Audit.DynamicProxy
27.1.1
See the version list below for details.
dotnet add package Audit.DynamicProxy --version 27.1.1
NuGet\Install-Package Audit.DynamicProxy -Version 27.1.1
<PackageReference Include="Audit.DynamicProxy" Version="27.1.1" />
paket add Audit.DynamicProxy --version 27.1.1
#r "nuget: Audit.DynamicProxy, 27.1.1"
// Install Audit.DynamicProxy as a Cake Addin #addin nuget:?package=Audit.DynamicProxy&version=27.1.1 // Install Audit.DynamicProxy as a Cake Tool #tool nuget:?package=Audit.DynamicProxy&version=27.1.1
Audit.DynamicProxy
Dynamic Proxy Extension for Audit.NET library.
Generate Audit Logs by intercepting operations on virtually any class.
Audit.DynamicProxy provides the infrastructure to create audit logs for a class without changing its code. It relies on Castle DynamicProxy library to intercept and record the operation calls (methods and properties) including caller info and arguments.
Install
NuGet Package
To install the package run the following command on the Package Manager Console:
PM> Install-Package Audit.DynamicProxy
Usage
To enable the audit log for an instance of a class, create a proxy for the class by calling the AuditProxy.Create<>()
method.
This will return a proxied audit-enabled instance that you should use instead of the real instance. Each operation on the proxy (access to a property or method call) will generate an Audit Event.
Suppose you have a MyRepository
instance that you want to audit, like this:
public class MyDataAccess
{
IMyRepository _repository = new MyRepository(); // <- Audit this object
public async Task<int> InsertUserAsync(string userName)
{
return await _repository.InsertUserAsync(userName);
}
// ...
}
To enable the audit on the _repository
object, intercept its assignation by calling AuditProxy.Create<>()
:
public class MyDataAccess
{
IMyRepository _repository = AuditProxy.Create<IMyRepository>(new MyRepository()); // Audited!
public async Task<int> InsertUserAsync(string userName)
{
return await _repository.InsertUserAsync(userName);
}
// ...
}
You can also intercept conditionally, for example to avoid auditing when a debugger is attached:
public class MyDataAccess
{
IMyRepository _repository = new MyRepository();
public MyDataAccess()
{
if (!Debugger.IsAttached)
{
// Audit only when no debugger is attached
_repository = AuditProxy.Create<IMyRepository>(_repository);
}
}
}
Creating proxies
The AuditProxy.Create<>()
method returns an auditable proxy object that inherits from the proxied class/implements proxied interface and forwards calls to the real object.
This is the method signature:
T AuditProxy.Create<T>(T instance, InterceptionSettings settings = null)
Give special attention to the generic type argument T
, it can be:
- An interface: Will generate an interface proxy to log all the interface member calls. (Recommended)
- A class type: Will generate a class proxy to log virtual member calls. Non-virtual methods can't be automatically audited.
When using an interface proxy, the interception is limited to the members of the interface. And when using a class proxy, the interception is limited to its virtual members.
The instance
argument is an instance of the object to be audited.
The settings
argument allows you to change the default settings. See settings section for more information.
Settings
The InterceptionSettings
class include the following settings:
- EventType: A string that identifies the event type. Default is "{class}.{method}". Can contain the following placeholders:
- {class}: Replaced by the class name
- {method}: Replaced by the method name
- IgnoreProperties: A boolean indicating whether the audit should ignore the property getters and setters. If true, the property accesses will not be logged. Default is false
- IgnoreEvents: A boolean indicating whether the audit should ignore the event attach and detach operations. If true, the event accesses will not be logged. Default is false
- MethodFilter: A function that takes a
MethodInfo
and returns a boolean indicating whether the method should be taken into account for the logging. Use this setting to have fine grained control over the methods that should be audited. By default all methods are included. - AuditDataProvider: Allows to set a specific audit data provider for this instance. By default the globally configured data provider is used. See Audit.NET Data Providers section for more information.
AuditIgnore Attribute
You can exclude specific members, arguments or return values from the audit, by decorating them with the AuditIgnore
attribute. For example:
public class MyRepository : IMyRepository
{
//Ignore a method (no events will be generated for this method)
[AuditIgnore]
public User GetUser(string userName)
{
...
}
//Ignore an argument (argument value will not be included in the output)
public User FindUser(int type, [AuditIgnore] Filter filter)
{
...
}
//Exclude the return value (result will not be included in the output)
[return:AuditIgnore]
public List<User> SearchUsers(string text)
{
...
}
}
Customization
You can access the current audit scope from an audited member by getting the static AuditProxy.CurrentScope
property.
The static property
AuditProxy.CurrentScope
returns the scope for the current running thread and should be accessed from the same thread as the executing audited operation. Calling this from a different thread will lead to an unexpected result. On async methods, you should only access this propery before any await ocurrence.
For example:
public class MyRepository : IMyRepository
{
public async Task<int> InsertUserAsync(string userName)
{
var auditScope = AuditProxy.CurrentScope; // Get the current scope
auditScope.SetCustomField("TestField", Guid.NewGuid()); // Set a custom field
//... existing code to insert user ...
if (pleaseDoNotLog)
{
auditScope.Discard(); // Discard the event
}
return await _repository.InsertUserAsync(userName);
}
}
Output
Audit.DynamicProxy output includes:
- Execution time and duration (async-aware)
- Environment information such as user, machine, domain and locale.
- Method parameters (input and output)
- Return object
- Exception details
- Comments and Custom Fields provided
With this information you can know who did the operation, and also measure performance, observe exceptions thrown and get statistics about usage of your classes.
Async calls are logged when the asynchronous call ends; as a continuation task, so the Audit Event includes the actual duration and result.
Output Details
The following table describes the Audit.DynamicProxy output fields:
AuditInterceptEvent
Describes an operation call event
Field Name | Type | Description |
---|---|---|
ClassName | string | Name of class where the operation is defined |
MethodName | string | Name of the audited method |
IsAsync | boolean | A boolean indicating whether the audited method is async |
AsyncStatus | string | If the method is async, this will contain the final Task status (Canceled , Faulted , RanToCompletion ) |
InstanceQualifiedName | string | Full qualified name of the class |
MethodSignature | string | The complete method signature |
PropertyName | string | Name of the property modified (if any) |
EventName | string | Name of the event modified (if any) |
Arguments | argument array | The operation arguments (input and output parameters) |
Success | boolean | Indicates if the operation completed succesfully |
Exception | string | The exception details when an exception is thrown |
Result | argument object | The result of the operation |
AuditInterceptArgument
Describes an operation argument
Field Name | Type | Description |
---|---|---|
Index | string | Argument index |
Name | string | Argument name |
Type | string | Argument type |
Value | object | Input argument value |
OutputValue | object | Output argument value (Only for ref or out parameters) |
Output Samples
Successful async method call:
{
"EventType": "MyRepository.InsertUserAsync",
"Environment": {
"UserName": "Federico",
"MachineName": "HP",
"DomainName": "HP",
"CallingMethodName": "Audit.DynamicProxy.AuditInterceptor.Intercept()",
"AssemblyName": "Audit.DynamicProxy, Version=4.5.2.0, Culture=neutral, PublicKeyToken=null",
"Culture": "en-GB"
},
"StartDate": "2016-09-30T12:00:35.7073819-05:00",
"EndDate": "2016-09-30T12:00:36.7168197-05:00",
"Duration": 1009,
"InterceptEvent": {
"ClassName": "MyRepository",
"MethodName": "InsertUserAsync",
"IsAsync": true,
"AsyncStatus": "RanToCompletion",
"InstanceQualifiedName": "Audit.DynamicProxy.UnitTest.MyRepository, Audit.DynamicProxy.UnitTest, Version=3.0.0.0, Culture=neutral, PublicKeyToken=null",
"MethodSignature": "System.Threading.Tasks.Task`1[System.Int32] InsertUserAsync(System.String)",
"Arguments": [
{
"Index": 0,
"Name": "userName",
"Type": "String",
"Value": "thepirat000"
}
],
"Success": true,
"Result": {
"Type": "Task<Int32>",
"Value": 142857
}
}
}
Failed async method call:
{
"EventType": "MyRepository.InsertUserAsync",
"Environment": {
"UserName": "Federico",
"MachineName": "HP",
"DomainName": "HP",
"CallingMethodName": "Audit.DynamicProxy.AuditInterceptor.Intercept()",
"AssemblyName": "Audit.DynamicProxy, Version=4.5.2.0, Culture=neutral, PublicKeyToken=null",
"Exception": "COMException: Exception from HRESULT: 0xE0434352",
"Culture": "en-GB"
},
"StartDate": "2016-09-30T12:18:34.5093824-05:00",
"EndDate": "2016-09-30T12:18:35.5388113-05:00",
"Duration": 1029,
"InterceptEvent": {
"ClassName": "MyRepository",
"MethodName": "InsertUserAsync",
"IsAsync": true,
"AsyncStatus": "Faulted",
"InstanceQualifiedName": "Audit.DynamicProxy.UnitTest.MyRepository, Audit.DynamicProxy.UnitTest, Version=3.0.0.0, Culture=neutral, PublicKeyToken=null",
"MethodSignature": "System.Threading.Tasks.Task`1[System.Int32] InsertUserAsync(System.String)",
"Arguments": [
{
"Index": 0,
"Name": "userName",
"Type": "String",
"Value": null
}
],
"Success": false,
"Exception": "(ArgumentNullException) UserName cannot be null",
"Result": null
}
}
Product | Versions Compatible and additional computed target framework versions. |
---|---|
.NET | net5.0 was computed. net5.0-windows was computed. net6.0 is compatible. net6.0-android was computed. net6.0-ios was computed. net6.0-maccatalyst was computed. net6.0-macos was computed. net6.0-tvos was computed. net6.0-windows was computed. net7.0 was computed. net7.0-android was computed. net7.0-ios was computed. net7.0-maccatalyst was computed. net7.0-macos was computed. net7.0-tvos was computed. net7.0-windows was computed. net8.0 was computed. net8.0-android was computed. net8.0-browser was computed. net8.0-ios was computed. net8.0-maccatalyst was computed. net8.0-macos was computed. net8.0-tvos was computed. net8.0-windows was computed. |
.NET Core | netcoreapp2.0 was computed. netcoreapp2.1 was computed. netcoreapp2.2 was computed. netcoreapp3.0 was computed. netcoreapp3.1 was computed. |
.NET Standard | netstandard2.0 is compatible. netstandard2.1 was computed. |
.NET Framework | net461 was computed. net462 is compatible. net463 was computed. net47 was computed. net471 was computed. net472 was computed. net48 was computed. net481 was computed. |
MonoAndroid | monoandroid was computed. |
MonoMac | monomac was computed. |
MonoTouch | monotouch was computed. |
Tizen | tizen40 was computed. tizen60 was computed. |
Xamarin.iOS | xamarinios was computed. |
Xamarin.Mac | xamarinmac was computed. |
Xamarin.TVOS | xamarintvos was computed. |
Xamarin.WatchOS | xamarinwatchos was computed. |
-
.NETFramework 4.6.2
- Audit.NET (>= 27.1.1)
- Castle.Core (>= 5.1.1)
-
.NETStandard 2.0
- Audit.NET (>= 27.1.1)
- Castle.Core (>= 5.1.1)
- Microsoft.CSharp (>= 4.7.0)
-
net6.0
- Audit.NET (>= 27.1.1)
- Castle.Core (>= 5.1.1)
NuGet packages
This package is not used by any NuGet packages.
GitHub repositories (1)
Showing the top 1 popular GitHub repositories that depend on Audit.DynamicProxy:
Repository | Stars |
---|---|
thepirat000/Audit.NET
An extensible framework to audit executing operations in .NET and .NET Core.
|
Version | Downloads | Last updated |
---|---|---|
27.2.0 | 0 | 11/23/2024 |
27.1.1 | 142 | 10/28/2024 |
27.1.0 | 92 | 10/24/2024 |
27.0.3 | 275 | 9/25/2024 |
27.0.2 | 103 | 9/19/2024 |
27.0.1 | 327 | 9/4/2024 |
27.0.0 | 98 | 9/3/2024 |
26.0.1 | 202 | 8/22/2024 |
26.0.0 | 136 | 7/19/2024 |
25.0.7 | 149 | 7/4/2024 |
25.0.6 | 132 | 6/24/2024 |
25.0.5 | 112 | 6/18/2024 |
25.0.4 | 463 | 3/24/2024 |
25.0.3 | 204 | 3/13/2024 |
25.0.2 | 130 | 3/12/2024 |
25.0.1 | 170 | 2/28/2024 |
25.0.0 | 165 | 2/16/2024 |
24.0.1 | 162 | 2/12/2024 |
24.0.0 | 116 | 2/12/2024 |
23.0.0 | 620 | 12/14/2023 |
22.1.0 | 156 | 12/9/2023 |
22.0.2 | 195 | 12/1/2023 |
22.0.1 | 236 | 11/16/2023 |
22.0.0 | 141 | 11/14/2023 |
21.1.0 | 2,827 | 10/9/2023 |
21.0.4 | 5,837 | 9/15/2023 |
21.0.3 | 1,934 | 7/9/2023 |
21.0.2 | 215 | 7/6/2023 |
21.0.1 | 551 | 5/27/2023 |
21.0.0 | 7,514 | 4/15/2023 |
20.2.4 | 1,331 | 3/27/2023 |
20.2.3 | 395 | 3/17/2023 |
20.2.2 | 327 | 3/14/2023 |
20.2.1 | 332 | 3/11/2023 |
20.2.0 | 355 | 3/7/2023 |
20.1.6 | 712 | 2/23/2023 |
20.1.5 | 3,162 | 2/9/2023 |
20.1.4 | 15,517 | 1/28/2023 |
20.1.3 | 407 | 12/21/2022 |
20.1.2 | 432 | 12/14/2022 |
20.1.1 | 452 | 12/12/2022 |
20.1.0 | 490 | 12/4/2022 |
20.0.4 | 432 | 11/30/2022 |
20.0.3 | 801 | 10/28/2022 |
20.0.2 | 547 | 10/26/2022 |
20.0.1 | 584 | 10/21/2022 |
20.0.0 | 661 | 10/1/2022 |
19.4.1 | 676 | 9/10/2022 |
19.4.0 | 604 | 9/2/2022 |
19.3.0 | 598 | 8/23/2022 |
19.2.2 | 641 | 8/11/2022 |
19.2.1 | 652 | 8/6/2022 |
19.2.0 | 740 | 7/24/2022 |
19.1.4 | 1,206 | 5/23/2022 |
19.1.3 | 596 | 5/22/2022 |
19.1.2 | 607 | 5/18/2022 |
19.1.1 | 754 | 4/28/2022 |
19.1.0 | 718 | 4/10/2022 |
19.0.7 | 773 | 3/13/2022 |
19.0.6 | 656 | 3/7/2022 |
19.0.5 | 727 | 1/28/2022 |
19.0.4 | 649 | 1/23/2022 |
19.0.3 | 687 | 12/14/2021 |
19.0.2 | 513 | 12/11/2021 |
19.0.1 | 948 | 11/20/2021 |
19.0.0 | 587 | 11/11/2021 |
19.0.0-rc.net60.2 | 184 | 9/26/2021 |
19.0.0-rc.net60.1 | 221 | 9/16/2021 |
18.1.6 | 1,033 | 9/26/2021 |
18.1.5 | 617 | 9/7/2021 |
18.1.4 | 540 | 9/6/2021 |
18.1.3 | 556 | 8/19/2021 |
18.1.2 | 657 | 8/8/2021 |
18.1.1 | 571 | 8/5/2021 |
18.1.0 | 613 | 8/1/2021 |
18.0.1 | 587 | 7/30/2021 |
18.0.0 | 607 | 7/26/2021 |
17.0.8 | 645 | 7/7/2021 |
17.0.7 | 1,802 | 6/16/2021 |
17.0.6 | 607 | 6/5/2021 |
17.0.5 | 642 | 5/28/2021 |
17.0.4 | 649 | 5/4/2021 |
17.0.3 | 606 | 5/1/2021 |
17.0.2 | 571 | 4/22/2021 |
17.0.1 | 600 | 4/18/2021 |
17.0.0 | 648 | 3/26/2021 |
16.5.6 | 640 | 3/25/2021 |
16.5.5 | 620 | 3/23/2021 |
16.5.4 | 629 | 3/9/2021 |
16.5.3 | 575 | 2/26/2021 |
16.5.2 | 583 | 2/23/2021 |
16.5.1 | 640 | 2/21/2021 |
16.5.0 | 560 | 2/17/2021 |
16.4.5 | 576 | 2/15/2021 |
16.4.4 | 545 | 2/5/2021 |
16.4.3 | 587 | 1/27/2021 |
16.4.2 | 654 | 1/22/2021 |
16.4.1 | 639 | 1/21/2021 |
16.4.0 | 642 | 1/11/2021 |
16.3.3 | 650 | 1/8/2021 |
16.3.2 | 658 | 1/3/2021 |
16.3.1 | 618 | 12/31/2020 |
16.3.0 | 568 | 12/30/2020 |
16.2.1 | 603 | 12/27/2020 |
16.2.0 | 853 | 10/13/2020 |
16.1.5 | 808 | 10/4/2020 |
16.1.4 | 999 | 9/17/2020 |
16.1.3 | 851 | 9/13/2020 |
16.1.2 | 704 | 9/9/2020 |
16.1.1 | 767 | 9/3/2020 |
16.1.0 | 736 | 8/19/2020 |
16.0.3 | 737 | 8/15/2020 |
16.0.2 | 757 | 8/9/2020 |
16.0.1 | 776 | 8/8/2020 |
16.0.0 | 664 | 8/7/2020 |
15.3.0 | 1,827 | 7/23/2020 |
15.2.3 | 744 | 7/14/2020 |
15.2.2 | 792 | 5/19/2020 |
15.2.1 | 771 | 5/12/2020 |
15.2.0 | 1,317 | 5/9/2020 |
15.1.1 | 796 | 5/4/2020 |
15.1.0 | 1,586 | 4/13/2020 |
15.0.5 | 3,051 | 3/18/2020 |
15.0.4 | 863 | 2/28/2020 |
15.0.3 | 763 | 2/26/2020 |
15.0.2 | 850 | 1/20/2020 |
15.0.1 | 871 | 1/10/2020 |
15.0.0 | 765 | 12/17/2019 |
14.9.1 | 822 | 11/30/2019 |
14.9.0 | 809 | 11/29/2019 |
14.8.1 | 827 | 11/26/2019 |
14.8.0 | 764 | 11/20/2019 |
14.7.0 | 802 | 10/9/2019 |
14.6.6 | 777 | 10/8/2019 |
14.6.5 | 788 | 9/27/2019 |
14.6.4 | 788 | 9/21/2019 |
14.6.3 | 928 | 8/12/2019 |
14.6.2 | 859 | 8/3/2019 |
14.6.1 | 755 | 8/3/2019 |
14.6.0 | 841 | 7/26/2019 |
14.5.7 | 845 | 7/18/2019 |
14.5.6 | 1,228 | 7/10/2019 |
14.5.5 | 830 | 7/1/2019 |
14.5.4 | 790 | 6/17/2019 |
14.5.3 | 863 | 6/5/2019 |
14.5.2 | 895 | 5/30/2019 |
14.5.1 | 875 | 5/28/2019 |
14.5.0 | 856 | 5/24/2019 |
14.4.0 | 1,552 | 5/22/2019 |
14.3.4 | 1,124 | 5/14/2019 |
14.3.3 | 851 | 5/9/2019 |
14.3.2 | 895 | 4/30/2019 |
14.3.1 | 892 | 4/27/2019 |
14.3.0 | 872 | 4/24/2019 |
14.2.3 | 876 | 4/17/2019 |
14.2.2 | 908 | 4/10/2019 |
14.2.1 | 925 | 4/5/2019 |
14.2.0 | 947 | 3/16/2019 |
14.1.1 | 892 | 3/8/2019 |
14.1.0 | 1,182 | 2/11/2019 |
14.0.4 | 2,415 | 1/31/2019 |
14.0.3 | 1,039 | 1/22/2019 |
14.0.2 | 966 | 12/15/2018 |
14.0.1 | 1,004 | 11/29/2018 |
14.0.0 | 1,046 | 11/19/2018 |
13.3.0 | 1,030 | 11/16/2018 |
13.2.2 | 1,034 | 11/15/2018 |
13.2.1 | 1,039 | 11/13/2018 |
13.2.0 | 1,094 | 10/31/2018 |
13.1.5 | 1,062 | 10/31/2018 |
13.1.4 | 1,051 | 10/25/2018 |
13.1.3 | 1,351 | 10/18/2018 |
13.1.2 | 1,176 | 9/12/2018 |
13.1.1 | 1,140 | 9/11/2018 |
13.1.0 | 1,110 | 9/11/2018 |
13.0.0 | 1,117 | 8/29/2018 |
12.3.6 | 1,154 | 8/29/2018 |
12.3.5 | 1,129 | 8/22/2018 |
12.3.4 | 1,189 | 8/21/2018 |
12.3.3 | 25,858 | 8/21/2018 |
12.3.2 | 1,115 | 8/20/2018 |
12.3.1 | 1,166 | 8/20/2018 |
12.3.0 | 1,157 | 8/20/2018 |
12.2.2 | 1,203 | 8/15/2018 |
12.2.1 | 1,193 | 8/9/2018 |
12.2.0 | 1,157 | 8/8/2018 |
12.1.11 | 1,120 | 7/30/2018 |
12.1.10 | 8,150 | 7/20/2018 |
12.1.9 | 1,243 | 7/10/2018 |
12.1.8 | 1,175 | 7/2/2018 |
12.1.7 | 1,352 | 6/7/2018 |
12.1.6 | 1,208 | 6/4/2018 |
12.1.5 | 1,225 | 6/2/2018 |
12.1.4 | 1,197 | 5/25/2018 |
12.1.3 | 1,444 | 5/16/2018 |
12.1.2 | 1,253 | 5/15/2018 |
12.1.1 | 1,317 | 5/14/2018 |
12.1.0 | 1,164 | 5/9/2018 |
12.0.7 | 1,376 | 5/5/2018 |
12.0.6 | 1,362 | 5/4/2018 |
12.0.5 | 1,349 | 5/3/2018 |
12.0.4 | 1,351 | 4/30/2018 |
12.0.3 | 1,184 | 4/30/2018 |
12.0.2 | 1,274 | 4/27/2018 |
12.0.1 | 1,154 | 4/25/2018 |
12.0.0 | 1,124 | 4/22/2018 |
11.2.0 | 1,327 | 4/11/2018 |
11.1.0 | 1,269 | 4/8/2018 |
11.0.8 | 1,306 | 3/26/2018 |
11.0.7 | 1,269 | 3/20/2018 |
11.0.6 | 1,223 | 3/7/2018 |
11.0.5 | 1,228 | 2/22/2018 |
11.0.4 | 1,275 | 2/14/2018 |
11.0.3 | 1,331 | 2/12/2018 |
11.0.2 | 1,201 | 2/9/2018 |
11.0.1 | 1,298 | 1/29/2018 |
11.0.0 | 1,648 | 1/15/2018 |
10.0.3 | 1,266 | 12/29/2017 |
10.0.2 | 1,295 | 12/26/2017 |
10.0.1 | 1,346 | 12/18/2017 |
10.0.0 | 1,207 | 12/18/2017 |
9.3.0 | 1,342 | 12/17/2017 |
9.2.0 | 1,328 | 12/17/2017 |
9.1.3 | 1,297 | 12/5/2017 |
9.1.2 | 1,301 | 11/27/2017 |
9.1.1 | 1,252 | 11/21/2017 |
9.1.0 | 1,240 | 11/21/2017 |
9.0.1 | 1,237 | 11/11/2017 |
9.0.0 | 1,278 | 11/10/2017 |
8.7.0 | 1,283 | 11/9/2017 |
8.6.0 | 1,251 | 11/9/2017 |
8.5.0 | 1,273 | 10/3/2017 |
8.4.0 | 1,272 | 10/3/2017 |
8.3.1 | 1,541 | 9/8/2017 |
8.3.0 | 1,316 | 9/8/2017 |
8.2.0 | 1,342 | 9/4/2017 |
8.1.0 | 1,345 | 8/22/2017 |
8.0.0 | 1,466 | 8/19/2017 |
7.1.3 | 1,316 | 8/14/2017 |
7.1.2 | 1,255 | 8/2/2017 |
7.1.1 | 1,245 | 7/26/2017 |
7.1.0 | 1,318 | 7/5/2017 |
7.0.9 | 1,336 | 6/28/2017 |
7.0.8 | 1,374 | 6/19/2017 |
7.0.6 | 1,387 | 4/7/2017 |
7.0.5 | 1,345 | 3/21/2017 |
7.0.4 | 1,312 | 3/21/2017 |
7.0.3 | 1,335 | 3/20/2017 |
7.0.2 | 1,316 | 3/13/2017 |
7.0.0 | 1,324 | 3/1/2017 |
6.2.0 | 1,417 | 2/25/2017 |
6.1.0 | 1,339 | 2/14/2017 |
6.0.0 | 1,467 | 2/9/2017 |
5.3.0 | 1,366 | 2/5/2017 |
5.2.0 | 1,320 | 1/26/2017 |
5.1.0 | 1,320 | 1/19/2017 |
5.0.0 | 1,318 | 1/7/2017 |
4.11.0 | 1,298 | 1/5/2017 |
4.10.0 | 1,320 | 12/31/2016 |
4.9.0 | 1,271 | 12/26/2016 |
4.8.0 | 1,281 | 12/17/2016 |
4.7.0 | 1,325 | 12/8/2016 |
4.6.5 | 1,345 | 12/4/2016 |
4.6.4 | 1,304 | 11/25/2016 |
4.6.2 | 1,310 | 11/18/2016 |
4.6.1 | 1,286 | 11/15/2016 |
4.6.0 | 1,300 | 11/11/2016 |
4.5.9 | 1,492 | 11/2/2016 |
4.5.8 | 1,357 | 11/2/2016 |
4.5.7 | 1,287 | 10/26/2016 |
4.5.6 | 1,256 | 10/6/2016 |
4.5.5 | 1,291 | 10/3/2016 |
4.5.4 | 1,263 | 10/2/2016 |
4.5.3 | 1,298 | 9/30/2016 |
4.5.2 | 1,329 | 9/28/2016 |
4.5.1 | 1,283 | 9/28/2016 |
4.5.0 | 1,305 | 9/28/2016 |