| 12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152 | function getCookie(name) {  var cookieValue = null;  if (document.cookie && document.cookie != '') {    var cookies = document.cookie.split(';');    for (var i = 0; i < cookies.length; i++) {      var cookie = jQuery.trim(cookies[i]);      // Does this cookie string begin with the name we want?      if (cookie.substring(0, name.length + 1) == (name + '=')) {        cookieValue = decodeURIComponent(cookie.substring(name.length + 1));        break;      }    }  }  return cookieValue;}function csrfSafeMethod(method) {  // these HTTP methods do not require CSRF protection  return (/^(GET|HEAD|OPTIONS|TRACE)$/.test(method));}function sameOrigin(url) {  // test that a given url is a same-origin URL  // url could be relative or scheme relative or absolute  var host = document.location.host; // host + port  var protocol = document.location.protocol;  var sr_origin = '//' + host;  var origin = protocol + sr_origin;  // Allow absolute or scheme relative URLs to same origin  return (url == origin || url.slice(0, origin.length + 1) == origin + '/') ||    (url == sr_origin || url.slice(0, sr_origin.length + 1) == sr_origin + '/') ||    // or any other URL that isn't scheme relative or absolute i.e relative.    !(/^(\/\/|http:|https:).*/.test(url));}var csrftoken = window.drf.csrfToken;$.ajaxSetup({  beforeSend: function(xhr, settings) {    if (!csrfSafeMethod(settings.type) && sameOrigin(settings.url)) {      // Send the token to same-origin, relative URLs only.      // Send the token only if the method warrants CSRF protection      // Using the CSRFToken value acquired earlier      xhr.setRequestHeader(window.drf.csrfHeaderName, csrftoken);    }  }});
 |