当前位置:网站首页>How to realize the rich text editor function of mobile terminal
How to realize the rich text editor function of mobile terminal
2022-06-25 11:18:00 【Liu Yang's dream making program development station】
There are very few rich text editors on the mobile end , Because of the customer's demand, I found many , Either the title party or pc The end-to-end adaptation cannot meet the demand , After searching for a long time, I finally found this artEditor, Download address :https://gitee.com/lyzmzcom/artEditor.git
Two key js route example/js/index.js dist/index.min.js
modify dist/index.min.js Medium console.error(" The file is too large "); by alert(" The file is too large "); Otherwise, there will be no prompt when the uploaded file exceeds the limit , Very unfriendly
Then modify example/js/index.js Picture upload interface in uploadUrl
Finally, the background image upload interface receives the image file , The received picture file is base64,input('post.image') Get a picture file , decode base64 After the file is stored in the server, you can return the picture address
边栏推荐
- Open source invites you to participate in the openssf Open Source Security Online Seminar
- 一个数学难题,难倒两位数学家
- try-catch-finally
- Ouverture de l'inscription | le troisième marathon des hackers de pagaie est arrivé comme prévu.
- 金仓数据库 KingbaseES 插件ftutilx
- Double buffer transparent encryption and decryption driven course paper + project source code based on minifilter framework
- Jincang KFS data centralized scenario (many to one) deployment
- Big endian and little endian
- 动态规划解决股票问题(上)
- GaussDB 集群维护案例集-sql执行慢
猜你喜欢

杭州/北京内推 | 阿里达摩院招聘视觉生成方向学术实习生(人才计划)

金仓KFS数据集中场景(多对一)部署

scrapy+scrapyd+gerapy 爬虫调度框架

Use of three-level linkage plug-ins selected by provinces and cities

Course paper + code and executable EXE file of library information management system based on C language

COSCon'22 讲师征集令
![[file containing vulnerability-03] six ways to exploit file containing vulnerabilities](/img/4f/495c852eb0e634c58e576d911a2c14.png)
[file containing vulnerability-03] six ways to exploit file containing vulnerabilities

Getting started with Apache Shenyu

Explanation and use of kotlin syntax for Android

zabbix分布式系统监控
随机推荐
一个数学难题,难倒两位数学家
Handler、Message、Looper、MessageQueue
[file containing vulnerability-03] six ways to exploit file containing vulnerabilities
Advanced single chip microcomputer -- development of PCB (2)
金仓数据库 KingbaseES 插件DBMS_UTILITY
GaussDB 如何统计用户sql的响应时间
MySQL synchronous data configuration and shell script implementation
Ladder Side-Tuning:预训练模型的“过墙梯”
贝叶斯
Explanation and use of kotlin syntax for Android
Android:kotlin中Gson与JSON的泛型映射解析
[observation] objectscale: redefining the next generation of object storage, reconstruction and innovation of Dell Technology
Shen Ying, China Academy of communications and communications: font open source protocol -- Introduction to ofl v1.1 and analysis of key points of compliance
Jincang database kingbasees plug-in identity_ pwdexp
Redis6笔记02 配置文件,发布和订阅,新数据类型,Jedis操作
中國信通院沈瀅:字體開源協議——OFL V1.1介紹及合規要點分析
Task03 probability theory
TASK03|概率论
网易开源的分布式存储系统 Curve 正式成为 CNCF 沙箱项目
数据库系列:MySQL索引优化总结(综合版)