Home Backend Development PHP Tutorial 使用PHP库查找Mongo文档中的ID

使用PHP库查找Mongo文档中的ID

Jun 23, 2016 pm 01:01 PM

作为一名IBM开发人员,这份新的工作意味着我可以玩转数据库为生(这是有史以来最了不起的事情了,我得认真对待)。在我的技术旅程中,我在MongoDB上花了一些时间,它是一个文档型数据库——但我遇到了一个抓取ID记录的问题。因此,下面的代码最终可以帮助我去实现所遇到的问题,我可以参考这些代码,并且如果有人也需要的话,也希望能对帮到你们。

MongoDB and ID

当我在collection插入数据时,我没有设置 _id字段;如果是空的,MongoDB将只生成一个ID并使用它,这对我来说是很好的。当我想获取数据生成标识符时,问题出现了。

如果我通过使用 db.posts.find()来检查我的数据,然而数据会像这样:

{ "_id" : ObjectId("575038831661d710f04111c1"), ...
Copy after login

因此,如果我想通过ID获取,我需要 ObjectId函数来调用ID。

使用PHP库

当我来使用PHP,我找不到这样的一个例子,就是使用新的 MongoDB PHP库以这种方式来使用ID(它是一个很好的库,可以使用它)。此库的旧版本使用一个类被称为 MongoID,并且我知道那不是我想要的——但我检查了文档,我发现它们已更新为指向新的等价!所以,这也是非常有用的,这样能让你知道是否只可以找到更旧的代码示例。

通过一个ID使用PHP库到MongoDB,你需要构建一个 MongoDB\BSON\ObjectID。接下来,我举的例子是博客文章,并且我用它ID来获取记录:

$post = $posts->findOne(["_id" => new MongoDB\BSON\ObjectID($id)]);
Copy after login

之后,我博客更新的记录包括嵌套注释的记录,所以要将一个数组添加到评论集合 _id我知道的一个记录中,我使用的是这段代码:

$result = $posts->updateOne( ["_id" => new MongoDB\BSON\ObjectID($id)], ['$push' => [ "comments" => $new_comment_data ] ] );
Copy after login

在你遇到同样的问题时,希望能给一些指导,并且能为你尽可能的节省更多时间!

原文: Finding Mongo Document IDs Using the PHP Library(译者/孙思)

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Best Graphic Settings
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. How to Fix Audio if You Can't Hear Anyone
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Chat Commands and How to Use Them
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

Explain JSON Web Tokens (JWT) and their use case in PHP APIs. Explain JSON Web Tokens (JWT) and their use case in PHP APIs. Apr 05, 2025 am 12:04 AM

JWT is an open standard based on JSON, used to securely transmit information between parties, mainly for identity authentication and information exchange. 1. JWT consists of three parts: Header, Payload and Signature. 2. The working principle of JWT includes three steps: generating JWT, verifying JWT and parsing Payload. 3. When using JWT for authentication in PHP, JWT can be generated and verified, and user role and permission information can be included in advanced usage. 4. Common errors include signature verification failure, token expiration, and payload oversized. Debugging skills include using debugging tools and logging. 5. Performance optimization and best practices include using appropriate signature algorithms, setting validity periods reasonably,

Explain the concept of late static binding in PHP. Explain the concept of late static binding in PHP. Mar 21, 2025 pm 01:33 PM

Article discusses late static binding (LSB) in PHP, introduced in PHP 5.3, allowing runtime resolution of static method calls for more flexible inheritance.Main issue: LSB vs. traditional polymorphism; LSB's practical applications and potential perfo

Framework Security Features: Protecting against vulnerabilities. Framework Security Features: Protecting against vulnerabilities. Mar 28, 2025 pm 05:11 PM

Article discusses essential security features in frameworks to protect against vulnerabilities, including input validation, authentication, and regular updates.

How to send a POST request containing JSON data using PHP's cURL library? How to send a POST request containing JSON data using PHP's cURL library? Apr 01, 2025 pm 03:12 PM

Sending JSON data using PHP's cURL library In PHP development, it is often necessary to interact with external APIs. One of the common ways is to use cURL library to send POST�...

Customizing/Extending Frameworks: How to add custom functionality. Customizing/Extending Frameworks: How to add custom functionality. Mar 28, 2025 pm 05:12 PM

The article discusses adding custom functionality to frameworks, focusing on understanding architecture, identifying extension points, and best practices for integration and debugging.

Describe the SOLID principles and how they apply to PHP development. Describe the SOLID principles and how they apply to PHP development. Apr 03, 2025 am 12:04 AM

The application of SOLID principle in PHP development includes: 1. Single responsibility principle (SRP): Each class is responsible for only one function. 2. Open and close principle (OCP): Changes are achieved through extension rather than modification. 3. Lisch's Substitution Principle (LSP): Subclasses can replace base classes without affecting program accuracy. 4. Interface isolation principle (ISP): Use fine-grained interfaces to avoid dependencies and unused methods. 5. Dependency inversion principle (DIP): High and low-level modules rely on abstraction and are implemented through dependency injection.

How does session hijacking work and how can you mitigate it in PHP? How does session hijacking work and how can you mitigate it in PHP? Apr 06, 2025 am 12:02 AM

Session hijacking can be achieved through the following steps: 1. Obtain the session ID, 2. Use the session ID, 3. Keep the session active. The methods to prevent session hijacking in PHP include: 1. Use the session_regenerate_id() function to regenerate the session ID, 2. Store session data through the database, 3. Ensure that all session data is transmitted through HTTPS.

See all articles