Qiita Teams that are logged in
You are not logged in to any team

Log in to Qiita Team
Community
OrganizationAdvent CalendarQiitadon (β)
Service
Qiita JobsQiita ZineQiita Blog
2
Help us understand the problem. What is going on with this article?
@unknown_soldier

max_input_vars対策

More than 5 years have passed since last update.

PHP5.3で導入された、DoS攻撃対策のmax_input_varsですが、
単純に大きな値を設定するのは避けたいところです。
(本末転倒ですからね。)

ではどのようにして多数の項目を送信すればよいでしょうか。

例えばですが、

//JS
    var data = {
                 "id": "1234567",
                 "member": [
                   {"first_name": "tarou", "family_name": "tanaka"},
                   {"first_name": "satoru", "family_name": "ueki"}
                 ]
               };

    $.ajax({
        type: 'POST',
        data: {data: JSON.stringify(data)},
        url: 'https://xxxx'
    });

のようにシリアライズした状態で送信し、

//PHP
    $data = json_decode($_POST['data'], true); //第2引数はtrueにしておく

このようにデシリアライズする感じでしょうか。

2
Help us understand the problem. What is going on with this article?
Why not register and get more from Qiita?
  1. We will deliver articles that match you
    By following users and tags, you can catch up information on technical fields that you are interested in as a whole
  2. you can read useful information later efficiently
    By "stocking" the articles you like, you can search right away

Comments

No comments
Sign up for free and join this conversation.
Sign Up
If you already have a Qiita account Login
2
Help us understand the problem. What is going on with this article?