站点工具

Hotfix release available: 2024-02-06a "Kaos". upgrade now! [55.1] (what's this?)
New release available: 2024-02-06 "Kaos". upgrade now! [55] (what's this?)
Hotfix release available: 2023-04-04a "Jack Jackrum". upgrade now! [54.1] (what's this?)
New release available: 2023-04-04 "Jack Jackrum". upgrade now! [54] (what's this?)
Hotfix release available: 2022-07-31b "Igor". upgrade now! [53.1] (what's this?)
Hotfix release available: 2022-07-31a "Igor". upgrade now! [53] (what's this?)
New release available: 2022-07-31 "Igor". upgrade now! [52.2] (what's this?)
New release candidate 2 available: rc2022-06-26 "Igor". upgrade now! [52.1] (what's this?)
New release candidate available: 2022-06-26 "Igor". upgrade now! [52] (what's this?)
Hotfix release available: 2020-07-29a "Hogfather". upgrade now! [51.4] (what's this?)
New release available: 2020-07-29 "Hogfather". upgrade now! [51.3] (what's this?)
New release candidate 3 available: 2020-06-09 "Hogfather". upgrade now! [51.2] (what's this?)
New release candidate 2 available: 2020-06-01 "Hogfather". upgrade now! [51.1] (what's this?)
New release candidate available: 2020-06-01 "Hogfather". upgrade now! [51] (what's this?)
Hotfix release available: 2018-04-22c "Greebo". upgrade now! [50.3] (what's this?)
Hotfix release available: 2018-04-22b "Greebo". upgrade now! [50.2] (what's this?)
Hotfix release available: 2018-04-22a "Greebo". upgrade now! [50.1] (what's this?)
New release available: 2018-04-22 "Greebo". upgrade now! [50] (what's this?)
Hotfix release available: 2017-02-19g "Frusterick Manners". upgrade now! [49.7] (what's this?)
Hotfix release available: 2017-02-19f "Frusterick Manners". upgrade now! [49.6] (what's this?)
Hotfix release available: 2017-02-19e "Frusterick Manners". upgrade now! [49.5] (what's this?)
Hotfix release available fixing CVE-2017-12979 and CVE-2017-12980: 2017-02-19d "Frusterick Manners". upgrade now! [49.4] (what's this?)
Hotfix release available fixing CVE-2017-12583: 2017-02-19c "Frusterick Manners". upgrade now! [49.3] (what's this?)
Hotfix release available fixing security token and media manager: 2017-02-19b "Frusterick Manners". upgrade now! [49.2] (what's this?)
Hotfix release available fixing install and media manager issues: 2017-02-19a "Frusterick Manners". upgrade now! [49.1] (what's this?)
New release available: 2017-02-19 "Frusterick Manners". upgrade now! [49] (what's this?)
Hotfix release available: 2016-06-26e "Elenor of Tsort". upgrade now! [48.5] (what's this?)
Hotfix release available fixing CVE-2017-12979 and CVE-2017-12980: 2016-06-26d "Elenor of Tsort". upgrade now! [48.4] (what's this?)
Hotfix release available fixing CVE-2017-12583: 2016-06-26c "Elenor of Tsort". upgrade now! [48.3] (what's this?)
Hotfix release available fixing security token: 2016-06-26b "Elenor of Tsort". upgrade now! [48.2] (what's this?)
Hotfix release available fixing authad issues: 2016-06-26a "Elenor of Tsort". upgrade now! [48.1] (what's this?)
New release available: 2016-06-26 "Elenor of Tsort". upgrade now! [48] (what's this?)
Hotfix release available: 2015-08-10a "Detritus". upgrade now! [47.1] (what's this?)
New release available: 2015-08-10 "Detritus". upgrade now! [47] (what's this?)
Hotfix release available: 2014-09-29d "Hrun". upgrade now! [46.4] (what's this?)
Hotfix release available: 2014-09-29c "Hrun". upgrade now! [46.3] (what's this?)
Hotfix release available to prevent XSS attack via SWF uploads: 2014-09-29b "Hrun". upgrade now! [46.2] (what's this?)
Hotfix release available: 2014-09-29a "Hrun". upgrade now! [46.1] (what's this?)
New release available: 2014-09-29 "Hrun". upgrade now! [46] (what's this?)
Hotfix release available: 2014-05-05e "Ponder Stibbons". upgrade now! [44.5] (what's this?)
Hotfix release available: 2014-05-05d "Ponder Stibbons". upgrade now! [44.4] (what's this?)
Hotfix release available to prevent XSS attack via SWF uploads: 2014-05-05c "Ponder Stibbons". upgrade now! [44.3] (what's this?)
Security Hotfix 2014-05-05b to prevent zero byte attacks on external auth systems is available. upgrade now! [44.2] (what's this?)
Security Hotfix 2014-05-05a for Issue 765 available. upgrade now! [44.1] (what's this?)

app_bridge_item

这是本文档旧的修订版!


商品详情页通讯接口

在iOS、Android应用中打开的webview,可以通过JS函数和协议进行通讯。

以iOS为例,可以在网页加载完成后,通过访问网页中的JS函数app_bridge_thumb()获取到函数return返回的缩略图url地址:

\-(void)webViewDidFinishLoad:(UIWebView *)webView {
	NSString *pic_thumb_url = [_webView stringByEvaluatingJavaScriptFromString:@"app_bridge_thumb()"];
}

注意:_webView 改成你自己的名称。


1、APP主动调用网页中JavaScript函数的接口列表:

  • 1.1、商品详情页:APP原生应用获取商品主图缩略图URL地址
app_bridge_thumb()

  • 1.2、商品详情页:获取点击APP原生“立即购买”按钮需要进入的购物车网址
app_bridge_submit_rp_shopping_cart()

返回JSON数据示例:

{"opt":"cart","url":"https://m.repai.com/item/cart_islogin/?rp_iid=1100041405765641&rp_quantity=1&rp_sku1=%E9%BB%91%E8%89%B2&rp_sku2="}

说明:opt的值为cart时,表示此商品无型号选择或已经在详情页展开过型号选择,可以直接进入购物车。url表示购物车的网址。Webview打开购物车网址之前,APP需要先通过 APP客户端用户登陆状态判断及用户详情接口 查询当前的rp_access_token是否有效,如果失效请先登录,登录完成后,将 &access_token=xxxxx 作为参数追加在原网址参数后,在webview打开拼接后的网址,例如:

https://m.repai.com/item/cart_islogin/?rp_iid=1100041405765641&rp_quantity=1&rp_sku1=%E9%BB%91%E8%89%B2&rp_sku2=&access_token=xxxxxxxxxxxxxxxx

{"opt":"type","url":"http://m.repai.com/item/sku/id/1100041405765641/"}

说明:opt的值为type时,表示从下方弹出一个半高度尺寸的webview,url表示在这个webview中打开的型号/数量选择页面。此页面无需传递rp_access_token


  • 1.3、商品型号选择页:获取点击APP原生“确认购买”按钮需要进入的购物车网址
app_bridge_type_rp_shopping_cart()

返回文本数据示例:

https://m.repai.com/item/cart_islogin/?rp_iid=1100041405765641&rp_quantity=1&rp_sku1=%E9%BB%91%E8%89%B2&rp_sku2=

说明:直接返回需要进入的购物车网址。Webview打开购物车网址之前,APP需要先通过 APP客户端用户登陆状态判断及用户详情接口 查询当前的rp_access_token是否有效,如果失效请先登录,登录完成后,将 &access_token=xxxxx 作为参数追加在原网址参数后,在webview打开拼接后的网址,例如:

https://m.repai.com/item/cart_islogin/?rp_iid=1100041405765641&rp_quantity=1&rp_sku1=%E9%BB%91%E8%89%B2&rp_sku2=&access_token=xxxxxxxxxxxxxxxx

  • 1.4、商品详情页:获取分享信息,标题、图片地址、价格、库存、详情页网址
app_bridge_item_info()

返回JSON数据示例:

{
"rp_iid": "1100949812302780",
"rp_item_url": "http://m.repai.com/item/view/id/1100949812302780/",
"rp_pic_url": "http://img04.taobaocdn.com/imgextra/i4/2056453475/TB2Mwl8aXXXXXavXpXXXXXXXXXX_!!2056453475.jpg_320x320q90.jpg",
"rp_price": "14.5",
"rp_quantity": "50",
"rp_title": "拍下14.5牛皮女款皮带细腰带镶水钻"
}

  • 1.5、商品详情页:获取点击APP原生“添加购物车”按钮需要调用的接口网址(非Webview调用)
app_bridge_shopping_cart_add()

返回文本数据示例:

https://m.repai.com/item/cart_add_api/?rp_iid=1100041405765641&rp_quantity=1&rp_sku1=%E9%BB%91%E8%89%B2&rp_sku2=

说明:添加购物车调用的接口网址。调用接口之前,APP需要先通过 APP客户端用户登陆状态判断及用户详情接口 查询当前的rp_access_token是否有效,如果失效请先登录,登录完成后,将 &access_token=xxxxx 作为参数追加在原网址参数后,在webview打开拼接后的网址,例如:

https://m.repai.com/item/cart_add_api/?rp_iid=1100041405765641&rp_quantity=1&rp_sku1=%E9%BB%91%E8%89%B2&rp_sku2=&access_token=xxxxxxxxxxxxxxxx

  • 1.6、商品详情页:获取点击APP原生“购物车”按钮需要进入的购物车网址
app_bridge_shopping_cart_open()

返回文本数据示例:

https://m.repai.com/item/cart_islogin/

说明:直接返回需要进入的购物车网址。Webview打开购物车网址之前,APP需要先通过 APP客户端用户登陆状态判断及用户详情接口 查询当前的rp_access_token是否有效,如果失效请先登录,登录完成后,将 ?access_token=xxxxx 作为参数追加在原网址参数后,在webview打开拼接后的网址,例如:

https://m.repai.com/item/cart_islogin/?access_token=xxxxxxxxxxxxxxxx

返回首页

app_bridge_item.1407511201.txt.gz · 最后更改: 2014/08/08 23:20 由 221.221.173.254