Flask之Template层知识点回顾(一)

本文深入探讨Flask微型框架的特性与应用,包括其基于Python、Jinja2模板引擎和Werkzeug WSGI服务的架构,以及MTV框架模式的理解。详细介绍了URL反向解析和模板层中的宏标签使用方法,适合初学者和开发者快速掌握Flask核心知识点。

Today 19年2月16日,距离金三银四的招聘月份越来越近了.简历上的项目也成了目前最棘手的问题,需要迫切做出一个能拿的出手的项目.正好手头有一个Flask相关的小程序订餐应用,并且这个项目的应用场景很广泛,知识涉及面也很有深度,是一个可以拿来练手的项目。So , 要抓紧快速复习一下flask知识点,马上跟小伙伴们投入开发。。
在这里插入图片描述

Flask简介

Flask是一个基于Python并且依赖于Jinja2模板引擎和Werkzeug WSGI服务的一个微型框架(Micro Framework),并且是基于 MTV 框架模式开发出来的框架


拓展:

  • MTV框架 (Flask,Django)
      M : Models层,模型层,负责与数据库打交道
      T : Templates层,模板层,处理用户显示的内容,如html
      V : Views层,视图层,处理与用户打交道的内容(请求和响应)
  • 经典的 MVC框架
      M : Models层,模型层,负责与数据库打交道
      V : Views层,视图层,处理用户显示的内容,如html
      C : Controller层,控制器层,处理与用户打交道的内容(请求和响应)

Template层 知识点回顾


1.URL的反向解析 url_for

正向解析:程序自动解析,会根据访问路径(@app.route(‘xxx’)),自动来匹配处理函数
反向解析:通过视图处理函数的名称自动生成对应的访问路径

在Flask中要实现反向解析的话,需要使用:

from flask import url_for
url_show = url_for(funName,args)

# funName : 要生成地址所对应的函数名
# args : 该地址中要用到的参数
# url_show 就是反向根据视图函数名称生成它对应的url地址

具体代码示例:

from flask import Flask, url_for

app = Flask(__name__)
# 没有参数的url地址反向解析示例,通过index函数名,反向生成对应的请求地址
@app.route('/index')
def index():
    return "<h1>这是首页</h1>"

@app.route('/demo')
def demo():
    url_index = url_for('index')
    return '<a href=%s>去往index函数对应的url地址</a>'% url_index

#通过复杂的访问地址+简单的方法方法名称+参数
@app.route('/admin/login/user/tarena/form/url/show/<name>')
def show(name):
    return "传递进来的参数为:"+name

@app.route('/url')
def url():
    #通过show函数名以及name参数反向生成访问地址
    url_show=url_for('show',name='wangwc')
    print('访问地址:'+url_show)
    return "<a href='%s'>访问show('wangwc')</a>" % url_show

if __name__ == "__main__":
    app.run(debug=True)


2.Template层中的macro标签(宏)使用

  • (1)作用:相当于模板中声明的函数(通常用来显示数据文本等)
  • (2)语法:  
     {% macro 函数名(形参列表) %}  
       xxx xxx
     {% endmacro %}
  • (3)使用方法: 在独立的模板文件中声明宏
     1.创建 macro.html 模板文件
       作用:定义项目中要用到的所有的宏

代码如下:
1.在模板层写好声明的宏并加以应用

<!DOCTYPE html>
<html lang="en">
<head>
    <meta charset="UTF-8">
    <title> macro.html </title>
</head>
<body>
    {% macro show_li(str)%}
        <li>
            <p style="font-size: 20px">内容如下:</p>
            <span style="color: red">
                {{ str }}
            </span>
        </li>
    {% endmacro %}
    
    <ul>
        {% for name in list %}
            {{ show_li(name) }}
        {% endfor %}
    </ul>
</body>
</html>

然后通过视图函数传一下参数即可

@app.route('/01-macro')
def macro_views():
    list=['张三','李四','王五','校长']
    return render_template('macro.html',list=list)

2.在使用的网页中,导入 macro.html 模板
{% import ‘macro.html’ as macros %}

代码示例如下:
首先写好存放宏的模板(.html文件) 两个宏

{% macro show_list(list) %}
    <ul>
    {% for name in list %}
        <li>
            <p style="color:red;">
                姓名:{{ name }}
            </p>
        </li>
    {% endfor %}
    </ul>
{% endmacro %}

{% macro show_p(str) %}
    <p style="font-size: 20px;font-weight: bold">
        内容为:{{ str }}
    </p>
{% endmacro %}

然后再去负责显示的模板html文件中引入并加以运用

<h1>调用macros.html中的宏</h1>
    {% import 'macros.html' as macros %}
    {{ macros.show_list(list) }}

    {% for name in list %}
        {{ macros.show_p(name) }}
    {% endfor %}

网页上输出显示结果:
在这里插入图片描述

vlan 1 # vlan 9 to 11 # vlan 31 # vlan 4094 # dhcp server ip-pool 1 gateway-list 192.168.0.100 network 192.168.0.0 mask 255.255.255.0 dns-list 192.168.0.100 # dhcp server ip-pool 4094 gateway-list 10.40.94.1 network 10.40.92.0 mask 255.255.252.0 dns-list 10.40.94.1 # wlan service-template test-guest ssid maxway-guest client forwarding-location ap vlan 11 akm mode psk preshared-key pass-phrase cipher $c$3$TqSkEQdF8L4xDKI046HbrfzKzqtAT8DdMuKiaA== cipher-suite ccmp cipher-suite tkip security-ie rsn security-ie wpa service-template enable # wlan service-template test-mes ssid maxway-mes client forwarding-location ap vlan 9 akm mode psk preshared-key pass-phrase cipher $c$3$Y42CrnGGlV6Boa88O+mY44rj4Mgi7Ur28GAf4A== cipher-suite ccmp cipher-suite tkip security-ie rsn security-ie wpa service-template enable # wlan service-template test-office ssid maxway-office client forwarding-location ap vlan 10 akm mode psk preshared-key pass-phrase cipher $c$3$TXDKs01kxynV9InzVbntSao524jwjBbjVqZK5AQ= cipher-suite ccmp cipher-suite tkip security-ie rsn security-ie wpa service-template enable # wlan service-template test-office2 ssid maxway-office2 client forwarding-location ap vlan 31 akm mode psk preshared-key pass-phrase cipher $c$3$VIfBW+kp4M6cMyGrwL+n/DEH15N/1F2+GiWgp1Y= cipher-suite ccmp cipher-suite tkip security-ie rsn security-ie wpa service-template enable # interface NULL0 # interface Vlan-interface1 ip address 10.10.9.252 255.255.255.0 # interface Vlan-interface4094 ip address 10.40.94.1 255.255.252.0 dhcp server apply ip-pool 4094 # interface GigabitEthernet1/0/1 port link-mode bridge # interface GigabitEthernet1/0/2 port link-mode bridge # interface GigabitEthernet1/0/3 port link-mode bridge # interface GigabitEthernet1/0/4 port link-mode bridge # interface GigabitEthernet1/0/5 port link-mode bridge # interface GigabitEthernet1/0/6 port link-mode bridge # interface GigabitEthernet1/0/7 port link-mode bridge port link-type trunk port trunk permit vlan 1 9 # interface GigabitEthernet1/0/8 port link-mode bridge # interface Ten-GigabitEthernet1/0/9 port link-mode bridge # interface Ten-GigabitEthernet1/0/10 port link-mode bridge # interface Smartrate-Ethernet1/0/11 port link-mode route ip address dhcp-alloc nat outbound undo dhcp select server # interface Smartrate-Ethernet1/0/12 port link-mode route ip address dhcp-alloc nat outbound undo dhcp select server # scheduler logfile size 16 # line class console user-role network-admin # line class vty user-role network-operator # line con 0 user-role network-admin # line vty 0 31 authentication-mode scheme user-role network-operator # ip route-static 0.0.0.0 0 10.10.9.254 # undo info-center logfile enable # snmp-agent snmp-agent local-engineid 800063A280BCD0EBEAB6F000000001 snmp-agent community read maxway snmp-agent sys-info version all # ntp-service enable ntp-service unicast-server 10.10.10.132 ntp-service unicast-server pool.ntp.org # domain system # domain default enable system # role name level-0 description Predefined level-0 role # role name level-1 description Predefined level-1 role # role name level-2 description Predefined level-2 role # role name level-3 description Predefined level-3 role # role name level-4 description Predefined level-4 role # role name level-5 description Predefined level-5 role # role name level-6 description Predefined level-6 role # role name level-7 description Predefined level-7 role # role name level-8 description Predefined level-8 role # role name level-9 description Predefined level-9 role # role name level-10 description Predefined level-10 role # role name level-11 description Predefined level-11 role # role name level-12 description Predefined level-12 role # role name level-13 description Predefined level-13 role # role name level-14 description Predefined level-14 role # user-group system # local-user admin class manage password hash $h$6$5Mya4LjoD7YVbHrH$WqPrVn7ZnVDDpzdXHsbs4Y4ZKjImEjQDcQhzduLkWQyrQeX4CJhRIjaGJDVJx91efhlMam7H7skwSrZlUIJXbA== service-type telnet http https authorization-attribute user-role network-admin # netconf soap http enable # ip http enable ip https enable # wlan auto-ap enable wlan auto-persistent enable wlan tcp mss 1360 # wlan ap-group default-group vlan 1 ap-model WA6320S-C map-configuration flash:/WA6320S-C.txt radio 1 max-power 20 radio enable channel band-width 40 service-template test-guest vlan 11 service-template test-mes vlan 9 service-template test-office vlan 10 service-template test-office2 vlan 31 radio 2 radio enable service-template test-guest vlan 11 service-template test-mes vlan 9 service-template test-office vlan 10 service-template test-office2 vlan 31 gigabitethernet 1 # wlan ap a069-d94e-25c0 model WA6320S-C serial-id 219801A3DA821CE00F4S vlan 1 radio 1 radio 2 gigabitethernet 1 #
最新发布
07-26
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值