This article mainly introduces the use of the c method of thinkphp. It has a certain reference value. Now I share it with everyone. Friends in need can refer to it.
Friends who have used thinkphp know that C The () method is very commonly used in the entire framework. The implementation of the C method is very simple, but its function is very powerful. The following is a detailed explanation and usage examples of the C() method
1. The role of the C method
a. Load and set the user's configuration and save it in the static variable $_config within a C function
b. Read the user's configuration (read from $_congig)
2. Requirements analysis:
1.Set variables
1.Two-dimensional array
C(array('DB_PASSWORD'=>'root','DB_USERNAME'=>'root'),'DB'); C('DB.USER_NAME','XIAOCHEN);
2.One-dimensional array
C('USER_NAME','小陈'); C(array('USER_NAME'=>'chen','USER_HEIGHT'=>'170'));
2. Read variables
One-dimensional: C('USER_NAME');
Two-dimensional: C('DB.DB_PASSWORD' );
3. When debugging, view all configuration information
C();
3. How to store it and why it should be stored like this?
First let's look at a problem $arr=array('db'=>'mysql','DB'=>'mysql','Db'=>'mysql') ; From this array, we can see that db points to mysql, but it occupies three storage spaces. The development of the project is not completed by one person, and everyone's writing habits may be different, so in order to avoid this situation , the unified subscripts are converted to lowercase (of course uppercase is also possible), since the array in the configuration file has only two dimensions at most, it is enough to lowercase the subscript of the one-dimensional array
4 .How is it used in actual combat?
php Because the operation of arrays is very convenient, the configuration file is generally written in a configuration file and returned in the form of an array.
The general format is:
config.php<? return array('DB'=>'mysql',......);
Write variables into C: C(include 'config.php'); After writing, C('DB') can get the value
5. Written by the author (New dynamic addition Function of two-dimensional configuration)
C(array('name'=>'mysql','password'=>'root'),'db') 执行后array('db'=>array('name'=>'mysql','password'=>root))
Code example:
function C($name=null,$value=null){ static $_config = array(); if(!is_null($name)){ if(is_string($name)){ if(is_null($value)){ if(!strpos($name,'.')){ $name = strtolower($name); return isset($_config[$name]) ? $_config[$name] : null; }else{ $name = explode('.',$name); $name[0] = strtolower($name[0]); return isset($_config[$name[0]][$name[1]]) ? $_config[$name[0]][$name[1]] : null; } }else{ if(!strpos($name,'.')){ $_config[strtolower($name)] = $value; }else{ $name = explode('.',$name); $_config[strtolower($name[0])][$name[1]] = $value; } return ; } }elseif(is_array($name)){ if(is_null($value)) $_config = array_merge($_config,$name); else{ $_config[$value] = $name; } return ; } }else{ return empty($_config) ? null: $_config; } }
The above is the entire content of this article. I hope it will be helpful to everyone's learning. For more related content, please pay attention to the PHP Chinese website!
Related recommendations:
The above is the detailed content of Use of thinkphp's c method. For more information, please follow other related articles on the PHP Chinese website!

Load balancing affects session management, but can be resolved with session replication, session stickiness, and centralized session storage. 1. Session Replication Copy session data between servers. 2. Session stickiness directs user requests to the same server. 3. Centralized session storage uses independent servers such as Redis to store session data to ensure data sharing.

Sessionlockingisatechniqueusedtoensureauser'ssessionremainsexclusivetooneuseratatime.Itiscrucialforpreventingdatacorruptionandsecuritybreachesinmulti-userapplications.Sessionlockingisimplementedusingserver-sidelockingmechanisms,suchasReentrantLockinJ

Alternatives to PHP sessions include Cookies, Token-based Authentication, Database-based Sessions, and Redis/Memcached. 1.Cookies manage sessions by storing data on the client, which is simple but low in security. 2.Token-based Authentication uses tokens to verify users, which is highly secure but requires additional logic. 3.Database-basedSessions stores data in the database, which has good scalability but may affect performance. 4. Redis/Memcached uses distributed cache to improve performance and scalability, but requires additional matching

Sessionhijacking refers to an attacker impersonating a user by obtaining the user's sessionID. Prevention methods include: 1) encrypting communication using HTTPS; 2) verifying the source of the sessionID; 3) using a secure sessionID generation algorithm; 4) regularly updating the sessionID.

The article discusses PHP, detailing its full form, main uses in web development, comparison with Python and Java, and its ease of learning for beginners.

PHP handles form data using $\_POST and $\_GET superglobals, with security ensured through validation, sanitization, and secure database interactions.

The article compares PHP and ASP.NET, focusing on their suitability for large-scale web applications, performance differences, and security features. Both are viable for large projects, but PHP is open-source and platform-independent, while ASP.NET,

PHP's case sensitivity varies: functions are insensitive, while variables and classes are sensitive. Best practices include consistent naming and using case-insensitive functions for comparisons.


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Atom editor mac version download
The most popular open source editor

DVWA
Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software

VSCode Windows 64-bit Download
A free and powerful IDE editor launched by Microsoft

MantisBT
Mantis is an easy-to-deploy web-based defect tracking tool designed to aid in product defect tracking. It requires PHP, MySQL and a web server. Check out our demo and hosting services.

Zend Studio 13.0.1
Powerful PHP integrated development environment
