ajax https 403,javascript - django ajax post 403 forbidden - Stack Overflow

using django 1.4 im getting a 403 error when i try to do a post from my javascript do my django server. my get works fine though the problem is only with the post. also tried @csrf_exempt with no luck

UPDATE: I can Post now that i added {% csrf_token %} , but the post response comes empty, although the GET comes correctly, any ideas?

my django view:

@csrf_protect

def edit_city(request,username):

conditions = dict()

#if request.is_ajax():

if request.method == 'GET':

conditions = request.method

elif request.method == 'POST':

print "TIPO" , request.GET.get('type','')

#based on http://stackoverflow.com/a/3634778/977622

for filter_key, form_key in (('type', 'type'), ('city', 'city'), ('pois', 'pois'), ('poisdelete', 'poisdelete'), ('kmz', 'kmz'), ('kmzdelete', 'kmzdelete'), ('limits', 'limits'), ('limitsdelete', 'limitsdelete'), ('area_name', 'area_name'), ('action', 'action')):

value = request.GET.get(form_key, None)

if value:

conditions[filter_key] = value

print filter_key , conditions[filter_key]

#Test.objects.filter(**conditions)

city_json = json.dumps(conditions)

return HttpResponse(city_json, mimetype='application/json')

here is my javascript code :

function getCookie(name) {

var cookieValue = null;

if (document.cookie && document.cookie != '') {

var cookies = document.cookie.split(';');

for (var i = 0; i < cookies.length; i++) {

var cookie = jQuery.trim(cookies[i]);

// Does this cookie string begin with the name we want?

if (cookie.substring(0, name.length + 1) == (name + '=')) {

cookieValue = decodeURIComponent(cookie.substring(name.length + 1));

break;

}

}

}

return cookieValue;

}

var csrftoken = getCookie('csrftoken');

function csrfSafeMethod(method) {

// these HTTP methods do not require CSRF protection

return (/^(GET|HEAD|OPTIONS|TRACE)$/.test(method));

}

function sameOrigin(url) {

// test that a given url is a same-origin URL

// url could be relative or scheme relative or absolute

var host = document.location.host; // host + port

var protocol = document.location.protocol;

var sr_origin = '//' + host;

var origin = protocol + sr_origin;

// Allow absolute or scheme relative URLs to same origin

return (url == origin || url.slice(0, origin.length + 1) == origin + '/') ||

(url == sr_origin || url.slice(0, sr_origin.length + 1) == sr_origin + '/') ||

// or any other URL that isn't scheme relative or absolute i.e relative.

!(/^(\/\/|http:|https:).*/.test(url));

}

$.ajaxSetup({

beforeSend: function(xhr, settings) {

if (!(/^http:.*/.test(settings.url) || /^https:.*/.test(settings.url))) {

// Only send the token to relative URLs i.e. locally.

xhr.setRequestHeader("X-CSRFToken",

$('input[name="csrfmiddlewaretoken"]').val());

}

}

});

$.post(url,{ type : type , city: cityStr, pois: poisStr, poisdelete: poisDeleteStr, kmz: kmzStr,kmzdelete : kmzDeleteStr,limits : limitsStr, area_nameStr : area_nameStr , limitsdelete : limitsDeleteStr},function(data,status){

alert("Data: " + data + "\nStatus: " + status);

console.log("newdata" + data.area_name)

});

i have also tried from the site with no luck :

$.ajaxSetup({

beforeSend: function(xhr, settings) {

if (!csrfSafeMethod(settings.type) && sameOrigin(settings.url)) {

// Send the token to same-origin, relative URLs only.

// Send the token only if the method warrants CSRF protection

// Using the CSRFToken value acquired earlier

xhr.setRequestHeader("X-CSRFToken", csrftoken);

}

}

});

what am i missing?

当在使用 Ajax 发送 POST 请求时遇到 "403 Forbidden-null" 错误,通常是由于 CSRF(Cross-Site Request Forgery)保护机制引起的。 Django 默认开启了 CSRF 保护,要在发送非 GET 请求时包含正确的 CSRF Token。你可以通过以下几种方法来解决这个问题: 1. 在 Ajax 请求的头部中包含 CSRF Token: ```javascript var csrftoken = document.querySelector('[name=csrfmiddlewaretoken]').value; $.ajax({ url: 'your-url', type: 'POST', headers: { 'X-CSRFToken': csrftoken }, data: JSON.stringify(yourData), contentType: 'application/json', dataType: 'json', success: function(response) { // 处理成功响应 }, error: function(xhr, errmsg, err) { // 处理错误响应 } }); ``` 2. 使用 Django 提供的 `csrf_exempt` 装饰器来跳过 CSRF 保护,但这不是推荐的做法,因为会降低安全性: ```python from django.views.decorators.csrf import csrf_exempt @csrf_exempt def your_view(request): # 处理请求 ``` 3. 如果你使用的是 Django Rest Framework(DRF),可以在全局配置中禁用 CSRF 保护: ```python # settings.py REST_FRAMEWORK = { 'DEFAULT_AUTHENTICATION_CLASSES': ( # 其他身份验证类... ), 'DEFAULT_PERMISSION_CLASSES': ( # 其他权限类... ), 'DEFAULT_RENDERER_CLASSES': ( 'rest_framework.renderers.JSONRenderer', ), 'DEFAULT_PARSER_CLASSES': ( 'rest_framework.parsers.JSONParser', ), 'DEFAULT_AUTHENTICATION_CLASSES': ( # 其他身份验证类... ), 'DEFAULT_PERMISSION_CLASSES': ( # 其他权限类... ), 'DEFAULT_RENDERER_CLASSES': ( 'rest_framework.renderers.JSONRenderer', ), 'DEFAULT_PARSER_CLASSES': ( 'rest_framework.parsers.JSONParser', ), 'DEFAULT_AUTHENTICATION_CLASSES': ( # 其他身份验证类... ), 'DEFAULT_PERMISSION_CLASSES': ( # 其他权限类... ), 'DEFAULT_RENDERER_CLASSES': ( 'rest_framework.renderers.JSONRenderer', ), 'DEFAULT_PARSER_CLASSES': ( 'rest_framework.parsers.JSONParser', ), 'DEFAULT_AUTHENTICATION_CLASSES': ( # 其他身份验证类... ), 'DEFAULT_PERMISSION_CLASSES': ( # 其他权限类... ), 'DEFAULT_RENDERER_CLASSES': ( 'rest_framework.renderers.JSONRenderer', ), 'DEFAULT_PARSER_CLASSES': ( 'rest_framework.parsers.JSONParser', ), # 禁用 CSRF 保护 'DEFAULT_AUTHENTICATION_CLASSES': ( # 其他身份验证类... ), 'DEFAULT_PERMISSION_CLASSES': ( # 其他权限类... ), } ``` 希望这些解决方法可以帮助到你!如果问题仍然存在,请提供更多的代码和错误信息,以便我能够更好地帮助你。
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值