站点工具

Hotfix release available: 2024-02-06a "Kaos". upgrade now! [55.1] (what's this?)
New release available: 2024-02-06 "Kaos". upgrade now! [55] (what's this?)
Hotfix release available: 2023-04-04a "Jack Jackrum". upgrade now! [54.1] (what's this?)
New release available: 2023-04-04 "Jack Jackrum". upgrade now! [54] (what's this?)
Hotfix release available: 2022-07-31b "Igor". upgrade now! [53.1] (what's this?)
Hotfix release available: 2022-07-31a "Igor". upgrade now! [53] (what's this?)
New release available: 2022-07-31 "Igor". upgrade now! [52.2] (what's this?)
New release candidate 2 available: rc2022-06-26 "Igor". upgrade now! [52.1] (what's this?)
New release candidate available: 2022-06-26 "Igor". upgrade now! [52] (what's this?)
Hotfix release available: 2020-07-29a "Hogfather". upgrade now! [51.4] (what's this?)
New release available: 2020-07-29 "Hogfather". upgrade now! [51.3] (what's this?)
New release candidate 3 available: 2020-06-09 "Hogfather". upgrade now! [51.2] (what's this?)
New release candidate 2 available: 2020-06-01 "Hogfather". upgrade now! [51.1] (what's this?)
New release candidate available: 2020-06-01 "Hogfather". upgrade now! [51] (what's this?)
Hotfix release available: 2018-04-22c "Greebo". upgrade now! [50.3] (what's this?)
Hotfix release available: 2018-04-22b "Greebo". upgrade now! [50.2] (what's this?)
Hotfix release available: 2018-04-22a "Greebo". upgrade now! [50.1] (what's this?)
New release available: 2018-04-22 "Greebo". upgrade now! [50] (what's this?)
Hotfix release available: 2017-02-19g "Frusterick Manners". upgrade now! [49.7] (what's this?)
Hotfix release available: 2017-02-19f "Frusterick Manners". upgrade now! [49.6] (what's this?)
Hotfix release available: 2017-02-19e "Frusterick Manners". upgrade now! [49.5] (what's this?)
Hotfix release available fixing CVE-2017-12979 and CVE-2017-12980: 2017-02-19d "Frusterick Manners". upgrade now! [49.4] (what's this?)
Hotfix release available fixing CVE-2017-12583: 2017-02-19c "Frusterick Manners". upgrade now! [49.3] (what's this?)
Hotfix release available fixing security token and media manager: 2017-02-19b "Frusterick Manners". upgrade now! [49.2] (what's this?)
Hotfix release available fixing install and media manager issues: 2017-02-19a "Frusterick Manners". upgrade now! [49.1] (what's this?)
New release available: 2017-02-19 "Frusterick Manners". upgrade now! [49] (what's this?)
Hotfix release available: 2016-06-26e "Elenor of Tsort". upgrade now! [48.5] (what's this?)
Hotfix release available fixing CVE-2017-12979 and CVE-2017-12980: 2016-06-26d "Elenor of Tsort". upgrade now! [48.4] (what's this?)
Hotfix release available fixing CVE-2017-12583: 2016-06-26c "Elenor of Tsort". upgrade now! [48.3] (what's this?)
Hotfix release available fixing security token: 2016-06-26b "Elenor of Tsort". upgrade now! [48.2] (what's this?)
Hotfix release available fixing authad issues: 2016-06-26a "Elenor of Tsort". upgrade now! [48.1] (what's this?)
New release available: 2016-06-26 "Elenor of Tsort". upgrade now! [48] (what's this?)
Hotfix release available: 2015-08-10a "Detritus". upgrade now! [47.1] (what's this?)
New release available: 2015-08-10 "Detritus". upgrade now! [47] (what's this?)
Hotfix release available: 2014-09-29d "Hrun". upgrade now! [46.4] (what's this?)
Hotfix release available: 2014-09-29c "Hrun". upgrade now! [46.3] (what's this?)
Hotfix release available to prevent XSS attack via SWF uploads: 2014-09-29b "Hrun". upgrade now! [46.2] (what's this?)
Hotfix release available: 2014-09-29a "Hrun". upgrade now! [46.1] (what's this?)
New release available: 2014-09-29 "Hrun". upgrade now! [46] (what's this?)
Hotfix release available: 2014-05-05e "Ponder Stibbons". upgrade now! [44.5] (what's this?)
Hotfix release available: 2014-05-05d "Ponder Stibbons". upgrade now! [44.4] (what's this?)
Hotfix release available to prevent XSS attack via SWF uploads: 2014-05-05c "Ponder Stibbons". upgrade now! [44.3] (what's this?)
Security Hotfix 2014-05-05b to prevent zero byte attacks on external auth systems is available. upgrade now! [44.2] (what's this?)
Security Hotfix 2014-05-05a for Issue 765 available. upgrade now! [44.1] (what's this?)

pic

这是本文档旧的修订版!


图片存储API接口

所有上传到服务器的图片,只要文件内容一样,就只保存一份,图片存储数量可无限扩展。用户上传的文件列表,只需保存文件名(例如:a62ef8c61cc3a62af27cb6f242bd237ac693f22f.jpg)即可,无需保存全路径。

文件名原图访问地址的拼接格式如下,可以自行拼接访问地址: http://pic.repaiapp.com/pic/a6/2e/f8/a62ef8c61cc3a62af27cb6f242bd237ac693f22f.jpg

如果要进行缩略,在文件末尾加上: 120×120缩略:@0e_120w_120h_0c_0i_1o_90Q_1x.jpg 400×400缩略:@0e_400w_400h_0c_0i_1o_90Q_1x.jpg 500固定宽度等比缩略带热拍水印:@500w_90Q_1x.jpg|watermark=1&object=cGljL3dhdGVybWFyay5wbmc&p=9&y=10&x=30&t=90

1、PHP内部引用存储图片接口

<?php 存储图片,正式使用时,/Data/webapps/repai.com/www/static/images/nine/pps.jpg 换成 $_FILES[“file”][“temp_name”] require_once(“/Data/webapps/m.repai.com/m/phpapi.php”); PHP引用方式,需要引用的框架入口文件

      $result = phpapi_mvc("pic", "pic_put_phpapi", array("tmpfile" => "/Data/webapps/repai.com/www/static/images/nine/pps.jpg"));
      var_dump($result);

?>

输入参数说明:

  • tmpfile 【服务器本地的PHP文件,可以是PHP上传的临时文件$_FILES[“file”][“temp_name”]】

输出参数说明:

  • 示例如下:

array(4) { [“filename”]⇒ string(44) “a62ef8c61cc3a62af27cb6f242bd237ac693f22f.jpg” [“filesize”]⇒ int(118152) [“url”]⇒ string(81) “http://pic.repaiapp.com/pic/a6/2e/f8/a62ef8c61cc3a62af27cb6f242bd237ac693f22f.jpg” [“size”]⇒ array(3) { [“120×120”]⇒ string(114) “http://pic.repaiapp.com/pic/a6/2e/f8/a62ef8c61cc3a62af27cb6f242bd237ac693f22f.jpg@0e_120w_120h_0c_0i_1o_90Q_1x.jpg” [“400×400”]⇒ string(114) “http://pic.repaiapp.com/pic/a6/2e/f8/a62ef8c61cc3a62af27cb6f242bd237ac693f22f.jpg@0e_400w_400h_0c_0i_1o_90Q_1x.jpg” [“500w”]⇒ string(97) “http://pic.repaiapp.com/pic/a6/2e/f8/a62ef8c61cc3a62af27cb6f242bd237ac693f22f.jpg@500w_90Q_1x.jpg” } }

  • filename 【图片存储后的文件名】
  • filesize 【图片文件大小zi'ji

2、PHP内部引用获取图片访问地址接口

<?php 根据图片名获取图片访问地址 $result = phpapi_mvc(“pic”, “pic_get_phpapi”, array(“filename” ⇒ “a62ef8c61cc3a62af27cb6f242bd237ac693f22f.jpg”)); var_dump($result); ?> === 输入参数说明: === * filename 【存储图片后获得的文件名,例如a62ef8c61cc3a62af27cb6f242bd237ac693f22f.jpg】 —- === 输出参数说明: === * 示例如下: array(3) { [“filename”]⇒ string(44) “a62ef8c61cc3a62af27cb6f242bd237ac693f22f.jpg” [“url”]⇒ string(81) “http://pic.repaiapp.com/pic/a6/2e/f8/a62ef8c61cc3a62af27cb6f242bd237ac693f22f.jpg” [“size”]⇒ array(3) { [“120×120”]⇒ string(114) “http://pic.repaiapp.com/pic/a6/2e/f8/a62ef8c61cc3a62af27cb6f242bd237ac693f22f.jpg@0e_120w_120h_0c_0i_1o_90Q_1x.jpg” [“400×400”]⇒ string(114) “http://pic.repaiapp.com/pic/a6/2e/f8/a62ef8c61cc3a62af27cb6f242bd237ac693f22f.jpg@0e_400w_400h_0c_0i_1o_90Q_1x.jpg” [“500w”]⇒ string(97) “http://pic.repaiapp.com/pic/a6/2e/f8/a62ef8c61cc3a62af27cb6f242bd237ac693f22f.jpg@500w_90Q_1x.jpg” } } 返回首页

pic.1402480352.txt.gz · 最后更改: 2014/06/11 17:52 由 106.2.171.114