@@ -3,7 +3,7 @@ var tokenCheck = /^[-_/+a-zA-Z0-9]{24,}$/;
3
3
4
4
// Generate and double-submit a CSRF token in a form field and a cookie, as defined by Symfony's SameOriginCsrfTokenManager
5
5
document . addEventListener ( 'submit' , function ( event ) {
6
- var csrfField = event . target . querySelector ( 'input[data-controller="csrf-protection"]' ) ;
6
+ var csrfField = event . target . querySelector ( 'input[data-controller="csrf-protection"], input[name="_csrf_token"] ' ) ;
7
7
8
8
if ( ! csrfField ) {
9
9
return ;
@@ -26,7 +26,7 @@ document.addEventListener('submit', function (event) {
26
26
// When @hotwired /turbo handles form submissions, send the CSRF token in a header in addition to a cookie
27
27
// The `framework.csrf_protection.check_header` config option needs to be enabled for the header to be checked
28
28
document . addEventListener ( 'turbo:submit-start' , function ( event ) {
29
- var csrfField = event . detail . formSubmission . formElement . querySelector ( 'input[data-controller="csrf-protection"]' ) ;
29
+ var csrfField = event . detail . formSubmission . formElement . querySelector ( 'input[data-controller="csrf-protection"], input[name="_csrf_token"] ' ) ;
30
30
31
31
if ( ! csrfField ) {
32
32
return ;
@@ -41,7 +41,7 @@ document.addEventListener('turbo:submit-start', function (event) {
41
41
42
42
// When @hotwired /turbo handles form submissions, remove the CSRF cookie once a form has been submitted
43
43
document . addEventListener ( 'turbo:submit-end' , function ( event ) {
44
- var csrfField = event . detail . formSubmission . formElement . querySelector ( 'input[data-controller="csrf-protection"]' ) ;
44
+ var csrfField = event . detail . formSubmission . formElement . querySelector ( 'input[data-controller="csrf-protection"], input[name="_csrf_token"] ' ) ;
45
45
46
46
if ( ! csrfField ) {
47
47
return ;
0 commit comments