diff --git a/SAS/TMSS/frontend/tmss_webapp/src/authenticate/auth.js b/SAS/TMSS/frontend/tmss_webapp/src/authenticate/auth.js index 1248708029c029ca3e97255c9fe83434c6bfc690..69e8224ac3df55fb12089dd4c2d124d405eb9549 100644 --- a/SAS/TMSS/frontend/tmss_webapp/src/authenticate/auth.js +++ b/SAS/TMSS/frontend/tmss_webapp/src/authenticate/auth.js @@ -18,7 +18,7 @@ const Auth = { user = JSON.parse(user); return Auth.getUserPermission(user); } else { - //Keycloak authendication + //Keycloak authentication const res = await AuthService.getKeycloakAuthState(); if (res && res.is_authenticated) { localStorage.setItem("loginType", 'Keycloak'); @@ -28,7 +28,7 @@ const Auth = { return prev; }, {}); const userDetails = {'name':res.username, 'token': cookies.csrftoken}; - axios.defaults.headers.common['Authorization'] = `Token ${cookies.csrftoken}`; + // axios.defaults.headers.common['Authorization'] = `Token ${cookies.csrftoken}`; localStorage.setItem("user", JSON.stringify(userDetails)); return Auth.getUserPermission(userDetails); } @@ -39,6 +39,7 @@ const Auth = { getUserPermission: async (user) => { if (user.token) { axios.defaults.headers.common['Authorization'] = `Token ${user.token}`; + axios.defaults.headers.common['X-CSRFTOKEN'] = `${user.token}`; const permissions = await AuthStore.getState(); if(!permissions.userRolePermission.project) { await PermissionStackUtil.getPermissions(true);