站点工具

Hotfix release available: 2024-02-06a "Kaos". upgrade now! [55.1] (what's this?)
New release available: 2024-02-06 "Kaos". upgrade now! [55] (what's this?)
Hotfix release available: 2023-04-04a "Jack Jackrum". upgrade now! [54.1] (what's this?)
New release available: 2023-04-04 "Jack Jackrum". upgrade now! [54] (what's this?)
Hotfix release available: 2022-07-31b "Igor". upgrade now! [53.1] (what's this?)
Hotfix release available: 2022-07-31a "Igor". upgrade now! [53] (what's this?)
New release available: 2022-07-31 "Igor". upgrade now! [52.2] (what's this?)
New release candidate 2 available: rc2022-06-26 "Igor". upgrade now! [52.1] (what's this?)
New release candidate available: 2022-06-26 "Igor". upgrade now! [52] (what's this?)
Hotfix release available: 2020-07-29a "Hogfather". upgrade now! [51.4] (what's this?)
New release available: 2020-07-29 "Hogfather". upgrade now! [51.3] (what's this?)
New release candidate 3 available: 2020-06-09 "Hogfather". upgrade now! [51.2] (what's this?)
New release candidate 2 available: 2020-06-01 "Hogfather". upgrade now! [51.1] (what's this?)
New release candidate available: 2020-06-01 "Hogfather". upgrade now! [51] (what's this?)
Hotfix release available: 2018-04-22c "Greebo". upgrade now! [50.3] (what's this?)
Hotfix release available: 2018-04-22b "Greebo". upgrade now! [50.2] (what's this?)
Hotfix release available: 2018-04-22a "Greebo". upgrade now! [50.1] (what's this?)
New release available: 2018-04-22 "Greebo". upgrade now! [50] (what's this?)
Hotfix release available: 2017-02-19g "Frusterick Manners". upgrade now! [49.7] (what's this?)
Hotfix release available: 2017-02-19f "Frusterick Manners". upgrade now! [49.6] (what's this?)
Hotfix release available: 2017-02-19e "Frusterick Manners". upgrade now! [49.5] (what's this?)
Hotfix release available fixing CVE-2017-12979 and CVE-2017-12980: 2017-02-19d "Frusterick Manners". upgrade now! [49.4] (what's this?)
Hotfix release available fixing CVE-2017-12583: 2017-02-19c "Frusterick Manners". upgrade now! [49.3] (what's this?)
Hotfix release available fixing security token and media manager: 2017-02-19b "Frusterick Manners". upgrade now! [49.2] (what's this?)
Hotfix release available fixing install and media manager issues: 2017-02-19a "Frusterick Manners". upgrade now! [49.1] (what's this?)
New release available: 2017-02-19 "Frusterick Manners". upgrade now! [49] (what's this?)
Hotfix release available: 2016-06-26e "Elenor of Tsort". upgrade now! [48.5] (what's this?)
Hotfix release available fixing CVE-2017-12979 and CVE-2017-12980: 2016-06-26d "Elenor of Tsort". upgrade now! [48.4] (what's this?)
Hotfix release available fixing CVE-2017-12583: 2016-06-26c "Elenor of Tsort". upgrade now! [48.3] (what's this?)
Hotfix release available fixing security token: 2016-06-26b "Elenor of Tsort". upgrade now! [48.2] (what's this?)
Hotfix release available fixing authad issues: 2016-06-26a "Elenor of Tsort". upgrade now! [48.1] (what's this?)
New release available: 2016-06-26 "Elenor of Tsort". upgrade now! [48] (what's this?)
Hotfix release available: 2015-08-10a "Detritus". upgrade now! [47.1] (what's this?)
New release available: 2015-08-10 "Detritus". upgrade now! [47] (what's this?)
Hotfix release available: 2014-09-29d "Hrun". upgrade now! [46.4] (what's this?)
Hotfix release available: 2014-09-29c "Hrun". upgrade now! [46.3] (what's this?)
Hotfix release available to prevent XSS attack via SWF uploads: 2014-09-29b "Hrun". upgrade now! [46.2] (what's this?)
Hotfix release available: 2014-09-29a "Hrun". upgrade now! [46.1] (what's this?)
New release available: 2014-09-29 "Hrun". upgrade now! [46] (what's this?)
Hotfix release available: 2014-05-05e "Ponder Stibbons". upgrade now! [44.5] (what's this?)
Hotfix release available: 2014-05-05d "Ponder Stibbons". upgrade now! [44.4] (what's this?)
Hotfix release available to prevent XSS attack via SWF uploads: 2014-05-05c "Ponder Stibbons". upgrade now! [44.3] (what's this?)
Security Hotfix 2014-05-05b to prevent zero byte attacks on external auth systems is available. upgrade now! [44.2] (what's this?)
Security Hotfix 2014-05-05a for Issue 765 available. upgrade now! [44.1] (what's this?)

pic

差别

这里会显示出您选择的修订版和当前版本之间的差别。

到此差别页面的链接

Both sides previous revision 前一修订版
pic [2014/06/16 11:47]
106.2.171.114
pic [2022/04/19 12:52] (当前版本)
5.188.211.72 http://imrdsoacha.gov.co/silvitra-120mg-qrms
行 1: 行 1:
- +http://imrdsoacha.gov.co/silvitra-120mg-qrms
-===== 图片存储API接口 ===== +
- +
-所有上传到服务器的图片,只要文件内容一样,就只保存一份,图片存储数量可无限扩展。用户上传的文件列表,只需保存文件名(例如:a62ef8c61cc3a62af27cb6f242bd237ac693f22f.jpg)即可,无需保存全路径。 +
- +
-文件名原图访问地址的拼接格式如下,可以自行拼接访问地址: +
-http://pic.repaiapp.com/pic/​a6/​2e/​f8/​a62ef8c61cc3a62af27cb6f242bd237ac693f22f.jpg +
- +
-如果要进行缩略,在文件末尾加上: +
- +
-  * 120x120缩略:@0e_120w_120h_0c_0i_1o_90Q_1x.jpg +
- +
-  * 400x400缩略:@0e_400w_400h_0c_0i_1o_90Q_1x.jpg +
- +
-  * 500固定宽度等比缩略带热拍水印:@500w_90Q_1x.jpg|watermark=1&​object=cGljL3dhdGVybWFyay5wbmc&​p=9&​y=10&​x=30&​t=90 +
- +
-==== 1、PHP内部引用存储图片接口 ==== +
- +
- <?php +
- //​存储图片,正式使用时,/​Data/​webapps/​repai.com/​www/​static/​images/​nine/​pps.jpg 换成 $_FILES["​file"​]["​temp_name"​] +
- require_once("/​Data/​webapps/​m.repai.com/​m/​phpapi.php"​);​ //​PHP引用方式,需要引用的框架入口文件 +
- $result = phpapi_mvc("​pic",​ "​pic_put_phpapi",​ array("​tmpfile"​ => "/​Data/​webapps/​repai.com/​www/​static/​images/​nine/​pps.jpg"​));​ +
- var_dump($result);​ +
- ?> +
- +
- +
-=== 输入参数说明: === +
- +
-  * tmpfile 【服务器本地的PHP文件,可以是PHP上传的临时文件$_FILES["​file"​]["​temp_name"​]】 +
- +
----- +
- +
-=== 输出参数说明: === +
- +
-  * 示例如下: +
- +
- array(4) { +
-  ["​filename"​]=>​ +
-  string(44) "​a62ef8c61cc3a62af27cb6f242bd237ac693f22f.jpg"​ +
-  ["​filesize"​]=>​ +
-  int(118152) +
-  ["​url"​]=>​ +
-  string(81) "​http://​pic.repaiapp.com/​pic/​a6/​2e/​f8/​a62ef8c61cc3a62af27cb6f242bd237ac693f22f.jpg"​ +
-  ["​size"​]=>​ +
-  array(3) { +
-    ["​120x120"​]=>​ +
-    string(114) "​http://​pic.repaiapp.com/​pic/​a6/​2e/​f8/​a62ef8c61cc3a62af27cb6f242bd237ac693f22f.jpg@0e_120w_120h_0c_0i_1o_90Q_1x.jpg"​ +
-    ["​400x400"​]=>​ +
-    string(114) "​http://​pic.repaiapp.com/​pic/​a6/​2e/​f8/​a62ef8c61cc3a62af27cb6f242bd237ac693f22f.jpg@0e_400w_400h_0c_0i_1o_90Q_1x.jpg"​ +
-    ["​500w"​]=>​ +
-    string(97) "​http://​pic.repaiapp.com/​pic/​a6/​2e/​f8/​a62ef8c61cc3a62af27cb6f242bd237ac693f22f.jpg@500w_90Q_1x.jpg|watermark=1&​object=cGljL3dhdGVybWFyay5wbmc&​p=9&​y=10&​x=30&​t=90"​ +
-  } +
-+
- +
-  * filename 【图片存储后的文件名】 +
- +
-  * filesize 【图片文件大小字节数】 +
- +
-  * url 【原图URL地址】 +
- +
-  * size 【不同尺寸的图片格式】 +
- +
-==== 2、PHP内部引用获取图片访问地址接口 ==== +
- +
- <?php +
- //​根据图片名获取图片访问地址 +
- $result = phpapi_mvc("​pic",​ "​pic_get_phpapi",​ array("​filename"​ => "​a62ef8c61cc3a62af27cb6f242bd237ac693f22f.jpg"​));​ +
- var_dump($result);​ +
- ?> +
- +
-=== 输入参数说明: === +
- +
-  * filename 【存储图片后获得的文件名,例如a62ef8c61cc3a62af27cb6f242bd237ac693f22f.jpg】 +
- +
----- +
- +
-=== 输出参数说明: === +
- +
-  * 示例如下: +
- +
- array(3) { +
-  ["​filename"​]=>​ +
-  string(44) "​a62ef8c61cc3a62af27cb6f242bd237ac693f22f.jpg"​ +
-  ["​url"​]=>​ +
-  string(81) "​http://​pic.repaiapp.com/​pic/​a6/​2e/​f8/​a62ef8c61cc3a62af27cb6f242bd237ac693f22f.jpg"​ +
-  ["​size"​]=>​ +
-  array(3) { +
-    ["​120x120"​]=>​ +
-    string(114) "​http://​pic.repaiapp.com/​pic/​a6/​2e/​f8/​a62ef8c61cc3a62af27cb6f242bd237ac693f22f.jpg@0e_120w_120h_0c_0i_1o_90Q_1x.jpg"​ +
-    ["​400x400"​]=>​ +
-    string(114) "​http://​pic.repaiapp.com/​pic/​a6/​2e/​f8/​a62ef8c61cc3a62af27cb6f242bd237ac693f22f.jpg@0e_400w_400h_0c_0i_1o_90Q_1x.jpg"​ +
-    ["​500w"​]=>​ +
-    string(97) "​http://​pic.repaiapp.com/​pic/​a6/​2e/​f8/​a62ef8c61cc3a62af27cb6f242bd237ac693f22f.jpg@500w_90Q_1x.jpg|watermark=1&​object=cGljL3dhdGVybWFyay5wbmc&​p=9&​y=10&​x=30&​t=90"​ +
-  } +
-+
- +
-[[start|返回首页]]+
pic.1402890445.txt.gz · 最后更改: 2014/06/16 11:47 由 106.2.171.114