Book Image

Phalcon Cookbook

By : Serghei Iakovlev, David Schissler
1 (2)
Book Image

Phalcon Cookbook

1 (2)
By: Serghei Iakovlev, David Schissler

Overview of this book

Phalcon is a high-performance PHP framework delivered as a PHP extension. This provides new opportunities for speed and application design, which until recently have been unrealized in the PHP ecosystem. Packed with simple learning exercises, technology prototypes, and real-world usable code, this book will guide you from the beginner and setup stage all the way to advanced usage. You will learn how to avoid niche pitfalls, how to use the command-line developer tools, how to integrate with new web standards, as well as how to set up and customize the MVC application structure. You will see how Phalcon can be used to quickly set up a single file web application as well as a complex multi-module application suitable for long-term projects. Some of the recipes focus on abstract concepts that are vital to get a deep comprehension of Phalcon and others are designed as a vehicle to deliver real-world usable classes and code snippets to solve advanced problems. You’ll start out with basic setup and application structure and then move onto the Phalcon MVC and routing implementation, the power of the ORM and Phalcon Query Language, and Phalcon’s own Volt templating system. Finally, you will move on to caching, security, and optimization.
Table of Contents (17 chapters)
Phalcon Cookbook
Credits
About the Authors
About the Reviewer
www.PacktPub.com
Preface
Index

Preventing Cross-Site Request Forgery (CSRF) attacks


CSRF attacks are a very old class of vulnerability that must be addressed for proper security. The issue arises when a website uses JavaScript to make a request to a second website and the second website is unable to know if the user made that request themselves through an action on their own website or through another website. If there is no protection for this fraudulent request then a second website can perform actions such as attempting to sign in for the user, or if the user is already signed in then requesting sensitive API data, parsing it, and then retransmitting it. In this recipe, we will detail some methods for securing this security vulnerability.

Getting ready…

This recipe uses Phalcon Developer Tools, which we will use to set up a project skeleton.

How to do it…

Follow these steps to complete this recipe:

  1. We need to have an application skeleton for experimentation. If you already have such an application, you can skip this step...