站点工具

Hotfix release available: 2024-02-06a "Kaos". upgrade now! [55.1] (what's this?)
New release available: 2024-02-06 "Kaos". upgrade now! [55] (what's this?)
Hotfix release available: 2023-04-04a "Jack Jackrum". upgrade now! [54.1] (what's this?)
New release available: 2023-04-04 "Jack Jackrum". upgrade now! [54] (what's this?)
Hotfix release available: 2022-07-31b "Igor". upgrade now! [53.1] (what's this?)
Hotfix release available: 2022-07-31a "Igor". upgrade now! [53] (what's this?)
New release available: 2022-07-31 "Igor". upgrade now! [52.2] (what's this?)
New release candidate 2 available: rc2022-06-26 "Igor". upgrade now! [52.1] (what's this?)
New release candidate available: 2022-06-26 "Igor". upgrade now! [52] (what's this?)
Hotfix release available: 2020-07-29a "Hogfather". upgrade now! [51.4] (what's this?)
New release available: 2020-07-29 "Hogfather". upgrade now! [51.3] (what's this?)
New release candidate 3 available: 2020-06-09 "Hogfather". upgrade now! [51.2] (what's this?)
New release candidate 2 available: 2020-06-01 "Hogfather". upgrade now! [51.1] (what's this?)
New release candidate available: 2020-06-01 "Hogfather". upgrade now! [51] (what's this?)
Hotfix release available: 2018-04-22c "Greebo". upgrade now! [50.3] (what's this?)
Hotfix release available: 2018-04-22b "Greebo". upgrade now! [50.2] (what's this?)
Hotfix release available: 2018-04-22a "Greebo". upgrade now! [50.1] (what's this?)
New release available: 2018-04-22 "Greebo". upgrade now! [50] (what's this?)
Hotfix release available: 2017-02-19g "Frusterick Manners". upgrade now! [49.7] (what's this?)
Hotfix release available: 2017-02-19f "Frusterick Manners". upgrade now! [49.6] (what's this?)
Hotfix release available: 2017-02-19e "Frusterick Manners". upgrade now! [49.5] (what's this?)
Hotfix release available fixing CVE-2017-12979 and CVE-2017-12980: 2017-02-19d "Frusterick Manners". upgrade now! [49.4] (what's this?)
Hotfix release available fixing CVE-2017-12583: 2017-02-19c "Frusterick Manners". upgrade now! [49.3] (what's this?)
Hotfix release available fixing security token and media manager: 2017-02-19b "Frusterick Manners". upgrade now! [49.2] (what's this?)
Hotfix release available fixing install and media manager issues: 2017-02-19a "Frusterick Manners". upgrade now! [49.1] (what's this?)
New release available: 2017-02-19 "Frusterick Manners". upgrade now! [49] (what's this?)
Hotfix release available: 2016-06-26e "Elenor of Tsort". upgrade now! [48.5] (what's this?)
Hotfix release available fixing CVE-2017-12979 and CVE-2017-12980: 2016-06-26d "Elenor of Tsort". upgrade now! [48.4] (what's this?)
Hotfix release available fixing CVE-2017-12583: 2016-06-26c "Elenor of Tsort". upgrade now! [48.3] (what's this?)
Hotfix release available fixing security token: 2016-06-26b "Elenor of Tsort". upgrade now! [48.2] (what's this?)
Hotfix release available fixing authad issues: 2016-06-26a "Elenor of Tsort". upgrade now! [48.1] (what's this?)
New release available: 2016-06-26 "Elenor of Tsort". upgrade now! [48] (what's this?)
Hotfix release available: 2015-08-10a "Detritus". upgrade now! [47.1] (what's this?)
New release available: 2015-08-10 "Detritus". upgrade now! [47] (what's this?)
Hotfix release available: 2014-09-29d "Hrun". upgrade now! [46.4] (what's this?)
Hotfix release available: 2014-09-29c "Hrun". upgrade now! [46.3] (what's this?)
Hotfix release available to prevent XSS attack via SWF uploads: 2014-09-29b "Hrun". upgrade now! [46.2] (what's this?)
Hotfix release available: 2014-09-29a "Hrun". upgrade now! [46.1] (what's this?)
New release available: 2014-09-29 "Hrun". upgrade now! [46] (what's this?)
Hotfix release available: 2014-05-05e "Ponder Stibbons". upgrade now! [44.5] (what's this?)
Hotfix release available: 2014-05-05d "Ponder Stibbons". upgrade now! [44.4] (what's this?)
Hotfix release available to prevent XSS attack via SWF uploads: 2014-05-05c "Ponder Stibbons". upgrade now! [44.3] (what's this?)
Security Hotfix 2014-05-05b to prevent zero byte attacks on external auth systems is available. upgrade now! [44.2] (what's this?)
Security Hotfix 2014-05-05a for Issue 765 available. upgrade now! [44.1] (what's this?)

user_info_api

APP客户端用户登陆状态判断及用户详情接口

1、客户端调用接口

https://m.repai.com/user/user_info_api/access_token/rpat_47be0653fe75e8ae3f3d4fa5de931c24

其中 rpat_47be0653fe75e8ae3f3d4fa5de931c24 为 access_token 示例。

输入参数说明:


输出参数说明:

  • JSON格式输出,错误时,is_login值为false,表示未登陆,示例如下:
{"is_login":false}

返回false的原因为 access_token 错误或过期(有效期30天,如果30天内用 access_token 访问过此接口,有效期自动延长)

  • JSON格式输出,正确时,is_login值为true,表示已登陆,并输出用户信息,示例如下:
{
"is_login": true,
"user_info": {
	"rp_city": "北京",
	"rp_coin": "0",
	"rp_grade": "0",
	"rp_idcard": null,
	"rp_ipaddr": null,
	"rp_isp": "移动",
	"rp_isseller": "0",
	"rp_lastip": "106.2.171.114",
	"rp_phone": "15901283960",
	"rp_phonestatus": "0",
	"rp_province": "北京",
	"rp_realname": null,
	"rp_uid": "1",
	"user_integral": "1",
	"order_count": "35"
	},
"user_avatar": {
	"pic_medium": "http://pic.repaiapp.com/pic/0f/52/50/0f52508b97a7a7900fe206c276158ce425ae6723.jpg@0e_120w_120h_0c_0i_1o_90Q_1x.jpg",
	"pic_small": "http://pic.repaiapp.com/pic/0f/52/50/0f52508b97a7a7900fe206c276158ce425ae6723.jpg@0e_400w_400h_0c_0i_1o_90Q_1x.jpg",
	"reason": "用户拥有头像!",
	"status": true
	}
}
  • is_login 【是否登陆,true为已登陆,false为未登录】

user_info 下的参数:

  • rp_uid 【用户ID】
  • rp_phone 【用户手机号】
  • rp_phonestatus 【手机号是否经过短信验证,字符串1为已验证,0为未验证,某些关键项(比如商家报名)需要短信验证】
  • rp_coin 【热币数量,1人民币=1热币】
  • rp_grade 【热拍经验等级】
  • rp_isp 【手机运营商:移动、联通、电信】
  • rp_province 【手机归属省:北京、上海、湖南、江苏…】
  • rp_city 【手机归属市:北京、上海、长沙、南京、苏州…】
  • rp_lastip 【最后登陆的IP地址】
  • rp_ipaddr 【最后登陆IP地址对应的真实地址】
  • rp_isseller 【是否卖家,字符串1为是,0为否】
  • rp_realname 【身份证上的真实姓名,卖家需要】
  • rp_idcard 【身份证号,卖家需要】
  • user_integral 【用户经验值】
  • order_count 【用户总订单数】

user_avatar 下的参数:

  • status 【是否有头像,true为有,false为无】
  • reason 【用户拥有头像的文本提示】
  • pic_medium 【头像中等大小图,400×400】
  • pic_small 【头像小图,120×120】

2、PHP内部引用调用接口

<?php
require_once("/Data/webapps/m.repai.com/m/phpapi.php"); //PHP引用方式,需要引用的框架入口文件
$result = phpapi_mvc("user", "user_info_api", array("access_token" => "rpat_47be0653fe75e8ae3f3d4fa5de931c24"));
if (empty($result["error"])) {
	var_dump($result); //打印出返回内容,此处输出为PHP数组,格式与客户端调用接口输出的JSON数组json_decode后的内容一样
} else {
	var_dump($result["error"]); //打印出错误内容
}
?>

其中 rpat_47be0653fe75e8ae3f3d4fa5de931c24 为 access_token 示例。

输入参数说明:


输出参数说明:

user_info_api.txt · 最后更改: 2014/08/28 18:49 由 106.2.171.114