Yii2-Redis使用小记
前些天简单学习了下 Redis,现在准备在项目上使用它了。我们目前用的是 Yii2 框架,在官网搜索了下 Redis,就发现了yii2-redis这扩展。
安装后使用超简单,打开 common/config/main.php 文件,修改如下。
文本
'cache' => [ // 'class' => 'yii\caching\FileCache', 'class' => 'yii\redis\Cache',],'redis' => [ 'class' => 'yii\redis\Connection', 'hostname' => 'localhost', 'port' => 6379, 'database' => 0,],
'cache' => [ // 'class' => 'yii\caching\FileCache', 'class' => 'yii\redis\Cache',],'redis' => [ 'class' => 'yii\redis\Connection', 'hostname' => 'localhost', 'port' => 6379, 'database' => 0,],
OK,现在已经用 redis 接管了yii的缓存,缓存的使用和以前一样,以前怎么用现在还是怎么用,但是有个不算bug的bug,所以算小坑,等会会说。
来测试下 cache 先,
文本
Yii::$app->cache->set('test', 'hehe..');echo Yii::$app->cache->get('test'), "\n";Yii::$app->cache->set('test1', 'haha..', 5);echo '1 ', Yii::$app->cache->get('test1'), "\n";sleep(6);echo '2 ', Yii::$app->cache->get('test1'), "\n";
Yii::$app->cache->set('test', 'hehe..');echo Yii::$app->cache->get('test'), "\n";Yii::$app->cache->set('test1', 'haha..', 5);echo '1 ', Yii::$app->cache->get('test1'), "\n";sleep(6);echo '2 ', Yii::$app->cache->get('test1'), "\n";
来看下测试结果。
和原来一样的用法,没问题。。
但是刚才我说过了有个不算bug的bug,所以算小坑,到底是什么东西呢?
如果你直接用 redis 接管了 cache,如果正常使用是完全没问题的,但是当 过期时间 的值超过 int 范围的时候,redis就会报错。
我使用了 yii2-admin,凑巧让我踩到坑了,因为他缓存了30天,也就是2592000秒,并且 redis 缓存时间精度默认用毫秒,所以时间就是 2592000000 毫秒。
而 redis 的过期时间只能是int类型,Cache.php 里的 php 强制转为int,而没有做其他处理,所以就会变成 -1702967296 然后就报错了。
但是直接在 redis 命令行下不会负数,如图。
不过没关系,修复起来也很简单,我们修改为秒即可。
打开 vendor/yiisoft/yii2-redis/Cache.php第
133
行,修改为如下代码。
文本
protected function setValue($key, $value, $expire){ if ($expire == 0) { return (bool) $this->redis->executeCommand('SET', [$key, $value]); } else { // $expire = (int) ($expire * 1000); // 单位默认为毫秒 // return (bool) $this->redis->executeCommand('SET', [$key, $value, 'PX', $expire]); $expire = +$expire > 0 ? $expire : 0; // 防止负数 return (bool) $this->redis->executeCommand('SET', [$key, $value, 'EX', $expire]); // 按秒缓存 }}
protected function setValue($key, $value, $expire){ if ($expire == 0) { return (bool) $this->redis->executeCommand('SET', [$key, $value]); } else { // $expire = (int) ($expire * 1000); // 单位默认为毫秒 // return (bool) $this->redis->executeCommand('SET', [$key, $value, 'PX', $expire]); $expire = +$expire > 0 ? $expire : 0; // 防止负数 return (bool) $this->redis->executeCommand('SET', [$key, $value, 'EX', $expire]); // 按秒缓存 }}
这样就OK了。
好了,今天分享这些。
在Yii2中使用Pjax导致Yii2内联脚本载入失败的问题 http://www.linuxidc.com/Linux/2016-03/128949.htm
Yii2 实现修改密码功能 http://www.linuxidc.com/Linux/2015-07/120137.htm
Yii 用户登陆机制 http://www.linuxidc.com/Linux/2015-01/111602.htm
Yii中引入js和css文件 http://www.linuxidc.com/Linux/2015-01/111603.htm
Yii 不完全解决方案 http://www.linuxidc.com/Linux/2015-01/111606.htm
Yii CGridView 基本使用 http://www.linuxidc.com/Linux/2015-01/111607.htm
Yii框架分布式缓存的实现方案 http://www.linuxidc.com/Linux/2015-02/113828.htm
Yii 的详细介绍 : 请点这里
Yii 的下载地址 : 请点这里
本文永久更新链接地址 : http://www.linuxidc.com/Linux/2016-06/132347.htm

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics

Alipay PHP...

JWT is an open standard based on JSON, used to securely transmit information between parties, mainly for identity authentication and information exchange. 1. JWT consists of three parts: Header, Payload and Signature. 2. The working principle of JWT includes three steps: generating JWT, verifying JWT and parsing Payload. 3. When using JWT for authentication in PHP, JWT can be generated and verified, and user role and permission information can be included in advanced usage. 4. Common errors include signature verification failure, token expiration, and payload oversized. Debugging skills include using debugging tools and logging. 5. Performance optimization and best practices include using appropriate signature algorithms, setting validity periods reasonably,

Session hijacking can be achieved through the following steps: 1. Obtain the session ID, 2. Use the session ID, 3. Keep the session active. The methods to prevent session hijacking in PHP include: 1. Use the session_regenerate_id() function to regenerate the session ID, 2. Store session data through the database, 3. Ensure that all session data is transmitted through HTTPS.

How to debug CLI mode in PHPStorm? When developing with PHPStorm, sometimes we need to debug PHP in command line interface (CLI) mode...

The application of SOLID principle in PHP development includes: 1. Single responsibility principle (SRP): Each class is responsible for only one function. 2. Open and close principle (OCP): Changes are achieved through extension rather than modification. 3. Lisch's Substitution Principle (LSP): Subclasses can replace base classes without affecting program accuracy. 4. Interface isolation principle (ISP): Use fine-grained interfaces to avoid dependencies and unused methods. 5. Dependency inversion principle (DIP): High and low-level modules rely on abstraction and are implemented through dependency injection.

How to automatically set the permissions of unixsocket after the system restarts. Every time the system restarts, we need to execute the following command to modify the permissions of unixsocket: sudo...

Sending JSON data using PHP's cURL library In PHP development, it is often necessary to interact with external APIs. One of the common ways is to use cURL library to send POST�...

Static binding (static::) implements late static binding (LSB) in PHP, allowing calling classes to be referenced in static contexts rather than defining classes. 1) The parsing process is performed at runtime, 2) Look up the call class in the inheritance relationship, 3) It may bring performance overhead.
