| 12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152 | 
							- function getCookie(name) {
 
-   var cookieValue = null;
 
-   if (document.cookie && document.cookie != '') {
 
-     var cookies = document.cookie.split(';');
 
-     for (var i = 0; i < cookies.length; i++) {
 
-       var cookie = jQuery.trim(cookies[i]);
 
-       // Does this cookie string begin with the name we want?
 
-       if (cookie.substring(0, name.length + 1) == (name + '=')) {
 
-         cookieValue = decodeURIComponent(cookie.substring(name.length + 1));
 
-         break;
 
-       }
 
-     }
 
-   }
 
-   return cookieValue;
 
- }
 
- function csrfSafeMethod(method) {
 
-   // these HTTP methods do not require CSRF protection
 
-   return (/^(GET|HEAD|OPTIONS|TRACE)$/.test(method));
 
- }
 
- function sameOrigin(url) {
 
-   // test that a given url is a same-origin URL
 
-   // url could be relative or scheme relative or absolute
 
-   var host = document.location.host; // host + port
 
-   var protocol = document.location.protocol;
 
-   var sr_origin = '//' + host;
 
-   var origin = protocol + sr_origin;
 
-   // Allow absolute or scheme relative URLs to same origin
 
-   return (url == origin || url.slice(0, origin.length + 1) == origin + '/') ||
 
-     (url == sr_origin || url.slice(0, sr_origin.length + 1) == sr_origin + '/') ||
 
-     // or any other URL that isn't scheme relative or absolute i.e relative.
 
-     !(/^(\/\/|http:|https:).*/.test(url));
 
- }
 
- var csrftoken = window.drf.csrfToken;
 
- $.ajaxSetup({
 
-   beforeSend: function(xhr, settings) {
 
-     if (!csrfSafeMethod(settings.type) && sameOrigin(settings.url)) {
 
-       // Send the token to same-origin, relative URLs only.
 
-       // Send the token only if the method warrants CSRF protection
 
-       // Using the CSRFToken value acquired earlier
 
-       xhr.setRequestHeader(window.drf.csrfHeaderName, csrftoken);
 
-     }
 
-   }
 
- });
 
 
  |