Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

document old way of checking validity of CSRF token#5818

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to ourterms of service andprivacy statement. We’ll occasionally send you account related emails.

Already on GitHub?Sign in to your account

Closed
snoek09 wants to merge5 commits intosymfony:2.3fromsnoek09:document-old-way-checking-validity-csrf-token
Closed

document old way of checking validity of CSRF token#5818

snoek09 wants to merge5 commits intosymfony:2.3fromsnoek09:document-old-way-checking-validity-csrf-token

Conversation

@snoek09
Copy link

QA
Doc fix?yes
New docs?yes
Applies toall
Fixed ticketsRelated to#4668

@xabbuh
Copy link
Member

👍

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others.Learn more.

DELETE in backticks?

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others.Learn more.

I checked the docs for mentions of HTTP methods. In a sentence they are never in backticks.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others.Learn more.

👍

@snoek09
Copy link
Author

@xabbuh please let me know if the example code is fine now.

@snoek09
Copy link
Author

@xabbuh is this PR finished?

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others.Learn more.

I think this should link to the method in the interface instead (it doesn't matter which implementation is registered as the service).

@xabbuh
Copy link
Member

@snoek09 Sorry for missing your last comment. I left a last minor comment. After that this looks good to be merged to me.

@snoek09
Copy link
Author

@xabbuh No problem. I updated the link.

@OskarStark
Copy link
Contributor

👍

@snoek09
Copy link
Author

@xabbuh I think this is ready to be merged.

@xabbuh
Copy link
Member

@weaverryan@wouterj@javiereguiluz Ready to go here? :)

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others.Learn more.

Does it make sense to show this without showing a template? When you generate the CSRF token in the template, you would need to also includeauthenticate then, right?

@weaverryan
Copy link
Member

I added some comments, but I like it! Short and simple.

To be clear, this is not an "old way" of checking CSRF, correct? It seems totally valid and current.

Thanks!

@ogizanagi
Copy link
Contributor

@weaverryan : No it isn't, because theform.csrf_provider service is deprecated since 2.4, as well as the wholeCsrfProviderInterface. We usesecurity.csrf.token_manager instead.

However, I wonder if thebook/controller.rst page is the right place for this ? In#4668,@wouterj suggested to create a new entry in the cookbook instead, and to me it actually makes much more sense to have this in a Controller or Security cookbook section.
I know PRs for 2.6+ are already merged (#5325), but what do you think ?

@snoek09
Copy link
Author

@ogizanagi is right. The example code has to work with 2.3 using the 'old way'.
I also agree that this documentation should be moved to the cookbook.

@xabbuh
Copy link
Member

I think we can merge it just as it is and then work on converting this into a cookbook recipe afterwards. What do you think?

@ogizanagi
Copy link
Contributor

👍

@snoek09
Copy link
Author

I like that idea@xabbuh.

@xabbuh
Copy link
Member

@weaverryan@wouterj@javiereguiluz Okay with merging and thinking about how to rework the whole part afterwards?

@javiereguiluz
Copy link
Member

@xabbuh yes!

@weaverryan
Copy link
Member

👍

@xabbuh
Copy link
Member

Thank you Henry.

xabbuh added a commit that referenced this pull requestJan 11, 2016
…k09)This PR was squashed before being merged into the 2.3 branch (closes#5818).Discussion----------document old way of checking validity of CSRF token| Q             | A| ------------- | ---| Doc fix?      | yes| New docs?     | yes| Applies to    | all| Fixed tickets | Related to#4668Commits-------8257cc8 document old way of checking validity of CSRF token
@xabbuhxabbuh closed thisJan 11, 2016
@snoek09snoek09 deleted the document-old-way-checking-validity-csrf-token branchJanuary 11, 2016 10:22
Sign up for freeto join this conversation on GitHub. Already have an account?Sign in to comment

Reviewers

No reviews

Assignees

No one assigned

Projects

None yet

Milestone

No milestone

Development

Successfully merging this pull request may close these issues.

7 participants

@snoek09@xabbuh@OskarStark@weaverryan@ogizanagi@javiereguiluz@stof

[8]ページ先頭

©2009-2025 Movatter.jp