search-constraints-box.jsp
来自「opennms得相关源码 请大家看看」· JSP 代码 · 共 87 行
JSP
87 行
<!--//// This file is part of the OpenNMS(R) Application.//// OpenNMS(R) is Copyright (C) 2002-2003 The OpenNMS Group, Inc. All rights reserved.// OpenNMS(R) is a derivative work, containing both original code, included code and modified// code that was published under the GNU General Public License. Copyrights for modified // and included code are below.//// OpenNMS(R) is a registered trademark of The OpenNMS Group, Inc.//// Copyright (C) 1999-2001 Oculan Corp. All rights reserved.//// This program is free software; you can redistribute it and/or modify// it under the terms of the GNU General Public License as published by// the Free Software Foundation; either version 2 of the License, or// (at your option) any later version.//// This program is distributed in the hope that it will be useful,// but WITHOUT ANY WARRANTY; without even the implied warranty of// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the// GNU General Public License for more details.//// You should have received a copy of the GNU General Public License// along with this program; if not, write to the Free Software// Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.//// For more information contact:// OpenNMS Licensing <license@opennms.org>// http://www.opennms.org/// http://www.opennms.com///--><%@page language="java" contentType="text/html" session="true" import="java.util.*,org.opennms.web.Util,org.opennms.web.vulnerability.*,org.opennms.web.vulnerability.filter.Filter" %><% //required attribute parms VulnerabilityQueryParms parms = (VulnerabilityQueryParms)request.getAttribute( "parms" ); if( parms == null ) { throw new ServletException( "Missing the vulnerability parms request attribute." ); } int length = parms.filters.size(); %><!-- acknowledged/outstanding row --><p> <form action="vulnerability/list" method="GET" name="vul_search_constraints_box_restype_form"> <%=Util.makeHiddenTags(request, new String[] {"restype"})%> Vulnerability type: <select name="restype" size="1" onChange="javascript: document.vul_search_constraints_box_restype_form.submit()"> <option value="<%=VulnerabilityUtil.getResolutionTypeString(VulnerabilityFactory.ResolutionType.OPEN)%>" <%=(parms.resType == VulnerabilityFactory.ResolutionType.OPEN) ? "selected=\"1\"" : ""%>> Open </option> <option value="<%=VulnerabilityUtil.getResolutionTypeString(VulnerabilityFactory.ResolutionType.RESOLVED)%>" <%=(parms.resType == VulnerabilityFactory.ResolutionType.RESOLVED) ? "selected=\"1\"" : ""%>> Resolved </option> <option value="<%=VulnerabilityUtil.getResolutionTypeString(VulnerabilityFactory.ResolutionType.BOTH)%>" <%=(parms.resType == VulnerabilityFactory.ResolutionType.BOTH) ? "selected=\"1\"" : ""%>> Both Open & Resolved </option> </select> </form></p> <% if( length > 0 ) { %> <p> <ol> <% for(int i=0; i < length; i++) { %> <% Filter filter = (Filter)parms.filters.get(i); %> <li> <%=filter.getTextDescription()%> <a href="<%=VulnerabilityUtil.makeLink( request, parms, filter, false)%>">Remove</a> </li> <% } %> </ol> </p><% } %>
⌨️ 快捷键说明
复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?