Book Image

Learning WordPress REST API

By : Sufyan bin Uzayr, Mathew Rooney
Book Image

Learning WordPress REST API

By: Sufyan bin Uzayr, Mathew Rooney

Overview of this book

The WordPress REST API is a recent innovation that has the potential to unlock several new opportunities for WordPress developers. It can help you integrate with technologies outside of WordPress, as well as offer great flexibility when developing themes and plugins for WordPress. As such, the REST API can make developers’ lives easier. The book begins by covering the basics of the REST API and how it can be used along with WordPress. Learn how the REST API interacts with WordPress, allowing you to copy posts and modify post metadata. Move on to get an understanding of taxonomies and user roles are in WordPress and how to use them with the WordPress REST API. Next, find out how to edit and process forms with AJAX and how to create custom routes and functions. You will create a fully-functional single page web app using a WordPress site and the REST API. Lastly, you will see how to deal with the REST API in future versions and will use it to interact it with third-party services. By the end of the book, you will be able to work with the WordPress REST API to build web applications.
Table of Contents (16 chapters)
Learning WordPress REST API
About the Authors
About the Reviewer

WP REST API - retrieving data

After going through all the basics related to WP REST API, and assessing how it will actually make it easier for us to develop applications for background pairing with WordPress' backend, we also have to overview the authentication methodology that there is and that should already be set and running to have the WP REST API plugin installed. We have also taken an in-depth look at two methods for server-side authentication, a more simple yet very insecure method of basic authentication, and a more complicated method which is, however, secure enough to be used in real-world environments-namely OAuth.

During this part of the tutorial, we shall start generating authenticated requests, given our progress so far. For testing purposes, we shall stick to basic authentication for the course of this tutorial, but remember one more time that this method of authentication must never be used in real-world examples and has got to be used only in scenarios like this one.

We shall...