...

/

Iteration 1: Objects and Operations That Spam Requests

Iteration 1: Objects and Operations That Spam Requests

Learn to classify spam requests using objects and operations

While the bulk of the state that persists across requests belongs in the database and is accessed via Active Record, some other bits of state have different life spans and need to be managed differently. While the Cart itself was stored in the database in our Depot application, knowledge of which cart is current was managed by sessions. Flash notices were used to communicate messages such as “Can’t delete the last user” to the next request after a redirect and callbacks were used to extract locale data from the URLs ...