function connect($server, $login, $password, $db) {
return mysqli_connect($server, $login, $password, $db)
}
$connection = connect($server, $login, $password, $db);
function connect() {
global $server;
global $login;
global $password;
global $db;
return mysqli_connect($server, $login, $password, $db);
}
$connection = connect($server, $login, $password, $db)
$connect = function() use ($server, $login, $password, $db) {
return mysqli_connect($server, $login, $password, $db);
};
$connection = $connect();
success: function(data) {
var rowsHtml = '';
$.each(data, function(index,value) {
rowsHtml += '<tr>';
rowsHtml += ' <td>' + value['id'] + '</td>';
rowsHtml += ' <td>' + value['owner'] + '</td>';
rowsHtml += '</tr>';
}
var html = '<table><thead><tr><td>Id</td><td>Owner</td></tr></thead><tbody>' + rowsHtml + '</tbody></table>';
$(document).append(html);
}
array("Accept:application/json")
Посмотрел в логах в чем причина[Sat Feb 10 12:52:58.622686 2018] [mpm_prefork:notice] [pid 7009] AH00169: caught SIGTERM, shutting down
<VirtualHost *:80>
ServerName yii2-app
DirectoryIndex index.php
DocumentRoot /var/www/trainingYii/web/
<Directory /var/www/trainingYii/web/>
Options +FollowSymLinks +MultiViews
AllowOverride All
Order allow,deny
allow from all
</Directory>
ErrorLog /var/www/trainingYii/runtime/logyii2-app/runtime/logs/apache-error.log
CustomLog /var/www/trainingYii/runtime/logs/apache-access.log combined
</VirtualHost>
И делаю символическую ссылкуsudo ln -s /etc/apache2/sites-available/yii2-app.conf /etc/apache2/sites-enabled/yii2-app.conf
a2ensite yii2-app
правильно ли сделан запрос?
И я так понял это 100% защита от sql инъекций?
function transform($str) {
$prepared = str_replace(";", ",", $str);
$elements = explode(",", $prepared);
$transformedElements = array_map(function($element) {
return strpos($element, ":") === false ? $element : explode(":", $element)[1];
}, $elements);
return implode(",", $transformedElements);
}
$str = "value-1:test;2:test_2,test3";
$transformed = transform($str);
var_dump($transformed);
$str = "value-1:test;2:test_2,test3";
$transformed = implode(",", array_map(function($element) {
return strpos($element, ":") === false ? $element : explode(":", $element)[1];
}, explode(",", str_replace(";", ",", $str))));
var_dump($transformed);
function getElementsByValues(values) {
var allElements = $('[data-value]');
var filtered = [];
allElements.each(function() {
var element = $(this);
var elementValues = element.data('value').split(" ");
var elementFiltered = false;
values.forEach(function(value) {
if (elementValues.indexOf(value) !== -1 && !elementFiltered) {
filtered.push(element);
elementFiltered = true;
}
});
});
return filtered;
}
var str = 'слово1 слово3';
var values = str.split(' ');
var elements = getElementsByValues(values);
$('.reload-cart-button').on('click', function(ev) {
ev.preventDefault();
$('#cart').load(window.location.href + ' #cart > *');
})
$search_platforms = cot_import('splatform', 'G', 'ARR');
$where['splatform'] = [];
foreach ($search_platforms as $search_platform) {
$where['splatform'][] = "FIND_IN_SET('{$search_platform}', `game_platform`) > 0";
}
$where['splatform'] = "(" . implode(" OR ", $where['splatform']) . ")";