[Answer]-No csrf token after ajax page load

0πŸ‘

βœ…

To follow up on this β€” I figured out a couple days later. The reason I was having this problem was because the logout button was present before the ajax login. When the user was authenticated the crsf token was re-generated and the logout button the page had the old token attached to it because it was generated previously. I switched it to generating the login button after the ajax call and everything worked great.

πŸ‘€Tyler McAtee

1πŸ‘

Django provides pretty detailed information on how you can perform ajax requests requiring CSRF:
https://docs.djangoproject.com/en/1.6/ref/contrib/csrf/

Using jQuery without jquery cookie addon:

// using jQuery
function getCookie(name) {
    var cookieValue = null;
    if (document.cookie && document.cookie != '') {
        var cookies = document.cookie.split(';');
        for (var i = 0; i < cookies.length; i++) {
            var cookie = jQuery.trim(cookies[i]);
            // Does this cookie string begin with the name we want?
            if (cookie.substring(0, name.length + 1) == (name + '=')) {
                cookieValue = decodeURIComponent(cookie.substring(name.length + 1));
                break;
            }
        }
    }
    return cookieValue;
}
var csrftoken = getCookie('csrftoken');

Using Jquery with jquery cookie plugin:

    var csrftoken = $.cookie('csrftoken');

And then:

function csrfSafeMethod(method) {
    // these HTTP methods do not require CSRF protection
    return (/^(GET|HEAD|OPTIONS|TRACE)$/.test(method));
}
function sameOrigin(url) {
    // test that a given url is a same-origin URL
    // url could be relative or scheme relative or absolute
    var host = document.location.host; // host + port
    var protocol = document.location.protocol;
    var sr_origin = '//' + host;
    var origin = protocol + sr_origin;
    // Allow absolute or scheme relative URLs to same origin
    return (url == origin || url.slice(0, origin.length + 1) == origin + '/') ||
        (url == sr_origin || url.slice(0, sr_origin.length + 1) == sr_origin + '/') ||
        // or any other URL that isn't scheme relative or absolute i.e relative.
        !(/^(\/\/|http:|https:).*/.test(url));
}
$.ajaxSetup({
    beforeSend: function(xhr, settings) {
        if (!csrfSafeMethod(settings.type) && sameOrigin(settings.url)) {
            // Send the token to same-origin, relative URLs only.
            // Send the token only if the method warrants CSRF protection
            // Using the CSRFToken value acquired earlier
            xhr.setRequestHeader("X-CSRFToken", csrftoken);
        }
    }
});

EDIT (to your answer)
A more general approach:
First make sure you have the middleware enabled:

    'django.middleware.csrf.CsrfViewMiddleware',

Then in your JS file:

$(document).on('click', '.some-class', function(){
    var $csrftoken = $.cookie('csrftoken');
    $.ajax({
        type: 'POST',
        url: /your/url/,
        crossDomain: false,
        beforeSend: function(xhr) {
            xhr.setRequestHeader("X-CSRFToken", $csrftoken);
        },
        success: function(ctx) {
            console.log(Success!)
        }
    });
});
πŸ‘€petkostas

Leave a comment