/* 根据访问域名动态访问 */ //防止恶意访问,以及进行简单的权限管理 $hostArr = array( 'mc.test.com' => array('/down/index','/down/test'), 'md.test.com' => array('/reg/index','/reg/down'), ); $root = $_SERVER['REQUEST_SCHEME'].'://'.$_SERVER['HTTP_HOST']; $hostFlag = false; if(isset($hostArr[$_SERVER['HTTP_HOST']])){ if(!in_array($_SERVER['QUERY_STRING'],$hostArr[$_SERVER['HTTP_HOST']])){ exit('No direct script access allowed'); } $hostFlag = true; $root .= str_replace(basename($_SERVER['SCRIPT_NAME']), '', $_SERVER['SCRIPT_NAME']); } /* 根据访问域名动态访问 */ $config['base_url'] = $hostFlag ? $root : 'http://m.test.com/';
转载于:https://my.oschina.net/u/3268486/blog/3011951