"use strict"; Object.defineProperty(exports, "__esModule", { value: true }); exports.VULNERABILITIES = exports.SEARCH_BAR_PLACEHOLDER = exports.FILTER_OUT = exports.FILTER_IN = void 0; var _i18n = require("@kbn/i18n"); /* * Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one * or more contributor license agreements. Licensed under the Elastic License * 2.0; you may not use this file except in compliance with the Elastic License * 2.0. */ const FILTER_IN = _i18n.i18n.translate('xpack.csp.vulnerabilities.table.filterIn', { defaultMessage: 'Filter in' }); exports.FILTER_IN = FILTER_IN; const FILTER_OUT = _i18n.i18n.translate('xpack.csp.vulnerabilities.table.filterOut', { defaultMessage: 'Filter out' }); exports.FILTER_OUT = FILTER_OUT; const SEARCH_BAR_PLACEHOLDER = _i18n.i18n.translate('xpack.csp.vulnerabilities.searchBar.placeholder', { defaultMessage: 'Search vulnerabilities (eg. vulnerability.severity : "CRITICAL" )' }); exports.SEARCH_BAR_PLACEHOLDER = SEARCH_BAR_PLACEHOLDER; const VULNERABILITIES = _i18n.i18n.translate('xpack.csp.vulnerabilities', { defaultMessage: 'Vulnerabilities' }); exports.VULNERABILITIES = VULNERABILITIES;