Two implementation methods of php file upload, _PHP tutorial
Jul 12, 2016 am 08:55 AMTwo implementation methods of php file upload,
There are generally two ways to upload files:
There are two types:
1. Standard input form method, typically using $_FILES to receive;
2. Transmit in Base64 format, usually AJAX asynchronous upload.
The first type
The standard input form method is suitable for uploading large files and supports batch processing. A few key sentences of html code:
<form enctype="multipart/form-data" method="post" action="upload.php""> <input type="file" name="id_pic[]" accept="image/*" class="form-control" multiple /> <input type="submit" value="上傳 " /> </form>
Different names:
<form enctype="multipart/form-data" method="post" action="upload.php""> <input type="file" name="id_pic_1" accept="image/*" class="form-control" /> <input type="file" name="id_pic_2" accept="image/*" class="form-control" /> <input type="submit" value="上傳 " /> </form>
Where enctype="multipart/form-data" is essential for file upload. In addition, type="file" sets the input type, and accept="image/*" specifies priority in uploading images (MIME reference manual). Multiple supports selecting multiple files at one time, and pic[] receives multiple files in the form of an array. The mobile terminal can also add the parameter capture="camera" to select the camera to take pictures and upload them.
Backend processing:
Get uploaded files through $_FILES.
$files = $_FILES;
When transferring multiple files, if the names are different, the format of the returned $_FILES array will be different.
When the names are the same:
array(1) { ["id_pic"] => array(5) { ["name"] => array(2) { [0] => string(5) "1.jpg" [1] => string(5) "2.jpg" } ["type"] => array(2) { [0] => string(10) "image/jpeg" [1] => string(10) "image/jpeg" } ["tmp_name"] => array(2) { [0] => string(27) "C:\Windows\Temp\php7A7E.tmp" [1] => string(27) "C:\Windows\Temp\php7A7F.tmp" } ["error"] => array(2) { [0] => int(0) [1] => int(0) } ["size"] => array(2) { [0] => int(77357) [1] => int(56720) } } }
When the names are different:
array(2) { ["id_pic_1"] => array(5) { ["name"] => string(5) "1.jpg" ["type"] => string(10) "image/jpeg" ["tmp_name"] => string(27) "C:\Windows\Temp\phpBBEE.tmp" ["error"] => int(0) ["size"] => int(77357) } ["id_pic_2"] => array(5) { ["name"] => string(5) "2.jpg" ["type"] => string(10) "image/jpeg" ["tmp_name"] => string(27) "C:\Windows\Temp\phpBBEF.tmp" ["error"] => int(0) ["size"] => int(56720) } }
When performing foreach traversal on $_FILES, the previous output format is not very convenient. The latter can be traversed directly. We can write a method for unified conversion:
function dealFiles($files) { $fileArray = array(); $n = 0; foreach ($files as $key=>$file){ if(is_array($file['name'])) { $keys = array_keys($file); $count = count($file['name']); for ($i=0; $i<$count; $i++) { $fileArray[$n]['key'] = $key; foreach ($keys as $_key){ $fileArray[$n][$_key] = $file[$_key][$i]; } $n++; } }else{ $fileArray = $files; break; } } return $fileArray; }
Okay, I talked about how the backend processes the received $_FILES array and converts it into a unified format. The next tasks are mainly:
1. Check whether the uploaded file is illegal;
2. Check whether the uploaded file exceeds the size;
3. Check whether the saved path exists and whether it is writable;
4. File rename;
A very important function is used in the upload process: move_uploaded_file(filename, $destination) to perform file moving operations. Move $_FILES['id_pic']['tmp_name'] to the new path. Of course, before moving, you can use is_uploaded_file($_FILES['id_pic']['tmp_name']) to determine whether the file is uploaded normally.
Multiple file uploads use move_uploaded_file() multiple times in a loop to perform moving operations.
Second type
Mainly upload pictures.
Use the change event of the input to process the image (such as compression) with canvas, and then send the file stream to the backend via ajax.
The basic principle is to render the image through canvas, and then compress and save it into a base64 string through the toDataURL method (can be compiled into a jpg format image).
Backend processing:
The backend will eventually receive the base64 string sent by the frontend, and then process the string into an image. Specifically, please use the keyword base64 to image development language for Google|Baidu. There is a base64Len in the result generated by the front end, which is the length of the string, and the back end should check to confirm whether the submission is complete.
//php示例: $img = base64_decode($_POST['img']); $img = imagecreatefromstring($img);
The above is the entire content of this article, I hope it will be helpful to everyone’s study.
Articles you may be interested in:
- php file upload suffix name and file type comparison table (covering almost all files)
- Example of php ajax implementation of image file upload function
- Complete example of video file upload in PHP
- Using Session and Javascript in PHP to implement file upload progress bar function
- ThinkPHP combined with AjaxFileUploader to implement refresh-free file upload method
- Thinkphp multi-file upload implementation method
- PHP file upload method to determine whether file has been selected to upload files
- A classic PHP file upload class sharing
- Configure php.ini Implement PHP file upload function
- php jQuery.uploadify file upload tutorial

Hot AI Tools

Undress AI Tool
Undress images for free

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics

In PHP, you can use square brackets or curly braces to obtain string specific index characters, but square brackets are recommended; the index starts from 0, and the access outside the range returns a null value and cannot be assigned a value; mb_substr is required to handle multi-byte characters. For example: $str="hello";echo$str[0]; output h; and Chinese characters such as mb_substr($str,1,1) need to obtain the correct result; in actual applications, the length of the string should be checked before looping, dynamic strings need to be verified for validity, and multilingual projects recommend using multi-byte security functions uniformly.

AgeneratorinPHPisamemory-efficientwaytoiterateoverlargedatasetsbyyieldingvaluesoneatatimeinsteadofreturningthemallatonce.1.Generatorsusetheyieldkeywordtoproducevaluesondemand,reducingmemoryusage.2.Theyareusefulforhandlingbigloops,readinglargefiles,or

To prevent session hijacking in PHP, the following measures need to be taken: 1. Use HTTPS to encrypt the transmission and set session.cookie_secure=1 in php.ini; 2. Set the security cookie attributes, including httponly, secure and samesite; 3. Call session_regenerate_id(true) when the user logs in or permissions change to change to change the SessionID; 4. Limit the Session life cycle, reasonably configure gc_maxlifetime and record the user's activity time; 5. Prohibit exposing the SessionID to the URL, and set session.use_only

You can use substr() or mb_substr() to get the first N characters in PHP. The specific steps are as follows: 1. Use substr($string,0,N) to intercept the first N characters, which is suitable for ASCII characters and is simple and efficient; 2. When processing multi-byte characters (such as Chinese), mb_substr($string,0,N,'UTF-8'), and ensure that mbstring extension is enabled; 3. If the string contains HTML or whitespace characters, you should first use strip_tags() to remove the tags and trim() to clean the spaces, and then intercept them to ensure the results are clean.

There are two main ways to get the last N characters of a string in PHP: 1. Use the substr() function to intercept through the negative starting position, which is suitable for single-byte characters; 2. Use the mb_substr() function to support multilingual and UTF-8 encoding to avoid truncating non-English characters; 3. Optionally determine whether the string length is sufficient to handle boundary situations; 4. It is not recommended to use strrev() substr() combination method because it is not safe and inefficient for multi-byte characters.

The urlencode() function is used to encode strings into URL-safe formats, where non-alphanumeric characters (except -, _, and .) are replaced with a percent sign followed by a two-digit hexadecimal number. For example, spaces are converted to signs, exclamation marks are converted to!, and Chinese characters are converted to their UTF-8 encoding form. When using, only the parameter values ??should be encoded, not the entire URL, to avoid damaging the URL structure. For other parts of the URL, such as path segments, the rawurlencode() function should be used, which converts the space to . When processing array parameters, you can use http_build_query() to automatically encode, or manually call urlencode() on each value to ensure safe transfer of data. just

To set and get session variables in PHP, you must first always call session_start() at the top of the script to start the session. 1. When setting session variables, use $_SESSION hyperglobal array to assign values ??to specific keys, such as $_SESSION['username']='john_doe'; it can store strings, numbers, arrays and even objects, but avoid storing too much data to avoid affecting performance. 2. When obtaining session variables, you need to call session_start() first, and then access the $_SESSION array through the key, such as echo$_SESSION['username']; it is recommended to use isset() to check whether the variable exists to avoid errors

Key methods to prevent SQL injection in PHP include: 1. Use preprocessing statements (such as PDO or MySQLi) to separate SQL code and data; 2. Turn off simulated preprocessing mode to ensure true preprocessing; 3. Filter and verify user input, such as using is_numeric() and filter_var(); 4. Avoid directly splicing SQL strings and use parameter binding instead; 5. Turn off error display in the production environment and record error logs. These measures comprehensively prevent the risk of SQL injection from mechanisms and details.
