站点工具

Hotfix release available: 2024-02-06a "Kaos". upgrade now! [55.1] (what's this?)
New release available: 2024-02-06 "Kaos". upgrade now! [55] (what's this?)
Hotfix release available: 2023-04-04a "Jack Jackrum". upgrade now! [54.1] (what's this?)
New release available: 2023-04-04 "Jack Jackrum". upgrade now! [54] (what's this?)
Hotfix release available: 2022-07-31b "Igor". upgrade now! [53.1] (what's this?)
Hotfix release available: 2022-07-31a "Igor". upgrade now! [53] (what's this?)
New release available: 2022-07-31 "Igor". upgrade now! [52.2] (what's this?)
New release candidate 2 available: rc2022-06-26 "Igor". upgrade now! [52.1] (what's this?)
New release candidate available: 2022-06-26 "Igor". upgrade now! [52] (what's this?)
Hotfix release available: 2020-07-29a "Hogfather". upgrade now! [51.4] (what's this?)
New release available: 2020-07-29 "Hogfather". upgrade now! [51.3] (what's this?)
New release candidate 3 available: 2020-06-09 "Hogfather". upgrade now! [51.2] (what's this?)
New release candidate 2 available: 2020-06-01 "Hogfather". upgrade now! [51.1] (what's this?)
New release candidate available: 2020-06-01 "Hogfather". upgrade now! [51] (what's this?)
Hotfix release available: 2018-04-22c "Greebo". upgrade now! [50.3] (what's this?)
Hotfix release available: 2018-04-22b "Greebo". upgrade now! [50.2] (what's this?)
Hotfix release available: 2018-04-22a "Greebo". upgrade now! [50.1] (what's this?)
New release available: 2018-04-22 "Greebo". upgrade now! [50] (what's this?)
Hotfix release available: 2017-02-19g "Frusterick Manners". upgrade now! [49.7] (what's this?)
Hotfix release available: 2017-02-19f "Frusterick Manners". upgrade now! [49.6] (what's this?)
Hotfix release available: 2017-02-19e "Frusterick Manners". upgrade now! [49.5] (what's this?)
Hotfix release available fixing CVE-2017-12979 and CVE-2017-12980: 2017-02-19d "Frusterick Manners". upgrade now! [49.4] (what's this?)
Hotfix release available fixing CVE-2017-12583: 2017-02-19c "Frusterick Manners". upgrade now! [49.3] (what's this?)
Hotfix release available fixing security token and media manager: 2017-02-19b "Frusterick Manners". upgrade now! [49.2] (what's this?)
Hotfix release available fixing install and media manager issues: 2017-02-19a "Frusterick Manners". upgrade now! [49.1] (what's this?)
New release available: 2017-02-19 "Frusterick Manners". upgrade now! [49] (what's this?)
Hotfix release available: 2016-06-26e "Elenor of Tsort". upgrade now! [48.5] (what's this?)
Hotfix release available fixing CVE-2017-12979 and CVE-2017-12980: 2016-06-26d "Elenor of Tsort". upgrade now! [48.4] (what's this?)
Hotfix release available fixing CVE-2017-12583: 2016-06-26c "Elenor of Tsort". upgrade now! [48.3] (what's this?)
Hotfix release available fixing security token: 2016-06-26b "Elenor of Tsort". upgrade now! [48.2] (what's this?)
Hotfix release available fixing authad issues: 2016-06-26a "Elenor of Tsort". upgrade now! [48.1] (what's this?)
New release available: 2016-06-26 "Elenor of Tsort". upgrade now! [48] (what's this?)
Hotfix release available: 2015-08-10a "Detritus". upgrade now! [47.1] (what's this?)
New release available: 2015-08-10 "Detritus". upgrade now! [47] (what's this?)
Hotfix release available: 2014-09-29d "Hrun". upgrade now! [46.4] (what's this?)
Hotfix release available: 2014-09-29c "Hrun". upgrade now! [46.3] (what's this?)
Hotfix release available to prevent XSS attack via SWF uploads: 2014-09-29b "Hrun". upgrade now! [46.2] (what's this?)
Hotfix release available: 2014-09-29a "Hrun". upgrade now! [46.1] (what's this?)
New release available: 2014-09-29 "Hrun". upgrade now! [46] (what's this?)
Hotfix release available: 2014-05-05e "Ponder Stibbons". upgrade now! [44.5] (what's this?)
Hotfix release available: 2014-05-05d "Ponder Stibbons". upgrade now! [44.4] (what's this?)
Hotfix release available to prevent XSS attack via SWF uploads: 2014-05-05c "Ponder Stibbons". upgrade now! [44.3] (what's this?)
Security Hotfix 2014-05-05b to prevent zero byte attacks on external auth systems is available. upgrade now! [44.2] (what's this?)
Security Hotfix 2014-05-05a for Issue 765 available. upgrade now! [44.1] (what's this?)

user_info_api

差别

这里会显示出您选择的修订版和当前版本之间的差别。

到此差别页面的链接

Both sides previous revision 前一修订版
后一修订版
前一修订版
user_info_api [2014/06/11 17:29]
106.2.171.114
user_info_api [2014/08/28 18:49] (当前版本)
106.2.171.114
行 3: 行 3:
  
 ==== 1、客户端调用接口 ==== ==== 1、客户端调用接口 ====
 +
 ''​https://​m.repai.com/​user/​user_info_api/​access_token/​rpat_47be0653fe75e8ae3f3d4fa5de931c24''​ ''​https://​m.repai.com/​user/​user_info_api/​access_token/​rpat_47be0653fe75e8ae3f3d4fa5de931c24''​
  
行 16: 行 17:
  
   * JSON格式输出,错误时,is_login值为false,表示未登陆,示例如下:   * JSON格式输出,错误时,is_login值为false,表示未登陆,示例如下:
-'{"​is_login":​false}''​+ 
 + {"​is_login":​false}
  
 返回false的原因为 access_token 错误或过期(有效期30天,如果30天内用 access_token 访问过此接口,有效期自动延长) 返回false的原因为 access_token 错误或过期(有效期30天,如果30天内用 access_token 访问过此接口,有效期自动延长)
  
   * JSON格式输出,正确时,is_login值为true,表示已登陆,并输出用户信息,示例如下:   * JSON格式输出,正确时,is_login值为true,表示已登陆,并输出用户信息,示例如下:
-''​{"​is_login":​true,"​user_info":​{"​rp_uid":"​1","​rp_phone":"​15901283960","​rp_phonestatus":"​0","​rp_coin":"​0"​,"rp_grade":"​0"​,"​rp_isp":"​\u79fb\u52a8","​rp_province":"​\u5317\u4eac","​rp_city":"​\u5317\u4eac","​rp_lastip":"​106.2.171.114","​rp_ipaddr":null,"rp_isseller":"​0","​rp_realname":​null,"​rp_idcard":null}}}''​+ 
 + { 
 + "​is_login":​ true, 
 + "​user_info":​ { 
 + "rp_city": "北京", 
 + "rp_coin": "0", 
 + "rp_grade": "​0",​ 
 + "rp_idcard": ​null, 
 + "rp_ipaddr": ​null, 
 + "​rp_isp":​ "移动", 
 + "rp_isseller": "0", 
 + "​rp_lastip":​ "​106.2.171.114",​ 
 + "rp_phone": ​"​15901283960"​, 
 + "rp_phonestatus": "​0",​ 
 + "​rp_province":​ "​北京",​ 
 + "​rp_realname":​ null, 
 + "rp_uid": ​"​1",​ 
 + "​user_integral":​ "​1",​ 
 + "​order_count":​ "​35"​ 
 + }
 + "​user_avatar":​ { 
 + "​pic_medium":​ "​http://​pic.repaiapp.com/​pic/​0f/​52/​50/​0f52508b97a7a7900fe206c276158ce425ae6723.jpg@0e_120w_120h_0c_0i_1o_90Q_1x.jpg",​ 
 + "​pic_small":​ "​http://​pic.repaiapp.com/​pic/​0f/​52/​50/​0f52508b97a7a7900fe206c276158ce425ae6723.jpg@0e_400w_400h_0c_0i_1o_90Q_1x.jpg",​ 
 + "​reason":​ "​用户拥有头像!",​ 
 + "​status":​ true 
 + } 
 + }
  
   * is_login 【是否登陆,true为已登陆,false为未登录】   * is_login 【是否登陆,true为已登陆,false为未登录】
 +
 +user_info 下的参数:
  
   * rp_uid 【用户ID】   * rp_uid 【用户ID】
行 31: 行 61:
   * rp_phonestatus 【手机号是否经过短信验证,字符串1为已验证,0为未验证,某些关键项(比如商家报名)需要短信验证】   * rp_phonestatus 【手机号是否经过短信验证,字符串1为已验证,0为未验证,某些关键项(比如商家报名)需要短信验证】
  
-  * rp_coin 【热币数量,1人民币=100热币】+  * rp_coin 【热币数量,1人民币=1热币】
  
-  * rp_grade 【热拍经验积分+  * rp_grade 【热拍经验等级
  
   * rp_isp 【手机运营商:移动、联通、电信】   * rp_isp 【手机运营商:移动、联通、电信】
行 50: 行 80:
  
   * rp_idcard 【身份证号,卖家需要】   * rp_idcard 【身份证号,卖家需要】
 +
 +  * user_integral ​ 【用户经验值】
 +
 +  * order_count 【用户总订单数】
 +
 +user_avatar 下的参数:
 +
 +  * status 【是否有头像,true为有,false为无】
 +
 +  * reason 【用户拥有头像的文本提示】
 +
 +  * pic_medium 【头像中等大小图,400x400】
 +
 +  * pic_small 【头像小图,120x120】
 +
 +
 +----
 +
  
 ==== 2、PHP内部引用调用接口 ==== ==== 2、PHP内部引用调用接口 ====
-''​<?php+ 
 + <?php
  require_once("/​Data/​webapps/​m.repai.com/​m/​phpapi.php"​);​ //​PHP引用方式,需要引用的框架入口文件  require_once("/​Data/​webapps/​m.repai.com/​m/​phpapi.php"​);​ //​PHP引用方式,需要引用的框架入口文件
  $result = phpapi_mvc("​user",​ "​user_info_api",​ array("​access_token"​ => "​rpat_47be0653fe75e8ae3f3d4fa5de931c24"​));​  $result = phpapi_mvc("​user",​ "​user_info_api",​ array("​access_token"​ => "​rpat_47be0653fe75e8ae3f3d4fa5de931c24"​));​
行 60: 行 109:
  var_dump($result["​error"​]);​ //​打印出错误内容  var_dump($result["​error"​]);​ //​打印出错误内容
  }  }
-?>''​+ ?>
  
 其中 rpat_47be0653fe75e8ae3f3d4fa5de931c24 为 access_token 示例。 其中 rpat_47be0653fe75e8ae3f3d4fa5de931c24 为 access_token 示例。
行 73: 行 122:
  
   * 参见客户端调用接口的输出参数   * 参见客户端调用接口的输出参数
 +
 +[[reg_login_api|相关接口:APP客户端用户注册、登陆一体化接口]]
  
 [[start|返回首页]] [[start|返回首页]]
user_info_api.1402478992.txt.gz · 最后更改: 2014/06/11 17:29 由 106.2.171.114