| 12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879 | const nameCheck = /^[-_a-zA-Z0-9]{4,22}$/;const tokenCheck = /^[-_/+a-zA-Z0-9]{24,}$/;// Generate and double-submit a CSRF token in a form field and a cookie, as defined by Symfony's SameOriginCsrfTokenManagerdocument.addEventListener('submit', function (event) {    generateCsrfToken(event.target);}, true);// When @hotwired/turbo handles form submissions, send the CSRF token in a header in addition to a cookie// The `framework.csrf_protection.check_header` config option needs to be enabled for the header to be checkeddocument.addEventListener('turbo:submit-start', function (event) {    const h = generateCsrfHeaders(event.detail.formSubmission.formElement);    Object.keys(h).map(function (k) {        event.detail.formSubmission.fetchRequest.headers[k] = h[k];    });});// When @hotwired/turbo handles form submissions, remove the CSRF cookie once a form has been submitteddocument.addEventListener('turbo:submit-end', function (event) {    removeCsrfToken(event.detail.formSubmission.formElement);});export function generateCsrfToken (formElement) {    const csrfField = formElement.querySelector('input[data-controller="csrf-protection"], input[name="_csrf_token"]');    if (!csrfField) {        return;    }    let csrfCookie = csrfField.getAttribute('data-csrf-protection-cookie-value');    let csrfToken = csrfField.value;    if (!csrfCookie && nameCheck.test(csrfToken)) {        csrfField.setAttribute('data-csrf-protection-cookie-value', csrfCookie = csrfToken);        csrfField.defaultValue = csrfToken = btoa(String.fromCharCode.apply(null, (window.crypto || window.msCrypto).getRandomValues(new Uint8Array(18))));        csrfField.dispatchEvent(new Event('change', { bubbles: true }));    }    if (csrfCookie && tokenCheck.test(csrfToken)) {        const cookie = csrfCookie + '_' + csrfToken + '=' + csrfCookie + '; path=/; samesite=strict';        document.cookie = window.location.protocol === 'https:' ? '__Host-' + cookie + '; secure' : cookie;    }}export function generateCsrfHeaders (formElement) {    const headers = {};    const csrfField = formElement.querySelector('input[data-controller="csrf-protection"], input[name="_csrf_token"]');    if (!csrfField) {        return headers;    }    const csrfCookie = csrfField.getAttribute('data-csrf-protection-cookie-value');    if (tokenCheck.test(csrfField.value) && nameCheck.test(csrfCookie)) {        headers[csrfCookie] = csrfField.value;    }    return headers;}export function removeCsrfToken (formElement) {    const csrfField = formElement.querySelector('input[data-controller="csrf-protection"], input[name="_csrf_token"]');    if (!csrfField) {        return;    }    const csrfCookie = csrfField.getAttribute('data-csrf-protection-cookie-value');    if (tokenCheck.test(csrfField.value) && nameCheck.test(csrfCookie)) {        const cookie = csrfCookie + '_' + csrfField.value + '=0; path=/; samesite=strict; max-age=0';        document.cookie = window.location.protocol === 'https:' ? '__Host-' + cookie + '; secure' : cookie;    }}/* stimulusFetch: 'lazy' */export default 'csrf-protection-controller';
 |