~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
一、html代码
漏洞简介
立即提交
二、创建富文本并接收值
layui.use(['form', 'layedit', 'laydate'], function () {
var form = layui.form
, layer = layui.layer
, layedit = layui.layedit
, laydate = layui.laydate;
var aa = layedit.build('vulnerabilityIntroduction');
三、Ajax新属性赋值并传送后台
//监听提交
form.on('submit(demo1)', function (data) {
var vulnerabilityIntroduction = layedit.getContent(aa);
var bean = data.field;
bean.vulnerabilityIntroduction = vulnerabilityIntroduction;
$.ajax({
async: false,
type: "POST",
url: ctxPath + 'demo/add',
data: bean,
success: function (result) {
layer.alert("新增成功");
if (result.code === 0) {
layer.alert("新增成功");
}
}
});
var index = parent.layer.getFrameIndex(window.name);
parent.layer.close(index);
parent.$('.layui-laypage-btn').click();
});
有用请点赞,养成良好习惯!
疑问、交流、鼓励请留言!
标签:layer,vulnerabilityIntroduction,form,Layui,layui,var,文本,layedit
来源: https://blog.csdn.net/libusi001/article/details/100726869