Last active
August 28, 2015 14:50
-
-
Save raphaelfruneaux/6ce94b3b62c6b149d4e4 to your computer and use it in GitHub Desktop.
This code runs beforeSend on $.ajaxSetup (MAGIC) check out REALPYTHON FOR MORE MAGIC
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| // This function gets cookie with a given name | |
| function getCookie(name) { | |
| var cookieValue = null; | |
| if (document.cookie && document.cookie != '') { | |
| var cookies = document.cookie.split(';'); | |
| for (var i = 0; i < cookies.length; i++) { | |
| var cookie = jQuery.trim(cookies[i]); | |
| // Does this cookie string begin with the name we want? | |
| if (cookie.substring(0, name.length + 1) == (name + '=')) { | |
| cookieValue = decodeURIComponent(cookie.substring(name.length + 1)); | |
| break; | |
| } | |
| } | |
| } | |
| return cookieValue; | |
| } | |
| var csrftoken = getCookie('csrftoken'); | |
| /* | |
| The functions below will create a header with csrftoken | |
| */ | |
| function csrfSafeMethod(method) { | |
| // these HTTP methods do not require CSRF protection | |
| return (/^(GET|HEAD|OPTIONS|TRACE)$/.test(method)); | |
| } | |
| function sameOrigin(url) { | |
| // test that a given url is a same-origin URL | |
| // url could be relative or scheme relative or absolute | |
| var host = document.location.host; // host + port | |
| var protocol = document.location.protocol; | |
| var sr_origin = '//' + host; | |
| var origin = protocol + sr_origin; | |
| // Allow absolute or scheme relative URLs to same origin | |
| return (url == origin || url.slice(0, origin.length + 1) == origin + '/') || | |
| (url == sr_origin || url.slice(0, sr_origin.length + 1) == sr_origin + '/') || | |
| // or any other URL that isn't scheme relative or absolute i.e relative. | |
| !(/^(\/\/|http:|https:).*/.test(url)); | |
| } | |
| $.ajaxSetup({ | |
| beforeSend: function(xhr, settings) { | |
| if (!csrfSafeMethod(settings.type) && sameOrigin(settings.url)) { | |
| // Send the token to same-origin, relative URLs only. | |
| // Send the token only if the method warrants CSRF protection | |
| // Using the CSRFToken value acquired earlier | |
| xhr.setRequestHeader("X-CSRFToken", csrftoken); | |
| } | |
| } | |
| }); |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment