Mercurial > hg > nginx-site
view xsls/security.xsls @ 519:e23d718ac865
A link to CHANGES for 1.3 corrected.
author | Maxim Konovalov <maxim@nginx.com> |
---|---|
date | Mon, 21 May 2012 15:15:17 +0000 |
parents | c7d2ce96298b |
children | 9085f0c59dc6 |
line wrap: on
line source
X:stylesheet { X:output method="html" version="4.0" indent="no" encoding="utf-8"; X:strip-space elements = "*"; <!-- -- a current directory of a XSLT script is where the script is stored, -- but not where XSLT processor has been started to run the script --> X:param XML = "'../xml'"; X:param YEAR; X:var LINK = "/article/@link"; X:include href = "dirname.xslt"; X:include href = "link.xslt"; X:include href = "style.xslt"; X:include href = "body.xslt"; X:include href = "menu.xslt"; X:include href = "content.xslt"; X:template = "/article" { <html><head> <title> !{@name} </title> !style (lang="@lang") </head> !body (lang="@lang") </html> } X:template = "security" { <ul> !!; </ul> } X:template = "security/item" { <li> <p> !{@name}<br/> X:if "@severity = 'major'" { X:text{Severity: } <b>!{@severity}</b><br/> } else { X:text{Severity: } !{@severity}<br/> } X:if "@cert" { <a> X:attribute "href" { X:text {http://www.kb.cert.org/vuls/id/} !{@cert} } X:text {VU#} !{@cert} </a> } X:if "@cve" { X:if "@cert" { X:text {  } } <a> X:attribute "href" { X:text {http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-} !{@cve} } X:text {CVE-} !{@cve} </a> } X:if "@core" { X:if "@cert or @cve" { X:text {  } } <a href="{@href}"> !{@core} </a> } X:if "@cert or @cve or @core" { <br/> } X:text {Not vulnerable: } !{@good} <br/> X:text {Vulnerable: } !{@vulnerable} <br/> X:if "@patch" { <a> X:attribute "href" { X:text {/download/} !{@patch} } X:text {The patch} </a> X:text {  } <a> X:attribute "href" { X:text {/download/} !{@patch} X:text {.asc} } X:text {pgp} </a> } </p> </li> } }