这种截取对吗
看到一个源码中这样写道:本意是取斜杠,可是这样列,不是取最后一个p了吗,因为-1 是取最后一个啊
echo $php_self;// /index.php
if ('/' == substr($php_self, -1))这么写不对吧 -1不是取最后一个吗
回复讨论(解决方案)
string substr ( string $string , int $start [, int $length ] )
$rest = substr("abcdef", -1); // 返回 "f"
如果 start 是负数,返回的字符串将从 string 结尾处向前数第 start 个字符开始。
string substr ( string $string , int $start [, int $length ] )
$rest = substr("abcdef", -1); // 返回 "f"
如果 start 是负数,返回的字符串将从 string 结尾处向前数第 start 个字符开始。
如果按你说的推理,这句if ('/' == substr($php_self, -1))显然是不对的,可是这句话的目的是想判断是真值的情况,不知ecshop这么写是怎么回事
string substr ( string $string , int $start [, int $length ] )
$rest = substr("abcdef", -1); // 返回 "f"
如果 start 是负数,返回的字符串将从 string 结尾处向前数第 start 个字符开始。
如果按你说的推理,这句if ('/' == substr($php_self, -1))显然是不对的,可是这句话的目的是想判断是真值的情况,不知ecshop这么写是怎么回事
他这个是要取 index.php/fasdfasdfasdfaf ,意思是取到index.php后面的部分
看index.php后面有没有 /
if ('/' == substr($php_self, -1))
只不过是检查一下 $php_self 的最后一个字符是否为 /
对函数的用法,你并没有理解错
但是对算法的目的,没有清晰的认知
所以说,看别人的代码时一定要去体会作者的思路。
因为同样的效果,你可能使用完全相佐的算法
思路不同,写法也不同
比如我希望 $php_self 后面没有 /
那么会写 $php_self = trim($php_self, '/');
管他有没有,下去掉再说
又比如我希望 $php_self 后面有 /
那么会写 $php_self = trim($php_self, '/') . ‘/’
并不需要先判断在操作
if ('/' == substr($php_self, -1)) 这个是检查最后一个字符是否/

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics



Alipay PHP...

JWT is an open standard based on JSON, used to securely transmit information between parties, mainly for identity authentication and information exchange. 1. JWT consists of three parts: Header, Payload and Signature. 2. The working principle of JWT includes three steps: generating JWT, verifying JWT and parsing Payload. 3. When using JWT for authentication in PHP, JWT can be generated and verified, and user role and permission information can be included in advanced usage. 4. Common errors include signature verification failure, token expiration, and payload oversized. Debugging skills include using debugging tools and logging. 5. Performance optimization and best practices include using appropriate signature algorithms, setting validity periods reasonably,

The application of SOLID principle in PHP development includes: 1. Single responsibility principle (SRP): Each class is responsible for only one function. 2. Open and close principle (OCP): Changes are achieved through extension rather than modification. 3. Lisch's Substitution Principle (LSP): Subclasses can replace base classes without affecting program accuracy. 4. Interface isolation principle (ISP): Use fine-grained interfaces to avoid dependencies and unused methods. 5. Dependency inversion principle (DIP): High and low-level modules rely on abstraction and are implemented through dependency injection.

How to automatically set the permissions of unixsocket after the system restarts. Every time the system restarts, we need to execute the following command to modify the permissions of unixsocket: sudo...

How to debug CLI mode in PHPStorm? When developing with PHPStorm, sometimes we need to debug PHP in command line interface (CLI) mode...

Article discusses late static binding (LSB) in PHP, introduced in PHP 5.3, allowing runtime resolution of static method calls for more flexible inheritance.Main issue: LSB vs. traditional polymorphism; LSB's practical applications and potential perfo

Sending JSON data using PHP's cURL library In PHP development, it is often necessary to interact with external APIs. One of the common ways is to use cURL library to send POST�...

Article discusses essential security features in frameworks to protect against vulnerabilities, including input validation, authentication, and regular updates.
