Django到了1.2.5版本以上,Ajax POST请求的使用发生了一些改变,我们还记得前些版本1.2,Django加入了CSRF机制,大大增强了网络请求的安全性,正是因为这点,现在的Django对页面任何POST请求的数据进行跨域攻击保护。当你升级到1.2.5或更高版本后,你会发现以前1.2.4版本的Ajax POST脚本方法都不能用或者出错了,Django官网上提供了一个解决办法,加个JQuery ajaxSend事件,让你以前的Ajax Post脚本能重新正常使用起来。请看代码:


$(document).ajaxSend(function(event, xhr, settings) {

   function getCookie(name) {

       var cookieValue = null;

       if (document.cookie && document.cookie != '') {

           var cookies = document.cookie.split(';');

           for (var i = 0; i < cookies.length; i++) {

               var cookie = jQuery.trim(cookies[i]);

               // Does this cookie string begin with the name we want?

               if (cookie.substring(0, name.length + 1) == (name + '=')) {

                   cookieValue = decodeURIComponent(cookie.substring(name.length + 1));

                   break;

               }

           }

       }

       return cookieValue;

   }

   function sameOrigin(url) {

       // url could be relative or scheme relative or absolute

       var host = document.location.host; // host + port

       var protocol = document.location.protocol;

       var sr_origin = '//' + host;

       var origin = protocol + sr_origin;

       // Allow absolute or scheme relative URLs to same origin

       return (url == origin || url.slice(0, origin.length + 1) == origin + '/') ||

           (url == sr_origin || url.slice(0, sr_origin.length + 1) == sr_origin + '/') ||

           // or any other URL that isn't scheme relative or absolute i.e relative.

           !(/^(\/\/|http:|https:).*/.test(url));

   }

   function safeMethod(method) {

       return (/^(GET|HEAD|OPTIONS|TRACE)$/.test(method));

   }


   if (!safeMethod(settings.type) && sameOrigin(settings.url)) {

       xhr.setRequestHeader("X-CSRFToken", getCookie('csrftoken'));

   }

});