Federated forge server

[[ 🗃 ^rjQ3E vervis ]] :: [📥 Inbox] [📤 Outbox] [🐤 Followers] [🤝 Collaborators] [🛠 Commits]

Clone

HTTPS: git clone https://vervis.peers.community/repos/rjQ3E

SSH: git clone USERNAME@vervis.peers.community:rjQ3E

Branches

Tags

main :: templates /

default-layout-wrapper.hamlet

$newline never
<!doctype html>
<html class="no-js" lang="en">
  <head>
    <meta charset="UTF-8">

    <title>#{pageTitle pc}
    <meta name="description" content="">
    <meta name="author" content="">

    <meta name="viewport" content="width=device-width,initial-scale=1">

    <link rel="icon" type="image/svg+xml" href="/favicon.svg">
    <link rel="icon" type="image/png"     href="/favicon.png">

    ^{pageHead pc}

$#  <script type="text/javascript" src="https://cdnjs.cloudflare.com/ajax/libs/jquery/2.1.4/jquery.js">
$#  <script type="text/javascript" src="https://cdnjs.cloudflare.com/ajax/libs/js-cookie/2.0.3/js.cookie.min.js">
$#
$#  <script>
$#    /* The `defaultCsrfMiddleware` Middleware added in Foundation.hs adds a CSRF token the request cookies. */
$#    /* AJAX requests should add that token to a header to be validated by the server. */
$#    /* See the CSRF documentation in the Yesod.Core.Handler module of the yesod-core package for details. */
$#    var csrfHeaderName = "#{TE.decodeUtf8 $ CI.foldedCase defaultCsrfHeaderName}";
$#
$#    var csrfCookieName = "#{TE.decodeUtf8 defaultCsrfCookieName}";
$#    var csrfToken = Cookies.get(csrfCookieName);
$#
$#
$#    if (csrfToken) {
$#    \  $.ajaxPrefilter(function( options, originalOptions, jqXHR ) {
$#    \      if (!options.crossDomain) {
$#    \          jqXHR.setRequestHeader(csrfHeaderName, csrfToken);
$#    \      }
$#    \  });
$#    }
$#
$#  <script>
$#    document.documentElement.className = document.documentElement.className.replace(/\bno-js\b/,'js');
  <body>
    ^{pageBody pc}

[See repo JSON]