Files
BreakEscape/planning_notes
Z. Cliffe Schreuders 266bc7a7ca docs: Clarify CSRF token handling for Hacktivity integration
User correctly noted that Hacktivity's application layout already includes
csrf_meta_tags, so we don't need to add them again.

## Changes:

### Section 9.3.1: Layout Strategy
- Split into Option A (Hacktivity layout - recommended) and Option B (standalone)
- **Option A (Recommended):** Read from existing meta tag
  - Uses Hacktivity's csrf_meta_tags (already present in layout)
  - No duplicate meta tags needed
  - Reads via: document.querySelector('meta[name="csrf-token"]')?.content
- **Option B:** Standalone layout
  - For when engine needs separate layout
  - Must add <%= csrf_meta_tags %> to engine layout
  - Can use <%= form_authenticity_token %> directly

### Section 9.3.3: Token Reading Logic
- Updated config.js to try multiple sources:
  1. window.breakEscapeConfig.csrfToken (if explicitly set)
  2. meta[name="csrf-token"] tag (from Hacktivity layout)
- Better error messages showing all sources checked
- Logs which source provided the token

### Section 9.3.5: Issue #2 Solution
- Updated to reference the fallback logic in 9.3.3
- Added debugging console commands
- Shows how to check all meta tags

## Key Points:

-  Hacktivity layout csrf_meta_tags are reused (don't duplicate)
-  Fallback chain ensures token found from either source
-  Clear guidance for both integration scenarios
-  Better debugging when token is missing

This aligns with Rails best practices and Hacktivity's existing setup.
2025-11-20 15:37:38 +00:00
..
2025-11-14 19:47:54 +00:00