This page is not created by, affiliated with, or supported by Slack Technologies, Inc.
2018-01-03
Channels
- # aleph (1)
- # beginners (99)
- # boot (16)
- # cider (35)
- # cljs-dev (46)
- # cljsrn (7)
- # clojure (152)
- # clojure-austin (7)
- # clojure-dusseldorf (8)
- # clojure-italy (1)
- # clojure-uk (7)
- # clojurescript (3)
- # core-async (12)
- # css (8)
- # cursive (18)
- # datascript (2)
- # datomic (19)
- # defnpodcast (6)
- # duct (3)
- # editors (8)
- # emacs (8)
- # figwheel (1)
- # fulcro (20)
- # hoplon (18)
- # jobs-discuss (5)
- # lein-figwheel (1)
- # luminus (3)
- # lumo (19)
- # off-topic (15)
- # onyx (9)
- # parinfer (2)
- # planck (6)
- # portland-or (7)
- # re-frame (4)
- # reagent (7)
- # remote-jobs (1)
- # ring (6)
- # ring-swagger (4)
- # spacemacs (10)
- # specter (3)
- # unrepl (131)
@bfast so you would be doing something like this:
(deftest my-test
(re-frame-test/run-test-sync
;; mock it out
(re-frame/reg-fx
:http-xhrio
(fn [val] )) ;; maybe reset an atom in here, capturing val. Then later check it is correct
(re-frame/dispatch [:something])
... ))
Has anyone had any insights on adding CSRF tokens to a re-frame application. Like what are the best practices, what to avoid, good blog posts about this.
I recently implemented CSRF simply by following Memory Hole by @U050CBXUZ https://github.com/yogthos/memory-hole/blob/c6bc381dd4725975f34dc0ece9cf3486eb97c341/resources/templates/home.html#L23