You need to **protect agaistn csrf** when doing a post request with ajax, so first append this on your html
<meta name="csrf-token" content="{{ csrf_token() }}">
Then in your ajax you can do this:
$.ajax(
{
headers: {
'X-CSRF-TOKEN': $('meta[name="csrf-token"]').attr('content')
},
type: "post",
data: deldata,
cache: false,
processData: false,
contentType: false,
url: "<?php echo url('/delpolicycoverdata') ?>",
success: function(data)
{
swal("Poof! Your imaginary file has been deleted!",
{
icon: "success",
});
$('#brc' + data).remove();
},
error: function(json)
{
console.log(json);
swal("Error!!",
{
icon: "Error",
});
}
});
You can read more about csrf protection on [official laravel docs][1]
[1]: https://laravel.com/docs/5.6/csrf#csrf-x-csrf-token
Just out of curiosity I've taken a look at what happens under the hood, and I've used [dtruss/strace][1] on each test.
C++
./a.out < in
Saw 6512403 lines in 8 seconds. Crunch speed: 814050
syscalls `sudo dtruss -c ./a.out < in`
CALL COUNT
__mac_syscall 1
<snip>
open 6
pread 8
mprotect 17
mmap 22
stat64 30
read_nocancel 25958
Python
./a.py < in
Read 6512402 lines in 1 seconds. LPS: 6512402
syscalls `sudo dtruss -c ./a.py < in`
CALL COUNT
__mac_syscall 1
<snip>
open 5
pread 8
mprotect 17
mmap 21
stat64 29
[1]: http://en.wikipedia.org/wiki/Strace