1
0
Fork 0
mirror of https://code.sup39.dev/repos/Wqawg synced 2024-12-28 12:34:50 +09:00
vervis/templates/default-layout-wrapper.hamlet

43 lines
1.5 KiB
Text
Raw Normal View History

2016-02-13 12:35:30 +09:00
$newline never
<!doctype html>
<html class="no-js" lang="en">
2016-02-13 12:35:30 +09:00
<head>
<meta charset="UTF-8">
<title>#{pageTitle pc}
<meta name="description" content="">
<meta name="author" content="">
<meta name="viewport" content="width=device-width,initial-scale=1">
<link rel="icon" type="image/svg+xml" href="/favicon.svg">
<link rel="icon" type="image/png" href="/favicon.png">
2016-02-13 12:35:30 +09:00
^{pageHead pc}
$# <script type="text/javascript" src="https://cdnjs.cloudflare.com/ajax/libs/jquery/2.1.4/jquery.js">
$# <script type="text/javascript" src="https://cdnjs.cloudflare.com/ajax/libs/js-cookie/2.0.3/js.cookie.min.js">
$#
$# <script>
$# /* The `defaultCsrfMiddleware` Middleware added in Foundation.hs adds a CSRF token the request cookies. */
$# /* AJAX requests should add that token to a header to be validated by the server. */
$# /* See the CSRF documentation in the Yesod.Core.Handler module of the yesod-core package for details. */
$# var csrfHeaderName = "#{TE.decodeUtf8 $ CI.foldedCase defaultCsrfHeaderName}";
$#
$# var csrfCookieName = "#{TE.decodeUtf8 defaultCsrfCookieName}";
$# var csrfToken = Cookies.get(csrfCookieName);
$#
$#
$# if (csrfToken) {
$# \ $.ajaxPrefilter(function( options, originalOptions, jqXHR ) {
$# \ if (!options.crossDomain) {
$# \ jqXHR.setRequestHeader(csrfHeaderName, csrfToken);
$# \ }
$# \ });
$# }
$#
$# <script>
$# document.documentElement.className = document.documentElement.className.replace(/\bno-js\b/,'js');
2016-02-13 12:35:30 +09:00
<body>
^{pageBody pc}