42 lines
1.4 KiB
Text
42 lines
1.4 KiB
Text
|
$newline never
|
||
|
\<!doctype html>
|
||
|
\<!--[if lt IE 7]> <html class="no-js ie6 oldie" lang="en"> <![endif]-->
|
||
|
\<!--[if IE 7]> <html class="no-js ie7 oldie" lang="en"> <![endif]-->
|
||
|
\<!--[if IE 8]> <html class="no-js ie8 oldie" lang="en"> <![endif]-->
|
||
|
\<!--[if gt IE 8]><!-->
|
||
|
<html class="no-js" lang="en"> <!--<![endif]-->
|
||
|
<head>
|
||
|
<meta charset="UTF-8">
|
||
|
|
||
|
<title>#{pageTitle pc}
|
||
|
<meta name="description" content="">
|
||
|
<meta name="author" content="">
|
||
|
|
||
|
<meta name="viewport" content="width=device-width,initial-scale=1">
|
||
|
|
||
|
^{pageHead pc}
|
||
|
|
||
|
<script>
|
||
|
/* The `defaultCsrfMiddleware` Middleware added in Foundation.hs adds a CSRF token to the request cookies. */
|
||
|
/* AJAX requests should add that token to a header to be validated by the server. */
|
||
|
/* See the CSRF documentation in the Yesod.Core.Handler module of the yesod-core package for details. */
|
||
|
var csrfHeaderName = "#{TE.decodeUtf8 $ CI.foldedCase defaultCsrfHeaderName}";
|
||
|
|
||
|
var csrfCookieName = "#{TE.decodeUtf8 defaultCsrfCookieName}";
|
||
|
var csrfToken = Cookies.get(csrfCookieName);
|
||
|
|
||
|
|
||
|
if (csrfToken) {
|
||
|
\ $.ajaxPrefilter(function( options, originalOptions, jqXHR ) {
|
||
|
\ if (!options.crossDomain) {
|
||
|
\ jqXHR.setRequestHeader(csrfHeaderName, csrfToken);
|
||
|
\ }
|
||
|
\ });
|
||
|
}
|
||
|
|
||
|
<script>
|
||
|
document.documentElement.className = document.documentElement.className.replace(/\bno-js\b/,'js');
|
||
|
<body>
|
||
|
^{pageBody pc}
|
||
|
|