53 lines
1.7 KiB
JavaScript
53 lines
1.7 KiB
JavaScript
|
function getCookie(name) {
|
||
|
var cookieValue = null;
|
||
|
|
||
|
if (document.cookie && document.cookie != '') {
|
||
|
var cookies = document.cookie.split(';');
|
||
|
|
||
|
for (var i = 0; i < cookies.length; i++) {
|
||
|
var cookie = jQuery.trim(cookies[i]);
|
||
|
|
||
|
// Does this cookie string begin with the name we want?
|
||
|
if (cookie.substring(0, name.length + 1) == (name + '=')) {
|
||
|
cookieValue = decodeURIComponent(cookie.substring(name.length + 1));
|
||
|
break;
|
||
|
}
|
||
|
}
|
||
|
}
|
||
|
|
||
|
return cookieValue;
|
||
|
}
|
||
|
|
||
|
function csrfSafeMethod(method) {
|
||
|
// these HTTP methods do not require CSRF protection
|
||
|
return (/^(GET|HEAD|OPTIONS|TRACE)$/.test(method));
|
||
|
}
|
||
|
|
||
|
function sameOrigin(url) {
|
||
|
// test that a given url is a same-origin URL
|
||
|
// url could be relative or scheme relative or absolute
|
||
|
var host = document.location.host; // host + port
|
||
|
var protocol = document.location.protocol;
|
||
|
var sr_origin = '//' + host;
|
||
|
var origin = protocol + sr_origin;
|
||
|
|
||
|
// Allow absolute or scheme relative URLs to same origin
|
||
|
return (url == origin || url.slice(0, origin.length + 1) == origin + '/') ||
|
||
|
(url == sr_origin || url.slice(0, sr_origin.length + 1) == sr_origin + '/') ||
|
||
|
// or any other URL that isn't scheme relative or absolute i.e relative.
|
||
|
!(/^(\/\/|http:|https:).*/.test(url));
|
||
|
}
|
||
|
|
||
|
var csrftoken = getCookie(window.drf.csrfCookieName);
|
||
|
|
||
|
$.ajaxSetup({
|
||
|
beforeSend: function(xhr, settings) {
|
||
|
if (!csrfSafeMethod(settings.type) && sameOrigin(settings.url)) {
|
||
|
// Send the token to same-origin, relative URLs only.
|
||
|
// Send the token only if the method warrants CSRF protection
|
||
|
// Using the CSRFToken value acquired earlier
|
||
|
xhr.setRequestHeader(window.drf.csrfHeaderName, csrftoken);
|
||
|
}
|
||
|
}
|
||
|
});
|