default/cve5/preload.js (16 lines of code) (raw):

async function preloadCve() { try { await initCsClient(); } catch (e) { //portalErrorHandler(e); } } preloadCve(); // ASF if (document.getElementById('post1')) document.getElementById('post1').addEventListener('click', cvePost); //var publicEditorOption = cloneJSON(docEditorOptions); //Object.assign(publicEditorOption.schema, docSchema.oneOf[0]); //delete publicEditorOption.schema.oneOf; //var rejectEditorOption = cloneJSON(docEditorOptions); //Object.assign(rejectEditorOption.schema, docSchema.oneOf[1]); //delete rejectEditorOption.schema.oneOf; docSchema.oneOf.pop() docSchema.oneOf[0].title="Editor" //if (initJSON && initJSON.cveMetadata && initJSON.cveMetadata.state == 'REJECTED') { // docEditorOptions = rejectEditorOption; //} else { // docEditorOptions = publicEditorOption; //} // END ASF // make sure all starting and ending spaces in strings are trimmed JSONEditor.defaults.editors.string.prototype.sanitize = function(value) { if(value) return value.trim(); return value; };