search
HomeWeb Front-endJS TutorialAnalysis of key points of JS regular expressions

Analysis of key points of JS regular expressions

Jan 30, 2018 pm 05:20 PM
javascriptanalyzeexpression

This article mainly shares with you the key points of JS regular expressions. Since I was looking at the source code of VueJS before and saw the HtmlParser part, I felt that the basic knowledge of regular expressions I had seen before was completely insufficient. Now I read through the blog information and put some information into it. The difficult-to-use parts of regular expressions in JS are summarized to make it easier for you and your SF friends to read.

Regular grouping

Repeated matching

For repeated matching, we often use Let’s practice the grouping function of regular expressions by using regular matching IP addresses.

Assume that the IP address we want to match is between 0.0.0.0 - 255.255.255.255. We can intuitively understand that we only You need to match three digits + dot three times, and then match three digits once.

The three digits + dot mentioned here is a rule we are talking about, we can use it in the expression Convert them into rules: \d{1,3}\.. When we wrap the rules in brackets, they become groups: (\d{1,3}\ .), so the regular expression matching IP addresses can be written as: (\d{1,3}\.){3}\d{1,3}

Another way of thinking, we can also match like this: \d{1,3}(\.\d{1,3}){3}

Extension: If you are smart, you may have already It occurred to me that there is an omission in the matching of \d{1,3}. In the actual production process, \d{1,3} may match 999 kind of number, it is a wrong IP address segment. The real IP address regular matching is posted here for your reference: ((25[0-5]|2[0-4]\d|((1\ d{2})|([1-9]?\d)))\.){3}(25[0-5]|2[0-4]\d|((1\d{2}) |([1-9]?\d))) , the pleasant thing is that the grouping strategy it uses remains the same.

Backreference (reverse reference)

We consider a very special situation. When we want to match the same four IP segments, such as 100.100.100.100, the strategy of repeated matching groups fails: repeated matching of groups does not guarantee matching the same number-> ; At this time we need to use the power of the Backward Reference strategy (Young man, do you long for power? 2333, poke my avatar and take you to explore the literary and artistic path where music and code are intertwined.)

Backreferences have different syntaxes when writing regular expressions in different languages. We discuss the most common one in JS, which is a backreference in the form: \number, where number represents the serial number of the group.

Give you a simple chestnut, you can remember it instantly. If we want to match repeated three-digit numbers, we mark the rule of matching a number as a group: (\d), repeat matching the specific content of this group (the first group) three times: (\d)\1, thus achieving the goal.

We can easily distinguish repeated matching and backward reference: the former is to repeatedly match the same rule, and the latter is to match the specific content of the group.

Default Some rules need to be understood and remembered:

  • \0 represents the matching content of the entire regular expression

Regular Assertion

I still remember that I read an article called , which mentioned regular assertion.
I felt at the time It’s really easy to understand at a glance. But unfortunately, in actual production, there are too few cases of using various complex regular expressions. If I didn’t browse Baidu today, I’m afraid I wouldn’t be able to remember the classification of assertions and various usage methods.

The literal meaning of assertion is to conclude that the (program) running until this point (result) is such a "scenario". It describes a scenario, in other words, it is A "certain scenario". But what we need to remember is that our "result" is not included in the "scenario".

VueJS needs to match HTML tags, so we match: '< 'Not Fault' in ;segment>Not Fault' is an example.

If we use ordinary regular expressions, such as /<segment>.*</segment>&gt ;/ will match the entire string 'Not Fault'. We use assertions and think in terms of "scenarios": '' and '' It is a "certain scenario". The result we need to match is: 'Not Fault'. No matter how the characters inside the tag change, the tag head and tag tail remain unchanged.

At one go, we Continue below

Precede assertion

Precede assertion, this is how I understand it: match the content first, and then make "scenario" assumptions.

Place it in our previous chestnut , it matches like this, and keeps matching content until it encounters the '' scenario. The syntax is as follows: (?=)

Post assertion

Later assertion, my understanding is: match the scene first, and then match the content.

Place it in our previous chestnut, first match the '' scene, and then continue to The following matching content, the syntax is as follows: (?)

Practice

Regular expressions match string content. So I bound the understanding of "first" and "last" to the order of content matching to facilitate understanding.

We combine the preceding assertion and the latter assertion. The entire expression is as follows: (?).*(?=), we can Obtained the desired result: 'Not Fault'.

"Positive and negative" assertion

In fact, what we just did was a positive scenario, and in actual situations there is also "this scenario is not satisfied" Usage scenarios.

For example, the expression we just used: (?).*(?=) is definitely ' ' '' scenario actually uses "positive post-assertion" and "positive first assertion" to match content. "Positive" represents a positive state.

The negative assertion is an assertion that does not satisfy the scenario... The syntax is to replace the equal sign in the positive assertion with an exclamation mark:

  • Negative look-ahead assertion(?!)

  • Negative post assertion(?

For example: ['1999', '2099','2199'...'9099'] If we want to match all years ending with '99' except '1999', we can use the expression: (?

Related recommendations:

Commonly used basic syntax of JavaScript regular expressions

Brother Zhu talks about PHP regular expressions Where are expressions and regular expressions used?

JS password strength verification function example based on regular expression_javascript skills


The above is the detailed content of Analysis of key points of JS regular expressions. For more information, please follow other related articles on the PHP Chinese website!

Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
Understanding the JavaScript Engine: Implementation DetailsUnderstanding the JavaScript Engine: Implementation DetailsApr 17, 2025 am 12:05 AM

Understanding how JavaScript engine works internally is important to developers because it helps write more efficient code and understand performance bottlenecks and optimization strategies. 1) The engine's workflow includes three stages: parsing, compiling and execution; 2) During the execution process, the engine will perform dynamic optimization, such as inline cache and hidden classes; 3) Best practices include avoiding global variables, optimizing loops, using const and lets, and avoiding excessive use of closures.

Python vs. JavaScript: The Learning Curve and Ease of UsePython vs. JavaScript: The Learning Curve and Ease of UseApr 16, 2025 am 12:12 AM

Python is more suitable for beginners, with a smooth learning curve and concise syntax; JavaScript is suitable for front-end development, with a steep learning curve and flexible syntax. 1. Python syntax is intuitive and suitable for data science and back-end development. 2. JavaScript is flexible and widely used in front-end and server-side programming.

Python vs. JavaScript: Community, Libraries, and ResourcesPython vs. JavaScript: Community, Libraries, and ResourcesApr 15, 2025 am 12:16 AM

Python and JavaScript have their own advantages and disadvantages in terms of community, libraries and resources. 1) The Python community is friendly and suitable for beginners, but the front-end development resources are not as rich as JavaScript. 2) Python is powerful in data science and machine learning libraries, while JavaScript is better in front-end development libraries and frameworks. 3) Both have rich learning resources, but Python is suitable for starting with official documents, while JavaScript is better with MDNWebDocs. The choice should be based on project needs and personal interests.

From C/C   to JavaScript: How It All WorksFrom C/C to JavaScript: How It All WorksApr 14, 2025 am 12:05 AM

The shift from C/C to JavaScript requires adapting to dynamic typing, garbage collection and asynchronous programming. 1) C/C is a statically typed language that requires manual memory management, while JavaScript is dynamically typed and garbage collection is automatically processed. 2) C/C needs to be compiled into machine code, while JavaScript is an interpreted language. 3) JavaScript introduces concepts such as closures, prototype chains and Promise, which enhances flexibility and asynchronous programming capabilities.

JavaScript Engines: Comparing ImplementationsJavaScript Engines: Comparing ImplementationsApr 13, 2025 am 12:05 AM

Different JavaScript engines have different effects when parsing and executing JavaScript code, because the implementation principles and optimization strategies of each engine differ. 1. Lexical analysis: convert source code into lexical unit. 2. Grammar analysis: Generate an abstract syntax tree. 3. Optimization and compilation: Generate machine code through the JIT compiler. 4. Execute: Run the machine code. V8 engine optimizes through instant compilation and hidden class, SpiderMonkey uses a type inference system, resulting in different performance performance on the same code.

Beyond the Browser: JavaScript in the Real WorldBeyond the Browser: JavaScript in the Real WorldApr 12, 2025 am 12:06 AM

JavaScript's applications in the real world include server-side programming, mobile application development and Internet of Things control: 1. Server-side programming is realized through Node.js, suitable for high concurrent request processing. 2. Mobile application development is carried out through ReactNative and supports cross-platform deployment. 3. Used for IoT device control through Johnny-Five library, suitable for hardware interaction.

Building a Multi-Tenant SaaS Application with Next.js (Backend Integration)Building a Multi-Tenant SaaS Application with Next.js (Backend Integration)Apr 11, 2025 am 08:23 AM

I built a functional multi-tenant SaaS application (an EdTech app) with your everyday tech tool and you can do the same. First, what’s a multi-tenant SaaS application? Multi-tenant SaaS applications let you serve multiple customers from a sing

How to Build a Multi-Tenant SaaS Application with Next.js (Frontend Integration)How to Build a Multi-Tenant SaaS Application with Next.js (Frontend Integration)Apr 11, 2025 am 08:22 AM

This article demonstrates frontend integration with a backend secured by Permit, building a functional EdTech SaaS application using Next.js. The frontend fetches user permissions to control UI visibility and ensures API requests adhere to role-base

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
1 months agoBy尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Best Graphic Settings
1 months agoBy尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. How to Fix Audio if You Can't Hear Anyone
1 months agoBy尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Chat Commands and How to Use Them
1 months agoBy尊渡假赌尊渡假赌尊渡假赌

Hot Tools

SecLists

SecLists

SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

PhpStorm Mac version

PhpStorm Mac version

The latest (2018.2.1) professional PHP integrated development tool

DVWA

DVWA

Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software

Dreamweaver Mac version

Dreamweaver Mac version

Visual web development tools

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools