located in the “Your Home” tab on the bottom menu bar. Select “Edit Listing” and change the Home Status to “Sold.” You will have the option to select “No Longer For Sale” in the following steps. Can you see the Titanic on Google Earth? The Google cameras have pinpointed the remains at coordinates 41.7325° N, 49.9469° W. For those looking at the scenes, the wreckage can be seen south of the island of Newfoundland. What is the scariest thing on Google Earth? The 20 Scariest Google Street View ImagesThe Murder Dock. … Did Google Street View Kill a Donkey? … This Abandoned Infant. … A Broken Face. … The Tiki Demon of Nancy, France. … This Van on Fire. … A Japanese Ghost Town. … A Violent Arrest.More items…• How often does Google Earth Take a picture of my house? Because of the way that Google Earth imagery works, any given area is typically only updated once every few years. The odds that they captured imagery at the precise moment you need it, along with the the odds of the imagery actually capturing a detail that helps with the investigation, are very remote. Where is the giant bunny on Google Earth? This giant pink bunny (Google Earth coordinates 44.244273,7.769737) in Prata Nevoso, Italy, was built by a group of artists from Vienna, according to published accounts. How do I remove my home from Google Maps? Delete your home or work addressOn your Android phone or tablet, open the Google Maps app .Tap Saved. . Under “Your lists,” tap Labeled.Next to “Home” or “Work,” tap More. Remove home or Remove work. Can I have my property removed from Google Earth? Go to Google Maps and locate your home by typing in your address into the search box, and pressing enter. Once the location is found, click on the small image of your home which says ‘Street View’ … This will allow you to draw a red box over what your wish to remove from the image. What areas are blacked out on Google Maps? 15 Places Google Maps Have Blacked Out1 Indian Point Nuclear Power Plant, New York – The Public Wants It Shut Down.2 Elmira Correctional Facility, New York – If We Can’t See It, They Can’t Get Out. … 3 NATO Headquarters, Portugal – Very Classified. … 4 HAARP Site, Alaska – Even More Conspiracies. … 5 Mazda Raceway Laguna Seca, California – What Are They Hiding? … More items…• How do I update the picture of my house on Google Maps? Add a photoOn your computer, open Google Maps and search for a place.After you’ve selected a place, click Add a photo. You might have to scroll down to see this.A box will appear. Drag the photo that you’d like to upload, or click Choose photos to upload. Can you see any sharks on Google Earth? Google Earth has added underwater exploration, allowing users to see what it’s like to swim with sharks. Shark View is one of the latest additions to the Voyager feature on Google Earth, put together over the last four years in collaboration with the Ocean Agency.
__label__pos
0.965796
2 \$\begingroup\$ I have created an start, stop, restart script for a unix-mongodb-server. It would be nice if you could look over my code and give me some helpful hints on what I could change. I tested the script under my Mac and it works. This is also available under my GitHub account and available under GitHub -> Mongo_Start_Stop. VERSION=1.1.2 SCRIPTNAME=$(basename "$0") MONGOHOME= MONGOBIN=$MONGOHOME/bin MONGOD=$MONGOBIN/mongod MONGODBPATH= MONGODBCONFIG= if [ $# != 1 ] then echo "Usage: $SCRIPTNAME [start|stop|restart]" exit fi pid() { ps -ef | awk '/[m]ongodb/ {print $2}' } stopServer() { PID=$(pid) if [ ! -z "$PID" ]; then echo "... stopping mongodb-server with pid: $PID" sudo kill $PID else echo "... mongodb-server is not running!" fi } startServer() { PID=$(pid) if [ ! -z "$PID" ]; then echo "... mongodb-server already running with pid: $PID" else echo "... starting mongodb-server" sudo "$MONGOD" --dbpath "$MONGODBPATH" --config "$MONGODBCONFIG" fi } restartServer() { stopServer sleep 1s startServer } case "$1" in start) startServer ;; stop) stopServer ;; restart) restartServer ;; *) echo "unknown command" exit ;; esac \$\endgroup\$ 1 \$\begingroup\$ Bug Can you spot the bug on this line? PID=$(ps -ef | grep "[m]ongodb" | awk {'print $2'}) The awk script here should be {print $2}, with the curly braces included, so that needs to be within the single-quotes: PID=$(ps -ef | grep "[m]ongodb" | awk '{print $2}') Quoting path variables It's good to make it a habit to always double-quote path variables in command statements, to protect from globbing and word splitting. Instead of: SCRIPTNAME=$(basename $0) Write like this: SCRIPTNAME=$(basename "$0") The same goes for this line: sudo $MONGOD --dbpath $MONGODBPATH --config $MONGODBCONFIG Useless variable and echo PID is not used anywhere else inside the script but here: function isRunning { PID=$(ps -ef | grep "[m]ongodb" | awk '{print $2}') echo $PID } You could simplify as: pid() { ps -ef | awk '/[m]ongodb/ {print $2}' } I also renamed the function, because pid() reflects better its purpose. User experience Something's odd in this condition: rc=$(isRunning) echo "... stopping mongodb-server with pid: $rc" if [ ! -z "$rc" ]; then sudo kill $rc fi If the process is not running $rc will be empty, and users may think the output is weird and the script is buggy. You might want to rearrange this part, for example if the server is not running, then say so. Make the most of awk Very often a grep ... | awk ... combo can be simplified, because awk can filter all by itself. Instead of: PID=$(ps -ef | grep "[m]ongodb" | awk '{print $2}') You can write: PID=$(ps -ef | awk '/[m]ongodb/ {print $2}') Style This is fine: function isRunning { # ... } But the recommended style for function declarations is like this: isRunning() { # ... } Variable initialization This is fine: MONGOHOME="" MONGOBIN="$MONGOHOME/bin" MONGOD="$MONGOBIN/mongod" MONGODBPATH="" MONGODBCONFIG="" But you could write simpler as: MONGOHOME= MONGOBIN=$MONGOHOME/bin MONGOD=$MONGOBIN/mongod MONGODBPATH= MONGODBCONFIG= Redundant semicolon The semicolon at the end of exit; is redundant, I suggest to remove it: if [ $# != 1 ] then echo "Usage: $SCRIPTNAME [start|stop|restart]" exit; fi \$\endgroup\$ • \$\begingroup\$ Thank you very much. Your comments are very helpfull and i will regard them in future. I also update your comments im my github repository. \$\endgroup\$ – Patrick85 May 15 '17 at 13:43 • \$\begingroup\$ i edited my post with the new code from your review. Did you have a nicer solution with the if-statement? Did you know why i need to use an "slepp 1s" after "stopServer" and then "startServer" ? \$\endgroup\$ – Patrick85 May 15 '17 at 18:18 Your Answer By clicking “Post Your Answer”, you agree to our terms of service, privacy policy and cookie policy Not the answer you're looking for? Browse other questions tagged or ask your own question.
__label__pos
0.642437
What Makes a Concurrent Algorithm Correct? requirements Image From OpenClipart.org First of all one must ask themselves what makes any algorithm correct? The answer is the algorithm does as it is required by a specification or set of interested properties. For example a specification which states the algorithm will sort as list of unsorted numbers in ascending order, is correct if it does just that. This brings us onto defining what makes a correct concurrent algorithm. As with any algorithm or computer program, we require that it produces the expected output from the data that is input into the system. Additionally when concurrency is brought into the mix there are two more properties we are concerned with. The first is mutual exclusion of shared resources, in order to prevent the problematic results race conditions can produce. Secondly we want to be sure the algorithm doesn’t result in deadlock or livelock. To conclude we can say that a concurrent algorithm is correct if it meets the following requirements: • It is safe – shared resources are suitably protected • The required result eventually happens – free from deadlock and livelock Video Explanation Leave a Reply Your email address will not be published. Required fields are marked * two + sixteen =
__label__pos
0.99981
A palindrome date A palindrome, as everyone knows, is a phrase that’s the same forward or backward, as in “Madam, I’m Adam” or “Able was I, ere I saw Elba.” By extension, a palindrome day is a date that, when presented in numeric form, reads the same forwards or backwards. Like today, which—if and only if you render dates in the standard North American way—is 8-10-2018, a sequence that’s the same in both directions. (Sorry, rest of the world, but your day will come too, on October 8.) As a matter of fact, the next 10 days could also be considered palindrome days for North Americans if you cheat slightly by using just two digits for the year—for example, August 17 will be 8-17-18. Wow, Bob, wow.
__label__pos
0.69871
#include #include // 1 Wire Bus functions #asm .equ __w1_port=0x1B ;PORTA .equ __w1_bit=6 #endasm #include <1wire.h> // Alphanumeric LCD Module functions #asm .equ __lcd_port=0x15 ;PORTC #endasm #include int ascii_temp1_D,temp1_D; int ascii_temp1_U,temp1_U; int ascii_100; int T1 = 0; int deg; void affichage (void) { temp1_D = (T1 / 10); // divise T1 par 10 temp1_U = (T1 % 10); // reste de la division par 10 ascii_temp1_D = temp1_D | 0x30; // conversion ascii ascii_temp1_U = temp1_U| 0x30; lcd_gotoxy (15,3); lcd_putchar (ascii_temp1_D); lcd_gotoxy (16,3); lcd_putchar (ascii_temp1_U); } void signe (void) { /****************************************************************** * Gestion du signe de la valeur * ******************************************************************/ if ( T1 > 0x80 ) { T1 = T1 ^ 0xFF ; // OU ex bit à bit ( inversion des bits ) //T1 = T1 + 1; lcd_gotoxy(13,3); lcd_putsf("-"); // affiche le signe "-" } else { lcd_gotoxy(13,3); // affiche le signe "+" lcd_putsf("+"); } /****************************************************************** * Gestion du " 1 " pour une température > à 100°C * ******************************************************************/ if ( T1 > 0x63 ) // si > à 99 { T1 = T1 - 100; ascii_100 = 1 | 0x30; // conversion du 1 en ascii lcd_gotoxy (14,3); lcd_putchar (ascii_100); } else { lcd_gotoxy (14,3); // sinon afficher "0" lcd_putsf ("0"); } } // fin du sous programme SIGNE /****************************************************************** * Lecture de la valeur numérique de la température DS 1821 * ******************************************************************/ void capture (void) { w1_init(); // init 1 wire ( reset ) w1_write (0xEE); // demande de conversion delay_ms(100); w1_init(); // init 1 wire ( reset ) w1_write (0xAA); // demande d'envoie des données température T1 = w1_read(); // 1 wire config en lecture, valeur mise dans T1 ( 8 bits ) w1_write (0x22); // demande de stoper la conversion } void procedure (void) { capture (); signe (); affichage (); } void main(void) { PORTA=0x00; DDRA=0x00; PORTB=0x00; DDRB=0xFF; PORTC=0x00; DDRC=0x00; PORTD=0x00; DDRD=0xFF; ACSR=0x80; SFIOR=0x00; // 1 Wire Bus initialization w1_init(); // LCD module initialization lcd_init(20); lcd_clear(); lcd_gotoxy (1,0); lcd_putsf ("- DALLAS DS 1821 -"); lcd_gotoxy (5,1); lcd_putsf (" DQ = PA6 "); lcd_gotoxy (1,2); lcd_putsf ("Min=-55 MAX=+125"); deg = 0xDF; // symbole degrés. lcd_gotoxy (0,3); lcd_putsf ("Temperature : C"); lcd_gotoxy (17,3); lcd_putchar (deg); while (1) { procedure (); delay_ms(1000); }; }
__label__pos
0.998553
Answers Solutions by everydaycalculation.com Answers.everydaycalculation.com » Compare fractions Compare 9/3 and 14/15 1st number: 3 0/3, 2nd number: 14/15 9/3 is greater than 14/15 Steps for comparing fractions 1. Find the least common denominator or LCM of the two denominators: LCM of 3 and 15 is 15 Next, find the equivalent fraction of both fractional numbers with denominator 15 2. For the 1st fraction, since 3 × 5 = 15, 9/3 = 9 × 5/3 × 5 = 45/15 3. Likewise, for the 2nd fraction, since 15 × 1 = 15, 14/15 = 14 × 1/15 × 1 = 14/15 4. Since the denominators are now the same, the fraction with the bigger numerator is the greater fraction 5. 45/15 > 14/15 or 9/3 > 14/15 MathStep (Works offline) Download our mobile app and learn to work with fractions in your own time: Android and iPhone/ iPad Related: © everydaycalculation.com
__label__pos
0.962401
Python language basics 25: commenting your code Introduction In the previous post we saw how to organise your code so that you can pass in an argument to your main method from the command line. We saw how the command line arguments were included in the “args” property of the “sys” object. Args is a string array so we could simply use square brackets to extract the player name argument in our number guessing game. In this post we’ll look at a topic that’s usually not very dear to programmers: documentation. Code documentation You can document your code in a separate document, like MS Word, but here we mean documenting your code directly in the Python source file. You can write comments directly in your code and the Python compiler will simply ignore them. The simplest form of commenting is a single-line comment using the “#” character: def main(args): gamer = args[1] print("Welcome to the game", gamer, "!") # Ask the player for the lower and upper limits of the game lower_limit_input = get_integer_input('Lower limit: ') upper_limit_input = get_integer_input('Upper limit: ') # then start the game guess_counter = play_game(lower_limit_input, upper_limit_input) # write the final guess counter finish_game(guess_counter) The rows starting with “#” won’t be interpreted by the Python compiler. If you’d like to write multiple lines as comments then you can use triple-quotes as follows: def main(args): gamer = args[1] print("Welcome to the game", gamer, "!") # Ask the player for the lower and upper limits of the game lower_limit_input = get_integer_input('Lower limit: ') upper_limit_input = get_integer_input('Upper limit: ') # then start the game guess_counter = play_game(lower_limit_input, upper_limit_input) # write the final guess counter """ This is a multiline comment, all of it will be ignored by the Python compiler """ finish_game(guess_counter) However, the preferred way for multi-line comments in Python is to simply start each line with the “#” character: # This is a multiline # comment, all of it will be ignored by the # Python compiler The triple-quotes are rather reserved for a special purpose. Docstrings There’s a code documentation feature in Python called Docstrings. Docstrings are used to document the overall usage of a function or other elements in your code. DocStrings can come in various formats in Python. We’ll briefly look at how PyCharm can help you add this type of documentation. If you place the cursor in a function name you’ll see a lightbulb icon: PyCharm help link for functions Click the downward pointing arrow and select “Insert documentation string stub”. It will add a function comment stub along with the parameters: def finish_game(guess_counter): """ :param guess_counter: """ print('Congratulations. It took you ' + str(guess_counter) + ' guesses to guess the correct number.') If there’s a return statement in the code then the return type comment stub is also added: def get_integer_input(prompt_text): """ :param prompt_text: :return: """ user_input = input(prompt_text) return int(user_input) You can add an overall comment first and then also document the purpose and usage of the parameters and the return value: def evaluate_guess(guess, random_number): """ This function evaluates the player's guess. It prints Too large or Too small depending on the comparison :param guess: the player's guess of type integer :param random_number: the original number that the player has to guess """ if guess > random_number: print('Too large') else: print('Too small') We’ll start discussing a core element in object-oriented languages in the next post, namely objects. Read all Python-related posts on this blog here. Advertisement About Andras Nemes I'm a .NET/Java developer living and working in Stockholm, Sweden. Leave a Reply Fill in your details below or click an icon to log in: WordPress.com Logo You are commenting using your WordPress.com account. Log Out /  Change ) Twitter picture You are commenting using your Twitter account. Log Out /  Change ) Facebook photo You are commenting using your Facebook account. Log Out /  Change ) Connecting to %s Elliot Balynn's Blog A directory of wonderful thoughts Software Engineering Web development Disparate Opinions Various tidbits chsakell's Blog WEB APPLICATION DEVELOPMENT TUTORIALS WITH OPEN-SOURCE PROJECTS Once Upon a Camayoc Bite-size insight on Cyber Security for the not too technical. %d bloggers like this:
__label__pos
0.794992
Skip to content Create a gist now Instantly share code, notes, and snippets. anonymous /say.py Created Embed URL HTTPS clone URL Subversion checkout URL You can clone with or . Download ZIP Assist in performing online Text-To-Speech and immediate playback. #!/usr/bin/env python """ Assist in performing online Text-To-Speech and immediate playback. """ import sys import requests import urllib import tempfile import commands import locale LC = locale.getdefaultlocale()[0] or 'en' def google_tts(text, fh): """ Has Google perform Text-To-Speech on text, writing to fh. """ for line in chop(text, 100): url = "http://translate.google.com/translate_tts?ie=UTF-8&tl=%s&q=%s" \ % tuple(map(urllib.quote_plus, [LC, line])) # MPEG streams can be concatenated fh.write(requests.get(url).content) print 'TTS Line:', line def mplayer(filename): commands.getoutput('mplayer ' + filename) def chop(text, size=100): """ Chops up text in parts of at most size, separating at natural pauses. """ splitlist = ['.?!', ',:;()"', ' '] while len(text) > size: subtext = text[:size] for splitters in splitlist: sep = max(map(subtext.rfind, splitters)) if sep >= 0: break if sep == -1: sep = size-1 yield text[:sep+1] text = text[sep+1:].lstrip() if len(text) > 0: yield text def say(text, tts=google_tts, playback=mplayer): """ Pronounces text as speech using the given methods. """ text = ' '.join(text.split()) fh = tempfile.NamedTemporaryFile() tts(text, fh) fh.flush() playback(fh.name) fh.close() if __name__ == '__main__': args = sys.argv[1:] if len(args) > 0 and args[0].startswith('-'): LC = args[0][1:] args = args[1:] if len(args) == 0: text = sys.stdin.read() else: text = ' '.join(args) say(text) Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment Something went wrong with that request. Please try again.
__label__pos
0.99629
Students Save 30%! Learn & create with unlimited courses & creative assets Students Save 30%! Save Now Advertisement 1. Code 2. Laravel 5 Code Eloquent Mutators and Accessors in Laravel by Difficulty:BeginnerLength:ShortLanguages: In this article, we'll go through mutators and accessors of the Eloquent ORM in the Laravel web framework. After the introduction, we'll go through a handful of examples to understand these concepts. In Laravel, mutators and accessors allow you to alter data before it's saved to and fetched from a database. To be specific, the mutator allows you to alter data before it's saved to a database. On the other hand, the accessor allows you to alter data after it's fetched from a database. In fact, the Laravel model is the central place where you can create mutator and accessor methods. And of course, it's nice to have all your modifications in a single place rather than scattered over different places. Create Accessors and Mutators in a Model Class As you're familiar with the basic concept of mutators and accessors now, we'll go ahead and develop a real-world example to demonstrate it. I assume that you're aware of the Eloquent model in Laravel, and we'll use the Post model as a starting point of our example. If you haven't created the Post model yet, let's use the artisan command to create it. That should create a model file at app/Post.php as shown below. Let's replace the contents of that file with the following. As we've used the --migration option, it should also create an associated database migration. Just in case you are not aware, you can run the following command so that it actually creates a table in the database. In order to run examples in this article, you need to create name and published_at columns in the post table. Anyway, we won't go into the details of the migration topic, as it's out of the scope of this article. So we'll get back to methods that we are interested in. Firstly, let's go through the mutator method. As we discussed earlier, the mutators are used to alter data before it's saved to a database. As you can see, the syntax of the mutator method is set{attribute-name}Attribute. Of course, you need to replace {attribute-name} with an actual attribute name. The setNameAttribute method is called before the value of the name attribute is saved in the database. To keep things simple, we've just used the strtolower function that converts the post title to lowercase before it's saved to the database. In this way, you could create mutator methods on all columns of your table. Next, let's go through the accessor method. If mutators are used to alter data before it's saved to a database, the accessor method is used to alter data after it's fetched from a database. The syntax of the accessor method is the same as that of the mutator except that it begins with the get keyword instead of the set keyword. Let's go through the accessor method getNameAttribute. The getNameAttribute method will be called after the value of the name attribute is fetched from the database. In our case, we've just used the ucfirst method to alter the post title. And that's the way you are supposed to use accessors in your models. So far, we've just created mutator and accessor methods, and we'll test those in the upcoming section. Mutators in Action Let's create a controller at app/Http/Controllers/MutatorController.php so that we can test the mutator method that we created in the earlier section. Also, you need to create an associated route in the routes/web.php file to access it. In the index method, we're creating a new post using the Post model. It should set the value of the name column to post title as we've used the strtolower function in the setNameAttribute mutator method. Date Mutators In addition to the mutator we discussed earlier, the Eloquent model provides a couple of special mutators that allow you to alter data. For example, the Eloquent model in Laravel comes with a special $dates property that allows you to automatically convert the desired columns to a Carbon date instance. In the beginning of this article, we created the Post model, and the following code was part of that class. As you probably know, Laravel always creates two date-related fields, created_at and updated_at, with each database migration. And it converts those values to a Carbon date instance as well. Let's assume that you have a couple of fields in a table that you would like to treat as date fields. In that case, you just need to add column names in the $dates array. As you can see in the above code, we've added the published_at column in the $dates array, and it makes sure that the value of that column will be converted to a Carbon date instance. Accessors in Action To see accessors in action, let's go ahead and create a controller file app/Http/Controllers/AccessorController.php with the following contents. Also, let's create an associated route in the routes/web.php file to access it. In the index method, we've used the Post model to load an example post in the first place. Next, we're inspecting the value of the name column, and it should start with an uppercase letter as we've already defined the accessor method getNameAttribute for that column. Moving further, we've inspected the value of the published_at column, and that should be treated as a date. Due to that, Laravel converts it to a Carbon instance so that you can use all the utility methods provided by that library. In our case, we've used the getTimestamp method to convert the date into a timestamp. And that brings us to the end of this article! Conclusion Today, we've explored the concepts of mutators and accessors of the Eloquent ORM in Laravel. It provides a nice way to alter data before it's saved to and fetched from a database. For those of you who are either just getting started with Laravel or looking to expand your knowledge, site, or application with extensions, we have a variety of things you can study in Envato Market. Don't hesitate to share your thoughts using the feed below! Advertisement Advertisement Looking for something to help kick start your next project? Envato Market has a range of items for sale to help get you started.
__label__pos
0.820929
Warren Warren - 1 year ago 56 PHP Question How does PHP's is_bool tell the difference between INT and BOOL? I ask because I'm having issues passing a boolean value to PDO. This function gives me True/False: public function getBoolVal($var){ if (!is_string($var)) return (bool) $var; switch (strtolower($var)) { case '1': case 'true': case 'on': case 'yes': case 'y': return true; default: return false; } } I'm binding data to parameters inside a function with a line like this: $this->db->bind('active', (bool)$this->getBoolVal($pa['active'])); and inside that bind function is: foreach ($this->parameters as $param => $value) { $type = PDO::PARAM_STR; switch ($value[1]) { case is_int($value[1]): $type = PDO::PARAM_INT; break; case is_bool($value[1]): $type = PDO::PARAM_BOOL; break; case is_null($value[1]): $type = PDO::PARAM_NULL; break; } // Add type when binding the values to the column $this->sQuery->bindValue($value[0], $value[1], $type); } When the values are bound, I get PDO::PARAM_BOOL as the type when the input value $pa['active'] is 1, but I always get PDO::PARAM_INT if the input is 0... So given a 1 or 0, how on Earth does is_bool know what I want??? OR how can I fix this? Answer Source you can change your code as if ($value[1] === true or $value[1] === false) { $type = PDO::PARAM_BOOL; } else { switch ($value[1]) { case is_int($value[1]): $type = PDO::PARAM_INT; break; case is_float($value[1]): $value[1] = str_replace(',', '.', $value[1]);//already string, pdo does not support float values break; case is_null($value[1]): $type = PDO::PARAM_NULL; break; } }
__label__pos
0.998246
Site Tools Monster Prom thumbnail.jpg Informations Usage 1. Install the scripts dependencies: 1. Arch Linux: # pacman -S imagemagick libarchive 2. Debian: # apt-get install fakeroot imagemagick libarchive-tools 2. Put in a same directory the scripts and archive: $ ls libplayit2.sh monster_prom_4_80_36450.sh play-monster-prom.sh 3. Start the building process from this directory: $ sh ./play-monster-prom.sh 4. Wait a couple minutes, the building will end by giving you the commands to launch as root to install the game. It should be something similar to: 1. Arch Linux: # pacman -U /some/path/to/game_package.pkg.tar 2. Debian: # dpkg -i /some/path/to/game_package.deb # apt-get install -f en/games/monster-prom.txt · Last modified: 2022/09/16 19:42 by 127.0.0.1
__label__pos
0.996322
[Ffmpeg-devel] Re: On2 Codec Colin Ward lists Fri Oct 7 03:44:33 CEST 2005 gabor wrote: > [Snip] > (and here i am, picking a java-fight on the ffmpeg list. again ;) > > 1. > i don't really understand why is it a PROBLEM, that there are multiple > implementations. shouldn't that be an adventage? i left the c/c++ world > a long time ago, but last time i checked, the various compiler vendors > provided their own stl/stdio/whatever libraries. how is that different > from the java situation? Because the different Java implementations behave differently so your program behaves differently (sometimes completely breaking) on different VMs. > 2. > or you can require the sun jvm. well, you can choose to support only the > sun jvm. if someone uses the ibm jvm with it, he can, but the only > supported one is the sun jvm. We are talking about the mobile phone world here. The VM is written by the phone manufacturer (or sometimes licensed from someone) and is in the ROM of the phone, so you don't have any choice about what you use. And they all act differently. Here is a classic example: I wrote a small program that calls Connector.open() (Connector is a simple socket class that comes with J2ME). On my Sony Ericsson device it returns immediately and you can start reading data as it comes in on the socket. On my Nokia device it reads the entire file that you have remotely opened *before* returning. This might take several minutes to complete if it is a large file. So if you are trying to write an audio/video streaming application (as I am) then you can forget it with this implementation. And the crazy thing is that because the behaviour of open() is not specified in the API documentation, both implementations are legal with respect to the specification, and yet one is unusable. And it's like this with all sorts of methods. Did you know that when Tom Clancy's Splinter Cell was released for J2ME mobile phones they had to release *600* separate versions of it, to cope with the differences between the phones and their VMs? And people *still* hype Java as this cross platform solution. Crazy. /-------------------------------------------------------------------\ [Hitman/Code HQ - 6502/z80/68000/604e/80x86/ARM coder - Amiga rulez!] [VZ-200/VIC-20/MZ-700/c16/c64*10/c128*8/Plus-4/CPC464/CD32/500*2 ] [600/1000/1200*2/A4000/SNES/N64/Dreamcast/Athlon 1100/AmigaOne ] [Assembly Language: The most fun you can have with your clothes on! ] \-------------------------------------------------------------------/ More information about the ffmpeg-devel mailing list
__label__pos
0.512101
Development issue/problem: I already know that BottomSheetDialog does this, but I need to use the normal BottomSheet and the behaviour that BottomSheetBehavior.from() generates. This BottomSheet does not obscure the background or touch the outside to obscure it. Is there any way to reduce the brightness of the background when displaying the bottom sheet… …and possibly deflect when tapping the outside? In principle the behaviour is the same as with BottomSheetDialog, but I have to use BottomSheet BottomSheetBehavior directly. Thank you so much! How can I solve this problem? Solution 1: You can use this code 1. MainActivity.xml 1. MAinActivity.java The MainActivity public class expands AppCompatActivity, implements View.OnClickListener { private static end string TAG = MainActivity; private BottomSheetBehavior mBottomSheetBehavior; Bottom Sheet View; Bottom Sheet View mViewBg ; @Override protected void onCreate(Bundle savedInstanceState) { super.onCreate(savedInstanceState); setContentView(R.layout.activity_main); bottomSheet= findViewById(R.id.bottom_sheet); mViewBg = findViewById(R.id.mViewBg); button1 = (button) findViewById(R.id.button_1); button1.setOnClickListener(this); mViewBg.setOnClickListener(this); mBottomSheetBehavior = BottomSheetBehavior.from(bottomSheet); mBottomSheetBehavior.setBottomSheetCallback(new BottomSheetBehavior.BottomSheetCallback() { @Override public void onStateChanged(@NonNull View bottomSheet, int newState) { if (newState == BottomSheetBehavior.STATE_COLLLAPSED) mViewBg.setVisibility(View.GONE); }. @Override public void onSlide(@NonNull View bottomSheet, float slideOffset) { Log.d(TAG, onSlide: slideOffset + slideOffset + ); mViewBg.setVisibility(View.VISIBLE); mViewBg.setAlpha(slideOffset); } }) } @Overriderblic void onClick(View v) { switch (v.getId()) {register R.id.button_1: {mBottomSheetBehavior.setState(BottomSheetBehavior.STATE_EXPANDED);break;}}}}. @Override public logic sendTochevent(event MotionEvent) { if (event.getAction() == MotionEvent.ACTION_DOWN) { if (mBottomSheetBehavior.getState() == BottomSheetBehavior.STATE_EXPANDED) { Rect outRect = new Rect(); bottomSheet.getGlobalVisibleRect(outRect); if (!outRect.contains((int) event.getRawX(), (int) event.getRawY()))) { mBottomSheetBehavior.setState(BottomSheetBehavior.STATE_COLLLAPSED); return true; } } return super.dispatchTouchEvent(event); } } Solution 2: You can create a custom cutout with a layout below (bottom view) and make the background transparent_black, and when you click on this BG, remove this cutout. Ex: Active_main.xml MainActive.java The MainActivity public class expands AppCompatActivity { The BottomSheetFragment is the lowest fragment of the sheet; Override protected void onCreate(Bundle savedInstanceState) { super.onCreate(savedInstanceState) ; setContentView(R.layout.activity_main) ; findViewById(R.id.show).setOnClickListener(new View.OnClickListener() { @Override public blank onClick(View view)) { if (bottomSheetFragment ==zero) {bottomSheetFragment = new BottomSheetFragment();}getSupportFragmentManager().beginTransaction().add(R.id.bottom_sheet_fragment_container, bottomSheetFragment).addToBackStack(null).commit() ; } }); } public void removeBottomSheet() { try { getSupportFragmentManager().beginTransaction().remove(bottomSheetFragment).addToBackStack(null).commit(); } catch (Exception e) { } }. } Bottom pageFragment.java public class BottomSheetFragment expands Fragment { private View rootView; private LayoutInflater layoutInflater ; @Overview public void onCreate(Bundle savedInstanceState) { super.onCreate(savedInstanceState); layoutInflater = (LayoutInflater) getActivity().getSystemService(Context.LAYOUT_INFLATER_SERVICE) ; } General view onCreate view(LayoutInflater inflater, @Nullable ViewGroup container, @Nullable Bundle savedInstanceState) { rootView = inflater.inflate(R.layout.bottom_sheet_layout, container, false); rootView.setOnClickListener(new View.OnClickListener() { @Override public void onClick(View view) { // remove sheet on BG touch ((MainActivity) getActivity()).removeBottomSheet(); } }); return rootView; }. } bottom_sheet_lay-out.xml To get this extract with bottom_top/animation…. you can go to this link: Android clips and animations Solution 3: You can use my concept if you want to use me in AlertDialog with a blurred background in the middle of the transitions. My approach 1. Take a screenshot 2. Program animated blur/gradient screen section 3. Getting the current window via the wizard dialog has no content 4. Confirm a screenshot with the effect 5. Show me the real view I wanted to show you Here I have a course to create the background image as a bitmap. public class AppUtils { public static bitmap takeScreenShot(Activity activity) { View = activity.getWindow().getDecorView() ; view.setDrawingCacheEnabled(true) ; view.buildDrawingCache() ; Bitmap b1 = view.getDrawingCache(); Rect frame = new Rect(); activity.getWindow().getDecorView().getWindowVisibleDisplayFrame(frame); int statusBarHeight = frame.top ; Display = active.getWindowManager().getDefaultDisplay(); Point Size = new Point(); display.getSize(size); int width = size.x; int height = size.y ; Bitmap b = Bitmap.createBitmap(b1, 0, statusBarHeight, width, height – statusBarHeight); view.destroyDrawingCache(); return b; } } Congratulations, you now have a darker/blinded image, just like your background. Your requirement would then be to darken, not fade as I did, so you can pass this bitmap to the method below, public static change bitmapBitmapContrastBrightness(Bitmap bmp, float contrast, float brightness) { ColorMatrix cm = new ColorMatrix(new float[] { contrast, 0, 0, brightness, 0, contrast, 0, brightness, 0, 0, contrast, 0, brightness, 0, 0, 1, 0 })) Bitmap ret = Bitmap.createBitmap(bmp.getWidth(), bmp.getHeight(), bmp.getConfig()) ; Canvas = new canvas(ret) ; Paint paint = new Paint() ; paint.setColorFilter(new ColorMatrixColorFilter(cm)) ; canvas.drawBitmap(bmp, 0, 0, paint) ; return; } Now, use a fake dialog / dialogue with a background / content of Cutout only to get a window (check my implementation questions, you can understand this) Window = fakeDialogUseToGetWindowForBlurEffect.getWindow(); window.setBackgroundDrawable(draw); // draw is a bitmap you created. In my case I will display a warning, you can display what you want, and don’t forget to erase/remove this warning if your current display disappears from the screen! Quickly turn it off: (the background can be adjusted as desired, not just dimmed). How can i dim the background when Bottomsheet is displayed, without using Dialog? &#8211; Solution 4: With the interface – onSlide, which has a slideOffSet parameter, the background can be muted. A new offset of this lower wing in the range [-1,1]. The displacement increases as the lower plate moves upwards. From 0 to 1 the sheet lies between the folded and unfolded state, from -1 to 0 between the hidden and folded state. as ( slideOffSet>=0 && slideOffSet where mainActivityLayoutView is the identifier of NestedScrollView, which contains the main content of the activity. Solution No 5: Use this style and apply it to your dialogue. PS: this style also works very well on Android 6.0, 6.1 and 7.0. And use as: Last dialog mBottomSheetDialog = New dialog mActivity, R.style.MaterialDialogSheet ; Thank you so much! Good luck! bottom sheet shadow'' android,bottomsheetdialog rounded corners,bottom sheet fragment background,bottomsheetdialogfragment not modal,bottom sheet dialog fragment,android bottom sheet transparent background,bottom sheet transparent android,bottom sheet rounded corners android,blur kit android,android bottomsheet transparent background,bottomsheetdialogfragment navigation bar,bottomsheetdialogfragment menu,bottom sheet for android app bar,android bottom sheet share,bottomsheetdialogfragment status bar color,android dialog change navigation bar color,bottomsheetdialog android example,bottomsheetdialog androidx,cannot resolve symbol bottomsheetdialog,bottomsheetdialog flutter,bottomsheetdialog react-native,dialog vs bottom sheet,android bottom sheet dialog margin,bottom sheet example in android,bottom sheet with scrollview android,android bottom sheet slide up animation,android bottom sheet anchor,android bottom sheet expand to full screen,android bottom sheet dialog transparent background,make bottom sheet dialog transparent,make bottomsheetdialog background transparent,bottomsheetbehavior,bottomsheetdialogfragment,bottom sheet dialog fragment disable drag,bottom sheet dialog set background transparent You May Also Like P2P | What Is P2P (Peer-to-Peer) Definition What is P2P? In P2P media, a number of servers are associated… Launch a Professional Website in Under 30 Minutes In today’s theme discussion we take a look at the Izo WordPress… Gradle sync failed, NDK not configured, download it with SDK manager – Development issue/problem: I’m completely new in Android development and I just installed… Analyzing Android Project with Lint and SonarQube – Development issue/problem: I’ve been very busy making the connection between these things.…
__label__pos
0.941653
Botan  2.14.0 Crypto and TLS for C++11 idea.cpp Go to the documentation of this file. 1 /* 2 * IDEA 3 * (C) 1999-2010,2015 Jack Lloyd 4 * 5 * Botan is released under the Simplified BSD License (see license.txt) 6 */ 7  8 #include <botan/idea.h> 9 #include <botan/loadstor.h> 10 #include <botan/cpuid.h> 11 #include <botan/internal/ct_utils.h> 12  13 namespace Botan { 14  15 namespace { 16  17 /* 18 * Multiplication modulo 65537 19 */ 20 inline uint16_t mul(uint16_t x, uint16_t y) 21  { 22  const uint32_t P = static_cast<uint32_t>(x) * y; 23  const auto P_mask = CT::Mask<uint16_t>(CT::Mask<uint32_t>::is_zero(P)); 24  25  const uint32_t P_hi = P >> 16; 26  const uint32_t P_lo = P & 0xFFFF; 27  28  const uint16_t carry = (P_lo < P_hi); 29  const uint16_t r_1 = static_cast<uint16_t>((P_lo - P_hi) + carry); 30  const uint16_t r_2 = 1 - x - y; 31  32  return P_mask.select(r_2, r_1); 33  } 34  35 /* 36 * Find multiplicative inverses modulo 65537 37 * 38 * 65537 is prime; thus Fermat's little theorem tells us that 39 * x^65537 == x modulo 65537, which means 40 * x^(65537-2) == x^-1 modulo 65537 since 41 * x^(65537-2) * x == 1 mod 65537 42 * 43 * Do the exponentiation with a basic square and multiply: all bits are 44 * of exponent are 1 so we always multiply 45 */ 46 uint16_t mul_inv(uint16_t x) 47  { 48  uint16_t y = x; 49  50  for(size_t i = 0; i != 15; ++i) 51  { 52  y = mul(y, y); // square 53  y = mul(y, x); 54  } 55  56  return y; 57  } 58  59 /** 60 * IDEA is involutional, depending only on the key schedule 61 */ 62 void idea_op(const uint8_t in[], uint8_t out[], size_t blocks, const uint16_t K[52]) 63  { 64  const size_t BLOCK_SIZE = 8; 65  66  CT::poison(in, blocks * 8); 67  CT::poison(out, blocks * 8); 68  CT::poison(K, 52); 69  70  BOTAN_PARALLEL_FOR(size_t i = 0; i < blocks; ++i) 71  { 72  uint16_t X1, X2, X3, X4; 73  load_be(in + BLOCK_SIZE*i, X1, X2, X3, X4); 74  75  for(size_t j = 0; j != 8; ++j) 76  { 77  X1 = mul(X1, K[6*j+0]); 78  X2 += K[6*j+1]; 79  X3 += K[6*j+2]; 80  X4 = mul(X4, K[6*j+3]); 81  82  const uint16_t T0 = X3; 83  X3 = mul(X3 ^ X1, K[6*j+4]); 84  85  const uint16_t T1 = X2; 86  X2 = mul((X2 ^ X4) + X3, K[6*j+5]); 87  X3 += X2; 88  89  X1 ^= X2; 90  X4 ^= X3; 91  X2 ^= T0; 92  X3 ^= T1; 93  } 94  95  X1 = mul(X1, K[48]); 96  X2 += K[50]; 97  X3 += K[49]; 98  X4 = mul(X4, K[51]); 99  100  store_be(out + BLOCK_SIZE*i, X1, X3, X2, X4); 101  } 102  103  CT::unpoison(in, blocks * 8); 104  CT::unpoison(out, blocks * 8); 105  CT::unpoison(K, 52); 106  } 107  108 } 109  110 size_t IDEA::parallelism() const 111  { 112 #if defined(BOTAN_HAS_IDEA_SSE2) 113  if(CPUID::has_sse2()) 114  { 115  return 8; 116  } 117 #endif 118  119  return 1; 120  } 121  122 std::string IDEA::provider() const 123  { 124 #if defined(BOTAN_HAS_IDEA_SSE2) 125  if(CPUID::has_sse2()) 126  { 127  return "sse2"; 128  } 129 #endif 130  131  return "base"; 132  } 133  134 /* 135 * IDEA Encryption 136 */ 137 void IDEA::encrypt_n(const uint8_t in[], uint8_t out[], size_t blocks) const 138  { 139  verify_key_set(m_EK.empty() == false); 140  141 #if defined(BOTAN_HAS_IDEA_SSE2) 142  if(CPUID::has_sse2()) 143  { 144  while(blocks >= 8) 145  { 146  sse2_idea_op_8(in, out, m_EK.data()); 147  in += 8 * BLOCK_SIZE; 148  out += 8 * BLOCK_SIZE; 149  blocks -= 8; 150  } 151  } 152 #endif 153  154  idea_op(in, out, blocks, m_EK.data()); 155  } 156  157 /* 158 * IDEA Decryption 159 */ 160 void IDEA::decrypt_n(const uint8_t in[], uint8_t out[], size_t blocks) const 161  { 162  verify_key_set(m_DK.empty() == false); 163  164 #if defined(BOTAN_HAS_IDEA_SSE2) 165  if(CPUID::has_sse2()) 166  { 167  while(blocks >= 8) 168  { 169  sse2_idea_op_8(in, out, m_DK.data()); 170  in += 8 * BLOCK_SIZE; 171  out += 8 * BLOCK_SIZE; 172  blocks -= 8; 173  } 174  } 175 #endif 176  177  idea_op(in, out, blocks, m_DK.data()); 178  } 179  180 /* 181 * IDEA Key Schedule 182 */ 183 void IDEA::key_schedule(const uint8_t key[], size_t) 184  { 185  m_EK.resize(52); 186  m_DK.resize(52); 187  188  CT::poison(key, 16); 189  CT::poison(m_EK.data(), 52); 190  CT::poison(m_DK.data(), 52); 191  193  194  K[0] = load_be<uint64_t>(key, 0); 195  K[1] = load_be<uint64_t>(key, 1); 196  197  for(size_t off = 0; off != 48; off += 8) 198  { 199  for(size_t i = 0; i != 8; ++i) 200  m_EK[off+i] = static_cast<uint16_t>(K[i/4] >> (48-16*(i % 4))); 201  202  const uint64_t Kx = (K[0] >> 39); 203  const uint64_t Ky = (K[1] >> 39); 204  205  K[0] = (K[0] << 25) | Ky; 206  K[1] = (K[1] << 25) | Kx; 207  } 208  209  for(size_t i = 0; i != 4; ++i) 210  m_EK[48+i] = static_cast<uint16_t>(K[i/4] >> (48-16*(i % 4))); 211  212  m_DK[0] = mul_inv(m_EK[48]); 213  m_DK[1] = -m_EK[49]; 214  m_DK[2] = -m_EK[50]; 215  m_DK[3] = mul_inv(m_EK[51]); 216  217  for(size_t i = 0; i != 8*6; i += 6) 218  { 219  m_DK[i+4] = m_EK[46-i]; 220  m_DK[i+5] = m_EK[47-i]; 221  m_DK[i+6] = mul_inv(m_EK[42-i]); 222  m_DK[i+7] = -m_EK[44-i]; 223  m_DK[i+8] = -m_EK[43-i]; 224  m_DK[i+9] = mul_inv(m_EK[45-i]); 225  } 226  227  std::swap(m_DK[49], m_DK[50]); 228  229  CT::unpoison(key, 16); 230  CT::unpoison(m_EK.data(), 52); 231  CT::unpoison(m_DK.data(), 52); 232  } 233  235  { 236  zap(m_EK); 237  zap(m_DK); 238  } 239  240 } void verify_key_set(bool cond) const Definition: sym_algo.h:89 void clear() override Definition: idea.cpp:234 void zap(std::vector< T, Alloc > &vec) Definition: secmem.h:170 void carry(int64_t &h0, int64_t &h1) void store_be(uint16_t in, uint8_t out[2]) Definition: loadstor.h:438 void encrypt_n(const uint8_t in[], uint8_t out[], size_t blocks) const override Definition: idea.cpp:137 std::string provider() const override Definition: idea.cpp:122 void poison(const T *p, size_t n) Definition: ct_utils.h:48 #define BOTAN_PARALLEL_FOR Definition: compiler.h:197 uint64_t load_be< uint64_t >(const uint8_t in[], size_t off) Definition: loadstor.h:217 T load_be(const uint8_t in[], size_t off) Definition: loadstor.h:107 Definition: alg_id.cpp:13 void decrypt_n(const uint8_t in[], uint8_t out[], size_t blocks) const override Definition: idea.cpp:160 size_t parallelism() const override Definition: idea.cpp:110 void unpoison(const T *p, size_t n) Definition: ct_utils.h:59 std::vector< T, secure_allocator< T > > secure_vector Definition: secmem.h:65 static Mask< T > is_zero(T x) Definition: ct_utils.h:141
__label__pos
0.981101
Welcome to the Treehouse Community The Treehouse Community is a meeting place for developers, designers, and programmers of all backgrounds and skill levels to get support. Collaborate here on code errors or bugs that you need feedback on, or asking for an extra set of eyes on your latest project. Join thousands of Treehouse students and alumni in the community today. (Note: Only Treehouse students can comment or ask questions, but non-students are welcome to browse our conversations.) Looking to learn something new? Treehouse offers a seven day free trial for new students. Get access to thousands of hours of content and a supportive community. Start your free trial today. iOS Objective-C Basics (Retired) Fundamentals of C Arrays What is wrong with this code? float math_constants[2]; math_constants[0] = 2.71828; math_constants[1] = 1.41421; printf("Euler's number = %f, math_constants[0]); 2 Answers Stone Preston Stone Preston 42,016 Points printf("Euler's number = %f, math_constants[0]); you need to close the string in your printf statement: printf("Euler's number = %f", math_constants[0]); yeah after another 5 minutes of staring at it I felt like an idiot. Thanks for the help.
__label__pos
0.969566
WordPress.org Ready to get started?Download WordPress Make WordPress Core Opened 3 years ago Closed 3 years ago Last modified 3 years ago #14355 closed defect (bug) (invalid) is_front_page returns false - if used after the loop starts Reported by: christian_gnoth Owned by: Priority: normal Milestone: Component: General Version: 3.0 Severity: normal Keywords: reporter-feedback Cc: azizur Description hello, I am using is_front_page() on different places in my theme template files. It returns for the front page and home page true if I call it inside the loop - if I call it before the loop starts ( if(have_posts()) ) it returns false for the front page. it also returns false if I call it in my functions.php file in a customized excerpt action hook. Change History (9) comment:1 scribu3 years ago • Keywords reporter-feedback added; is_front_page loop return false removed Can't reproduce. Are you using query_posts() by any chance? comment:2 christian_gnoth3 years ago sorry, it was written wrong - it returns outside true and inside false. and I am using query_posts. Problem is, that I am showing on my front page an excerpt and I have a customized excerpt function - in that customized excerpt function I am testing if it is front page or not and return different content. (http://wp-theme-t1.it-gnoth.de) if query posts is teh reason - it should be possible to show different posts on the front page and still the function returns true. comment:3 christian_gnoth3 years ago • Severity changed from normal to major comment:4 nacin3 years ago • Severity changed from major to normal Please post a snippet of code that reproduces this on any install. comment:5 filosofo3 years ago • Summary changed from is_front_page returns fasle - if used before the loop starts to is_front_page returns false - if used before the loop starts comment:6 christian_gnoth3 years ago <?php $biq_theme_options = biq_get_theme_options(); get_header('xajax'); global $xajax; //$xajax = new xajax(); $xajax->registerFunction('load_latest_post'); $xajax->processRequest(); echo '<div id="main_content_container">' . "\n" . ' <div id="content_container">' . "\n"; if ( is_home() ) { } var_dump(is_front_page()); if ( is_front_page() ) { // check for referer and show two latest posts excerpts //biq_check_referer(); query_posts(array( 'posts_per_page' => '2', 'category_name' => 'Blog Post' )); echo ' <div id="latest_post_container">' . "\n"; echo ' <div id="latest_post">' . "\n"; if ( have_posts() ) { while(have_posts()) { the_post(); $biq_id = get_the_ID(); echo ' <div '; post_class(); echo ' id="co-post-' . get_the_ID() . '">' . "\n"; $result = is_front_page(); var_dump($result); echo 'index.php:' . is_front_page() . ':<br />' . "\n"; echo ' <h3><a href="' . get_permalink() . '" rel="bookmark" onclick="xajax_load_latest_post(\'' . get_the_ID() . '\'); return false;" title="Permalink: ' . the_title( '', '', false) . '">' . the_title( '', '', false) . '</a></h3>' . "\n"; // echo ' <h3><a href="javascript:xajax_load_latest_post(' . get_the_ID() . ')" rel="bookmark" onclick="return !xajax_load_latest_post(' . get_the_ID() . ');" title="Permalink: ' . the_title( '', '', false) . '">' . the_title( '', '', false) . '</a></h3>' . "\n"; // echo ' <h3><a href="#" rel="bookmark" onclick="xajax_load_latest_post(\'' . get_the_ID() . '\');" title="Permalink: ' . the_title( '', '', false) . '">' . the_title( '', '', false) . '</a></h3>' . "\n"; // echo ' <h3><a href="javascript:xajax_load_latest_post(\'' . $biq_id . '\')" rel="bookmark" title="Permalink: ' . the_title( '', '', false) . '">' . the_title( '', '', false) . '</a></h3>' . "\n"; the_excerpt(); echo ' </div>' . "\n"; } } wp_reset_query(); echo ' </div>' . "\n"; echo ' </div>' . "\n"; } $biq_amazon_item_list_search = NULL; $biq_amazon_items_per_page = NULL; $biq_amazon_item_list_page = NULL; // process submitted data // SORT Order if ( $_POST['biq_amazon_item_list_search'] ) { $biq_amazon_item_list_search = $_POST['biq_amazon_item_list_search']; } // number of items to display if ( $_POST['amazon_items_ppage'] ) { $biq_amazon_items_per_page = intval($_POST['amazon_items_ppage']); $_SESSION['amazon_items_ppage'] = $biq_amazon_items_per_page; } if ( !$biq_amazon_items_per_page ) { if ( $_SESSION['amazon_items_ppage'] ) $biq_amazon_items_per_page = $_SESSION['amazon_items_ppage']; else $biq_amazon_items_per_page = 9; } // page number if ( $_POST['biq_amazon_item_list_page'] ) { $biq_amazon_item_list_page = intval($_POST['biq_amazon_item_list_page']); } if ( !$biq_amazon_item_list_page OR isset($_POST['biq_amazon_item_list_page_first'])) $biq_amazon_item_list_page = 1; // call to get product items $query = 'SELECT * FROM amazon_attributes;'; $biq_amazon_product_list = $wpdb->get_results($query); if ( $biq_amazon_product_list ) { $biq_amazon_product_list_count = count( $biq_amazon_product_list ); echo ' <div id="content">' . "\n"; echo ' <div id="amazon_item_list_header">' . "\n"; echo ' <div id="amazon_items_search">' . "\n"; echo ' <b>SORT BY</b> ' . "\n"; echo ' <form class="form_items_search" action="' . $_SERVER['PHP_SELF'] . '" method="post">' . "\n"; echo ' <select name="biq_amazon_item_list_search" size="1">' . "\n"; echo ' <option><a href="">LOW PRICE</a></option>' . "\n"; echo ' <option><a href="">HIGH PRICE</a></option>' . "\n"; echo ' <option><a href="">DISCOUNT</a></option>' . "\n"; echo ' </select>' . "\n"; echo ' </form>' . "\n"; echo ' </div>' . "\n"; echo ' <div id="amazon_items_count">' . "\n"; echo ' ' . $biq_amazon_items_per_page . ' of ' . $biq_amazon_product_list_count . ' SHOES' . "\n"; echo ' </div>' . "\n"; echo ' <div id="amazon_items_ppage">' . "\n"; echo ' <form class="form_items_ppage" method="post" action="">Items per Page <a href=""><input type="submit" class="input_items_ppage" name="amazon_items_ppage" value="9" /></a> | </form>' . "\n"; echo ' <form class="form_items_ppage" method="post" action=""><a href=""><input type="submit" class="input_items_ppage" name="amazon_items_ppage" value="18" /></a> | </form>' . "\n"; echo ' <form class="form_items_ppage" method="post" action=""><a href=""><input type="submit" class="input_items_ppage" name="amazon_items_ppage" value="27" /></a> | </form>' . "\n"; echo ' </div>' . "\n"; echo ' </div>' . "\n"; $biq_amazon_page_count = intval($biq_amazon_product_list_count / $biq_amazon_items_per_page); if ( ($biq_amazon_page_count * $biq_amazon_items_per_page) < $biq_amazon_product_list_count ) $biq_amazon_page_count++; if ( isset($_POST['biq_amazon_item_list_page_last']) ) $biq_amazon_item_list_page = $biq_amazon_page_count; $biq_item_counter = $biq_amazon_items_per_page * ($biq_amazon_item_list_page - 1) + 1; $biq_amazon_product_list_page_rest = $biq_amazon_product_list_count % $biq_amazon_items_per_page; $biq_amazon_page_row_count = $biq_amazon_items_per_page / 3; for ( $index = 0; (($index < $biq_amazon_page_row_count)); $index++) { echo ' <div id="amazon_item_row">' . "\n"; for ( $i = 0; (($i < 3) AND ( ($biq_item_counter <= $biq_amazon_product_list_count) )); $i++) { echo ' <div id="amazon_item_field">' . "\n"; echo ' <div id="amazon_item_img">' . "\n"; echo ' <a href="' . $biq_amazon_product_list[$biq_item_counter]->detail_page_url . '" title="' . $biq_amazon_product_list[$biq_item_counter]->title . '" target="_blank">'; echo '<img src="' . $biq_amazon_product_list[$biq_item_counter]->medium_image_url . '" alt="' . htmlentities($biq_amazon_product_list[$biq_item_counter]->prod_desc) . '" />'; echo '</a>' . "\n"; echo ' </div>' . "\n"; // echo ' <div class="item_seperator"></div>' . "\n"; echo ' <div id="amazon_item_description">' . "\n"; echo ' <a href="' . $biq_amazon_product_list[$biq_item_counter]->detail_page_url . '" title="' . $biq_amazon_product_list[$biq_item_counter]->title . '" target="_blank">' . $biq_amazon_product_list[$biq_item_counter]->title . '</a><br />' . "\n"; echo $biq_amazon_product_list[$biq_item_counter]->brand . '<br />' . "\n"; if ( ($biq_amazon_product_list[$biq_item_counter]->pct_off != NULL) AND ($biq_amazon_product_list[$biq_item_counter]->pct_off != 0)) { echo $biq_amazon_product_list[$biq_item_counter]->formatted_price . '<br />' . "\n"; echo $biq_amazon_product_list[$biq_item_counter]->display_price . ' (' . ($biq_amazon_product_list[$biq_item_counter]->pct_off * 100) . '% off)' . "\n"; } else { echo $biq_amazon_product_list[$biq_item_counter]->display_price . '<br />' . "\n"; } echo ' </div>' . "\n"; echo ' </div>' . "\n"; $biq_item_counter++; } if ( $index < ($biq_amazon_page_row_count - 1)) echo ' <div class="seperator"></div>' . "\n"; echo ' </div>' . "\n"; } echo ' <div id="amazon_item_list_footer">' . "\n"; echo ' <div id="amazon_item_list_footer_link">' . "\n"; echo ' <a href="#top">Back To Top</a>' . "\n"; echo ' </div>' . "\n"; echo ' <div id="amazon_item_list_footer_nav">' . "\n"; echo ' <form class="form_item_list_page" method="post" action=""><a href=""><input type="submit" class="input_item_list_page_first" name="biq_amazon_item_list_page_first" value="" /></a> </form>' . "\n"; if ( $biq_amazon_item_list_page > 10 ) $biq_list_page_start = $biq_amazon_item_list_page - 5; else $biq_list_page_start = 1; for ( $i=$biq_list_page_start; (($i <= $biq_amazon_page_count) AND ($i <= ($biq_list_page_start + 10))); $i++ ) { if ( $i == $biq_amazon_item_list_page ) echo '<form class="form_item_list_page" method="post" action=""><a href=""><input type="submit" class="input_item_list_page active" name="biq_amazon_item_list_page" value="' . $i . '" /></a> | </form>' . "\n"; else echo '<form class="form_item_list_page" method="post" action=""><a href=""><input type="submit" class="input_item_list_page nonactive" name="biq_amazon_item_list_page" value="' . $i . '" /></a> | </form>' . "\n"; } echo ' <form class="form_item_list_page" method="post" action=""><a href=""><input type="submit" class="input_item_list_page_last" name="biq_amazon_item_list_page_last" value="" /></a> </form>' . "\n"; echo ' </div>' . "\n"; echo ' </div>' . "\n"; echo ' </div>' . "\n"; } else { echo ' <p>' . __('Sorry, no products available.', 'biq') . '</p>' . "\n"; } echo ' </div>' . "\n\n"; get_sidebar(); get_footer(); ?> comment:7 christian_gnoth3 years ago • Summary changed from is_front_page returns false - if used before the loop starts to is_front_page returns false - if used after the loop starts comment:8 nacin3 years ago • Milestone Awaiting Review deleted • Resolution set to invalid • Status changed from new to closed I can't reproduce anything with that code per se, but it is obvious why is_front_page is returning two different values. Between calls, you call query_posts(), which resets the query object and changes all of the conditionals to reflect the new query. If you don't want to alter things that low-level, then using get_posts or a new WP_Query will suffice. Also, if you're going to use $_SERVER['PHP_SELF'], better not to use it, but if you do, then make sure you escape it. http://markjaquith.wordpress.com/2009/09/21/php-server-vars-not-safe-in-forms-or-links/ comment:9 azizur3 years ago • Cc azizur added Note: See TracTickets for help on using tickets.
__label__pos
0.532226
just some thoughts Text-only Version: Click HERE to see this thread with all of the graphics, features, and links. FluX I was wondering what would happen if the machines manage to keep the matrix program running for a few hundred years? Perhaps the same thing happens all over again and a new matrix is born inside the matrix. Wouldn't that be weird? blink Actually, in the movie they don't tell us what would happen then, and besides how do the machines think they can keep draining power from our bodies if they can't let the matrix run forever? Maybe they're looking for an alternative power source and is the matrix just a temporary solution? jeez all this matrix stuff thinking drives me mad, time for something more relaxing sleep stick out tongue The Omega FluX And the humans wouldn't notice a single thing from this whole process? Suddenly their lives stop in the middel of an action and they're thrown a hundred years back in time. I still think there are a few shaky points in this matrix theory. Another point: In the matrix (espesially in reloaded) it's like nobody sees all the action that is performed in the middle of the freeway. And wouldn't it be a little weird if suddenly a man flies through the city at let's say 1000kph and creates a whole shockwave crushing everything on its path? What do the machines do to hold control after such things have happend? Sifer This has been mentioned before. But what if the all humans knew that they are living in a Computer Generated Dream World, then would they really want to live their rest of their lives on the surface? Or what if they had a way they could plug in and out anytime but at the same time provide power to the machines. The Humans could have a perfect world but they refuse to. What a bunch of arrogant pricks we are as a race - it's true smile Text-only Version: Click HERE to see this thread with all of the graphics, features, and links.
__label__pos
0.923416
This is the mail archive of the [email protected] mailing list for the GCC project. Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index] Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next] Other format: [Raw text] Re: [PATCH, i386] Unify TARGET_SSE_MATH for trunc* patterns On Fri, Dec 17, 2004 at 11:39:40AM +0100, Uros Bizjak wrote: > -(define_insn "*truncdfsf2_1_sse" > +(define_insn "*truncdfsf2_2" ... > -(define_insn "*truncdfsf2_1_sse_nooverlap" > +(define_insn "*truncdfsf2_2_nooverlap" ... > -(define_insn "*truncdfsf2_2" > +(define_insn "*truncdfsf2_mixed" Missed truncdfsf2_1? You're not ordering these as we discussed, and you had been doing for the other patches. Which makes me doubt we'll select the proper pattern. I'm a bit confused about the choices here in the trunc patterns in general. We have choices: (1) -ffast-math. (2) allow 80387 reg-reg, but require a scratch memory, (3) disallow 80387 reg-reg, no scratch memory. However, the patterns are not consistent in their selection of 2 or 3, and don't seem to allow for all alternatives allowed by -mfpmath. As an aside, I would support removing TARGET_SSE_PARTIAL_REGS_FOR_CVTSD2SS, since it's currently always zero. Honza, is this the remnants of of an experiment to see what's faster, or is this supposed to be set for Athlon, or what? It seems like we can merge cases (1) and (3). Which would result in something like this: (define_expand "truncdfsf2" [(set (match_operand:SF 0 "nonimmediate_operand" "") (float_truncate:SF (match_operand:DF 1 "nonimmediate_operand" "")))] "TARGET_80387 || (TARGET_SSE2 && TARGET_SSE_MATH)" { if (MEM_P (operands[0]) && MEM_P (operands[1])) operands[1] = force_reg (DFmode, operands[1]); if (TARGET_SSE2 && TARGET_SSE_MATH && !TARGET_MIX_SSE_I387) ; else if (flag_unsafe_math_optimizations) ; else { emit_insn (gen_truncdfsf2_with_temp (operands[0], operands[1], assign_386_stack_local (SFmode, 0))); DONE; } }) (define_expand "truncdfsf2_with_temp" [(parallel [(set (match_operand:SF 0 "" "") (float_truncate:SF (match_operand:DF 1 "" ""))) (clobber (match_operand:SF 2 "" ""))])] "") (define_insn "*truncdfsf_fast_mixed" [(set (match_operand:SF 0 "nonimmediate_operand" "=m,f,Y") (float_truncate:SF (match_operand:DF 1 "nonimmediate_operand" "f ,f,Ym")] "TARGET_SSE2 && TARGET_MIX_SSE_I387 && flag_unsafe_math_optimizations" ...) ;; Yes, this one doesn't depend on flag_unsafe_math_optimizations, ;; because nothing we do here is unsafe. (define_insn "*truncdfsf_fast_sse" [(set (match_operand:SF 0 "nonimmediate_operand" "=Y") (float_truncate:SF (match_operand:DF 1 "nonimmediate_operand" "Ym")] "TARGET_SSE2 && TARGET_SSE_MATH" ...) (define_insn "*truncdfsf_fast_i387" [(set (match_operand:SF 0 "nonimmediate_operand" "=fm") (float_truncate:SF (match_operand:DF 1 "nonimmediate_operand" "f")] "TARGET_80387 && flag_unsafe_math_optimizations" ...) (define_insn "*truncdfsf_mixed" [(set (match_operand:SF 0 "nonimmediate_operand" "=m,f,?fx*r,Y") (float_truncate:SF (match_operand:DF 1 "nonimmediate_operand" "f ,f,f ,Ym") (clobber (match_operand:SF 2 "memory_operand" "X ,m,m ,X"))] "TARGET_SSE2 && TARGET_MIX_SSE_I387" ...) (define_insn "*truncdfsf_i387" [(set (match_operand:SF 0 "nonimmediate_operand" "=m,f,?fx*r") (float_truncate:SF (match_operand:DF 1 "nonimmediate_operand" "f ,f,f ") (clobber (match_operand:SF 2 "memory_operand" "X ,m,m "))] "TARGET_80387" ...) (splitters go here) r~ Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index] Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]
__label__pos
0.558023
How Can We Help? User account configuration To access the GUI configurations, click on the configuration buttonicon setting and go to the User – Account section. 6.5 GUI account utente The parameters to be entered for user authentication on the VOIspeed 6 server are as follows: 1. Username: user for authentication in the user @ domino format (where “dominio” is the corporate domain of the PBX) 2. Password: password assigned to the user 3. Internal: telephone extension number associated with the user 4. Server 1 URL: IP_address of the main_server: 5063 (required) 5. Server 2 URL: IP_address of the secondary_server: 5063 (optional) 6. Auto login at startup: allows the GUI to log in automatically at startup 7. Set the absent status on logout: by disabling the GUI, the user status is absent and therefore all of its terminals can no longer receive or make calls 8. Password change: allows the user to change their GUI access password (does not affect the password of their terminals) Note 1: the secondary server is useful when you often need to change the address to reach your server. For example, in the case of mobility: when the user is in his office, he will use the local IP address of the server, while when he is out of office, he will use the public IP address of the server configured in the “Server URL 2” section. In this way it will not be necessary to manually change the IP of the server every time the user leaves and returns to his office. The GUI will automatically attempt to login on URL 1 and in case of failure it will attempt on URL 2 (if any). Note 2: VOIspeed 6 uses a mechanism for updating the status of users by means of a SIP subscription (subscribe) to the VOIspeed server. Each GUI then performs an individual point-to-point subscription to the server to request and obtain this service. Since this mechanism does not require the sending of information via a broadcast, the IP address associated with the GUI can be on a separate subnet from that of the server, as long as there is a router in the network with a route between the two subnets.
__label__pos
0.993235
Take the 2-minute tour × Stack Overflow is a question and answer site for professional and enthusiast programmers. It's 100% free, no registration required. When was the unordered_map concept built into g++? Because the following code throws an error. #include<iostream> #include<unordered_map> #include<stdio.h> using namespace std; std::unordered_map<std::int,int> mirror; mirror['A'] = 'A'; mirror['B'] = '#'; mirror['E'] = 3; int main(void) { std::cout<<mirror['A']; std::cout<<mirror['B']; std::cout<<mirror['C']; return 0; } I am compiling the code as follows: g++ -c hashexample.cpp g++ -o result hashExample.o ./result The error I got is this: inavalid types int[char[ for aaray subscript What is the fix for this? share|improve this question      Apart from the solutions offered below you can consider changing your template from <int,int> to <char, int> as you are using only chars for providing the key. Just an observation/suggestion! –  another.anon.coward Sep 9 '11 at 9:19      that should not even compile because of the std::int, which is not valid C++. –  phresnel Sep 9 '11 at 9:20 1   stdio.h has been deprecated in C++ since at least 13 years ago, and why are you not indenting your code? –  Lightness Races in Orbit Sep 9 '11 at 9:24 2 Answers 2 up vote 4 down vote accepted The problem is your assignment. You cannot assign values to your map in this place. C++ is not a script language. This program works fine on my machine with gcc4.6: #include<iostream> #include<unordered_map> std::unordered_map<int,int> mirror; int main() { mirror['A'] = 'A'; mirror['B'] = '#'; mirror['E'] = 3; std::cout<<mirror['A']; std::cout<<mirror['B']; std::cout<<mirror['C']; } share|improve this answer      You can do it "in this way", just not "in this place"! –  Lightness Races in Orbit Sep 9 '11 at 9:24 1   @Tomalak: You are right "in this place" is better. –  mkaes Sep 9 '11 at 9:36      yeah, I saw that too. however I cannot put it in main. –  crazy_pants Dec 8 '12 at 7:56 First, as mkaes points out, you cannot put assignments outside functions, so you have to put it in any, for example main. As for unordered_map, for recent versions of gcc, if you don't want to go into C++11, you can use the TR1 version of unordered_map: #include <tr1/unordered_map> and the type std::tr1::unordered_map. You know, C++11 supersedes all this, but you will (at least in GCC) get this working. share|improve this answer Your Answer   discard By posting your answer, you agree to the privacy policy and terms of service. Not the answer you're looking for? Browse other questions tagged or ask your own question.
__label__pos
0.661708
{"sendNewsletter":true,"createdAt":1670181971456,"categories":["nft"],"title":"NFT Minting Explained","id":"yfcAKThbVMaT6NsDZjbR","archived":false,"updatedAt":1670241218843,"publishedAt":1670183013073,"storeOnArweave":true,"staticHtml":" Today we will break this down in more detail and have a look under the hood to see what’s actually happening when someone mints an NFT. To understand minting, you have to understand that every NFT is created by interacting with a smart contract. A smart contract is essentially a body of code that is stored on a blockchain Rather than have developers create this code from scratch every single time, like with most things, a few standards have been created. Most NFTs fall into one of two standard categories: ERC-721 and ERC-1155. What are ERC Tokens? Read HERE. You can ignore what ERC stands for, it’s technical and not particularly relevant. Just know that if a token is an ERC-721 token, it follows a standard template of code, and if it is an ERC-1155 token, it follows a different template of code. The biggest difference between the two is that every ERC-721 is unique. ERC-1155s can be either unique or the same. In other words, ERC-721s are always non-fungible. ERC-1155s can be either non-fungible, or fungible. You might think that this makes the ERC-1155 standard superior, but in fact, it is far less used. The reason being is that there are certain tradeoffs that have to be made when allowing for the ability to use both fungible and non-fungible tokens, and, generally speaking, most developers/founders prefer to use the ERC-721 standard when working with NFTs. Once the code for the NFT to be minted is created, it is then up to a human to decide when, where, and how to mint it. As the creator of the code, you can decide to mint one or all of the NFTs yourself. You can decide to allow other people to mint them themselves, either for free, or charging them a price. This is what most people refer to when they think about “minting an NFT”, it’s “buying an NFT from someone else for the first time”.  Remember, if you buy on a secondary market, you’re not actually minting it – it has already been minted (aka created). Minting only refers to the first time the NFT is created, similar to how real world paper money is minted and then is in circulation forever. Thank you for reading! If you're interested in following along, feel free to subscribe! Let’s bust some more in next article. WANT TO GET 100 USDT? Register and deposit more than $50 into your account. We'll both get a 100 USDT cashback voucher! REDEEM GIFT NOW! If you want more, be sure to FOLLOW ME ","arweaveId":"qd9yJ3R0iBTq1RAxocJjreJd9T5QH0Cp1ZSZZfsl6zc","accessRestriction":null,"slug":"minting-explained","about_me":false,"published":true,"post_preview":"Today we will break this down in more detail and have a look under the hood to see what’s actually happening when someone mints an NFT. To understand m...","subtitle":"Mint - The act of interacting with a smart contract to generate an NFT for the first time.","votes":0,"json":"{\"type\":\"doc\",\"content\":[{\"type\":\"paragraph\",\"attrs\":{\"textAlign\":\"left\"}},{\"type\":\"paragraph\",\"attrs\":{\"textAlign\":\"left\"},\"content\":[{\"type\":\"text\",\"text\":\"Today we will break this down in more detail and have a look under the hood to see what’s actually happening when someone mints an \"},{\"type\":\"text\",\"marks\":[{\"type\":\"link\",\"attrs\":{\"href\":\"https://www.adilkazani.com/2022/03/what-is-nft-and-why-you-should-buy-nfts.html\",\"target\":\"_blank\",\"class\":\"dont-break-out\"}}],\"text\":\"NFT\"},{\"type\":\"text\",\"text\":\".\"}]},{\"type\":\"paragraph\",\"attrs\":{\"textAlign\":\"justify\"}},{\"type\":\"paragraph\",\"attrs\":{\"textAlign\":\"justify\"},\"content\":[{\"type\":\"text\",\"text\":\"To understand minting, you have to understand that every NFT is created by interacting with a smart contract. A \"},{\"type\":\"text\",\"marks\":[{\"type\":\"link\",\"attrs\":{\"href\":\"https://www.adilkazani.com/2022/04/what-are-smart-contracts.html\",\"target\":\"_blank\",\"class\":\"dont-break-out\"}},{\"type\":\"bold\"}],\"text\":\"smart contract\"},{\"type\":\"text\",\"text\":\" is essentially a body of code that is stored on a \"},{\"type\":\"text\",\"marks\":[{\"type\":\"link\",\"attrs\":{\"href\":\"https://www.adilkazani.com/2022/03/what-is-blockchain.html\",\"target\":\"_blank\",\"class\":\"dont-break-out\"}},{\"type\":\"bold\"}],\"text\":\"blockchain\"},{\"type\":\"text\",\"text\":\". \"}]},{\"type\":\"paragraph\",\"attrs\":{\"textAlign\":\"justify\"}},{\"type\":\"paragraph\",\"attrs\":{\"textAlign\":\"justify\"},\"content\":[{\"type\":\"text\",\"text\":\"Rather than have developers create this code from scratch every single time, like with most things, a few standards have been created. Most \"},{\"type\":\"text\",\"marks\":[{\"type\":\"link\",\"attrs\":{\"href\":\"https://www.adilkazani.com/2022/03/what-is-nft-and-why-you-should-buy-nfts.html\",\"target\":\"_blank\",\"class\":\"dont-break-out\"}}],\"text\":\"NFTs\"},{\"type\":\"text\",\"text\":\" fall into one of two standard categories:\"}]},{\"type\":\"paragraph\",\"attrs\":{\"textAlign\":\"justify\"}},{\"type\":\"paragraph\",\"attrs\":{\"textAlign\":\"justify\"},\"content\":[{\"type\":\"text\",\"marks\":[{\"type\":\"code\"}],\"text\":\"ERC-721\"},{\"type\":\"text\",\"text\":\" and \"},{\"type\":\"text\",\"marks\":[{\"type\":\"code\"}],\"text\":\"ERC-1155\"},{\"type\":\"text\",\"text\":\".\"}]},{\"type\":\"paragraph\",\"attrs\":{\"textAlign\":\"left\"}},{\"type\":\"heading\",\"attrs\":{\"textAlign\":\"center\",\"level\":2},\"content\":[{\"type\":\"text\",\"text\":\"What are ERC Tokens? Read \"},{\"type\":\"text\",\"marks\":[{\"type\":\"link\",\"attrs\":{\"href\":\"https://www.adilkazani.com/2022/10/what-are-erc-tokens.html\",\"target\":\"_blank\",\"class\":\"dont-break-out\"}},{\"type\":\"italic\"}],\"text\":\"HERE\"},{\"type\":\"text\",\"text\":\". \"}]},{\"type\":\"paragraph\",\"attrs\":{\"textAlign\":\"justify\"}},{\"type\":\"paragraph\",\"attrs\":{\"textAlign\":\"justify\"},\"content\":[{\"type\":\"text\",\"text\":\"You can ignore what ERC stands for, it’s technical and not particularly relevant. Just know that if a token is an ERC-721 token, it follows a standard template of code, and if it is an ERC-1155 token, it follows a different template of code.\"}]},{\"type\":\"paragraph\",\"attrs\":{\"textAlign\":\"justify\"}},{\"type\":\"paragraph\",\"attrs\":{\"textAlign\":\"justify\"},\"content\":[{\"type\":\"text\",\"text\":\"The biggest difference between the two is that every ERC-721 is \"},{\"type\":\"text\",\"marks\":[{\"type\":\"bold\"},{\"type\":\"italic\"}],\"text\":\"unique\"},{\"type\":\"text\",\"text\":\". ERC-1155s can be either unique or the same. In other words, ERC-721s are always non-fungible. ERC-1155s can be \"},{\"type\":\"text\",\"marks\":[{\"type\":\"bold\"},{\"type\":\"italic\"}],\"text\":\"either\"},{\"type\":\"text\",\"marks\":[{\"type\":\"italic\"}],\"text\":\" \"},{\"type\":\"text\",\"text\":\"non-fungible, \"},{\"type\":\"text\",\"marks\":[{\"type\":\"bold\"},{\"type\":\"italic\"}],\"text\":\"or\"},{\"type\":\"text\",\"text\":\" fungible.\"}]},{\"type\":\"paragraph\",\"attrs\":{\"textAlign\":\"justify\"}},{\"type\":\"paragraph\",\"attrs\":{\"textAlign\":\"justify\"},\"content\":[{\"type\":\"text\",\"text\":\"You might think that this makes the ERC-1155 standard superior, but in fact, it is far less used. The reason being is that there are certain tradeoffs that have to be made when allowing for the ability to use both fungible and non-fungible tokens, and, generally speaking, most developers/founders prefer to use the ERC-721 standard when working with NFTs.\"}]},{\"type\":\"paragraph\",\"attrs\":{\"textAlign\":\"justify\"}},{\"type\":\"paragraph\",\"attrs\":{\"textAlign\":\"justify\"},\"content\":[{\"type\":\"text\",\"text\":\"Once the code for the \"},{\"type\":\"text\",\"marks\":[{\"type\":\"link\",\"attrs\":{\"href\":\"https://www.adilkazani.com/2022/03/what-is-nft-and-why-you-should-buy-nfts.html\",\"target\":\"_blank\",\"class\":\"dont-break-out\"}}],\"text\":\"NFT\"},{\"type\":\"text\",\"text\":\" to be minted is created, it is then up to a human to decide when, where, and how to mint it. As the creator of the code, you can decide to mint one or all of the NFTs yourself. You can decide to allow other people to mint them themselves, either for free, or charging them a price. This is what most people refer to when they think about “minting an NFT”, it’s “buying an NFT from someone else for the first time”. \"}]},{\"type\":\"paragraph\",\"attrs\":{\"textAlign\":\"justify\"}},{\"type\":\"paragraph\",\"attrs\":{\"textAlign\":\"justify\"},\"content\":[{\"type\":\"text\",\"text\":\"Remember, if you buy on a secondary market, you’re not actually minting it – it has already been minted (aka created). Minting only refers to the first time the \"},{\"type\":\"text\",\"marks\":[{\"type\":\"link\",\"attrs\":{\"href\":\"https://www.adilkazani.com/2022/03/what-is-nft-and-why-you-should-buy-nfts.html\",\"target\":\"_blank\",\"class\":\"dont-break-out\"}}],\"text\":\"NFT\"},{\"type\":\"text\",\"text\":\" is created, similar to how real world paper money is minted and then is in circulation forever.\"}]},{\"type\":\"horizontalRule\"},{\"type\":\"paragraph\",\"attrs\":{\"textAlign\":\"justify\"},\"content\":[{\"type\":\"text\",\"text\":\"Thank you for reading!\"}]},{\"type\":\"paragraph\",\"attrs\":{\"textAlign\":\"left\"},\"content\":[{\"type\":\"text\",\"text\":\"If you're interested in following along, feel free to \"},{\"type\":\"text\",\"marks\":[{\"type\":\"bold\"}],\"text\":\"subscribe!\"}]},{\"type\":\"paragraph\",\"attrs\":{\"textAlign\":\"left\"},\"content\":[{\"type\":\"text\",\"text\":\"Let’s bust some more in next article.\"}]},{\"type\":\"paragraph\",\"attrs\":{\"textAlign\":\"left\"}},{\"type\":\"paragraph\",\"attrs\":{\"textAlign\":\"center\"}},{\"type\":\"callout\",\"attrs\":{\"type\":\"warning\"},\"content\":[{\"type\":\"paragraph\",\"attrs\":{\"textAlign\":\"center\"},\"content\":[{\"type\":\"text\",\"marks\":[{\"type\":\"bold\"}],\"text\":\"WANT TO GET 100 USDT?\"}]}]},{\"type\":\"paragraph\",\"attrs\":{\"textAlign\":\"center\"},\"content\":[{\"type\":\"text\",\"text\":\"Register and deposit more than $50 into your account. We'll both get a 100 USDT cashback voucher!\"}]},{\"type\":\"heading\",\"attrs\":{\"textAlign\":\"center\",\"level\":1},\"content\":[{\"type\":\"text\",\"marks\":[{\"type\":\"link\",\"attrs\":{\"href\":\"https://www.binance.com/en-IN/activity/referral-entry/CPA?fromActivityPage=true&ref=CPA_006R0AZVVC\",\"target\":\"_blank\",\"class\":\"dont-break-out \"}}],\"text\":\"REDEEM GIFT NOW!\"}]},{\"type\":\"paragraph\",\"attrs\":{\"textAlign\":\"center\"}},{\"type\":\"paragraph\",\"attrs\":{\"textAlign\":\"center\"}},{\"type\":\"paragraph\",\"attrs\":{\"textAlign\":\"left\"}},{\"type\":\"paragraph\",\"attrs\":{\"textAlign\":\"center\"},\"content\":[{\"type\":\"text\",\"marks\":[{\"type\":\"bold\"}],\"text\":\"If you want more, be sure to\"}]},{\"type\":\"heading\",\"attrs\":{\"textAlign\":\"center\",\"level\":1},\"content\":[{\"type\":\"text\",\"marks\":[{\"type\":\"link\",\"attrs\":{\"href\":\"https://owl.link/kazani.btc\",\"target\":\"_blank\",\"class\":\"dont-break-out \"}},{\"type\":\"bold\"}],\"text\":\"FOLLOW ME\"}]},{\"type\":\"paragraph\",\"attrs\":{\"textAlign\":\"left\"},\"content\":[{\"type\":\"hardBreak\"}]}]}","markdown":"Today we will break this down in more detail and have a look under the hood to see what’s actually happening when someone mints an [NFT](https://www.adilkazani.com/2022/03/what-is-nft-and-why-you-should-buy-nfts.html).\n\nTo understand minting, you have to understand that every NFT is created by interacting with a smart contract. A [**smart contract**](https://www.adilkazani.com/2022/04/what-are-smart-contracts.html) is essentially a body of code that is stored on a [**blockchain**](https://www.adilkazani.com/2022/03/what-is-blockchain.html). \n\nRather than have developers create this code from scratch every single time, like with most things, a few standards have been created. Most [NFTs](https://www.adilkazani.com/2022/03/what-is-nft-and-why-you-should-buy-nfts.html) fall into one of two standard categories:\n\n`ERC-721` and `ERC-1155`.\n\nWhat are ERC Tokens? Read [_HERE_](https://www.adilkazani.com/2022/10/what-are-erc-tokens.html).\n------------------------------------------------------------------------------------------------\n\nYou can ignore what ERC stands for, it’s technical and not particularly relevant. Just know that if a token is an ERC-721 token, it follows a standard template of code, and if it is an ERC-1155 token, it follows a different template of code.\n\nThe biggest difference between the two is that every ERC-721 is **_unique_**. ERC-1155s can be either unique or the same. In other words, ERC-721s are always non-fungible. ERC-1155s can be **_either_** non-fungible, **_or_** fungible.\n\nYou might think that this makes the ERC-1155 standard superior, but in fact, it is far less used. The reason being is that there are certain tradeoffs that have to be made when allowing for the ability to use both fungible and non-fungible tokens, and, generally speaking, most developers/founders prefer to use the ERC-721 standard when working with NFTs.\n\nOnce the code for the [NFT](https://www.adilkazani.com/2022/03/what-is-nft-and-why-you-should-buy-nfts.html) to be minted is created, it is then up to a human to decide when, where, and how to mint it. As the creator of the code, you can decide to mint one or all of the NFTs yourself. You can decide to allow other people to mint them themselves, either for free, or charging them a price. This is what most people refer to when they think about “minting an NFT”, it’s “buying an NFT from someone else for the first time”. \n\nRemember, if you buy on a secondary market, you’re not actually minting it – it has already been minted (aka created). Minting only refers to the first time the [NFT](https://www.adilkazani.com/2022/03/what-is-nft-and-why-you-should-buy-nfts.html) is created, similar to how real world paper money is minted and then is in circulation forever.\n\n* * *\n\nThank you for reading!\n\nIf you're interested in following along, feel free to **subscribe!**\n\nLet’s bust some more in next article.\n\n![](https://paragraph.xyz/editor/callout/warning-icon.png)\n\n**WANT TO GET 100 USDT?**\n\nRegister and deposit more than $50 into your account. We'll both get a 100 USDT cashback voucher!\n\n[REDEEM GIFT NOW!](https://www.binance.com/en-IN/activity/referral-entry/CPA?fromActivityPage=true&ref=CPA_006R0AZVVC)\n======================================================================================================================\n\n**If you want more, be sure to**\n\n[**FOLLOW ME**](https://owl.link/kazani.btc)\n============================================"}
__label__pos
0.74436
Take the 2-minute tour × Stack Overflow is a question and answer site for professional and enthusiast programmers. It's 100% free, no registration required. Questions: 1. Is Qt Creator built with Qt Creator? 2. Similarly, is Qt Designer built with Qt Designer? 3. BTW, why are there two Qt IDEs? Are they competitors? Which one should I use? I am using Creator. 4. What is Qt SDK? I am asking this because the Qt Designer & Creator 2.2.1 and Qtmake 4.7.4 that I installed thro ubuntu 11.10 s/w centre does not work. The build menu is all greyed out. When I downloaded the latest QtSDK (2.3.1/4.7.4) into a separate installation into /opt/QtSDK, both the ubuntu sanctioned installation and the /opt/QtSDK would work as expected. Why did my ubuntu sanctioned installation not work without the SDK? What does the SDK do? 5. This one is for Ubuntu enthusiasts - Qt IDE requires the SDK to work, and yet ubuntu released both Creator/Designer without checking if they work first? There is no QtSDK installation item in s/w centre. Is that intentional, or a procedural bug? 6. After I build my desktop app (I am building a tabbed file explorer) on Linux, what steps do I need to make to have it running on Windows 7/Vista? Will I rebuild on a windows version of Qt Creator? I also notice that Qt Creator code generation is not perfect. It would forget to include some Qt library files in the auto-generated code, and I had to correct that manually. share|improve this question      Qt Creator is an IDE, which includes Qt Designer, a layout builder. –  John Flatness Oct 30 '11 at 3:10      Ya, Qt Creator can do layout design too. Why is there a separate qt designer? Is that necessary? –  Blessed Geek Oct 30 '11 at 3:15      Having been a C++, Java and .NET programmer for too many years, I found Qt very intuitive.After, finally deciding may be I should install from Nokia download directly (which took 1.6GB ~2hours), it took me about 10 minutes to create a respectable app and putting in simple event handlers (slots?? What's that?). If you are used to event-driven or even mvp/mvc, and an experienced Java/.NET programmer and don't mind c++, you should give Qt4 a try. –  Blessed Geek Oct 30 '11 at 3:27      ok, and what was the crux of the last comment with reference to your question ? –  krammer Oct 30 '11 at 6:19 3   Blessed Geek: designer predates Qt Creator by a decade or so. Being available standalone, one can use designer without having to use Qt Creator. –  Frank Osterfeld Oct 30 '11 at 9:13 1 Answer 1 up vote 11 down vote accepted Is Qt Creator built with Qt Creator? I believe so. That doesn't mean that everyone who works on Qt has to use it - just that I believe that lots of people do. I don't work for any of the companies that have produced Qt, but my reasoning is: • A Google search for "dogfooding qt creator" brings up plenty of hits, including this comment from November 2010: We’re also “dogfooding” by releasing complex apps like Qt Creator and the Ovi Suite on the desktop ports of Qt • They've put a massive amount of effort into Qt Creator over the last few years. It's hard to imagine that being worthwhile, unless they used it themselves • At recent Qt Developer Days, Qt Developers have spoken really enthusiastically about Qt Creator Similarly, is Qt Designer built with Qt Designer? Yes. A look at the Qt Designer source code shows plenty of .ui (Designer) files. Why are there two Qt IDEs? Are they competitors? Which one should I use? I am using Creator. When you edit .ui files insiide Qt Creator, you are still running Qt Designer: it's simply showing the Designer window inside Creator, for convenience. What is Qt SDK? ... What does the SDK do? Qt SDK is just a convenient way to download all the Qt tools in one go. You don't have to use it. This one is for Ubuntu enthusiasts ... Is that intentional, or a procedural bug? Sorry - no idea. It's hard to imagine it being intentional though. After I build my desktop app (I am building a tabbed file explorer) on Linux, what steps do I need to make to have it running on Windows 7/Vista? Will I rebuild on a windows version of Qt Creator? You will need to install Qt on a Windows PC, and then build your source code in it. You can either do that by using Qt Creator and the Windows compiler it includes (mingw) or you can use another compiler, if you have one, e.g. Visual Studio. I also notice that Qt Creator code generation is not perfect. It would forget to include some Qt library files in the auto-generated code, and I had to correct that manually. If you've used any non-Qt classes in arguments to signals and slots, then this answer may help you there. share|improve this answer      About Designer vs. Creator, my personal experience is that I can access more features in the Designer than in the form editor of Creator. Ressources handling is better in the designer. Sometime ago I gave Qwt a shot. Qwt widgets appeared in the designer but not in the form editor of creator. All in all, I use the form designer in the creator most of the time. But every now and then I have to fall back to the original designer for some missing feature. –  rpsml Aug 29 '12 at 20:13 Your Answer   discard By posting your answer, you agree to the privacy policy and terms of service. Not the answer you're looking for? Browse other questions tagged or ask your own question.
__label__pos
0.812439
Map Reduce for records using udf against String key and double value Hi All, I have generated the data in the form of Long Keys and Double values and inserting it in Aerospike as Aerospike.client.put(this.writePolicy, new Key(“test”, “profile”, keyGet), new Bin(this.binName, value)); keyGet is String Key value is Double. I am also getting back these values as Key key = new Key(this.namespace, this.set, keyStr); //keyStr is String Key this.client.get(this.readPolicy, key, this.binName); so above put and get is working fine. But I am not able to implement a Map Reduce for these records. What I want is - I want to add all the double values stored against all the keys and return the total sum from the UDF using Map and Reduce functions. Thanks Nitin Hi Nitin, Will a java example help? Peter Hi Peter, Yes that will surely help. I am trying to achieve this in Java only. I have implemented a map reduce functionality in Java. First I am inserting some records in the Aerospike then I am counting the no. of records through Map/Reduce. The code for using Map/Reduce is. Statement stmt = new Statement(); stmt.setNamespace(this.namespace); stmt.setSetName(this.set); stmt.setFilters(Filter.range(this.binName2, dataRangeLowerLimit, dataRangeUpperLimit)); stmt.setBinNames(this.binName2); stmt.setIndexName(this.indexName); ResultSet rs = this.client.queryAggregate(null, stmt, “CountFile”, “count_function”); // call to lua file if (rs.next()) { Object result = rs.getObject(); sum = ((Long)result).doubleValue(); System.out.println("Count = " + result); } I am calling above piece of code from 100 different threads. I have tried for 100,000, 200,000 - 600,000 records but its not working for 1M records. dataRangeLowerLimit and dataRangeUpperLimit —> These gets value from threads. No of records divided by noOfThreads which is 100 in my case. So for 100,000 records each thread will gets to execute 1000 records and Filter.range will be 0,999 for 1st thread and 1000,1999 for 2nd thread and so on. But as soon as I gave 1M records or even 700,000 records, queryAggregate returns correct results for few threads then starts giving random numbers and mostly 100 instead. Lua file is local function one(rec) return 1 end local function add(a,b) return a+b end function count_function(stream) return stream : map(one) : reduce(add); end Can anybody please help me in finding out the problem here ? Hi Nitin I’m working on a comprehensive example for you, so I’ll add this to it. Regards Peter Hi Nitin I have created an example at https://github.com/aerospike/common-aggregation-functions.git This example uses Aerospike aggregations to count, sum and return values that can be used to find the average and the standard deviation. The code includes: • Index creation • UDF registration • Writing 2 million records • Fixed point arithmetic to store Double values in Aerospike as a 8 byte unsigned integer • Sum aggregation • Count aggregation • Stats aggregation (for average and standard deviation) I ran this on Aerospike 3.3.19 on a single node cluster using a SSD name space. I hope this helps 2 Likes Thanks Peter. I will run the example today and will get back. Nitin Hi Peter Your example is running fine. I have a query. I am trying to run the example with multiple threads. Each thread will be executing the statement query for specific range. Like for 1st thread range will be 0-100,000 2nd thread range will be 100,001-200,000 and so…on Is this a problem with map reduce or Lua file or with secondary index query ? Because if I run the example with one thread, then there is no problem but its not giving correct results with multiple threads. I modified your example as : ExecutorService executorService = Executors.newFixedThreadPool(10); for (int index = 0; index <10; index++) { executorService.execute(new Runnable() { @Override public void run() { try { as.work(); } catch (Exception e) { // TODO Auto-generated catch block e.printStackTrace(); } } }); } // as.work();
__label__pos
0.929328
1. Limited time only! Sign up for a free 30min personal tutor trial with Chegg Tutors Dismiss Notice Dismiss Notice Join Physics Forums Today! The friendliest, high quality science and math community on the planet! Everyone who loves science is here! Homework Help: Surface Integral of Vector Fields 1. Apr 26, 2009 #1 Evaluate the surface integral ∫∫S F · dS for the given vector field F and the oriented surface S. In other words, find the flux of F across S. For closed surfaces, use the positive (outward) orientation. F(x, y, z) = y i + x j + z^2 k S is the helicoid (with upward orientation) with vector equation r(u, v) = ucos(v)i + usin(v)j + v k, 0 ≤ u ≤ 3, 0 ≤ v ≤ 3π. ∫∫S f*dS=∫∫D F*(r_u x r_v)dA i got int[0,3] and int[0,3pi] usin(v)^2-ucos(v)^2+uv^2dvdu i do not know how to integrate this(yeah, shame on me) and i dont know if this integral is correct   2. jcsd 3. Apr 26, 2009 #2 Dick User Avatar Science Advisor Homework Helper It looks ok to me. What's stopping you from doing it? First integrate dv and then the result du. No special tricks needed. Though you could simplify u*(sin(v)^2-cos(v)^2).   Share this great discussion with others via Reddit, Google+, Twitter, or Facebook
__label__pos
0.581331
Dropout: Why divide by keep prob? Hi, I am struggling to understand the reason behind doing the 4th step of dropout as follows. Divide 𝐴[1] by keep_prob. By doing this you are assuring that the result of the cost will still have the same expected value as without drop-out. (This technique is also called inverted dropout.) I understand what the 4th step is but can u elaborate on the 2nd sentence above? How do we tie it back to the cost function? Please see this recent thread for a pretty thorough discussion of this issue. 1 Like
__label__pos
1
/* * Copyright (c) 1997, 2011, Oracle and/or its affiliates. All rights reserved. * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. * * This code is free software; you can redistribute it and/or modify it * under the terms of the GNU General Public License version 2 only, as * published by the Free Software Foundation. Oracle designates this * particular file as subject to the "Classpath" exception as provided * by Oracle in the LICENSE file that accompanied this code. * * This code is distributed in the hope that it will be useful, but WITHOUT * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License * version 2 for more details (a copy is included in the LICENSE file that * accompanied this code). * * You should have received a copy of the GNU General Public License version * 2 along with this work; if not, write to the Free Software Foundation, * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. * * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA * or visit www.oracle.com if you need additional information or have any * questions. */ package javany.util; /** * An iterator for lists that allows the programmer * to traverse the list in either direction, modify * the list during iteration, and obtain the iterator's * current position in the list. A {@code ListIterator} * has no current element; its cursor position always * lies between the element that would be returned by a call * to {@code previous()} and the element that would be * returned by a call to {@code next()}. * An iterator for a list of length {@code n} has {@code n+1} possible * cursor positions, as illustrated by the carets ({@code ^}) below: * * Element(0) Element(1) Element(2) ... Element(n-1) * cursor positions: ^ ^ ^ ^ ^ * * Note that the {@link #remove} and {@link #set(Object)} methods are * not defined in terms of the cursor position; they are defined to * operate on the last element returned by a call to {@link #next} or * {@link #previous()}. * * This interface is a member of the * * Java Collections Framework. * * @author Josh Bloch * @see Collection * @see List * @see Iterator * @see Enumeration * @see List#listIterator() * @since 1.2 */ public interface ListIterator extends Iterator { // Query Operations /** * Returns {@code true} if this list iterator has more elements when * traversing the list in the forward direction. (In other words, * returns {@code true} if {@link #next} would return an element rather * than throwing an exception.) * * @return {@code true} if the list iterator has more elements when * traversing the list in the forward direction */ boolean hasNext(); /** * Returns the next element in the list and advances the cursor position. * This method may be called repeatedly to iterate through the list, * or intermixed with calls to {@link #previous} to go back and forth. * (Note that alternating calls to {@code next} and {@code previous} * will return the same element repeatedly.) * * @return the next element in the list * @throws NoSuchElementException if the iteration has no next element */ E next(); /** * Returns {@code true} if this list iterator has more elements when * traversing the list in the reverse direction. (In other words, * returns {@code true} if {@link #previous} would return an element * rather than throwing an exception.) * * @return {@code true} if the list iterator has more elements when * traversing the list in the reverse direction */ boolean hasPrevious(); /** * Returns the previous element in the list and moves the cursor * position backwards. This method may be called repeatedly to * iterate through the list backwards, or intermixed with calls to * {@link #next} to go back and forth. (Note that alternating calls * to {@code next} and {@code previous} will return the same * element repeatedly.) * * @return the previous element in the list * @throws NoSuchElementException if the iteration has no previous * element */ E previous(); /** * Returns the index of the element that would be returned by a * subsequent call to {@link #next}. (Returns list size if the list * iterator is at the end of the list.) * * @return the index of the element that would be returned by a * subsequent call to {@code next}, or list size if the list * iterator is at the end of the list */ int nextIndex(); /** * Returns the index of the element that would be returned by a * subsequent call to {@link #previous}. (Returns -1 if the list * iterator is at the beginning of the list.) * * @return the index of the element that would be returned by a * subsequent call to {@code previous}, or -1 if the list * iterator is at the beginning of the list */ int previousIndex(); // Modification Operations /** * Removes from the list the last element that was returned by {@link * #next} or {@link #previous} (optional operation). This call can * only be made once per call to {@code next} or {@code previous}. * It can be made only if {@link #add} has not been * called after the last call to {@code next} or {@code previous}. * * @throws UnsupportedOperationException if the {@code remove} * operation is not supported by this list iterator * @throws IllegalStateException if neither {@code next} nor * {@code previous} have been called, or {@code remove} or * {@code add} have been called after the last call to * {@code next} or {@code previous} */ void remove(); /** * Replaces the last element returned by {@link #next} or * {@link #previous} with the specified element (optional operation). * This call can be made only if neither {@link #remove} nor {@link * #add} have been called after the last call to {@code next} or * {@code previous}. * * @param e the element with which to replace the last element returned by * {@code next} or {@code previous} * @throws UnsupportedOperationException if the {@code set} operation * is not supported by this list iterator * @throws ClassCastException if the class of the specified element * prevents it from being added to this list * @throws IllegalArgumentException if some aspect of the specified * element prevents it from being added to this list * @throws IllegalStateException if neither {@code next} nor * {@code previous} have been called, or {@code remove} or * {@code add} have been called after the last call to * {@code next} or {@code previous} */ void set(E e); /** * Inserts the specified element into the list (optional operation). * The element is inserted immediately before the element that * would be returned by {@link #next}, if any, and after the element * that would be returned by {@link #previous}, if any. (If the * list contains no elements, the new element becomes the sole element * on the list.) The new element is inserted before the implicit * cursor: a subsequent call to {@code next} would be unaffected, and a * subsequent call to {@code previous} would return the new element. * (This call increases by one the value that would be returned by a * call to {@code nextIndex} or {@code previousIndex}.) * * @param e the element to insert * @throws UnsupportedOperationException if the {@code add} method is * not supported by this list iterator * @throws ClassCastException if the class of the specified element * prevents it from being added to this list * @throws IllegalArgumentException if some aspect of this element * prevents it from being added to this list */ void add(E e); }
__label__pos
0.997191
java 字符串保存成二进制文件 杀丶破狼 发布于 2015/12/08 16:04 阅读 1K+ 收藏 0 有一个字符串,比如String s = "123abc你好"; 现在需要将这个字符串保存成二进制文件。用UE编辑器打开看到的是 00 0A 3F 这样的数据。 有没有人写过,或者相关的文章(网上的文章看过,没找到能用的),谢谢 加载中 1 蕃薯哥哥 蕃薯哥哥 1. FileOutputStream fos = new FileOutputStream(file); 2. ObjectOutputStream oos = new ObjectOutputStream(fos);   3. oos.writeObject(obj);   4. oos.flush();   5. oos.close();   6. fos.close(); 类似这样的操作.要用ObjectOutputStream进行序列化. 0 jayU jayU "".getBytes ByteArrayInputStream 转流的话 再用这个 杀丶破狼 杀丶破狼 能详细点么?不太懂 0 jayU jayU InputStream is = new ByteArrayInputStream("str".getBytes(charset)); charset 是字符编码 0 杀丶破狼 杀丶破狼 引用来自“jayU”的评论 InputStream is = new ByteArrayInputStream("str".getBytes(charset)); charset 是字符编码 public static boolean writeFileByBinary(String filePath, String fileContent) { boolean flag = false; OutputStream out = null; if (StringUtils.isBlank(filePath)) { return flag; } try { File file = new File(filePath); if (!file.exists()) { flag = file.createNewFile(); } if (flag = true) { out = new FileOutputStream(filePath); byte[] buf = fileContent.getBytes(); out.write(buf); out.flush(); out.close(); } } catch (Exception e) { e.printStackTrace(); } finally { try { out.close(); } catch (IOException e) { e.printStackTrace(); } } return flag; } 我是这样写的,但写到文件中不是二进制的,是哪里有问题么? 上兵伐谋 上兵伐谋 DataOutputStream 这个的writeByte 0 bug0day bug0day 你只需要将byte转化成16进制字符串就好了 0 jayU jayU 不好意思问题没看清楚 如果你是文本编辑器打开 看到是 16进制字符串 那么转16进制后保存就可以了 0 1 1505412718 文件肯定是2进制保存的,但是要在16进制模式下才能看出来,因为文本模式是经过解码后才显示出来的 如果想在文本模式看到16进制的数据,那么就要把byte转换成16进制ascii码再转成byte保存 out = new FileOutputStream(filePath);                 byte[] buf = fileContent.getBytes();                 StringBuffer sb = new StringBuffer();                 for (byte b : buf) {                     sb.append(String.format("%02X ", b));                 }                 buf = sb.toString().getBytes();                 out.write(buf);                 out.flush();                 out.close(); 返回顶部 顶部
__label__pos
0.995413
0 So I am stuck on this problem that I am facing when creating a custom taxonomy term in a install.php file. So I am running a WP multisite, and upon new blog creations, I am trying to auto create posts and taxonomy terms. The taxonomy and CPT are already created via a plugin that is Network Activated. Here is a snippet of what is inside the install.php file: // Sample Category $cat_name = __('Sample Category'); /* translators: Default category slug */ $cat_slug = sanitize_title(_x('Sample Category', 'Default category slug')); if ( global_terms_enabled() ) { $cat_id = $wpdb->get_var( $wpdb->prepare( "SELECT cat_ID FROM {$wpdb->sitecategories} WHERE category_nicename = %s", $cat_slug ) ); if ( $cat_id == null ) { $wpdb->insert( $wpdb->sitecategories, array('cat_ID' => 0, 'cat_name' => $cat_name, 'category_nicename' => $cat_slug, 'last_updated' => current_time('mysql', true)) ); $cat_id = $wpdb->insert_id; } update_option('example_product_cat', $cat_id); } else { $cat_id = 99; } // Sample Post $now = date('Y-m-d H:i:s'); $now_gmt = gmdate('Y-m-d H:i:s'); $post_guid = get_option('home') . '/sample'; $wpdb->insert( $wpdb->posts, array( 'post_author' => $user_id, 'post_date' => $now, 'post_date_gmt' => $now_gmt, 'post_content' => '', 'post_excerpt' => 'Sample Text Excerpt ', 'post_title' => __('Sample Name'), /* translators: Default post slug */ 'post_name' => sanitize_title( _x('sample-name', 'Sample Name') ), 'post_modified' => $now, 'post_modified_gmt' => $now_gmt, 'guid' => $post_guid, 'post_type' => 'custom_post_type', 'comment_count' => 0, 'to_ping' => '', 'pinged' => '', 'post_content_filtered' => '' )); $wpdb->insert( $wpdb->postmeta, array( 'post_id' => 4, 'meta_key' => '_sample_meta', 'meta_value' => '19' ) ); $wpdb->insert( $wpdb->term_relationships, array( 'term_id' => 99, 'object_id' => 1) ); So the Taxonomy term is created, and so is the post, which both are viewable in the backend. The problem is, the term is not connected to the post that is created The meta_value does not also display on the WP_List_Table, but displays on the update post page. When I click "update post", than it shows on the WP_List_table. Is there any clue on why the taxonomy term is not added to the post, and also why the meta_value displays in the Update Post page, but not on the WP_List_Table? Thanks! Roc. 1 • So, I fixed the meta value problem in the WP_List_table by this snippet: case "service_price" : $meta = get_post_meta($post->ID, '_sample_meta', true); if ( $meta ) echo $meta; else echo '&ndash;'; break; , but still cannot figure out why the taxonomy term is not being linked to the post. Any help is appreciated. Thanks! – Roc Commented Jun 9, 2013 at 15:01 1 Answer 1 0 I believe I found the solution here: http://codex.wordpress.org/Function_Reference/wp_set_object_terms wp_set_object_terms( $post_id, $terms, $taxonomy, $append ); wp_set_object_terms( 4, $cat_id, 'example_product_cat'); This is still placed inside of the install.php file. If there is a better solution, please add! Thanks. Roc. Your Answer By clicking “Post Your Answer”, you agree to our terms of service and acknowledge you have read our privacy policy. Not the answer you're looking for? Browse other questions tagged or ask your own question.
__label__pos
0.650287
Digital thread on blockchain technology Publish date: Blockchain has several capabilities that can be leveraged in building genealogy and digital threads for products across industry verticals Abstract Manufacturers constantly strive to serve their customers better and, at the same time, use customer insights to improve product performance and reduce costs. Thanks to falling costs of sensor technology and the cloud’s ability to store and analyze huge amounts of data, manufacturers have found new ways to gather insights into both the product and the customer. They have also started extending this to their own engineering and manufacturing operations, making it possible to create a digital thread of the products they conceive, produce, sell, and service. Blockchain allows us to capture, maintain, and share the huge amount of data as well as use it for any advanced analysis or simulation of past events or future scenarios. This paper explains various components of the system and how organizations can use them effectively to become leaders in their field of operations.  Why digital thread? Digital thread is a framework that integrates design, engineering, suppliers, manufacturing, maintenance, warehouse, transportation, warranty and service operations, and systems to provide a seamless flow of information. It leverages the captured data/digital thread of the product to perform key analytics across the complete product lifecycle in order to optimize processes capability, efficiency and effectiveness, product design, asset performance/OEE, manufacturing operations, service operations, customer satisfaction, and to improve and maintain brand reputation. Digital thread includes key traceability/genealogy attributes/records of the product and its parts and features the manufacturer’s name, part number, country of origin, manufacturing plant, production line information, date of manufacturing, actual process parameters applied during manufacturing and assembly of the individual product, process history, lot code/date code, and other relevant records. This helps OEMs, service providers, and stake holders to:   • Isolate products in the field with potentially faulty components or certain traceability attributes (such as serial number, manufacturer’s name, date code/batch number) • Proactively recall/repair products assembled with faulty components • Track the complete history of the product (cradle to grave) during its lifecycle to better predict operational behavior and improve product reliability through better design and process capabilities • Effectively manage warranty and service to improve customer satisfaction and brand loyalty • Facilitate better supplier management process • Reduces liability costs. Having a digital thread of any product improves product reliability, customer service, product design, and brand reputation. It also reduces the number of fraudulent warranty claims and leads to a better competitive position.  Key requirements for implementing digital thread projects The implementation of a digital thread depends on the type of product and industry. It may be necessary in order to comply with regulatory requirements, bolster customer satisfaction, or serve as a competitive differentiator. Usually, the channel master/OEM leads the digital thread project implementation across the chain. Selecting a digital thread solution requires identifying the right use/business case. It is equally important that business KPIs be clearly mapped with the business problems/case or goals to be resolved or achieved. This approach will help business and IT teams to: • Determine data elements and records that need to be captured along the supply chain • Identify the source of data records • Determine how and how often (sampling plan, frequency) the data will have to be collected • Estabilsh which parts (along with their respective supplier/manufacturers) will be impacted since the genealogy records of identified parts will have to be associated with the serial number of the product during the manufacturing and assembly process of the product • Collect key stages of data record processing • Existing system capabilities (including desired system capabilities) • Need of AIDC (automatic identification and data capture) technologies such as RFID, bar code, IT system (e.g., MES, WMC, transport management system, IIoT, etc.) to capture the desired data along the supply chain. Because multiple parties are involved in a supply chain to move the final product from raw material suppliers to the end consumer and because the product passes through various process stages, locations, and entities during its journey, it creates many transaction records in various systems. In order to build a digital thread, each system must capture, validate, and store the necessary data elements in real time and store the captured data for future reference and key operational analytics. Each party in the supply chain may have their own set of systems for storing data, or each party can send data to a centralized repository to maintain it securely. Below are the key requirements for implementing digital thread projects: Supplier alignment and compliance: alignment of parts suppliers is essential in implementing the digital thread. The digital thread of any product includes the genealogy records of the parts (manufacture/supplier name, manufacturer/supplier part number, OEM part number, date of manufacturing/date code, batch/lot code, serial number of parts, etc.) that have been used to manufacture and assemble it. All the data elements should be standardized across suppliers. Moreover, OEM/manufacturing partners should continuously evaluate suppliers to ensure completeness and accuracy of the records as per the contractual requirements between the OEMs and the suppliers (smart contracts). Manufacturing partners: If the manufacturing process is outsourced, the manufacturing partners also need to align their data collection (building a digital thread) strategy as per the OEM’s requirement. This would require that the digital thread of each unit of the product be sent from the manufacturing partner’s system to the OEM system.Too build a digital thread in real time, manufacturing partners must implement integrated information systems so they can collect the right data along the process (ERP, MES, DCS/OPC, test equipment, quality, WMS, etc.). Genealogy records for parts supplied by suppliers can be captured in ERP at the receiving area. However, linking the genealogy records of parts with their upper-level assembly (serial number) will normally take place at the respective stages of the production process (as per the process flow/routing) through the MES/shop floor system followed by BOM validation. Similarly, process parameter records can be captured during the manufacturing phase (through OPC/DCS – MES) followed by validation with machine programs/process specification. Validation rules must be built at each stage of the production flow to ensure that  the data/digital thread are correct and complete. In essence, a complete process history/digital thread of each unit has to be built as the product moves along the supply chain, touching different systems where each system will capture, associate, and store parameter/data elements (along with the time stamp) validated with specifications. OEM: While receiving and updating digital thread records from the manufacturing partner’s location, the records have to be validated as per the SLAs/contractual requirements at the receiving server of the OEM. If the digital thread for any unit is incorrect, the system should raise an alert to the manufacturing partner so that they know which records need to be updated. These records are crucial to performing key analytics. Sales organization: should associate the product serial number with the sales order to capture customer details (name, location, product installation site, etc.). Transport: should capture the complete history of the product while it is in transit. Food, pharmaceuticals, and other perishable products that require specific temperature, humidity, or other packaging parameters should be monitored in real time and the data recorded in respective databases for future references. Warranty and service: service teams should capture the date of installation, product performance parameters, and other details, such as actions taken to resolve issues when installing and repairing the product. IT system: the IT system requirement depends on the supply chain party and on the role that party plays in the end-to-end supply chain. For example, tier-one suppliers have to provide genealogy records of the part they are supplying to the OEM/manufacturing partner. To capture genealogy records at batch level, suppliers at the very least need an ERP system to capture batch records of parts. Similarly, OEM/manufacturing partners must implement both ERP and MES systems to receive material in ERP and associate parts with upper level or top level assembly and capture process records from each production stage during production process. This is possible with MES or shop floor system. Therefore, the system required will depend on the supply chain party and their role. Figure 1 – Digital thread implementation architecture with centralized database Use of AIDC technologies in the digital thread – Automatic identification and data capture technologies provide the basis for implementing the digital thread and help identify objects for data needs be collected. This technology includes barcodes, scanners, and RFID tags. Technology helps to ensure that data elements are captured in an accurate and timely way into the system. Manual entries are mostly offline, sometimes biased, and easy to manipulate and this will always mislead and may have severe impact on business. Also, it is practically impossible to capture, validate, and send operational and tracking records manually in high-volume and complex manufacturing processes. Infrastructure: Implementation of digital thread also requires the right infrastructure; the bandwidth of the network should be identified based on the operation’s complexity, product complexity, real-time vs batch processing of data, cost, etc. Database capacity is another critical need and data retention period needs, performance, analytics requirements, on-premises vs cloud, customer requirements, regulatory compliance, etc. should also be considered by each party in the supply chain when selecting the right size. Audits: Digital thread systems should support quick audits to ensure supplier conformance, data quality , validation rules, etc. Figure 1 indicates the high-level, digital thread solution architecture for a simple product from tier-one suppliers to tier-one customers. The solution depicts key data elements can be captured to build digital thread with single centralized data base and with basic reporting through a simple analytics engine (just for reference). How can blockchain support the digital thread? A blockchain is a distributed database technology that builds on a tamper-proof list of time-stamped transaction records. Its innovative power stems from allowing supply chain parties to transact with others they do not trust over a global network in which nobody is trusted. It enables by a combination of peer-to-peer networks, consensus-making, cryptography, and market mechanisms. Each constituent of this database represents a “block.” We realized that blockchain has several capabilities that can be leveraged in building genealogy and digital threads for products across industry verticals (aerospace, defense, food, automotive, pharma, consumer electronics, communications, etc.) that will benefit OEMs, suppliers, service providers, consumers, and governments. In this paper, we discuss the feasibility of implementing the digital thread on blockchain technology for manufacturing industries. The objective of this section is to discuss how blockchain technology can support the implementation of digital threads In essence, blockchain is a peer-to-peer database that offers access to the history of all previous states. Furthermore, Some of the blockchain’s characteristics that directly support digital thread solution implementation are: • Distributed data bases and peer-to-peer network: Blockchain can capture and link specific data blocks across all the stages, from suppliers, manufacturing, assembly, testing, etc. up until te final unit of the product reaches the customer. Also, from customer site product can send its operational data to the blockchain, so it eliminates the need for investment in data storage capacities to handle the millions of records generated during the manufacturing and assembly process. • Support smart contracts between supply chain stages (inter organization and within organization): Blockchain’s smart contract functionality enables validation rules that can be written between the supply chain stages (external and internal) to ensure that data is not missed and that data is accurate and complete. For example, in order to build the digital thread, association of genealogy records of key parts to upper level assembly/product, the respective suppliers must provide certain mandatory genealogy records of that part, which requires validation at the OEM end while receiving that part at the OEM end to ensure supplier compliances. Also, during the manufacturing and assembly process, genealogy records of parts have to be associated with product serial numbers. This requires validation from BOM and routing files to ensure that the correct part is being assembled at the correct stage and requires validation of actual process parameters from recipe or machine programs. Smart contracts can be specified along the manufacturing and assembly process. At each stage, validation will be performed and if anything does not meet the smart contract’s terms and conditions, the system will raise an alarm on a real-time basis to avoid any potential issues that may impact the business. • Build trust by ensuring data accuracies and authenticity: Through the use of smart contracts and validation scripts, blockchain provides excellent capabilities to ensure (right from the source of the data) that the right data is being captured from the right source in the right sampling plan at the right time across all the stages of the supply chain. Data blocks that consist of records become immutable once on the blockchain. This is key to ensuring trust between parties located thousands of miles apasrt in global and complex supply chains. Moreover, a copy of the entire blockchain is held on every node on the network and consensus is achieved either by proof-of-work or proof-of-stake algorithms or by forming smart contracts. • Easy to audit: A blockchain by design is perfectly auditable. Each individual operation’s records (for example part genealogy records from a supplier/manufacturer) can be easily recorded, validated, and archived. These can be easily audited for supplier non-compliance, therefore auditing is as simple as joining the blockchain network, as this allows one to replay past operations. It is combined with cost-effective guarantees of authenticity for every record. • Access to the right stakeholders/users – security: An interesting aspect is that blockchain can be used as an authentication provider. Using their key pair, users register their identity on the blockchain. Another way to enable security is to provide membership services to manage user identities on a permission blockchain network through the Certificate Authority peer. Membership services provide a distinction of roles by combining elements of public key infrastructure (PKI) and decentralization (consensus). By contrast, non-permission networks do not provide member-specific authority or a distinction of roles. With blockchain technology, monitoring transactions will be more secure and transparent. Digital thread is actually a series of transaction nodes that link to capture data while products move from one point to other. By utilizing this technology to capture and store data across the supply chain, companies can reduce time delays, cost, and human error. • Cost of implementation: Blockchain significantly lowers the cost of a transaction while ensuring data accuracy, completeness, transparency, and security. It eliminates the need for a centralized trusted party and the need for investments in data storage capacity (for example, in some of industries, the OEM is required to retain product data for more than 15 years (regulatory compliance)). Architecture diagram – digital thread on blockchain  Challenges to implementing the digital thread on blockchain Below are the challenges we should consider when considering blockchain for digital thread solutions: 1. New technology: Resolving challenges such as transaction speed, the verification process, and data limits will be crucial in making blockchain widely applicable. 2. Frequent configuration: Each product requires configuration and the development of validation rules/smart contacts to capture product-specific and accurate data along the supply chain – a time consuming but one-time activity. 3. Integration concerns: Blockchain applications offer solutions that require changes/modifications and the customization of existing IT systems. To implement digital thread projects on time, smoothly, and within budget, companies must strategize the system integration and customization. Also, it is not yet clear how integration between blockchain and other systems, such as ERP, MES, PLM, and WMS, will occur. 4. Higher energy consumption: Use substantial amounts of computer power to validate millions of records generated across the supply chain 5. Control, security, and privacy : While solutions exist, including private or permissioned blockchain and strong encryption, there are still cybersecurity concerns to be addressed before the general public will entrusts their personal data to a blockchain solution. 6. Cultural adoption  Blockchain represents a complete shift to a decentralized network which requires the buy-in of its users and operators. Conversely, the digital thread can easily be implemented on a centralized solution (on premises or cloud based). 7. Cost  Blockchain offers tremendous savings in transaction costs and time but the high initial capital costs could be a deterrent. Conclusion Blockchain provides an excellent platform for digital thread implementation. Its capability to validate each record captured along the supply chain, including production processes (i.e. in end-to end journey of product), helps OEMs ensure accurate and tamper-proof data that builds trust between the supply chain and external parties. The digital thread can meet the objectives of various stakeholders in the chain (design team, suppliers, OEM, warranty and service providers, etc.) and helps to improve product reliability, process capability, and plant capacity by eliminating unplanned downtime. It also enables effective warranty management and significantly improves brand reputation while keeping cost at optimum levels. Implementing the digital thread on blockchain might be challenging initially since blockchain is a new technology. Therefore, it is highly recommended to go with a low-risk approach, i.e. a POC that uses blockchain internally (within the organization) with a couple of critical parts suppliers/manufacturers as a database for recording part and product genealogy data, supplier/manufacturer data, internal data, use of smart contracts at selected stages, i.e. from part supplier (supplier to OEM), inspection and test records of parts (based on smart contracts that may include verification of mandatory records and SLA,s), date of manufacturing, as-built records (where part is associated with product to create genealogy as per BOM validations), capture process parameter that influence product performance, etc. along with the validation scripts. Implementing and testing a smaller portion of digital thread use cases will help organizations develop the skills they need for full-scale implementation. For successful implementation, the key is to select the right blockchain service provider. Doing so will help organizations achieve their targeted objectives. There are a few cloud-based blockchain services from both start-ups and large platforms (such as Amazon, IBM and Microsoft), that make implementation of business solutions much easier. It is highly recommended to have a collaborative model between blockchain service providers, parts suppliers, manufacturing partners, and other supply chain entities to achieve business objectives in a timely manner. Related Posts Digital Transformation Transforming your airport digital strategy Don Grose Date icon June 19, 2019 To harness and control digital and stand a chance of delivering tangible outcomes – to say... automotive Data is the auto’s industry quiet driving force Mike Hessler Date icon June 19, 2019 Most people thinking about the ways technology is transforming the automotive industry talk... A digital approach to wealth management can maximize future returns Abhishek Singh Date icon June 18, 2019 A new generation of high-net-worth (HNW) clients – especially those in their 20s and 30s –... cookies. By continuing to navigate on this website, you accept the use of cookies. For more information and to change the setting of cookies on your computer, please read our Privacy Policy. Close Close cookie information
__label__pos
0.71184
Commit 883eac38 authored by Andreas Schwarzkopf's avatar Andreas Schwarzkopf [FIX #371] Repaired the multithreading setting * General style Some style improvements. * * General features: * - Points - Transform: Color equalizer (contrast and offset setting for each color * channel) * * Performance improvements (in general about 4 times faster) * - Lari/Habib 2014 clustering has now following improvements. * - Removing points from the parameter space kd-tree after adding to a plane - * This change created an additional, temporary parameter domain kd-tree which * is in the beginning just a copy of the original parameter domain kd-tree. * When points are added to a plane, they are removed from that copy. It makes * the algorithm a way faster. * - Distinguishing whether a point belongs to an extent directly in an point * searcher instance works faster than building a list with additional * unnecessary points and filtering afterwards. In that change a new class * inherited from WPointSearcher and overwrote a method which distinguishes * whether points are added or not. * - Another story is counting points of an extent with a searched point as peak * centre. Previously points were put in a list in order to count them * afterwards. This new class was further modified at traversing. So no new * unnecessary list is built up. * * Bugs fixed: * - Boundary detection problems were fixed. Originally there was a detection that * checked whether a new bound would hit the pre previously detectet bound. But that * seemet practically not to be enough. So every point adding a new bound is checked * whether it hits one of all bound pieces detected. Nevertheless the problem is not * solved completely but there are much less less problems by far. parent 5337e00e ......@@ -31,7 +31,7 @@ #include <core/kernel/WModule.h> #include "buildingsDetection/WMBuildingsDetection.h" #include "buildingsDetectionByPCA/WMBuildingsDetectionByPCA.h" #include "treeDetectionByPCA/WMTreeDetectionByPCA.h" #include "elevationImageExport/WMElevationImageExport.h" #include "pointsTransform/WMPointsTransform.h" #include "pointsCutOutliers/WMPointsCutOutliers.h" ......@@ -60,7 +60,7 @@ extern "C" void WLoadModule( WModuleList& m ) // NOLINT { m.push_back( boost::shared_ptr< WModule >( new WMBuildingsDetection ) ); m.push_back( boost::shared_ptr< WModule >( new WMBuildingsDetectionByPCA ) ); m.push_back( boost::shared_ptr< WModule >( new WMTreeDetectionByPCA ) ); m.push_back( boost::shared_ptr< WModule >( new WMElevationImageExport ) ); m.push_back( boost::shared_ptr< WModule >( new WMPointsCutOutliers ) ); m.push_back( boost::shared_ptr< WModule >( new WMPointsGroupSelector ) ); ...... ......@@ -84,7 +84,7 @@ void WBuildingDetector::initMinimalMaxima( WQuadNode* sourceNode, WQuadTree* tar double coordX = sourceNode->getCenter( 0 ); double coordY = sourceNode->getCenter( 1 ); double d = m_minSearchDetailDepth / 2.0; double height = sourceNode->getElevationMax(); double height = sourceNode->getValueMax(); targetTree->registerPoint( coordX - d, coordY - d, height ); targetTree->registerPoint( coordX - d, coordY + d, height ); targetTree->registerPoint( coordX + d, coordY - d, height ); ......@@ -108,11 +108,11 @@ void WBuildingDetector::projectDrawableAreas( WQuadNode* sourceNode, WQuadNode* minimalNodeBigHeight = minimalMaxima->getLeafNode( coordX, coordY, m_minSearchCutUntilAboveBigHeights ); if( minimalNode == 0 || minimalNodeBigHeight == 0 ) return; double minimalHeight = m_minSearchCutUntilAbove + minimalNode->getElevationMin(); double minimalHeightBigHeights = m_minSearchCutUntilAbove + minimalNodeBigHeight->getElevationMin(); if( sourceNode->getElevationMax() < minimalHeight && sourceNode->getElevationMax() < minimalHeightBigHeights ) return; targetTree->registerPoint( coordX, coordY, sourceNode->getElevationMax() ); double minimalHeight = m_minSearchCutUntilAbove + minimalNode->getValueMin(); double minimalHeightBigHeights = m_minSearchCutUntilAbove + minimalNodeBigHeight->getValueMin(); if( sourceNode->getValueMax() < minimalHeight && sourceNode->getValueMax() < minimalHeightBigHeights ) return; targetTree->registerPoint( coordX, coordY, sourceNode->getValueMax() ); } else { ...... ......@@ -107,7 +107,7 @@ void WMBuildingsDetection::properties() "depth for the octree search tree.", 0 ); m_detailDepth->setMin( -3 ); m_detailDepth->setMax( 4 ); m_detailDepthLabel = m_properties->addProperty( "Voxel width meters: ", "Resulting detail depth " m_detailDepthLabel = m_properties->addProperty( "Pixel width meters: ", "Resulting detail depth " "in meters for the octree search tree.", pow( 2.0, m_detailDepth->get() ) * 2.0 ); m_detailDepthLabel->setPurpose( PV_PURPOSE_INFORMATION ); ......@@ -205,8 +205,8 @@ void WMBuildingsDetection::moduleMain() m_xMax->set( boundingBox->getRootNode()->getXMax() ); m_yMin->set( boundingBox->getRootNode()->getYMin() ); m_yMax->set( boundingBox->getRootNode()->getYMax() ); m_zMin->set( boundingBox->getRootNode()->getElevationMin() ); m_zMax->set( boundingBox->getRootNode()->getElevationMax() ); m_zMin->set( boundingBox->getRootNode()->getValueMin() ); m_zMax->set( boundingBox->getRootNode()->getValueMax() ); m_progressStatus->finish(); } m_reloadData->set( WPVBaseTypes::PV_TRIGGER_READY, true ); ...... ......@@ -95,6 +95,15 @@ WKdTreeND::~WKdTreeND() } void WKdTreeND::add( vector<WKdPointND*>* addables ) { /*cout << "Adding points to kd-tree:" << endl; for( size_t index = 0; index < addables->size(); index++ ) { for( size_t dimension = 0; dimension < 3; dimension++ ) cout << "\t" << addables->at( index )->getCoordinate()[dimension]; cout << endl; } cout << endl;*/ if( addables->size() == 0 ) return; for( size_t index = 0; index < addables->size(); index++ ) ......@@ -110,6 +119,10 @@ void WKdTreeND::add( vector<WKdPointND*>* addables ) double point1Scalar = m_points->at( 0 )->getCoordinate()[m_splittingDimension]; double point2Scalar = m_points->at( 1 )->getCoordinate()[m_splittingDimension]; m_splittingPosition = ( point1Scalar + point2Scalar ) / 2.0; if( m_splittingPosition == point2Scalar && point1Scalar > point2Scalar ) m_splittingPosition = point1Scalar; if( m_splittingPosition == point1Scalar && point2Scalar > point1Scalar ) m_splittingPosition = point2Scalar; } else { ......@@ -141,29 +154,45 @@ bool WKdTreeND::canSplit() { return m_splittingDimension < m_dimensions; } void WKdTreeND::assignZeroToPointers() { m_lowerChild = 0; m_higherChild = 0; m_points->resize( 0 ); m_points->reserve( 0 ); } void WKdTreeND::copyPointersFrom( WKdTreeND* copiedNode ) { m_parentSplittingDimension = copiedNode->m_parentSplittingDimension; m_lowerChild = copiedNode->m_lowerChild; m_higherChild = copiedNode->m_higherChild; m_dimensions = copiedNode->m_dimensions; m_splittingDimension = copiedNode->m_splittingDimension; m_splittingPosition = copiedNode->m_splittingPosition; m_allowDoubles = copiedNode->m_allowDoubles; m_points->resize( 0 ); m_points->reserve( 0 ); for( size_t index = 0; index < copiedNode->m_points->size(); index++ ) m_points->push_back( copiedNode->m_points->at( index ) ); } void WKdTreeND::fetchPoints( vector<WKdPointND* >* targetPointSet ) { if( m_points->size() == 0 && m_lowerChild == 0 && m_lowerChild == 0 ) if( m_points->size() > 0 && m_lowerChild == 0 && m_lowerChild == 0 ) { for(size_t index = 0; index < m_points->size(); index++) targetPointSet->push_back( m_points->at( index ) ); } else { if( m_points->size() > 0 && m_lowerChild == 0 && m_lowerChild == 0 ) if( m_points->size() == 0 && m_lowerChild != 0 && m_lowerChild != 0 ) { for(size_t index = 0; index < m_points->size(); index++) targetPointSet->push_back( m_points->at( index ) ); m_lowerChild->fetchPoints( targetPointSet ); m_higherChild->fetchPoints( targetPointSet ); } else { if( m_points->size() == 0 && m_lowerChild != 0 && m_lowerChild != 0 ) { m_lowerChild->fetchPoints( targetPointSet ); m_higherChild->fetchPoints( targetPointSet ); } else { if( m_points->size() != 0 || m_lowerChild != 0 || m_lowerChild != 0 ) cout << "!!!UNKNOWN EXCEPTION!!!" << endl; } } } } ......@@ -172,7 +201,7 @@ vector<WKdPointND*>* WKdTreeND::getAllPoints() vector<WKdPointND*>* outputPoints = new vector<WKdPointND*>(); vector<WKdTreeND*>* kdNodes = getAllLeafNodes(); for( size_t nodeIndex = 0; nodeIndex < kdNodes->size(); nodeIndex++ ) for( size_t pointIndex = 0; pointIndex < kdNodes->at(nodeIndex)->getNodePoints()->size(); pointIndex++ ) for( size_t pointIndex = 0; pointIndex < kdNodes->at( nodeIndex )->getNodePoints()->size(); pointIndex++ ) outputPoints->push_back( kdNodes->at( nodeIndex )->getNodePoints()->at( pointIndex ) ); kdNodes->resize( 0 ); kdNodes->reserve( 0 ); ......@@ -220,9 +249,58 @@ size_t WKdTreeND::getSplittingDimension() { return m_splittingDimension; } double WKdTreeND::getSplittingPosition() bool WKdTreeND::isEmpty() { return m_points->size() == 0 && m_lowerChild == 0 && m_lowerChild == 0; } bool WKdTreeND::isLowerKdNodeCase( double position ) { return position < m_splittingPosition; } bool WKdTreeND::removePoint( WKdPointND* removablePoint ) { return m_splittingPosition; if( m_points->size() > 0 && m_lowerChild == 0 && m_lowerChild == 0 ) { size_t removeCount = 0; size_t size = m_points->size(); for(size_t index = 0; index < size; index++) { if( m_points->at( index ) == removablePoint ) { for( size_t index2 = index + 1; index2 < size - removeCount; index2++ ) m_points->at( index ) = m_points->at( index + 1 ); removeCount++; } } m_points->resize( size - removeCount ); m_points->reserve( size - removeCount ); return removeCount > 0; } else { if( m_points->size() == 0 && m_lowerChild != 0 && m_lowerChild != 0 ) { double position = removablePoint->getCoordinate()[getSplittingDimension()]; WKdTreeND* deletedNode = isLowerKdNodeCase( position ) ?m_lowerChild :m_higherChild; WKdTreeND* copiedNode = !isLowerKdNodeCase( position ) ?m_lowerChild :m_higherChild; bool couldFind = deletedNode->removePoint( removablePoint ); if( deletedNode->isEmpty() ) { delete deletedNode; copyPointersFrom( copiedNode ); copiedNode->assignZeroToPointers(); delete copiedNode; } return couldFind; } else { if( m_points->size() != 0 || m_lowerChild != 0 || m_lowerChild != 0 ) cout << "!!!UNKNOWN EXCEPTION!!!" << endl; } } return false; } WKdTreeND* WKdTreeND::getNewInstance( size_t dimensions ) { ......@@ -236,7 +314,7 @@ void WKdTreeND::addPointsToChildren( vector<WKdPointND* >* newPoints ) { WKdPointND* newPoint = newPoints->at( index ); double position = newPoint->getCoordinate().at( m_splittingDimension ); if( position < m_splittingPosition ) if( isLowerKdNodeCase( position ) ) { lowerPoints->push_back( newPoint ); } ......@@ -322,7 +400,9 @@ void WKdTreeND::calculateSplittingPosition( vector<WKdPointND* >* inputPoints ) } m_splittingPosition = ( line->at( medianIdx ) + line->at( medianIdx - 1 ) ) / 2.0; m_splittingPosition = ( line->at( medianIdx - 1 ) + line->at( medianIdx ) ) / 2.0; if( m_splittingPosition == line->at( medianIdx - 1 ) ) m_splittingPosition = line->at( medianIdx ); line->resize( 0 ); line->reserve( 0 ); delete line; ......@@ -361,10 +441,10 @@ bool WKdTreeND::determineNewSplittingDimension( vector<WKdPointND* >* inputPoint if( m_splittingDimension >= m_dimensions && m_parentSplittingDimension < m_dimensions && boundingBoxMax->at( m_parentSplittingDimension ) - boundingBoxMin->at( m_parentSplittingDimension ) > 0.0 ) m_splittingDimension = m_parentSplittingDimension; boundingBoxMin->resize( 0 ); boundingBoxMin->reserve( 0 ); boundingBoxMin->resize( 0 ); boundingBoxMin->reserve( 0 ); boundingBoxMin->resize( 0 ); //TODO(aschwarzkopf): delete instead boundingBoxMin->reserve( 0 ); //TODO(aschwarzkopf): delete instead boundingBoxMin->resize( 0 ); //TODO(aschwarzkopf): delete instead boundingBoxMin->reserve( 0 ); //TODO(aschwarzkopf): delete instead delete boundingBoxMin; delete boundingBoxMax; return m_splittingDimension < m_dimensions; ...... ......@@ -112,10 +112,30 @@ public: */ size_t getSplittingDimension(); /** * Returns the splitting position of the splitted dimension. * \return The splitting position of the splitted dimension. * Return whether the node has neither points nor child nodes. * \return Node has no contents. */ double getSplittingPosition(); bool isEmpty(); /** * Tells whether a position hits a lower or higher case or roughly said in the area * before or after the splitting position. There actually was a case when an average * of two positions had to be calculated what was unsuccessful because the numbers * were too close that the position was either the coordinate from first or second * point. Therefore getSplittingPosition is not public any more. Regard * getSplittingDimension() when executing that method. * \param position Position which has to be checked whether it is before or after * the splitting position of the kd-node within the splitting * dimension. * \return Coordinate belongs either to the lower or higher coordinate child. */ bool isLowerKdNodeCase( double position ); /** * Removes a point. The pointer reference must equal to the removable point. No * points are removed if another point with the same coordinate exists. * \param removablePoint Point to be removed from the kd-tree. * \return Point was found and successfully removed or not. */ bool removePoint( WKdPointND* removablePoint ); protected: /** ......@@ -128,6 +148,16 @@ protected: virtual WKdTreeND* getNewInstance( size_t dimensions ); private: /** * Assigns zero to pointers. It makes sense for some operations when some nodes have to be deleted but */ void assignZeroToPointers(); /** * Copies pointer value to a node. No actual copies are created. So every change * would be shared. Other node parameters are copied. * \param copiedNode Object which should be copied by pointers. */ void copyPointersFrom( WKdTreeND* copiedNode ); /** * Returns all the leaf nodes of the kd tree. * \return All the leaf nodes of the kd tree. ......@@ -177,7 +207,7 @@ private: * The splitting dimension of the parent kd tree node. It is considered to determine * the splitting dimension of the current kd tree node. */ size_t m_parentSplittingDimension; //ggf. wegschmeißen size_t m_parentSplittingDimension; //TODO(aschwarzkopf): ggf. wegschmeißen //TODO(aschwarzkopf): Ggf. Sinn: Nicht bis ins Letzte unterteilen, ggf. nur über einem Threshold /** * The kd tree node child which is on the lower position across the splitting ......@@ -198,8 +228,13 @@ private: */ size_t m_splittingDimension; /** * Children of a kd tree node are separated by a plane. The splitting dimension axis * is perpendicular to that. This position variable is the intersection between this * Children of a kd tree node are separated by a plane. The splitting dimension axis * is perpendicular to that. This position variable is the intersection between this * plane and axis. * This field should not be accessible publically. There actually was a case when an * average of two positions had to be calculated what was unsuccessful because the * numbers were too close that the position was either the coordinate from first or * second point. Try to use isLowerKdNodeCase() instead. */ double m_splittingPosition; /** ...... ......@@ -25,6 +25,7 @@ #include <vector> #include "WPointDistance.h" #include "../../math/vectors/WVectorMaths.h" WPointDistance::WPointDistance() { ......@@ -34,7 +35,7 @@ WPointDistance::WPointDistance() WPointDistance::WPointDistance( vector<double> sourcePoint, WKdPointND* comparedPoint ) { m_comparedPoint = comparedPoint; m_pointDistance = getPointDistance( sourcePoint, getComparedPoint()->getCoordinate() ); m_pointDistance = WVectorMaths::getEuclidianDistance( sourcePoint, getComparedPoint()->getCoordinate() ); } WPointDistance::~WPointDistance() ......@@ -52,12 +53,16 @@ double WPointDistance::getDistance() { return m_pointDistance; } double WPointDistance::getPointDistance( const vector<double>& point1, const vector<double>& point2 ) { //TODO(aschwarzkopf): Not verified that the euclidian distance is calculated right also for points above 3 dimensions. double distance = 0; for( size_t index = 0; index < point1.size() && index < point2.size(); index++ ) distance += pow( point1[index] - point2[index], 2 ); return pow( distance, 0.5 ); vector<WPosition>* WPointDistance::convertToPointSet( vector<WPointDistance>* pointDistances ) { vector<WPosition>* pointSet = new vector<WPosition>(); for( size_t index = 0; index < pointDistances->size(); index++ ) { vector<double> coordinate = pointDistances->at( index ).getComparedCoordinate(); if( coordinate.size() == 3 ) pointSet->push_back( WPosition( coordinate[0], coordinate[1], coordinate[2] ) ); } return pointSet; } bool WPointDistance::operator<( WPointDistance const& right ) const { ...... ......@@ -30,6 +30,7 @@ #include <iostream> #include <vector> #include "WKdPointND.h" #include "core/common/math/linearAlgebra/WPosition.h" using std::vector; ......@@ -75,13 +76,12 @@ public: */ double getDistance(); /** * Static method that calculates the euclidian distance between two arbitrary * unidimensional points. * \param point1 First point for calculating the distance. * \param point2 Second point for calculating the distance. * \return Euclidian distance between that two points. * Static method that fetches coordinates of WPointDistance sets into a three * dimensional WPosition point list. * \param pointDistances Point distance data sets to fetch positions from. * \return A WPosition list. That type is very commonly used in OpenWalnut. */ static double getPointDistance( const vector<double>& point1, const vector<double>& point2 ); static vector<WPosition>* convertToPointSet( vector<WPointDistance>* pointDistances ); /** * Operator for sorting a vector<WPointDistance> using std::sort. * \param right The right compared object to this one. ...... ......@@ -26,6 +26,7 @@ #include <vector> #include <limits> #include "../../math/vectors/WVectorMaths.h" #include "WPointSearcher.h" WPointSearcher::WPointSearcher() ......@@ -34,6 +35,7 @@ WPointSearcher::WPointSearcher() m_examinedKdTree = 0; m_maxResultPointCount = 50; m_maxSearchDistance = 0.5; m_foundPoints = 0; } WPointSearcher::WPointSearcher( WKdTreeND* kdTree ) { ......@@ -42,48 +44,84 @@ WPointSearcher::WPointSearcher( WKdTreeND* kdTree ) m_maxResultPointCount = 50; m_maxSearchDistance = 0.5; m_examinedKdTree = kdTree; m_foundPoints = 0; } WPointSearcher::~WPointSearcher() { m_searchedCoordinate.resize( 0 ); m_searchedCoordinate.reserve( 0 ); } vector<WPosition>* WPointSearcher::convertToPointSet( vector<WPointDistance>* pointDistances ) { vector<WPosition>* pointSet = new vector<WPosition>(); for( size_t index = 0; index < pointDistances->size(); index++ ) { vector<double> coordinate = pointDistances->at( index ).getComparedCoordinate(); if( coordinate.size() == 3 ) pointSet->push_back( WPosition( coordinate[0], coordinate[1], coordinate[2] ) ); } return pointSet; } vector<WPointDistance>* WPointSearcher::getNearestPoints() { vector<WPointDistance>* nearestPoints = new vector<WPointDistance>(); //TODO(aschwarzkopf): Only debugging step over crashes on that line. m_foundPoints = new vector<WPointDistance>(); //TODO(aschwarzkopf): Only debugging step over crashes on that line. double index = 1; size_t distanceSteps = m_maxResultPointCount == std::numeric_limits< size_t >::max() ?1 :m_distanceSteps; for( index = 1; index <= distanceSteps && nearestPoints->size() < m_maxResultPointCount; index++ ) && m_foundPoints->size() < m_maxResultPointCount; index++ ) { delete nearestPoints; nearestPoints = new vector<WPointDistance>(); delete m_foundPoints; m_foundPoints = new vector<WPointDistance>(); double maxDistance = m_maxSearchDistance * pow( 2.0, - ( double )distanceSteps + ( double )index ); fetchNearestPoints( m_examinedKdTree, nearestPoints, maxDistance ); //cout << "Attempt at max distance: " << maxDistance << " size = " << nearestPoints->size() << endl; traverseNodePoints( m_examinedKdTree, maxDistance ); //cout << "Attempt at max distance: " << maxDistance << " size = " << m_foundPoints->size() << endl; } std::sort( nearestPoints->begin(), nearestPoints->end() ); //cout << "Found " << nearestPoints->size() << " Neighbors on index " << (index - 1) // << " with maximal disstance " << nearestPoints->at(nearestPoints->size() - 1).getDistance() << endl; if( nearestPoints->size() > m_maxResultPointCount ) std::sort( m_foundPoints->begin(), m_foundPoints->end() ); //cout << "Found " << m_foundPoints->size() << " Neighbors on index " << (index - 1) // << " with maximal disstance " << m_foundPoints->at(m_foundPoints->size() - 1).getDistance() << endl; if( m_foundPoints->size() > m_maxResultPointCount ) { nearestPoints->resize( m_maxResultPointCount ); nearestPoints->reserve( m_maxResultPointCount ); m_foundPoints->resize( m_maxResultPointCount ); m_foundPoints->reserve( m_maxResultPointCount ); } return nearestPoints; return m_foundPoints; } size_t WPointSearcher::getNearestNeighborCount() { if( m_maxResultPointCount == std::numeric_limits< size_t >::max() ) { return getNearestNeighborCountInfiniteMaxCount( m_examinedKdTree ); } else { vector<WPointDistance>* nearestPoints = getNearestPoints(); size_t neighbourCount = nearestPoints->size(); delete nearestPoints; return neighbourCount; } } size_t WPointSearcher::getNearestNeighborCountInfiniteMaxCount( WKdTreeND* currentNode ) { size_t pointCount = 0; vector<WKdPointND* >* nodePoints = currentNode->getNodePoints(); WKdTreeND* lowerChild = currentNode->getLowerChild(); WKdTreeND* higherChild = currentNode->getHigherChild(); if( nodePoints->size() > 0 && lowerChild == 0 && higherChild == 0) { for( size_t index = 0; index < nodePoints->size(); index++ ) { WKdPointND* point = nodePoints->at( index ); if( pointCanBelongToPointSet( point->getCoordinate(), m_maxSearchDistance ) ) pointCount++; } } else { if( nodePoints->size() == 0 && lowerChild != 0 && higherChild != 0 ) { double splittingDimension = currentNode->getSplittingDimension(); double pointCoord = m_searchedCoordinate.at( splittingDimension ); if( currentNode->isLowerKdNodeCase( pointCoord - m_maxSearchDistance ) ) pointCount += getNearestNeighborCountInfiniteMaxCount( currentNode->getLowerChild() ); if( !currentNode->isLowerKdNodeCase( pointCoord + m_maxSearchDistance ) ) pointCount += getNearestNeighborCountInfiniteMaxCount( currentNode->getHigherChild() ); } else { cout << "!!!UNKNOWN EXCEPTION!!! - getting nearest points" << endl; } } return pointCount; } void WPointSearcher::setExaminedKdTree( WKdTreeND* kdTree ) { m_examinedKdTree = kdTree; ......@@ -100,7 +138,11 @@ void WPointSearcher::setMaxResultPointCount( size_t maxPointCount ) { m_maxResultPointCount = maxPointCount; } void WPointSearcher::fetchNearestPoints( WKdTreeND* currentNode, vector<WPointDistance>* targetPoints, double maxDistance ) void WPointSearcher::setMaxResultPointCountInfinite() { m_maxResultPointCount = std::numeric_limits< size_t >::max(); } void WPointSearcher::traverseNodePoints( WKdTreeND* currentNode, double maxDistance ) { vector<WKdPointND* >* nodePoints = currentNode->getNodePoints(); WKdTreeND* lowerChild = currentNode->getLowerChild(); ......@@ -110,21 +152,20 @@ void WPointSearcher::fetchNearestPoints( WKdTreeND* currentNode, vector<WPointDi for( size_t index = 0; index < nodePoints->size(); index++ ) { WKdPointND* point = nodePoints->at( index ); if( WPointDistance::getPointDistance( m_searchedCoordinate, point->getCoordinate() ) <= maxDistance ) targetPoints->push_back( WPointDistance( m_searchedCoordinate, nodePoints->at( index ) ) ); if( pointCanBelongToPointSet( point->getCoordinate(), maxDistance ) ) onPointFound( point ); } } else { if( nodePoints->size() == 0 && lowerChild != 0 && higherChild != 0 ) { double splittingDimension = currentNode->getSplittingDimension(); double splittingPosition = currentNode->getSplittingPosition(); size_t splittingDimension = currentNode->getSplittingDimension(); double pointCoord = m_searchedCoordinate.at( splittingDimension ); if( pointCoord < splittingPosition + maxDistance ) fetchNearestPoints( currentNode->getLowerChild(), targetPoints, maxDistance ); if( pointCoord > splittingPosition - maxDistance ) fetchNearestPoints( currentNode->getHigherChild(), targetPoints, maxDistance ); if( currentNode->isLowerKdNodeCase( pointCoord - maxDistance ) ) traverseNodePoints( currentNode->getLowerChild(), maxDistance ); if( !currentNode->isLowerKdNodeCase( pointCoord + maxDistance ) ) traverseNodePoints( currentNode->getHigherChild(), maxDistance ); } else { ......@@ -132,3 +173,11 @@ void WPointSearcher::fetchNearestPoints( WKdTreeND* currentNode, vector<WPointDi } } } void WPointSearcher::onPointFound( WKdPointND* point ) { m_foundPoints->push_back( WPointDistance( m_searchedCoordinate, point ) ); } bool WPointSearcher::pointCanBelongToPointSet( const vector<double>& point, double maxDistance ) { return WVectorMaths::getEuclidianDistance( m_searchedCoordinate, point ) <= maxDistance; } ......@@ -54,13 +54,6 @@ public: * Destroys the points searcher */ virtual ~WPointSearcher(); /** * Static method that fetches coordinates of WPointDistance sets into a three * dimensional WPosition point list. * \param pointDistances Point distance data sets to fetch positions from. * \return A WPosition list. That type is very commonly used in OpenWalnut. */ static vector<WPosition>* convertToPointSet( vector<WPointDistance>* pointDistances );
__label__pos
0.981411
Server Fault is a question and answer site for system and network administrators. It's 100% free, no registration required. Sign up Here's how it works: 1. Anybody can ask a question 2. Anybody can answer 3. The best answers are voted up and rise to the top we have to migrate our single-server Database system. This database is used for Citrix xenApp. Is it possible to stop the database for 1 hour but keep our Citrix Farm online? Regards share|improve this question up vote 1 down vote accepted From Citrix forum article, and I believe this is correct, Yes it should be working just fine for a while without the datastore. The servers have the local host cache which contain parts of the datastore. There is no real time limit for how long the datastore can be unavailable anymore. Of course you will not be able to make any changes to the farm. share|improve this answer      Thanks for that. Give it a try and will post the result – patricks Feb 15 '11 at 7:10 Your Answer   discard By posting your answer, you agree to the privacy policy and terms of service. Not the answer you're looking for? Browse other questions tagged or ask your own question.
__label__pos
0.557685
热门 最新 精选 话题 上榜 # Kubernetes 1.25.0 镜像科普 Kubernetes是一个开源的容器编排和管理工具,用于自动化部署、扩展和操作容器化应用程序。在Kubernetes生态系统中,镜像是一个重要的概念。本文将介绍Kubernetes 1.25.0镜像的相关知识,并提供了一些示例代码来展示如何使用这些镜像。 ## 什么是Kubernetes 1.25.0 镜像? Kubernetes 1.25. 原创 4月前 81阅读 # Kubernetes Calico实现指南 ## 概述 在本篇文章中,我们将介绍如何使用Calico来实现Kubernetes网络通信。我们将详细讲解每个步骤和涉及的代码,帮助你快速上手。 ## 步骤概览 下面是实现Kubernetes Calico的整个流程概览。我们将在后续的章节中详细解释每个步骤。 | 步骤 | 操作 | | --- | --- | | 1. 安装Calico | 原创 4月前 94阅读 # Kubernetes安装Flannel ## 概述 在Kubernetes集群中安装Flannel是搭建容器网络的一种方式。Flannel是一个简单且高效的网络解决方案,它可以为Kubernetes集群中的容器提供网络互通的能力。本文将向您介绍如何使用Kubernetes安装Flannel,并提供每一步所需的代码和注释。 ## 安装步骤 以下是安装Kubernetes并配置Flannel 原创 4月前 673阅读 # Kubernetes权威指南第五版下载 本文将介绍如何下载并使用《Kubernetes权威指南第五版》这本权威指南书籍。同时,还会提供一些代码示例,以帮助读者更好地理解和使用Kubernetes。 ## 下载Kubernetes权威指南第五版 《Kubernetes权威指南第五版》是一本非常有价值的书籍,它详细介绍了Kubernetes的原理、架构以及使用方法。你可以通过以下步骤下载这本 # Kubernetes缩容流程 ## 概述 Kubernetes是一个用于容器编排和管理的开源平台,它可以根据应用的负载情况自动调整容器的数量,以实现高可用和弹性伸缩。缩容是指根据负载情况减少运行中的容器数量,以节省资源并提高效率。本文将介绍如何在Kubernetes中实现缩容的流程和具体操作步骤。 ## 缩容流程 下面是Kubernetes缩容的基本流程,可以通过以下步骤来实现: | 步 原创 4月前 54阅读 ## 介绍 在Kubernetes集群中,Nginx Ingress Controller是一个常用的负载均衡器,用于将流量路由到Kubernetes集群中的不同服务。它允许开发人员通过配置Ingress资源来定义路由规则。除了基本的路由功能之外,Nginx Ingress Controller还提供了一些高级功能,如认证和授权。 本文将重点介绍Nginx Ingress Controller 原创 4月前 168阅读 # Sysdig Kubernetes: 监控和调试Kubernetes集群的工具 ![sysdig kubernetes]( Kubernetes是一个强大的容器编排和管理平台,但是对于Kubernetes集群的监控和调试可能会带来一些挑战。幸运的是,有一些工具可以帮助我们更好地了解和管理我们的Kubernetes环境。其中一个很受欢迎的工具就是Sysdig Kubernetes。 Sys 原创 4月前 39阅读 # Windows, Docker, and Kubernetes 在当今的软件开发和部署过程中,使用容器化技术已经成为一个趋势。容器化可以提供更高效、更灵活的部署方式,以及更好的资源利用率。在Windows环境下,我们可以使用Docker和Kubernetes来实现容器化。 ## Docker Docker是一个开源的容器化平台,可以帮助我们构建、分发和运行应用程序。它使用了操作系统级别的 原创 4月前 15阅读 ## 部署Kubernetes集群 Kubernetes是一个开源的容器编排工具,它可以帮助我们管理和调度容器化的应用程序。部署一个Kubernetes集群可以让我们更好地管理和扩展我们的应用。在这篇文章中,我们将介绍如何部署一个由一个master节点和两个worker节点组成的Kubernetes集群,并提供相应的代码示例。 ### 步骤一:准备环境 在开始之前,我们需要准备一些基础环境。 ## 实现Docker Desktop Kubernetes Dashboard的步骤表格 | 步骤 | 描述 | |-------|--------| | 1 | 确保已安装并配置好Docker Desktop | | 2 | 启用Kubernetes在Docker Desktop上 | | 3 | 安装kubectl工具 | | 4 | 部署Ku 原创 4月前 230阅读 # Docker和Kubernetes环境部署 ## 介绍 Docker和Kubernetes是当今最流行的容器化部署和管理工具。它们提供了一种轻量级、灵活、可移植和可扩展的方式来打包、部署和管理应用程序。本文将介绍如何使用Docker和Kubernetes来搭建环境并部署应用程序。 ## Docker环境部署 Docker是一个开源的容器化平台,可以将应用程序及其依赖项打包到一个轻量级的、可 原创 4月前 51阅读 ## 深入了解 Kubernetes 中的 kubectl.kubernetes.io/last-applied-configuration 在 Kubernetes 中,kubectl 是一个非常强大的命令行工具,它允许用户与 Kubernetes 集群进行交互,并管理容器化应用程序。在使用 kubectl 时,您可能会遇到 `kubectl.kubernetes.io/last-applie 原创 4月前 352阅读 # Kubernetes Custom Log Format 日志是在应用程序中记录事件和信息的重要组成部分。Kubernetes提供了灵活的方式来记录容器的日志。除了默认的日志格式外,Kubernetes还支持自定义日志格式,允许用户根据自己的需求定制日志输出的格式。 ## Default Log Format 在Kubernetes中,默认情况下,容器的日志格式是使用Docker的jso # Kubernetes Service Endpoint Explained Kubernetes is a popular container orchestration platform that helps in managing and scaling containerized applications. A key component of Kubernetes is the se 原创 4月前 69阅读 ## 如何将 Kubernetes 的 svc 解析为 127.0.0.1 作为一名经验丰富的开发者,你可以向刚入行的小白教授如何将 Kubernetes 服务(Service,简称 svc)解析为 127.0.0.1。下面将详细介绍整个流程,并给出每一步的代码示例。 ### 步骤概览 下面是实现将 Kubernetes svc 解析为 127.0.0.1 的步骤概览: | 步骤 | 描述 原创 4月前 46阅读 # Kubernetes节点维护模式 在使用Kubernetes进行容器编排时,为了保证集群的稳定性和可靠性,有时需要对节点进行维护。Kubernetes提供了节点维护模式,可以让我们在维护节点时保持应用的高可用性。本文将介绍Kubernetes节点维护模式的概念和使用方法,并通过代码示例进行演示。 ## 什么是节点维护模式 节点维护模式是Kubernetes的一种特性,用于暂时将节点从调度 原创 4月前 95阅读 # Kubernetes 1.26部署教程 ## 概述 在本教程中,我将向你展示如何使用一些步骤将Kubernetes 1.26部署在你的环境中。Kubernetes是一个用于容器编排和管理的开源平台,它可以帮助你更轻松地管理和扩展容器化应用程序。通过本教程,你将能够了解整个部署过程,并掌握每个步骤所需的代码和操作。 ## 步骤概览 下面的表格将展示Kubernetes 1.26部署的整个步骤 原创 4月前 134阅读 # Kubernetes网络权威指南 PDF 实现步骤 作为一名经验丰富的开发者,我将帮助你实现"Kubernetes网络权威指南 PDF"。下面是整个实现过程的步骤: | 步骤 | 操作 | | --- | --- | | 1 | 下载Kubernetes网络权威指南 | | 2 | 安装Kubernetes | | 3 | 配置Kubernetes集群 | | 4 | 导出为PDF格式 | # 实现"node.kubernetes.io/unreachable:NoExecute for 300s"的步骤 ## 流程概述 要实现"node.kubernetes.io/unreachable:NoExecute for 300s",需要经过以下步骤: 1. 创建一个名为`unreachable-pod.yaml`的YAML文件,用于定义一个Pod。 2. 应用该YAML文件,以创 原创 4月前 421阅读 # 实现spring-cloud-kubernetes-core的步骤 作为一名经验丰富的开发者,你需要教会一位刚入行的小白如何实现spring-cloud-kubernetes-core。下面是整个实现过程的步骤表格: | 步骤 | 描述 | | --- | --- | | 步骤1 | 添加spring-cloud-kubernetes-core的依赖 | | 步骤2 | 配置Kuberne 原创 4月前 59阅读 # 实现“3 node(s) had taint {node.kubernetes.io/unreachable: }”的步骤 作为一名经验丰富的开发者,我将向你解释如何实现“3 node(s) had taint {node.kubernetes.io/unreachable: }”。这个过程需要遵循以下步骤: | 步骤 | 描述 原创 4月前 515阅读 # GitHub Kubernetes Pull Request Kubernetes is an open-source container orchestration platform that allows you to automate the deployment, scaling, and management of containerized applications. GitHu 原创 4月前 29阅读 # Kubernetes SIGs Kubernetes is an open-source container orchestration platform that allows you to automate the deployment, scaling, and management of containerized applications. It provides a rich s 原创 4月前 43阅读 # Pre-pulling Kubernetes Images 在 Kubernetes 集群中,容器镜像是部署和运行应用程序所必需的。当 Kubernetes 集群需要创建一个新的 Pod 时,它会使用预先定义的镜像来实例化容器。然而,在实际运行应用程序之前,需要等待容器镜像从容器注册表拉取到节点上。这个过程可能会花费一些时间,导致应用程序的延迟。 为了解决这个问题,Kubernetes 提 原创 4月前 203阅读 ## Kubernetes中的权限控制——使用RBAC限制Dashboard的访问 在Kubernetes中,权限控制是保护集群资源安全的重要手段之一。通过适当配置访问权限,可以确保只有授权的用户或服务账号能够访问敏感的资源和功能。本文将介绍如何使用Kubernetes的RBAC(Role-Based Access Control)机制限制特定用户或服务账号对Kubernetes Dashboa 原创 4月前 1027阅读 ## 如何实现“k8s /etc/kubernetes目录下的文件” 作为一名经验丰富的开发者,你可以向刚入行的小白详细解释如何实现“k8s /etc/kubernetes目录下的文件”。这个目标可以通过以下步骤来实现: | 步骤 | 描述 | | ------ | ------ | | 步骤 1 | 安装 Kubernetes 集群 | | 步骤 2 | 创建 /etc/kubernetes 原创 4月前 85阅读 # Kubernetes 多集群管理工具 Kubernetes 是一个开源的容器编排平台,用于自动化部署、扩展和管理容器化应用程序。它允许用户在集群中运行和管理容器,并提供了一个强大的平台来管理容器化工作负载。随着容器技术的普及,越来越多的组织开始使用多个 Kubernetes 集群来满足不同的需求。由于多集群的部署和管理可能会变得复杂,因此出现了一些工具来简化这个过程。 ## 多集群管理工具 原创 4月前 28阅读 ## 实现 Kubernetes Dashboard 和 Prometheus 作为一名经验丰富的开发者,我将帮助你实现 Kubernetes Dashboard 和 Prometheus 的部署。下面是整个过程的步骤概览: | 步骤 | 任务 | 代码 | | --- | --- | --- | | 1 | 安装 Kubernetes Dashboard | `kubectl apply - 原创 4月前 28阅读 # Kubernetes安装 Kubernetes(简称K8s)是一个开源的容器编排平台,可用于自动化部署、扩展和管理容器化应用程序。本文将介绍如何在Linux环境中安装Kubernetes,并提供相关代码示例。 ## 准备工作 在开始安装之前,需要满足以下几个前提条件: 1. 一台运行Linux的服务器。 2. 安装Docker并启动。 3. 设置好网络环境,确保能够访问互联网。 4. 原创 4月前 110阅读 # Kubernetes开源协议 Kubernetes是一个开源的容器编排和管理系统,用于自动部署、扩展和管理容器化应用程序。该项目由Google开发,并于2014年将其代码捐赠给了Linux基金会,成为了一个开放的社区项目。 ## 什么是开源协议? 开源协议是一种规定了软件源代码可以自由使用、修改和分发的法律条款。开源协议允许用户对软件进行自由的访问、研究、共享和修改,从而促进了创新和协作 原创 4月前 129阅读
__label__pos
0.707563
Algebra help Two less than three-fourths of a number is 10. What is the number? A. 10 2/3 B. 13 1/3 C. 15 1/3 D. 16 Please help meh! God bless you :-) 1. 👍 0 2. 👎 1 3. 👁 207 1. (3/4)x - 2 = 10 (3/4x = 12 x= 12/(3/4) x = 12 ( 4/3) x = ? Respond to this Question First Name Your Response Similar Questions 1. Statistics Which one of the following is NOT an example of discrete data? A. number of households watching the Home Improvement. B. number of employees reporting in sick. C. number of miles between New York City and Chicago. D. number of asked by Tykrane on December 13, 2009 2. Algebra You spin a spinner that has eight equal-sized sections numbered one to eight. Which event is least likely to occur? • The number is even. • The number is less than three. • The number is greater than three. • The number is asked by Sandra on May 21, 2014 3. Math The difference between three-fourths and three-fifths of a number is 9. Determine the number? asked by The difference between three-fourths and three-fifths of a number is 9. Determine the number? on November 10, 2015 4. math write each expression using n as your variable.then simplify fully. 1.five more than the sum of a number and ten. 2.the product of eight and seven less than a number. 3.the quotient of a number and three, increased by one. 4.ten asked by bre on August 26, 2015 5. math Hi There- I really need help with this. I'm kind of confused and don't have an answer. if you could explain it ill give you my answer once I understand it. how does the product of a fraction and a whole number compare to the whole asked by Tanner on December 19, 2018 1. math a two figure number is written down at random find the probability a)that the number is greater than 68 b)the number is a multiple of 9 c) it is less than 100 d) it contains at least one 5 (i.e a number such as 15 or 55 asked by arzam on May 2, 2013 2. Mathemathics (teaser)_help A Professor in havard University, Sent His Phone Number In A Disorderly Manner To His Brilliant Students. The Disordered Phone Number Was 64001128454. To Know His Real Phone Number, He Gave The Students The Following Conditions; asked by clement on June 9, 2019 3. Algebriac Expressions 2 less than 7 times a number = 2) Sarah's age decreased by 2 = 3) One third as many books = 4) Earns $13 per hour = 5) 4 years younger than Marcus 6) 2 times a number, decreased by 4 7) 9 less than the product of 15 and a number asked by Joetta on October 27, 2015 4. 5th grade math Which pattern can describe the numbers 2,4,10,28, and so on? A. For each number after first, add 4 to previous number in the list. B. For each number after first, multiply the previous number by 3 and subtract 2. C. For each asked by jamar on January 15, 2014 5. math One-half of a number plus three-fourths of the number is 2 more than four-thirds of the number. find the number . asked by paul on August 21, 2016 6. Algebra Here is my problem. Please walk me through how you got to the answer. Three-fourths of a number equals 3 times the number increased by 9. Is this the correct equation? 3/4n = 3n + 9 Here's another. In this one, does "is" mean asked by Celina on November 14, 2008 You can view more similar questions or ask a new question.
__label__pos
0.988693
« Zurück Komponenten dynamisch importieren in React 5. Juli 2020 Importiere nur die Komponenten, die du wirklich brauchst Angenommen du baust einen Pagebuilder, welcher über eine API gefüttert wird. Das JSON sieht bspw. so aus: { "components": [ { "name": "Header", "props": { "title": "This is my header", "image": "catdog.jpg" } }, { "name": "Image", "props": { "path": "tree.jpg", "fullWidth": true } } ] } Ziel ist es, die Komponenten Header.js und Image.js zu rendern. Du könntest jetzt wie folgt vorgehen: // home.jsx import { useState, useEffect } from 'react'; import Header from './components/Header'; import Image from './components/Image'; const Home = () => { const [pageData, setPageData] = useState(null); // API requesten um zu wissen, welche Komponenten wir brauchen // error handling lasse ich jetzt mal raus useEffect(() => { const loadPageData = async() => { const response = await fetch('/api/page-home'); const content = await response.json(); // unsere Komponenten sind in content.components (siehe oben das JSON Beispiel) setPageData(content); } loadPageData(); }, []); return ( {pageData.components.map((component) => { // react Komponenten müssen mit einem großen Buchstaben beginnen // daher Wrapper const Wrapper = component.name; <Wrapper {...component.props} /> })} ) } Ok, cool…wir rendern jetzt die Komponenten, die unsere API vorgibt. Aber was ist, wenn wir 50 Komponenten haben? Sollen wir alle 50 Komponenten importieren, auch wenn wir nur 5 brauchen? Nein, das Pflegen macht echt keinen Spaß – „neue Komponente? Kein Problem, ich importiere sie und rebuilde das Projekt“ /s…nein, die Lösung ist, die Komponente, wie folgt, dynamisch zu importieren: // home.jsx import { useState, useEffect } from 'react'; const Home = () => { const [pageData, setPageData] = useState(null); useEffect(() => { const loadPageData = async() => { const response = await fetch('/api/page-home'); const content = await response.json(); return content; } const loadComponents = async () => { // wieder infos von der API holen, welche Komponenten wir brauchen const content = await loadPageData(); const importedComponents = {}; for (const component of content.components) { // haben wir die Komponente bereits importiert? if (importedComponents[component.name]) { continue; } // falls nein, importieren wir sie const importedComponent = await import(`./components/${component.name}`); importedComponents[component.name] = importedComponent.default; } // nachdem wir alle Komponenten importiert haben // setzen wir den neuen State mit importierten Komponenten setPageData({ content, importedComponents }); }; loadComponents(); }, []); return ( {pageData.content.components.map((component) => { // react Komponenten müssen mit einem großen Buchstaben beginnen // daher Wrapper const Wrapper = pageData.importedComponents[component.name]; <Wrapper {...component.props} /> })} ) } Jetzt interessieren uns die vorgegebenen Komponenten von der API nicht mehr, wir importieren sie alle dynamisch. Natürlich solltest du noch evtl. auftretende Fehler behandeln (api request schlägt fehl, Komponenten gibt es gar nicht, etc.). zurück zu allen Beiträgen
__label__pos
0.994261
Hacker News new | comments | ask | show | jobs | submit login > Second, Etcd and Fleet are themselves designed to be modular, so it’s easy to support a variety of other deployment methods as well. Zookeeper isn't Modular? No mention of HTCondor+Dagman? No mention of Spark? I've written a general DAG processor/workflow engine/metascheduler/whatever you want to call it. It's used by various physics and astronomy experiments. I've interfaced it with the Grid/DIRAC, Amazon, LSF, Torque, PBS, SGE, and Crays. There's nothing in it that precludes Docker jobs from running. I've implemented a mixed-mode (Streaming+batch processing + more DAG) version of it which just uses job barriers to do the setup and ZeroMQ for inter-job communication. I think something like Spark's resilient distributed dataset would be nice here as well. We don't use hadoop because, as was said, because it's narrow in scope and it's not a good general purpose DAG/Workflow Engine/Pipeline. I think this is a small improvement, but I don't really see it being much better than hadoop, or HTCondor, or Spark. HTCondor is pretty amazing. I think somebody should be building a modern HTCondor, not a modern Hadoop. Hi, JD @ Pachyderm here. Our feeling is that there's a big difference between having projects like this in the ecosystem and having a canonical implementation that comes preloaded in the software. "Batteries included but removable" is the best phrasing of this we've found (stolen from Docker). I've seen tons of pipeline management tools in the Hadoop ecosystem (even contributed to some) it's not that they're bad it's just that they're not standardized. This winds up being a huge cost because if 2 companies use different pipeline management it gets a lot harder to reuse code. I think etcd is a pretty good example of this. Etcd is basically a database (that's the way CoreOS describes it) by database standards it's pretty crappy. But it's simple and it's on every CoreOS installation so you can use it without making your software a ton harder to deploy. Hope this clears some stuff up! [deleted] Redis cannot replace etcd: etcd (like zookeeper and chubby) offer strong consistency, which Redis does not. These requirements are key for building things like a directory service (which is how CoreOS uses etcd). what's not modern about Condor? Isn't Tez good for DAG's? > somebody should be building a modern HTCondor A bug-free, cross platform, rock-solid HTCondor would be great. Sadly the existing HTCondor is a buggy turd. I've fixed some stuff in it and a lot of the code is eye-roll worthy. I can practically guarantee you hours of wondering why something that by any reasonable expectation should be working isn't working, and not giving any meaningful error message. But like you said, a really solid HTCondor rewrite with the Stork stuff baked in would pretty much be all anyone should need, I think. It's not like you'd even really need to dramatically re-architect the thing. The problems with HTCondor really are mostly just code quality and the user experience. I use HTCondor every day. I find it to be rock solid with top notch documentation. It is cross-platform today as well, so I'm not sure where you're coming from on this. Interesting -- does HTCondor solve the same problem as Hadoop? I know it is for running batch jobs across a cluster. How big are the data sets? How does it compare with the MapReduce paradigm? I see there is this Dagman project which sounds similar to some of the newer Big Data frameworks that use a DAG model. I will make an uneducated guess that it deals with lots of computation on smaller sized data (data that fits on a machine). Maybe you have 1 GB or 10 GB of data that you want to run through many (dozens?) of transformations. So you need many computers to do the computation, but not necessarily to store the data. I would guess another major difference is that there is no shuffle (distributed sort)? That is really what distinguishes MapReduce from simple parallel batch processing -- i.e. the thing that connects the Map and Reduce steps (and one of the harder parts to engineer). In MapReduce you often have data much bigger than a single machine, e.g. ~100 TB is common, but you are doing relatively little computation on it. Also MapReduce tolerates many node failures and thus scales well (5K+ machines for a single job), and tries to reign in stragglers to reduce completion time. I am coming from the MapReduce paradigm... I know people were doing "scientific computing" when I was in college but I never got involved in it :-( I'm curious how the workloads differ. Do you administer the clusters, or has somebody set everything up for you? Do you use it entirely on linux, or have you made the mistake of trying to get it to work on Windows? Which universe do you use: java, vanilla, or standard? I can imagine a perception that it's rock solid in a particular configuration and usage pattern, especially one where somebody else went through the pain of setting it up. I admin the cluster, so you're gonna need to try again. [flagged] Why are you being so mean? You look like a huge asshole in this thread. Guidelines | FAQ | Support | API | Security | Lists | Bookmarklet | Legal | Apply to YC | Contact Search:
__label__pos
0.582597
inkdrop: fun with points and lines A friend of mine asked me to join him in a small side project that combines both art, programming and hardware. The latter is still in the design phase, so let me tell you about the art and programming part first. The principal idea is to generate art (random, really generative or from existing data) and let it being drawn in real life by a machine. We wanted to start simple and just process existing bitmap images and turn them into nice looking paths that can be drawn by the machine. My initial idea was to generate a path from a random walk with a probability density that matches the surrounding of the current position. While that works in a way, the result is hardly legible. After some researching we came to the conclusion to do what in general is known as TSP art. TSP art TSP as in Travelling Salesman Problem is a two-step problem. In a first step, for given number of points, find the a set of points that approximates the pixel density of the input image. In a second step, find a path that connects all points once. Sampling points Because (photographic) image formation is a stochastic process one can do the reverse and use the brightness of each input image pixel as the probability that light hit the sensor. Since we want to have more points for darker areas, we have to use the inverse though. That and simple rejection sampling leads us to a basic sampling algorithm: 1. If we have enough points stop. 2. Compute a random position (x, y) in [0, width; 0, height]. 3. Read the pixel value at (x, y) in the input image, normalize it to [0, 1] and invert it. 4. Compute a random brightness value between [0, 1]. 5. If the random brightness value is larger than the pixel value accept it. This works wonderfully but due to the stochastic nature requires many samples which is detrimental to the path finding step. In the following image you can see the result for 10000 and 100000 points: Luckily there are various approaches to approximate the density with less points the same way a human would draw pencil images. Weighted Voronoi stippling Weighted Voronoi Stippling is such an approach. The basic idea in layman’s terms is as follows: 1. Sample a set of points randomly or use the algorithm from above. 2. Compute the Voronoi diagram for the point set. 3. For each Voronoi cell move its central point to the darkest area. 4. Continue until you are satisfied. The following image shows you the result for 10000 and 30000 points and 5 as well as 100 iterations: Note though that there are no major improvements past the 50 iterations mark. Solving the Travelling Salesman Problem Now that we have a good set of points we want to connect them and ideally visit each point only once. Sounds familiar? Yes, it’s the infamous Travelling Salesman Problem which is NP complete, meaning you won’t find the best solution in a reasonable amount of time for a larger number of points. So again a bit of research and the most straightforward algorithm is again two-fold, first we compute an initial path using the Nearest Neighbor algorithm and then iteratively improve that path using the 2-opt algorithm. Here are two results for 10000 and 30000 points respectively: inkdrop All of the images have generated by a small Rust tool called inkdrop. It is split into a core library that implements the algorithms as well as some data structures and two binaries to drive them via command line or a GTK 4 user interface. The primary output data format is SVG which is super simple and matches the problem very well. To generate Voronoi diagrams I used the wonderful Voronator library which wraps the Delaunator library I tried to use before but gave me too many headaches. Using GTK is nothing new for me but GTK 4 is. And I must admit, I love the on-going work of the Gtk-rs team that provides usable GTK 4 bindings at this early stage as well as the GTK team itself. GTK 4 finally improves quite a few pain points for me and surprised me positively with the addition of layout managers and declarative property bindings. This allows one to write even less code and declare more UI facts in the builder file itself. Neat. So, here is part one of our generative art adventure.
__label__pos
0.942592
libppm (3) - Linux Manuals libppm: functions for PPM programs NAME libppm - functions for PPM programs SYNOPSIS #include <netpbm/ppm.h> void ppm_init(int * argcP,   char * argv[]); pixel ** ppm_allocarray( int cols,int rows); pixel * ppm_allocrow(int cols); void ppm_freearray(pixel ** pixels,   int rows); void ppm_freerow(pixel * pixelrow); void ppm_readppminit(FILE * fp,   int * colsP,   int * rowsP, pixval * maxvalP,int * formatP ); void ppm_readppmrow(FILE *fp,   pixel * pixelrow,   int cols,   pixval maxval,   int format); pixel ** ppm_readppm(FILE * fp,   int * colsP,   int * rowsP,   pixvalP * maxvalP); void ppm_writeppminit(FILE * fp,   int cols,   int rows,   pixval maxval,   int forceplain); void ppm_writeppmrow(FILE * fp,   pixel * pixelrow,   int cols,   pixval maxval,   int forceplain); void ppm_writeppm(FILE * fp,   pixel ** pixels,   int cols,   int rows,   pixval maxval,   int forceplain); void ppm_writeppm(FILE * fp,   pixel ** pixels,   int cols,   int rows,   pixval maxval,   int forceplain); void ppm_nextimage(FILE * file,   int const eofP); void ppm_check(FILE * file,   const enum pm_check_type check_type,   const int format,   const int cols,   const int rows,   const int maxval, enum pm_check_code * const retval); typedef ... pixel; typedef ... pixval; #define PPM_MAXMAXVAL ... #define PPM_OVERALLMAXVAL ... #define PPM_FORMAT ... #define RPPM_FORMAT ... #define PPM_TYPE PPM_FORMAT #define PPM_FORMAT_TYPE(format) ... pixval PPM_GETR(pixel p) pixval PPM_GETG(pixel p) pixval PPM_GETB(pixel p) void PPM_ASSIGN(pixel p,   pixval red,   pixval grn,   pixval blu) int PPM_EQUAL(pixel p,   pixel q) int PPM_ISGRAY(pixel p) void   PPM_DEPTH(pixel newp,   pixel p,   pixval oldmaxval,   pixval newmaxval) pixel ppm_parsecolor(char * colorname, pixval maxval) char * ppm_colorname(pixel * colorP,   pixval maxval,   int hexok) void ppm_readcolornamefile(   const char *fileName   int mustOpen,   colorhash_table * chtP   const char *** colornamesP   ) DESCRIPTION These library functions are part of Netpbm(1) TYPES AND CONSTANTS Each pixel contains three pixvals, each of which should contain only the values between 0 and PPM_MAXMAXVAL. MANIPULATING PIXELS The macros PPM_GETR, PPM_GETG, and PPM_GETB retrieve the red, green, or blue sample, respectively, from the given pixel. The PPM_ASSIGN macro assigns the given values to the red, green, and blue samples of the given pixel. The PPM_EQUAL macro tests two pixels for equality. The PPM_ISGRAY macro tests a pixel for being gray. It returns true if and only if the color of pixel p is black, white, or gray. The PPM_DEPTH macro scales the colors of pixel p according the old and new maxvals and assigns the new values to newp. It is intended to make writing ppmtowhatever easier. The PPM_LUMIN, PPM_CHROM_R, and PPM_CHROM_B macros determine the luminance, red chrominance, and blue chrominance, respectively, of the pixel p. The scale of all these values is the same as the scale of the input samples (i.e. 0 to maxval for luminance, -maxval/2 to maxval/2 for chrominance). Note that the macros do it by floating point multiplication. If you are computing these values over an entire image, it may be significantly faster to do it with multiplication tables instead. Compute all the possible products once up front, then for each pixel, just look up the products in the tables. INITIALIZATION ppm_init() is obsolete (at least since Netpbm 9.25 (March 2002)). Use pm_proginit() instead. ppm_init() is identical to pm_proginit. MEMORY MANAGEMENT ppm_allocarray() allocates an array of pixels. ppm_allocrow() allocates a row of the given number of pixels. ppm_freearray() frees the array allocated with ppm_allocarray() containing the given number of rows. ppm_freerow() frees a row of pixelss allocated with ppm_allocrow(). READING FILES If a function in this section is called on a PBM or PGM format file, it translates the PBM or PGM file into a PPM file on the fly and functions as if it were called on the equivalent PPM file. The format value returned by ppm_readppminit() is, however, not translated. It represents the actual format of the PBM or PGM file. ppm_readppminit() reads the header of a PPM file, returning all the information from the header and leaving the file positioned just after the header. ppm_readppmrow() reads a row of pixels into the pixelrow array. format, cols, and maxval are the values returned by ppm_readppminit(). ppm_readppm() reads an entire PPM image into memory, returning the allocated array as its return value and returning the information from the header as rows, cols, and maxval. This function combines ppm_readppminit(), ppm_allocarray(), and ppm_readppmrow(). WRITING FILES ppm_writeppminit() writes the header for a PPM file and leaves it positioned just after the header. forceplain is a logical value that tells ppm_writeppminit() to write a header for a plain PPM format file, as opposed to a raw PPM format file. ppm_writeppmrow() writes the row pixelrow to a PPM file. For meaningful results, cols, maxval, and forceplain must be the same as was used with ppm_writeppminit(). ppm_writeppm() write the header and all data for a PPM image. This function combines ppm_writeppminit() and ppm_writeppmrow(). MISCELLANEOUS ppm_nextimage() positions a PPM input file to the next image in it (so that a subsequent ppm_readppminit() reads its header). ppm_nextimage() is analogous to pbm_nextimage(), but works on PPM, PGM, and PBM files. ppm_check() checks for the common file integrity error where the file is the wrong size to contain all the image data. ppm_check() is analogous to pbm_check(), but works on PPM, PGM, and PBM files. COLOR Luminance, Chrominance (YcbCr) float PPM_LUMIN(pixel p); float PPM_CHROM_B(pixel p); float PPM_CHROM_R(pixel p); PPM_LUMIN takes a pixel as an argument and returns the luminance of that pixel, with the same maxval as the pixel (e.g. if the pixel's maxval is 255, a PPM_LUMIN value of 255 means fully luminant). PPM_CHROM_B and PPM_CHROM_R are similar, for the red and blue chrominance values. pixel ppm_color_from_ycbcr(unsigned int y, int cb, int cr); ppm_color_from_ycbcr() converts in the other direction. Given luminance and chrominance, it returns a pixel value. Hue, Saturation, Value (HSV) struct hsv { double h; /* hue (degrees) 0..360 */ double s; /* saturation (0-1) */ double v; /* value (0-1) */ }; pixel ppm_color_from_hsv(struct hsv const hsv, pixval const maxval); struct hsv ppm_hsv_from_color(pixel const color, pixval const maxval); These convert a color between from pixel (RGB) form and HSV. pixval ppm_saturation(pixel const p, pixval const maxval); This gives you the saturation of a color, as a pixval. (e.g. if the saturation of p is 50% and maxval is 100, ppm_saturation() returns 50). Berlin-Kay Color Brent Berlin and Paul Kay in 1969 did a study which identified a set of 11 basic colors people universally recognize. They are: black gray white red orange yellow green blue violet purple brown The bk_color type represents a color from this set: typedef enum { BKCOLOR_BLACK = 0, BKCOLOR_GRAY, BKCOLOR_WHITE, BKCOLOR_RED, BKCOLOR_ORANGE, BKCOLOR_YELLOW, BKCOLOR_GREEN, BKCOLOR_BLUE, BKCOLOR_VIOLET, BKCOLOR_PURPLE, BKCOLOR_BROWN } bk_color; You can use this as an index of an array, in which case you might also want macro BKCOLOR_COUNT, which is the number of colors in the set (11). To translate between the bk_color type and the English names of the colors, use ppm_bk_color_from_name() and ppm_name_from_bk_color(): bk_color ppm_bk_color_from_name(const char * name); const char * ppm_name_from_bk_color(bk_color bkColor); ppm_bk_color_from_color() tells you to which Berlin-Kay color a certain color is closest, by way of a fuzzy color matching algorithm: bk_color ppm_bk_color_from_color(pixel color, pixval maxval); maxval is the maxval on which color is based. ppm_color_from_bk_color() converts the opposite way: given a Berlin-Kay color, it gives the color, in pixel form, that best represents it. pixel ppm_color_from_bk_color(bk_color bkColor, pixval maxval); maxval is the maxval on which the returned color is based. All of the facilities in this section were new in Netpbm 10.34 (June 2006). COLOR NAMES System Color Dictionary Netpbm uses the system's X11 color dictionary (usually in /usr/lib/X11/rgb.txt). This is the same file the X Window System typically uses to associate colors with their names. The color dictionary that Netpbm uses is in the file whose name is the value of the RGBDEF environment variable. If RGBDEF is not set, Netpbm defaults to the first existing file from this list: /usr/lib/X11/rgb.txt /usr/openwinlib/rgb.txt /usr/X11R6/lib/X11/rgb.txt You can see the color names from a typical X11 color dictionary, which is probably very close to what is on your system, along with the colors, here . This website (1)  shows a bunch of other versions you could use. Netpbm is packaged with a color dictionary. A standard Netpbm installation installs this file as "misc/rgb.txt" in the Netpbm directory. This color dictionary has colors from everywhere the Netpbm maintainer could find them, and is a superset of XFree 86's color dictionary. ppm_parsecolor ppm_parsecolor() interprets a color specification and returns a pixel of the color that it indicates. The color specification is ASCII text, in one of these formats: a name, as defined in the system color dictionary .  An X11-style hexadecimal specifier: rgb:r/g/b, where r, g, and b are each 1- to 4-digit hexadecimal numbers. For each, the maxval is the maximum number that can be represented in the number of hexadecimal digits given. Example: rgb:01/ff/8000 specifies 1/255 red intensity, maximum green intensity, and about half blue intensity.  An X11-style decimal specifier: rgbi:r/g/b, where r, g, and b are floating point numbers from 0 to 1. an old-X11-style hexadecimal triple: #rgb, #rrggbb, #rrrgggbbb, or #rrrrggggbbbb. A triplet of decimal floating point numbers from 0.0 to 1.0, representing red, green, and blue intensities respectively, separated by commas. E.g. 1.0,0.5,.25. This is for backwards compatibility; it was in use before MIT came up with the similar and preferred rgbi style). If the color specification does not conform to any of these formats, including the case that it is a name, but is not in the system color dictionary, ppm_parsecolor() throwsanerror(1) ppm_colorname ppm_colorname() returns a string that describes the color of the given pixel. If a system color dictionary is available and the color appears in it, ppm_colorname() returns the name of the color from the file. If the color does not appear in a system color dictionary and hexok is true, ppm_colorname() returns a hexadecimal color specification triple (#rrggbb). If a system color dictionary is available but the color does not appear in it and hexok is false, ppm_colorname() returns the name of the closest matching color in the color file. Finally, if there is no system color dictionary available and hexok is false, ppm_colorname() fails and throws an error . The string returned is in static libppm library storage which is overwritten by every call to ppm_colorname(). ppm_readcolornamefile ppm_readcolornamefile() reads the entire contents of the color dictionary in the file named fileName into data structures you can use to access it easily. The function returns all the color names as an array of null-terminated strings. It mallocs the space for this array and returns its address at colornamesP. (*colornamesP)[i] is the address of the first character in the null-terminated string that is the name of the ith color in the dictionary. The function also returns a colorhash_table (see COLOR INDEXING ) that matches all these color names up to the colors they represent. It mallocs the space for the colorhash_table and returns its address at chtP. The number that the colorhash_table associates with each color is the index into the color name array described above of the name of that color. You may specify a null pointer for fileName to indicate the default color dictionary. mustOpen is a boolean. If it is nonzero, the function fails and aborts the program if it is unable to open the specified color dictionary file. If it is zero, though, it simply treats an unopenable color dictionary as an empty one. The colorhash and color name array it returns contain no colors or names. ppm_readcolornamefile() was new in Netpbm 10.15 (April 2003). COLOR INDEXING Sometimes in processing images, you want to associate a value with a particular color. Most often, that's because you're generating a color mapped graphics format. In a color mapped graphics format, the raster contains small numbers, and the file contains a color map that tells what color each of those small numbers refers to. If your image has only 256 colors, but each color takes 24 bits to describe, this can make your output file much smaller than a straightforward RGB raster would. So, continuing the above example, say you have a pixel value for chartreuse and in your output file and you are going to represent chartreuse by the number 12. You need a data structure that allows your program quickly to find out that the number for a chartreuse pixel is 12. Netpbm's color indexing data types and functions give you that. colorhash_table is a C data type that associates an integer with each of an arbitrary number of colors. It is a hash table, so it uses far less space than an array indexed by the color's RGB values would. The problem with a colorhash_table is that you can only look things up in it. You can't find out what colors are in it. So Netpbm has another data type for representing the same information, the poorly but historically named colorhist_vector. A colorhist_vector is just an array. Each entry represents a color and contains the color's value (as a pixel) and the integer value associated with it. The entries are filled in starting with subscript 0 and going consecutively up for the number of colors in the histogram. (The reason the name is poor is because a color histogram is only one of many things that could be represented by it). colorhash_table ppm_alloccolorhash() This creates a colorhash_table using dynamically allocated storage. There are no colors in it. If there is not enough storage, throws an error . void ppm_freecolorhash() This destroys a ppm_freecolorhash and frees all the storage associated with it. int ppm_addtocolorhash( colorhash_table cht, const pixel * const colorP, const int value) This adds the specified color to the specified colorhash_table and associates the specified value with it. You must ensure that the color you are adding isn't already present in the colorhash_table. There is no way to update an entry or delete an entry from a colorhash_table. int ppm_lookupcolor( const colorhash_table cht, const pixel * const colorP ) This looks up the specified color in the specified colorhash_table. It returns the integer value associated with that color. If the specified color is not in the hash table, the function returns -1. (So if you assign the value -1 to a color, the return value is ambiguous). colorhist_vector ppm_colorhashtocolorhist( const colorhash_table cht, const int ncolors ) This converts a colorhash_table to a colorhist_vector. The return value is a new colorhist_vector which you must eventually free with ppm_freecolorhist(). ncolors is the number of colors in cht. If it has more colors than that, ppm_colorhashtocolorhist does not create a colorhist_vector and returns NULL. colorhash_table ppm_colorhisttocolorhash( const colorhist_vector chv, const int ncolors ) This poorly named function does not convert from a colorhist_vector to a colorhash_table. It does create a colorhash_table based on a colorhist_vector input, but the integer value for a given color in the output is not the same as the integer value for that same color in the input. ppm_colorhisttocolorhash() ignores the integer values in the input. In the output, the integer value for a color is the index in the input colorhist_vector for that color. You can easily create a color map for an image by running ppm_computecolorhist() over the image, then ppm_colorhisttocolorhash() over the result. Now you can use ppm_lookupcolor() to find a unique color index for any pixel in the input. If the same color appears twice in the input, ppm_colorhisttocolorhash() throws an error . ncolors is the number of colors in chv. The return value is a new colorhash_table which you must eventually free with ppm_freecolorhash(). COLOR HISTOGRAMS The Netpbm libraries give you functions to examine a Netpbm image and determine what colors are in it and how many pixels of each color are in it. This information is known as a color histogram. Netpbm uses its colorhash_table data type to represent a color histogram. colorhash_table ppm_computecolorhash( pixel ** const pixels, const int cols, const int rows, const int maxcolors, int* const colorsP ) This poorly but historically named function generates a colorhash_table whose value for each color is the number of pixels in a specified image that have that color. (I.e. a color histogram). As a bonus, it returns the number of colors in the image. (It's poorly named because not all colorhash_tables are color histograms, but that's all it generates). pixels, cols, and rows describe the input image. maxcolors is the maximum number of colors you want processed. If there are more colors that that in the input image, ppm_computecolorhash() returns NULL as its return value and stops processing as soon as it discovers this. This makes it run faster and use less memory. One use for maxcolors is when you just want to find out whether or not the image has more than N colors and don't want to wait to generate a huge color table if so. If you don't want any limit on the number of colors, specify maxcolors=0. ppm_computecolorhash() returns the actual number of colors in the image as *colorsP, but only if it is less than or equal to maxcolors. colorhash_table ppm_computecolorhash2( FILE * const ifp, const int cols, const int rows, const pixval maxval, const int format, const int maxcolors, int* const colorsP ) This is the same as ppm_computecolorhash() except that instead of feeding it an array of pixels in storage, you give it an open file stream and it reads the image from the file. The file must be positioned after the header, at the raster. Upon return, the file is still open, but its position is undefined. maxval and format are the values for the image (i.e. information from the file's header). colorhist_vector ppm_computecolorhist( pixel ** pixels, int cols, int rows, int maxcolors, int * colorsP ) This is like ppm_computecolorhash() except that it creates a colorhist_vector instead of a colorhash_table. If you supply a nonzero maxcolors argument, that is the maximum number of colors you expect to find in the input image. If there are more colors than you say in the image, ppm_computecolorhist() returns a null pointer as its return value and nothing meaningful as *colorsP. If not, the function returns the new colorhist_vector as its return value and the actual number of colors in the image as *colorsP. The returned array has space allocated for the specified number of colors regardless of how many actually exist. The extra space is at the high end of the array and is available for your use in expanding the colorhist_vector. If you specify maxcolors=0, there is no limit on the number of colors returned and the return array has space for 5 extra colors at the high end for your use in expanding the colorhist_vector. colorhist_vector ppm_computecolorhist2( FILE * ifp, int cols, int rows, int maxcolors, pixval maxval, int format, int * colorsP ) This is the same as ppm_computecolorhist() except that instead of feeding it an array of pixels in storage, you give it an open file stream and it reads the image from the file. The file must be positioned after the header, at the raster. Upon return, the file is still open, but its position is undefined. AUTHOR Copyright (C) 1989, 1991 by Tony Hansen and Jef Poskanzer. SEE ALSO pbm(1) , pgm(1) , libpbm(1)
__label__pos
0.952015
How to join with multiple files in emits? Hi there, I’ve three processes that perform variant calling. I’d like to use their output to generate a consensus variant list. At the moment, when I send the outputs to the consensus process files from different samples are sent, that is, for two of the variant callers file for sample A is sent, but for the third variant caller file for sample B is sent. How do I do a join/check to ensure files for the sample are sent in the consensus process? I run the variant callers as: mutect2( ch_input.tumor,ch_input.normal ) manta(ch_input.tumor,ch_input.normal ) lancet(ch_input.tumor,ch_input.normal ) I’ve output from three callers as follows: mutect2 output: tuple val(meta) , path("${meta.timepoint}.mutect2out.vcf"), emit: mutect_vcf tuple val(meta), path("${meta.timepoint}.mutect2out_filtered.vcf"), emit: mutect_vcf_filtered tuple val(meta), path("${meta.timepoint}.mutect2out_filtered.vcf.filteringStats.tsv"), emit: filtered_stats tuple val(meta), path("${meta.timepoint}.mutect2out.vcf.idx"), emit: mutect2_vcf_idx tuple val(meta), path("${meta.timepoint}.mutect2out.vcf.stats"), emit: mutect2_stats tuple val(meta), path("${meta.timepoint}.mutect2out_filtered.vcf.idx"), emit: filtered_vcf_idx I’ve lancet output as: output: tuple val(meta),path("${patient_id}.lancet.vcf" ), emit: lancet_file I’ve manta-strelka output as: output: tuple val(meta), path("manta/results/variants/candidateSmallIndels.vcf.gz"), emit: manta_small_indels_vcf tuple val(meta), path("manta/results/variants/candidateSmallIndels.vcf.gz.tbi"), emit: manta_small_indels_vcf_tbi tuple val(meta), path("manta/results/variants/candidateSV.vcf.gz"), emit: manta_candidateSV_vcf tuple val(meta), path("manta/results/variants/candidateSV.vcf.gz.tbi"), emit: manta_candidateSV_vcf_tbi tuple val(meta), path("manta/results/variants/diploidSV.vcf.gz"), emit: manta_diploidSV_vcf tuple val(meta), path("manta/results/variants/diploidSV.vcf.gz.tbi"), emit: manta_diploidSV_vcf_tbi tuple val(meta), path("manta/results/variants/somaticSV.vcf.gz"), emit: manta_somaticSV_vcf tuple val(meta), path("manta/results/variants/somaticSV.vcf.gz.tbi"), emit: manta_somaticSV_vcf_tbi tuple val(meta), path("manta/results/stats/alignmentStatsSummary.txt"), emit: manta_stats_align_stats_summary tuple val(meta), path("manta/results/stats/svCandidateGenerationStats.tsv") , emit: manta_stats_svCandidates_stats_tsv tuple val(meta), path("manta/results/stats/svCandidateGenerationStats.xml") , emit: manta_stats_svCandidates_stats_xml tuple val(meta) ,path("manta/results/stats/svLocusGraphStats.tsv"), emit: manta_stats_svLocus_graph_stats_tsv tuple val(meta), path("strelka/results/variants/somatic.indels.vcf.gz") , emit: strelka_somatic_indels_vcf tuple val(meta), path("strelka/results/variants/somatic.indels.vcf.gz.tbi") , emit:strelka_somatic_indels_vcf_tbi tuple val(meta), path("strelka/results/variants/somatic.snvs.vcf.gz") , emit: strelka_somatic_snvs_vcf tuple val(meta), path("strelka/results/variants/somatic.snvs.vcf.gz.tbi"), emit: strelka_somatics_snvs_vcf_tbi tuple val(meta), path("strelka/results/stats/runStats.tsv"), emit: strelka_stats_tsv tuple val(meta) , path("strelka/results/stats/runStats.xml"), emit: strelka_stats_xml The consensus step’s input at the moment is as the following: input: tuple val(meta) , path(strelka_somatic_indels_vcf,stageAs: 'consensus_variants/*' ) tuple val(meta) , path(strelka_somatic_snvs_vcf, stageAs: 'consensus_variants/*') tuple val(meta) , path(mutect_vcf_filtered, stageAs: 'consensus_variants/*' ) tuple val(meta), path(lancet_file, stageAs:'consensus_variants/*' ) What do I do what to ensure that files from lancet, mutect2 and manta are sent for the same sample? Thanks. You have the metas with sample information. Group the output channel elements based on that and then feed the consensus process with this new grouped channel :smile: How do I do that? Please share example. If you run the following code: tuple val(meta), val(my_value) output: tuple val(meta), path('DO_SOMETHING_output.txt') script: """ echo ${meta['some_field']} > DO_SOMETHING_output.txt """ } process DO_SOMETHING_ELSE { input: tuple val(meta), val(my_value) output: tuple val(meta), path('DO_SOMETHING_ELSE_output.txt') script: """ echo ${my_value} > DO_SOMETHING_ELSE_output.txt """ } process LAST_STEP { debug true maxForks 1 input: tuple val(meta1), path(output_f1) tuple val(meta2), path(output_f2) output: stdout script: """ echo ${meta1} ${meta2} sleep 5 """ } workflow { Channel .of([['meta': 'SAMPLE001', 'some_field': 5], ['something_here']], [['meta': 'SAMPLE002', 'some_field': 5], ['something_here']], [['meta': 'SAMPLE003', 'some_field': 102], ['something_here']]) .set { my_ch } DO_SOMETHING(my_ch) DO_SOMETHING_ELSE(my_ch) LAST_STEP(DO_SOMETHING.out, DO_SOMETHING_ELSE.out) } You should get an output similar to the one below: N E X T F L O W ~ version 23.10.1 Launching `main.nf` [focused_brattain] DSL2 - revision: 7c5056a178 executor > local (3) [ca/85734d] process > DO_SOMETHING (1) [100%] 3 of 3, cached: 3 ✔ [27/8bf65c] process > DO_SOMETHING_ELSE (3) [100%] 3 of 3, cached: 3 ✔ [7a/6d5666] process > LAST_STEP (2) [100%] 3 of 3 ✔ [meta:SAMPLE003, some_field:102] [meta:SAMPLE001, some_field:5] [meta:SAMPLE002, some_field:5] [meta:SAMPLE002, some_field:5] [meta:SAMPLE001, some_field:5] [meta:SAMPLE003, some_field:102] As you can see, we have elements from different samples getting together to a process instance (task) which is not what we want. Now see the modified code below: process DO_SOMETHING { input: tuple val(meta), val(my_value) output: tuple val(meta), path('DO_SOMETHING_output.txt') script: """ echo ${meta['some_field']} > DO_SOMETHING_output.txt """ } process DO_SOMETHING_ELSE { input: tuple val(meta), val(my_value) output: tuple val(meta), path('DO_SOMETHING_ELSE_output.txt') script: """ echo ${my_value} > DO_SOMETHING_ELSE_output.txt """ } process LAST_STEP { debug true maxForks 1 input: tuple val(meta), path(files) output: stdout script: """ echo ${meta} cat ${files[0]} cat ${files[1]} sleep 2 """ } workflow { Channel .of([['meta': 'SAMPLE001', 'some_field': 3], ['something_here 001']], [['meta': 'SAMPLE002', 'some_field': 5], ['something_here 002']], [['meta': 'SAMPLE003', 'some_field': 102], ['something_here 003']]) .set { my_ch } DO_SOMETHING(my_ch) DO_SOMETHING_ELSE(my_ch) DO_SOMETHING.out .mix(DO_SOMETHING_ELSE.out) .groupTuple() .set { my_new_ch } LAST_STEP(my_new_ch) } You will see the following output (a bit verbose, but at least you see the content of files and can confirm everything is OK): N E X T F L O W ~ version 23.10.1 Launching `main.nf` [extravagant_torvalds] DSL2 - revision: 7579411748 executor > local (5) [e4/93faa8] process > DO_SOMETHING (1) [100%] 3 of 3, cached: 2 ✔ [77/6abd1c] process > DO_SOMETHING_ELSE (1) [100%] 3 of 3, cached: 2 ✔ [ce/0597e4] process > LAST_STEP (2) [100%] 3 of 3 ✔ [meta:SAMPLE001, some_field:3] 3 [something_here 001] [meta:SAMPLE003, some_field:102] [something_here 003] 102 [meta:SAMPLE002, some_field:5] [something_here 002] 5 @mribeirodantas Thank you. When I try to run on my side, I get error as: Multi-channel output cannot be applied to operator mix for which argument is already provided Code I used is: mutect2.out .mix(manta.out) .groupTuple() .set { my_new_ch } I’ve multiple files from different processes. Multi-channel output is when a process or channel operator produces as output multiple channels. When you use another operator such as mix to combine this and another channel, Nextflow tells you to pick one channel from this multi-channel output. That’s what is missing for you to make it work. Instead of mutect2.out, use mutect2.out.mutect_vcf instead. I really think you can benefit a lot from having a look at the fundamentals training here. There’s even an online virtual machine through Gitpod for you to play with the content/exercises, without having to install/configure/run in your own machine :wink: @mribeirodantas Do I have to mix with each file separately? mutect2.out.mutect_vcf .mix(manta.out.file1) .mix(manta.out.file2) .mix(manta.out.file3) .groupTuple() .set { my_new_ch } Would this be a correct way? Thanks for sharing link. I’ve checked and gone through the training documents/links few times. Unfortunately, the data type, structure, challenges I’m running into aren’t covered. Thus, I reach out on this forum. You can pass all the other channels as arguments to a single mix call. See the example below :wink: Channel .of(1..10) .set { ch1 } Channel .of(11..20) .set { ch2 } Channel .of(21..30) .set { ch3 } ch1.mix(ch2, ch3).view() The output: Hey, @complexgenome. Did the solutions above solve the problem described in this post? @mribeirodantas Unfortunately, it didn’t help. I wrote the following code which works: mutect2.out.mutect_vcf_filtered.map { meta,filtered_vcf -> [ "${meta.timepoint}", meta,filtered_vcf ] } .join(lancet.out.lancet_file.map { meta, lancet_file -> [ "${meta.timepoint}", meta ,lancet_file ] }, failOnMismatch:true, failOnDuplicate:true) .join(manta.out.strelka_somatic_indels_vcf.map{meta, strelka_indels-> [ "${meta.timepoint}", meta,strelka_indels ] } , failOnMismatch:true, failOnDuplicate:true) .join(manta.out.strelka_somatic_snvs_vcf.map{meta, strelka_snvs->["${meta.timepoint}", meta,strelka_snvs] }, failOnMismatch:true, failOnDuplicate:true) .multiMap { pid, meta1, filtered_vcf, meta2, lancet_file , meta3, strelka_indels,meta4, strelka_snvs-> mutect2_vcf: [ meta1, filtered_vcf ] lancet_vcf: [ meta2, lancet_file ] strelka_indels_vcf:[meta3,strelka_indels] strelka_snvs_vcf:[meta3,strelka_snvs] }.set { ch_joined_callers } If you could help what’s multiMap doing with pid and where does pid come from that would be helpful. I got some help from the nextflow slack channel. Sadly, the nextflow documentation doesn’t help due to the complex nature of the pipeline I’ve. https://www.nextflow.io/docs/latest/operator.html#multimap Thanks for sharing the updates. Based on what I know about join, I would expect pid to be the key through which the operator joined the channel elements. Check the example below, from the docs: left = Channel.of(['X', 1], ['Y', 2], ['Z', 3], ['P', 7]) right = Channel.of(['Z', 6], ['Y', 5], ['X', 4]) left.join(right).view() Output [Z, 3, 6] [Y, 2, 5] [X, 1, 4] In the example you shared, what’s the key mentioned? Is there a default parameter? Thank you for your reply. By default, the first item is the key. In the example above, Z, Y and X. From here. Great, thank you. 1 Like This topic was automatically closed 7 days after the last reply. New replies are no longer allowed.
__label__pos
0.974525
PageRenderTime 67ms CodeModel.GetById 28ms RepoModel.GetById 1ms app.codeStats 0ms /public/javascripts/jquery-tinysort-min.js https://bitbucket.org/openfisma-ondemand/openfisma JavaScript | 300 lines | 210 code | 10 blank | 80 comment | 39 complexity | 32179992e63d11eab820a75d3f1c94a1 MD5 | raw file Possible License(s): MPL-2.0-no-copyleft-exception, LGPL-2.1, GPL-3.0, Apache-2.0, EPL-1.0 1. /* 2. * jQuery TinySort 1.3.27 3. * A plugin to sort child nodes by (sub) contents or attributes. 4. * 5. * Copyright (c) 2008-2012 Ron Valstar http://www.sjeiti.com/ 6. * 7. * Dual licensed under the MIT and GPL licenses: 8. * http://www.opensource.org/licenses/mit-license.php 9. * http://www.gnu.org/licenses/gpl.html 10. * 11. * contributors: 12. * [email protected] 13. * [email protected] 14. * 15. * Usage: 16. * $("ul#people>li").tsort(); 17. * $("ul#people>li").tsort("span.surname"); 18. * $("ul#people>li").tsort("span.surname",{order:"desc"}); 19. * $("ul#people>li").tsort({place:"end"}); 20. * 21. * Change default like so: 22. * $.tinysort.defaults.order = "desc"; 23. * 24. * in this update: 25. * - replaced pushStack with actual replace so initial jQ object is reordered (not only the returned object) 26. * - fixed non-latin character ordering 27. * 28. * in last update: 29. * - removed isNum 30. * - fixed mixed literal/numeral values 31. * - refactored fn contains() 32. * - revision number now corresponds to svn revision 33. * 34. * Todos: 35. * - todo: uppercase vs lowercase 36. * - todo: 'foobar' != 'foobars' in non-latin 37. * 38. */ 39. ;(function($) { 40. // private vars 41. var fls = !1 // minify placeholder 42. ,nll = null // minify placeholder 43. ,prsflt = parseFloat // minify placeholder 44. ,frCrCd = String.fromCharCode // minify placeholder 45. ,mathmn = Math.min // minify placeholder 46. ,rxLastNr = /(-?\d+\.?\d*)$/g // regex for testing strings ending on numbers 47. // 48. // character specific ordering is off by default for speed 49. ,sCharOrder // equals the input oSettings.charOrder so we can test any changes 50. ,aAllChars = [] // all latin chars 32-255 51. ,aOrderChar // similar to sAllChars but with the changed char order 52. ,bDoubles // boolean indicating double-non-latin chars, ie: lj, dž, Aa, ch, ss etc... 53. ,iReplace = 0x2500 // doubles are replaced with Unicode char starting at 0x2500 54. ,oReplace = {} // replacement object 55. ,rxNotLatin // regular expression to test for non-latin chars 56. ; 57. // create basic latin string chars 32-255 58. for (var i=32,s=frCrCd(i),len=255;i<len;i++,s=frCrCd(i).toLowerCase()) { // using lowerCase instead of upperCase so _ will sort before 59. if ($.inArray(s, aAllChars) < 0) { 60. aAllChars.push(s); 61. } 62. } 63. aAllChars.sort(); 64. // 65. // init plugin 66. $.tinysort = { 67. id: 'TinySort' 68. ,version: '1.3.27' 69. ,copyright: 'Copyright (c) 2008-2012 Ron Valstar' 70. ,uri: 'http://tinysort.sjeiti.com/' 71. ,licenced: { 72. MIT: 'http://www.opensource.org/licenses/mit-license.php' 73. ,GPL: 'http://www.gnu.org/licenses/gpl.html' 74. } 75. ,defaults: { // default settings 76. order: 'asc' // order: asc, desc or rand 77. ,attr: nll // order by attribute value 78. ,data: nll // use the data attribute for sorting 79. ,useVal: fls // use element value instead of text 80. ,place: 'start' // place ordered elements at position: start, end, org (original position), first 81. ,returns: fls // return all elements or only the sorted ones (true/false) 82. ,cases: fls // a case sensitive sort orders [aB,aa,ab,bb] 83. ,forceStrings:fls // if false the string '2' will sort with the value 2, not the string '2' 84. ,sortFunction: nll // override the default sort function 85. ,charOrder: sCharOrder // the order of non-latin characters 86. } 87. }; 88. $.fn.extend({ 89. tinysort: function(_find,_settings) { 90. if (_find&&typeof(_find)!='string') { 91. _settings = _find; 92. _find = nll; 93. } 94. var oSettings = $.extend({}, $.tinysort.defaults, _settings) 95. ,sParent 96. ,oThis = this 97. ,iLen = $(this).length 98. ,oElements = {} // contains sortable- and non-sortable list per parent 99. ,bFind = !(!_find||_find=='') 100. ,bAttr = !(oSettings.attr===nll||oSettings.attr=="") 101. ,bData = oSettings.data!==nll 102. // since jQuery's filter within each works on array index and not actual index we have to create the filter in advance 103. ,bFilter = bFind&&_find[0]==':' 104. ,$Filter = bFilter?oThis.filter(_find):oThis 105. ,fnSort = oSettings.sortFunction 106. ,iAsc = oSettings.order=='asc'?1:-1 107. ,aNewOrder = []; 108. // check charOrder (non latin chars) 109. // sCharOrder only to check wether other vars are set 110. // variables used on sort 111. // - oSettings.charOrder to test 112. // - bDoubles to test 113. // - oReplace for doubles 114. // - rxNotLatin to test 115. // - aOrderChar to order 116. // 117. if (oSettings.charOrder!=sCharOrder) { 118. sCharOrder = oSettings.charOrder; 119. if (!oSettings.charOrder) { 120. bDoubles = false; 121. iReplace = 0x2500; 122. oReplace = {}; 123. rxNotLatin = aOrderChar = nll; 124. } else { 125. aOrderChar = aAllChars.slice(0); // first set to entire 32-255 charlist 126. bDoubles = false; 127. // then loop through the sCharOrder rule 128. for (var 129. aCharNotLatin = [] 130. ,fnAddNonLatinChar = function(key,nonLatin){ 131. aCharNotLatin.push(nonLatin); 132. oReplace[oSettings.cases?key:key.toLowerCase()] = nonLatin; 133. } 134. ,sAllCharNotLatin = '' 135. ,sCharLatin = 'z' // if oSettings.charOrder has no [a-z] characters are appended to z 136. ,l = sCharOrder.length 137. ,j,m // init 138. ,i=0;i<l;i++) { // loop through chars to set 'rxNotLatin' and 'sOrderChar' 139. var sChar = sCharOrder[i] 140. ,iChar = sChar.charCodeAt() 141. ,bIsLatin = iChar>96&&iChar<123; // 'a'.charCodeAt()===97 'z'.charCodeAt()===122 142. if (!bIsLatin){ 143. if (sChar=='[') { // find replace chars: ë will sort similar to e 144. var iCharNotLatin = aCharNotLatin.length 145. ,sLastChar = iCharNotLatin?aCharNotLatin[iCharNotLatin-1]:sCharLatin 146. ,sReplaces = sCharOrder.substr(i+1).match(/[^\]]*/)[0] 147. ,aDoubles = sReplaces.match(/{[^}]*}/g); // find doubles: dž, ss, lj ... 148. if (aDoubles) { 149. for (j=0,m=aDoubles.length;j<m;j++) { 150. var sCode = aDoubles[j]; 151. i += sCode.length; // increment i because of .replace(... 152. sReplaces = sReplaces.replace(sCode,''); 153. fnAddNonLatinChar(sCode.replace(/[{}]/g,''),sLastChar); 154. bDoubles = true; 155. } 156. } 157. for (j=0,m=sReplaces.length;j<m;j++) fnAddNonLatinChar(sLastChar,sReplaces[j]); 158. i += sReplaces.length+1; 159. } else if (sChar=='{') { // find doubles: dž, ss, lj ... 160. var sDouble = sCharOrder.substr(i+1).match(/[^}]*/)[0]; 161. fnAddNonLatinChar(sDouble,frCrCd(iReplace++)); // replace the double with single Unicode 0x2500+ 162. i += sDouble.length+1; 163. bDoubles = true; 164. } else { 165. aCharNotLatin.push(sChar); 166. } 167. } 168. if (aCharNotLatin.length&&(bIsLatin||i===l-1)) { 169. var sCharNotLatin = aCharNotLatin.join(''); 170. sAllCharNotLatin += sCharNotLatin; 171. // first remove non latin chars 172. $.each(sCharNotLatin,function(j,s){ 173. aOrderChar.splice(aOrderChar.indexOf(s),1); 174. }); 175. // then append chars to latin char 176. var aParse = aCharNotLatin.slice(0); 177. aParse.splice(0,0,aOrderChar.indexOf(sCharLatin)+1,0); 178. Array.prototype.splice.apply(aOrderChar,aParse); 179. // 180. aCharNotLatin.length = 0; 181. } 182. if (i+1===l) rxNotLatin = new RegExp('['+sAllCharNotLatin+']','gi'); // make regex to test for chars 183. else if (bIsLatin) sCharLatin = sChar; 184. } 185. } 186. } 187. if (!fnSort) fnSort = oSettings.order=='rand'?function() { 188. return Math.random()<.5?1:-1; 189. }:function(a,b) { 190. var bNumeric = fls 191. // maybe toLower 192. ,sA = !oSettings.cases?toLowerCase(a.s):a.s 193. ,sB = !oSettings.cases?toLowerCase(b.s):b.s; 194. // maybe force Strings 195. // var bAString = typeof(sA)=='string'; 196. // var bBString = typeof(sB)=='string'; 197. // if (!oSettings.forceStrings&&(bAString||bBString)) { 198. // if (!bAString) sA = ''+sA; 199. // if (!bBString) sB = ''+sB; 200. if (!oSettings.forceStrings) { 201. // maybe mixed 202. var aAnum = sA&&sA.match(rxLastNr) 203. ,aBnum = sB&&sB.match(rxLastNr); 204. if (aAnum&&aBnum) { 205. var sAprv = sA.substr(0,sA.length-aAnum[0].length) 206. ,sBprv = sB.substr(0,sB.length-aBnum[0].length); 207. if (sAprv==sBprv) { 208. bNumeric = !fls; 209. sA = prsflt(aAnum[0]); 210. sB = prsflt(aBnum[0]); 211. } 212. } 213. } 214. // return sort-integer 215. var iReturn = iAsc*(sA<sB?-1:(sA>sB?1:0)); 216. // test for non latin chars 217. if (!bNumeric&&oSettings.charOrder) { 218. if (bDoubles) { // first replace doubles 219. for (var s in oReplace) { 220. var o = oReplace[s]; 221. sA = sA.replace(s,o); 222. sB = sB.replace(s,o); 223. } 224. } 225. // then test if either word has non latin chars 226. // we're using the slower string.match because strangely regex.test sometimes fails 227. if (sA.match(rxNotLatin)!==nll||sB.match(rxNotLatin)!==nll) { 228. for (var k=0,l=mathmn(sA.length,sB.length);k<l;k++) { 229. var iAchr = aOrderChar.indexOf(sA[k]) 230. ,iBchr = aOrderChar.indexOf(sB[k]); 231. if (iReturn=iAsc*(iAchr<iBchr?-1:(iAchr>iBchr?1:0))) break; 232. } 233. } 234. } 235. return iReturn; 236. }; 237. oThis.each(function(i,el) { 238. var $Elm = $(el) 239. // element or sub selection 240. ,mElmOrSub = bFind?(bFilter?$Filter.filter(el):$Elm.find(_find)):$Elm 241. // text or attribute value 242. ,sSort = bData?''+mElmOrSub.data(oSettings.data):(bAttr?mElmOrSub.attr(oSettings.attr):(oSettings.useVal?mElmOrSub.val():mElmOrSub.text())) 243. // to sort or not to sort 244. ,mParent = $Elm.parent(); 245. if (!oElements[mParent]) oElements[mParent] = {s:[],n:[]}; // s: sort, n: not sort 246. if (mElmOrSub.length>0) oElements[mParent].s.push({s:sSort,e:$Elm,n:i}); // s:string, e:element, n:number 247. else oElements[mParent].n.push({e:$Elm,n:i}); 248. }); 249. // 250. // sort 251. for (sParent in oElements) oElements[sParent].s.sort(fnSort); 252. // 253. // order elements and fill new order 254. for (sParent in oElements) { 255. var oParent = oElements[sParent] 256. ,aOrg = [] // list for original position 257. ,iLow = iLen 258. ,aCnt = [0,0] // count how much we've sorted for retreival from either the sort list or the non-sort list (oParent.s/oParent.n) 259. ,i; 260. switch (oSettings.place) { 261. case 'first': $.each(oParent.s,function(i,obj) { iLow = mathmn(iLow,obj.n) }); break; 262. case 'org': $.each(oParent.s,function(i,obj) { aOrg.push(obj.n) }); break; 263. case 'end': iLow = oParent.n.length; break; 264. default: iLow = 0; 265. } 266. for (i = 0;i<iLen;i++) { 267. var bSList = contains(aOrg,i)?!fls:i>=iLow&&i<iLow+oParent.s.length 268. ,mEl = (bSList?oParent.s:oParent.n)[aCnt[bSList?0:1]].e; 269. mEl.parent().append(mEl); 270. if (bSList||!oSettings.returns) aNewOrder.push(mEl.get(0)); 271. aCnt[bSList?0:1]++; 272. } 273. } 274. oThis.length = 0; 275. Array.prototype.push.apply(oThis,aNewOrder); 276. return oThis; 277. } 278. }); 279. // toLowerCase 280. function toLowerCase(s) { 281. return s&&s.toLowerCase?s.toLowerCase():s; 282. } 283. // array contains 284. function contains(a,n) { 285. for (var i=0,l=a.length;i<l;i++) if (a[i]==n) return !fls; 286. return fls; 287. } 288. // set functions 289. $.fn.TinySort = $.fn.Tinysort = $.fn.tsort = $.fn.tinysort; 290. })(jQuery);
__label__pos
0.992087
Click here to Skip to main content Click here to Skip to main content Articles » Web Development » ASP.NET » Howto » Downloads   Know your application better with visual studio 2010 load testing By , 9 Aug 2012 TestingBox-noexe.zip TestingBox Local.testsettings TestingBox.suo TestingBox.vsmdi TestingBox bin Debug LoadTest ldt-prod-scenario1.loadtest TestingBox.pdb WebTest wbt-prod-scenario1.webtest Release LoadTest ldt-prod-scenario1.loadtest obj Debug DesignTimeResolveAssemblyReferencesInput.cache ResolveAssemblyReference.cache TempPE TestingBox.pdb Properties WebTest wbt-prod-scenario1.83b11aaf-d8fb-4dcc-a250-51648ba6099a.rec.webtestresult wbt-prod-scenario1.c094fbc9-ccc6-4563-aed4-a2653c0e411a.rec.webtestresult wbt-prod-scenario1.webtest TestingBox-Demo Account App_Data bin TestingBox-Demo.pdb Global.asax obj Debug DesignTimeResolveAssemblyReferencesInput.cache TempPE TestingBox-Demo.pdb Properties Scripts Styles TestingBox-Demo.csproj.user TestResults destop_IMGALIB 2012-07-03 13_40_04.trx destop_IMGALIB 2012-07-03 13_40_04 In bfedabc0-9281-4fe8-bc07-8d6498edf8a6 wbt-prod-scenario1.webtestResult Out wbt-prod-scenario1.webtest destop_IMGALIB 2012-07-03 13_44_35.trx destop_IMGALIB 2012-07-03 13_44_35 In 52ab4b7a-df86-407e-84d8-91fdaea1c93c wbt-prod-scenario1.webtestResult Out wbt-prod-scenario1.webtest TraceAndTestImpact.testsettings TestingBox.zip Local.testsettings TestingBox.suo TestingBox.vsmdi ldt-prod-scenario1.loadtest TestingBox.dll TestingBox.pdb wbt-prod-scenario1.webtest ldt-prod-scenario1.loadtest DesignTimeResolveAssemblyReferencesInput.cache ResolveAssemblyReference.cache TestingBox.dll TestingBox.pdb wbt-prod-scenario1.83b11aaf-d8fb-4dcc-a250-51648ba6099a.rec.webtestresult wbt-prod-scenario1.c094fbc9-ccc6-4563-aed4-a2653c0e411a.rec.webtestresult wbt-prod-scenario1.webtest TestingBox-Demo.dll TestingBox-Demo.pdb Global.asax DesignTimeResolveAssemblyReferencesInput.cache TestingBox-Demo.dll TestingBox-Demo.pdb TestingBox-Demo.csproj.user destop_IMGALIB 2012-07-03 13_40_04.trx wbt-prod-scenario1.webtestResult wbt-prod-scenario1.webtest destop_IMGALIB 2012-07-03 13_44_35.trx wbt-prod-scenario1.webtestResult wbt-prod-scenario1.webtest TraceAndTestImpact.testsettings /* * This file has been commented to support Visual Studio Intellisense. * You should not use this file at runtime inside the browser--it is only * intended to be used only for design-time IntelliSense. Please use the * standard jQuery library for all production use. * * Comment version: 1.4.1a */ /*! * jQuery JavaScript Library v1.4.1 * http://jquery.com/ * * Distributed in whole under the terms of the MIT * * Copyright 2010, John Resig * * Permission is hereby granted, free of charge, to any person obtaining * a copy of this software and associated documentation files (the * "Software"), to deal in the Software without restriction, including * without limitation the rights to use, copy, modify, merge, publish, * distribute, sublicense, and/or sell copies of the Software, and to * permit persons to whom the Software is furnished to do so, subject to * the following conditions: * * The above copyright notice and this permission notice shall be * included in all copies or substantial portions of the Software. * * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, * EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND * NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE * LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION * OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION * WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. * * Includes Sizzle.js * http://sizzlejs.com/ * Copyright 2010, The Dojo Foundation * Released under the MIT, BSD, and GPL Licenses. * * Date: Mon Jan 25 19:43:33 2010 -0500 */ (function( window, undefined ) { // Define a local copy of jQuery var jQuery = function( selector, context ) { /// <summary> /// 1: $(expression, context) - This function accepts a string containing a CSS selector which is then used to match a set of elements. /// 2: $(html) - Create DOM elements on-the-fly from the provided String of raw HTML. /// 3: $(elements) - Wrap jQuery functionality around a single or multiple DOM Element(s). /// 4: $(callback) - A shorthand for $(document).ready(). /// 5: $() - As of jQuery 1.4, if you pass no arguments in to the jQuery() method, an empty jQuery set will be returned. /// </summary> /// <param name="selector" type="String"> /// 1: expression - An expression to search with. /// 2: html - A string of HTML to create on the fly. /// 3: elements - DOM element(s) to be encapsulated by a jQuery object. /// 4: callback - The function to execute when the DOM is ready. /// </param> /// <param name="context" type="jQuery"> /// 1: context - A DOM Element, Document or jQuery to use as context. /// </param> /// <returns type="jQuery" /> // The jQuery object is actually just the init constructor 'enhanced' return new jQuery.fn.init( selector, context ); }, // Map over jQuery in case of overwrite _jQuery = window.jQuery, // Map over the $ in case of overwrite _$ = window.$, // Use the correct document accordingly with window argument (sandbox) document = window.document, // A central reference to the root jQuery(document) rootjQuery, // A simple way to check for HTML strings or ID strings // (both of which we optimize for) quickExpr = /^[^<]*(<[\w\W]+>)[^>]*$|^#([\w-]+)$/, // Is it a simple selector isSimple = /^.[^:#\[\.,]*$/, // Check if a string has a non-whitespace character in it rnotwhite = /\S/, // Used for trimming whitespace rtrim = /^(\s|\u00A0)+|(\s|\u00A0)+$/g, // Match a standalone tag rsingleTag = /^<(\w+)\s*\/?>(?:<\/\1>)?$/, // Keep a UserAgent string for use with jQuery.browser userAgent = navigator.userAgent, // For matching the engine and version of the browser browserMatch, // Has the ready events already been bound? readyBound = false, // The functions to execute on DOM ready readyList = [], // The ready event handler DOMContentLoaded, // Save a reference to some core methods toString = Object.prototype.toString, hasOwnProperty = Object.prototype.hasOwnProperty, push = Array.prototype.push, slice = Array.prototype.slice, indexOf = Array.prototype.indexOf; jQuery.fn = jQuery.prototype = { init: function( selector, context ) { var match, elem, ret, doc; // Handle $(""), $(null), or $(undefined) if ( !selector ) { return this; } // Handle $(DOMElement) if ( selector.nodeType ) { this.context = this[0] = selector; this.length = 1; return this; } // Handle HTML strings if ( typeof selector === "string" ) { // Are we dealing with HTML string or an ID? match = quickExpr.exec( selector ); // Verify a match, and that no context was specified for #id if ( match && (match[1] || !context) ) { // HANDLE: $(html) -> $(array) if ( match[1] ) { doc = (context ? context.ownerDocument || context : document); // If a single string is passed in and it's a single tag // just do a createElement and skip the rest ret = rsingleTag.exec( selector ); if ( ret ) { if ( jQuery.isPlainObject( context ) ) { selector = [ document.createElement( ret[1] ) ]; jQuery.fn.attr.call( selector, context, true ); } else { selector = [ doc.createElement( ret[1] ) ]; } } else { ret = buildFragment( [ match[1] ], [ doc ] ); selector = (ret.cacheable ? ret.fragment.cloneNode(true) : ret.fragment).childNodes; } // HANDLE: $("#id") } else { elem = document.getElementById( match[2] ); if ( elem ) { // Handle the case where IE and Opera return items // by name instead of ID if ( elem.id !== match[2] ) { return rootjQuery.find( selector ); } // Otherwise, we inject the element directly into the jQuery object this.length = 1; this[0] = elem; } this.context = document; this.selector = selector; return this; } // HANDLE: $("TAG") } else if ( !context && /^\w+$/.test( selector ) ) { this.selector = selector; this.context = document; selector = document.getElementsByTagName( selector ); // HANDLE: $(expr, $(...)) } else if ( !context || context.jquery ) { return (context || rootjQuery).find( selector ); // HANDLE: $(expr, context) // (which is just equivalent to: $(context).find(expr) } else { return jQuery( context ).find( selector ); } // HANDLE: $(function) // Shortcut for document ready } else if ( jQuery.isFunction( selector ) ) { return rootjQuery.ready( selector ); } if (selector.selector !== undefined) { this.selector = selector.selector; this.context = selector.context; } return jQuery.isArray( selector ) ? this.setArray( selector ) : jQuery.makeArray( selector, this ); }, // Start with an empty selector selector: "", // The current version of jQuery being used jquery: "1.4.1", // The default length of a jQuery object is 0 length: 0, // The number of elements contained in the matched element set size: function() { /// <summary> /// The number of elements currently matched. /// Part of Core /// </summary> /// <returns type="Number" /> return this.length; }, toArray: function() { /// <summary> /// Retrieve all the DOM elements contained in the jQuery set, as an array. /// </summary> /// <returns type="Array" /> return slice.call( this, 0 ); }, // Get the Nth element in the matched element set OR // Get the whole matched element set as a clean array get: function( num ) { /// <summary> /// Access a single matched element. num is used to access the /// Nth element matched. /// Part of Core /// </summary> /// <returns type="Element" /> /// <param name="num" type="Number"> /// Access the element in the Nth position. /// </param> return num == null ? // Return a 'clean' array this.toArray() : // Return just the object ( num < 0 ? this.slice(num)[ 0 ] : this[ num ] ); }, // Take an array of elements and push it onto the stack // (returning the new matched element set) pushStack: function( elems, name, selector ) { /// <summary> /// Set the jQuery object to an array of elements, while maintaining /// the stack. /// Part of Core /// </summary> /// <returns type="jQuery" /> /// <param name="elems" type="Elements"> /// An array of elements /// </param> // Build a new jQuery matched element set var ret = jQuery( elems || null ); // Add the old object onto the stack (as a reference) ret.prevObject = this; ret.context = this.context; if ( name === "find" ) { ret.selector = this.selector + (this.selector ? " " : "") + selector; } else if ( name ) { ret.selector = this.selector + "." + name + "(" + selector + ")"; } // Return the newly-formed element set return ret; }, // Force the current matched set of elements to become // the specified array of elements (destroying the stack in the process) // You should use pushStack() in order to do this, but maintain the stack setArray: function( elems ) { /// <summary> /// Set the jQuery object to an array of elements. This operation is /// completely destructive - be sure to use .pushStack() if you wish to maintain /// the jQuery stack. /// Part of Core /// </summary> /// <returns type="jQuery" /> /// <param name="elems" type="Elements"> /// An array of elements /// </param> // Resetting the length to 0, then using the native Array push // is a super-fast way to populate an object with array-like properties this.length = 0; push.apply( this, elems ); return this; }, // Execute a callback for every element in the matched set. // (You can seed the arguments with an array of args, but this is // only used internally.) each: function( callback, args ) { /// <summary> /// Execute a function within the context of every matched element. /// This means that every time the passed-in function is executed /// (which is once for every element matched) the 'this' keyword /// points to the specific element. /// Additionally, the function, when executed, is passed a single /// argument representing the position of the element in the matched /// set. /// Part of Core /// </summary> /// <returns type="jQuery" /> /// <param name="callback" type="Function"> /// A function to execute /// </param> return jQuery.each( this, callback, args ); }, ready: function( fn ) { /// <summary> /// Binds a function to be executed whenever the DOM is ready to be traversed and manipulated. /// </summary> /// <param name="fn" type="Function">The function to be executed when the DOM is ready.</param> // Attach the listeners jQuery.bindReady(); // If the DOM is already ready if ( jQuery.isReady ) { // Execute the function immediately fn.call( document, jQuery ); // Otherwise, remember the function for later } else if ( readyList ) { // Add the function to the wait list readyList.push( fn ); } return this; }, eq: function( i ) { /// <summary> /// Reduce the set of matched elements to a single element. /// The position of the element in the set of matched elements /// starts at 0 and goes to length - 1. /// Part of Core /// </summary> /// <returns type="jQuery" /> /// <param name="num" type="Number"> /// pos The index of the element that you wish to limit to. /// </param> return i === -1 ? this.slice( i ) : this.slice( i, +i + 1 ); }, first: function() { /// <summary> /// Reduce the set of matched elements to the first in the set. /// </summary> /// <returns type="jQuery" /> return this.eq( 0 ); }, last: function() { /// <summary> /// Reduce the set of matched elements to the final one in the set. /// </summary> /// <returns type="jQuery" /> return this.eq( -1 ); }, slice: function() { /// <summary> /// Selects a subset of the matched elements. Behaves exactly like the built-in Array slice method. /// </summary> /// <param name="start" type="Number" integer="true">Where to start the subset (0-based).</param> /// <param name="end" optional="true" type="Number" integer="true">Where to end the subset (not including the end element itself). /// If omitted, ends at the end of the selection</param> /// <returns type="jQuery">The sliced elements</returns> return this.pushStack( slice.apply( this, arguments ), "slice", slice.call(arguments).join(",") ); }, map: function( callback ) { /// <summary> /// This member is internal. /// </summary> /// <private /> /// <returns type="jQuery" /> return this.pushStack( jQuery.map(this, function( elem, i ) { return callback.call( elem, i, elem ); })); }, end: function() { /// <summary> /// End the most recent 'destructive' operation, reverting the list of matched elements /// back to its previous state. After an end operation, the list of matched elements will /// revert to the last state of matched elements. /// If there was no destructive operation before, an empty set is returned. /// Part of DOM/Traversing /// </summary> /// <returns type="jQuery" /> return this.prevObject || jQuery(null); }, // For internal use only. // Behaves like an Array's method, not like a jQuery method. push: push, sort: [].sort, splice: [].splice }; // Give the init function the jQuery prototype for later instantiation jQuery.fn.init.prototype = jQuery.fn; jQuery.extend = jQuery.fn.extend = function() { /// <summary> /// Extend one object with one or more others, returning the original, /// modified, object. This is a great utility for simple inheritance. /// jQuery.extend(settings, options); /// var settings = jQuery.extend({}, defaults, options); /// Part of JavaScript /// </summary> /// <param name="target" type="Object"> /// The object to extend /// </param> /// <param name="prop1" type="Object"> /// The object that will be merged into the first. /// </param> /// <param name="propN" type="Object" optional="true" parameterArray="true"> /// (optional) More objects to merge into the first /// </param> /// <returns type="Object" /> // copy reference to target object var target = arguments[0] || {}, i = 1, length = arguments.length, deep = false, options, name, src, copy; // Handle a deep copy situation if ( typeof target === "boolean" ) { deep = target; target = arguments[1] || {}; // skip the boolean and the target i = 2; } // Handle case when target is a string or something (possible in deep copy) if ( typeof target !== "object" && !jQuery.isFunction(target) ) { target = {}; } // extend jQuery itself if only one argument is passed if ( length === i ) { target = this; --i; } for ( ; i < length; i++ ) { // Only deal with non-null/undefined values if ( (options = arguments[ i ]) != null ) { // Extend the base object for ( name in options ) { src = target[ name ]; copy = options[ name ]; // Prevent never-ending loop if ( target === copy ) { continue; } // Recurse if we're merging object literal values or arrays if ( deep && copy && ( jQuery.isPlainObject(copy) || jQuery.isArray(copy) ) ) { var clone = src && ( jQuery.isPlainObject(src) || jQuery.isArray(src) ) ? src : jQuery.isArray(copy) ? [] : {}; // Never move original objects, clone them target[ name ] = jQuery.extend( deep, clone, copy ); // Don't bring in undefined values } else if ( copy !== undefined ) { target[ name ] = copy; } } } } // Return the modified object return target; }; jQuery.extend({ noConflict: function( deep ) { /// <summary> /// Run this function to give control of the $ variable back /// to whichever library first implemented it. This helps to make /// sure that jQuery doesn't conflict with the $ object /// of other libraries. /// By using this function, you will only be able to access jQuery /// using the 'jQuery' variable. For example, where you used to do /// $(&quot;div p&quot;), you now must do jQuery(&quot;div p&quot;). /// Part of Core /// </summary> /// <returns type="undefined" /> window.$ = _$; if ( deep ) { window.jQuery = _jQuery; } return jQuery; }, // Is the DOM ready to be used? Set to true once it occurs. isReady: false, // Handle when the DOM is ready ready: function() { /// <summary> /// This method is internal. /// </summary> /// <private /> // Make sure that the DOM is not already loaded if ( !jQuery.isReady ) { // Make sure body exists, at least, in case IE gets a little overzealous (ticket #5443). if ( !document.body ) { return setTimeout( jQuery.ready, 13 ); } // Remember that the DOM is ready jQuery.isReady = true; // If there are functions bound, to execute if ( readyList ) { // Execute all of them var fn, i = 0; while ( (fn = readyList[ i++ ]) ) { fn.call( document, jQuery ); } // Reset the list of functions readyList = null; } // Trigger any bound ready events if ( jQuery.fn.triggerHandler ) { jQuery( document ).triggerHandler( "ready" ); } } }, bindReady: function() { if ( readyBound ) { return; } readyBound = true; // Catch cases where $(document).ready() is called after the // browser event has already occurred. if ( document.readyState === "complete" ) { return jQuery.ready(); } // Mozilla, Opera and webkit nightlies currently support this event if ( document.addEventListener ) { // Use the handy event callback document.addEventListener( "DOMContentLoaded", DOMContentLoaded, false ); // A fallback to window.onload, that will always work window.addEventListener( "load", jQuery.ready, false ); // If IE event model is used } else if ( document.attachEvent ) { // ensure firing before onload, // maybe late but safe also for iframes document.attachEvent("onreadystatechange", DOMContentLoaded); // A fallback to window.onload, that will always work window.attachEvent( "onload", jQuery.ready ); // If IE and not a frame // continually check to see if the document is ready var toplevel = false; try { toplevel = window.frameElement == null; } catch(e) {} if ( document.documentElement.doScroll && toplevel ) { doScrollCheck(); } } }, // See test/unit/core.js for details concerning isFunction. // Since version 1.3, DOM methods and functions like alert // aren't supported. They return false on IE (#2968). isFunction: function( obj ) { /// <summary> /// Determines if the parameter passed is a function. /// </summary> /// <param name="obj" type="Object">The object to check</param> /// <returns type="Boolean">True if the parameter is a function; otherwise false.</returns> return toString.call(obj) === "[object Function]"; }, isArray: function( obj ) { /// <summary> /// Determine if the parameter passed is an array. /// </summary> /// <param name="obj" type="Object">Object to test whether or not it is an array.</param> /// <returns type="Boolean">True if the parameter is a function; otherwise false.</returns> return toString.call(obj) === "[object Array]"; }, isPlainObject: function( obj ) { /// <summary> /// Check to see if an object is a plain object (created using "{}" or "new Object"). /// </summary> /// <param name="obj" type="Object"> /// The object that will be checked to see if it's a plain object. /// </param> /// <returns type="Boolean" /> // Must be an Object. // Because of IE, we also have to check the presence of the constructor property. // Make sure that DOM nodes and window objects don't pass through, as well if ( !obj || toString.call(obj) !== "[object Object]" || obj.nodeType || obj.setInterval ) { return false; } // Not own constructor property must be Object if ( obj.constructor && !hasOwnProperty.call(obj, "constructor") && !hasOwnProperty.call(obj.constructor.prototype, "isPrototypeOf") ) { return false; } // Own properties are enumerated firstly, so to speed up, // if last one is own, then all properties are own. var key; for ( key in obj ) {} return key === undefined || hasOwnProperty.call( obj, key ); }, isEmptyObject: function( obj ) { /// <summary> /// Check to see if an object is empty (contains no properties). /// </summary> /// <param name="obj" type="Object"> /// The object that will be checked to see if it's empty. /// </param> /// <returns type="Boolean" /> for ( var name in obj ) { return false; } return true; }, error: function( msg ) { throw msg; }, parseJSON: function( data ) { if ( typeof data !== "string" || !data ) { return null; } // Make sure the incoming data is actual JSON // Logic borrowed from http://json.org/json2.js if ( /^[\],:{}\s]*$/.test(data.replace(/\\(?:["\\\/bfnrt]|u[0-9a-fA-F]{4})/g, "@") .replace(/"[^"\\\n\r]*"|true|false|null|-?\d+(?:\.\d*)?(?:[eE][+\-]?\d+)?/g, "]") .replace(/(?:^|:|,)(?:\s*\[)+/g, "")) ) { // Try to use the native JSON parser first return window.JSON && window.JSON.parse ? window.JSON.parse( data ) : (new Function("return " + data))(); } else { jQuery.error( "Invalid JSON: " + data ); } }, noop: function() { /// <summary> /// An empty function. /// </summary> /// <returns type="Function" /> }, // Evalulates a script in a global context globalEval: function( data ) { /// <summary> /// Internally evaluates a script in a global context. /// </summary> /// <private /> if ( data && rnotwhite.test(data) ) { // Inspired by code by Andrea Giammarchi // http://webreflection.blogspot.com/2007/08/global-scope-evaluation-and-dom.html var head = document.getElementsByTagName("head")[0] || document.documentElement, script = document.createElement("script"); script.type = "text/javascript"; if ( jQuery.support.scriptEval ) { script.appendChild( document.createTextNode( data ) ); } else { script.text = data; } // Use insertBefore instead of appendChild to circumvent an IE6 bug. // This arises when a base node is used (#2709). head.insertBefore( script, head.firstChild ); head.removeChild( script ); } }, nodeName: function( elem, name ) { /// <summary> /// Checks whether the specified element has the specified DOM node name. /// </summary> /// <param name="elem" type="Element">The element to examine</param> /// <param name="name" type="String">The node name to check</param> /// <returns type="Boolean">True if the specified node name matches the node's DOM node name; otherwise false</returns> return elem.nodeName && elem.nodeName.toUpperCase() === name.toUpperCase(); }, // args is for internal usage only each: function( object, callback, args ) { /// <summary> /// A generic iterator function, which can be used to seemlessly /// iterate over both objects and arrays. This function is not the same /// as $().each() - which is used to iterate, exclusively, over a jQuery /// object. This function can be used to iterate over anything. /// The callback has two arguments:the key (objects) or index (arrays) as first /// the first, and the value as the second. /// Part of JavaScript /// </summary> /// <param name="obj" type="Object"> /// The object, or array, to iterate over. /// </param> /// <param name="fn" type="Function"> /// The function that will be executed on every object. /// </param> /// <returns type="Object" /> var name, i = 0, length = object.length, isObj = length === undefined || jQuery.isFunction(object); if ( args ) { if ( isObj ) { for ( name in object ) { if ( callback.apply( object[ name ], args ) === false ) { break; } } } else { for ( ; i < length; ) { if ( callback.apply( object[ i++ ], args ) === false ) { break; } } } // A special, fast, case for the most common use of each } else { if ( isObj ) { for ( name in object ) { if ( callback.call( object[ name ], name, object[ name ] ) === false ) { break; } } } else { for ( var value = object[0]; i < length && callback.call( value, i, value ) !== false; value = object[++i] ) {} } } return object; }, trim: function( text ) { /// <summary> /// Remove the whitespace from the beginning and end of a string. /// Part of JavaScript /// </summary> /// <returns type="String" /> /// <param name="text" type="String"> /// The string to trim. /// </param> return (text || "").replace( rtrim, "" ); }, // results is for internal usage only makeArray: function( array, results ) { /// <summary> /// Turns anything into a true array. This is an internal method. /// </summary> /// <param name="array" type="Object">Anything to turn into an actual Array</param> /// <returns type="Array" /> /// <private /> var ret = results || []; if ( array != null ) { // The window, strings (and functions) also have 'length' // The extra typeof function check is to prevent crashes // in Safari 2 (See: #3039) if ( array.length == null || typeof array === "string" || jQuery.isFunction(array) || (typeof array !== "function" && array.setInterval) ) { push.call( ret, array ); } else { jQuery.merge( ret, array ); } } return ret; }, inArray: function( elem, array ) { if ( array.indexOf ) { return array.indexOf( elem ); } for ( var i = 0, length = array.length; i < length; i++ ) { if ( array[ i ] === elem ) { return i; } } return -1; }, merge: function( first, second ) { /// <summary> /// Merge two arrays together, removing all duplicates. /// The new array is: All the results from the first array, followed /// by the unique results from the second array. /// Part of JavaScript /// </summary> /// <returns type="Array" /> /// <param name="first" type="Array"> /// The first array to merge. /// </param> /// <param name="second" type="Array"> /// The second array to merge. /// </param> var i = first.length, j = 0; if ( typeof second.length === "number" ) { for ( var l = second.length; j < l; j++ ) { first[ i++ ] = second[ j ]; } } else { while ( second[j] !== undefined ) { first[ i++ ] = second[ j++ ]; } } first.length = i; return first; }, grep: function( elems, callback, inv ) { /// <summary> /// Filter items out of an array, by using a filter function. /// The specified function will be passed two arguments: The /// current array item and the index of the item in the array. The /// function must return 'true' to keep the item in the array, /// false to remove it. /// }); /// Part of JavaScript /// </summary> /// <returns type="Array" /> /// <param name="elems" type="Array"> /// array The Array to find items in. /// </param> /// <param name="fn" type="Function"> /// The function to process each item against. /// </param> /// <param name="inv" type="Boolean"> /// Invert the selection - select the opposite of the function. /// </param> var ret = []; // Go through the array, only saving the items // that pass the validator function for ( var i = 0, length = elems.length; i < length; i++ ) { if ( !inv !== !callback( elems[ i ], i ) ) { ret.push( elems[ i ] ); } } return ret; }, // arg is for internal usage only map: function( elems, callback, arg ) { /// <summary> /// Translate all items in an array to another array of items. /// The translation function that is provided to this method is /// called for each item in the array and is passed one argument: /// The item to be translated. /// The function can then return the translated value, 'null' /// (to remove the item), or an array of values - which will /// be flattened into the full array. /// Part of JavaScript /// </summary> /// <returns type="Array" /> /// <param name="elems" type="Array"> /// array The Array to translate. /// </param> /// <param name="fn" type="Function"> /// The function to process each item against. /// </param> var ret = [], value; // Go through the array, translating each of the items to their // new value (or values). for ( var i = 0, length = elems.length; i < length; i++ ) { value = callback( elems[ i ], i, arg ); if ( value != null ) { ret[ ret.length ] = value; } } return ret.concat.apply( [], ret ); }, // A global GUID counter for objects guid: 1, proxy: function( fn, proxy, thisObject ) { /// <summary> /// Takes a function and returns a new one that will always have a particular scope. /// </summary> /// <param name="fn" type="Function"> /// The function whose scope will be changed. /// </param> /// <param name="proxy" type="Object"> /// The object to which the scope of the function should be set. /// </param> /// <returns type="Function" /> if ( arguments.length === 2 ) { if ( typeof proxy === "string" ) { thisObject = fn; fn = thisObject[ proxy ]; proxy = undefined; } else if ( proxy && !jQuery.isFunction( proxy ) ) { thisObject = proxy; proxy = undefined; } } if ( !proxy && fn ) { proxy = function() { return fn.apply( thisObject || this, arguments ); }; } // Set the guid of unique handler to the same of original handler, so it can be removed if ( fn ) { proxy.guid = fn.guid = fn.guid || proxy.guid || jQuery.guid++; } // So proxy can be declared as an argument return proxy; }, // Use of jQuery.browser is frowned upon. // More details: http://docs.jquery.com/Utilities/jQuery.browser uaMatch: function( ua ) { ua = ua.toLowerCase(); var match = /(webkit)[ \/]([\w.]+)/.exec( ua ) || /(opera)(?:.*version)?[ \/]([\w.]+)/.exec( ua ) || /(msie) ([\w.]+)/.exec( ua ) || !/compatible/.test( ua ) && /(mozilla)(?:.*? rv:([\w.]+))?/.exec( ua ) || []; return { browser: match[1] || "", version: match[2] || "0" }; }, browser: {} }); browserMatch = jQuery.uaMatch( userAgent ); if ( browserMatch.browser ) { jQuery.browser[ browserMatch.browser ] = true; jQuery.browser.version = browserMatch.version; } // Deprecated, use jQuery.browser.webkit instead if ( jQuery.browser.webkit ) { jQuery.browser.safari = true; } if ( indexOf ) { jQuery.inArray = function( elem, array ) { /// <summary> /// Determines the index of the first parameter in the array. /// </summary> /// <param name="elem">The value to see if it exists in the array.</param> /// <param name="array" type="Array">The array to look through for the value</param> /// <returns type="Number" integer="true">The 0-based index of the item if it was found, otherwise -1.</returns> return indexOf.call( array, elem ); }; } // All jQuery objects should point back to these rootjQuery = jQuery(document); // Cleanup functions for the document ready method if ( document.addEventListener ) { DOMContentLoaded = function() { document.removeEventListener( "DOMContentLoaded", DOMContentLoaded, false ); jQuery.ready(); }; } else if ( document.attachEvent ) { DOMContentLoaded = function() { // Make sure body exists, at least, in case IE gets a little overzealous (ticket #5443). if ( document.readyState === "complete" ) { document.detachEvent( "onreadystatechange", DOMContentLoaded ); jQuery.ready(); } }; } // The DOM ready check for Internet Explorer function doScrollCheck() { if ( jQuery.isReady ) { return; } try { // If IE is used, use the trick by Diego Perini // http://javascript.nwbox.com/IEContentLoaded/ document.documentElement.doScroll("left"); } catch( error ) { setTimeout( doScrollCheck, 1 ); return; } // and execute any waiting functions jQuery.ready(); } function evalScript( i, elem ) { /// <summary> /// This method is internal. /// </summary> /// <private /> if ( elem.src ) { jQuery.ajax({ url: elem.src, async: false, dataType: "script" }); } else { jQuery.globalEval( elem.text || elem.textContent || elem.innerHTML || "" ); } if ( elem.parentNode ) { elem.parentNode.removeChild( elem ); } } // Mutifunctional method to get and set values to a collection // The value/s can be optionally by executed if its a function function access( elems, key, value, exec, fn, pass ) { var length = elems.length; // Setting many attributes if ( typeof key === "object" ) { for ( var k in key ) { access( elems, k, key[k], exec, fn, value ); } return elems; } // Setting one attribute if ( value !== undefined ) { // Optionally, function values get executed if exec is true exec = !pass && exec && jQuery.isFunction(value); for ( var i = 0; i < length; i++ ) { fn( elems[i], key, exec ? value.call( elems[i], i, fn( elems[i], key ) ) : value, pass ); } return elems; } // Getting an attribute return length ? fn( elems[0], key ) : null; } function now() { /// <summary> /// Gets the current date. /// </summary> /// <returns type="Date">The current date.</returns> return (new Date).getTime(); } // [vsdoc] The following function has been modified for IntelliSense. // [vsdoc] Stubbing support properties to "false" for IntelliSense compat. (function() { jQuery.support = {}; // var root = document.documentElement, // script = document.createElement("script"), // div = document.createElement("div"), // id = "script" + now(); // div.style.display = "none"; // div.innerHTML = " <link/><table></table><a href='/a' style='color:red;float:left;opacity:.55;'>a</a><input type='checkbox'/>"; // var all = div.getElementsByTagName("*"), // a = div.getElementsByTagName("a")[0]; // // Can't get basic test support // if ( !all || !all.length || !a ) { // return; // } jQuery.support = { // IE strips leading whitespace when .innerHTML is used leadingWhitespace: false, // Make sure that tbody elements aren't automatically inserted // IE will insert them into empty tables tbody: false, // Make sure that link elements get serialized correctly by innerHTML // This requires a wrapper element in IE htmlSerialize: false, // Get the style information from getAttribute // (IE uses .cssText insted) style: false, // Make sure that URLs aren't manipulated // (IE normalizes it by default) hrefNormalized: false, // Make sure that element opacity exists // (IE uses filter instead) // Use a regex to work around a WebKit issue. See #5145 opacity: false, // Verify style float existence // (IE uses styleFloat instead of cssFloat) cssFloat: false, // Make sure that if no value is specified for a checkbox // that it defaults to "on". // (WebKit defaults to "" instead) checkOn: false, // Make sure that a selected-by-default option has a working selected property. // (WebKit defaults to false instead of true, IE too, if it's in an optgroup) optSelected: false, // Will be defined later checkClone: false, scriptEval: false, noCloneEvent: false, boxModel: false }; // script.type = "text/javascript"; // try { // script.appendChild( document.createTextNode( "window." + id + "=1;" ) ); // } catch(e) {} // root.insertBefore( script, root.firstChild ); // // Make sure that the execution of code works by injecting a script // // tag with appendChild/createTextNode // // (IE doesn't support this, fails, and uses .text instead) // if ( window[ id ] ) { // jQuery.support.scriptEval = true; // delete window[ id ]; // } // root.removeChild( script ); // if ( div.attachEvent && div.fireEvent ) { // div.attachEvent("onclick", function click() { // // Cloning a node shouldn't copy over any // // bound event handlers (IE does this) // jQuery.support.noCloneEvent = false; // div.detachEvent("onclick", click); // }); // div.cloneNode(true).fireEvent("onclick"); // } // div = document.createElement("div"); // div.innerHTML = "<input type='radio' name='radiotest' checked='checked'/>"; // var fragment = document.createDocumentFragment(); // fragment.appendChild( div.firstChild ); // // WebKit doesn't clone checked state correctly in fragments // jQuery.support.checkClone = fragment.cloneNode(true).cloneNode(true).lastChild.checked; // // Figure out if the W3C box model works as expected // // document.body must exist before we can do this // jQuery(function() { // var div = document.createElement("div"); // div.style.width = div.style.paddingLeft = "1px"; // document.body.appendChild( div ); // jQuery.boxModel = jQuery.support.boxModel = div.offsetWidth === 2; // document.body.removeChild( div ).style.display = 'none'; // div = null; // }); // // Technique from Juriy Zaytsev // // http://thinkweb2.com/projects/prototype/detecting-event-support-without-browser-sniffing/ // var eventSupported = function( eventName ) { // var el = document.createElement("div"); // eventName = "on" + eventName; // var isSupported = (eventName in el); // if ( !isSupported ) { // el.setAttribute(eventName, "return;"); // isSupported = typeof el[eventName] === "function"; // } // el = null; // return isSupported; // }; jQuery.support.submitBubbles = false; jQuery.support.changeBubbles = false; // // release memory in IE // root = script = div = all = a = null; })(); jQuery.props = { "for": "htmlFor", "class": "className", readonly: "readOnly", maxlength: "maxLength", cellspacing: "cellSpacing", rowspan: "rowSpan", colspan: "colSpan", tabindex: "tabIndex", usemap: "useMap", frameborder: "frameBorder" }; var expando = "jQuery" + now(), uuid = 0, windowData = {}; var emptyObject = {}; jQuery.extend({ cache: {}, expando:expando, // The following elements throw uncatchable exceptions if you // attempt to add expando properties to them. noData: { "embed": true, "object": true, "applet": true }, data: function( elem, name, data ) { /// <summary> /// Store arbitrary data associated with the specified element. /// </summary> /// <param name="elem" type="Element"> /// The DOM element to associate with the data. /// </param> /// <param name="name" type="String"> /// A string naming the piece of data to set. /// </param> /// <param name="value" type="Object"> /// The new data value. /// </param> /// <returns type="jQuery" /> if ( elem.nodeName && jQuery.noData[elem.nodeName.toLowerCase()] ) { return; } elem = elem == window ? windowData : elem; var id = elem[ expando ], cache = jQuery.cache, thisCache; // Handle the case where there's no name immediately if ( !name && !id ) { return null; } // Compute a unique ID for the element if ( !id ) { id = ++uuid; } // Avoid generating a new cache unless none exists and we // want to manipulate it. if ( typeof name === "object" ) { elem[ expando ] = id; thisCache = cache[ id ] = jQuery.extend(true, {}, name); } else if ( cache[ id ] ) { thisCache = cache[ id ]; } else if ( typeof data === "undefined" ) { thisCache = emptyObject; } else { thisCache = cache[ id ] = {}; } // Prevent overriding the named cache with undefined values if ( data !== undefined ) { elem[ expando ] = id; thisCache[ name ] = data; } return typeof name === "string" ? thisCache[ name ] : thisCache; }, removeData: function( elem, name ) { if ( elem.nodeName && jQuery.noData[elem.nodeName.toLowerCase()] ) { return; } elem = elem == window ? windowData : elem; var id = elem[ expando ], cache = jQuery.cache, thisCache = cache[ id ]; // If we want to remove a specific section of the element's data if ( name ) { if ( thisCache ) { // Remove the section of cache data delete thisCache[ name ]; // If we've removed all the data, remove the element's cache if ( jQuery.isEmptyObject(thisCache) ) { jQuery.removeData( elem ); } } // Otherwise, we want to remove all of the element's data } else { // Clean up the element expando try { delete elem[ expando ]; } catch( e ) { // IE has trouble directly removing the expando // but it's ok with using removeAttribute if ( elem.removeAttribute ) { elem.removeAttribute( expando ); } } // Completely remove the data cache delete cache[ id ]; } } }); jQuery.fn.extend({ data: function( key, value ) { /// <summary> /// Store arbitrary data associated with the matched elements. /// </summary> /// <param name="key" type="String"> /// A string naming the piece of data to set. /// </param> /// <param name="value" type="Object"> /// The new data value. /// </param> /// <returns type="jQuery" /> if ( typeof key === "undefined" && this.length ) { return jQuery.data( this[0] ); } else if ( typeof key === "object" ) { return this.each(function() { jQuery.data( this, key ); }); } var parts = key.split("."); parts[1] = parts[1] ? "." + parts[1] : ""; if ( value === undefined ) { var data = this.triggerHandler("getData" + parts[1] + "!", [parts[0]]); if ( data === undefined && this.length ) { data = jQuery.data( this[0], key ); } return data === undefined && parts[1] ? this.data( parts[0] ) : data; } else { return this.trigger("setData" + parts[1] + "!", [parts[0], value]).each(function() { jQuery.data( this, key, value ); }); } }, removeData: function( key ) { return this.each(function() { jQuery.removeData( this, key ); }); } }); jQuery.extend({ queue: function( elem, type, data ) { if ( !elem ) { return; } type = (type || "fx") + "queue"; var q = jQuery.data( elem, type ); // Speed up dequeue by getting out quickly if this is just a lookup if ( !data ) { return q || []; } if ( !q || jQuery.isArray(data) ) { q = jQuery.data( elem, type, jQuery.makeArray(data) ); } else { q.push( data ); } return q; }, dequeue: function( elem, type ) { type = type || "fx"; var queue = jQuery.queue( elem, type ), fn = queue.shift(); // If the fx queue is dequeued, always remove the progress sentinel if ( fn === "inprogress" ) { fn = queue.shift(); } if ( fn ) { // Add a progress sentinel to prevent the fx queue from being // automatically dequeued if ( type === "fx" ) { queue.unshift("inprogress"); } fn.call(elem, function() { jQuery.dequeue(elem, type); }); } } }); jQuery.fn.extend({ queue: function( type, data ) { /// <summary> /// 1: queue() - Returns a reference to the first element's queue (which is an array of functions). /// 2: queue(callback) - Adds a new function, to be executed, onto the end of the queue of all matched elements. /// 3: queue(queue) - Replaces the queue of all matched element with this new queue (the array of functions). /// </summary> /// <param name="type" type="Function">The function to add to the queue.</param> /// <returns type="jQuery" /> if ( typeof type !== "string" ) { data = type; type = "fx"; } if ( data === undefined ) { return jQuery.queue( this[0], type ); } return this.each(function( i, elem ) { var queue = jQuery.queue( this, type, data ); if ( type === "fx" && queue[0] !== "inprogress" ) { jQuery.dequeue( this, type ); } }); }, dequeue: function( type ) { /// <summary> /// Removes a queued function from the front of the queue and executes it. /// </summary> /// <param name="type" type="String" optional="true">The type of queue to access.</param> /// <returns type="jQuery" /> return this.each(function() { jQuery.dequeue( this, type ); }); }, // Based off of the plugin by Clint Helfers, with permission. // http://blindsignals.com/index.php/2009/07/jquery-delay/ delay: function( time, type ) { /// <summary> /// Set a timer to delay execution of subsequent items in the queue. /// </summary> /// <param name="time" type="Number"> /// An integer indicating the number of milliseconds to delay execution of the next item in the queue. /// </param> /// <param name="type" type="String"> /// A string containing the name of the queue. Defaults to fx, the standard effects queue. /// </param> /// <returns type="jQuery" /> time = jQuery.fx ? jQuery.fx.speeds[time] || time : time; type = type || "fx"; return this.queue( type, function() { var elem = this; setTimeout(function() { jQuery.dequeue( elem, type ); }, time ); }); }, clearQueue: function( type ) { /// <summary> /// Remove from the queue all items that have not yet been run. /// </summary> /// <param name="type" type="String" optional="true"> /// A string containing the name of the queue. Defaults to fx, the standard effects queue. /// </param> /// <returns type="jQuery" /> return this.queue( type || "fx", [] ); } }); var rclass = /[\n\t]/g, rspace = /\s+/, rreturn = /\r/g, rspecialurl = /href|src|style/, rtype = /(button|input)/i, rfocusable = /(button|input|object|select|textarea)/i, rclickable = /^(a|area)$/i, rradiocheck = /radio|checkbox/; jQuery.fn.extend({ attr: function( name, value ) { /// <summary> /// Set a single property to a computed value, on all matched elements. /// Instead of a value, a function is provided, that computes the value. /// Part of DOM/Attributes /// </summary> /// <returns type="jQuery" /> /// <param name="name" type="String"> /// The name of the property to set. /// </param> /// <param name="value" type="Function"> /// A function returning the value to set. /// </param> return access( this, name, value, true, jQuery.attr ); }, removeAttr: function( name, fn ) { /// <summary> /// Remove an attribute from each of the matched elements. /// Part of DOM/Attributes /// </summary> /// <param name="name" type="String"> /// An attribute to remove. /// </param> /// <returns type="jQuery" /> return this.each(function(){ jQuery.attr( this, name, "" ); if ( this.nodeType === 1 ) { this.removeAttribute( name ); } }); }, addClass: function( value ) { /// <summary> /// Adds the specified class(es) to each of the set of matched elements. /// Part of DOM/Attributes /// </summary> /// <param name="value" type="String"> /// One or more class names to be added to the class attribute of each matched element. /// </param> /// <returns type="jQuery" /> if ( jQuery.isFunction(value) ) { return this.each(function(i) { var self = jQuery(this); self.addClass( value.call(this, i, self.attr("class")) ); }); } if ( value && typeof value === "string" ) { var classNames = (value || "").split( rspace ); for ( var i = 0, l = this.length; i < l; i++ ) { var elem = this[i]; if ( elem.nodeType === 1 ) { if ( !elem.className ) { elem.className = value; } else { var className = " " + elem.className + " "; for ( var c = 0, cl = classNames.length; c < cl; c++ ) { if ( className.indexOf( " " + classNames[c] + " " ) < 0 ) { elem.className += " " + classNames[c]; } } } } } } return this; }, removeClass: function( value ) { /// <summary> /// Removes all or the specified class(es) from the set of matched elements. /// Part of DOM/Attributes /// </summary> /// <param name="value" type="String" optional="true"> /// (Optional) A class name to be removed from the class attribute of each matched element. /// </param> /// <returns type="jQuery" /> if ( jQuery.isFunction(value) ) { return this.each(function(i) { var self = jQuery(this); self.removeClass( value.call(this, i, self.attr("class")) ); }); } if ( (value && typeof value === "string") || value === undefined ) { var classNames = (value || "").split(rspace); for ( var i = 0, l = this.length; i < l; i++ ) { var elem = this[i]; if ( elem.nodeType === 1 && elem.className ) { if ( value ) { var className = (" " + elem.className + " ").replace(rclass, " "); for ( var c = 0, cl = classNames.length; c < cl; c++ ) { className = className.replace(" " + classNames[c] + " ", " "); } elem.className = className.substring(1, className.length - 1); } else { elem.className = ""; } } } } return this; }, toggleClass: function( value, stateVal ) { /// <summary> /// Add or remove a class from each element in the set of matched elements, depending /// on either the class's presence or the value of the switch argument. /// </summary> /// <param name="value" type="Object"> /// A class name to be toggled for each element in the matched set. /// </param> /// <param name="stateVal" type="Object"> /// A boolean value to determine whether the class should be added or removed. /// </param> /// <returns type="jQuery" /> var type = typeof value, isBool = typeof stateVal === "boolean"; if ( jQuery.isFunction( value ) ) { return this.each(function(i) { var self = jQuery(this); self.toggleClass( value.call(this, i, self.attr("class"), stateVal), stateVal ); }); } return this.each(function() { if ( type === "string" ) { // toggle individual class names var className, i = 0, self = jQuery(this), state = stateVal, classNames = value.split( rspace ); while ( (className = classNames[ i++ ]) ) { // check each className given, space seperated list state = isBool ? state : !self.hasClass( className ); self[ state ? "addClass" : "removeClass" ]( className ); } } else if ( type === "undefined" || type === "boolean" ) { if ( this.className ) { // store className if set jQuery.data( this, "__className__", this.className ); } // toggle whole className this.className = this.className || value === false ? "" : jQuery.data( this, "__className__" ) || ""; } }); }, hasClass: function( selector ) { /// <summary> /// Checks the current selection against a class and returns whether at least one selection has a given class. /// </summary> /// <param name="selector" type="String">The class to check against</param> /// <returns type="Boolean">True if at least one element in the selection has the class, otherwise false.</returns> var className = " " + selector + " "; for ( var i = 0, l = this.length; i < l; i++ ) { if ( (" " + this[i].className + " ").replace(rclass, " ").indexOf( className ) > -1 ) { return true; } } return false; }, val: function( value ) { /// <summary> /// Set the value of every matched element. /// Part of DOM/Attributes /// </summary> /// <returns type="jQuery" /> /// <param name="value" type="String"> /// A string of text or an array of strings to set as the value property of each /// matched element. /// </param> if ( value === undefined ) { var elem = this[0]; if ( elem ) { if ( jQuery.nodeName( elem, "option" ) ) { return (elem.attributes.value || {}).specified ? elem.value : elem.text; } // We need to handle select boxes special if ( jQuery.nodeName( elem, "select" ) ) { var index = elem.selectedIndex, values = [], options = elem.options, one = elem.type === "select-one"; // Nothing was selected if ( index < 0 ) { return null; } // Loop through all the selected options for ( var i = one ? index : 0, max = one ? index + 1 : options.length; i < max; i++ ) { var option = options[ i ]; if ( option.selected ) { // Get the specifc value for the option value = jQuery(option).val(); // We don't need an array for one selects if ( one ) { return value; } // Multi-Selects return an array values.push( value ); } } return values; } // Handle the case where in Webkit "" is returned instead of "on" if a value isn't specified if ( rradiocheck.test( elem.type ) && !jQuery.support.checkOn ) { return elem.getAttribute("value") === null ? "on" : elem.value; } // Everything else, we just grab the value return (elem.value || "").replace(rreturn, ""); } return undefined; } var isFunction = jQuery.isFunction(value); return this.each(function(i) { var self = jQuery(this), val = value; if ( this.nodeType !== 1 ) { return; } if ( isFunction ) { val = value.call(this, i, self.val()); } // Typecast each time if the value is a Function and the appended // value is therefore different each time. if ( typeof val === "number" ) { val += ""; } if ( jQuery.isArray(val) && rradiocheck.test( this.type ) ) { this.checked = jQuery.inArray( self.val(), val ) >= 0; } else if ( jQuery.nodeName( this, "select" ) ) { var values = jQuery.makeArray(val); jQuery( "option", this ).each(function() { this.selected = jQuery.inArray( jQuery(this).val(), values ) >= 0; }); if ( !values.length ) { this.selectedIndex = -1; } } else { this.value = val; } }); } }); jQuery.extend({ attrFn: { val: true, css: true, html: true, text: true, data: true, width: true, height: true, offset: true }, attr: function( elem, name, value, pass ) { /// <summary> /// This method is internal. /// </summary> /// <private /> // don't set attributes on text and comment nodes if ( !elem || elem.nodeType === 3 || elem.nodeType === 8 ) { return undefined; } if ( pass && name in jQuery.attrFn ) { return jQuery(elem)[name](value); } var notxml = elem.nodeType !== 1 || !jQuery.isXMLDoc( elem ), // Whether we are setting (or getting) set = value !== undefined; // Try to normalize/fix the name name = notxml && jQuery.props[ name ] || name; // Only do all the following if this is a node (faster for style) if ( elem.nodeType === 1 ) { // These attributes require special treatment var special = rspecialurl.test( name ); // Safari mis-reports the default selected property of an option // Accessing the parent's selectedIndex property fixes it if ( name === "selected" && !jQuery.support.optSelected ) { var parent = elem.parentNode; if ( parent ) { parent.selectedIndex; // Make sure that it also works with optgroups, see #5701 if ( parent.parentNode ) { parent.parentNode.selectedIndex; } } } // If applicable, access the attribute via the DOM 0 way if ( name in elem && notxml && !special ) { if ( set ) { // We can't allow the type property to be changed (since it causes problems in IE) if ( name === "type" && rtype.test( elem.nodeName ) && elem.parentNode ) { jQuery.error( "type property can't be changed" ); } elem[ name ] = value; } // browsers index elements by id/name on forms, give priority to attributes. if ( jQuery.nodeName( elem, "form" ) && elem.getAttributeNode(name) ) { return elem.getAttributeNode( name ).nodeValue; } // elem.tabIndex doesn't always return the correct value when it hasn't been explicitly set // http://fluidproject.org/blog/2008/01/09/getting-setting-and-removing-tabindex-values-with-javascript/ if ( name === "tabIndex" ) { var attributeNode = elem.getAttributeNode( "tabIndex" ); return attributeNode && attributeNode.specified ? attributeNode.value : rfocusable.test( elem.nodeName ) || rclickable.test( elem.nodeName ) && elem.href ? 0 : undefined; } return elem[ name ]; } if ( !jQuery.support.style && notxml && name === "style" ) { if ( set ) { elem.style.cssText = "" + value; } return elem.style.cssText; } if ( set ) { // convert the value to a string (all browsers do this but IE) see #1070 elem.setAttribute( name, "" + value ); } var attr = !jQuery.support.hrefNormalized && notxml && special ? // Some attributes require a special call on IE elem.getAttribute( name, 2 ) : elem.getAttribute( name ); // Non-existent attributes return null, we normalize to undefined return attr === null ? undefined : attr; } // elem is actually elem.style ... set the style // Using attr for specific style information is now deprecated. Use style insead. return jQuery.style( elem, name, value ); } }); var fcleanup = function( nm ) { return nm.replace(/[^\w\s\.\|`]/g, function( ch ) { return "\\" + ch; }); }; /* * A number of helper functions used for managing events. * Many of the ideas behind this code originated from * Dean Edwards' addEvent library. */ jQuery.event = { // Bind an event to an element // Original by Dean Edwards add: function( elem, types, handler, data ) { /// <summary> /// This method is internal. /// </summary> /// <private /> if ( elem.nodeType === 3 || elem.nodeType === 8 ) { return; } // For whatever reason, IE has trouble passing the window object // around, causing it to be cloned in the process if ( elem.setInterval && ( elem !== window && !elem.frameElement ) ) { elem = window; } // Make sure that the function being executed has a unique ID if ( !handler.guid ) { handler.guid = jQuery.guid++; } // if data is passed, bind to handler if ( data !== undefined ) { // Create temporary function pointer to original handler var fn = handler; // Create unique handler function, wrapped around original handler handler = jQuery.proxy( fn ); // Store data in unique handler handler.data = data; } // Init the element's event structure var events = jQuery.data( elem, "events" ) || jQuery.data( elem, "events", {} ), handle = jQuery.data( elem, "handle" ), eventHandle; if ( !handle ) { eventHandle = function() { // Handle the second event of a trigger and when // an event is called after a page has unloaded return typeof jQuery !== "undefined" && !jQuery.event.triggered ? jQuery.event.handle.apply( eventHandle.elem, arguments ) : undefined; }; handle = jQuery.data( elem, "handle", eventHandle ); } // If no handle is found then we must be trying to bind to one of the // banned noData elements if ( !handle ) { return; } // Add elem as a property of the handle function // This is to prevent a memory leak with non-native // event in IE. handle.elem = elem; // Handle multiple events separated by a space // jQuery(...).bind("mouseover mouseout", fn); types = types.split( /\s+/ ); var type, i = 0; while ( (type = types[ i++ ]) ) { // Namespaced event handlers var namespaces = type.split("."); type = namespaces.shift(); if ( i > 1 ) { handler = jQuery.proxy( handler ); if ( data !== undefined ) { handler.data = data; } } handler.type = namespaces.slice(0).sort().join("."); // Get the current list of functions bound to this event var handlers = events[ type ], special = this.special[ type ] || {}; // Init the event handler queue if ( !handlers ) { handlers = events[ type ] = {}; // Check for a special event handler // Only use addEventListener/attachEvent if the special // events handler returns false if ( !special.setup || special.setup.call( elem, data, namespaces, handler) === false ) { // Bind the global event handler to the element if ( elem.addEventListener ) { elem.addEventListener( type, handle, false ); } else if ( elem.attachEvent ) { elem.attachEvent( "on" + type, handle ); } } } if ( special.add ) { var modifiedHandler = special.add.call( elem, handler, data, namespaces, handlers ); if ( modifiedHandler && jQuery.isFunction( modifiedHandler ) ) { modifiedHandler.guid = modifiedHandler.guid || handler.guid; modifiedHandler.data = modifiedHandler.data || handler.data; modifiedHandler.type = modifiedHandler.type || handler.type; handler = modifiedHandler; } } // Add the function to the element's handler list handlers[ handler.guid ] = handler; // Keep track of which events have been used, for global triggering this.global[ type ] = true; } // Nullify elem to prevent memory leaks in IE elem = null; }, global: {}, // Detach an event or set of events from an element remove: function( elem, types, handler ) { /// <summary> /// This method is internal. /// </summary> /// <private /> // don't do events on text and comment nodes if ( elem.nodeType === 3 || elem.nodeType === 8 ) { return; } var events = jQuery.data( elem, "events" ), ret, type, fn; if ( events ) { // Unbind all events for the element if ( types === undefined || (typeof types === "string" && types.charAt(0) === ".") ) { for ( type in events ) { this.remove( elem, type + (types || "") ); } } else { // types is actually an event object here if ( types.type ) { handler = types.handler; types = types.type; } // Handle multiple events separated by a space // jQuery(...).unbind("mouseover mouseout", fn); types = types.split(/\s+/); var i = 0; while ( (type = types[ i++ ]) ) { // Namespaced event handlers var namespaces = type.split("."); type = namespaces.shift(); var all = !namespaces.length, cleaned = jQuery.map( namespaces.slice(0).sort(), fcleanup ), namespace = new RegExp("(^|\\.)" + cleaned.join("\\.(?:.*\\.)?") + "(\\.|$)"), special = this.special[ type ] || {}; if ( events[ type ] ) { // remove the given handler for the given type if ( handler ) { fn = events[ type ][ handler.guid ]; delete events[ type ][ handler.guid ]; // remove all handlers for the given type } else { for ( var handle in events[ type ] ) { // Handle the removal of namespaced events if ( all || namespace.test( events[ type ][ handle ].type ) ) { delete events[ type ][ handle ]; } } } if ( special.remove ) { special.remove.call( elem, namespaces, fn); } // remove generic event handler if no more handlers exist for ( ret in events[ type ] ) { break; } if ( !ret ) { if ( !special.teardown || special.teardown.call( elem, namespaces ) === false ) { if ( elem.removeEventListener ) { elem.removeEventListener( type, jQuery.data( elem, "handle" ), false ); } else if ( elem.detachEvent ) { elem.detachEvent( "on" + type, jQuery.data( elem, "handle" ) ); } } ret = null; delete events[ type ]; } } } } // Remove the expando if it's no longer used for ( ret in events ) { break; } if ( !ret ) { var handle = jQuery.data( elem, "handle" ); if ( handle ) { handle.elem = null; } jQuery.removeData( elem, "events" ); jQuery.removeData( elem, "handle" ); } } }, // bubbling is internal trigger: function( event, data, elem /*, bubbling */ ) { /// <summary> /// This method is internal. /// </summary> /// <private /> // Event object or event type var type = event.type || event, bubbling = arguments[3]; if ( !bubbling ) { event = typeof event === "object" ? // jQuery.Event object event[expando] ? event : // Object literal jQuery.extend( jQuery.Event(type), event ) : // Just the event type (string) jQuery.Event(type); if ( type.indexOf("!") >= 0 ) { event.type = type = type.slice(0, -1); event.exclusive = true; } // Handle a global trigger if ( !elem ) { // Don't bubble custom events when global (to avoid too much overhead) event.stopPropagation(); // Only trigger if we've ever bound an event for it if ( this.global[ type ] ) { jQuery.each( jQuery.cache, function() { if ( this.events && this.events[type] ) { jQuery.event.trigger( event, data, this.handle.elem ); } }); } } // Handle triggering a single element // don't do events on text and comment nodes if ( !elem || elem.nodeType === 3 || elem.nodeType === 8 ) { return undefined; } // Clean up in case it is reused event.result = undefined; event.target = elem; // Clone the incoming data, if any data = jQuery.makeArray( data ); data.unshift( event ); } event.currentTarget = elem; // Trigger the event, it is assumed that "handle" is a function var handle = jQuery.data( elem, "handle" ); if ( handle ) { handle.apply( elem, data ); } var parent = elem.parentNode || elem.ownerDocument; // Trigger an inline bound script try { if ( !(elem && elem.nodeName && jQuery.noData[elem.nodeName.toLowerCase()]) ) { if ( elem[ "on" + type ] && elem[ "on" + type ].apply( elem, data ) === false ) { event.result = false; } } // prevent IE from throwing an error for some elements with some event types, see #3533 } catch (e) {} if ( !event.isPropagationStopped() && parent ) { jQuery.event.trigger( event, data, parent, true ); } else if ( !event.isDefaultPrevented() ) { var target = event.target, old, isClick = jQuery.nodeName(target, "a") && type === "click"; if ( !isClick && !(target && target.nodeName && jQuery.noData[target.nodeName.toLowerCase()]) ) { try { if ( target[ type ] ) { // Make sure that we don't accidentally re-trigger the onFOO events old = target[ "on" + type ]; if ( old ) { target[ "on" + type ] = null; } this.triggered = true; target[ type ](); } // prevent IE from throwing an error for some elements with some event types, see #3533 } catch (e) {} if ( old ) { target[ "on" + type ] = old; } this.triggered = false; } } }, handle: function( event ) { /// <summary> /// This method is internal. /// </summary> /// <private /> // returned undefined or false var all, handlers; event = arguments[0] = jQuery.event.fix( event || window.event ); event.currentTarget = this; // Namespaced event handlers var namespaces = event.type.split("."); event.type = namespaces.shift(); // Cache this now, all = true means, any handler all = !namespaces.length && !event.exclusive; var namespace = new RegExp("(^|\\.)" + namespaces.slice(0).sort().join("\\.(?:.*\\.)?") + "(\\.|$)"); handlers = ( jQuery.data(this, "events") || {} )[ event.type ]; for ( var j in handlers ) { var handler = handlers[ j ]; // Filter the functions by class if ( all || namespace.test(handler.type) ) { // Pass in a reference to the handler function itself // So that we can later remove it event.handler = handler; event.data = handler.data; var ret = handler.apply( this, arguments ); if ( ret !== undefined ) { event.result = ret; if ( ret === false ) { event.preventDefault(); event.stopPropagation(); } } if ( event.isImmediatePropagationStopped() ) { break; } } } return event.result; }, props: "altKey attrChange attrName bubbles button cancelable charCode clientX clientY ctrlKey currentTarget data detail eventPhase fromElement handler keyCode layerX layerY metaKey newValue offsetX offsetY originalTarget pageX pageY prevValue relatedNode relatedTarget screenX screenY shiftKey srcElement target toElement view wheelDelta which".split(" "), fix: function( event ) { /// <summary> /// This method is internal. /// </summary> /// <private /> if ( event[ expando ] ) { return event; } // store a copy of the original event object // and "clone" to set read-only properties var originalEvent = event; event = jQuery.Event( originalEvent ); for ( var i = this.props.length, prop; i; ) { prop = this.props[ --i ]; event[ prop ] = originalEvent[ prop ]; } // Fix target property, if necessary if ( !event.target ) { event.target = event.srcElement || document; // Fixes #1925 where srcElement might not be defined either } // check if target is a textnode (safari) if ( event.target.nodeType === 3 ) { event.target = event.target.parentNode; } // Add relatedTarget, if necessary if ( !event.relatedTarget && event.fromElement ) { event.relatedTarget = event.fromElement === event.target ? event.toElement : event.fromElement; } // Calculate pageX/Y if missing and clientX/Y available if ( event.pageX == null && event.clientX != null ) { var doc = document.documentElement, body = document.body; event.pageX = event.clientX + (doc && doc.scrollLeft || body && body.scrollLeft || 0) - (doc && doc.clientLeft || body && body.clientLeft || 0); event.pageY = event.clientY + (doc && doc.scrollTop || body && body.scrollTop || 0) - (doc && doc.clientTop || body && body.clientTop || 0); } // Add which for key events if ( !event.which && ((event.charCode || event.charCode === 0) ? event.charCode : event.keyCode) ) { event.which = event.charCode || event.keyCode; } // Add metaKey to non-Mac browsers (use ctrl for PC's and Meta for Macs) if ( !event.metaKey && event.ctrlKey ) { event.metaKey = event.ctrlKey; } // Add which for click: 1 === left; 2 === middle; 3 === right // Note: button is not normalized, so don't use it if ( !event.which && event.button !== undefined ) { event.which = (event.button & 1 ? 1 : ( event.button & 2 ? 3 : ( event.button & 4 ? 2 : 0 ) )); } return event; }, // Deprecated, use jQuery.guid instead guid: 1E8, // Deprecated, use jQuery.proxy instead proxy: jQuery.proxy, special: { ready: { // Make sure the ready event is setup setup: jQuery.bindReady, teardown: jQuery.noop }, live: { add: function( proxy, data, namespaces, live ) { jQuery.extend( proxy, data || {} ); proxy.guid += data.selector + data.live; data.liveProxy = proxy; jQuery.event.add( this, data.live, liveHandler, data ); }, remove: function( namespaces ) { if ( namespaces.length ) { var remove = 0, name = new RegExp("(^|\\.)" + namespaces[0] + "(\\.|$)"); jQuery.each( (jQuery.data(this, "events").live || {}), function() { if ( name.test(this.type) ) { remove++; } }); if ( remove < 1 ) { jQuery.event.remove( this, namespaces[0], liveHandler ); } } }, special: {} }, beforeunload: { setup: function( data, namespaces, fn ) { // We only want to do this special case on windows if ( this.setInterval ) { this.onbeforeunload = fn; } return false; }, teardown: function( namespaces, fn ) { if ( this.onbeforeunload === fn ) { this.onbeforeunload = null; } } } } }; jQuery.Event = function( src ) { // Allow instantiation without the 'new' keyword if ( !this.preventDefault ) { return new jQuery.Event( src ); } // Event object if ( src && src.type ) { this.originalEvent = src; this.type = src.type; // Event type } else { this.type = src; } // timeStamp is buggy for some events on Firefox(#3843) // So we won't rely on the native value this.timeStamp = now(); // Mark it as fixed this[ expando ] = true; }; function returnFalse() { return false; } function returnTrue() { return true; } // jQuery.Event is based on DOM3 Events as specified by the ECMAScript Language Binding // http://www.w3.org/TR/2003/WD-DOM-Level-3-Events-20030331/ecma-script-binding.html jQuery.Event.prototype = { preventDefault: function() { this.isDefaultPrevented = returnTrue; var e = this.originalEvent; if ( !e ) { return; } // if preventDefault exists run it on the original event if ( e.preventDefault ) { e.preventDefault(); } // otherwise set the returnValue property of the original event to false (IE) e.returnValue = false; }, stopPropagation: function() { this.isPropagationStopped = returnTrue; var e = this.originalEvent; if ( !e ) { return; } // if stopPropagation exists run it on the original event if ( e.stopPropagation ) { e.stopPropagation(); } // otherwise set the cancelBubble property of the original event to true (IE) e.cancelBubble = true; }, stopImmediatePropagation: function() { this.isImmediatePropagationStopped = returnTrue; this.stopPropagation(); }, isDefaultPrevented: returnFalse, isPropagationStopped: returnFalse, isImmediatePropagationStopped: returnFalse }; // Checks if an event happened on an element within another element // Used in jQuery.event.special.mouseenter and mouseleave handlers var withinElement = function( event ) { // Check if mouse(over|out) are still within the same parent element var parent = event.relatedTarget; // Traverse up the tree while ( parent && parent !== this ) { // Firefox sometimes assigns relatedTarget a XUL element // which we cannot access the parentNode property of try { parent = parent.parentNode; // assuming we've left the element since we most likely mousedover a xul element } catch(e) { break; } } if ( parent !== this ) { // set the correct event type event.type = event.data; // handle event if we actually just moused on to a non sub-element jQuery.event.handle.apply( this, arguments ); } }, // In case of event delegation, we only need to rename the event.type, // liveHandler will take care of the rest. delegate = function( event ) { event.type = event.data; jQuery.event.handle.apply( this, arguments ); }; // Create mouseenter and mouseleave events jQuery.each({ mouseenter: "mouseover", mouseleave: "mouseout" }, function( orig, fix ) { jQuery.event.special[ orig ] = { setup: function( data ) { jQuery.event.add( this, fix, data && data.selector ? delegate : withinElement, orig ); }, teardown: function( data ) { jQuery.event.remove( this, fix, data && data.selector ? delegate : withinElement ); } }; }); // submit delegation if ( !jQuery.support.submitBubbles ) { jQuery.event.special.submit = { setup: function( data, namespaces, fn ) { if ( this.nodeName.toLowerCase() !== "form" ) { jQuery.event.add(this, "click.specialSubmit." + fn.guid, function( e ) { var elem = e.target, type = elem.type; if ( (type === "submit" || type === "image") && jQuery( elem ).closest("form").length ) { return trigger( "submit", this, arguments ); } }); jQuery.event.add(this, "keypress.specialSubmit." + fn.guid, function( e ) { var elem = e.target, type = elem.type; if ( (type === "text" || type === "password") && jQuery( elem ).closest("form").length && e.keyCode === 13 ) { return trigger( "submit", this, arguments ); } }); } else { return false; } }, remove: function( namespaces, fn ) { jQuery.event.remove( this, "click.specialSubmit" + (fn ? "."+fn.guid : "") ); jQuery.event.remove( this, "keypress.specialSubmit" + (fn ? "."+fn.guid : "") ); } }; } // change delegation, happens here so we have bind. if ( !jQuery.support.changeBubbles ) { var formElems = /textarea|input|select/i; function getVal( elem ) { var type = elem.type, val = elem.value; if ( type === "radio" || type === "checkbox" ) { val = elem.checked; } else if ( type === "select-multiple" ) { val = elem.selectedIndex > -1 ? jQuery.map( elem.options, function( elem ) { return elem.selected; }).join("-") : ""; } else if ( elem.nodeName.toLowerCase() === "select" ) { val = elem.selectedIndex; } return val; } function testChange( e ) { var elem = e.target, data, val; if ( !formElems.test( elem.nodeName ) || elem.readOnly ) { return; } data = jQuery.data( elem, "_change_data" ); val = getVal(elem); // the current data will be also retrieved by beforeactivate if ( e.type !== "focusout" || elem.type !== "radio" ) { jQuery.data( elem, "_change_data", val ); } if ( data === undefined || val === data ) { return; } if ( data != null || val ) { e.type = "change"; return jQuery.event.trigger( e, arguments[1], elem ); } } jQuery.event.special.change = { filters: { focusout: testChange, click: function( e ) { var elem = e.target, type = elem.type; if ( type === "radio" || type === "checkbox" || elem.nodeName.toLowerCase() === "select" ) { return testChange.call( this, e ); } }, // Change has to be called before submit // Keydown will be called before keypress, which is used in submit-event delegation keydown: function( e ) { var elem = e.target, type = elem.type; if ( (e.keyCode === 13 && elem.nodeName.toLowerCase() !== "textarea") || (e.keyCode === 32 && (type === "checkbox" || type === "radio")) || type === "select-multiple" ) { return testChange.call( this, e ); } }, // Beforeactivate happens also before the previous element is blurred // with this event you can't trigger a change event, but you can store // information/focus[in] is not needed anymore beforeactivate: function( e ) { var elem = e.target; if ( elem.nodeName.toLowerCase() === "input" && elem.type === "radio" ) { jQuery.data( elem, "_change_data", getVal(elem) ); } } }, setup: function( data, namespaces, fn ) { for ( var type in changeFilters ) { jQuery.event.add( this, type + ".specialChange." + fn.guid, changeFilters[type] ); } return formElems.test( this.nodeName ); }, remove: function( namespaces, fn ) { for ( var type in changeFilters ) { jQuery.event.remove( this, type + ".specialChange" + (fn ? "."+fn.guid : ""), changeFilters[type] ); } return formElems.test( this.nodeName ); } }; var changeFilters = jQuery.event.special.change.filters; } function trigger( type, elem, args ) { args[0].type = type; return jQuery.event.handle.apply( elem, args ); } // Create "bubbling" focus and blur events if ( document.addEventListener ) { jQuery.each({ focus: "focusin", blur: "focusout" }, function( orig, fix ) { jQuery.event.special[ fix ] = { setup: function() { /// <summary> /// This method is internal. /// </summary> /// <private /> this.addEventListener( orig, handler, true ); }, teardown: function() { /// <summary> /// This method is internal. /// </summary> /// <private /> this.removeEventListener( orig, handler, true ); } }; function handler( e ) { e = jQuery.event.fix( e ); e.type = fix; return jQuery.event.handle.call( this, e ); } }); } // jQuery.each(["bind", "one"], function( i, name ) { // jQuery.fn[ name ] = function( type, data, fn ) { // // Handle object literals // if ( typeof type === "object" ) { // for ( var key in type ) { // this[ name ](key, data, type[key], fn); // } // return this; // } // // if ( jQuery.isFunction( data ) ) { // fn = data; // data = undefined; // } // // var handler = name === "one" ? jQuery.proxy( fn, function( event ) { // jQuery( this ).unbind( event, handler ); // return fn.apply( this, arguments ); // }) : fn; // // return type === "unload" && name !== "one" ? // this.one( type, data, fn ) : // this.each(function() { // jQuery.event.add( this, type, handler, data ); // }); // }; // }); jQuery.fn[ "bind" ] = function( type, data, fn ) { /// <summary> /// Binds a handler to one or more events for each matched element. Can also bind custom events. /// </summary> /// <param name="type" type="String">One or more event types separated by a space. Built-in event type values are: blur, focus, load, resize, scroll, unload, click, dblclick, mousedown, mouseup, mousemove, mouseover, mouseout, mouseenter, mouseleave, change, select, submit, keydown, keypress, keyup, error .</param> /// <param name="data" optional="true" type="Object">Additional data passed to the event handler as event.data</param> /// <param name="fn" type="Function">A function to bind to the event on each of the set of matched elements. function callback(eventObject) such that this corresponds to the dom element.</param> // Handle object literals if ( typeof type === "object" ) { for ( var key in type ) { this[ "bind" ](key, data, type[key], fn); } return this; } if ( jQuery.isFunction( data ) ) { fn = data; data = undefined; } var handler = "bind" === "one" ? jQuery.proxy( fn, function( event ) { jQuery( this ).unbind( event, handler ); return fn.apply( this, arguments ); }) : fn; return type === "unload" && "bind" !== "one" ? this.one( type, data, fn ) : this.each(function() { jQuery.event.add( this, type, handler, data ); }); }; jQuery.fn[ "one" ] = function( type, data, fn ) { /// <summary> /// Binds a handler to one or more events to be executed exactly once for each matched element. /// </summary> /// <param name="type" type="String">One or more event types separated by a space. Built-in event type values are: blur, focus, load, resize, scroll, unload, click, dblclick, mousedown, mouseup, mousemove, mouseover, mouseout, mouseenter, mouseleave, change, select, submit, keydown, keypress, keyup, error .</param> /// <param name="data" optional="true" type="Object">Additional data passed to the event handler as event.data</param> /// <param name="fn" type="Function">A function to bind to the event on each of the set of matched elements. function callback(eventObject) such that this corresponds to the dom element.</param> // Handle object literals if ( typeof type === "object" ) { for ( var key in type ) { this[ "one" ](key, data, type[key], fn); } return this; } if ( jQuery.isFunction( data ) ) { fn = data; data = undefined; } var handler = "one" === "one" ? jQuery.proxy( fn, function( event ) { jQuery( this ).unbind( event, handler ); return fn.apply( this, arguments ); }) : fn; return type === "unload" && "one" !== "one" ? this.one( type, data, fn ) : this.each(function() { jQuery.event.add( this, type, handler, data ); }); }; jQuery.fn.extend({ unbind: function( type, fn ) { /// <summary> /// Unbinds a handler from one or more events for each matched element. /// </summary> /// <param name="type" type="String">One or more event types separated by a space. Built-in event type values are: blur, focus, load, resize, scroll, unload, click, dblclick, mousedown, mouseup, mousemove, mouseover, mouseout, mouseenter, mouseleave, change, select, submit, keydown, keypress, keyup, error .</param> /// <param name="fn" type="Function">A function to bind to the event on each of the set of matched elements. function callback(eventObject) such that this corresponds to the dom element.</param> // Handle object literals if ( typeof type === "object" && !type.preventDefault ) { for ( var key in type ) { this.unbind(key, type[key]); } return this; } return this.each(function() { jQuery.event.remove( this, type, fn ); }); }, trigger: function( type, data ) { /// <summary> /// Triggers a type of event on every matched element. /// </summary> /// <param name="type" type="String">One or more event types separated by a space. Built-in event type values are: blur, focus, load, resize, scroll, unload, click, dblclick, mousedown, mouseup, mousemove, mouseover, mouseout, mouseenter, mouseleave, change, select, submit, keydown, keypress, keyup, error .</param> /// <param name="data" optional="true" type="Array">Additional data passed to the event handler as additional arguments.</param> /// <param name="fn" type="Function">This parameter is undocumented.</param> return this.each(function() { jQuery.event.trigger( type, data, this ); }); }, triggerHandler: function( type, data ) { /// <summary> /// Triggers all bound event handlers on an element for a specific event type without executing the browser's default actions. /// </summary> /// <param name="type" type="String">One or more event types separated by a space. Built-in event type values are: blur, focus, load, resize, scroll, unload, click, dblclick, mousedown, mouseup, mousemove, mouseover, mouseout, mouseenter, mouseleave, change, select, submit, keydown, keypress, keyup, error .</param> /// <param name="data" optional="true" type="Array">Additional data passed to the event handler as additional arguments.</param> /// <param name="fn" type="Function">This parameter is undocumented.</param> if ( this[0] ) { var event = jQuery.Event( type ); event.preventDefault(); event.stopPropagation(); jQuery.event.trigger( event, data, this[0] ); return event.result; } }, toggle: function( fn ) { /// <summary> /// Toggles among two or more function calls every other click. /// </summary> /// <param name="fn" type="Function">The functions among which to toggle execution</param> // Save reference to arguments for access in closure var args = arguments, i = 1; // link all the functions, so any of them can unbind this click handler while ( i < args.length ) { jQuery.proxy( fn, args[ i++ ] ); } return this.click( jQuery.proxy( fn, function( event ) { // Figure out which function to execute var lastToggle = ( jQuery.data( this, "lastToggle" + fn.guid ) || 0 ) % i; jQuery.data( this, "lastToggle" + fn.guid, lastToggle + 1 ); // Make sure that clicks stop event.preventDefault(); // and execute the function return args[ lastToggle ].apply( this, arguments ) || false; })); }, hover: function( fnOver, fnOut ) { /// <summary> /// Simulates hovering (moving the mouse on or off of an object). /// </summary> /// <param name="fnOver" type="Function">The function to fire when the mouse is moved over a matched element.</param> /// <param name="fnOut" type="Function">The function to fire when the mouse is moved off of a matched element.</param> return this.mouseenter( fnOver ).mouseleave( fnOut || fnOver ); } }); // jQuery.each(["live", "die"], function( i, name ) { // jQuery.fn[ name ] = function( types, data, fn ) { // var type, i = 0; // // if ( jQuery.isFunction( data ) ) { // fn = data; // data = undefined; // } // // types = (types || "").split( /\s+/ ); // // while ( (type = types[ i++ ]) != null ) { // type = type === "focus" ? "focusin" : // focus --> focusin // type === "blur" ? "focusout" : // blur --> focusout // type === "hover" ? types.push("mouseleave") && "mouseenter" : // hover support // type; // // if ( name === "live" ) { // // bind live handler // jQuery( this.context ).bind( liveConvert( type, this.selector ), { // data: data, selector: this.selector, live: type // }, fn ); // // } else { // // unbind live handler // jQuery( this.context ).unbind( liveConvert( type, this.selector ), fn ? { guid: fn.guid + this.selector + type } : null ); // } // } // // return this; // } // }); jQuery.fn[ "live" ] = function( types, data, fn ) { /// <summary> /// Attach a handler to the event for all elements which match the current selector, now or /// in the future. /// </summary> /// <param name="types" type="String"> /// A string containing a JavaScript event type, such as "click" or "keydown". /// </param> /// <param name="data" type="Object"> /// A map of data that will be passed to the event handler. /// </param> /// <param name="fn" type="Function"> /// A function to execute at the time the event is triggered. /// </param> /// <returns type="jQuery" /> var type, i = 0; if ( jQuery.isFunction( data ) ) { fn = data; data = undefined; } types = (types || "").split( /\s+/ ); while ( (type = types[ i++ ]) != null ) { type = type === "focus" ? "focusin" : // focus --> focusin type === "blur" ? "focusout" : // blur --> focusout type === "hover" ? types.push("mouseleave") && "mouseenter" : // hover support type; if ( "live" === "live" ) { // bind live handler jQuery( this.context ).bind( liveConvert( type, this.selector ), { data: data, selector: this.selector, live: type }, fn ); } else { // unbind live handler jQuery( this.context ).unbind( liveConvert( type, this.selector ), fn ? { guid: fn.guid + this.selector + type } : null ); } } return this; } jQuery.fn[ "die" ] = function( types, data, fn ) { /// <summary> /// Remove all event handlers previously attached using .live() from the elements. /// </summary> /// <param name="types" type="String"> /// A string containing a JavaScript event type, such as click or keydown. /// </param> /// <param name="data" type="Object"> /// The function that is to be no longer executed. /// </param> /// <returns type="jQuery" /> var type, i = 0; if ( jQuery.isFunction( data ) ) { fn = data; data = undefined; } types = (types || "").split( /\s+/ ); while ( (type = types[ i++ ]) != null ) { type = type === "focus" ? "focusin" : // focus --> focusin type === "blur" ? "focusout" : // blur --> focusout type === "hover" ? types.push("mouseleave") && "mouseenter" : // hover support type; if ( "die" === "live" ) { // bind live handler jQuery( this.context ).bind( liveConvert( type, this.selector ), { data: data, selector: this.selector, live: type }, fn ); } else { // unbind live handler jQuery( this.context ).unbind( liveConvert( type, this.selector ), fn ? { guid: fn.guid + this.selector + type } : null ); } } return this; } function liveHandler( event ) { var stop, elems = [], selectors = [], args = arguments, related, match, fn, elem, j, i, l, data, live = jQuery.extend({}, jQuery.data( this, "events" ).live); // Make sure we avoid non-left-click bubbling in Firefox (#3861) if ( event.button && event.type === "click" ) { return; } for ( j in live ) { fn = live[j]; if ( fn.live === event.type || fn.altLive && jQuery.inArray(event.type, fn.altLive) > -1 ) { data = fn.data; if ( !(data.beforeFilter && data.beforeFilter[event.type] && !data.beforeFilter[event.type](event)) ) { selectors.push( fn.selector ); } } else { delete live[j]; } } match = jQuery( event.target ).closest( selectors, event.currentTarget ); for ( i = 0, l = match.length; i < l; i++ ) { for ( j in live ) { fn = live[j]; elem = match[i].elem; related = null; if ( match[i].selector === fn.selector ) { // Those two events require additional checking if ( fn.live === "mouseenter" || fn.live === "mouseleave" ) { related = jQuery( event.relatedTarget ).closest( fn.selector )[0]; } if ( !related || related !== elem ) { elems.push({ elem: elem, fn: fn }); } } } } for ( i = 0, l = elems.length; i < l; i++ ) { match = elems[i]; event.currentTarget = match.elem; event.data = match.fn.data; if ( match.fn.apply( match.elem, args ) === false ) { stop = false; break; } } return stop; } function liveConvert( type, selector ) { return "live." + (type ? type + "." : "") + selector.replace(/\./g, "`").replace(/ /g, "&"); } // jQuery.each( ("blur focus focusin focusout load resize scroll unload click dblclick " + // "mousedown mouseup mousemove mouseover mouseout mouseenter mouseleave " + // "change select submit keydown keypress keyup error").split(" "), function( i, name ) { // // // Handle event binding // jQuery.fn[ name ] = function( fn ) { // return fn ? this.bind( name, fn ) : this.trigger( name ); // }; // // if ( jQuery.attrFn ) { // jQuery.attrFn[ name ] = true; // } // }); jQuery.fn[ "blur" ] = function( fn ) { /// <summary> /// 1: blur() - Triggers the blur event of each matched element. /// 2: blur(fn) - Binds a function to the blur event of each matched element. /// </summary> /// <param name="fn" type="Function">The function to execute.</param> /// <returns type="jQuery" /> return fn ? this.bind( "blur", fn ) : this.trigger( "blur" ); }; jQuery.fn[ "focus" ] = function( fn ) { /// <summary> /// 1: focus() - Triggers the focus event of each matched element. /// 2: focus(fn) - Binds a function to the focus event of each matched element. /// </summary> /// <param name="fn" type="Function">The function to execute.</param> /// <returns type="jQuery" /> return fn ? this.bind( "focus", fn ) : this.trigger( "focus" ); }; jQuery.fn[ "focusin" ] = function( fn ) { /// <summary> /// Bind an event handler to the "focusin" JavaScript event. /// </summary> /// <param name="fn" type="Function"> /// A function to execute each time the event is triggered. /// </param> /// <returns type="jQuery" /> return fn ? this.bind( "focusin", fn ) : this.trigger( "focusin" ); }; jQuery.fn[ "focusout" ] = function( fn ) { /// <summary> /// Bind an event handler to the "focusout" JavaScript event. /// </summary> /// <param name="fn" type="Function"> /// A function to execute each time the event is triggered. /// </param> /// <returns type="jQuery" /> return fn ? this.bind( "focusout", fn ) : this.trigger( "focusout" ); }; jQuery.fn[ "load" ] = function( fn ) { /// <summary> /// 1: load() - Triggers the load event of each matched element. /// 2: load(fn) - Binds a function to the load event of each matched element. /// </summary> /// <param name="fn" type="Function">The function to execute.</param> /// <returns type="jQuery" /> return fn ? this.bind( "load", fn ) : this.trigger( "load" ); }; jQuery.fn[ "resize" ] = function( fn ) { /// <summary> /// 1: resize() - Triggers the resize event of each matched element. /// 2: resize(fn) - Binds a function to the resize event of each matched element. /// </summary> /// <param name="fn" type="Function">The function to execute.</param> /// <returns type="jQuery" /> return fn ? this.bind( "resize", fn ) : this.trigger( "resize" ); }; jQuery.fn[ "scroll" ] = function( fn ) { /// <summary> /// 1: scroll() - Triggers the scroll event of each matched element. /// 2: scroll(fn) - Binds a function to the scroll event of each matched element. /// </summary> /// <param name="fn" type="Function">The function to execute.</param> /// <returns type="jQuery" /> return fn ? this.bind( "scroll", fn ) : this.trigger( "scroll" ); }; jQuery.fn[ "unload" ] = function( fn ) { /// <summary> /// 1: unload() - Triggers the unload event of each matched element. /// 2: unload(fn) - Binds a function to the unload event of each matched element. /// </summary> /// <param name="fn" type="Function">The function to execute.</param> /// <returns type="jQuery" /> return fn ? this.bind( "unload", fn ) : this.trigger( "unload" ); }; jQuery.fn[ "click" ] = function( fn ) { /// <summary> /// 1: click() - Triggers the click event of each matched element. /// 2: click(fn) - Binds a function to the click event of each matched element. /// </summary> /// <param name="fn" type="Function">The function to execute.</param> /// <returns type="jQuery" /> return fn ? this.bind( "click", fn ) : this.trigger( "click" ); }; jQuery.fn[ "dblclick" ] = function( fn ) { /// <summary> /// 1: dblclick() - Triggers the dblclick event of each matched element. /// 2: dblclick(fn) - Binds a function to the dblclick event of each matched element. /// </summary> /// <param name="fn" type="Function">The function to execute.</param> /// <returns type="jQuery" /> return fn ? this.bind( "dblclick", fn ) : this.trigger( "dblclick" ); }; jQuery.fn[ "mousedown" ] = function( fn ) { /// <summary> /// Binds a function to the mousedown event of each matched element. /// </summary> /// <param name="fn" type="Function">The function to execute.</param> /// <returns type="jQuery" /> return fn ? this.bind( "mousedown", fn ) : this.trigger( "mousedown" ); }; jQuery.fn[ "mouseup" ] = function( fn ) { /// <summary> /// Bind a function to the mouseup event of each matched element. /// </summary> /// <param name="fn" type="Function">The function to execute.</param> /// <returns type="jQuery" /> return fn ? this.bind( "mouseup", fn ) : this.trigger( "mouseup" ); }; jQuery.fn[ "mousemove" ] = function( fn ) { /// <summary> /// Bind a function to the mousemove event of each matched element. /// </summary> /// <param name="fn" type="Function">The function to execute.</param> /// <returns type="jQuery" /> return fn ? this.bind( "mousemove", fn ) : this.trigger( "mousemove" ); }; jQuery.fn[ "mouseover" ] = function( fn ) { /// <summary> /// Bind a function to the mouseover event of each matched element. /// </summary> /// <param name="fn" type="Function">The function to execute.</param> /// <returns type="jQuery" /> return fn ? this.bind( "mouseover", fn ) : this.trigger( "mouseover" ); }; jQuery.fn[ "mouseout" ] = function( fn ) { /// <summary> /// Bind a function to the mouseout event of each matched element. /// </summary> /// <param name="fn" type="Function">The function to execute.</param> /// <returns type="jQuery" /> return fn ? this.bind( "mouseout", fn ) : this.trigger( "mouseout" ); }; jQuery.fn[ "mouseenter" ] = function( fn ) { /// <summary> /// Bind a function to the mouseenter event of each matched element. /// </summary> /// <param name="fn" type="Function">The function to execute.</param> /// <returns type="jQuery" /> return fn ? this.bind( "mouseenter", fn ) : this.trigger( "mouseenter" ); }; jQuery.fn[ "mouseleave" ] = function( fn ) { /// <summary> /// Bind a function to the mouseleave event of each matched element. /// </summary> /// <param name="fn" type="Function">The function to execute.</param> /// <returns type="jQuery" /> return fn ? this.bind( "mouseleave", fn ) : this.trigger( "mouseleave" ); }; jQuery.fn[ "change" ] = function( fn ) { /// <summary> /// 1: change() - Triggers the change event of each matched element. /// 2: change(fn) - Binds a function to the change event of each matched element. /// </summary> /// <param name="fn" type="Function">The function to execute.</param> /// <returns type="jQuery" /> return fn ? this.bind( "change", fn ) : this.trigger( "change" ); }; jQuery.fn[ "select" ] = function( fn ) { /// <summary> /// 1: select() - Triggers the select event of each matched element. /// 2: select(fn) - Binds a function to the select event of each matched element. /// </summary> /// <param name="fn" type="Function">The function to execute.</param> /// <returns type="jQuery" /> return fn ? this.bind( "select", fn ) : this.trigger( "select" ); }; jQuery.fn[ "submit" ] = function( fn ) { /// <summary> /// 1: submit() - Triggers the submit event of each matched element. /// 2: submit(fn) - Binds a function to the submit event of each matched element. /// </summary> /// <param name="fn" type="Function">The function to execute.</param> /// <returns type="jQuery" /> return fn ? this.bind( "submit", fn ) : this.trigger( "submit" ); }; jQuery.fn[ "keydown" ] = function( fn ) { /// <summary> /// 1: keydown() - Triggers the keydown event of each matched element. /// 2: keydown(fn) - Binds a function to the keydown event of each matched element. /// </summary> /// <param name="fn" type="Function">The function to execute.</param> /// <returns type="jQuery" /> return fn ? this.bind( "keydown", fn ) : this.trigger( "keydown" ); }; jQuery.fn[ "keypress" ] = function( fn ) { /// <summary> /// 1: keypress() - Triggers the keypress event of each matched element. /// 2: keypress(fn) - Binds a function to the keypress event of each matched element. /// </summary> /// <param name="fn" type="Function">The function to execute.</param> /// <returns type="jQuery" /> return fn ? this.bind( "keypress", fn ) : this.trigger( "keypress" ); }; jQuery.fn[ "keyup" ] = function( fn ) { /// <summary> /// 1: keyup() - Triggers the keyup event of each matched element. /// 2: keyup(fn) - Binds a function to the keyup event of each matched element. /// </summary> /// <param name="fn" type="Function">The function to execute.</param> /// <returns type="jQuery" /> return fn ? this.bind( "keyup", fn ) : this.trigger( "keyup" ); }; jQuery.fn[ "error" ] = function( fn ) { /// <summary> /// 1: error() - Triggers the error event of each matched element. /// 2: error(fn) - Binds a function to the error event of each matched element. /// </summary> /// <param name="fn" type="Function">The function to execute.</param> /// <returns type="jQuery" /> return fn ? this.bind( "error", fn ) : this.trigger( "error" ); }; // Prevent memory leaks in IE // Window isn't included so as not to unbind existing unload events // More info: // - http://isaacschlueter.com/2006/10/msie-memory-leaks/ if ( window.attachEvent && !window.addEventListener ) { window.attachEvent("onunload", function() { for ( var id in jQuery.cache ) { if ( jQuery.cache[ id ].handle ) { // Try/Catch is to handle iframes being unloaded, see #4280 try { jQuery.event.remove( jQuery.cache[ id ].handle.elem ); } catch(e) {} } } }); } /*! * Sizzle CSS Selector Engine - v1.0 * Copyright 2009, The Dojo Foundation * Released under the MIT, BSD, and GPL Licenses. * More information: http://sizzlejs.com/ */ (function(){ var chunker = /((?:\((?:\([^()]+\)|[^()]+)+\)|\[(?:\[[^[\]]*\]|['"][^'"]*['"]|[^[\]'"]+)+\]|\\.|[^ >+~,(\[\\]+)+|[>+~])(\s*,\s*)?((?:.|\r|\n)*)/g, done = 0, toString = Object.prototype.toString, hasDuplicate = false, baseHasDuplicate = true; // Here we check if the JavaScript engine is using some sort of // optimization where it does not always call our comparision // function. If that is the case, discard the hasDuplicate value. // Thus far that includes Google Chrome. [0, 0].sort(function(){ baseHasDuplicate = false; return 0; }); var Sizzle = function(selector, context, results, seed) { results = results || []; var origContext = context = context || document; if ( context.nodeType !== 1 && context.nodeType !== 9 ) { return []; } if ( !selector || typeof selector !== "string" ) { return results; } var parts = [], m, set, checkSet, extra, prune = true, contextXML = isXML(context), soFar = selector; // Reset the position of the chunker regexp (start from head) while ( (chunker.exec(""), m = chunker.exec(soFar)) !== null ) { soFar = m[3]; parts.push( m[1] ); if ( m[2] ) { extra = m[3]; break; } } if ( parts.length > 1 && origPOS.exec( selector ) ) { if ( parts.length === 2 && Expr.relative[ parts[0] ] ) { set = posProcess( parts[0] + parts[1], context ); } else { set = Expr.relative[ parts[0] ] ? [ context ] : Sizzle( parts.shift(), context ); while ( parts.length ) { selector = parts.shift(); if ( Expr.relative[ selector ] ) { selector += parts.shift(); } set = posProcess( selector, set ); } } } else { // Take a shortcut and set the context if the root selector is an ID // (but not if it'll be faster if the inner selector is an ID) if ( !seed && parts.length > 1 && context.nodeType === 9 && !contextXML && Expr.match.ID.test(parts[0]) && !Expr.match.ID.test(parts[parts.length - 1]) ) { var ret = Sizzle.find( parts.shift(), context, contextXML ); context = ret.expr ? Sizzle.filter( ret.expr, ret.set )[0] : ret.set[0]; } if ( context ) { var ret = seed ? { expr: parts.pop(), set: makeArray(seed) } : Sizzle.find( parts.pop(), parts.length === 1 && (parts[0] === "~" || parts[0] === "+") && context.parentNode ? context.parentNode : context, contextXML ); set = ret.expr ? Sizzle.filter( ret.expr, ret.set ) : ret.set; if ( parts.length > 0 ) { checkSet = makeArray(set); } else { prune = false; } while ( parts.length ) { var cur = parts.pop(), pop = cur; if ( !Expr.relative[ cur ] ) { cur = ""; } else { pop = parts.pop(); } if ( pop == null ) { pop = context; } Expr.relative[ cur ]( checkSet, pop, contextXML ); } } else { checkSet = parts = []; } } if ( !checkSet ) { checkSet = set; } if ( !checkSet ) { Sizzle.error( cur || selector ); } if ( toString.call(checkSet) === "[object Array]" ) { if ( !prune ) { results.push.apply( results, checkSet ); } else if ( context && context.nodeType === 1 ) { for ( var i = 0; checkSet[i] != null; i++ ) { if ( checkSet[i] && (checkSet[i] === true || checkSet[i].nodeType === 1 && contains(context, checkSet[i])) ) { results.push( set[i] ); } } } else { for ( var i = 0; checkSet[i] != null; i++ ) { if ( checkSet[i] && checkSet[i].nodeType === 1 ) { results.push( set[i] ); } } } } else { makeArray( checkSet, results ); } if ( extra ) { Sizzle( extra, origContext, results, seed ); Sizzle.uniqueSort( results ); } return results; }; Sizzle.uniqueSort = function(results){ /// <summary> /// Removes all duplicate elements from an array of elements. /// </summary> /// <param name="array" type="Array&lt;Element&gt;">The array to translate</param> /// <returns type="Array&lt;Element&gt;">The array after translation.</returns> if ( sortOrder ) { hasDuplicate = baseHasDuplicate; results.sort(sortOrder); if ( hasDuplicate ) { for ( var i = 1; i < results.length; i++ ) { if ( results[i] === results[i-1] ) { results.splice(i--, 1); } } } } return results; }; Sizzle.matches = function(expr, set){ return Sizzle(expr, null, null, set); }; Sizzle.find = function(expr, context, isXML){ var set, match; if ( !expr ) { return []; } for ( var i = 0, l = Expr.order.length; i < l; i++ ) { var type = Expr.order[i], match; if ( (match = Expr.leftMatch[ type ].exec( expr )) ) { var left = match[1]; match.splice(1,1); if ( left.substr( left.length - 1 ) !== "\\" ) { match[1] = (match[1] || "").replace(/\\/g, ""); set = Expr.find[ type ]( match, context, isXML ); if ( set != null ) { expr = expr.replace( Expr.match[ type ], "" ); break; } } } } if ( !set ) { set = context.getElementsByTagName("*"); } return {set: set, expr: expr}; }; Sizzle.filter = function(expr, set, inplace, not){ var old = expr, result = [], curLoop = set, match, anyFound, isXMLFilter = set && set[0] && isXML(set[0]); while ( expr && set.length ) { for ( var type in Expr.filter ) { if ( (match = Expr.leftMatch[ type ].exec( expr )) != null && match[2] ) { var filter = Expr.filter[ type ], found, item, left = match[1]; anyFound = false; match.splice(1,1); if ( left.substr( left.length - 1 ) === "\\" ) { continue; } if ( curLoop === result ) { result = []; } if ( Expr.preFilter[ type ] ) { match = Expr.preFilter[ type ]( match, curLoop, inplace, result, not, isXMLFilter ); if ( !match ) { anyFound = found = true; } else if ( match === true ) { continue; } } if ( match ) { for ( var i = 0; (item = curLoop[i]) != null; i++ ) { if ( item ) { found = filter( item, match, i, curLoop ); var pass = not ^ !!found; if ( inplace && found != null ) { if ( pass ) { anyFound = true; } else { curLoop[i] = false; } } else if ( pass ) { result.push( item ); anyFound = true; } } } } if ( found !== undefined ) { if ( !inplace ) { curLoop = result; } expr = expr.replace( Expr.match[ type ], "" ); if ( !anyFound ) { return []; } break; } } } // Improper expression if ( expr === old ) { if ( anyFound == null ) { Sizzle.error( expr ); } else { break; } } old = expr; } return curLoop; }; Sizzle.error = function( msg ) { throw "Syntax error, unrecognized expression: " + msg; }; var Expr = Sizzle.selectors = { order: [ "ID", "NAME", "TAG" ], match: { ID: /#((?:[\w\u00c0-\uFFFF-]|\\.)+)/, CLASS: /\.((?:[\w\u00c0-\uFFFF-]|\\.)+)/, NAME: /\[name=['"]*((?:[\w\u00c0-\uFFFF-]|\\.)+)['"]*\]/, ATTR: /\[\s*((?:[\w\u00c0-\uFFFF-]|\\.)+)\s*(?:(\S?=)\s*(['"]*)(.*?)\3|)\s*\]/, TAG: /^((?:[\w\u00c0-\uFFFF\*-]|\\.)+)/, CHILD: /:(only|nth|last|first)-child(?:\((even|odd|[\dn+-]*)\))?/, POS: /:(nth|eq|gt|lt|first|last|even|odd)(?:\((\d*)\))?(?=[^-]|$)/, PSEUDO: /:((?:[\w\u00c0-\uFFFF-]|\\.)+)(?:\((['"]?)((?:\([^\)]+\)|[^\(\)]*)+)\2\))?/ }, leftMatch: {}, attrMap: { "class": "className", "for": "htmlFor" }, attrHandle: { href: function(elem){ return elem.getAttribute("href"); } }, relative: { "+": function(checkSet, part){ var isPartStr = typeof part === "string", isTag = isPartStr && !/\W/.test(part), isPartStrNotTag = isPartStr && !isTag; if ( isTag ) { part = part.toLowerCase(); } for ( var i = 0, l = checkSet.length, elem; i < l; i++ ) { if ( (elem = checkSet[i]) ) { while ( (elem = elem.previousSibling) && elem.nodeType !== 1 ) {} checkSet[i] = isPartStrNotTag || elem && elem.nodeName.toLowerCase() === part ? elem || false : elem === part; } } if ( isPartStrNotTag ) { Sizzle.filter( part, checkSet, true ); } }, ">": function(checkSet, part){ var isPartStr = typeof part === "string"; if ( isPartStr && !/\W/.test(part) ) { part = part.toLowerCase(); for ( var i = 0, l = checkSet.length; i < l; i++ ) { var elem = checkSet[i]; if ( elem ) { var parent = elem.parentNode; checkSet[i] = parent.nodeName.toLowerCase() === part ? parent : false; } } } else { for ( var i = 0, l = checkSet.length; i < l; i++ ) { var elem = checkSet[i]; if ( elem ) { checkSet[i] = isPartStr ? elem.parentNode : elem.parentNode === part; } } if ( isPartStr ) { Sizzle.filter( part, checkSet, true ); } } }, "": function(checkSet, part, isXML){ var doneName = done++, checkFn = dirCheck; if ( typeof part === "string" && !/\W/.test(part) ) { var nodeCheck = part = part.toLowerCase(); checkFn = dirNodeCheck; } checkFn("parentNode", part, doneName, checkSet, nodeCheck, isXML); }, "~": function(checkSet, part, isXML){ var doneName = done++, checkFn = dirCheck; if ( typeof part === "string" && !/\W/.test(part) ) { var nodeCheck = part = part.toLowerCase(); checkFn = dirNodeCheck; } checkFn("previousSibling", part, doneName, checkSet, nodeCheck, isXML); } }, find: { ID: function(match, context, isXML){ if ( typeof context.getElementById !== "undefined" && !isXML ) { var m = context.getElementById(match[1]); return m ? [m] : []; } }, NAME: function(match, context){ if ( typeof context.getElementsByName !== "undefined" ) { var ret = [], results = context.getElementsByName(match[1]); for ( var i = 0, l = results.length; i < l; i++ ) { if ( results[i].getAttribute("name") === match[1] ) { ret.push( results[i] ); } } return ret.length === 0 ? null : ret; } }, TAG: function(match, context){ return context.getElementsByTagName(match[1]); } }, preFilter: { CLASS: function(match, curLoop, inplace, result, not, isXML){ match = " " + match[1].replace(/\\/g, "") + " "; if ( isXML ) { return match; } for ( var i = 0, elem; (elem = curLoop[i]) != null; i++ ) { if ( elem ) { if ( not ^ (elem.className && (" " + elem.className + " ").replace(/[\t\n]/g, " ").indexOf(match) >= 0) ) { if ( !inplace ) { result.push( elem ); } } else if ( inplace ) { curLoop[i] = false; } } } return false; }, ID: function(match){ return match[1].replace(/\\/g, ""); }, TAG: function(match, curLoop){ return match[1].toLowerCase(); }, CHILD: function(match){ if ( match[1] === "nth" ) { // parse equations like 'even', 'odd', '5', '2n', '3n+2', '4n-1', '-n+6' var test = /(-?)(\d*)n((?:\+|-)?\d*)/.exec( match[2] === "even" && "2n" || match[2] === "odd" && "2n+1" || !/\D/.test( match[2] ) && "0n+" + match[2] || match[2]); // calculate the numbers (first)n+(last) including if they are negative match[2] = (test[1] + (test[2] || 1)) - 0; match[3] = test[3] - 0; } // TODO: Move to normal caching system match[0] = done++; return match; }, ATTR: function(match, curLoop, inplace, result, not, isXML){ var name = match[1].replace(/\\/g, ""); if ( !isXML && Expr.attrMap[name] ) { match[1] = Expr.attrMap[name]; } if ( match[2] === "~=" ) { match[4] = " " + match[4] + " "; } return match; }, PSEUDO: function(match, curLoop, inplace, result, not){ if ( match[1] === "not" ) { // If we're dealing with a complex expression, or a simple one if ( ( chunker.exec(match[3]) || "" ).length > 1 || /^\w/.test(match[3]) ) { match[3] = Sizzle(match[3], null, null, curLoop); } else { var ret = Sizzle.filter(match[3], curLoop, inplace, true ^ not); if ( !inplace ) { result.push.apply( result, ret ); } return false; } } else if ( Expr.match.POS.test( match[0] ) || Expr.match.CHILD.test( match[0] ) ) { return true; } return match; }, POS: function(match){ match.unshift( true ); return match; } }, filters: { enabled: function(elem){ return elem.disabled === false && elem.type !== "hidden"; }, disabled: function(elem){ return elem.disabled === true; }, checked: function(elem){ return elem.checked === true; }, selected: function(elem){ // Accessing this property makes selected-by-default // options in Safari work properly elem.parentNode.selectedIndex; return elem.selected === true; }, parent: function(elem){ return !!elem.firstChild; }, empty: function(elem){ return !elem.firstChild; }, has: function(elem, i, match){ /// <summary> /// Internal use only; use hasClass('class') /// </summary> /// <private /> return !!Sizzle( match[3], elem ).length; }, header: function(elem){ return /h\d/i.test( elem.nodeName ); }, text: function(elem){ return "text" === elem.type; }, radio: function(elem){ return "radio" === elem.type; }, checkbox: function(elem){ return "checkbox" === elem.type; }, file: function(elem){ return "file" === elem.type; }, password: function(elem){ return "password" === elem.type; }, submit: function(elem){ return "submit" === elem.type; }, image: function(elem){ return "image" === elem.type; }, reset: function(elem){ return "reset" === elem.type; }, button: function(elem){ return "button" === elem.type || elem.nodeName.toLowerCase() === "button"; }, input: function(elem){ return /input|select|textarea|button/i.test(elem.nodeName); } }, setFilters: { first: function(elem, i){ return i === 0; }, last: function(elem, i, match, array){ return i === array.length - 1; }, even: function(elem, i){ return i % 2 === 0; }, odd: function(elem, i){ return i % 2 === 1; }, lt: function(elem, i, match){ return i < match[3] - 0; }, gt: function(elem, i, match){ return i > match[3] - 0; }, nth: function(elem, i, match){ return match[3] - 0 === i; }, eq: function(elem, i, match){ return match[3] - 0 === i; } }, filter: { PSEUDO: function(elem, match, i, array){ var name = match[1], filter = Expr.filters[ name ]; if ( filter ) { return filter( elem, i, match, array ); } else if ( name === "contains" ) { return (elem.textContent || elem.innerText || getText([ elem ]) || "").indexOf(match[3]) >= 0; } else if ( name === "not" ) { var not = match[3]; for ( var i = 0, l = not.length; i < l; i++ ) { if ( not[i] === elem ) { return false; } } return true; } else { Sizzle.error( "Syntax error, unrecognized expression: " + name ); } }, CHILD: function(elem, match){ var type = match[1], node = elem; switch (type) { case 'only': case 'first': while ( (node = node.previousSibling) ) { if ( node.nodeType === 1 ) { return false; } } if ( type === "first" ) { return true; } node = elem; case 'last': while ( (node = node.nextSibling) ) { if ( node.nodeType === 1 ) { return false; } } return true; case 'nth': var first = match[2], last = match[3]; if ( first === 1 && last === 0 ) { return true; } var doneName = match[0], parent = elem.parentNode; if ( parent && (parent.sizcache !== doneName || !elem.nodeIndex) ) { var count = 0; for ( node = parent.firstChild; node; node = node.nextSibling ) { if ( node.nodeType === 1 ) { node.nodeIndex = ++count; } } parent.sizcache = doneName; } var diff = elem.nodeIndex - last; if ( first === 0 ) { return diff === 0; } else { return ( diff % first === 0 && diff / first >= 0 ); } } }, ID: function(elem, match){ return elem.nodeType === 1 && elem.getAttribute("id") === match; }, TAG: function(elem, match){ return (match === "*" && elem.nodeType === 1) || elem.nodeName.toLowerCase() === match; }, CLASS: function(elem, match){ return (" " + (elem.className || elem.getAttribute("class")) + " ") .indexOf( match ) > -1; }, ATTR: function(elem, match){ var name = match[1], result = Expr.attrHandle[ name ] ? Expr.attrHandle[ name ]( elem ) : elem[ name ] != null ? elem[ name ] : elem.getAttribute( name ), value = result + "", type = match[2], check = match[4]; return result == null ? type === "!=" : type === "=" ? value === check : type === "*=" ? value.indexOf(check) >= 0 : type === "~=" ? (" " + value + " ").indexOf(check) >= 0 : !check ? value && result !== false : type === "!=" ? value !== check : type === "^=" ? value.indexOf(check) === 0 : type === "$=" ? value.substr(value.length - check.length) === check : type === "|=" ? value === check || value.substr(0, check.length + 1) === check + "-" : false; }, POS: function(elem, match, i, array){ var name = match[2], filter = Expr.setFilters[ name ]; if ( filter ) { return filter( elem, i, match, array ); } } } }; var origPOS = Expr.match.POS; for ( var type in Expr.match ) { Expr.match[ type ] = new RegExp( Expr.match[ type ].source + /(?![^\[]*\])(?![^\(]*\))/.source ); Expr.leftMatch[ type ] = new RegExp( /(^(?:.|\r|\n)*?)/.source + Expr.match[ type ].source.replace(/\\(\d+)/g, function(all, num){ return "\\" + (num - 0 + 1); })); } var makeArray = function(array, results) { array = Array.prototype.slice.call( array, 0 ); if ( results ) { results.push.apply( results, array ); return results; } return array; }; // Perform a simple check to determine if the browser is capable of // converting a NodeList to an array using builtin methods. try { Array.prototype.slice.call( document.documentElement.childNodes, 0 ); // Provide a fallback method if it does not work } catch(e){ makeArray = function(array, results) { var ret = results || []; if ( toString.call(array) === "[object Array]" ) { Array.prototype.push.apply( ret, array ); } else { if ( typeof array.length === "number" ) { for ( var i = 0, l = array.length; i < l; i++ ) { ret.push( array[i] ); } } else { for ( var i = 0; array[i]; i++ ) { ret.push( array[i] ); } } } return ret; }; } var sortOrder; if ( document.documentElement.compareDocumentPosition ) { sortOrder = function( a, b ) { if ( !a.compareDocumentPosition || !b.compareDocumentPosition ) { if ( a == b ) { hasDuplicate = true; } return a.compareDocumentPosition ? -1 : 1; } var ret = a.compareDocumentPosition(b) & 4 ? -1 : a === b ? 0 : 1; if ( ret === 0 ) { hasDuplicate = true; } return ret; }; } else if ( "sourceIndex" in document.documentElement ) { sortOrder = function( a, b ) { if ( !a.sourceIndex || !b.sourceIndex ) { if ( a == b ) { hasDuplicate = true; } return a.sourceIndex ? -1 : 1; } var ret = a.sourceIndex - b.sourceIndex; if ( ret === 0 ) { hasDuplicate = true; } return ret; }; } else if ( document.createRange ) { sortOrder = function( a, b ) { if ( !a.ownerDocument || !b.ownerDocument ) { if ( a == b ) { hasDuplicate = true; } return a.ownerDocument ? -1 : 1; } var aRange = a.ownerDocument.createRange(), bRange = b.ownerDocument.createRange(); aRange.setStart(a, 0); aRange.setEnd(a, 0); bRange.setStart(b, 0); bRange.setEnd(b, 0); var ret = aRange.compareBoundaryPoints(Range.START_TO_END, bRange); if ( ret === 0 ) { hasDuplicate = true; } return ret; }; } // Utility function for retreiving the text value of an array of DOM nodes function getText( elems ) { var ret = "", elem; for ( var i = 0; elems[i]; i++ ) { elem = elems[i]; // Get the text from text nodes and CDATA nodes if ( elem.nodeType === 3 || elem.nodeType === 4 ) { ret += elem.nodeValue; // Traverse everything else, except comment nodes } else if ( elem.nodeType !== 8 ) { ret += getText( elem.childNodes ); } } return ret; } // [vsdoc] The following function has been modified for IntelliSense. // Check to see if the browser returns elements by name when // querying by getElementById (and provide a workaround) (function(){ // We're going to inject a fake input element with a specified name // var form = document.createElement("div"), // id = "script" + (new Date).getTime(); // form.innerHTML = "<a name='" + id + "'/>"; // // Inject it into the root element, check its status, and remove it quickly // var root = document.documentElement; // root.insertBefore( form, root.firstChild ); // The workaround has to do additional checks after a getElementById // Which slows things down for other browsers (hence the branching) // if ( document.getElementById( id ) ) { Expr.find.ID = function(match, context, isXML){ if ( typeof context.getElementById !== "undefined" && !isXML ) { var m = context.getElementById(match[1]); return m ? m.id === match[1] || typeof m.getAttributeNode !== "undefined" && m.getAttributeNode("id").nodeValue === match[1] ? [m] : undefined : []; } }; Expr.filter.ID = function(elem, match){ var node = typeof elem.getAttributeNode !== "undefined" && elem.getAttributeNode("id"); return elem.nodeType === 1 && node && node.nodeValue === match; }; // } // root.removeChild( form ); root = form = null; // release memory in IE })(); // [vsdoc] The following function has been modified for IntelliSense. (function(){ // Check to see if the browser returns only elements // when doing getElementsByTagName("*") // Create a fake element // var div = document.createElement("div"); // div.appendChild( document.createComment("") ); // Make sure no comments are found // if ( div.getElementsByTagName("*").length > 0 ) { Expr.find.TAG = function(match, context){ var results = context.getElementsByTagName(match[1]); // Filter out possible comments if ( match[1] === "*" ) { var tmp = []; for ( var i = 0; results[i]; i++ ) { if ( results[i].nodeType === 1 ) { tmp.push( results[i] ); } } results = tmp; } return results; }; // } // Check to see if an attribute returns normalized href attributes // div.innerHTML = "<a href='#'></a>"; // if ( div.firstChild && typeof div.firstChild.getAttribute !== "undefined" && // div.firstChild.getAttribute("href") !== "#" ) { Expr.attrHandle.href = function(elem){ return elem.getAttribute("href", 2); }; // } div = null; // release memory in IE })(); if ( document.querySelectorAll ) { (function(){ var oldSizzle = Sizzle, div = document.createElement("div"); div.innerHTML = "<p class='TEST'></p>"; // Safari can't handle uppercase or unicode characters when // in quirks mode. if ( div.querySelectorAll && div.querySelectorAll(".TEST").length === 0 ) { return; } Sizzle = function(query, context, extra, seed){ context = context || document; // Only use querySelectorAll on non-XML documents // (ID selectors don't work in non-HTML documents) if ( !seed && context.nodeType === 9 && !isXML(context) ) { try { return makeArray( context.querySelectorAll(query), extra ); } catch(e){} } return oldSizzle(query, context, extra, seed); }; for ( var prop in oldSizzle ) { Sizzle[ prop ] = oldSizzle[ prop ]; } div = null; // release memory in IE })(); } (function(){ var div = document.createElement("div"); div.innerHTML = "<div class='test e'></div><div class='test'></div>"; // Opera can't find a second classname (in 9.6) // Also, make sure that getElementsByClassName actually exists if ( !div.getElementsByClassName || div.getElementsByClassName("e").length === 0 ) { return; } // Safari caches class attributes, doesn't catch changes (in 3.2) div.lastChild.className = "e"; if ( div.getElementsByClassName("e").length === 1 ) { return; } Expr.order.splice(1, 0, "CLASS"); Expr.find.CLASS = function(match, context, isXML) { if ( typeof context.getElementsByClassName !== "undefined" && !isXML ) { return context.getElementsByClassName(match[1]); } }; div = null; // release memory in IE })(); function dirNodeCheck( dir, cur, doneName, checkSet, nodeCheck, isXML ) { for ( var i = 0, l = checkSet.length; i < l; i++ ) { var elem = checkSet[i]; if ( elem ) { elem = elem[dir]; var match = false; while ( elem ) { if ( elem.sizcache === doneName ) { match = checkSet[elem.sizset]; break; } if ( elem.nodeType === 1 && !isXML ){ elem.sizcache = doneName; elem.sizset = i; } if ( elem.nodeName.toLowerCase() === cur ) { match = elem; break; } elem = elem[dir]; } checkSet[i] = match; } } } function dirCheck( dir, cur, doneName, checkSet, nodeCheck, isXML ) { for ( var i = 0, l = checkSet.length; i < l; i++ ) { var elem = checkSet[i]; if ( elem ) { elem = elem[dir]; var match = false; while ( elem ) { if ( elem.sizcache === doneName ) { match = checkSet[elem.sizset]; break; } if ( elem.nodeType === 1 ) { if ( !isXML ) { elem.sizcache = doneName; elem.sizset = i; } if ( typeof cur !== "string" ) { if ( elem === cur ) { match = true; break; } } else if ( Sizzle.filter( cur, [elem] ).length > 0 ) { match = elem; break; } } elem = elem[dir]; } checkSet[i] = match; } } } var contains = document.compareDocumentPosition ? function(a, b){ /// <summary> /// Check to see if a DOM node is within another DOM node. /// </summary> /// <param name="a" type="Object"> /// The DOM element that may contain the other element. /// </param> /// <param name="b" type="Object"> /// The DOM node that may be contained by the other element. /// </param> /// <returns type="Boolean" /> return a.compareDocumentPosition(b) & 16; } : function(a, b){ /// <summary> /// Check to see if a DOM node is within another DOM node. /// </summary> /// <param name="a" type="Object"> /// The DOM element that may contain the other element. /// </param> /// <param name="b" type="Object"> /// The DOM node that may be contained by the other element. /// </param> /// <returns type="Boolean" /> return a !== b && (a.contains ? a.contains(b) : true); }; var isXML = function(elem){ /// <summary> /// Determines if the parameter passed is an XML document. /// </summary> /// <param name="elem" type="Object">The object to test</param> /// <returns type="Boolean">True if the parameter is an XML document; otherwise false.</returns> // documentElement is verified for cases where it doesn't yet exist // (such as loading iframes in IE - #4833) var documentElement = (elem ? elem.ownerDocument || elem : 0).documentElement; return documentElement ? documentElement.nodeName !== "HTML" : false; }; var posProcess = function(selector, context){ var tmpSet = [], later = "", match, root = context.nodeType ? [context] : context; // Position selectors must be done after the filter // And so must :not(positional) so we move all PSEUDOs to the end while ( (match = Expr.match.PSEUDO.exec( selector )) ) { later += match[0]; selector = selector.replace( Expr.match.PSEUDO, "" ); } selector = Expr.relative[selector] ? selector + "*" : selector; for ( var i = 0, l = root.length; i < l; i++ ) { Sizzle( selector, root[i], tmpSet ); } return Sizzle.filter( later, tmpSet ); }; // EXPOSE jQuery.find = Sizzle; jQuery.expr = Sizzle.selectors; jQuery.expr[":"] = jQuery.expr.filters; jQuery.unique = Sizzle.uniqueSort; jQuery.getText = getText; jQuery.isXMLDoc = isXML; jQuery.contains = contains; return; window.Sizzle = Sizzle; })(); var runtil = /Until$/, rparentsprev = /^(?:parents|prevUntil|prevAll)/, // Note: This RegExp should be improved, or likely pulled from Sizzle rmultiselector = /,/, slice = Array.prototype.slice; // Implement the identical functionality for filter and not var winnow = function( elements, qualifier, keep ) { if ( jQuery.isFunction( qualifier ) ) { return jQuery.grep(elements, function( elem, i ) { return !!qualifier.call( elem, i, elem ) === keep; }); } else if ( qualifier.nodeType ) { return jQuery.grep(elements, function( elem, i ) { return (elem === qualifier) === keep; }); } else if ( typeof qualifier === "string" ) { var filtered = jQuery.grep(elements, function( elem ) { return elem.nodeType === 1; }); if ( isSimple.test( qualifier ) ) { return jQuery.filter(qualifier, filtered, !keep); } else { qualifier = jQuery.filter( qualifier, filtered ); } } return jQuery.grep(elements, function( elem, i ) { return (jQuery.inArray( elem, qualifier ) >= 0) === keep; }); }; jQuery.fn.extend({ find: function( selector ) { /// <summary> /// Searches for all elements that match the specified expression. /// This method is a good way to find additional descendant /// elements with which to process. /// All searching is done using a jQuery expression. The expression can be /// written using CSS 1-3 Selector syntax, or basic XPath. /// Part of DOM/Traversing /// </summary> /// <returns type="jQuery" /> /// <param name="selector" type="String"> /// An expression to search with. /// </param> /// <returns type="jQuery" /> var ret = this.pushStack( "", "find", selector ), length = 0; for ( var i = 0, l = this.length; i < l; i++ ) { length = ret.length; jQuery.find( selector, this[i], ret ); if ( i > 0 ) { // Make sure that the results are unique for ( var n = length; n < ret.length; n++ ) { for ( var r = 0; r < length; r++ ) { if ( ret[r] === ret[n] ) { ret.splice(n--, 1); break; } } } } } return ret; }, has: function( target ) { /// <summary> /// Reduce the set of matched elements to those that have a descendant that matches the /// selector or DOM element. /// </summary> /// <param name="target" type="String"> /// A string containing a selector expression to match elements against. /// </param> /// <returns type="jQuery" /> var targets = jQuery( target ); return this.filter(function() { for ( var i = 0, l = targets.length; i < l; i++ ) { if ( jQuery.contains( this, targets[i] ) ) { return true; } } }); }, not: function( selector ) { /// <summary> /// Removes any elements inside the array of elements from the set /// of matched elements. This method is used to remove one or more /// elements from a jQuery object. /// Part of DOM/Traversing /// </summary> /// <param name="selector" type="jQuery"> /// A set of elements to remove from the jQuery set of matched elements. /// </param> /// <returns type="jQuery" /> return this.pushStack( winnow(this, selector, false), "not", selector); }, filter: function( selector ) { /// <summary> /// Removes all elements from the set of matched elements that do not /// pass the specified filter. This method is used to narrow down /// the results of a search. /// }) /// Part of DOM/Traversing /// </summary> /// <returns type="jQuery" /> /// <param name="selector" type="Function"> /// A function to use for filtering /// </param> /// <returns type="jQuery" /> return this.pushStack( winnow(this, selector, true), "filter", selector ); }, is: function( selector ) { /// <summary> /// Checks the current selection against an expression and returns true, /// if at least one element of the selection fits the given expression. /// Does return false, if no element fits or the expression is not valid. /// filter(String) is used internally, therefore all rules that apply there /// apply here, too. /// Part of DOM/Traversing /// </summary> /// <returns type="Boolean" /> /// <param name="expr" type="String"> /// The expression with which to filter /// </param> return !!selector && jQuery.filter( selector, this ).length > 0; }, closest: function( selectors, context ) { /// <summary> /// Get a set of elements containing the closest parent element that matches the specified selector, the starting element included. /// </summary> /// <param name="selectors" type="String"> /// A string containing a selector expression to match elements against. /// </param> /// <param name="context" type="Element"> /// A DOM element within which a matching element may be found. If no context is passed /// in then the context of the jQuery set will be used instead. /// </param> /// <returns type="jQuery" /> if ( jQuery.isArray( selectors ) ) { var ret = [], cur = this[0], match, matches = {}, selector; if ( cur && selectors.length ) { for ( var i = 0, l = selectors.length; i < l; i++ ) { selector = selectors[i]; if ( !matches[selector] ) { matches[selector] = jQuery.expr.match.POS.test( selector ) ? jQuery( selector, context || this.context ) : selector; } } while ( cur && cur.ownerDocument && cur !== context ) { for ( selector in matches ) { match = matches[selector]; if ( match.jquery ? match.index(cur) > -1 : jQuery(cur).is(match) ) { ret.push({ selector: selector, elem: cur }); delete matches[selector]; } } cur = cur.parentNode; } } return ret; } var pos = jQuery.expr.match.POS.test( selectors ) ? jQuery( selectors, context || this.context ) : null; return this.map(function( i, cur ) { while ( cur && cur.ownerDocument && cur !== context ) { if ( pos ? pos.index(cur) > -1 : jQuery(cur).is(selectors) ) { return cur; } cur = cur.parentNode; } return null; }); }, // Determine the position of an element within // the matched set of elements index: function( elem ) { /// <summary> /// Searches every matched element for the object and returns /// the index of the element, if found, starting with zero. /// Returns -1 if the object wasn't found. /// Part of Core /// </summary> /// <returns type="Number" /> /// <param name="elem" type="Element"> /// Object to search for /// </param> if ( !elem || typeof elem === "string" ) { return jQuery.inArray( this[0], // If it receives a string, the selector is used // If it receives nothing, the siblings are used elem ? jQuery( elem ) : this.parent().children() ); } // Locate the position of the desired element return jQuery.inArray( // If it receives a jQuery object, the first element is used elem.jquery ? elem[0] : elem, this ); }, add: function( selector, context ) { /// <summary> /// Adds one or more Elements to the set of matched elements. /// Part of DOM/Traversing /// </summary> /// <param name="selector" type="String"> /// A string containing a selector expression to match additional elements against. /// </param> /// <param name="context" type="Element"> /// Add some elements rooted against the specified context. /// </param> /// <returns type="jQuery" /> var set = typeof selector === "string" ? jQuery( selector, context || this.context ) : jQuery.makeArray( selector ), all = jQuery.merge( this.get(), set ); return this.pushStack( isDisconnected( set[0] ) || isDisconnected( all[0] ) ? all : jQuery.unique( all ) ); }, andSelf: function() { /// <summary> /// Adds the previous selection to the current selection. /// </summary> /// <returns type="jQuery" /> return this.add( this.prevObject ); } }); // A painfully simple check to see if an element is disconnected // from a document (should be improved, where feasible). function isDisconnected( node ) { return !node || !node.parentNode || node.parentNode.nodeType === 11; } jQuery.each({ parent: function( elem ) { var parent = elem.parentNode; return parent && parent.nodeType !== 11 ? parent : null; }, parents: function( elem ) { return jQuery.dir( elem, "parentNode" ); }, next: function( elem ) { return jQuery.nth( elem, 2, "nextSibling" ); }, prev: function( elem ) { return jQuery.nth( elem, 2, "previousSibling" ); }, nextAll: function( elem ) { return jQuery.dir( elem, "nextSibling" ); }, prevAll: function( elem ) { return jQuery.dir( elem, "previousSibling" ); }, siblings: function( elem ) { return jQuery.sibling( elem.parentNode.firstChild, elem ); }, children: function( elem ) { return jQuery.sibling( elem.firstChild ); }, contents: function( elem ) { return jQuery.nodeName( elem, "iframe" ) ? elem.contentDocument || elem.contentWindow.document : jQuery.makeArray( elem.childNodes ); } }, function( name, fn ) { jQuery.fn[ name ] = function( until, selector ) { var ret = jQuery.map( this, fn, until ); if ( !runtil.test( name ) ) { selector = until; } if ( selector && typeof selector === "string" ) { ret = jQuery.filter( selector, ret ); } ret = this.length > 1 ? jQuery.unique( ret ) : ret; if ( (this.length > 1 || rmultiselector.test( selector )) && rparentsprev.test( name ) ) { ret = ret.reverse(); } return this.pushStack( ret, name, slice.call(arguments).join(",") ); }; }); jQuery.fn[ "parentsUntil" ] = function( until, selector ) { /// <summary> /// Get the ancestors of each element in the current set of matched elements, up to but not /// including the element matched by the selector. /// </summary> /// <param name="until" type="String"> /// A string containing a selector expression to indicate where to stop matching ancestor /// elements. /// </param> /// <returns type="jQuery" /> var fn = function( elem, i, until ) { return jQuery.dir( elem, "parentNode", until ); } var ret = jQuery.map( this, fn, until ); if ( !runtil.test( "parentsUntil" ) ) { selector = until; } if ( selector && typeof selector === "string" ) { ret = jQuery.filter( selector, ret ); } ret = this.length > 1 ? jQuery.unique( ret ) : ret; if ( (this.length > 1 || rmultiselector.test( selector )) && rparentsprev.test( "parentsUntil" ) ) { ret = ret.reverse(); } return this.pushStack( ret, "parentsUntil", slice.call(arguments).join(",") ); }; jQuery.fn[ "nextUntil" ] = function( until, selector ) { /// <summary> /// Get all following siblings of each element up to but not including the element matched /// by the selector. /// </summary> /// <param name="until" type="String"> /// A string containing a selector expression to indicate where to stop matching following /// sibling elements. /// </param> /// <returns type="jQuery" /> var fn = function( elem, i, until ) { return jQuery.dir( elem, "nextSibling", until ); } var ret = jQuery.map( this, fn, until ); if ( !runtil.test( "nextUntil" ) ) { selector = until; } if ( selector && typeof selector === "string" ) { ret = jQuery.filter( selector, ret ); } ret = this.length > 1 ? jQuery.unique( ret ) : ret; if ( (this.length > 1 || rmultiselector.test( selector )) && rparentsprev.test( "nextUntil" ) ) { ret = ret.reverse(); } return this.pushStack( ret, "nextUntil", slice.call(arguments).join(",") ); }; jQuery.fn[ "prevUntil" ] = function( until, selector ) { /// <summary> /// Get all preceding siblings of each element up to but not including the element matched /// by the selector. /// </summary> /// <param name="until" type="String"> /// A string containing a selector expression to indicate where to stop matching preceding /// sibling elements. /// </param> /// <returns type="jQuery" /> var fn = function( elem, i, until ) { return jQuery.dir( elem, "previousSibling", until ); } var ret = jQuery.map( this, fn, until ); if ( !runtil.test( "prevUntil" ) ) { selector = until; } if ( selector && typeof selector === "string" ) { ret = jQuery.filter( selector, ret ); } ret = this.length > 1 ? jQuery.unique( ret ) : ret; if ( (this.length > 1 || rmultiselector.test( selector )) && rparentsprev.test( "prevUntil" ) ) { ret = ret.reverse(); } return this.pushStack( ret, "prevUntil", slice.call(arguments).join(",") ); }; jQuery.extend({ filter: function( expr, elems, not ) { if ( not ) { expr = ":not(" + expr + ")"; } return jQuery.find.matches(expr, elems); }, dir: function( elem, dir, until ) { /// <summary> /// This member is internal only. /// </summary> /// <private /> var matched = [], cur = elem[dir]; while ( cur && cur.nodeType !== 9 && (until === undefined || cur.nodeType !== 1 || !jQuery( cur ).is( until )) ) { if ( cur.nodeType === 1 ) { matched.push( cur ); } cur = cur[dir]; } return matched; }, nth: function( cur, result, dir, elem ) { /// <summary> /// This member is internal only. /// </summary> /// <private /> result = result || 1; var num = 0; for ( ; cur; cur = cur[dir] ) { if ( cur.nodeType === 1 && ++num === result ) { break; } } return cur; }, sibling: function( n, elem ) { /// <summary> /// This member is internal only. /// </summary> /// <private /> var r = []; for ( ; n; n = n.nextSibling ) { if ( n.nodeType === 1 && n !== elem ) { r.push( n ); } } return r; } }); var rinlinejQuery = / jQuery\d+="(?:\d+|null)"/g, rleadingWhitespace = /^\s+/, rxhtmlTag = /(<([\w:]+)[^>]*?)\/>/g, rselfClosing = /^(?:area|br|col|embed|hr|img|input|link|meta|param)$/i, rtagName = /<([\w:]+)/, rtbody = /<tbody/i, rhtml = /<|&\w+;/, rchecked = /checked\s*(?:[^=]|=\s*.checked.)/i, // checked="checked" or checked (html5) fcloseTag = function( all, front, tag ) { return rselfClosing.test( tag ) ? all : front + "></" + tag + ">"; }, wrapMap = { option: [ 1, "<select multiple='multiple'>", "</select>" ], legend: [ 1, "<fieldset>", "</fieldset>" ], thead: [ 1, "<table>", "</table>" ], tr: [ 2, "<table><tbody>", "</tbody></table>" ], td: [ 3, "<table><tbody><tr>", "</tr></tbody></table>" ], col: [ 2, "<table><tbody></tbody><colgroup>", "</colgroup></table>" ], area: [ 1, "<map>", "</map>" ], _default: [ 0, "", "" ] }; wrapMap.optgroup = wrapMap.option; wrapMap.tbody = wrapMap.tfoot = wrapMap.colgroup = wrapMap.caption = wrapMap.thead; wrapMap.th = wrapMap.td; // IE can't serialize <link> and <script> tags normally if ( !jQuery.support.htmlSerialize ) { wrapMap._default = [ 1, "div<div>", "</div>" ]; } jQuery.fn.extend({ text: function( text ) { /// <summary> /// Set the text contents of all matched elements. /// Similar to html(), but escapes HTML (replace &quot;&lt;&quot; and &quot;&gt;&quot; with their /// HTML entities). /// Part of DOM/Attributes /// </summary> /// <returns type="jQuery" /> /// <param name="text" type="String"> /// The text value to set the contents of the element to. /// </param> if ( jQuery.isFunction(text) ) { return this.each(function(i) { var self = jQuery(this); self.text( text.call(this, i, self.text()) ); }); } if ( typeof text !== "object" && text !== undefined ) { return this.empty().append( (this[0] && this[0].ownerDocument || document).createTextNode( text ) ); } return jQuery.getText( this ); }, wrapAll: function( html ) { /// <summary> /// Wrap all matched elements with a structure of other elements. /// This wrapping process is most useful for injecting additional /// stucture into a document, without ruining the original semantic /// qualities of a document. /// This works by going through the first element /// provided and finding the deepest ancestor element within its /// structure - it is that element that will en-wrap everything else. /// This does not work with elements that contain text. Any necessary text /// must be added after the wrapping is done. /// Part of DOM/Manipulation /// </summary> /// <returns type="jQuery" /> /// <param name="html" type="Element"> /// A DOM element that will be wrapped around the target. /// </param> if ( jQuery.isFunction( html ) ) { return this.each(function(i) { jQuery(this).wrapAll( html.call(this, i) ); }); } if ( this[0] ) { // The elements to wrap the target around var wrap = jQuery( html, this[0].ownerDocument ).eq(0).clone(true); if ( this[0].parentNode ) { wrap.insertBefore( this[0] ); } wrap.map(function() { var elem = this; while ( elem.firstChild && elem.firstChild.nodeType === 1 ) { elem = elem.firstChild; } return elem; }).append(this); } return this; }, wrapInner: function( html ) { /// <summary> /// Wraps the inner child contents of each matched elemenht (including text nodes) with an HTML structure. /// </summary> /// <param name="html" type="String"> /// A string of HTML or a DOM element that will be wrapped around the target contents. /// </param> /// <returns type="jQuery" /> if ( jQuery.isFunction( html ) ) { return this.each(function(i) { jQuery(this).wrapInner( html.call(this, i) ); }); } return this.each(function() { var self = jQuery( this ), contents = self.contents(); if ( contents.length ) { contents.wrapAll( html ); } else { self.append( html ); } }); }, wrap: function( html ) { /// <summary> /// Wrap all matched elements with a structure of other elements. /// This wrapping process is most useful for injecting additional /// stucture into a document, without ruining the original semantic /// qualities of a document. /// This works by going through the first element /// provided and finding the deepest ancestor element within its /// structure - it is that element that will en-wrap everything else. /// This does not work with elements that contain text. Any necessary text /// must be added after the wrapping is done. /// Part of DOM/Manipulation /// </summary> /// <returns type="jQuery" /> /// <param name="html" type="Element"> /// A DOM element that will be wrapped around the target. /// </param> return this.each(function() { jQuery( this ).wrapAll( html ); }); }, unwrap: function() { /// <summary> /// Remove the parents of the set of matched elements from the DOM, leaving the matched /// elements in their place. /// </summary> /// <returns type="jQuery" /> return this.parent().each(function() { if ( !jQuery.nodeName( this, "body" ) ) { jQuery( this ).replaceWith( this.childNodes ); } }).end(); }, append: function() { /// <summary> /// Append content to the inside of every matched element. /// This operation is similar to doing an appendChild to all the /// specified elements, adding them into the document. /// Part of DOM/Manipulation /// </summary> /// <returns type="jQuery" /> return this.domManip(arguments, true, function( elem ) { if ( this.nodeType === 1 ) { this.appendChild( elem ); } }); }, prepend: function() { /// <summary> /// Prepend content to the inside of every matched element. /// This operation is the best way to insert elements /// inside, at the beginning, of all matched elements. /// Part of DOM/Manipulation /// </summary> /// <returns type="jQuery" /> return this.domManip(arguments, true, function( elem ) { if ( this.nodeType === 1 ) { this.insertBefore( elem, this.firstChild ); } }); }, before: function() { /// <summary> /// Insert content before each of the matched elements. /// Part of DOM/Manipulation /// </summary> /// <returns type="jQuery" /> if ( this[0] && this[0].parentNode ) { return this.domManip(arguments, false, function( elem ) { this.parentNode.insertBefore( elem, this ); }); } else if ( arguments.length ) { var set = jQuery(arguments[0]); set.push.apply( set, this.toArray() ); return this.pushStack( set, "before", arguments ); } }, after: function() { /// <summary> /// Insert content after each of the matched elements. /// Part of DOM/Manipulation /// </summary> /// <returns type="jQuery" /> if ( this[0] && this[0].parentNode ) { return this.domManip(arguments, false, function( elem ) { this.parentNode.insertBefore( elem, this.nextSibling ); }); } else if ( arguments.length ) { var set = this.pushStack( this, "after", arguments ); set.push.apply( set, jQuery(arguments[0]).toArray() ); return set; } }, clone: function( events ) { /// <summary> /// Clone matched DOM Elements and select the clones. /// This is useful for moving copies of the elements to another /// location in the DOM. /// Part of DOM/Manipulation /// </summary> /// <returns type="jQuery" /> /// <param name="deep" type="Boolean" optional="true"> /// (Optional) Set to false if you don't want to clone all descendant nodes, in addition to the element itself. /// </param> // Do the clone var ret = this.map(function() { if ( !jQuery.support.noCloneEvent && !jQuery.isXMLDoc(this) ) { // IE copies events bound via attachEvent when // using cloneNode. Calling detachEvent on the // clone will also remove the events from the orignal // In order to get around this, we use innerHTML. // Unfortunately, this means some modifications to // attributes in IE that are actually only stored // as properties will not be copied (such as the // the name attribute on an input). var html = this.outerHTML, ownerDocument = this.ownerDocument; if ( !html ) { var div = ownerDocument.createElement("div"); div.appendChild( this.cloneNode(true) ); html = div.innerHTML; } return jQuery.clean([html.replace(rinlinejQuery, "") .replace(rleadingWhitespace, "")], ownerDocument)[0]; } else { return this.cloneNode(true); } }); // Copy the events from the original to the clone if ( events === true ) { cloneCopyEvent( this, ret ); cloneCopyEvent( this.find("*"), ret.find("*") ); } // Return the cloned set return ret; }, html: function( value ) { /// <summary> /// Set the html contents of every matched element. /// This property is not available on XML documents. /// Part of DOM/Attributes /// </summary> /// <returns type="jQuery" /> /// <param name="value" type="String"> /// A string of HTML to set as the content of each matched element. /// </param> if ( value === undefined ) { return this[0] && this[0].nodeType === 1 ? this[0].innerHTML.replace(rinlinejQuery, "") : null; // See if we can take a shortcut and just use innerHTML } else if ( typeof value === "string" && !/<script/i.test( value ) && (jQuery.support.leadingWhitespace || !rleadingWhitespace.test( value )) && !wrapMap[ (rtagName.exec( value ) || ["", ""])[1].toLowerCase() ] ) { value = value.replace(rxhtmlTag, fcloseTag); try { for ( var i = 0, l = this.length; i < l; i++ ) { // Remove element nodes and prevent memory leaks if ( this[i].nodeType === 1 ) { jQuery.cleanData( this[i].getElementsByTagName("*") ); this[i].innerHTML = value; } } // If using innerHTML throws an exception, use the fallback method } catch(e) { this.empty().append( value ); } } else if ( jQuery.isFunction( value ) ) { this.each(function(i){ var self = jQuery(this), old = self.html(); self.empty().append(function(){ return value.call( this, i, old ); }); }); } else { this.empty().append( value ); } return this; }, replaceWith: function( value ) { /// <summary> /// Replaces all matched element with the specified HTML or DOM elements. /// </summary> /// <param name="value" type="Object"> /// The content to insert. May be an HTML string, DOM element, or jQuery object. /// </param> /// <returns type="jQuery">The element that was just replaced.</returns> if ( this[0] && this[0].parentNode ) { // Make sure that the elements are removed from the DOM before they are inserted // this can help fix replacing a parent with child elements if ( !jQuery.isFunction( value ) ) { value = jQuery( value ).detach(); } else { return this.each(function(i) { var self = jQuery(this), old = self.html(); self.replaceWith( value.call( this, i, old ) ); }); } return this.each(function() { var next = this.nextSibling, parent = this.parentNode; jQuery(this).remove(); if ( next ) { jQuery(next).before( value ); } else { jQuery(parent).append( value ); } }); } else { return this.pushStack( jQuery(jQuery.isFunction(value) ? value() : value), "replaceWith", value ); } }, detach: function( selector ) { /// <summary> /// Remove the set of matched elements from the DOM. /// </summary> /// <param name="selector" type="String"> /// A selector expression that filters the set of matched elements to be removed. /// </param> /// <returns type="jQuery" /> return this.remove( selector, true ); }, domManip: function( args, table, callback ) { /// <param name="args" type="Array"> /// Args /// </param> /// <param name="table" type="Boolean"> /// Insert TBODY in TABLEs if one is not found. /// </param> /// <param name="dir" type="Number"> /// If dir&lt;0, process args in reverse order. /// </param> /// <param name="fn" type="Function"> /// The function doing the DOM manipulation. /// </param> /// <returns type="jQuery" /> /// <summary> /// Part of Core /// </summary> var results, first, value = args[0], scripts = []; // We can't cloneNode fragments that contain checked, in WebKit if ( !jQuery.support.checkClone && arguments.length === 3 && typeof value === "string" && rchecked.test( value ) ) { return this.each(function() { jQuery(this).domManip( args, table, callback, true ); }); } if ( jQuery.isFunction(value) ) { return this.each(function(i) { var self = jQuery(this); args[0] = value.call(this, i, table ? self.html() : undefined); self.domManip( args, table, callback ); }); } if ( this[0] ) { // If we're in a fragment, just use that instead of building a new one if ( args[0] && args[0].parentNode && args[0].parentNode.nodeType === 11 ) { results = { fragment: args[0].parentNode }; } else { results = buildFragment( args, this, scripts ); } first = results.fragment.firstChild; if ( first ) { table = table && jQuery.nodeName( first, "tr" ); for ( var i = 0, l = this.length; i < l; i++ ) { callback.call( table ? root(this[i], first) : this[i], results.cacheable || this.length > 1 || i > 0 ? results.fragment.cloneNode(true) : results.fragment ); } } if ( scripts ) { jQuery.each( scripts, evalScript ); } } return this; function root( elem, cur ) { return jQuery.nodeName(elem, "table") ? (elem.getElementsByTagName("tbody")[0] || elem.appendChild(elem.ownerDocument.createElement("tbody"))) : elem; } } }); function cloneCopyEvent(orig, ret) { var i = 0; ret.each(function() { if ( this.nodeName !== (orig[i] && orig[i].nodeName) ) { return; } var oldData = jQuery.data( orig[i++] ), curData = jQuery.data( this, oldData ), events = oldData && oldData.events; if ( events ) { delete curData.handle; curData.events = {}; for ( var type in events ) { for ( var handler in events[ type ] ) { jQuery.event.add( this, type, events[ type ][ handler ], events[ type ][ handler ].data ); } } } }); } function buildFragment( args, nodes, scripts ) { var fragment, cacheable, cacheresults, doc; // webkit does not clone 'checked' attribute of radio inputs on cloneNode, so don't cache if string has a checked if ( args.length === 1 && typeof args[0] === "string" && args[0].length < 512 && args[0].indexOf("<option") < 0 && (jQuery.support.checkClone || !rchecked.test( args[0] )) ) { cacheable = true; cacheresults = jQuery.fragments[ args[0] ]; if ( cacheresults ) { if ( cacheresults !== 1 ) { fragment = cacheresults; } } } if ( !fragment ) { doc = (nodes && nodes[0] ? nodes[0].ownerDocument || nodes[0] : document); fragment = doc.createDocumentFragment(); jQuery.clean( args, doc, fragment, scripts ); } if ( cacheable ) { jQuery.fragments[ args[0] ] = cacheresults ? fragment : 1; } return { fragment: fragment, cacheable: cacheable }; } jQuery.fragments = {}; // jQuery.each({ // appendTo: "append", // prependTo: "prepend", // insertBefore: "before", // insertAfter: "after", // replaceAll: "replaceWith" // }, function( name, original ) { // jQuery.fn[ name ] = function( selector ) { // var ret = [], insert = jQuery( selector ); // for ( var i = 0, l = insert.length; i < l; i++ ) { // var elems = (i > 0 ? this.clone(true) : this).get(); // jQuery.fn[ original ].apply( jQuery(insert[i]), elems ); // ret = ret.concat( elems ); // } // return this.pushStack( ret, name, insert.selector ); // }; // }); jQuery.fn[ "appendTo" ] = function( selector ) { /// <summary> /// Append all of the matched elements to another, specified, set of elements. /// As of jQuery 1.3.2, returns all of the inserted elements. /// This operation is, essentially, the reverse of doing a regular /// $(A).append(B), in that instead of appending B to A, you're appending /// A to B. /// </summary> /// <param name="selector" type="Selector"> /// target to which the content will be appended. /// </param> /// <returns type="jQuery" /> var ret = [], insert = jQuery( selector ); for ( var i = 0, l = insert.length; i < l; i++ ) { var elems = (i > 0 ? this.clone(true) : this).get(); jQuery.fn[ "append" ].apply( jQuery(insert[i]), elems ); ret = ret.concat( elems ); } return this.pushStack( ret, "appendTo", insert.selector ); }; jQuery.fn[ "prependTo" ] = function( selector ) { /// <summary> /// Prepend all of the matched elements to another, specified, set of elements. /// As of jQuery 1.3.2, returns all of the inserted elements. /// This operation is, essentially, the reverse of doing a regular /// $(A).prepend(B), in that instead of prepending B to A, you're prepending /// A to B. /// </summary> /// <param name="selector" type="Selector"> /// target to which the content will be appended. /// </param> /// <returns type="jQuery" /> var ret = [], insert = jQuery( selector ); for ( var i = 0, l = insert.length; i < l; i++ ) { var elems = (i > 0 ? this.clone(true) : this).get(); jQuery.fn[ "prepend" ].apply( jQuery(insert[i]), elems ); ret = ret.concat( elems ); } return this.pushStack( ret, "prependTo", insert.selector ); }; jQuery.fn[ "insertBefore" ] = function( selector ) { /// <summary> /// Insert all of the matched elements before another, specified, set of elements. /// As of jQuery 1.3.2, returns all of the inserted elements. /// This operation is, essentially, the reverse of doing a regular /// $(A).before(B), in that instead of inserting B before A, you're inserting /// A before B. /// </summary> /// <param name="content" type="String"> /// Content after which the selected element(s) is inserted. /// </param> /// <returns type="jQuery" /> var ret = [], insert = jQuery( selector ); for ( var i = 0, l = insert.length; i < l; i++ ) { var elems = (i > 0 ? this.clone(true) : this).get(); jQuery.fn[ "before" ].apply( jQuery(insert[i]), elems ); ret = ret.concat( elems ); } return this.pushStack( ret, "insertBefore", insert.selector ); }; jQuery.fn[ "insertAfter" ] = function( selector ) { /// <summary> /// Insert all of the matched elements after another, specified, set of elements. /// As of jQuery 1.3.2, returns all of the inserted elements. /// This operation is, essentially, the reverse of doing a regular /// $(A).after(B), in that instead of inserting B after A, you're inserting /// A after B. /// </summary> /// <param name="content" type="String"> /// Content after which the selected element(s) is inserted. /// </param> /// <returns type="jQuery" /> var ret = [], insert = jQuery( selector ); for ( var i = 0, l = insert.length; i < l; i++ ) { var elems = (i > 0 ? this.clone(true) : this).get(); jQuery.fn[ "after" ].apply( jQuery(insert[i]), elems ); ret = ret.concat( elems ); } return this.pushStack( ret, "insertAfter", insert.selector ); }; jQuery.fn[ "replaceAll" ] = function( selector ) { /// <summary> /// Replaces the elements matched by the specified selector with the matched elements. /// As of jQuery 1.3.2, returns all of the inserted elements. /// </summary> /// <param name="selector" type="Selector">The elements to find and replace the matched elements with.</param> /// <returns type="jQuery" /> var ret = [], insert = jQuery( selector ); for ( var i = 0, l = insert.length; i < l; i++ ) { var elems = (i > 0 ? this.clone(true) : this).get(); jQuery.fn[ "replaceWith" ].apply( jQuery(insert[i]), elems ); ret = ret.concat( elems ); } return this.pushStack( ret, "replaceAll", insert.selector ); }; jQuery.each({ // keepData is for internal use only--do not document remove: function( selector, keepData ) { if ( !selector || jQuery.filter( selector, [ this ] ).length ) { if ( !keepData && this.nodeType === 1 ) { jQuery.cleanData( this.getElementsByTagName("*") ); jQuery.cleanData( [ this ] ); } if ( this.parentNode ) { this.parentNode.removeChild( this ); } } }, empty: function() { /// <summary> /// Removes all child nodes from the set of matched elements. /// Part of DOM/Manipulation /// </summary> /// <returns type="jQuery" /> // Remove element nodes and prevent memory leaks if ( this.nodeType === 1 ) { jQuery.cleanData( this.getElementsByTagName("*") ); } // Remove any remaining nodes while ( this.firstChild ) { this.removeChild( this.firstChild ); } } }, function( name, fn ) { jQuery.fn[ name ] = function() { return this.each( fn, arguments ); }; }); jQuery.extend({ clean: function( elems, context, fragment, scripts ) { /// <summary> /// This method is internal only. /// </summary> /// <private /> context = context || document; // !context.createElement fails in IE with an error but returns typeof 'object' if ( typeof context.createElement === "undefined" ) { context = context.ownerDocument || context[0] && context[0].ownerDocument || document; } var ret = []; jQuery.each(elems, function( i, elem ) { if ( typeof elem === "number" ) { elem += ""; } if ( !elem ) { return; } // Convert html string into DOM nodes if ( typeof elem === "string" && !rhtml.test( elem ) ) { elem = context.createTextNode( elem ); } else if ( typeof elem === "string" ) { // Fix "XHTML"-style tags in all browsers elem = elem.replace(rxhtmlTag, fcloseTag); // Trim whitespace, otherwise indexOf won't work as expected var tag = (rtagName.exec( elem ) || ["", ""])[1].toLowerCase(), wrap = wrapMap[ tag ] || wrapMap._default, depth = wrap[0], div = context.createElement("div"); // Go to html and back, then peel off extra wrappers div.innerHTML = wrap[1] + elem + wrap[2]; // Move to the right depth while ( depth-- ) { div = div.lastChild; } // Remove IE's autoinserted <tbody> from table fragments if ( !jQuery.support.tbody ) { // String was a <table>, *may* have spurious <tbody> var hasBody = rtbody.test(elem), tbody = tag === "table" && !hasBody ? div.firstChild && div.firstChild.childNodes : // String was a bare <thead> or <tfoot> wrap[1] === "<table>" && !hasBody ? div.childNodes : []; for ( var j = tbody.length - 1; j >= 0 ; --j ) { if ( jQuery.nodeName( tbody[ j ], "tbody" ) && !tbody[ j ].childNodes.length ) { tbody[ j ].parentNode.removeChild( tbody[ j ] ); } } } // IE completely kills leading whitespace when innerHTML is used if ( !jQuery.support.leadingWhitespace && rleadingWhitespace.test( elem ) ) { div.insertBefore( context.createTextNode( rleadingWhitespace.exec(elem)[0] ), div.firstChild ); } elem = jQuery.makeArray( div.childNodes ); } if ( elem.nodeType ) { ret.push( elem ); } else { ret = jQuery.merge( ret, elem ); } }); if ( fragment ) { for ( var i = 0; ret[i]; i++ ) { if ( scripts && jQuery.nodeName( ret[i], "script" ) && (!ret[i].type || ret[i].type.toLowerCase() === "text/javascript") ) { scripts.push( ret[i].parentNode ? ret[i].parentNode.removeChild( ret[i] ) : ret[i] ); } else { if ( ret[i].nodeType === 1 ) { ret.splice.apply( ret, [i + 1, 0].concat(jQuery.makeArray(ret[i].getElementsByTagName("script"))) ); } fragment.appendChild( ret[i] ); } } } return ret; }, cleanData: function( elems ) { for ( var i = 0, elem, id; (elem = elems[i]) != null; i++ ) { jQuery.event.remove( elem ); jQuery.removeData( elem ); } } }); // exclude the following css properties to add px var rexclude = /z-?index|font-?weight|opacity|zoom|line-?height/i, ralpha = /alpha\([^)]*\)/, ropacity = /opacity=([^)]*)/, rfloat = /float/i, rdashAlpha = /-([a-z])/ig, rupper = /([A-Z])/g, rnumpx = /^-?\d+(?:px)?$/i, rnum = /^-?\d/, cssShow = { position: "absolute", visibility: "hidden", display:"block" }, cssWidth = [ "Left", "Right" ], cssHeight = [ "Top", "Bottom" ], // cache check for defaultView.getComputedStyle getComputedStyle = document.defaultView && document.defaultView.getComputedStyle, // normalize float css property styleFloat = jQuery.support.cssFloat ? "cssFloat" : "styleFloat", fcamelCase = function( all, letter ) { return letter.toUpperCase(); }; jQuery.fn.css = function( name, value ) { /// <summary> /// Set a single style property to a value, on all matched elements. /// If a number is provided, it is automatically converted into a pixel value. /// Part of CSS /// </summary> /// <returns type="jQuery" /> /// <param name="name" type="String"> /// A CSS property name. /// </param> /// <param name="value" type="String"> /// A value to set for the property. /// </param> return access( this, name, value, true, function( elem, name, value ) { if ( value === undefined ) { return jQuery.curCSS( elem, name ); } if ( typeof value === "number" && !rexclude.test(name) ) { value += "px"; } jQuery.style( elem, name, value ); }); }; jQuery.extend({ style: function( elem, name, value ) { // don't set styles on text and comment nodes if ( !elem || elem.nodeType === 3 || elem.nodeType === 8 ) { return undefined; } // ignore negative width and height values #1599 if ( (name === "width" || name === "height") && parseFloat(value) < 0 ) { value = undefined; } var style = elem.style || elem, set = value !== undefined; // IE uses filters for opacity if ( !jQuery.support.opacity && name === "opacity" ) { if ( set ) { // IE has trouble with opacity if it does not have layout // Force it by setting the zoom level style.zoom = 1; // Set the alpha filter to set the opacity var opacity = parseInt( value, 10 ) + "" === "NaN" ? "" : "alpha(opacity=" + value * 100 + ")"; var filter = style.filter || jQuery.curCSS( elem, "filter" ) || ""; style.filter = ralpha.test(filter) ? filter.replace(ralpha, opacity) : opacity; } return style.filter && style.filter.indexOf("opacity=") >= 0 ? (parseFloat( ropacity.exec(style.filter)[1] ) / 100) + "": ""; } // Make sure we're using the right name for getting the float value if ( rfloat.test( name ) ) { name = styleFloat; } name = name.replace(rdashAlpha, fcamelCase); if ( set ) { style[ name ] = value; } return style[ name ]; }, css: function( elem, name, force, extra ) { /// <summary> /// This method is internal only. /// </summary> /// <private /> if ( name === "width" || name === "height" ) { var val, props = cssShow, which = name === "width" ? cssWidth : cssHeight; function getWH() { val = name === "width" ? elem.offsetWidth : elem.offsetHeight; if ( extra === "border" ) { return; } jQuery.each( which, function() { if ( !extra ) { val -= parseFloat(jQuery.curCSS( elem, "padding" + this, true)) || 0; } if ( extra === "margin" ) { val += parseFloat(jQuery.curCSS( elem, "margin" + this, true)) || 0; } else { val -= parseFloat(jQuery.curCSS( elem, "border" + this + "Width", true)) || 0; } }); } if ( elem.offsetWidth !== 0 ) { getWH(); } else { jQuery.swap( elem, props, getWH ); } return Math.max(0, Math.round(val)); } return jQuery.curCSS( elem, name, force ); }, curCSS: function( elem, name, force ) { /// <summary> /// This method is internal only. /// </summary> /// <private /> var ret, style = elem.style, filter; // IE uses filters for opacity if ( !jQuery.support.opacity && name === "opacity" && elem.currentStyle ) { ret = ropacity.test(elem.currentStyle.filter || "") ? (parseFloat(RegExp.$1) / 100) + "" : ""; return ret === "" ? "1" : ret; } // Make sure we're using the right name for getting the float value if ( rfloat.test( name ) ) { name = styleFloat; } if ( !force && style && style[ name ] ) { ret = style[ name ]; } else if ( getComputedStyle ) { // Only "float" is needed here if ( rfloat.test( name ) ) { name = "float"; } name = name.replace( rupper, "-$1" ).toLowerCase(); var defaultView = elem.ownerDocument.defaultView; if ( !defaultView ) { return null; } var computedStyle = defaultView.getComputedStyle( elem, null ); if ( computedStyle ) { ret = computedStyle.getPropertyValue( name ); } // We should always get a number back from opacity if ( name === "opacity" && ret === "" ) { ret = "1"; } } else if ( elem.currentStyle ) { var camelCase = name.replace(rdashAlpha, fcamelCase); ret = elem.currentStyle[ name ] || elem.currentStyle[ camelCase ]; // From the awesome hack by Dean Edwards // http://erik.eae.net/archives/2007/07/27/18.54.15/#comment-102291 // If we're not dealing with a regular pixel number // but a number that has a weird ending, we need to convert it to pixels if ( !rnumpx.test( ret ) && rnum.test( ret ) ) { // Remember the original values var left = style.left, rsLeft = elem.runtimeStyle.left; // Put in the new values to get a computed value out elem.runtimeStyle.left = elem.currentStyle.left; style.left = camelCase === "fontSize" ? "1em" : (ret || 0); ret = style.pixelLeft + "px"; // Revert the changed values style.left = left; elem.runtimeStyle.left = rsLeft; } } return ret; }, // A method for quickly swapping in/out CSS properties to get correct calculations swap: function( elem, options, callback ) { /// <summary> /// Swap in/out style options. /// </summary> var old = {}; // Remember the old values, and insert the new ones for ( var name in options ) { old[ name ] = elem.style[ name ]; elem.style[ name ] = options[ name ]; } callback.call( elem ); // Revert the old values for ( var name in options ) { elem.style[ name ] = old[ name ]; } } }); if ( jQuery.expr && jQuery.expr.filters ) { jQuery.expr.filters.hidden = function( elem ) { var width = elem.offsetWidth, height = elem.offsetHeight, skip = elem.nodeName.toLowerCase() === "tr"; return width === 0 && height === 0 && !skip ? true : width > 0 && height > 0 && !skip ? false : jQuery.curCSS(elem, "display") === "none"; }; jQuery.expr.filters.visible = function( elem ) { return !jQuery.expr.filters.hidden( elem ); }; } var jsc = now(), rscript = /<script(.|\s)*?\/script>/gi, rselectTextarea = /select|textarea/i, rinput = /color|date|datetime|email|hidden|month|number|password|range|search|tel|text|time|url|week/i, jsre = /=\?(&|$)/, rquery = /\?/, rts = /(\?|&)_=.*?(&|$)/, rurl = /^(\w+:)?\/\/([^\/?#]+)/, r20 = /%20/g; jQuery.fn.extend({ // Keep a copy of the old load _load: jQuery.fn.load, load: function( url, params, callback ) { /// <summary> /// Loads HTML from a remote file and injects it into the DOM. By default performs a GET request, but if parameters are included /// then a POST will be performed. /// </summary> /// <param name="url" type="String">The URL of the HTML page to load.</param> /// <param name="data" optional="true" type="Map">Key/value pairs that will be sent to the server.</param> /// <param name="callback" optional="true" type="Function">The function called when the AJAX request is complete. It should map function(responseText, textStatus, XMLHttpRequest) such that this maps the injected DOM element.</param> /// <returns type="jQuery" /> if ( typeof url !== "string" ) { return this._load( url ); // Don't do a request if no elements are being requested } else if ( !this.length ) { return this; } var off = url.indexOf(" "); if ( off >= 0 ) { var selector = url.slice(off, url.length); url = url.slice(0, off); } // Default to a GET request var type = "GET"; // If the second parameter was provided if ( params ) { // If it's a function if ( jQuery.isFunction( params ) ) { // We assume that it's the callback callback = params; params = null; // Otherwise, build a param string } else if ( typeof params === "object" ) { params = jQuery.param( params, jQuery.ajaxSettings.traditional ); type = "POST"; } } var self = this; // Request the remote document jQuery.ajax({ url: url, type: type, dataType: "html", data: params, complete: function( res, status ) { // If successful, inject the HTML into all the matched elements if ( status === "success" || status === "notmodified" ) { // See if a selector was specified self.html( selector ? // Create a dummy div to hold the results jQuery("<div />") // inject the contents of the document in, removing the scripts // to avoid any 'Permission Denied' errors in IE .append(res.responseText.replace(rscript, "")) // Locate the specified elements .find(selector) : // If not, just inject the full result res.responseText ); } if ( callback ) { self.each( callback, [res.responseText, status, res] ); } } }); return this; }, serialize: function() { /// <summary> /// Serializes a set of input elements into a string of data. /// </summary> /// <returns type="String">The serialized result</returns> return jQuery.param(this.serializeArray()); }, serializeArray: function() { /// <summary> /// Serializes all forms and form elements but returns a JSON data structure. /// </summary> /// <returns type="String">A JSON data structure representing the serialized items.</returns> return this.map(function() { return this.elements ? jQuery.makeArray(this.elements) : this; }) .filter(function() { return this.name && !this.disabled && (this.checked || rselectTextarea.test(this.nodeName) || rinput.test(this.type)); }) .map(function( i, elem ) { var val = jQuery(this).val(); return val == null ? null : jQuery.isArray(val) ? jQuery.map( val, function( val, i ) { return { name: elem.name, value: val }; }) : { name: elem.name, value: val }; }).get(); } }); // Attach a bunch of functions for handling common AJAX events // jQuery.each( "ajaxStart ajaxStop ajaxComplete ajaxError ajaxSuccess ajaxSend".split(" "), function( i, o ) { // jQuery.fn[o] = function( f ) { // return this.bind(o, f); // }; // }); jQuery.fn["ajaxStart"] = function( f ) { /// <summary> /// Attach a function to be executed whenever an AJAX request begins and there is none already active. This is an Ajax Event. /// </summary> /// <param name="f" type="Function">The function to execute.</param> /// <returns type="jQuery" /> return this.bind("ajaxStart", f); }; jQuery.fn["ajaxStop"] = function( f ) { /// <summary> /// Attach a function to be executed whenever all AJAX requests have ended. This is an Ajax Event. /// </summary> /// <param name="f" type="Function">The function to execute.</param> /// <returns type="jQuery" /> return this.bind("ajaxStop", f); }; jQuery.fn["ajaxComplete"] = function( f ) { /// <summary> /// Attach a function to be executed whenever an AJAX request completes. This is an Ajax Event. /// </summary> /// <param name="f" type="Function">The function to execute.</param> /// <returns type="jQuery" /> return this.bind("ajaxComplete", f); }; jQuery.fn["ajaxError"] = function( f ) { /// <summary> /// Attach a function to be executed whenever an AJAX request fails. This is an Ajax Event. /// </summary> /// <param name="f" type="Function">The function to execute.</param> /// <returns type="jQuery" /> return this.bind("ajaxError", f); }; jQuery.fn["ajaxSuccess"] = function( f ) { /// <summary> /// Attach a function to be executed whenever an AJAX request completes successfully. This is an Ajax Event. /// </summary> /// <param name="f" type="Function">The function to execute.</param> /// <returns type="jQuery" /> return this.bind("ajaxSuccess", f); }; jQuery.fn["ajaxSend"] = function( f ) { /// <summary> /// Attach a function to be executed before an AJAX request is sent. This is an Ajax Event. /// </summary> /// <param name="f" type="Function">The function to execute.</param> /// <returns type="jQuery" /> return this.bind("ajaxSend", f); }; jQuery.extend({ get: function( url, data, callback, type ) { /// <summary> /// Loads a remote page using an HTTP GET request. /// </summary> /// <param name="url" type="String">The URL of the HTML page to load.</param> /// <param name="data" optional="true" type="Map">Key/value pairs that will be sent to the server.</param> /// <param name="callback" optional="true" type="Function">The function called when the AJAX request is complete. It should map function(responseText, textStatus) such that this maps the options for this AJAX request.</param> /// <param name="type" optional="true" type="String">Type of data to be returned to callback function. Valid valiues are xml, html, script, json, text, _default.</param> /// <returns type="XMLHttpRequest" /> // shift arguments if data argument was omited if ( jQuery.isFunction( data ) ) { type = type || callback; callback = data; data = null; } return jQuery.ajax({ type: "GET", url: url, data: data, success: callback, dataType: type }); }, getScript: function( url, callback ) { /// <summary> /// Loads and executes a local JavaScript file using an HTTP GET request. /// </summary> /// <param name="url" type="String">The URL of the script to load.</param> /// <param name="callback" optional="true" type="Function">The function called when the AJAX request is complete. It should map function(data, textStatus) such that this maps the options for the AJAX request.</param> /// <returns type="XMLHttpRequest" /> return jQuery.get(url, null, callback, "script"); }, getJSON: function( url, data, callback ) { /// <summary> /// Loads JSON data using an HTTP GET request. /// </summary> /// <param name="url" type="String">The URL of the JSON data to load.</param> /// <param name="data" optional="true" type="Map">Key/value pairs that will be sent to the server.</param> /// <param name="callback" optional="true" type="Function">The function called when the AJAX request is complete if the data is loaded successfully. It should map function(data, textStatus) such that this maps the options for this AJAX request.</param> /// <returns type="XMLHttpRequest" /> return jQuery.get(url, data, callback, "json"); }, post: function( url, data, callback, type ) { /// <summary> /// Loads a remote page using an HTTP POST request. /// </summary> /// <param name="url" type="String">The URL of the HTML page to load.</param> /// <param name="data" optional="true" type="Map">Key/value pairs that will be sent to the server.</param> /// <param name="callback" optional="true" type="Function">The function called when the AJAX request is complete. It should map function(responseText, textStatus) such that this maps the options for this AJAX request.</param> /// <param name="type" optional="true" type="String">Type of data to be returned to callback function. Valid valiues are xml, html, script, json, text, _default.</param> /// <returns type="XMLHttpRequest" /> // shift arguments if data argument was omited if ( jQuery.isFunction( data ) ) { type = type || callback; callback = data; data = {}; } return jQuery.ajax({ type: "POST", url: url, data: data, success: callback, dataType: type }); }, ajaxSetup: function( settings ) { /// <summary> /// Sets up global settings for AJAX requests. /// </summary> /// <param name="settings" type="Options">A set of key/value pairs that configure the default Ajax request.</param> jQuery.extend( jQuery.ajaxSettings, settings ); }, ajaxSettings: { url: location.href, global: true, type: "GET", contentType: "application/x-www-form-urlencoded", processData: true, async: true, /* timeout: 0, data: null, username: null, password: null, traditional: false, */ // Create the request object; Microsoft failed to properly // implement the XMLHttpRequest in IE7 (can't request local files), // so we use the ActiveXObject when it is available // This function can be overriden by calling jQuery.ajaxSetup xhr: window.XMLHttpRequest && (window.location.protocol !== "file:" || !window.ActiveXObject) ? function() { return new window.XMLHttpRequest(); } : function() { try { return new window.ActiveXObject("Microsoft.XMLHTTP"); } catch(e) {} }, accepts: { xml: "application/xml, text/xml", html: "text/html", script: "text/javascript, application/javascript", json: "application/json, text/javascript", text: "text/plain", _default: "*/*" } }, // Last-Modified header cache for next request lastModified: {}, etag: {}, ajax: function( origSettings ) { /// <summary> /// Load a remote page using an HTTP request. /// </summary> /// <private /> var s = jQuery.extend(true, {}, jQuery.ajaxSettings, origSettings); var jsonp, status, data, callbackContext = origSettings && origSettings.context || s, type = s.type.toUpperCase(); // convert data if not already a string if ( s.data && s.processData && typeof s.data !== "string" ) { s.data = jQuery.param( s.data, s.traditional ); } // Handle JSONP Parameter Callbacks if ( s.dataType === "jsonp" ) { if ( type === "GET" ) { if ( !jsre.test( s.url ) ) { s.url += (rquery.test( s.url ) ? "&" : "?") + (s.jsonp || "callback") + "=?"; } } else if ( !s.data || !jsre.test(s.data) ) { s.data = (s.data ? s.data + "&" : "") + (s.jsonp || "callback") + "=?"; } s.dataType = "json"; } // Build temporary JSONP function if ( s.dataType === "json" && (s.data && jsre.test(s.data) || jsre.test(s.url)) ) { jsonp = s.jsonpCallback || ("jsonp" + jsc++); // Replace the =? sequence both in the query string and the data if ( s.data ) { s.data = (s.data + "").replace(jsre, "=" + jsonp + "$1"); } s.url = s.url.replace(jsre, "=" + jsonp + "$1"); // We need to make sure // that a JSONP style response is executed properly s.dataType = "script"; // Handle JSONP-style loading window[ jsonp ] = window[ jsonp ] || function( tmp ) { data = tmp; success(); complete(); // Garbage collect window[ jsonp ] = undefined; try { delete window[ jsonp ]; } catch(e) {} if ( head ) { head.removeChild( script ); } }; } if ( s.dataType === "script" && s.cache === null ) { s.cache = false; } if ( s.cache === false && type === "GET" ) { var ts = now(); // try replacing _= if it is there var ret = s.url.replace(rts, "$1_=" + ts + "$2"); // if nothing was replaced, add timestamp to the end s.url = ret + ((ret === s.url) ? (rquery.test(s.url) ? "&" : "?") + "_=" + ts : ""); } // If data is available, append data to url for get requests if ( s.data && type === "GET" ) { s.url += (rquery.test(s.url) ? "&" : "?") + s.data; } // Watch for a new set of requests if ( s.global && ! jQuery.active++ ) { jQuery.event.trigger( "ajaxStart" ); } // Matches an absolute URL, and saves the domain var parts = rurl.exec( s.url ), remote = parts && (parts[1] && parts[1] !== location.protocol || parts[2] !== location.host); // If we're requesting a remote document // and trying to load JSON or Script with a GET if ( s.dataType === "script" && type === "GET" && remote ) { var head = document.getElementsByTagName("head")[0] || document.documentElement; var script = document.createElement("script"); script.src = s.url; if ( s.scriptCharset ) { script.charset = s.scriptCharset; } // Handle Script loading if ( !jsonp ) { var done = false; // Attach handlers for all browsers script.onload = script.onreadystatechange = function() { if ( !done && (!this.readyState || this.readyState === "loaded" || this.readyState === "complete") ) { done = true; success(); complete(); // Handle memory leak in IE script.onload = script.onreadystatechange = null; if ( head && script.parentNode ) { head.removeChild( script ); } } }; } // Use insertBefore instead of appendChild to circumvent an IE6 bug. // This arises when a base node is used (#2709 and #4378). head.insertBefore( script, head.firstChild ); // We handle everything using the script element injection return undefined; } var requestDone = false; // Create the request object var xhr = s.xhr(); if ( !xhr ) { return; } // Open the socket // Passing null username, generates a login popup on Opera (#2865) if ( s.username ) { xhr.open(type, s.url, s.async, s.username, s.password); } else { xhr.open(type, s.url, s.async); } // Need an extra try/catch for cross domain requests in Firefox 3 try { // Set the correct header, if data is being sent if ( s.data || origSettings && origSettings.contentType ) { xhr.setRequestHeader("Content-Type", s.contentType); } // Set the If-Modified-Since and/or If-None-Match header, if in ifModified mode. if ( s.ifModified ) { if ( jQuery.lastModified[s.url] ) { xhr.setRequestHeader("If-Modified-Since", jQuery.lastModified[s.url]); } if ( jQuery.etag[s.url] ) { xhr.setRequestHeader("If-None-Match", jQuery.etag[s.url]); } } // Set header so the called script knows that it's an XMLHttpRequest // Only send the header if it's not a remote XHR if ( !remote ) { xhr.setRequestHeader("X-Requested-With", "XMLHttpRequest"); } // Set the Accepts header for the server, depending on the dataType xhr.setRequestHeader("Accept", s.dataType && s.accepts[ s.dataType ] ? s.accepts[ s.dataType ] + ", */*" : s.accepts._default ); } catch(e) {} // Allow custom headers/mimetypes and early abort if ( s.beforeSend && s.beforeSend.call(callbackContext, xhr, s) === false ) { // Handle the global AJAX counter if ( s.global && ! --jQuery.active ) { jQuery.event.trigger( "ajaxStop" ); } // close opended socket xhr.abort(); return false; } if ( s.global ) { trigger("ajaxSend", [xhr, s]); } // Wait for a response to come back var onreadystatechange = xhr.onreadystatechange = function( isTimeout ) { // The request was aborted if ( !xhr || xhr.readyState === 0 || isTimeout === "abort" ) { // Opera doesn't call onreadystatechange before this point // so we simulate the call if ( !requestDone ) { complete(); } requestDone = true; if ( xhr ) { xhr.onreadystatechange = jQuery.noop; } // The transfer is complete and the data is available, or the request timed out } else if ( !requestDone && xhr && (xhr.readyState === 4 || isTimeout === "timeout") ) { requestDone = true; xhr.onreadystatechange = jQuery.noop; status = isTimeout === "timeout" ? "timeout" : !jQuery.httpSuccess( xhr ) ? "error" : s.ifModified && jQuery.httpNotModified( xhr, s.url ) ? "notmodified" : "success"; var errMsg; if ( status === "success" ) { // Watch for, and catch, XML document parse errors try { // process the data (runs the xml through httpData regardless of callback) data = jQuery.httpData( xhr, s.dataType, s ); } catch(err) { status = "parsererror"; errMsg = err; } } // Make sure that the request was successful or notmodified if ( status === "success" || status === "notmodified" ) { // JSONP handles its own success callback if ( !jsonp ) { success(); } } else { jQuery.handleError(s, xhr, status, errMsg); } // Fire the complete handlers complete(); if ( isTimeout === "timeout" ) { xhr.abort(); } // Stop memory leaks if ( s.async ) { xhr = null; } } }; // Override the abort handler, if we can (IE doesn't allow it, but that's OK) // Opera doesn't fire onreadystatechange at all on abort try { var oldAbort = xhr.abort; xhr.abort = function() { if ( xhr ) { oldAbort.call( xhr ); } onreadystatechange( "abort" ); }; } catch(e) { } // Timeout checker if ( s.async && s.timeout > 0 ) { setTimeout(function() { // Check to see if the request is still happening if ( xhr && !requestDone ) { onreadystatechange( "timeout" ); } }, s.timeout); } // Send the data try { xhr.send( type === "POST" || type === "PUT" || type === "DELETE" ? s.data : null ); } catch(e) { jQuery.handleError(s, xhr, null, e); // Fire the complete handlers complete(); } // firefox 1.5 doesn't fire statechange for sync requests if ( !s.async ) { onreadystatechange(); } function success() { // If a local callback was specified, fire it and pass it the data if ( s.success ) { s.success.call( callbackContext, data, status, xhr ); } // Fire the global callback if ( s.global ) { trigger( "ajaxSuccess", [xhr, s] ); } } function complete() { // Process result if ( s.complete ) { s.complete.call( callbackContext, xhr, status); } // The request was completed if ( s.global ) { trigger( "ajaxComplete", [xhr, s] ); } // Handle the global AJAX counter if ( s.global && ! --jQuery.active ) { jQuery.event.trigger( "ajaxStop" ); } } function trigger(type, args) { (s.context ? jQuery(s.context) : jQuery.event).trigger(type, args); } // return XMLHttpRequest to allow aborting the request etc. return xhr; }, handleError: function( s, xhr, status, e ) { /// <summary> /// This method is internal. /// </summary> /// <private /> // If a local callback was specified, fire it if ( s.error ) { s.error.call( s.context || s, xhr, status, e ); } // Fire the global callback if ( s.global ) { (s.context ? jQuery(s.context) : jQuery.event).trigger( "ajaxError", [xhr, s, e] ); } }, // Counter for holding the number of active queries active: 0, // Determines if an XMLHttpRequest was successful or not httpSuccess: function( xhr ) { /// <summary> /// This method is internal. /// </summary> /// <private /> try { // IE error sometimes returns 1223 when it should be 204 so treat it as success, see #1450 return !xhr.status && location.protocol === "file:" || // Opera returns 0 when status is 304 ( xhr.status >= 200 && xhr.status < 300 ) || xhr.status === 304 || xhr.status === 1223 || xhr.status === 0; } catch(e) {} return false; }, // Determines if an XMLHttpRequest returns NotModified httpNotModified: function( xhr, url ) { /// <summary> /// This method is internal. /// </summary> /// <private /> var lastModified = xhr.getResponseHeader("Last-Modified"), etag = xhr.getResponseHeader("Etag"); if ( lastModified ) { jQuery.lastModified[url] = lastModified; } if ( etag ) { jQuery.etag[url] = etag; } // Opera returns 0 when status is 304 return xhr.status === 304 || xhr.status === 0; }, httpData: function( xhr, type, s ) { /// <summary> /// This method is internal. /// </summary> /// <private /> var ct = xhr.getResponseHeader("content-type") || "", xml = type === "xml" || !type && ct.indexOf("xml") >= 0, data = xml ? xhr.responseXML : xhr.responseText; if ( xml && data.documentElement.nodeName === "parsererror" ) { jQuery.error( "parsererror" ); } // Allow a pre-filtering function to sanitize the response // s is checked to keep backwards compatibility if ( s && s.dataFilter ) { data = s.dataFilter( data, type ); } // The filter can actually parse the response if ( typeof data === "string" ) { // Get the JavaScript object, if JSON is used. if ( type === "json" || !type && ct.indexOf("json") >= 0 ) { data = jQuery.parseJSON( data ); // If the type is "script", eval it in global context } else if ( type === "script" || !type && ct.indexOf("javascript") >= 0 ) { jQuery.globalEval( data ); } } return data; }, // Serialize an array of form elements or a set of // key/values into a query string param: function( a, traditional ) { /// <summary> /// Create a serialized representation of an array or object, suitable for use in a URL /// query string or Ajax request. /// </summary> /// <param name="a" type="Object"> /// An array or object to serialize. /// </param> /// <param name="traditional" type="Boolean"> /// A Boolean indicating whether to perform a traditional "shallow" serialization. /// </param> /// <returns type="String" /> var s = []; // Set traditional to true for jQuery <= 1.3.2 behavior. if ( traditional === undefined ) { traditional = jQuery.ajaxSettings.traditional; } // If an array was passed in, assume that it is an array of form elements. if ( jQuery.isArray(a) || a.jquery ) { // Serialize the form elements jQuery.each( a, function() { add( this.name, this.value ); }); } else { // If traditional, encode the "old" way (the way 1.3.2 or older // did it), otherwise encode params recursively. for ( var prefix in a ) { buildParams( prefix, a[prefix] ); } } // Return the resulting serialization return s.join("&").replace(r20, "+"); function buildParams( prefix, obj ) { if ( jQuery.isArray(obj) ) { // Serialize array item. jQuery.each( obj, function( i, v ) { if ( traditional ) { // Treat each array item as a scalar. add( prefix, v ); } else { // If array item is non-scalar (array or object), encode its // numeric index to resolve deserialization ambiguity issues. // Note that rack (as of 1.0.0) can't currently deserialize // nested arrays properly, and attempting to do so may cause // a server error. Possible fixes are to modify rack's // deserialization algorithm or to provide an option or flag // to force array serialization to be shallow. buildParams( prefix + "[" + ( typeof v === "object" || jQuery.isArray(v) ? i : "" ) + "]", v ); } }); } else if ( !traditional && obj != null && typeof obj === "object" ) { // Serialize object item. jQuery.each( obj, function( k, v ) { buildParams( prefix + "[" + k + "]", v ); }); } else { // Serialize scalar item. add( prefix, obj ); } } function add( key, value ) { // If value is a function, invoke it and return its value value = jQuery.isFunction(value) ? value() : value; s[ s.length ] = encodeURIComponent(key) + "=" + encodeURIComponent(value); } } }); var elemdisplay = {}, rfxtypes = /toggle|show|hide/, rfxnum = /^([+-]=)?([\d+-.]+)(.*)$/, timerId, fxAttrs = [ // height animations [ "height", "marginTop", "marginBottom", "paddingTop", "paddingBottom" ], // width animations [ "width", "marginLeft", "marginRight", "paddingLeft", "paddingRight" ], // opacity animations [ "opacity" ] ]; jQuery.fn.extend({ show: function( speed, callback ) { /// <summary> /// Show all matched elements using a graceful animation and firing an optional callback after completion. /// </summary> /// <param name="speed" type="String">A string representing one of three predefined speeds ('slow', 'normal', or 'fast'), or /// the number of milliseconds to run the animation</param> /// <param name="callback" optional="true" type="Function">A function to be executed whenever the animation completes, once for each animated element. It should map function callback() such that this is the DOM element being animated.</param> /// <returns type="jQuery" /> if ( speed || speed === 0) { return this.animate( genFx("show", 3), speed, callback); } else { for ( var i = 0, l = this.length; i < l; i++ ) { var old = jQuery.data(this[i], "olddisplay"); this[i].style.display = old || ""; if ( jQuery.css(this[i], "display") === "none" ) { var nodeName = this[i].nodeName, display; if ( elemdisplay[ nodeName ] ) { display = elemdisplay[ nodeName ]; } else { var elem = jQuery("<" + nodeName + " />").appendTo("body"); display = elem.css("display"); if ( display === "none" ) { display = "block"; } elem.remove(); elemdisplay[ nodeName ] = display; } jQuery.data(this[i], "olddisplay", display); } } // Set the display of the elements in a second loop // to avoid the constant reflow for ( var j = 0, k = this.length; j < k; j++ ) { this[j].style.display = jQuery.data(this[j], "olddisplay") || ""; } return this; } }, hide: function( speed, callback ) { /// <summary> /// Hides all matched elements using a graceful animation and firing an optional callback after completion. /// </summary> /// <param name="speed" type="String">A string representing one of three predefined speeds ('slow', 'normal', or 'fast'), or /// the number of milliseconds to run the animation</param> /// <param name="callback" optional="true" type="Function">A function to be executed whenever the animation completes, once for each animated element. It should map function callback() such that this is the DOM element being animated.</param> /// <returns type="jQuery" /> if ( speed || speed === 0 ) { return this.animate( genFx("hide", 3), speed, callback); } else { for ( var i = 0, l = this.length; i < l; i++ ) { var old = jQuery.data(this[i], "olddisplay"); if ( !old && old !== "none" ) { jQuery.data(this[i], "olddisplay", jQuery.css(this[i], "display")); } } // Set the display of the elements in a second loop // to avoid the constant reflow for ( var j = 0, k = this.length; j < k; j++ ) { this[j].style.display = "none"; } return this; } }, // Save the old toggle function _toggle: jQuery.fn.toggle, toggle: function( fn, fn2 ) { /// <summary> /// Toggles displaying each of the set of matched elements. /// </summary> /// <returns type="jQuery" /> var bool = typeof fn === "boolean"; if ( jQuery.isFunction(fn) && jQuery.isFunction(fn2) ) { this._toggle.apply( this, arguments ); } else if ( fn == null || bool ) { this.each(function() { var state = bool ? fn : jQuery(this).is(":hidden"); jQuery(this)[ state ? "show" : "hide" ](); }); } else { this.animate(genFx("toggle", 3), fn, fn2); } return this; }, fadeTo: function( speed, to, callback ) { /// <summary> /// Fades the opacity of all matched elements to a specified opacity. /// </summary> /// <param name="speed" type="String">A string representing one of three predefined speeds ('slow', 'normal', or 'fast'), or /// the number of milliseconds to run the animation</param> /// <param name="callback" optional="true" type="Function">A function to be executed whenever the animation completes, once for each animated element. It should map function callback() such that this is the DOM element being animated.</param> /// <returns type="jQuery" /> return this.filter(":hidden").css("opacity", 0).show().end() .animate({opacity: to}, speed, callback); }, animate: function( prop, speed, easing, callback ) { /// <summary> /// A function for making custom animations. /// </summary> /// <param name="prop" type="Options">A set of style attributes that you wish to animate and to what end.</param> /// <param name="speed" optional="true" type="String">A string representing one of three predefined speeds ('slow', 'normal', or 'fast'), or /// the number of milliseconds to run the animation</param> /// <param name="easing" optional="true" type="String">The name of the easing effect that you want to use. There are two built-in values, 'linear' and 'swing'.</param> /// <param name="callback" optional="true" type="Function">A function to be executed whenever the animation completes, once for each animated element. It should map function callback() such that this is the DOM element being animated.</param> /// <returns type="jQuery" /> var optall = jQuery.speed(speed, easing, callback); if ( jQuery.isEmptyObject( prop ) ) { return this.each( optall.complete ); } return this[ optall.queue === false ? "each" : "queue" ](function() { var opt = jQuery.extend({}, optall), p, hidden = this.nodeType === 1 && jQuery(this).is(":hidden"), self = this; for ( p in prop ) { var name = p.replace(rdashAlpha, fcamelCase); if ( p !== name ) { prop[ name ] = prop[ p ]; delete prop[ p ]; p = name; } if ( prop[p] === "hide" && hidden || prop[p] === "show" && !hidden ) { return opt.complete.call(this); } if ( ( p === "height" || p === "width" ) && this.style ) { // Store display property opt.display = jQuery.css(this, "display"); // Make sure that nothing sneaks out opt.overflow = this.style.overflow; } if ( jQuery.isArray( prop[p] ) ) { // Create (if needed) and add to specialEasing (opt.specialEasing = opt.specialEasing || {})[p] = prop[p][1]; prop[p] = prop[p][0]; } } if ( opt.overflow != null ) { this.style.overflow = "hidden"; } opt.curAnim = jQuery.extend({}, prop); jQuery.each( prop, function( name, val ) { var e = new jQuery.fx( self, opt, name ); if ( rfxtypes.test(val) ) { e[ val === "toggle" ? hidden ? "show" : "hide" : val ]( prop ); } else { var parts = rfxnum.exec(val), start = e.cur(true) || 0; if ( parts ) { var end = parseFloat( parts[2] ), unit = parts[3] || "px"; // We need to compute starting value if ( unit !== "px" ) { self.style[ name ] = (end || 1) + unit; start = ((end || 1) / e.cur(true)) * start; self.style[ name ] = start + unit; } // If a +=/-= token was provided, we're doing a relative animation if ( parts[1] ) { end = ((parts[1] === "-=" ? -1 : 1) * end) + start; } e.custom( start, end, unit ); } else { e.custom( start, val, "" ); } } }); // For JS strict compliance return true; }); }, stop: function( clearQueue, gotoEnd ) { /// <summary> /// Stops all currently animations on the specified elements. /// </summary> /// <param name="clearQueue" optional="true" type="Boolean">True to clear animations that are queued to run.</param> /// <param name="gotoEnd" optional="true" type="Boolean">True to move the element value to the end of its animation target.</param> /// <returns type="jQuery" /> var timers = jQuery.timers; if ( clearQueue ) { this.queue([]); } this.each(function() { // go in reverse order so anything added to the queue during the loop is ignored for ( var i = timers.length - 1; i >= 0; i-- ) { if ( timers[i].elem === this ) { if (gotoEnd) { // force the next step to be the last timers[i](true); } timers.splice(i, 1); } } }); // start the next in the queue if the last step wasn't forced if ( !gotoEnd ) { this.dequeue(); } return this; } }); // Generate shortcuts for custom animations // jQuery.each({ // slideDown: genFx("show", 1), // slideUp: genFx("hide", 1), // slideToggle: genFx("toggle", 1), // fadeIn: { opacity: "show" }, // fadeOut: { opacity: "hide" } // }, function( name, props ) { // jQuery.fn[ name ] = function( speed, callback ) { // return this.animate( props, speed, callback ); // }; // }); jQuery.fn[ "slideDown" ] = function( speed, callback ) { /// <summary> /// Reveal all matched elements by adjusting their height. /// </summary> /// <param name="speed" type="String">A string representing one of three predefined speeds ('slow', 'normal', or 'fast'), or /// the number of milliseconds to run the animation</param> /// <param name="callback" optional="true" type="Function">A function to be executed whenever the animation completes, once for each animated element. It should map function callback() such that this is the DOM element being animated.</param> /// <returns type="jQuery" /> return this.animate( genFx("show", 1), speed, callback ); }; jQuery.fn[ "slideUp" ] = function( speed, callback ) { /// <summary> /// Hiding all matched elements by adjusting their height. /// </summary> /// <param name="speed" type="String">A string representing one of three predefined speeds ('slow', 'normal', or 'fast'), or /// the number of milliseconds to run the animation</param> /// <param name="callback" optional="true" type="Function">A function to be executed whenever the animation completes, once for each animated element. It should map function callback() such that this is the DOM element being animated.</param> /// <returns type="jQuery" /> return this.animate( genFx("hide", 1), speed, callback ); }; jQuery.fn[ "slideToggle" ] = function( speed, callback ) { /// <summary> /// Toggles the visibility of all matched elements by adjusting their height. /// </summary> /// <param name="speed" type="String">A string representing one of three predefined speeds ('slow', 'normal', or 'fast'), or /// the number of milliseconds to run the animation</param> /// <param name="callback" optional="true" type="Function">A function to be executed whenever the animation completes, once for each animated element. It should map function callback() such that this is the DOM element being animated.</param> /// <returns type="jQuery" /> return this.animate( genFx("toggle", 1), speed, callback ); }; jQuery.fn[ "fadeIn" ] = function( speed, callback ) { /// <summary> /// Fades in all matched elements by adjusting their opacity. /// </summary> /// <param name="speed" type="String">A string representing one of three predefined speeds ('slow', 'normal', or 'fast'), or /// the number of milliseconds to run the animation</param> /// <param name="callback" optional="true" type="Function">A function to be executed whenever the animation completes, once for each animated element. It should map function callback() such that this is the DOM element being animated.</param> /// <returns type="jQuery" /> return this.animate( { opacity: "show" }, speed, callback ); }; jQuery.fn[ "fadeOut" ] = function( speed, callback ) { /// <summary> /// Fades the opacity of all matched elements to a specified opacity. /// </summary> /// <param name="speed" type="String">A string representing one of three predefined speeds ('slow', 'normal', or 'fast'), or /// the number of milliseconds to run the animation</param> /// <param name="callback" optional="true" type="Function">A function to be executed whenever the animation completes, once for each animated element. It should map function callback() such that this is the DOM element being animated.</param> /// <returns type="jQuery" /> return this.animate( { opacity: "hide" }, speed, callback ); }; jQuery.extend({ speed: function( speed, easing, fn ) { /// <summary> /// This member is internal. /// </summary> /// <private /> var opt = speed && typeof speed === "object" ? speed : { complete: fn || !fn && easing || jQuery.isFunction( speed ) && speed, duration: speed, easing: fn && easing || easing && !jQuery.isFunction(easing) && easing }; opt.duration = jQuery.fx.off ? 0 : typeof opt.duration === "number" ? opt.duration : jQuery.fx.speeds[opt.duration] || jQuery.fx.speeds._default; // Queueing opt.old = opt.complete; opt.complete = function() { if ( opt.queue !== false ) { jQuery(this).dequeue(); } if ( jQuery.isFunction( opt.old ) ) { opt.old.call( this ); } }; return opt; }, easing: { linear: function( p, n, firstNum, diff ) { /// <summary> /// This member is internal. /// </summary> /// <private /> return firstNum + diff * p; }, swing: function( p, n, firstNum, diff ) { /// <summary> /// This member is internal. /// </summary> /// <private /> return ((-Math.cos(p*Math.PI)/2) + 0.5) * diff + firstNum; } }, timers: [], fx: function( elem, options, prop ) { /// <summary> /// This member is internal. /// </summary> /// <private /> this.options = options; this.elem = elem; this.prop = prop; if ( !options.orig ) { options.orig = {}; } } }); jQuery.fx.prototype = { // Simple function for setting a style value update: function() { /// <summary> /// This member is internal. /// </summary> /// <private /> if ( this.options.step ) { this.options.step.call( this.elem, this.now, this ); } (jQuery.fx.step[this.prop] || jQuery.fx.step._default)( this ); // Set display property to block for height/width animations if ( ( this.prop === "height" || this.prop === "width" ) && this.elem.style ) { this.elem.style.display = "block"; } }, // Get the current size cur: function( force ) { /// <summary> /// This member is internal. /// </summary> /// <private /> if ( this.elem[this.prop] != null && (!this.elem.style || this.elem.style[this.prop] == null) ) { return this.elem[ this.prop ]; } var r = parseFloat(jQuery.css(this.elem, this.prop, force)); return r && r > -10000 ? r : parseFloat(jQuery.curCSS(this.elem, this.prop)) || 0; }, // Start an animation from one number to another custom: function( from, to, unit ) { this.startTime = now(); this.start = from; this.end = to; this.unit = unit || this.unit || "px"; this.now = this.start; this.pos = this.state = 0; var self = this; function t( gotoEnd ) { return self.step(gotoEnd); } t.elem = this.elem; if ( t() && jQuery.timers.push(t) && !timerId ) { timerId = setInterval(jQuery.fx.tick, 13); } }, // Simple 'show' function show: function() { /// <summary> /// Displays each of the set of matched elements if they are hidden. /// </summary> // Remember where we started, so that we can go back to it later this.options.orig[this.prop] = jQuery.style( this.elem, this.prop ); this.options.show = true; // Begin the animation // Make sure that we start at a small width/height to avoid any // flash of content this.custom(this.prop === "width" || this.prop === "height" ? 1 : 0, this.cur()); // Start by showing the element jQuery( this.elem ).show(); }, // Simple 'hide' function hide: function() { /// <summary> /// Hides each of the set of matched elements if they are shown. /// </summary> // Remember where we started, so that we can go back to it later this.options.orig[this.prop] = jQuery.style( this.elem, this.prop ); this.options.hide = true; // Begin the animation this.custom(this.cur(), 0); }, // Each step of an animation step: function( gotoEnd ) { /// <summary> /// This method is internal. /// </summary> /// <private /> var t = now(), done = true; if ( gotoEnd || t >= this.options.duration + this.startTime ) { this.now = this.end; this.pos = this.state = 1; this.update(); this.options.curAnim[ this.prop ] = true; for ( var i in this.options.curAnim ) { if ( this.options.curAnim[i] !== true ) { done = false; } } if ( done ) { if ( this.options.display != null ) { // Reset the overflow this.elem.style.overflow = this.options.overflow; // Reset the display var old = jQuery.data(this.elem, "olddisplay"); this.elem.style.display = old ? old : this.options.display; if ( jQuery.css(this.elem, "display") === "none" ) { this.elem.style.display = "block"; } } // Hide the element if the "hide" operation was done if ( this.options.hide ) { jQuery(this.elem).hide(); } // Reset the properties, if the item has been hidden or shown if ( this.options.hide || this.options.show ) { for ( var p in this.options.curAnim ) { jQuery.style(this.elem, p, this.options.orig[p]); } } // Execute the complete function this.options.complete.call( this.elem ); } return false; } else { var n = t - this.startTime; this.state = n / this.options.duration; // Perform the easing function, defaults to swing var specialEasing = this.options.specialEasing && this.options.specialEasing[this.prop]; var defaultEasing = this.options.easing || (jQuery.easing.swing ? "swing" : "linear"); this.pos = jQuery.easing[specialEasing || defaultEasing](this.state, n, 0, 1, this.options.duration); this.now = this.start + ((this.end - this.start) * this.pos); // Perform the next step of the animation this.update(); } return true; } }; jQuery.extend( jQuery.fx, { tick: function() { var timers = jQuery.timers; for ( var i = 0; i < timers.length; i++ ) { if ( !timers[i]() ) { timers.splice(i--, 1); } } if ( !timers.length ) { jQuery.fx.stop(); } }, stop: function() { clearInterval( timerId ); timerId = null; }, speeds: { slow: 600, fast: 200, // Default speed _default: 400 }, step: { opacity: function( fx ) { jQuery.style(fx.elem, "opacity", fx.now); }, _default: function( fx ) { if ( fx.elem.style && fx.elem.style[ fx.prop ] != null ) { fx.elem.style[ fx.prop ] = (fx.prop === "width" || fx.prop === "height" ? Math.max(0, fx.now) : fx.now) + fx.unit; } else { fx.elem[ fx.prop ] = fx.now; } } } }); if ( jQuery.expr && jQuery.expr.filters ) { jQuery.expr.filters.animated = function( elem ) { return jQuery.grep(jQuery.timers, function( fn ) { return elem === fn.elem; }).length; }; } function genFx( type, num ) { var obj = {}; jQuery.each( fxAttrs.concat.apply([], fxAttrs.slice(0,num)), function() { obj[ this ] = type; }); return obj; } if ( "getBoundingClientRect" in document.documentElement ) { jQuery.fn.offset = function( options ) { /// <summary> /// Set the current coordinates of every element in the set of matched elements, /// relative to the document. /// </summary> /// <param name="options" type="Object"> /// An object containing the properties top and left, which are integers indicating the /// new top and left coordinates for the elements. /// </param> /// <returns type="jQuery" /> var elem = this[0]; if ( options ) { return this.each(function( i ) { jQuery.offset.setOffset( this, options, i ); }); } if ( !elem || !elem.ownerDocument ) { return null; } if ( elem === elem.ownerDocument.body ) { return jQuery.offset.bodyOffset( elem ); } var box = elem.getBoundingClientRect(), doc = elem.ownerDocument, body = doc.body, docElem = doc.documentElement, clientTop = docElem.clientTop || body.clientTop || 0, clientLeft = docElem.clientLeft || body.clientLeft || 0, top = box.top + (self.pageYOffset || jQuery.support.boxModel && docElem.scrollTop || body.scrollTop ) - clientTop, left = box.left + (self.pageXOffset || jQuery.support.boxModel && docElem.scrollLeft || body.scrollLeft) - clientLeft; return { top: top, left: left }; }; } else { jQuery.fn.offset = function( options ) { /// <summary> /// Set the current coordinates of every element in the set of matched elements, /// relative to the document. /// </summary> /// <param name="options" type="Object"> /// An object containing the properties top and left, which are integers indicating the /// new top and left coordinates for the elements. /// </param> /// <returns type="jQuery" /> var elem = this[0]; if ( options ) { return this.each(function( i ) { jQuery.offset.setOffset( this, options, i ); }); } if ( !elem || !elem.ownerDocument ) { return null; } if ( elem === elem.ownerDocument.body ) { return jQuery.offset.bodyOffset( elem ); } jQuery.offset.initialize(); var offsetParent = elem.offsetParent, prevOffsetParent = elem, doc = elem.ownerDocument, computedStyle, docElem = doc.documentElement, body = doc.body, defaultView = doc.defaultView, prevComputedStyle = defaultView ? defaultView.getComputedStyle( elem, null ) : elem.currentStyle, top = elem.offsetTop, left = elem.offsetLeft; while ( (elem = elem.parentNode) && elem !== body && elem !== docElem ) { if ( jQuery.offset.supportsFixedPosition && prevComputedStyle.position === "fixed" ) { break; } computedStyle = defaultView ? defaultView.getComputedStyle(elem, null) : elem.currentStyle; top -= elem.scrollTop; left -= elem.scrollLeft; if ( elem === offsetParent ) { top += elem.offsetTop; left += elem.offsetLeft; if ( jQuery.offset.doesNotAddBorder && !(jQuery.offset.doesAddBorderForTableAndCells && /^t(able|d|h)$/i.test(elem.nodeName)) ) { top += parseFloat( computedStyle.borderTopWidth ) || 0; left += parseFloat( computedStyle.borderLeftWidth ) || 0; } prevOffsetParent = offsetParent, offsetParent = elem.offsetParent; } if ( jQuery.offset.subtractsBorderForOverflowNotVisible && computedStyle.overflow !== "visible" ) { top += parseFloat( computedStyle.borderTopWidth ) || 0; left += parseFloat( computedStyle.borderLeftWidth ) || 0; } prevComputedStyle = computedStyle; } if ( prevComputedStyle.position === "relative" || prevComputedStyle.position === "static" ) { top += body.offsetTop; left += body.offsetLeft; } if ( jQuery.offset.supportsFixedPosition && prevComputedStyle.position === "fixed" ) { top += Math.max( docElem.scrollTop, body.scrollTop ); left += Math.max( docElem.scrollLeft, body.scrollLeft ); } return { top: top, left: left }; }; } jQuery.offset = { initialize: function() { var body = document.body, container = document.createElement("div"), innerDiv, checkDiv, table, td, bodyMarginTop = parseFloat( jQuery.curCSS(body, "marginTop", true) ) || 0, html = "<div style='position:absolute;top:0;left:0;margin:0;border:5px solid #000;padding:0;width:1px;height:1px;'><div></div></div><table style='position:absolute;top:0;left:0;margin:0;border:5px solid #000;padding:0;width:1px;height:1px;' cellpadding='0' cellspacing='0'><tr><td></td></tr></table>"; jQuery.extend( container.style, { position: "absolute", top: 0, left: 0, margin: 0, border: 0, width: "1px", height: "1px", visibility: "hidden" } ); container.innerHTML = html; body.insertBefore( container, body.firstChild ); innerDiv = container.firstChild; checkDiv = innerDiv.firstChild; td = innerDiv.nextSibling.firstChild.firstChild; this.doesNotAddBorder = (checkDiv.offsetTop !== 5); this.doesAddBorderForTableAndCells = (td.offsetTop === 5); checkDiv.style.position = "fixed", checkDiv.style.top = "20px"; // safari subtracts parent border width here which is 5px this.supportsFixedPosition = (checkDiv.offsetTop === 20 || checkDiv.offsetTop === 15); checkDiv.style.position = checkDiv.style.top = ""; innerDiv.style.overflow = "hidden", innerDiv.style.position = "relative"; this.subtractsBorderForOverflowNotVisible = (checkDiv.offsetTop === -5); this.doesNotIncludeMarginInBodyOffset = (body.offsetTop !== bodyMarginTop); body.removeChild( container ); body = container = innerDiv = checkDiv = table = td = null; jQuery.offset.initialize = jQuery.noop; }, bodyOffset: function( body ) { var top = body.offsetTop, left = body.offsetLeft; jQuery.offset.initialize(); if ( jQuery.offset.doesNotIncludeMarginInBodyOffset ) { top += parseFloat( jQuery.curCSS(body, "marginTop", true) ) || 0; left += parseFloat( jQuery.curCSS(body, "marginLeft", true) ) || 0; } return { top: top, left: left }; }, setOffset: function( elem, options, i ) { // set position first, in-case top/left are set even on static elem if ( /static/.test( jQuery.curCSS( elem, "position" ) ) ) { elem.style.position = "relative"; } var curElem = jQuery( elem ), curOffset = curElem.offset(), curTop = parseInt( jQuery.curCSS( elem, "top", true ), 10 ) || 0, curLeft = parseInt( jQuery.curCSS( elem, "left", true ), 10 ) || 0; if ( jQuery.isFunction( options ) ) { options = options.call( elem, i, curOffset ); } var props = { top: (options.top - curOffset.top) + curTop, left: (options.left - curOffset.left) + curLeft }; if ( "using" in options ) { options.using.call( elem, props ); } else { curElem.css( props ); } } }; jQuery.fn.extend({ position: function() { /// <summary> /// Gets the top and left positions of an element relative to its offset parent. /// </summary> /// <returns type="Object">An object with two integer properties, 'top' and 'left'.</returns> if ( !this[0] ) { return null; } var elem = this[0], // Get *real* offsetParent offsetParent = this.offsetParent(), // Get correct offsets offset = this.offset(), parentOffset = /^body|html$/i.test(offsetParent[0].nodeName) ? { top: 0, left: 0 } : offsetParent.offset(); // Subtract element margins // note: when an element has margin: auto the offsetLeft and marginLeft // are the same in Safari causing offset.left to incorrectly be 0 offset.top -= parseFloat( jQuery.curCSS(elem, "marginTop", true) ) || 0; offset.left -= parseFloat( jQuery.curCSS(elem, "marginLeft", true) ) || 0; // Add offsetParent borders parentOffset.top += parseFloat( jQuery.curCSS(offsetParent[0], "borderTopWidth", true) ) || 0; parentOffset.left += parseFloat( jQuery.curCSS(offsetParent[0], "borderLeftWidth", true) ) || 0; // Subtract the two offsets return { top: offset.top - parentOffset.top, left: offset.left - parentOffset.left }; }, offsetParent: function() { /// <summary> /// This method is internal. /// </summary> /// <private /> return this.map(function() { var offsetParent = this.offsetParent || document.body; while ( offsetParent && (!/^body|html$/i.test(offsetParent.nodeName) && jQuery.css(offsetParent, "position") === "static") ) { offsetParent = offsetParent.offsetParent; } return offsetParent; }); } }); // Create scrollLeft and scrollTop methods jQuery.each( ["Left", "Top"], function( i, name ) { var method = "scroll" + name; jQuery.fn[ method ] = function(val) { /// <summary> /// Gets and optionally sets the scroll left offset of the first matched element. /// </summary> /// <param name="val" type="Number" integer="true" optional="true">A positive number representing the desired scroll left offset.</param> /// <returns type="Number" integer="true">The scroll left offset of the first matched element.</returns> var elem = this[0], win; if ( !elem ) { return null; } if ( val !== undefined ) { // Set the scroll offset return this.each(function() { win = getWindow( this ); if ( win ) { win.scrollTo( !i ? val : jQuery(win).scrollLeft(), i ? val : jQuery(win).scrollTop() ); } else { this[ method ] = val; } }); } else { win = getWindow( elem ); // Return the scroll offset return win ? ("pageXOffset" in win) ? win[ i ? "pageYOffset" : "pageXOffset" ] : jQuery.support.boxModel && win.document.documentElement[ method ] || win.document.body[ method ] : elem[ method ]; } }; }); // Create scrollLeft and scrollTop methods jQuery.each( ["Left", "Top"], function( i, name ) { var method = "scroll" + name; jQuery.fn[ method ] = function(val) { /// <summary> /// Gets and optionally sets the scroll top offset of the first matched element. /// </summary> /// <param name="val" type="Number" integer="true" optional="true">A positive number representing the desired scroll top offset.</param> /// <returns type="Number" integer="true">The scroll top offset of the first matched element.</returns> var elem = this[0], win; if ( !elem ) { return null; } if ( val !== undefined ) { // Set the scroll offset return this.each(function() { win = getWindow( this ); if ( win ) { win.scrollTo( !i ? val : jQuery(win).scrollLeft(), i ? val : jQuery(win).scrollTop() ); } else { this[ method ] = val; } }); } else { win = getWindow( elem ); // Return the scroll offset return win ? ("pageXOffset" in win) ? win[ i ? "pageYOffset" : "pageXOffset" ] : jQuery.support.boxModel && win.document.documentElement[ method ] || win.document.body[ method ] : elem[ method ]; } }; }); function getWindow( elem ) { return ("scrollTo" in elem && elem.document) ? elem : elem.nodeType === 9 ? elem.defaultView || elem.parentWindow : false; } // Create innerHeight, innerWidth, outerHeight and outerWidth methods jQuery.each([ "Height" ], function( i, name ) { var type = name.toLowerCase(); // innerHeight and innerWidth jQuery.fn["inner" + name] = function() { /// <summary> /// Gets the inner height of the first matched element, excluding border but including padding. /// </summary> /// <returns type="Number" integer="true">The outer height of the first matched element.</returns> return this[0] ? jQuery.css( this[0], type, false, "padding" ) : null; }; // outerHeight and outerWidth jQuery.fn["outer" + name] = function( margin ) { /// <summary> /// Gets the outer height of the first matched element, including border and padding by default. /// </summary> /// <param name="margins" type="Map">A set of key/value pairs that specify the options for the method.</param> /// <returns type="Number" integer="true">The outer height of the first matched element.</returns> return this[0] ? jQuery.css( this[0], type, false, margin ? "margin" : "border" ) : null; }; jQuery.fn[ type ] = function( size ) { /// <summary> /// Set the CSS height of every matched element. If no explicit unit /// was specified (like 'em' or '%') then &quot;px&quot; is added to the width. If no parameter is specified, it gets /// the current computed pixel height of the first matched element. /// Part of CSS /// </summary> /// <returns type="jQuery" type="jQuery" /> /// <param name="cssProperty" type="String"> /// Set the CSS property to the specified value. Omit to get the value of the first matched element. /// </param> // Get window width or height var elem = this[0]; if ( !elem ) { return size == null ? null : this; } if ( jQuery.isFunction( size ) ) { return this.each(function( i ) { var self = jQuery( this ); self[ type ]( size.call( this, i, self[ type ]() ) ); }); } return ("scrollTo" in elem && elem.document) ? // does it walk and quack like a window? // Everyone else use document.documentElement or document.body depending on Quirks vs Standards mode elem.document.compatMode === "CSS1Compat" && elem.document.documentElement[ "client" + name ] || elem.document.body[ "client" + name ] : // Get document width or height (elem.nodeType === 9) ? // is it a document // Either scroll[Width/Height] or offset[Width/Height], whichever is greater Math.max( elem.documentElement["client" + name], elem.body["scroll" + name], elem.documentElement["scroll" + name], elem.body["offset" + name], elem.documentElement["offset" + name] ) : // Get or set width or height on the element size === undefined ? // Get width or height on the element jQuery.css( elem, type ) : // Set the width or height on the element (default to pixels if value is unitless) this.css( type, typeof size === "string" ? size : size + "px" ); }; }); // Create innerHeight, innerWidth, outerHeight and outerWidth methods jQuery.each([ "Width" ], function( i, name ) { var type = name.toLowerCase(); // innerHeight and innerWidth jQuery.fn["inner" + name] = function() { /// <summary> /// Gets the inner width of the first matched element, excluding border but including padding. /// </summary> /// <returns type="Number" integer="true">The outer width of the first matched element.</returns> return this[0] ? jQuery.css( this[0], type, false, "padding" ) : null; }; // outerHeight and outerWidth jQuery.fn["outer" + name] = function( margin ) { /// <summary> /// Gets the outer width of the first matched element, including border and padding by default. /// </summary> /// <param name="margin" type="Map">A set of key/value pairs that specify the options for the method.</param> /// <returns type="Number" integer="true">The outer width of the first matched element.</returns> return this[0] ? jQuery.css( this[0], type, false, margin ? "margin" : "border" ) : null; }; jQuery.fn[ type ] = function( size ) { /// <summary> /// Set the CSS width of every matched element. If no explicit unit /// was specified (like 'em' or '%') then &quot;px&quot; is added to the width. If no parameter is specified, it gets /// the current computed pixel width of the first matched element. /// Part of CSS /// </summary> /// <returns type="jQuery" type="jQuery" /> /// <param name="cssProperty" type="String"> /// Set the CSS property to the specified value. Omit to get the value of the first matched element. /// </param> // Get window width or height var elem = this[0]; if ( !elem ) { return size == null ? null : this; } if ( jQuery.isFunction( size ) ) { return this.each(function( i ) { var self = jQuery( this ); self[ type ]( size.call( this, i, self[ type ]() ) ); }); } return ("scrollTo" in elem && elem.document) ? // does it walk and quack like a window? // Everyone else use document.documentElement or document.body depending on Quirks vs Standards mode elem.document.compatMode === "CSS1Compat" && elem.document.documentElement[ "client" + name ] || elem.document.body[ "client" + name ] : // Get document width or height (elem.nodeType === 9) ? // is it a document // Either scroll[Width/Height] or offset[Width/Height], whichever is greater Math.max( elem.documentElement["client" + name], elem.body["scroll" + name], elem.documentElement["scroll" + name], elem.body["offset" + name], elem.documentElement["offset" + name] ) : // Get or set width or height on the element size === undefined ? // Get width or height on the element jQuery.css( elem, type ) : // Set the width or height on the element (default to pixels if value is unitless) this.css( type, typeof size === "string" ? size : size + "px" ); }; }); // Expose jQuery to the global object window.jQuery = window.$ = jQuery; })(window); By viewing downloads associated with this article you agree to the Terms of use and the article's licence. If a file you wish to view isn't highlighted, and is a text file (not binary), please let us know and we'll add colourisation support for it. License This article, along with any associated source code and files, is licensed under The Code Project Open License (CPOL) About the Author Shahriar Iqbal Chowdhury/Galib Technical Lead Bangladesh Bangladesh I am a Software Engineer and Microsoft .NET technology enthusiast. Professionally I worked on several business domains and on diverse platforms. I love to learn and share new .net technology and my experience I gather in my engineering career. You can find me from here   Personal Site Personal Blog FB MS enthusiasts group About Me | Advertise | Privacy | Mobile Web01 | 2.8.140309.2 | Last Updated 9 Aug 2012 Article Copyright 2012 by Shahriar Iqbal Chowdhury/Galib Everything else Copyright © CodeProject, 1999-2014 Terms of Use Layout: fixed | fluid
__label__pos
0.991121
Javatpoint Logo Javatpoint Logo Struts 2 Interceptors Tutorial Interceptor is an object that is invoked at the preprocessing and postprocessing of a request. In Struts 2, interceptor is used to perform operations such as validation, exception handling, internationalization, displaying intermediate result etc. Advantage of interceptors Pluggable If we need to remove any concern such as validation, exception handling, logging etc. from the application, we don't need to redeploy the application. We only need to remove the entry from the struts.xml file. Struts 2 default interceptors There are many interceptors provided by struts 2 framework. We have option to create our own interceptors. The struts 2 default interceptors are as follows: 1) alias It converts similar parameters that have different names between requests. 2) autowiring 3) chain If it is used with chain result type, it makes the properties of previous action available in the current action. 4) checkbox It is used to handle the check boxes in the form. By this, we can detect the unchecked checkboxes. 5) cookie It adds a cookie to the current action. 6) conversionError It adds conversion errors to the action's field errors. 7) createSession It creates and HttpSession object if it doesn't exists. 8) clearSession It unbinds the HttpSession object. 9) debugging It provides support of debugging. 10) externalRef 11) execAndWait It sends an intermediate waiting page for the result. 12) exception It maps exception to a result. 13) fileUpload It provides support to file upload in struts 2. 14) i18n It provides support to internationalization and localization. 15) jsonValidation It provides support to asynchronous validation. 16) logger It outputs the action name. 17) store It stores and retrieves action messages, action errors or field errors for action that implements ValidationAware interface. 18) modelDriven It makes other model object as the default object of valuestack. 19) scopedModelDriven It is similar to ModelDriven but works for action that implements ScopedModelDriven. 20) params It populates the action properties with the request parameters. 21) actionMappingParams 22) prepare It performs preparation logic if action implements Preparable interface. 23) profiling It supports action profiling. 24) roles It supports role-based action. 25) scope It is used to store the action state in the session or application scope. 26) servletConfig It provides access to maps representing HttpServletRequest and HttpServletResponse. 27) sessionAutowiring 28) staticParams It maps static properties to action properties. 29) timer It outputs the time needed to execute an action. 30) token It prevents duplication submission of request. 31) tokenSession It prevents duplication submission of request. 32) validation It provides support to input validation. 33) workflow It calls the validate method of action class if action class implements Validateable interface. 34) annotationWorkflow 35) multiselect Please Share facebook twitter google plus pinterest Learn Latest Tutorials Preparation Trending Technologies B.Tech / MCA
__label__pos
0.823991
Logo Programming-Idioms This language bar is your friend. Select your favorite languages! Idiom #222 Find the first index of an element in list Set i to the first index in list items at which the element x can be found, or -1 if items does not contain x. import "slices" i := slices.Index(items, x) i := -1 for j, e := range items { if e == x { i = j break } } (defn find-index [x items] (or (->> items (map-indexed vector) (filter #(= x (peek %))) ffirst) -1)) (defn find-index [x items] (reduce-kv #(if (= x %3) (reduced %2) %1) -1 items)) auto it = std::find(items.begin(), items.end(), x); i = it == items.end() ? std::distance(items.begin(), it) : -1; using System.Collections.Generic; var i = items.IndexOf(x) i=items.indexOf(x) i = Enum.find_index(items, & &1 == x) i = findloc(items, x) if (i == 0) i = -1 import Data.Foldable (find) import Data.Maybe (fromMaybe) findIndex x items = fst <$> (find ((==x) . snd) . zip [0..]) items i = fromMaybe -1 (findIndex x items) let i = items.indexOf(x); int i = -1; for(int j=0;j<items.length;j++){ if(items[j].equals(x)){ i = j; break; } } int i = items.indexOf​(x); i := Items.IndexOf(x); $i = -1; $index = 0; foreach (@items) { $i = $index, last if $x eq $items[$index]; $index++; } i = items.index(x) if x in items else -1 i = items.index(x) || -1 let i = items.iter().position(|y| *y == x).map_or(-1, |n| n as i32); let opt_i = items.iter().position(|y| *y == x); let i = match opt_i { Some(index) => index as i32, None => -1 }; New implementation... < > programming-idioms.org
__label__pos
0.891803
1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More. events not loading Discussion in 'Assetto Corsa' started by Eckhart von Glan, Oct 19, 2015. 1. Eckhart von Glan Eckhart von Glan Messages: 4,873 Ratings: +814 haven't played assetto cars for months. today i tried to fire it up again but could not load any events, neither single player nor multiplayer. in single player the loading screen comes on after you have selected either a challenge or a single event (car/track combo). the wheel(spokes) in the middle of the screen does/do not turn and after some time you get taken back to the screen before. in multiplayer it tells you to get the right car (in my case one of the lotusses in the basic car lineup) even though you have already pre-selected it. any ideas?   2. Radu Oros Radu Oros Messages: 1,324 Ratings: +403 Verify cache integrity on steam, for AC, in properties for the game from steam library.   3. Pelukas Pelukas Messages: 4 Ratings: +2 ....   4. Pelukas Pelukas Messages: 4 Ratings: +2  
__label__pos
0.806178
18c10Question 1: In the given diagram, chord AB = chord BC and AB = AC. (i) What is the relation between \widehat{AB} and \widehat{BC} ? (ii) What is the relation between \angle AOB and \angle BOC ? (iii) If \widehat{AD}  is greater than \widehat{ABC} , then what is the relation between the chord AD and AC ? (iv) If \angle AOB = 50^o , find the measure of  \angle BAC . c1Answer: Given: AB = BC (i) \widehat{AB}=\widehat{BC}  (Since equal chords subtend equal arcs) (ii) \angle AOB = \angle BOC  (equal arcs will subtend equal angles at the center) (iii) If \widehat{AD} > \widehat{ABC}  Therefore AD > AC  (iv) Given \angle AOB = 50^o   \displaystyle \angle ABC = \frac{1}{2} Reflex \ \angle AOC = \frac{1}{2} . 260 = 130^o  \displaystyle \text{Therefore } \angle BAC = \frac{1}{2} (180-130) = 25^o  \\ Question 2: In \triangle ABC , the \perp from vertices A and B on their opposite sides meet (when produced) the circumference of the triangle at points D and E respectively. Prove that: \widehat{CD} = \widehat{CE}  c2.jpgAnswer: Consider \triangle AOM  & \triangle BPN  \angle AMO = \angle BNO = 90^o  (given) \angle NBO = \angle AOM  (vertically opposite angles) \therefore \triangle AOM \sim \triangle BPN  (AAA postulate) Therefore \angle NBO = \angle MAO  Therefore Arcs that subtend equal angle at circumference are equal Therefore \widehat{CD} = \widehat{CE}   \\ Question 3: In a cyclic trapezium, prove that non parallel sides are equal and the diagonals are also equals. c3Answer: ABCD   is a cyclic trapezium. AB \parallel DC   Chord AD   subtends \angle ABD   at circumference Chord BC    subtends \angle BDC   at circumference But \angle ABD = \angle BDC   (vertically opposite angles) Therefore Chord \ AD = Chord \ BC   \Rightarrow AD = BC   Now in \triangle ADC   & \triangle BDC   DC   is common \angle CAD = \angle DBC   (angles in the same segment) AD = BC   (proved above) \therefore \triangle ADC \cong \triangle BDC   (SAS axiom) \therefore AC = DB   \\ 18c9Question 4: In the given diagram, AD is the diameter of the circle with center O . Chords AB,=BC = CD .  If \angle DEF = 110^o , find (i) \angle AEF (ii) \angle FAB Answer: Given AB = BC = CD (i) AOD is the diameter \angle AED = 90^o (angle in semicircle) \angle AEF + \angle AED = \angle FED c4.jpg \angle AEF = 110-90=20^o (ii) Since AB = BC = CD (given) \angle AOB = \angle BOC = \angle COD (equal arcs subtend equal angles at center) We know \angle AOD = 180^o \Rightarrow \angle AOB = \angle BOC = \angle COD = 60^o In \triangle AOB OA = OB (radius of the same circle) Therefore \angle OAB = \angle OBA \angle OAB + \angle OBA = 180-\angle AOB = 180-60 = 120^o \Rightarrow \angle OAB = \angle OBA = 60^o ADEF is a cyclic quadrilateral \angle DEF + \angle DAF = 180^o (opposite angles are supplementary) \angle DAF = 180-110=70^o Now \angle FAB = \angle DAF + \angle OAB = 70+60=130^o \\ 18c8Question 5: In the given diagram, if \widehat{AB} = \widehat{CD}  of circle with center O , prove that quadrilateral ABCD is an isosceles trapezium. Answer: Given \widehat{AB}=\widehat{CD}  \angle ADB = \angle DBC  (Equal arcs subtend equal angles at the circumference)c5 \Rightarrow AD \parallel BC  (alternate angles are equal) Therefore ABCD  is a trapezium Also Chords AB = Chard CD \ (since \ \widehat{AB}=\widehat{CD} ) Therefore ABCE  is an Isosceles trapezium. \\ 18c7 Question 6:  In a given figure \triangle ABC is an isosceles triangle and O is the center of the circumcircle. Prove AP bisects \angle BPC . Answer: Given AB = AC  (Since \triangle ABC is an isosceles triangle)c6 \angle APB = \angle APC  (equal chords subtend equal angles on the circumference) Therefore AP  bisects \angle BPC . \\ Question 7: If two sides of a cyclic quadrilateral are parallel, prove that: (i) its other two sides are equal (ii) its diagonals are equal Answer:c7 (i) Given AB \parallel DC  Therefore \angle BAC = \angle DCA  (alternate angles) Chord AD  subtends \angle DCA  on circumference. Chord BC  subtends \angle CAB  on circumference. Therefore AD = BC  (since equal chords subtend equal angles on the circumference) (ii) Consider \triangle ADB \ \ \& \ \  \triangle ABC  AB  is common AD = CB  (proved above) \angle ACB = \angle ADB  (angles in the same segment) Therefore \triangle ADC \cong \triangle ABC  (by SAS axiom) Therefore AC = DB  (corresponding parts of congruent triangles are equal) \\ 18c6Question 8: In the given diagram, circle with center O . PQ=QR=RS and \angle PTS=75^o . Calculate: (i) \angle POS (ii) \angle QOR (iii) \angle PQR Answer: Given PQ = QR = RS c8.jpg \Rightarrow \angle POQ = \angle QOR = \angle ROS (Equal chords subtend equal angles at the center of a circle) \angle POS = 2 \ \angle PTS (angle subtended at the center is twice that of the one subtended on the circumference) \displaystyle \angle POQ = \angle QOR = \angle ROS = \frac{150}{3} = 50^o In \triangle OPQ , OP = OQ (radius of the same circle) \angle OPQ = \angle OQP Therefore \angle OPQ + \angle OQP + \angle POQ = 180^o \angle OPQ + \angle OQP = 180-50=130^o 2 \angle OPQ = 130 \angle OPQ = 65^o Similarly, in \triangle OQR, \angle OQR = \angle ORQ = 65^o and in \triangle ORS, \angle ORS = \angle OSR = 65^o Therefore (i) \angle POS = 150^o (ii) \angle QOR = 50^o (iii) \angle PQR = \angle PQO + \angle OQR = 65+65 = 130^o \\ 18c5Question 9: In the given diagram, AB is the side of regular six-side polygon and AC is a side of a regular eight-sides polygon inscribed in a circle with center O . Calculate: (i) \angle AOB (ii) \angle ACB (iii) \angle ABC Answer: (i) Since AB is the side of a regular hexagon \angle AOB = 60^o (ii) \widehat{AB} subtends \angle ACB at the circumference and \angle AOB at the center \displaystyle \text{We know } \angle ACB = \frac{1}{2} \angle AOB = \frac{60}{2} = 30^o (iii) Since AC is the side of a regular octagon \displaystyle \angle AOC = \frac{360}{8} = 45^o \widehat{AC} subtends \angle ABC at the circumference and \angle AOC at the center \displaystyle \text{Therefore } \angle ABC = \frac{1}{2} \angle AOC = \frac{45}{2} = 22.5^o \\ Question 10: In a regular pentagon ABCDE inscribed in a circle, find the ratio of the \angle EDA : \angle ADC [1990] Answer:c10.jpg Consider \widehat{AE} It subtends \angle AOE at the center and \angle ADE at the circumference \displaystyle \text{Therefore } \angle ADE = \frac{1}{2} \angle AOE = \frac{1}{2} \times \frac{360}{5} = 36^o Similarly, for \widehat{BC} we have \angle BDC = 36^o \angle ADC = \angle ADB + \angle BDC = 36+36=72^o \angle ADE : \angle ADC = 36 :72 =  1:2 \\ 18c4Question 11: In the given diagram, AB=BC=CD and \angle ABC = 132^o . Find: (i) \angle AEB (ii) \angle AED (iii) \angle COD [1993] Answer: Given AB = BC = CD, ABC = 32^o \Rightarrow \angle AOB = \angle BOC = \angle COD (equal arcs subtend equal angles at the center of a circle) (i) In cyclic quadrilateral ABCE c11.jpg \angle ABC + \angle AEC = 180^o (opposite angles in a cyclic quadrilateral are supplementary) 132+ \angle AEC = 180 \Rightarrow \angle AEC = 48^o Since AB = BC \Rightarrow \angle AEB = \angle BEC (equal chords subtend equal angles on the circumference) \displaystyle \therefore \angle AEB = \frac{1}{2} \angle AEC = 24 (ii) Since AB = BC = CD \angle AEB = \angle BEC = \angle CED \angle AED = 24+24+24=72 (iii) \widehat{CD} subtends \angle COD at the center and \angle CED on the circumference \therefore \angle COD = 2 \angle CED = 2 \times 24 = 48^o \\ c12.jpgQuestion 12: In the diagram, O is the center of the circle and the length of \widehat{AB} = 2 \times \widehat{BC} . If \angle AOB=108^o find: (i) \angle CAB (ii) \angle ADB [1996] Answer: Given \widehat{AB} = 2 \times \widehat{BC}, \angle AOB = 108^o (i) \angle AOB = 2 \angle BOC  \displaystyle \Rightarrow \angle BOC = \frac{108}{2} = 54 (ii) \displaystyle \angle BAC = \frac{1}{2} \angle BOC (angle subtended at the center is twice that subtended at the circumference by a chord) \displaystyle \angle BAC = \frac{1}{2} \times 54 = 27^o (iii) Similarly, \displaystyle \angle ACB = \frac{1}{2} \angle AOB = \frac{108}{2} = 54 In cyclic quadrilateral ADBC \angle ADB + \angle ACB = 180^o \Rightarrow \angle ADB = 180-54=126^o \\ c13 Question 13: In the diagram given below, O is the center of the circle. AB is the side of regular pentagon and AC is the side of a regular hexagon. Find the angles of the \triangle ABC . Answer: AB is the side of a regular pentagon \displaystyle \Rightarrow \angle AOB = \frac{360}{5} = 72^o c14 AC is a side of regular hexagon \displaystyle \Rightarrow \angle AOC = \frac{360}{6} = 60^o Now \angle AOB + \angle AOC + reflex \angle BOC = 360^o \angle BOC = 360 - 72-60 = 228^o \widehat{BC} subtends \angle BOC at the center and \angle BAC on the circumference \displaystyle \angle BAC = \frac{1}{2} \angle BOC = \frac{228}{2} = 114^o Similarly \displaystyle \angle ABC = \frac{1}{2} \angle AOC = \frac{60}{2} = 30^o \displaystyle \angle ACB = \frac{1}{2} \angle AOB = \frac{1}{2} \times 72 = 36^o Therefore \angle ABC = 30^o, \angle ACB = 36^o and \angle BAC = 114^o \\ 18c1Question 14: In the given diagram, BD is the side of a regular hexagon, DC is the side of a regular pentagon and AD is a diameter. Calculate: (i) \angle ADC (ii) \angle BDA (iii) \angle ABC (iv) \angle AEC [1984] Answer:c15.jpg BD is a side of a regular hexagon \displaystyle \text{(i) } \angle BOD = \frac{360}{6} = 60^o DC is a side of regular pentagon \displaystyle \angle DOC = \frac{360}{5} = 72^o (ii) In \triangle BOD, \angle BOD = 60^o OB = OD (radius of the same circle) \therefore \angle OBD = \angle ODB = 60^o (iii) In \triangle OCD, \angle COD = 72^o \ and \  OC = OD \displaystyle \angle ODC = \frac{1}{2} (180-72) = 54^o (iv) In cyclic quadrilateral AECD \angle AEC + \angle ADC = 180^o (opposite angles of a cyclic quadrilateral are supplementary) \angle AEC = 180-54 = 126^o
__label__pos
1
Effective Domain Model Validation with Hibernate Validator Alejandro Gervasio Alejandro Gervasio Share Let’s face it, domain model validation has always been a pretty untamable beast (and most likely this won’t change anytime soon) because the validation process itself is strongly bound to the context where it takes place. It’s feasible, however, to encapsulate the mechanics of validation by using some external class libraries, rather than messing up our lives doing it ourselves from scratch. This is exactly where Hibernate Validator comes into play, the reference implementation of Java Beans Validation 1.0 / 1.1 (JSR 303), a robust validation model based on annotations that ships with Java EE 6 and higher. This article will walk you through using Hibernate Validator in a pragmatic way. The Contextual Nature of Domain Model Validation Independent of your language of choice, building a rich domain model is one of the most challenging tasks you can tackle as a developer. And on top of that you’ll have to make sure that the data that hydrates the model is valid, thus assuring that its integrity is properly maintained. Unfortunately, in many cases making domain objects valid in the context of the containing application is far from trivial, due to the intrinsic contextual nature of the validation process per se. To put it in another way: If the arguments taken by a domain object are supplied by the application’s environment (for instance by using plain Dependency Injection, Factories, Builders and so on) rather than by an external upper tier, then validating the object should be straightforward and constrained to a very limited scope. Conversely, if the arguments in question are injected from an outer layer (a user interface layer is a good example of this), the validation process can be cumbersome and tedious, in most cases leading to having chunks of boilerplate code scattered across multiple application layers. In the end, everything boils down to this simple yet fundamental question: What makes a domain object valid? Should its state be validated before being persisted or updated in a database, or when passed around to other layer(s)? The logical answer is: It depends. Remember that validation is always contextual! So no matter what approach you use to decide whether your domain objects are valid, Java Beans Validation will make the process easier. Introducing Java Bean Validation with JSR 303 Prior to Java EE 6, Java didn’t provide a standard way of validating the fields of a domain class by mean of a centralized mechanism. But things have changed for the better since then. The Java Beans Validation specification makes it fairly easy to selectively validate class fields (and even entire classes) by using constraints declared with a few intuitive annotations. At the time of this writing, JSR 303 has only two compliant implementations that you can pick up out there, Apache BVal and Hibernate Validator. The latter is the reference implementation, which can be consumed as a standalone library, completely decoupled from the popular ORM framework. With that said, let’s see now how to get started using the Java Beans Validation / Hibernate Validator tandem for performing effective domain model validation in the real world. Defining a Basic Domain Model As usual, a nice way to show how to utilize Java Beans Validation for validating a domain model is with a concrete example. Considering that the standard implements an annotation-based validation schema, the classes that are part of the domain model must always be constrained with annotations. In this case, for clarity’s sake, the domain model I want to validate will be composed of only one naive, anemic class, which will be the blueprint for user objects: public class User { private int id; @NotEmpty(message = "Name is mandatory") @Size(min = 2, max = 32, message = "Name must be between 2 and 32 characters long") private String name; @NotEmpty(message = "Email is mandatory") @Email(message = "Email must be a well-formed address") private String email; @NotEmpty(message = "Biography is mandatory") @Size(min = 10, max = 140, message = "Biography must be between 10 and 140 characters long") private String biography; public User(String name, String email, String biography) { this.name = name; this.email = email; this.biography = biography; } // Setters and Getters for name, email and biography } There is nothing worth discussing except for the constraints declared on top of each field. For instance, the @NotEmpty(message = "Name is mandatory") annotation states that the name field must be, yes, a non-empty string. Even though it’s pretty self-explanatory, the message attribute is used for defining the message that will be displayed if the constrained field raises a violation when being validated. Even better it’s possible to customize many constraints with parameters in order to express more refined criteria. Consider the @Size(min = 2, max = 32, message = "...") annotation. It expresses, well, exactly what the message says. Not rocket science, right? The specification provides a few more, handy annotations. For the full list, feel free to check them here. Microscope Hibernate Validation Validating Constraints At this point, we’ve managed to define a constrained model class by using Java Beans Validation, which is all well and fine. But you might be wondering what are the practical benefits of doing this? The laconic answer is: none – so far. The class is ready to be validated, sure, but the missing piece here is having a mechanism, capable of scanning the annotations, checking the values assigned to the constrained fields, and returning the validation errors (or in JSR 303 terminology, the constraint violations). And that’s exactly how Hibernate Validator works under the hood. But let’s be frank: The above explanation would be just technical gibberish if we don’t see at least a contrived example that shows how to use Hibernate Validator for validating the User class: Validator validator = Validation.buildDefaultValidatorFactory().getValidator(); User user = new User("John Doe", "no-mail", ""); validator .validate(user).stream() .forEach(violation -> System.out.println(violation.getMessage())); That was really easy, wasn’t it? The snippet first grabs an instance of Hibernate Validator through the static buildDefaultValidatorFactory() and getValidator() methods that are part of the Bean Validation API, and uses the validate() method for validating a potentially invalid user object. In this case, the constraint violations are displayed in the console by using streams and lambdas altogether. It’s possible, however, to get the same result by using a standard for loop rather than the newer forEach. Encapsulating Validation Logic in a Service Component Of course, it’s ridiculously simple (and very, very tempting, to be frank) to start dropping Validator instances here and there, and validate the constrained classes in multiple places, even in the wrong ones! But that would be a flagrant violation of the DRY Principle (aka a WET solution) that would lead to duplicated code across several layers. Yes, definitely bad design. Instead, it’d be a lot more effective to encapsulate Hibernate Validator inside the boundaries of a decoupled service component, which could be potentially reused everywhere. In a nutshell, all that we need to do for wrapping it behind the fences of such a service component is a simple contract, defined through an interface, and a broadly generic implementation: public interface EntityValidator<T> { Set<ConstraintViolation<T>> validate(T t); } public class BaseEntityValidator<T> implements EntityValidator<T> { protected final Validator validator; public BaseEntityValidator(Validator validator) { this.validator = validator; } public Set<ConstraintViolation<T>> validate(T t) { return validator.validate(t); } } By using plain delegation, we’ve created a working validation module, which takes a JSR 303-compliant implementation in the constructor, and uses its validate() method for validating a given object of type T. The only detail worth pointing here is that the method in question returns a set containing the corresponding constraint violation objects, after the object has been properly validated. At first glance, the BaseEntityValidator class looks quite simple. But this is just a misleading impression, trust me. The class not only takes advantage of interface-based polymorphism (aka subtype polymorphism), it also acts as an adapter to the validator itself, hence making it possible to selectively expose the validator’s native methods to client code and even add domain-specific ones. If you’re wondering how to use the BaseEntityValidator class to validate a user object, here’s how the process should be performed: // ideally the validator is injected but in this case we’ll create it explicitly EntityValidator<User> userValidator = new BaseEntityValidator<>( Validation.buildDefaultValidatorFactory().getValidator()); User user = new User("John Doe", "no-email", ""); validator .validate(user).stream() .forEach(violation -> System.out.println(violation.getMessage())); Additionally, there’s plenty of room for using the class in different contexts and scenarios. For instance, we could develop a basic web application, similar to the one I built in the Servlet API tutorial, and validate user data submitted through an HTML form in an effective and performant manner. As building such web application is definitively out of this post’s scope, the task will be left as homework for you, in case that you want to start pulling the reins of Hibernate Validator in the Web terrain. Creating Custom Validation Constraints and Validators At this point, it should be clear that Hibernate Validator is a hard-to-beat contender when it comes to validating domain objects in a straightforward fashion. But there’s more yet: Even when JSR 303 ships by default with a robust set of constraint violations, which will cover the most typical validation requirements of daily developers like you and me, it’s worth mentioning that its core functionality can be easily extended by means of custom validation constraints and validators. In fact, creating a custom validation constraint and a matching custom validator is a no-brainer process that boils down to following these steps: 1. Defining an annotation interface, which must specify the target(s) of the validation constraint, for how long the annotation information will be available to the compiler (aka the Retention Policy), and finally the custom validation class associated with the constraint. 2. Creating the custom validation class itself. As usual, a hands-on example is the best way to grasp the underlying logic of this process. So, let’s say we want to apply a custom email validation constraint to the User class, instead of using the default one included with JSR 303. In that case, first we need to define the corresponding annotation interface, as follows: @Target({ElementType.METHOD, ElementType.FIELD}) @Retention(RetentionPolicy.RUNTIME) @Constraint(validatedBy = EmailValidator.class) public @interface ValidEmail { String message() default "Email must be a well-formed address"; Class<?>[] groups() default {}; Class<? extends Payload>[] payload() default{}; } As shown above, the ValidEmail annotation tells the compiler that the constraint violation should be retained until runtime (@Retention(RetentionPolicy.RUNTIME)) and be applicable to both methods and fields (@Target({ElementType.METHOD, ElementType.FIELD}). It’s clear to see here that the @Constraint annotation binds the custom constraint to a custom EmailValidator class, which we will look at after examining the annotation’s methods. Lastly, the message() method defines, of course, the message that must be displayed if the constraint is violated. Additionally, the groups() method allows to specify which constraints should be validated when the validator is called, in a per-group basis. By default, all the constraints are checked within the default group, meaning that each constraint will be validated regardless of the target object’s lifecycle phase. It’s possible, however, to set up different groups in the form of simple interfaces, and specify which constraints must be validated according to a particular lifecycle phase. For brevity’s sake, the above example uses the default group. Finally, the payload() method can be used for attaching payload objects, which hold additional information about the constraints, and can be fetched when validating the target object. Now let’s turn to the EmailValidator class, which implements the actual verification. Here’s how a naive implementation might look: public class EmailValidator implements ConstraintValidator<ValidEmail, String> { private static final Pattern VALID_EMAIL_PATTERN = Pattern.compile( "^[A-Z0-9._%+-]+@[A-Z0-9.-]+\\.[A-Z]{2,6}$", Pattern.CASE_INSENSITIVE); @Override public void initialize(ValidEmail constraintAnnotation) { // can be used to set the instance up for validation } @Override public boolean isValid( String email, ConstraintValidatorContext constraintValidatorContext) { Matcher matcher = VALID_EMAIL_PATTERN.matcher(email); return matcher.find(); } } There are only a couple of details worth highlighting here: The first one is that the custom validators must implement the native ConstraintValidator interface and specify as type parameters the type of the custom constraint (here ValidEmail) and the type being constrained (String). The second detail is the isValid() method itself, which validates the supplied email address. Last but not least, the declaration of the email field within the User class must be refactored, that way it can bind the custom validation constraint to the customEmailValidator class, as follows: @ValidEmail private String email; Finally, validating a user object looks exactly the same as when using the default email validator. That was pretty easy to understand, right? Of course, I’m not saying that you’ll always need to mess up your life by creating custom constraints and validators, as this would downgrade the functionality of Java Beans Validation to nearly zero. Nevertheless, from a design point of view it is useful to know that the standard offers a decent level of customization. Conclusions At this point, you’ve learned the basics of how to use Java Beans Validation and Hibernate Validator side by side, in order to validate your domain objects in a straightforward way. In addition, you saw that’s really easy to extend the specification’s core functionality with custom constraints and custom validators, in those use cases where the default ones just won’t fit your personal needs. Moreover, keep in mind that JSR 303 is work in progress moving at a pretty fast pace (in fact the release of Java Beans Validation 2.0 is just around the corner), so make sure to stay up to date with the latest news. So, is that all we need to know when it comes to exploiting the functionality that the standard brings to the table? Well, from a starting point it is, indeed. As with many other language-related features, though, it’s not a panacea for healing all the potential validation ills your code can suffer from, so using it in a proper and conscious way is, as usual, up to us. Quite possibly, the biggest benefit of using the specification lies on the fact that it allows to easily implement highly-decoupled validation components, which can be reused literally everywhere. If that sole argument isn’t compelling enough to get you started using Java Beans Validation right away, certainly nothing will be. So, what are you waiting for? Frequently Asked Questions (FAQs) on Effective Domain Model Validation with Hibernate Validator What is the Hibernate Validator and why is it important? Hibernate Validator is a powerful tool that provides an implementation of the Bean Validation specification (JSR 303). It allows developers to ensure that the data within their applications adheres to certain rules or constraints, thereby maintaining data integrity and reducing the likelihood of errors. It is important because it simplifies the process of data validation, making it easier to maintain and debug applications. How do I set up Hibernate Validator in my project? To set up Hibernate Validator in your project, you need to add the Hibernate Validator dependency to your project’s build file. If you’re using Maven, you can add the following dependency to your pom.xml file: <dependency> <groupId>org.hibernate</groupId> <artifactId>hibernate-validator</artifactId> <version>6.0.13.Final</version> </dependency> After adding the dependency, you can use the Hibernate Validator API in your project. How do I create custom constraints with Hibernate Validator? Creating custom constraints with Hibernate Validator involves defining a new annotation and a corresponding ConstraintValidator. The annotation defines the constraint, and the ConstraintValidator implements the validation logic. Once you’ve defined your custom constraint, you can use it in your domain model just like any other constraint annotation. Can I validate method parameters and return values with Hibernate Validator? Yes, Hibernate Validator supports method-level validation. This allows you to validate the parameters of a method and the method’s return value. To enable method-level validation, you need to annotate the method or its parameters with constraint annotations and then validate the method using a Validator. How do I handle validation errors in Hibernate Validator? When a validation fails, Hibernate Validator throws a ConstraintViolationException. This exception contains a set of ConstraintViolation objects, each representing a failed validation. You can catch this exception and handle the validation errors in a way that suits your application. Can I use Hibernate Validator with Spring? Yes, Hibernate Validator integrates well with the Spring framework. Spring’s DataBinder uses Hibernate Validator by default to validate objects. You can also use Spring’s @Validated annotation to trigger validation in your Spring MVC controllers. How do I internationalize validation messages in Hibernate Validator? Hibernate Validator supports internationalization of validation messages through the use of message bundles. You can define your validation messages in a properties file and then reference these messages in your constraint annotations using the message attribute. Can I validate collections with Hibernate Validator? Yes, Hibernate Validator allows you to validate collections. You can annotate a collection with a constraint annotation, and Hibernate Validator will apply the constraint to each element in the collection. How do I disable validation for a specific field in Hibernate Validator? To disable validation for a specific field, you can use the @Valid annotation on the field and then set the validation groups to an empty group. This will effectively disable validation for that field. Can I use Hibernate Validator to validate JSON objects? While Hibernate Validator does not directly support JSON validation, you can convert your JSON objects to Java objects and then validate these Java objects using Hibernate Validator. There are several libraries available, such as Jackson, that can help with this conversion.
__label__pos
0.910699
TRE (computing) TRE is an open-source library for pattern matching in text,[2] which works like a regular expression engine with the ability to do approximate string matching.[3] It was developed by Ville Laurikari[1] and is distributed under a 2-clause BSD-like license. TRE Original author(s)Ville Laurikari[1] Repository Edit this at Wikidata Written inC TypeApproximate string matching License2-clause BSD-like license Websitelaurikari.net/tre/ The library[4] is written in C and provides functions which allow using regular expressions for searching over input text lines. The main difference from other regular expression engines is that TRE can match text fragments in an approximate way, that is, supposing that text could have some number of typos. FeaturesEdit TRE uses extended regular expression syntax with the addition of "directions" for matching preceding fragment in approximate way. Each of such directions specifies how many typos are allowed for this fragment. Approximate matching[5] is performed in a way similar to Levenshtein distance, which means that there are three types of typos 'recognized':[6] Typo Example Data insertion of an extra character regullar experession extra l, extra e missing a character from pattern reglar expession missing u, missing r replacement of some character regolar exprezsion uo, sz TRE allows specifying of cost for each of three typos type independently. The project comes with a command-line utility, a reimplementation of agrep. Though approximate matching requires some syntax extension, when this feature is not used, TRE works like most of other regular expression matching engines. This means that • it implements ordinary regular expressions written for strict matching;[3][7] • programmers familiar with POSIX-style regular expressions[4] need not do much study to be able to use TRE.[3] Predictable time and memory consumptionEdit The library's author states[8] that time spent for matching grows linearly with increasing of input text length, while memory requirement is constant during matching and does not depend on the input, only on the pattern. OtherEdit Other features, common for most regular expression engines could be checked in regex engines comparison tables or in list of TRE features on its web-page. Usage exampleEdit Approximate matching directions are specified in curly brackets and should be distinguishable from repetitive quantifiers (possibly with inserting a space after opening bracket): • (regular){~1}\s+(expression){~2} would match variants of phrase "regular expression" in which "regular" have no more than one typo and "expression" no more than two; as in ordinary regular expressions "\s+" means one or more space characters — i.e. rogular ekspression would pass test; • (expression){ 5i + 3d + 2s < 11} would match word "expression" if total cost of typos is less than 11, while insertion cost is set to 5, deletion to 3 and substitution of character to 2 - i.e. ekspresson gives cost of 10. Language bindingsEdit Apart from C, TRE is usable through bindings for Perl, Python and Haskell. [9] It is the default regular expression engine in R.[10] However if the project should be cross-platform, there would be necessary separate interface for each of the target platforms. DisadvantagesEdit Since other regular expression engines usually do not provide approximate matching ability, there is almost no concurrent implementation with which TRE could be compared. However there are a few things which programmers may wish to see implemented in future releases:[11] • a replacement mechanism for substituting matched text fragments (like in sed string processor and many modern implementations of regular expressions, including built into Perl or Java); • opportunity to use another approximate matching algorithm (than Levenshtein's) for better typo value assessment (for example Soundex), or at least this algorithm to be improved to allow typos of the "swap" type (see Damerau–Levenshtein distance). See alsoEdit ReferencesEdit 1. ^ a b "R: Pattern Matching for Raw Vectors". MIT.edu. 2. ^ "Tre for Windows". 3. ^ a b c "Using fuzzy searches with tre-agrep". Linux Magazine. 4. ^ a b "tre 0.8.0-6 (x86_64)". July 7, 2020. 5. ^ Andoni, Alexandr; Krauthgamer, Robert; Onak, Krzysztof (2010). Polylogarithmic approximation for edit distance and the asymmetric query complexity. IEEE Symp. Foundations of Computer Science (FOCS). arXiv:1005.4033. Bibcode:2010arXiv1005.4033A. CiteSeerX 10.1.1.208.2079. 6. ^ "TRE web-page - Regex Syntax". 7. ^ "Tre-agrep has all of grep's functionality but can also do ambiguous or fuzzy" 8. ^ "TRE web-page - About". 9. ^ "TRE web-page - FAQ". 10. ^ "Regular Expressions as used in R". 11. ^ "Tagged Deterministic Finite Automata with Lookahead". practical improvements .. Lurikari algorithm, notably .. External linksEdit Further readingEdit
__label__pos
0.665817
HAProxy vs. Traefik vs. Seesaw Get help choosing one of these Get news updates about these tools Favorites 71 Favorites 52 Favorites 10 Hacker News, Reddit, Stack Overflow Stats • 229 • 41 • 1.72K • - • 6 • 632 • 126 • 52 • 62 GitHub Stats No public GitHub repository stats available Description What is HAProxy? HAProxy (High Availability Proxy) is a free, very fast and reliable solution offering high availability, load balancing, and proxying for TCP and HTTP-based applications. What is Traefik? Træfɪk is a modern HTTP reverse proxy and load balancer made to deploy microservices with ease. It supports several backends (Docker, Swarm, Mesos/Marathon, Kubernetes, Consul, Etcd, Zookeeper, BoltDB, Rest API, file...) to manage its configuration automatically and dynamically. What is Seesaw? Seesaw v2 is a Linux Virtual Server (LVS) based load balancing platform. It is capable of providing basic load balancing for servers that are on the same network, through to advanced load balancing functionality such as anycast, Direct Server Return (DSR), support for multiple VLANs and centralised configuration. Pros Why do developers choose HAProxy? • Why do you like HAProxy? Why do developers choose Traefik? Why do you like Traefik? Why do developers choose Seesaw? Why do you like Seesaw? Cons What are the cons of using HAProxy? Downsides of HAProxy? What are the cons of using Traefik? Downsides of Traefik? What are the cons of using Seesaw? No Cons submitted yet for Seesaw Downsides of Seesaw? Companies What companies use HAProxy? 395 companies on StackShare use HAProxy What companies use Traefik? 25 companies on StackShare use Traefik What companies use Seesaw? 1 companies on StackShare use Seesaw Integrations What tools integrate with HAProxy? 6 tools on StackShare integrate with HAProxy No integrations listed yet No integrations listed yet What are some alternatives to HAProxy, Traefik, and Seesaw? • AWS Elastic Load Balancing (ELB) - Automatically distribute your incoming application traffic across multiple Amazon EC2 instances • DigitalOcean Load Balancer - Scale your applications and improve availability across your infrastructure in a few clicks • Pound - A reverse proxy, load balancer and HTTPS front-end for Web server(s) • Fly - A global load balancer with middleware See all alternatives to HAProxy Latest News HAProxy: All the Severalnines Resources Webinar Replay and Q&A: how to deploy and manage Pro... Setting up Traefik as a Dynamically-Configured Proxy... Interest Over Time Get help choosing one of these
__label__pos
0.97877
MathOverflow will be down for maintenance for approximately 3 hours, starting Monday evening (06/24/2013) at approximately 9:00 PM Eastern time (UTC-4). 7 1 I have a basic question concerning comparison of different cohomology theories. Let $X$ be a projective smooth (or just proper smooth) variety over a separably closed field $k$ of characteristic $p,$ which is not liftable to characteristic zero. Is there any relation between the de Rham cohomology $H^n(X,\Omega^{\bullet}_X)$ and the $\ell$-adic cohomology? For example, do they have the same dimension (over $k$ and $Q_l$ resp.)? flag 2 Answers 3 I believe the answer is no, that these two spaces need not have the same vector space dimension. Grothendieck here cites an example of Serre in a footnote on the last page; unfortunately, I don't have access to Serre's original paper at the moment. 29_95_0">http://www.numdam.org/item?id=PMIHES_1966_29_95_0 link|flag I don't know how my link became mangled, but ignore the junk string before http. – Hunter Brooks Dec 1 2010 at 23:44 I believe there's supposed to be a double underscore surrounding 29 in the link (which I guess is why it appears italicized). (The paper is "On the de Rham cohomology of algebraic varieties"). Here's a fixed version: numdam.org/numdam-bin/… – BR Dec 2 2010 at 0:47 The most classical type examples are non-ordinary Enriques surfaces in characteristic 2. – Torsten Ekedahl Dec 2 2010 at 15:10 14 Often, yes. What always has the same dimension as $H^n_{et}(X,Q_l)$ is the rational crystalline cohomology $H^n_{cr}(X)\otimes K$ with coefficients in the fraction field $K$ of the Witt vectors $W$ of $k$. $H^n_{cr}(X)$ itself will have coefficients in $W$, and of course, have rank equal to the dimension of $H^n_{cr}(X)\otimes K$. But it might have torsion in general. On the other hand, there is an exact sequence $$0\rightarrow H^n_{cr}(X)\otimes_W k\rightarrow H^n(X,\Omega_X^{\cdot})\rightarrow H^{n+1}_{cr}(X)[p]\rightarrow 0$$ as in the universal coefficient theorem. This is because crystalline cohomology can be taken with any of the torsion coefficients $W/p^n$, and when you take it with coefficients in $W/p=k$, you get exactly De Rham cohomology. (One of the most important things to learn at the beginning about crystalline cohomology with $W/p^n$ coefficients is that it can be computed using the divided power De Rham complex associated to a smooth embedding over $W/p^n$, which reduces to the De Rham complex of $X$ itself when the coefficients are $W/p$.) So you will get the same dimensions you want if enough of crystalline cohomology is torsion-free. All this is explained in introductory books, such as the one by Berthelot and Ogus, except the comparison with \'etale cohomology. That is perhaps explained in a paper by Katz and Messing from the 70's. link|flag 1  If one also wants the proper case one needs to use de Jong's alterations on top of Katz-Messing. – Torsten Ekedahl Dec 2 2010 at 15:08 Your Answer Get an OpenID or Not the answer you're looking for? Browse other questions tagged or ask your own question.
__label__pos
0.709618
This page has been translated automatically. Programming Setting Up Development Environment Usage Examples UnigineScript High-Level Systems C++ C# UUSL (Unified UNIGINE Shader Language) File Formats Rebuilding the Engine and Tools GUI Double Precision Coordinates API Containers Common Functionality Controls-Related Classes Engine-Related Classes Filesystem Functionality GUI-Related Classes Math Functionality Node-Related Classes Networking Functionality Pathfinding-Related Classes Physics-Related Classes Plugins-Related Classes Rendering-Related Classes This version of documentation is OUTDATED! Please switch to the latest one. Where to Put Your Code: Update(), Flush() or Render() The world script has a number of functions that are used to code logic of the application. Initialization function of the world script (init()) is used to create objects and initialize all other necessary resources on the world load. Shutdown function (shutdown()) is called when the world is unloaded and is used to delete resources that were created during script execution to avoid memory leaks. But what about the frame-by-frame update? In the world script there are three blocks for that: • in update() you can control what to render onto the screen and how to do it • in flush() you can simulate physics, perform calculations and implement non-rendering game logic • in render() you can correct behavior according to the updated node states in the same frame Code Update() In the world script update() you can specify all functions you want to be called every frame while your application executes. It serves for implementing rendering logic. In brief, everything graphics-related is to be controlled from withinupdate(). Here you can: Notice Do not apply forces and torques to rigid bodies in the update(). Otherwise, you will get unstable result that varies with each rendering frame. World Callbacks Callbacks set in the update() (for example, by using WorldTrigger or widget callbacks) are not executed immediately. They will be run only when the next engine function is called: that is, before flush(), if any (in the current frame), or before the next update() (in the following frame) — whatever comes first. Code Flush() Using flush() function of the world script you can control physics in your application: But do not hurry to code everything else in the update(). flush() can be used not only for physics simulation, but also to implement logic and perform calculations you would not want to do each and every rendering frame. Let us look into the details why is it so. Usually, the physics framerate is lower than a rendering one (see the details), which makes flush() more performance-friendly in case of heavy calculations. It goes in parallel with rendering, so CPU bottleneck is avoided. Besides that, we know exactly how long one physics tick takes, because physics has a fixed framerate. These factors combined make flush() ideal to perform calculations. For example, we need to calculate a new position for the object. We can do it in the update(), but it would stall the rendering. Instead, we can start rendering and in parallel calculate a new position using flush(). The problem that rendering frames are more frequent is easily solved. Knowing the new position, we can linear interpolate positions in between and apply them to objects each rendering frame. As a result, performance load will be much better balanced, without load peaks. Notice There are some limitations, however, for what can be done from within flush(). You can not: • Make reposition and transform nodes if they are enabled. • Create new nodes. • Delete nodes. These operations can violate the started rendering process. As a workaround, in the flush() you can generate an array of nodes to be created, while actually create them in the update(). Physics Callbacks Just like in case with update(), if you set any physics-based callbacks in the flush() or use PhysicalTrigger, they cannot be executed immediately, as the rendering process is already in action and they can violate it. If there is one more physics iteration to go, they are executed before the next flush(); if not, before the next world script update(). If you want to reposition or transform, create or delete nodes that are returned by your physics callback, the workflow is the same: store them in the array and then perform all necessary operations in update(). Code Render() The render() function of the world script is an additional function used to correct behavior after the state of the node has been updated (for example, skinned animation has been played in the current frame or particle system has spawn its particles). Imagine a situation when we need to attach an object (let's say, a sword) to the hand of a skinned mesh character. If we get transformation of the character hand bone and set it to the sword in the update() function, the attachment will be loose rather than precise. The sword will not be tightly hold in the hand, because the animation is actually played right after the world scriptupdate() has been executed. This means, returned bone transformations in the update() will be for the previous frame. World script render() is executed after animation is played, which means from within this function you can get updated bone transformations for the current frame and set them to the sword. Notice Use render() for correction purposes only; otherwise, this will increase the main loop time. All other functions should be placed within update() orflush(). Last update: 2017-07-03 Build: ()
__label__pos
0.502058
Define memory access time, Computer Engineering Define memory access time? The time needed to access one word is known as the memory access time. Or It is the time that elapses among the initiation of an operation and the completion of that operation   Posted Date: 6/4/2013 6:03:49 AM | Location : United States Related Discussions:- Define memory access time, Assignment Help, Ask Question on Define memory access time, Get Answer, Expert's Help, Define memory access time Discussions Write discussion on Define memory access time Your posts are moderated Related Questions Explain the resources of data structure is used by an operating system to keep track of process information? Explain A process is a program in execution. An operating system Your program should print the inverted map to the screen (using a format similar to the inverter project, but you will print out the url values instead of document IDs). You can pr What are the major characteristics of a pipeline? The major characteristics of a pipeline are: a) Pipelining cannot be executed on a single task, as it works by splitting mu Define synchronous bus. Synchronous buses are the ones in which every item is transferred during a time slot(clock cycle) known to both the source and destination units. Synchr Q. Program for encoding ASCII Alpha numeric? ; A program for encoding ASCII Alpha numeric. ; ALGORITHM:             ; create the code table             ; read an input Explain the working of any one of centralized SPC? Standby mode of operation is the easiest of dual processor configuration operations. Usually, one processor is active and Let's provide you a fundamental illustration by which you may be able to define the concept of instruction format.  Let us consider the instruction format of a MIPS computer. MI State the datatypes of Verilog Verilog. Compared to VHDL, Verilog data types are very simple, easy to use and very much geared towards modeling hardware structure as opposed to I am required to write about the impact of the internet on firms with reference to the following questions: 1. Describe the concept of value creation. Explain how a firm can use in building a suspension bridge a cable is to be stretched from the top of a pier to a point 852.6 ft. from it''s foot. if from this point the angle of elevation of the top of the
__label__pos
0.993538
#include "lar.h" int do_print_member( lar_archive *ar, const char *name ) { lar_member *member; if( (member = lar_open_member(ar, name)) != NULL ) { write(fileno(stdout), member->data, member->length); lar_close_member(member); } else LAR_DIE("Unable to locate archive member"); return 0; } int do_print_index( lar_archive *ar ) { lar_index *index = ar->index; if( ar->has_filenames ) { while(index) { if( index->type == LAR_TYPE_REGULAR ) { printf("%s\n", index->filename); } index = index->next; } return 0; } LAR_DIE("The archive contains no file list"); return 1; } int do_require( const char *package, const char *path ) { int stat = 1; lar_archive *ar; lar_member *mb; if( (ar = lar_find_archive(package, path, 1)) != NULL ) { if( (mb = lar_find_member(ar, package)) != NULL ) { write(fileno(stdout), mb->data, mb->length); lar_close_member(mb); stat = 0; } lar_close(ar); } return stat; } int do_findfile( const char *filename, const char *path ) { int stat = 1; lar_archive *ar; lar_member *mb; if( (ar = lar_find_archive(filename, path, 0)) != NULL ) { if( (mb = lar_open_member(ar, filename)) != NULL ) { write(fileno(stdout), mb->data, mb->length); lar_close_member(mb); stat = 0; } lar_close(ar); } return stat; } int main( int argc, const char* argv[] ) { lar_archive *ar; int stat = 0; if( argv[1] != NULL && argv[2] != NULL ) { switch(argv[1][0]) { case 's': if( (ar = lar_open(argv[2])) != NULL ) { if( argv[3] != NULL ) stat = do_print_member(ar, argv[3]); else stat = do_print_index(ar); lar_close(ar); } else { LAR_DIE("Failed to open archive"); } break; case 'r': stat = do_require(argv[2], argv[3]); break; case 'f': stat = do_findfile(argv[2], argv[3]); break; } return stat; } else { printf("Usage:\n"); printf("\tlar show []\n"); printf("\tlar require []\n"); printf("\tlar find []\n"); return 1; } return 0; }
__label__pos
0.999999
Photoshop CS3/CS4/CS5 摜Table^Oɕϊ ̃l^͉摜HTMLTable^OɕϊXNvgłB摜ϊvO͂‚݂܂AłHTML5̃^Ox[XɂTable^Oʼn摜o܂B ϊ摜͂Ȃׂ̂ɂĂBƂ̂sɎԂ邽߂łBMacPro(8CPU)̏ꍇ32~41sNZŕϊ27bقǎԂ܂B // Photoshop̉摜table^Oɕϊ function pixelToTable(){ preferences.rulerUnits = Units.PIXELS; for (var y=0; y<docObj.height.value; y++) { text += '<tr>'; for (var x=0; x<docObj.width.value; x++){ var rgb = getPixel(x,y); var R = rgb[0].toString(16); var G = rgb[1].toString(16); var B = rgb[2].toString(16); if (R.length < 2){ R = "0" + R; } if (G.length < 2){ G = "0" + G; } if (B.length < 2){ B = "0" + B; } text += '<td style="background-color:#'+R+G+B+'"></td>'; } text += '</tr>'; } activeDocument.selection.deselect(); } //--------------------------------------------- // sNZl擾(8bit[hp) //--------------------------------------------- function getPixel(x,y){ var R = G= B= 0,data,i; docObj.selection.select([[x,y],[x+1,y],[x+1,y+1],[x,y+1],[x,y]]); data = docObj.channels[0].histogram; for (i=0; i<256; i++) if (data[i] > 0) { R = i; break; } data = docObj.channels[1].histogram; for (i=0; i<256; i++) if (data[i] > 0) { G = i; break; } data = docObj.channels[2].histogram; for (i=0; i<256; i++) if (data[i] > 0) { B = i; break; } return [R,G,B]; } // ۑt@CI var saveFile, text="", docObj; (function(){ if (app.documents.length == 0){ alert("ϊ摜t@CJĂsĂ"); return; } docObj = activeDocument; saveFile = File.saveDialog("ۑHTMLt@C͂Ă"); if (!saveFile) { return; } var flag = saveFile.open("w"); if (!flag){ alert("t@CJ܂"); } var s = (new Date()).getTime(); pixelToTable(); var e = (new Date()).getTime(); var time = Math.round((e - s) / 1000); saveFile.write('<!DOCTYPE html><head><title>pixeltable</title></head><body>'); saveFile.write('<table style="border:0px solid black;border-collapse: collapse;">'); saveFile.write(text); saveFile.write('</table></body></html>'); alert("HTMLt@C̍쐬I܂BϊɂԁF"+time+"b"); })(); [Tv_E[h]
__label__pos
0.99716
Skip to content Instantly share code, notes, and snippets. @brownsugar Created October 19, 2020 18:39 • Star 0 You must be signed in to star a gist • Fork 0 You must be signed in to fork a gist Star You must be signed in to star a gist Embed What would you like to do? // class default // 基本樣式的class var defaultObj = { addClass: "default", hasCloseBtn: true, hasActionBtn: true, afterClose: function () { $.gbox.close(); }, actionBtns: [{ text: '確定', id: 'success', class: "lb-btn__success", click: function () { $.gbox.close(); } }] } var alterObj = { addClass: "default", hasCloseBtn: false, hasActionBtn: true, afterClose: function () { $.gbox.close(); }, actionBtns: [{ text: '確定', id: 'success', class: "lb-btn__success", click: function () { $.gbox.open(checkAccountRender(gameaccountlist), accountObj); } }] } // class listlb // 清單樣式的class var listObj = { addClass: "listlb", hasCloseBtn: true, hasActionBtn: true, afterClose: function () { $.gbox.close(); }, actionBtns: [{ text: '確定', id: 'success', class: "lb-btn__success", click: function () { $.gbox.close(); } }] } var redirectObj = { addClass: "default", hasCloseBtn: true, hasActionBtn: true, afterClose: function () { location.href = errorurl; } } // 已完成參加 跳窗 var completeHTML = '<div class="lb-bold">已完成參加</div>'; // $.gbox.open(completeHTML,defaultObj); // 今日已參與活動 跳窗 var todayHTML = '<div class="lb-bold">今日已參與活動,次數將於00點重置。</div>'; // $.gbox.open(todayHTML,defaultObj); var checkObj = { addClass: "default", hasCloseBtn: false, hasActionBtn: true, afterClose: function () { $.gbox.close(); }, actionBtns: [{ text: '我在想想', id: 'success', class: "lb-btn__cancel", click: function () { $.gbox.open(checkAccountRender(gameaccountlist), accountObj); } }, { text: '確定', id: 'success', class: "lb-btn__success", click: function () { joinGame(); } }] } // 確定要使用 跳窗 function checkRender(account) { var checkHTML = '<div class="lb-bold">確定要使用</div>\ <div class="lb-text-box">\ <div class="lb-text">'+ account + '</div>\ </div>\ <div class="lb-bold">參加嗎?</div>\ <div class="lb-notice">\ <span>※注意事項:</span>\ <span>虛寶獎勵將會發送至選定的遊戲帳號內,</span>\ <span>選擇後將不可再修改。</span>\ </div>\ '; return checkHTML; } // $.gbox.open(checkRender("一二三四五六七八九十一二三四五六七八九十"),checkObj); var accountObj = { addClass: "listlb", hasCloseBtn: false, hasActionBtn: true, afterClose: function () { $.gbox.close(); }, actionBtns: [{ text: '確定', id: 'success', class: "lb-btn__success", click: function () { ServiceAccount = $('input:radio:checked[name="account"]').val(); ServiceAccountId = $('input:radio:checked[name="account"]').attr('id'); if (ServiceAccount == undefined || ServiceAccount == '') { PopUpAlert('請選擇遊戲帳號', alterObj); return; } else { getGameAccountData(ServiceAccount, ServiceAccountId); } } }] } function checkAccountRender(data) { var html = ""; for (var i = 0; i < data.length; i++) { html += '<div class="lb-list__radio-group">\ <input id="'+ data[i].ServiceAccountDisplayName + '" class="lb-list__radio" type="radio" name="account" value="' + data[i].ServiceAccountID + '" />\ <label for="'+ data[i].ServiceAccountDisplayName + '" class="lb-list__radio-label">\ <span class="lb-list__radio-style"></span>\ <span class="lb-list__radio-text">'+ data[i].ServiceAccountDisplayName + '</span>\ </label>\ </div>\ '; } var checkAccountHTML = '<div class="lb-title">\ <span>請選擇</span>\ <spa>要參加抽鬼牌的遊戲帳號</spa>\ </div>\ <div class="lb-list lb-list--scroll">'+ html + '</div>\ <div class="lb-notice">\ <span>※注意事項:</span>\ <span>虛寶獎勵將會發送至選定的遊戲帳號內,</span>\ <span>選擇後將不可再修改。</span>\ </div>\ '; return checkAccountHTML } // $.gbox.open(checkAccountRender(accountList),accountObj); // 活動獎勵清單 var eventListObj = { addClass: "listlb", hasCloseBtn: true, hasActionBtn: true, afterClose: function () { $.gbox.close(); }, actionBtns: [{ text: '確定', id: 'success', class: "lb-btn__success", click: function () { $.gbox.close(); } }] } var eventList = [{ event: "遊俠X(永久)" }, { event: "阿緹密斯X(永久)" }, { event: "尖峰 SR-R (永久)" }, { event: "鈦金齒輪1個" }, { event: "GASH 100點" }, { event: "GASH 200點" }, { event: "GASH 500點" }] function eventListRender(data) { var html = ""; for (var i = 0; i < data.length; i++) { html += '<div class="lb-list__event-text">' + data[i].event + '</div>\ '; } var eventListHTML = '<div class="lb-title">\ <span>活動獎勵清單</span>\ </div>\ <div class="lb-list lb-list--scroll">'+ html + '</div>\ '; return eventListHTML } // $.gbox.open(eventListRender(eventList),eventListObj); $(".main-btn__event-list").on("click", function () { $.gbox.open(eventListRender(eventList), eventListObj); }) // 我的中獎清單 var myGiftListObj = { addClass: "listlb", hasCloseBtn: true, hasActionBtn: true, afterClose: function () { $.gbox.close(); }, actionBtns: [{ text: '確定', id: 'success', class: "lb-btn__success", click: function () { $.gbox.close(); } }] } function myGiftRender(data) { var html = ""; for (var i = 0; i < data.length; i++) { html += '<div class="lb-list__mygift-group">\ <span class="lb-list__mygift-date">'+ data[i].LogTime + '</span>\ <span class="lb-list__mygift-gift">'+ data[i].ItemName + '</span>\ </div>\ '; } var myGiftHTML = '<div class="lb-title">\ <span>我的中獎清單</span>\ </div>\ <div class="lb-list lb-list--scroll">'+ html + '</div>\ '; return myGiftHTML } // $.gbox.open(myGiftRender(myGiftList),myGiftListObj); $(".main-btn__my-list").on("click", function () { GetWinLog(MainAccountID, StarAccount, ServiceAccount); //$.gbox.open(myGiftRender(myGiftList), myGiftListObj); }) function checkPoker(arr) { return arr.every(function (v, i) { return arr[0] == v; }) } // ========================== 抽牌 ============================== var playNum = 0; var cardArr = []; var play = false; $(".main-card.off").on("click", function () { // 當抽牌次數大於兩次 或 再抽牌狀態下 當下不能抽牌 if (play) { return } if (playNum >= 2) { $.gbox.open(todayHTML, defaultObj); return; } // 防止再次點擊同一張牌 if (!$(this).hasClass("off")) { return } // 抽牌的狀態下防止再次點擊抽牌 play = true; // 抽牌次數遞增 playNum++; // 移除記號 $(this).removeClass("off") // 重新排列牌組 if ($(".main-card.off").length > 1) { gsap.to($(".main-card.off").eq(0), { top: "6%", left: "13%", rotation: -10, duration: .5 }) gsap.to($(".main-card.off").eq(1), { top: "6%", left: "45%", rotation: 10, duration: .5 }) } // 沒有得獎文字 // $(".main-content__my-get-title").text("哎呀真可惜!沒中獎!") // $(".main-content__my-get-info").text("明天再接再厲!") // 得獎文字 // $(".main-content__my-get-title").text("恭喜獲得") // $(".main-content__my-get-info").text("一二三四五六七八九十一二三") // 中一般獎項的文字 // $(".main-content__my-notice").text("獎勵將於2個小時內發放至遊戲內禮物盒。") // 中gash點數的文字 // $(".main-content__my-notice").text("GASH點數將於11/30前發放。") var _this = $(this) doPoker(playNum, _this); }) function playPoker(currnt, data, callback) { // 當前抽牌 var cardThis = currnt; var cardGet = data.ItemInfo.card; // 判斷兩張是否一樣 cardArr.push(cardGet); // 獲取卡片內容後增加樣式 cardThis.find(".back").addClass(cardGet); // 抽牌時 說明欄會變成空 $(".main-content-box").addClass("in"); // 提高當前抽牌的層級 gsap.set(currnt, { zIndex: 2 }) // 進入抽牌動畫 第一步驟 // 大大的展示出玩家都到的牌 gsap.to(cardThis, { left: "50%", x: "-50%", top: 10, scale: 1.3, rotation: 0, durtation: .4, onComplete: function () { // 第二步驟 // 翻牌展示出玩家的牌 gsap.to(cardThis, { force3D: true, rotationY: -180, durtation: 0.3, onComplete: function () { // 第三步驟 // 牌移到下方區塊 gsap.to(cardThis, { scale: .6, y: "150%", opacity: 0, display: "none", duration: .4, }) // 下方區塊放置玩家抽到的牌 $(".main-content__my-card").eq(playNum - 1).addClass(cardGet); $(".main-content__my-card").eq(playNum - 1).addClass("show"); // 兩次抽牌結束 if (playNum == 2) { setTimeout(function () { // 顯示出獎勵名稱區塊 $(".main-content__my-box").addClass("done") // 判斷抽取狀態有沒有中獎 if (data.IsWin == 1) { $(".main-content__my-get-title").text("恭喜獲得") $(".main-content__my-get-info").text(data.ItemInfo.ItemName) // 判斷獎品是 道具 還是 gash if (data.ItemInfo.ItemName.indexOf("GASH") >= 0) { $(".main-content__my-notice").text("GASH點數將於11/30前發放。") } else { $(".main-content__my-notice").text("獎勵將於2個小時內發放至遊戲內禮物盒。") } } else { $(".main-content__my-get-title").text("哎呀真可惜!沒中獎!") $(".main-content__my-get-info").text("明天再接再厲!") } }, 800); // 可以傳入 function if (callback) { callback() } } // 抽牌狀態預設 play = false; } }) } }) } // 畫面載入執行他 // playPokerComplete(data) function playPokerComplete(data) { console.log(data); $(".main-content-box").addClass("in"); data.ItemInfo.forEach(function (v, i) { $(".main-card").eq(i).hide().removeClass("off") $(".main-content__my-card").eq(i).addClass(v.card); $(".main-content__my-card").eq(i).addClass("show"); }) // 顯示出獎勵名稱區塊 $(".main-content__my-box").addClass("done") // 判斷抽取狀態有沒有中獎 if (data.IsWin == 1) { $(".main-content__my-get-title").text("恭喜獲得") $(".main-content__my-get-info").text(data.ItemInfo[1].ItemName) // 判斷獎品是 道具 還是 gash if (data.ItemInfo[1].ItemName.indexOf("GASH")>=0) { $(".main-content__my-notice").text("GASH點數將於11/30前發放。") } else { $(".main-content__my-notice").text("獎勵將於2個小時內發放至遊戲內禮物盒。") } } else { $(".main-content__my-get-title").text("哎呀真可惜!沒中獎!") $(".main-content__my-get-info").text("明天再接再厲!") } //play = true; playNum = 2; } var errorurl = "https://bfweb.beanfun.com/"; var gameaccountlist = []; var gameaccountdata = []; var stockid = ''; $(document).ready(function () { if (ErrMsg != '') { PopUpAlert(ErrMsg, redirectObj); return; } //BGOSDK BGO.check_app_exist(function (res) { if (res.result !== null && res.result !== undefined && res.result === 'ok') { } else { PopUpAlert('『系統異常<br/> 請嘗試關閉beanfun!並重新開啟<br/> 若仍無法排除請洽客服人員<br/> (錯誤碼: 1911) 』', redirectObj); return; } }); if (IsJoin == 'False') { getGameAccountList(MainAccountID); } else { CheckIsPlay(MainAccountID, StarAccount, ServiceAccount); } }); //帳號列表 function getGameAccountList(mainAccount) { loadding(true); $.ajax({ type: "POST", url: "index.aspx/GetGameAccountList", data: JSON.stringify({ MainAccountID: mainAccount }), contentType: "application/json; charset=utf-8", dataType: "json", success: function (result) { if (result.d.IsSuccess == false) { loadding(false); PopUpAlert(result.d.ResultMessage, redirectObj); } else { loadding(false); gameaccountlist = result.d.ResultData; $.gbox.open(checkAccountRender(gameaccountlist), accountObj); } } }); } //帳號資訊 function getGameAccountData(serviceAccount, ServiceAccountId) { loadding(true); $.ajax({ type: "POST", url: "index.aspx/GetGameAccountData", data: JSON.stringify({ ServiceAccount: serviceAccount }), contentType: "application/json; charset=utf-8", dataType: "json", success: function (result) { if (result.d.IsSuccess == false) { loadding(false); PopUpAlert(result.d.ResultMessage, alterObj); } else { loadding(false); gameaccountdata = result.d.ResultData; $.gbox.open(checkRender(ServiceAccountId), checkObj); } } }); } //參加活動 function joinGame() { loadding(true); $.ajax({ type: "POST", url: "index.aspx/InsertJoinLog", data: JSON.stringify( { StarAccount: StarAccount, MainAccountID: MainAccountID, ServiceAccount: ServiceAccount, AccountData: gameaccountdata }), contentType: "application/json; charset=utf-8", dataType: "json", success: function (result) { if (result.d.IsSuccess == false) { loadding(false); PopUpAlert(result.d.ResultMessage, defaultObj); } else { loadding(false); $.gbox.open(completeHTML, defaultObj); } } }); } //取得獎項 function doPoker(playcount, curr) { loadding(true); $.ajax({ type: "POST", url: "index.aspx/PlayPoker", data: JSON.stringify( { PlayCount: playcount, StockID: stockid, StarAccount: StarAccount, MainAccountID: MainAccountID, ServiceAccount: ServiceAccount }), contentType: "application/json; charset=utf-8", dataType: "json", success: function (result) { if (result.d.IsSuccess == false) { loadding(false); PopUpAlert(result.d.ResultMessage, defaultObj); } else { loadding(false); stockid = result.d.ResultData.ItemInfo.StockID; if (result.d.ResultMessage == null) { playPoker(curr, result.d.ResultData, null) } else { playPoker(curr, result.d.ResultData, PopUpAlert(result.d.ResultMessage, defaultObj)) } } } }); } //查詢中獎記錄 function GetWinLog(MainAccountID, StarAccount, ServiceAccount) { loadding(true); $.ajax({ type: "POST", url: "index.aspx/GetWinLog", data: JSON.stringify( { MainAccountID: MainAccountID, StarAccount: StarAccount, ServiceAccount: ServiceAccount }), contentType: "application/json; charset=utf-8", dataType: "json", success: function (result) { if (result.d.IsSuccess == false) { loadding(false); PopUpAlert(result.d.ResultMessage, defaultObj); } else { loadding(false); $.gbox.open(myGiftRender(result.d.ResultData), myGiftListObj); } } }); } //確認今日是否已完成抽牌 function CheckIsPlay(MainAccountID, StarAccount, ServiceAccount) { loadding(true); $.ajax({ type: "POST", url: "index.aspx/CheckIsPlay", data: JSON.stringify( { MainAccountID: MainAccountID, StarAccount: StarAccount, ServiceAccount: ServiceAccount }), contentType: "application/json; charset=utf-8", dataType: "json", success: function (result) { if (result.d.IsSuccess == false) { loadding(false); PopUpAlert(result.d.ResultMessage, defaultObj); } else { loadding(false); if (result.d.ResultData.ItemInfo.length != 0) { playPokerComplete(result.d.ResultData); } } } }); } // PopUp Alert function PopUpAlert(msg, obj) { $.gbox.open(msg, obj); } //Loading function loadding(load) { if (load) { $('body').append('<div class="loadding-module"><div class="loadding"></div></div>'); var i = 0; setInterval(function () { i++; $('.loadding').css('-ms-transform', "rotate(" + i + "deg)"); $('.loadding').css('-webkit-transform', "rotate(" + i + "deg)"); $('.loadding').css('transform', "rotate(" + i + "deg)"); }, 5) } else { $('.loadding-module').remove(); } } Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
__label__pos
0.999194
Hands-on Guides This portion of the book includes workshops and tutorials to teach how to use and develop with Tock, and is divided into two sections: the course and a series of mini tutorials. The course is a good place to start, and provides a structured introduction to Tock that should take a few hours to complete (it was designed for a half day workshop). The tutorials are smaller examples that highlight specific features. Tock Course In this hands-on guide, we will look at some of the high-level services provided by Tock. We will start with an understanding of the OS and its programming environment. Then we'll look at how a process management application can help afford remote debugging, diagnosing and fixing a resource-intensive app over the network. The last part of the tutorial is a bit more free-form, inviting attendees to further explore the networking and application features of Tock or to dig into the kernel a bit and explore how to enhance and extend the kernel. This course assumes some experience programming embedded devices and fluency in C. It assumes no knowledge of Rust, although knowing Rust will allow you to be more creative during the kernel exploration at the end. Course Outline You should first make sure you have the requisite hardware and software to complete the guide. The guide is divided into sections, each with an brief introduction to introduce concepts, followed by hands-on exercises. 1. Environment Setup: Get familiar with the Tock tools and getting a board setup. 2. Userland programming: write a basic sensing application in C. 3. Import Client: debug a problem for an important client. 4. Kernel programming: understand the kernel's boot sequence and write a simple driver in Rust. Tock Mini Tutorials These tutorials feature specific examples of Tock applications. They can be completed after the course to learn about different capabilities of Tock apps.
__label__pos
0.960319
O'Reilly logo Teradata Cookbook by Rajsekhar Bhamidipati, Abhinav Khandelwal Stay ahead with the world's most comprehensive technology and business learning platform. With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more. Start Free Trial No credit card required How to do it... 1. Connect to Teradata using SQLA or Studio. 2. Find the size of tables in the system using the following query. The output will contain databasename, tablename, and the size of the table with skew; it can be seen in the following code: /*Find table size*/SELECT B.databasename , B.TableName , SUM ( currentperm ) ( NAMED CurrentPerm ) ,MAXIMUM ( currentperm ) ( NAMED MaxPerm ) , AVG ( currentperm ) ( NAMED AvgPerm ) ,( ( MAXIMUM ( currentperm ) - AVG ( currentperm ) ) * 100.0 ) / ( MAXIMUM ( currentperm ) ) ( NAMED SkewPercent ) FROM dbc.tablesize B INNER JOIN DBC.TABLES A ON A.DATABASENAME = B.DATABASENAME AND A.TABLENAME = B.TABLENAME GROUP BY 1 , 2 ORDER BY 1 , 2 ; Following is the output of the query. 1. Based on the size of ... With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more. Start Free Trial No credit card required
__label__pos
0.670536
top Million-Billion-Lakhs-Crore Conversion Calculator Select the term you want to convert and hit the calculate button = ADVERTISEMENT ADVERTISEMENT is read as: Million-Billion-Lakhs-Crore Conversion The calculator changes the numbers from one system to another with just one click. It uses the algorithm of conversion of the scale to convert a value into another. What is the Million-Billion-Lakhs-Crore Conversion? The Million-Billion-Lakhs-Crore Conversion Calculator is a tool for converting numbers from one scale to another. It is widely used in nations such as India, Pakistan, and Bangladesh, where the terms million, billion, lakh, and crore are routinely employed to indicate big numbers. It converts Billion to crore Million to billion Million to crore Million to trillion Million to lakh Lakh to crore By entering the value and selecting the desired scale, you may effortlessly convert a number from one scale to another. The international system of numbers: The international system of numbers is the billion, million, and thousand systems. The number are arranged in the form of pair, in which each pair contain three digits. Let us have a number 123456765. We write it as 123,456,765 and read it as one hundred twenty-three million four hundred fifty-six thousand and seven hundred sixty-five. Pakistani system of numbers: In the Pakistani system of numbers, we have crore, lac, and thousand as the counting units. The numbers are arranged from left to right with 1st pair containing three digits and then every pair containing two digits. Let us have a number 123456765. We write it as 12,34,56,765 and read it as twelve crores thirty-four lac fifty-six thousand seven hundred and sixty-five. Table of conversion: International System Pakistani System 1 Million 0.1 Crore 1 Million 10,000 Hundreds 1 Million 0.001 Arab 1 Billion 1 Arab 1 Trillion 1,00,00,000 lac 1 Million 0.001 Arab 1 Trillion 10,00,00,00,000 Hundreds Examples: Example 1: Find how many lacs are in the 12 million. Solution: Step 1: Frist we have a general formula of conversion million to lacs. 1 Million = 10 lac Step 2: Now calculate the amount of 12 million 12 million = 12×10=120 lac Example 2: Find how many 231 crores to million. Solution: Step 1: Frist we have a general formula of conversion million to lacs. 1 crore = 10 million Step 2: Now calculate the amount of 231 million 231 crores = 231 ×10=2310 million ADVERTISEMENT AdBlocker Detected! To calculate result you have to disable your ad blocker first. X
__label__pos
0.99377
Norm Prokup Cornell University PhD. in Mathematics Norm was 4th at the 2004 USA Weightlifting Nationals! He still trains and competes occasionally, despite his busy schedule. Thank you for watching the video. To unlock all 5,300 videos, start your free trial. One-Sided Limits - Problem 3 Norm Prokup Norm Prokup Cornell University PhD. in Mathematics Norm was 4th at the 2004 USA Weightlifting Nationals! He still trains and competes occasionally, despite his busy schedule. Share A greatest integer function is the greatest integer less than or equal to a given function. This function can be found on a calculator to find values of f(x) that are all integers. The basic strategy of finding limits by calculating values of f(x) remains the same. In order to find the limit of a function as x approaches a point p, plug in values of x into f(x) as x approaches a from both the left and right (when x is less than but getting closer and closer to p, and when x is greater than but getting closer and closer to p). The limit exists if f(x) approaches the same number when x approaches p from the left and from the right (i.e. when the left-hand and right-hand limits are the same). Remember, limits are about what happens when a function gets close to a certain point, but this can be different from what actually happens at that point. For example, if the limit of f(x) as x approaches 5 from the left is 7, and the limit of f(x) as x approaches 5 from the right is also 7, f(5) could possibly be a number other than 7, like 32, but the limit of f(x) at 5 would be 7 because the left-hand and right-hand limit equals 7. Let’s do a harder example. I want to use a table to find a couple of limits. First as x approaches 8 from the left of h(x), when h(x) is the greatest integer less than or equal to 100 over x² plus 66. How do you enter this greatest integer function on your calculator? Your calculator has a function called int, and that will give you the greatest integer less than or equal to that number. So for example the greatest integer greater than or equal to 2.3 is 2. So int of 100 divided by, you’re going to need to get your x² minus 16x plus 66, and that will do it for you. Let’s create a table about our us and see what the result is. Here we are on the TI 84 again. Let me enter this function, I have to hit the y equals button first. I’m going to enter right here. Where do I find int? It’s going to be in the Math menu, under numbers. Go to the right. It's number 5. So I hit 5 and I have int of 100 divided by (x² minus 16x plus 66). Let’s look at the table. We can actually see a little piece of the graph. It's kind of cool. We want x to approach 8 from the left, so let’s see what happens. Let me try something; let’s just see the way this function behaves in general. I plug in 5 and I get 9. 6, I get 16, 7, I get 33. What about 7.5? 44. This is a very strange function. 7.9, 49. 7.99, 49. 7.999, 49 again. What you can see is happening is, it’s kind of levelled off. It does keep increasing as you increase towards 7. Once you get into the 7.9, 7.99, 7.999, and I’ll go back up here, and I’ll do 7.9999, just to make sure. It’s still 49. Let's record these results on the board. I’ve written the results on the table. Remember we’re letting x approach 8 from the left, so I have numbers 7, 7 ½, 7.9, 7.99, 7.999, these are approaching 8. And look at what my h(x) values are doing. I have 33, 44, and then we notice that once we get up to 7.9, 7.99, 7.999, we stayed at the value 49. So it seems like this limit is going to be 49. We’ll write that down. Let’s see what happens as we approach 8 from the other side; from the positive side. We’ll go back to our TI 84. Okay we're back in our TI 84, I want to approach 8 from the positive side, so let me start with a value like 9. I get 33. So 8.5 is a little closer, 44. 8.1, a little closer still, I get 49. 8.01, 49. It looks like it’s doing the same thing form the right as it was doing from the left. Let me try 8.001. I’m going to conclude that it does the same thing from the right as it does from the left. That it’s actually approaching the value of 49. But I want you to see something very interesting. If I plug exactly 8 in, 50. Isn’t that interesting? It actually has a different value at 8 than the value that it’s approaching as x approaches 8. Let’s write these results on the board and then we’ll wrap it up. I’ve got my values on the board. I have x approaching 8 from the right. Now what do the h(x) values do. Well just like before, 33, 44, 49, 49, 49, these values are approaching 49. And no matter how many zeros we put, as long as we put a 1 after that, we’re still going to get the value of 49. So I would say that the limit as x approaches 8 from the right of h(x) is 49. That means that the two sided limit exists. We notice that as x approaches 8 from the left we got 49, as x approaches 8 from the right we got 49. So the two sided limit is going to be 49. What’s interesting about this function is that h(8), the value that the function actually has at 8, is 50. The thing you have to remember about when you’re calculating limits, is what actually happens at the number, in this case, 8. What actually happens at 8 doesn’t matter. You have to focus on what’s happening as you get close to 8. What’s happening at 8 may be different. So remember, as x approaches 8 we get 49. © 2019 Brightstorm, Inc. All Rights Reserved. Terms · Privacy
__label__pos
0.680092
Money Earn - âñ¸ î çàðàáîòêå â èíòåðíåòå è ðàáîòå íà äîìó! Èíôîðìàöèÿ î ïîëüçîâàòåëå Ïðèâåò, Ãîñòü! Âîéäèòå èëè çàðåãèñòðèðóéòåñü. Âû çäåñü » Money Earn - âñ¸ î çàðàáîòêå â èíòåðíåòå è ðàáîòå íà äîìó! » Êóðèëêà » Ãäå ïîïðîáîâàòü Âèðòóàëüíóþ Ðåàëüíîñòü â Èæåâñêå? Ãäå ïîïðîáîâàòü Âèðòóàëüíóþ Ðåàëüíîñòü â Èæåâñêå? Ñîîáùåíèé 1 ñòðàíèöà 3 èç 3 1 Åñòü ëè â Èæåâñêå ìåñòà, ãäå ìîæíî ïîïðîáîâàòü VR? Èíòåðåñíî ïîãðóçèòüñÿ â âèðòóàëüíûé ìèð, íî íå çíàþ, ãäå ýòî ìîæíî ñäåëàòü â íàøåì ãîðîäå. 2 Â Èæåâñêå åñòü íåñêîëüêî ìåñò, ãäå ìîæíî ïîïðîáîâàòü VR ðàçâëå÷åíèÿ. Ðåêîìåíäóþ óòî÷íèòü â îòçûâàõ î êà÷åñòâå îáîðóäîâàíèÿ è âûáîðå èãð. 3 ß íåäàâíî ïîñåòèë https://izhevsk-iskra.warpoint.ru â Èæåâñêå. Î÷åíü ïîíðàâèëîñü! Øèðîêèé âûáîð èãð, îòëè÷íîå îáîðóäîâàíèå, è àòìîñôåðà â öåëîì. Îíè ïðåäëàãàþò ðàçíûå æàíðû èãð äëÿ âñåõ âîçðàñòîâ. ß áûë óäèâëåí êà÷åñòâîì ãðàôèêè è ðåàëèñòè÷íîñòüþ âèðòóàëüíîãî ìèðà. Âû çäåñü » Money Earn - âñ¸ î çàðàáîòêå â èíòåðíåòå è ðàáîòå íà äîìó! » Êóðèëêà » Ãäå ïîïðîáîâàòü Âèðòóàëüíóþ Ðåàëüíîñòü â Èæåâñêå? Ñåðâèñ ôîðóìîâ BestBB © 2016-2024. Ñîçäàòü ôîðóì áåñïëàòíî
__label__pos
0.611652
topic badge Finding Rules Interactive practice questions Look at the shapes below: a How many shapes are there in total? b What shape comes $1$1st? Triangle A Circle B Rectangle C Square D c What is the $4$4th shape? Square A Rectangle B Triangle C Circle D d Is there a repeated pattern? No A Yes B e What shape would come next in the pattern (the $7$7th shape)? Triangle A Rectangle B Square C Circle D f What would the $10$10th shape be? Circle A Triangle B Square C Rectangle D Easy Approx a minute Look at the shapes below: Look at the shapes below: Look at these numbers: $8,9,10,11,12$8,9,10,11,12 Sign up to access Practice Questions Get full access to our content with a Mathspace account What is Mathspace About Mathspace
__label__pos
0.998778