Skip to content

Commit e483618

Browse files
committed
Spell out vulnerability over vuln in forms #798
Reference: #798 Signed-off-by: Philippe Ombredanne <[email protected]>
1 parent a157024 commit e483618

File tree

5 files changed

+20
-20
lines changed

5 files changed

+20
-20
lines changed

vulnerabilities/forms.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ class PackageForm(forms.Form):
3838
)
3939

4040

41-
class CVEForm(forms.Form):
41+
class VulnerabilityForm(forms.Form):
4242

4343
vuln_id = forms.CharField(
4444
required=False,

vulnerabilities/templates/index.html

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -104,10 +104,10 @@
104104
</div>
105105
<div class="panel-block">
106106
<div class="pb-3 width-100-pct">
107-
<form action="{% url 'vulnerability_search' %}" method="get" name="vuln_form" onsubmit="return validateVulnForm()">
107+
<form action="{% url 'vulnerability_search' %}" method="get" name="vulnerability_form" onsubmit="return validateVulnForm()">
108108
<div class="field has-addons mt-3">
109109
<div class="control width-100-pct">
110-
{% render_field vuln_form.vuln_id class="input" %}
110+
{% render_field vulnerability_form.vuln_id class="input" %}
111111
</div>
112112
<div class="control">
113113
<button class="button is-link" type="submit" id="submit_vuln">
@@ -151,7 +151,7 @@
151151
}
152152

153153
function validateVulnForm() {
154-
var x = document.forms["vuln_form"]["vuln_id"].value;
154+
var x = document.forms["vulnerability_form"]["vuln_id"].value;
155155
if (x.trim().length == "") {
156156
return false;
157157
}

vulnerabilities/templates/vulnerabilities.html

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -41,10 +41,10 @@
4141
</div>
4242
<div class="panel-block">
4343
<div class="pb-3 width-100-pct">
44-
<form action="{% url 'vulnerability_search' %}" method="get" name="vuln_form" onsubmit="return validateVulnForm()">
44+
<form action="{% url 'vulnerability_search' %}" method="get" name="vulnerability_form" onsubmit="return validateVulnForm()">
4545
<div class="field has-addons mt-3">
4646
<div class="control width-100-pct">
47-
{% render_field vuln_form.vuln_id class="input" %}
47+
{% render_field vulnerability_form.vuln_id class="input" %}
4848
</div>
4949
<div class="control">
5050
<button class="button is-link" type="submit" id="submit_vuln" name="template" value="vulnerabilities">
@@ -203,7 +203,7 @@
203203
});
204204

205205
function validateVulnForm() {
206-
var x = document.forms["vuln_form"]["vuln_id"].value;
206+
var x = document.forms["vulnerability_form"]["vuln_id"].value;
207207
if (x.trim().length == "") {
208208
return false;
209209
}

vulnerabilities/templates/vulnerability.html

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -41,10 +41,10 @@
4141
</div>
4242
<div class="panel-block">
4343
<div class="pb-3 width-100-pct">
44-
<form action="{% url 'vulnerability_search' %}" method="get" name="vuln_form" onsubmit="return validateVulnForm()">
44+
<form action="{% url 'vulnerability_search' %}" method="get" name="vulnerability_form" onsubmit="return validateVulnForm()">
4545
<div class="field has-addons mt-3">
4646
<div class="control width-100-pct">
47-
{% render_field vuln_form.vuln_id class="input" %}
47+
{% render_field vulnerability_form.vuln_id class="input" %}
4848
</div>
4949
<div class="control">
5050
<button class="button is-link" type="submit" id="submit_vuln" name="template" value="vulnerability_details">
@@ -381,7 +381,7 @@
381381
});
382382

383383
function validateVulnForm() {
384-
var x = document.forms["vuln_form"]["vuln_id"].value;
384+
var x = document.forms["vulnerability_form"]["vuln_id"].value;
385385
if (x.trim().length == "") {
386386
return false;
387387
}

vulnerabilities/views.py

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@
2525

2626
from vulnerabilities import forms
2727
from vulnerabilities import models
28-
from vulnerabilities.forms import CVEForm
28+
from vulnerabilities.forms import VulnerabilityForm
2929
from vulnerabilities.forms import PackageForm
3030

3131

@@ -80,12 +80,12 @@ def get(self, request):
8080
return render(request, "package_update.html", context)
8181
elif request.GET.get("template") == "index":
8282
context["package_form"] = PackageForm(request.GET or None)
83-
context["vuln_form"] = CVEForm(request.GET or None)
83+
context["vulnerability_form"] = VulnerabilityForm(request.GET or None)
8484
context["template_name"] = "index.html"
8585
return render(request, "index.html", context)
8686
else:
8787
context["package_form"] = PackageForm(request.GET or None)
88-
context["vuln_form"] = CVEForm(request.GET or None)
88+
context["vulnerability_form"] = VulnerabilityForm(request.GET or None)
8989
context["template_name"] = "index.html"
9090
return render(request, "index.html", context)
9191

@@ -172,25 +172,25 @@ def get(self, request):
172172
}
173173

174174
if request.GET.get("template") == "vulnerabilities":
175-
context["vuln_form"] = CVEForm(request.GET or None)
175+
context["vulnerability_form"] = VulnerabilityForm(request.GET or None)
176176
context["template_name"] = "vulnerabilities.html"
177177
return render(request, "vulnerabilities.html", context)
178178
elif request.GET.get("template") == "vulnerability_details":
179-
context["vuln_form"] = CVEForm(request.GET or None)
179+
context["vulnerability_form"] = VulnerabilityForm(request.GET or None)
180180
context["template_name"] = "vulnerability.html"
181181
return render(request, "vulnerability.html", context)
182182
elif request.GET.get("template") == "index":
183183
context["package_form"] = PackageForm(request.GET or None)
184-
context["vuln_form"] = CVEForm(request.GET or None)
184+
context["vulnerability_form"] = VulnerabilityForm(request.GET or None)
185185
context["template_name"] = "index.html"
186186
return render(request, "index.html", context)
187187
else:
188188
context["package_form"] = PackageForm(request.GET or None)
189-
context["vuln_form"] = CVEForm(request.GET or None)
189+
context["vulnerability_form"] = VulnerabilityForm(request.GET or None)
190190
context["template_name"] = "index.html"
191191
return render(request, "index.html", context)
192192

193-
context["vuln_form"] = CVEForm(request.GET or None)
193+
context["vulnerability_form"] = VulnerabilityForm(request.GET or None)
194194
context["template_name"] = self.template_name
195195
return render(request, self.template_name, context)
196196

@@ -300,7 +300,7 @@ def get_context_data(self, **kwargs):
300300
vulnerability_list_count = len(vulnerability_list)
301301
context["vulnerability_list_count"] = vulnerability_list_count
302302

303-
context["vuln_form"] = CVEForm(self.request.GET or None)
303+
context["vulnerability_form"] = VulnerabilityForm(self.request.GET or None)
304304
context["template_name"] = self.template_name
305305

306306
severity_list = []
@@ -322,7 +322,7 @@ class HomePage(View):
322322

323323
def get(self, request):
324324
context = {
325-
"vuln_form": CVEForm(request.GET or None),
325+
"vulnerability_form": VulnerabilityForm(request.GET or None),
326326
"package_form": PackageForm(request.GET or None),
327327
"template_name": self.template_name,
328328
"debug_ui": settings.DEBUG_UI,

0 commit comments

Comments
 (0)