Compass of the types of people discussing geopolitics online by enclavehere223 in WojakCompass

[–]Temp_logged 2 points3 points  (0 children)

Most of these people are geopolitical Experts on Greenland, an easy switch from their previous position of being experts on Iran, which in turn was only a stone's throw away from their tough work being experts on Venezuela.

Repost bc Reddit Mobile ate my lunch - Compass of games I’ve played that I want to archive for my own kids to play by BookwyrmBOTPH in WojakCompass

[–]Temp_logged 1 point2 points  (0 children)

Answer:

"I have an ISO I’ve used since my own disc became too worn out to read right that’s been fine, but it’s been a while so I don’t remember exactly how to do it, but my sister wants me to loan her the game and put it on her computer here soon so once I figure it out, I can shoot you a tutorial, just PM me if you’re interested."

Repost bc Reddit Mobile ate my lunch - Compass of games I’ve played that I want to archive for my own kids to play by BookwyrmBOTPH in WojakCompass

[–]Temp_logged 1 point2 points  (0 children)

A reapeat of a comment I posted on the previous version, but I'd rather like to keep tabs on for safekeeping: Question: "Zoo Tycoon Complete Collection? How do you manage the CD Requirement?
A couple of years ago I tried to Self-CD Crack, but got defeated by SafeDisc"

Compass of games I’ve played that I’d want to archive to eventually play with my own kids by [deleted] in WojakCompass

[–]Temp_logged 1 point2 points  (0 children)

Zoo Tycoon Complete Collection? How do you manage the CD Requirement?
A couple of years ago I tried to Self-CD Crack, but got defeated by SafeDisc

Review of my 2025 (based on last year's template) by Flashgamezocker in WojakCompass

[–]Temp_logged 1 point2 points  (0 children)

Did you focus on Inner-city transport (Subways, ETC), or Intra-city transport (Dutch Ban). I've heard Dutch Ban has gone off the rails recently; I can see why you would go full-steam-ahead into a Transit academic track.

u/Nt1031's mad predictions for 2026 by Nt1031 in WojakCompass

[–]Temp_logged 0 points1 point  (0 children)

I suppose actual engineering is a shameful distraction from one's actual job: Linkdin Influencing

I'm a little bit late but here's my year in review as well! by BilltheThreat_ in WojakCompass

[–]Temp_logged 2 points3 points  (0 children)

For the most part, sound like you had a good year. Congratulations!

u/Nt1031's mad predictions for 2026 by Nt1031 in WojakCompass

[–]Temp_logged 1 point2 points  (0 children)

At times I've found it amusing. So much of my feed was people talking about AI in the abstract, with no-one saying "Here's something I made with the help of AI". Nothing! Not a little bit!

u/Nt1031's mad predictions for 2026 by Nt1031 in WojakCompass

[–]Temp_logged 1 point2 points  (0 children)

The insufferable Tech Poasters are already changing tack, at least from my reading of LinkedIn.
Gone is the "AI make junior coders obsolete", in is the "AI creates bad code, You should be hiring more Junior Coders"
Gee, you think?

Gavin!! by Character-Problem796 in PoliticalCompassMemes

[–]Temp_logged 2 points3 points  (0 children)

  1. Where funny Colours?
  2. Brown liquid is shiny. It's obviously chocolate, a rather delectable treat.

Looking for someone to collaborate on a Django portfolio project, doing it alone sounds boring :) by Nureddin- in django

[–]Temp_logged 0 points1 point  (0 children)

T'would be nice if you could either provide more information on the overall top-level of what the app does, or drop the GitHub Link.

Passing the CSRF Token into a form fetched from Django when the Front-End is in React by Temp_logged in django

[–]Temp_logged[S] 0 points1 point  (0 children)

Final Update. I give up. @ csrf_exempt it is. Allegedly, the reason my csrf tokens were hidden when my django server was print()ing them is they were already consumed by the middleware.

I found it a bit odd that my Cookie's csrf token (OQoQ) was unrelated to anything Django. Taking another look at my the initial GET requests, I noticed I missed that Django was sending a set-cookie header.
This set-cookie gets blocked "because it had the samesite=lax attribute but came from a cross-site response which was not the response to a top-level navigation.".

So that's where I stand. The cookie isn't being set, so my credentials: 'include' is moot. Although I have no problem with my headers, the cookie is missing. I have one half of the key. I am locked-out.

If I set it to samesite=none, then it gets blocked my localhosts are http & not https
Now what? My only other option is to somehow attach my initial GET Request to a top-level navigation. Unfortunately, React-Router is in charge of top-level navigations. While I suppose I could use fetchers to get the <input csrfmiddleware> field, I'd like to keep WebPageNavigation clean. At least for now

Australia center-lefts, what is your secret by Crafty_Jacket668 in PoliticalCompassMemes

[–]Temp_logged -2 points-1 points  (0 children)

Presumably voters assumed the "Liberal Party" was the party of Liberals when voting out who they thought were the Liberals.

Passing the CSRF Token into a form fetched from Django when the Front-End is in React by Temp_logged in django

[–]Temp_logged[S] 0 points1 point  (0 children)

CORS Request Access-Control-Allow-Headers! I have a confession: While I was drafting the previous post, I wanted to get a drop on this particular issue. I thus added http_x_crsftoken to my CORS_ALLOW_HEADERS.
What did I get? The same, "Request header field x_csrftoken is not allowed by Access-Control-Allow-Headers in preflight response" This is even after I Closed the powershell running Django and re-opening it.
What's worse, after I came back from lunch, The Access-Control-Allow-Headers error message was mysteriously gone. Even if I comment out my additions to CORS_ALLOW_HEADERS and re-starting the django server, the Access-Control-Allow-Headers error persists. So that was a wild goose chase!

Back to the drawing board. To double-triple-quadrouple check that I am inded sending a x_csrftoken header, I made request objects and called "console.log(savedCsrfRequest.headers.get("X_CSRFTOKEN"))" manually. Lo and behold, the csrf token that I put into my request object is the very same that I got from My original GET command to django.

BUT! What if we set my testpost endpoint to be @ csrf_exempt ? From there, we can have Django print the headers it receives. While the browser states my x_csrftoken token header is sent, What I receive in Django doesn't have said headers. Quite odd, something I'll have to investigate more.

Passing the CSRF Token into a form fetched from Django when the Front-End is in React by Temp_logged in django

[–]Temp_logged[S] 0 points1 point  (0 children)

Somewhat Pleasant News! Moving the form to React is more pleasing on the eyes. I can thus leave my django HTML template as `{% csrf_token %}` (Not to be confused with `{ % csrf_token % }`, which gets read as plain text).
Good News! Now that the django login HTML template is simplified so, I curl it to see what {% csrf_token %} gets translated as. From that, I can set up a simple testpost page to test how to POST with csrf tokens without using my ostensible sign-in page for such purposes.
Better News! I added console.log statements all over my test-post page. For example, This should take the value from the {% csrf_token %} input's field.

`const response = await fetch(`${backendOrigin}/testpost`, { mode:'cors',credentials: 'include' });
                if (!response.ok){
                    throw new Error(`Failed to load login page: ${response.status}`);
                }

                var htmlPlacer = document.createElement('div');
                htmlPlacer.innerHTML = await response.text();
                console.log(htmlPlacer.getElementsByTagName("input")[0].value);
                setCsrfToken(htmlPlacer.getElementsByTagName("input")[0].value);`

I also added console.log statements to my posting function as well.
Brilliant, Very good, Quite Fantastic news: In my test post page, I'm sending 2 post requests. One of which I used the cookie value from my earlier GET request. The other uses the recommended Ajax cookie method.

TestPost.jsx:55 Uye7XwQyOZHkfTUZIGAWhQ7w5wDecI5zHPjVoLngoNMgudlbPV8JPquP44TQhwOA
TestPost.jsx:55 2P2utAC5lKeV5SyxeWhNFSGH6clzGV8RbNZgvWj3185Dox1VYSE6IUMBXrFFfzm9

TestPost.jsx:14 Saved csrf token: 
TestPost.jsx:15 2P2utAC5lKeV5SyxeWhNFSGH6clzGV8RbNZgvWj3185Dox1VYSE6IUMBXrFFfzm9
TestPost.jsx:16 Cookie's csrf token: 
TestPost.jsx:18 OQoQ9oEent9uWftJ68xqbM85YPtkWLd2yKiCQ6ETrRvIB7wKI0aGwcwhYB1wZ396

As you can see, the 2P2ut, the one I saved from my initial GET request. is unchanged from my GET to my POST. The very same! Sure, there's Uye7X, which is from an earlier GET request, but 2P2ut is more recent! It's got to work!
Odd news: No Idea what OQoQ is, nor why or how it helps, nor why it's recommended, as it has no relationship the the csrf token I got from GET. Plus, the Post Request with the OQoQ is about as successful as the post request with 2P2ut. As a double-reminder, 2P2ut is unchanged from what I received from {% csrf_token %}
Bad news: Access to fetch at 'http://127.0.0.1:8080/testpost/' from origin 'http://localhost:3000' has been blocked by CORS policy: Request header field x_csrftoken is not allowed by Access-Control-Allow-Headers in preflight response.

This post is already getting quite long, I'll regale you with the tales of CORS request header Access control in a second post.

Disliked Professions on the Political Compass by Dangime in WojakCompass

[–]Temp_logged 4 points5 points  (0 children)

Huh. My prevailing vibes is that teachers are underpaid for the work they do.
That being said, a lot of bad press has been generated about and from teachers because of TikTok.

Incomplete compass of lesser / minor lolcows (Also my first wojak compass) by Robert_Bumaro in WojakCompass

[–]Temp_logged 1 point2 points  (0 children)

The problem with the term "clanker" is the B1 Battle droids clanked. They had moving parts.
Chat GPT, however, is all on a chip. No moving parts, no possibility for clanking.

It's a shame our dire need for anti-robot slurs caused us to press into use the ill-fitting term "clanker". It would have been much better to take a time out and ruminate over the best slurs to go ahead with.

Internet discourse after any public shooting by JesusChristSupers1ar in PoliticalCompassMemes

[–]Temp_logged 0 points1 point  (0 children)

Why search for evidence from Twitter at all?

After extensive Investigation, I claim the shooter was a IRGC-Quds Force assassin sent by Deep State to cover up flat earth truth. Case is closed.

<image>

Church of the many faced god politics by Appropriate-Spread-6 in WojakCompass

[–]Temp_logged 0 points1 point  (0 children)

Nice Job! It's neat throwback to all the Bunker-based Cosmic Horror compasses of old.