view website/issues/html/_generic.calendar.html @ 8063:6d4b5005abf2

docs: changes to website docs to announce CVE's Changes to the website doc generation to create CVE.html by extracing secions from upgrading.txt. It also allows overriding the release version that is displayed in the web page titles. It also adds support for making a zipfile (which is better supported on windows that a tarball) of the templates needed to address the CVE in the tracker home html files The next commit for this directory will remove the generation of the CVE.html file as CVE remediation/scope issue will be in the upgrading.html document. It will also remove generation of templates.zip.
author John Rouillard <rouilj@ieee.org>
date Tue, 09 Jul 2024 09:12:29 -0400
parents 28aa76443f58
children
line wrap: on
line source

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
 <head>
  <link rel="stylesheet" type="text/css" href="@@file/style.css" />
  <meta http-equiv="Content-Type" content="text/html; charset=utf-8;" />
  <meta name="robots" content="noindex, nofollow" />
  <title tal:content="string:Roundup Calendar"></title>
  <script language="Javascript"
          type="text/javascript"
	  tal:attributes="nonce request/client/client_nonce"
          tal:content="string:
          // this is the name of the field in the original form that we're working on
          form  = window.opener.document.${request/form/form/value};
          field = '${request/form/property/value}';" >
  </script>
 </head>
 <body class="body"
       tal:content="structure python:utils.html_calendar(request)">
 </body>
</html>

Roundup Issue Tracker: http://roundup-tracker.org/