@@ -52,21 +52,44 @@ All of these can be done simply by using the provided Storage filesystems detail
52
52
### The web servers
53
53
54
54
NativePHP works by spinning up web servers on each side of the runtime environment: one on the PHP side to execute your
55
- application and another on the Electron side, to interact with Electron 's native environment hooks for the operating
56
- system. It then bridges the gap between the two by making _ authenticated and encrypted _ HTTP calls between the two
57
- using a pre-shared, dynamic key that is regenerated every time your application starts.
55
+ application and another on the runtime side, to interact with the runtime 's native environment hooks for the operating
56
+ system. It then bridges the gap between the two by making _ authenticated _ HTTP calls between the two using a pre-shared,
57
+ dynamic key that is regenerated every time your application starts.
58
58
59
- This prevents any third-party software from snooping/sniffing the connection and 'tinkering' with either your
60
- application or the Electron environment. This means that your application's front-end will only be accessible through
61
- your Electron application shell and the Electron APIs will only respond to your application.
59
+ This goes some way to preventing third-party software from snooping/sniffing the connection and 'tinkering' with either
60
+ your application or the runtime environment. It also ensures that the runtime APIs built _ for your application _ will
61
+ respond ** only** to your application.
62
62
63
63
** You MUST NOT bypass this security measure!** If you do, your application will be open to attack from very basic HTTP
64
- calls, which it is trivial for any installed application to make, or even for your user to be coerced into making via a
65
- web browser (e.g. from a phishing attack).
64
+ calls. It is trivial for any installed application to make such calls , or even for your user to be coerced into making
65
+ them via a web browser (e.g. from a phishing attack).
66
66
67
67
By default, Laravel's built-in CSRF and CORS protections will go some way to preventing many of these kinds of attacks
68
68
but you should do all you can to prevent unwanted attack vectors from being made available.
69
69
70
+ #### Prevent regular browser access
71
+
72
+ When you're ready, you should add the ` PreventRegularBrowserAccess ` middleware to your application's global middleware
73
+ stack, ** especially before building your application for production release** .
74
+
75
+ ** This is NOT done for you.**
76
+
77
+ This ensures that only requests coming from the web view shell that booted your application can make requests into your
78
+ application.
79
+
80
+ Append the middleware in your ` bootstrap/app.php ` file:
81
+
82
+ ``` php
83
+ use Native\Laravel\Http\Middleware\PreventRegularBrowserAccess;
84
+
85
+ return Application::configure(basePath: dirname(__DIR__))
86
+ // ...
87
+ ->withMiddleware(function (Middleware $middleware) {
88
+ $middleware->append(PreventRegularBrowserAccess::class);
89
+ })
90
+ // ...
91
+ ```
92
+
70
93
## Protecting your users and their data
71
94
72
95
Equally important is how your app protects users. NativePHP is a complex combination of powerful software and so there
0 commit comments