0π
To follow up on this β I figured out a couple days later. The reason I was having this problem was because the logout button was present before the ajax login. When the user was authenticated the crsf token was re-generated and the logout button the page had the old token attached to it because it was generated previously. I switched it to generating the login button after the ajax call and everything worked great.
1π
Django provides pretty detailed information on how you can perform ajax requests requiring CSRF:
https://docs.djangoproject.com/en/1.6/ref/contrib/csrf/
Using jQuery without jquery cookie addon:
// using jQuery
function getCookie(name) {
var cookieValue = null;
if (document.cookie && document.cookie != '') {
var cookies = document.cookie.split(';');
for (var i = 0; i < cookies.length; i++) {
var cookie = jQuery.trim(cookies[i]);
// Does this cookie string begin with the name we want?
if (cookie.substring(0, name.length + 1) == (name + '=')) {
cookieValue = decodeURIComponent(cookie.substring(name.length + 1));
break;
}
}
}
return cookieValue;
}
var csrftoken = getCookie('csrftoken');
Using Jquery with jquery cookie plugin:
var csrftoken = $.cookie('csrftoken');
And then:
function csrfSafeMethod(method) {
// these HTTP methods do not require CSRF protection
return (/^(GET|HEAD|OPTIONS|TRACE)$/.test(method));
}
function sameOrigin(url) {
// test that a given url is a same-origin URL
// url could be relative or scheme relative or absolute
var host = document.location.host; // host + port
var protocol = document.location.protocol;
var sr_origin = '//' + host;
var origin = protocol + sr_origin;
// Allow absolute or scheme relative URLs to same origin
return (url == origin || url.slice(0, origin.length + 1) == origin + '/') ||
(url == sr_origin || url.slice(0, sr_origin.length + 1) == sr_origin + '/') ||
// or any other URL that isn't scheme relative or absolute i.e relative.
!(/^(\/\/|http:|https:).*/.test(url));
}
$.ajaxSetup({
beforeSend: function(xhr, settings) {
if (!csrfSafeMethod(settings.type) && sameOrigin(settings.url)) {
// Send the token to same-origin, relative URLs only.
// Send the token only if the method warrants CSRF protection
// Using the CSRFToken value acquired earlier
xhr.setRequestHeader("X-CSRFToken", csrftoken);
}
}
});
EDIT (to your answer)
A more general approach:
First make sure you have the middleware enabled:
'django.middleware.csrf.CsrfViewMiddleware',
Then in your JS file:
$(document).on('click', '.some-class', function(){
var $csrftoken = $.cookie('csrftoken');
$.ajax({
type: 'POST',
url: /your/url/,
crossDomain: false,
beforeSend: function(xhr) {
xhr.setRequestHeader("X-CSRFToken", $csrftoken);
},
success: function(ctx) {
console.log(Success!)
}
});
});