jquery-validation
Advanced tools
Comparing version 1.13.1 to 1.14.0
@@ -0,1 +1,54 @@ | ||
1.14.0 / 2015-06-30 | ||
================== | ||
## Core | ||
* Remove unused removeAttrs method | ||
* Replace regex for url method | ||
* Remove bad url param in $.ajax, overwritten by $.extend | ||
* Properly handle nested cancel submit button | ||
* Fix indent | ||
* Refactor attributeRules and dataRules to share noramlizer | ||
* dataRules method to convert value to number for number inputs | ||
* Update url method to allow for protocol-relative URLs | ||
* Remove deprecated $.format placeholder | ||
* Use jQuery 1.7+ on/off, add destroy method | ||
* IE8 compatibility changed .indexOf to $.inArray | ||
* Cast NaN value attributes to undefined for Opera Mini | ||
* Stop trimming value inside required method | ||
* Use :disabled selector to match disabled elements | ||
* Exclude some keyboard keys to prevent revalidating the field | ||
* Do not search the whole DOM for radio/checkbox elements | ||
* Throw better errors for bad rule methods | ||
* Fixed number validation error | ||
* Fix reference to whatwg spec | ||
* Focus invalid element when validating a custom set of inputs | ||
* Reset element styles when using custom highlight methods | ||
* Escape dollar sign in error id | ||
* Revert "Ignore readonly as well as disabled fields." | ||
* Update link in comment for Luhn algorithm | ||
## Additionals | ||
* Update dateITA to address timezone issue | ||
* Fix extension method to only method period | ||
* Fix accept method to match period only | ||
* Update time method to allow single digit hour | ||
* Drop bad test for notEqualTo method | ||
* Add notEqualTo method | ||
* Use correct jQuery reference via `$` | ||
* Remove useless regex check in iban method | ||
* Brazilian CPF number | ||
## Localization | ||
* Update messages_tr.js | ||
* Update messages_sr_lat.js | ||
* Adding Perú Spanish (ES PE) | ||
* Adding Georgian (ქართული, ge) | ||
* Fixed typo in catalan translation | ||
* Improve Finnish (fi) translation | ||
* Add armenian (hy_AM) locale | ||
* Extend italian (it) translation with currency method | ||
* Add bn_BD locale | ||
* Update zh locale | ||
* Remove full stop at the end of italian messages | ||
1.13.1 / 2014-10-14 | ||
@@ -2,0 +55,0 @@ ================== |
{ | ||
"name": "jquery-validation", | ||
"title": "jQuery Validation Plugin", | ||
"description": "Form validation made easy", | ||
"version": "1.13.1", | ||
"description": "Client-side form validation made easy", | ||
"version": "1.14.0", | ||
"homepage": "http://jqueryvalidation.org/", | ||
"license": "MIT", | ||
"author": { | ||
@@ -26,7 +27,14 @@ "name": "Jörn Zaefferer", | ||
"scripts": { | ||
"test": "grunt" | ||
"test": "grunt", | ||
"prepublish": "grunt" | ||
}, | ||
"files": [ | ||
"dist/localization/", | ||
"dist/additional-methods.js", | ||
"dist/jquery.validate.js" | ||
], | ||
"main": "dist/jquery.validate.js", | ||
"dependencies": {}, | ||
"devDependencies": { | ||
"commitplease": "1.11.0", | ||
"commitplease": "2.0.0", | ||
"grunt": "0.4.4", | ||
@@ -40,6 +48,8 @@ "grunt-contrib-compress": "0.7.0", | ||
"grunt-contrib-watch": "0.6.0", | ||
"grunt-jscs": "^0.6.1", | ||
"grunt-jscs": "1.0.0", | ||
"grunt-text-replace": "0.3.11" | ||
}, | ||
"keywords": [ | ||
"jquery", | ||
"jquery-plugin", | ||
"forms", | ||
@@ -46,0 +56,0 @@ "validation", |
@@ -57,17 +57,10 @@ [jQuery Validation Plugin](http://jqueryvalidation.org/) - Form validation made easy | ||
## Reporting an Issue | ||
## Reporting issues and contributing code | ||
**IMPORTANT NOTE ABOUT EMAIL VALIDATION**. As of version 1.12.0 this plugin is using the same regular expression that the [HTML5 specification suggests for browsers to use](http://www.whatwg.org/specs/web-apps/current-work/multipage/states-of-the-type-attribute.html#e-mail-state-%28type=email%29). We will follow their lead and use the same check. If you think the specification is wrong, please report the issue to them. | ||
See the [Contributing Guidelines](CONTRIBUTING.md) for details. | ||
1. Make sure the problem you're addressing is reproducible. | ||
2. Use http://jsbin.com or http://jsfiddle.net to provide a test page. | ||
3. Indicate what browsers the issue can be reproduced in. **Note: IE Compatibilty modes issues will not be addressed.** | ||
4. What version of the plug-in is the issue reproducible in. Is it reproducible after updating to the latest version. | ||
**IMPORTANT NOTE ABOUT EMAIL VALIDATION**. As of version 1.12.0 this plugin is using the same regular expression that the [HTML5 specification suggests for browsers to use](https://html.spec.whatwg.org/multipage/forms.html#valid-e-mail-address). We will follow their lead and use the same check. If you think the specification is wrong, please report the issue to them. If you have different requirements, consider [using a custom method](http://jqueryvalidation.org/jQuery.validator.addMethod/). | ||
## Contributing | ||
See the [Contributing Guide](CONTRIBUTING.md) | ||
## License | ||
Copyright (c) 2013 Jörn Zaefferer | ||
Copyright © Jörn Zaefferer<br> | ||
Licensed under the MIT license. |
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
Major refactor
Supply chain riskPackage has recently undergone a major refactor. It may be unstable or indicate significant internal changes. Use caution when updating to versions that include significant changes.
Found 1 instance in 1 package
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
Native code
Supply chain riskContains native code (e.g., compiled binaries or shared libraries). Including native code can obscure malicious behavior.
Found 2 instances in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Minified code
QualityThis package contains minified code. This may be harmless in some cases where minified code is included in packaged libraries, however packages on npm should not minify code.
Found 1 instance in 1 package
0
0
1
288002
120
4001
66