This is my code:
$(document).on('change', '#tblhotel-int_zone_id', function(e){
var zoneId = $(this).val();
var form_data = {
zone: zoneId
};
$.ajax({
url: "state",
type: "POST",
data: form_data,
success: function(response)
{
alert(response);
}
});
});
This shows:
Bad Request (#400): Unable to verify your data submission.
And I already have <?= Html::csrfMetaTags() ?>
. How can I fix this problem?
Note: See the answer from Skullcrasher to fix the issue in the correct way as my answer suggests disabling the Cross-Site Request Forgery.
You have a problem with enableCsrfValidation. To read more about it you can read here.
To disable CSRF, add this code to your controller:
This will disable for all actions. You should probably, depending on the $action, disable it only for specific actions.
Add this code at the bottom of your layout:
Although it is an old post with alot of answers but there is something missing from all the answers posted, all of them addressed the correct point but when calling the ajax
POST
request along with your data you should use theyii.js
functions providedyii.getCsrfParam()
to get the parameter name of the tokenyii.getCsrfToken()
to get the token or actual value of the csrf-tokenAs if you have different param name for front-end defined inside the
config.php
orweb.php
under therequest
components configurationsthen you need to get that name dynamically and the above function help you out.
You should
Use:
More detail: Yii2: Using csrf token
/backend/config/main-local.php
/frontend/config/main-local.php
As the answer from Mihai P. states, your problem is CSRF validation. It is also true that you could disable the validation for your actions, but this is not considered a good solution.
As you have a problem in your Ajax request with the validation, you could also use a Yii JavaScript function to add the CSRF token to your formdata that you send in the Ajax request.
Just try to add the token to your form data as follows:
I hope this helps and you therefore don't have to disable CSRF validation.
In addition to manually add the CSRF token you can check if there is an X-CSRF header set in the request.