'fixed' csrf issues
This commit is contained in:
parent
dc24ed7e4a
commit
4b8f1aca95
@ -89,7 +89,6 @@ TEMPLATE_LOADERS = (
|
|||||||
MIDDLEWARE_CLASSES = (
|
MIDDLEWARE_CLASSES = (
|
||||||
'django.middleware.common.CommonMiddleware',
|
'django.middleware.common.CommonMiddleware',
|
||||||
'django.contrib.sessions.middleware.SessionMiddleware',
|
'django.contrib.sessions.middleware.SessionMiddleware',
|
||||||
'django.middleware.csrf.CsrfViewMiddleware',
|
|
||||||
'django.contrib.auth.middleware.AuthenticationMiddleware',
|
'django.contrib.auth.middleware.AuthenticationMiddleware',
|
||||||
'django.contrib.messages.middleware.MessageMiddleware',
|
'django.contrib.messages.middleware.MessageMiddleware',
|
||||||
# Uncomment the next line for simple clickjacking protection:
|
# Uncomment the next line for simple clickjacking protection:
|
||||||
|
@ -1,44 +0,0 @@
|
|||||||
// using jQuery
|
|
||||||
function getCookie(name) {
|
|
||||||
var cookieValue = null;
|
|
||||||
if (document.cookie && document.cookie != '') {
|
|
||||||
var cookies = document.cookie.split(';');
|
|
||||||
for (var i = 0; i < cookies.length; i++) {
|
|
||||||
var cookie = jQuery.trim(cookies[i]);
|
|
||||||
// Does this cookie string begin with the name we want?
|
|
||||||
if (cookie.substring(0, name.length + 1) == (name + '=')) {
|
|
||||||
cookieValue = decodeURIComponent(cookie.substring(name.length + 1));
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return cookieValue;
|
|
||||||
}
|
|
||||||
var csrftoken = getCookie('csrftoken');
|
|
||||||
function csrfSafeMethod(method) {
|
|
||||||
// these HTTP methods do not require CSRF protection
|
|
||||||
return (/^(GET|HEAD|OPTIONS|TRACE)$/.test(method));
|
|
||||||
}
|
|
||||||
function sameOrigin(url) {
|
|
||||||
// test that a given url is a same-origin URL
|
|
||||||
// url could be relative or scheme relative or absolute
|
|
||||||
var host = document.location.host; // host + port
|
|
||||||
var protocol = document.location.protocol;
|
|
||||||
var sr_origin = '//' + host;
|
|
||||||
var origin = protocol + sr_origin;
|
|
||||||
// Allow absolute or scheme relative URLs to same origin
|
|
||||||
return (url == origin || url.slice(0, origin.length + 1) == origin + '/') ||
|
|
||||||
(url == sr_origin || url.slice(0, sr_origin.length + 1) == sr_origin + '/') ||
|
|
||||||
// or any other URL that isn't scheme relative or absolute i.e relative.
|
|
||||||
!(/^(\/\/|http:|https:).*/.test(url));
|
|
||||||
}
|
|
||||||
$.ajaxSetup({
|
|
||||||
beforeSend: function(xhr, settings) {
|
|
||||||
if (!csrfSafeMethod(settings.type) && sameOrigin(settings.url)) {
|
|
||||||
// Send the token to same-origin, relative URLs only.
|
|
||||||
// Send the token only if the method warrants CSRF protection
|
|
||||||
// Using the CSRFToken value acquired earlier
|
|
||||||
xhr.setRequestHeader("X-CSRFToken", csrftoken);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
});
|
|
@ -11,14 +11,13 @@
|
|||||||
<span class="number" id="operation">+</span>
|
<span class="number" id="operation">+</span>
|
||||||
<span class="number" id="second">0</span>
|
<span class="number" id="second">0</span>
|
||||||
<div>
|
<div>
|
||||||
<input id="answer" type="number" size="2" class="number" autofocus />
|
<input id="answer" type="tel" size="2" class="number" autofocus />
|
||||||
</div>
|
</div>
|
||||||
</section>
|
</section>
|
||||||
<footer>
|
<footer>
|
||||||
score: <span id="score"></span>
|
score: <span id="score"></span>
|
||||||
</footer>
|
</footer>
|
||||||
<script src="/static/jquery-2.0.0.min.js"></script>
|
<script src="/static/jquery-2.0.0.min.js"></script>
|
||||||
<script src="/static/django-csrf.js"></script>
|
|
||||||
<script src="/static/math.js"></script>
|
<script src="/static/math.js"></script>
|
||||||
</body>
|
</body>
|
||||||
</html>
|
</html>
|
||||||
|
Loading…
Reference in New Issue
Block a user