Add webapp packages
This commit is contained in:
		
							
								
								
									
										10
									
								
								assets/app.js
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										10
									
								
								assets/app.js
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,10 @@
 | 
			
		||||
import './bootstrap.js';
 | 
			
		||||
/*
 | 
			
		||||
 * Welcome to your app's main JavaScript file!
 | 
			
		||||
 *
 | 
			
		||||
 * This file will be included onto the page via the importmap() Twig function,
 | 
			
		||||
 * which should already be in your base.html.twig.
 | 
			
		||||
 */
 | 
			
		||||
import './styles/app.css';
 | 
			
		||||
 | 
			
		||||
console.log('This log comes from assets/app.js - welcome to AssetMapper! 🎉');
 | 
			
		||||
							
								
								
									
										5
									
								
								assets/bootstrap.js
									
									
									
									
										vendored
									
									
										Normal file
									
								
							
							
						
						
									
										5
									
								
								assets/bootstrap.js
									
									
									
									
										vendored
									
									
										Normal file
									
								
							@@ -0,0 +1,5 @@
 | 
			
		||||
import { startStimulusApp } from '@symfony/stimulus-bundle';
 | 
			
		||||
 | 
			
		||||
const app = startStimulusApp();
 | 
			
		||||
// register any custom, 3rd party controllers here
 | 
			
		||||
// app.register('some_controller_name', SomeImportedController);
 | 
			
		||||
							
								
								
									
										15
									
								
								assets/controllers.json
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										15
									
								
								assets/controllers.json
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,15 @@
 | 
			
		||||
{
 | 
			
		||||
    "controllers": {
 | 
			
		||||
        "@symfony/ux-turbo": {
 | 
			
		||||
            "turbo-core": {
 | 
			
		||||
                "enabled": true,
 | 
			
		||||
                "fetch": "eager"
 | 
			
		||||
            },
 | 
			
		||||
            "mercure-turbo-stream": {
 | 
			
		||||
                "enabled": false,
 | 
			
		||||
                "fetch": "eager"
 | 
			
		||||
            }
 | 
			
		||||
        }
 | 
			
		||||
    },
 | 
			
		||||
    "entrypoints": []
 | 
			
		||||
}
 | 
			
		||||
							
								
								
									
										79
									
								
								assets/controllers/csrf_protection_controller.js
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										79
									
								
								assets/controllers/csrf_protection_controller.js
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,79 @@
 | 
			
		||||
const nameCheck = /^[-_a-zA-Z0-9]{4,22}$/;
 | 
			
		||||
const tokenCheck = /^[-_/+a-zA-Z0-9]{24,}$/;
 | 
			
		||||
 | 
			
		||||
// Generate and double-submit a CSRF token in a form field and a cookie, as defined by Symfony's SameOriginCsrfTokenManager
 | 
			
		||||
document.addEventListener('submit', function (event) {
 | 
			
		||||
    generateCsrfToken(event.target);
 | 
			
		||||
}, true);
 | 
			
		||||
 | 
			
		||||
// When @hotwired/turbo handles form submissions, send the CSRF token in a header in addition to a cookie
 | 
			
		||||
// The `framework.csrf_protection.check_header` config option needs to be enabled for the header to be checked
 | 
			
		||||
document.addEventListener('turbo:submit-start', function (event) {
 | 
			
		||||
    const h = generateCsrfHeaders(event.detail.formSubmission.formElement);
 | 
			
		||||
    Object.keys(h).map(function (k) {
 | 
			
		||||
        event.detail.formSubmission.fetchRequest.headers[k] = h[k];
 | 
			
		||||
    });
 | 
			
		||||
});
 | 
			
		||||
 | 
			
		||||
// When @hotwired/turbo handles form submissions, remove the CSRF cookie once a form has been submitted
 | 
			
		||||
document.addEventListener('turbo:submit-end', function (event) {
 | 
			
		||||
    removeCsrfToken(event.detail.formSubmission.formElement);
 | 
			
		||||
});
 | 
			
		||||
 | 
			
		||||
export function generateCsrfToken (formElement) {
 | 
			
		||||
    const csrfField = formElement.querySelector('input[data-controller="csrf-protection"], input[name="_csrf_token"]');
 | 
			
		||||
 | 
			
		||||
    if (!csrfField) {
 | 
			
		||||
        return;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    let csrfCookie = csrfField.getAttribute('data-csrf-protection-cookie-value');
 | 
			
		||||
    let csrfToken = csrfField.value;
 | 
			
		||||
 | 
			
		||||
    if (!csrfCookie && nameCheck.test(csrfToken)) {
 | 
			
		||||
        csrfField.setAttribute('data-csrf-protection-cookie-value', csrfCookie = csrfToken);
 | 
			
		||||
        csrfField.defaultValue = csrfToken = btoa(String.fromCharCode.apply(null, (window.crypto || window.msCrypto).getRandomValues(new Uint8Array(18))));
 | 
			
		||||
    }
 | 
			
		||||
    csrfField.dispatchEvent(new Event('change', { bubbles: true }));
 | 
			
		||||
 | 
			
		||||
    if (csrfCookie && tokenCheck.test(csrfToken)) {
 | 
			
		||||
        const cookie = csrfCookie + '_' + csrfToken + '=' + csrfCookie + '; path=/; samesite=strict';
 | 
			
		||||
        document.cookie = window.location.protocol === 'https:' ? '__Host-' + cookie + '; secure' : cookie;
 | 
			
		||||
    }
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
export function generateCsrfHeaders (formElement) {
 | 
			
		||||
    const headers = {};
 | 
			
		||||
    const csrfField = formElement.querySelector('input[data-controller="csrf-protection"], input[name="_csrf_token"]');
 | 
			
		||||
 | 
			
		||||
    if (!csrfField) {
 | 
			
		||||
        return headers;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    const csrfCookie = csrfField.getAttribute('data-csrf-protection-cookie-value');
 | 
			
		||||
 | 
			
		||||
    if (tokenCheck.test(csrfField.value) && nameCheck.test(csrfCookie)) {
 | 
			
		||||
        headers[csrfCookie] = csrfField.value;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    return headers;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
export function removeCsrfToken (formElement) {
 | 
			
		||||
    const csrfField = formElement.querySelector('input[data-controller="csrf-protection"], input[name="_csrf_token"]');
 | 
			
		||||
 | 
			
		||||
    if (!csrfField) {
 | 
			
		||||
        return;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    const csrfCookie = csrfField.getAttribute('data-csrf-protection-cookie-value');
 | 
			
		||||
 | 
			
		||||
    if (tokenCheck.test(csrfField.value) && nameCheck.test(csrfCookie)) {
 | 
			
		||||
        const cookie = csrfCookie + '_' + csrfField.value + '=0; path=/; samesite=strict; max-age=0';
 | 
			
		||||
 | 
			
		||||
        document.cookie = window.location.protocol === 'https:' ? '__Host-' + cookie + '; secure' : cookie;
 | 
			
		||||
    }
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
/* stimulusFetch: 'lazy' */
 | 
			
		||||
export default 'csrf-protection-controller';
 | 
			
		||||
							
								
								
									
										16
									
								
								assets/controllers/hello_controller.js
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										16
									
								
								assets/controllers/hello_controller.js
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,16 @@
 | 
			
		||||
import { Controller } from '@hotwired/stimulus';
 | 
			
		||||
 | 
			
		||||
/*
 | 
			
		||||
 * This is an example Stimulus controller!
 | 
			
		||||
 *
 | 
			
		||||
 * Any element with a data-controller="hello" attribute will cause
 | 
			
		||||
 * this controller to be executed. The name "hello" comes from the filename:
 | 
			
		||||
 * hello_controller.js -> "hello"
 | 
			
		||||
 *
 | 
			
		||||
 * Delete this file or adapt it for your use!
 | 
			
		||||
 */
 | 
			
		||||
export default class extends Controller {
 | 
			
		||||
    connect() {
 | 
			
		||||
        this.element.textContent = 'Hello Stimulus! Edit me in assets/controllers/hello_controller.js';
 | 
			
		||||
    }
 | 
			
		||||
}
 | 
			
		||||
							
								
								
									
										3
									
								
								assets/styles/app.css
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										3
									
								
								assets/styles/app.css
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,3 @@
 | 
			
		||||
body {
 | 
			
		||||
    background-color: skyblue;
 | 
			
		||||
}
 | 
			
		||||
		Reference in New Issue
	
	Block a user