关于账户激活的奇葩问题,
请教大神我这段代码有什么问题,以前好好的 ,现在却出现莫名问题,编辑器是netbeans,也重新安装过.
现在运行时能执行到第二个_query函数,也就是对数据库的操作成功了,之后就跳过mysql_affected_rows()那段直接执行下面的 else {
_alert_back('非法操作');
}
if (isset($_GET['active']) && $_GET['action'] === 'ok') { $_active = _mysql_string($_GET['active']); if (mysql_fetch_array(_query("SELECT tg_active FROM tg_user WHERE tg_active='$_active' LIMIT 1"),MYSQL_ASSOC)) { //将tg_active设置为actived _query("UPDATE tg_user SET tg_active='actived' WHERE tg_active='$_active' LIMIT 1"); if (mysql_affected_rows() == 1) { mysql_close(); _location('账户激活成功','login.php'); } else { mysql_close(); _location('账户激活失败','register.php'); } } else { _alert_back('非法操作'); }}
回复讨论(解决方案)
检查了一下你的代码,应是
if (mysql_fetch_array(_query("SELECT tg_active FROM tg_user WHERE tg_active='$_active' LIMIT 1"),MYSQL_ASSOC))
此段就发生问题,你确定有执行到_query阶段
if (mysql_fetch_array(_query("SELECT tg_active FROM tg_user WHERE tg_active='$_active' LIMIT 1"),MYSQL_ASSOC)) { //将tg_active设置为actived _query("UPDATE tg_user SET tg_active='actived' WHERE tg_active='$_active' LIMIT 1"); if (mysql_affected_rows() == 1) { mysql_close(); _location('账户激活成功','login.php'); } else { mysql_close(); _location('账户激活失败','register.php'); } } else { _alert_back('非法操作'); }
嗯 是的 我去表里看过了 也试了好多次 我也有打印出mysql_fetch_array 有值
就你贴出的代码而言,是不可能出现你说的情况的
因为
_query("UPDATE tg_user SET ....
和
_alert_back('非法操作');
分属
if (mysql_fetch_array(_query("SELECT tg_active FROM...
的两个分支
不可能同时被执行!
因此,可以认为你实际运行的不是这段代码
if (isset($_GET['active']) && $_GET['action'] === 'ok') { $_active = _mysql_string($_GET['active']); if (mysql_fetch_array(_query("SELECT tg_active FROM tg_user WHERE tg_active='$_active' LIMIT 1"),MYSQL_ASSOC){ echo "ok"; } else { _alert_back('非法操作'); }}
这样会出现什麽结果?
就你贴出的代码而言,是不可能出现你说的情况的
因为
_query("UPDATE tg_user SET ....
和
_alert_back('非法操作');
分属
if (mysql_fetch_array(_query("SELECT tg_active FROM...
的两个分支
不可能同时被执行!
因此,可以认为你实际运行的不是这段代码
对啊 所以我才会说奇葩啊 我都找了2天了 还没找出问题
if (isset($_GET['active']) && $_GET['action'] === 'ok') { $_active = _mysql_string($_GET['active']); if (mysql_fetch_array(_query("SELECT tg_active FROM tg_user WHERE tg_active='$_active' LIMIT 1"),MYSQL_ASSOC){ echo "ok"; } else { _alert_back('非法操作'); }}
这样会出现什麽结果?
打印出OK ,
最新又出现的一个情况是重启好几次电脑后,再打开项目后,第一个注册的可以激活,后面的就出现非法操作了
我都晕了 怀疑是不是电脑系统有问题了
你打印出 __FILE__ 和 __LINE__ 就可知道你找错了地方
还是不行, 算了 先不找了 等一段时间再看看吧 谢谢你们2位了

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics



Alipay PHP...

JWT is an open standard based on JSON, used to securely transmit information between parties, mainly for identity authentication and information exchange. 1. JWT consists of three parts: Header, Payload and Signature. 2. The working principle of JWT includes three steps: generating JWT, verifying JWT and parsing Payload. 3. When using JWT for authentication in PHP, JWT can be generated and verified, and user role and permission information can be included in advanced usage. 4. Common errors include signature verification failure, token expiration, and payload oversized. Debugging skills include using debugging tools and logging. 5. Performance optimization and best practices include using appropriate signature algorithms, setting validity periods reasonably,

The application of SOLID principle in PHP development includes: 1. Single responsibility principle (SRP): Each class is responsible for only one function. 2. Open and close principle (OCP): Changes are achieved through extension rather than modification. 3. Lisch's Substitution Principle (LSP): Subclasses can replace base classes without affecting program accuracy. 4. Interface isolation principle (ISP): Use fine-grained interfaces to avoid dependencies and unused methods. 5. Dependency inversion principle (DIP): High and low-level modules rely on abstraction and are implemented through dependency injection.

How to automatically set the permissions of unixsocket after the system restarts. Every time the system restarts, we need to execute the following command to modify the permissions of unixsocket: sudo...

Article discusses late static binding (LSB) in PHP, introduced in PHP 5.3, allowing runtime resolution of static method calls for more flexible inheritance.Main issue: LSB vs. traditional polymorphism; LSB's practical applications and potential perfo

Sending JSON data using PHP's cURL library In PHP development, it is often necessary to interact with external APIs. One of the common ways is to use cURL library to send POST�...

Article discusses essential security features in frameworks to protect against vulnerabilities, including input validation, authentication, and regular updates.

How to debug CLI mode in PHPStorm? When developing with PHPStorm, sometimes we need to debug PHP in command line interface (CLI) mode...
