Files
addons
app_download_files
extend
hyhproject
mobile
oss
static
app
css
img
js
activity1.js
activity10.js
activity2.js
activity3.js
activity4.js
activity5.js
activity6.js
activity7.js
activity8.js
activity9.js
appraise.js
binaryajax.js
canvasResize.js
choiceness.js
classify.js
collect.js
collect_commodity.js
collect_store.js
common.js
common_home.js
complain.js
confirmOrder.js
details.js
details_ac.js
discounts.js
dynamic.js
ect_address.js
ect_index.js
ect_list.js
ect_transfer_accounts.html.js
ect_transfer_accounts.js
editAddress.js
exif.js
goodsList.js
home.js
indent.js
indentcon.js
index.js
journalism.js
journalism_con.js
jquery-3.2.1.min.js
login.js
logistics.js
logisticscon.js
msg.js
msg_con.js
mui.js
mui.min.js
my.js
new_product.js
newuser.js
order_con.js
order_out.js
photoswipe-ui-default.min.js
photoswipe.js
pj.js
plupload.full.min.js
qrcode.js
register.js
setting.js
setting_address.js
setting_fogetPayPwd.js
setting_fogetPwd.js
setting_loginInfo.js
setting_payPwd.js
setting_phone.js
setting_pwd.js
setting_user.js
share.js
share_user_list.js
shopGoodsList.js
shoppingcart.js
shopsList.js
store_activity.js
store_class.js
store_commodity.js
store_home.js
store_info.js
store_new.js
storeout.js
swiper.min.js
time_limit.js
upload.js
upload1.js
app2
images
js
plugins
src
template
thinkphp
upload
vendor
wxtmp
.gitignore
.htaccess
.user.ini
404.html
H5436787D.wgt
admin.php
app-release.apk
app_download.html
cash.lock
demo.php
get_version.php
get_version_new.php
index.html
index.php
reg.lock
robots.txt
qlg.tsgz.moe/static/app/js/logisticscon.js
2019-09-06 23:53:10 +08:00

44 lines
1.7 KiB
JavaScript
Executable File
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

mui.plusReady(function() {
var data_order_id = localStorage.getItem('data_order_id');
var token = localStorage.getItem('token');
mui.ajax(hyhUrl('app/Orders/findExpress'), { 
data: {
orderId: data_order_id
},
dataType: 'json', //服务器返回json格式数据  
type: 'post', //HTTP请求类型  
timeout: 10000, //超时时间设置为10秒  
success: function(data) {           //服务器返回响应,根据响应结果,分析是否登录成功;  
var data = toJson(data);
if(data.status == 200 || data.status == 1) {
var data_ = data.data;
var html = '<div class="summarize clearfix"><img src="" /><div class="summarizeinfo"><p class="pp1">物流状态: <o>' + data.express.stateTxt + '</o></p><p class="pp2">承运来源:' + data.express.expressName + '</p><p class="pp2">运单编号:' + data.express.expressNo + '</p></p></div></div><div class="track-list"><ul>';
if(data.data.length > 1) {
var d_1 = data.data[0].time;
var d_2 = data.data[data.data.length-1].time;
var e_1 = new Date(d_1).getTime();
var e_2 = new Date(d_2).getTime();
if (e_1<e_2){
data_.reverse();
}
}
$.each(data_, function() {
html += '<li><i class="node-icon"></i><p class="txt">' + this.context + '</p><p class="time">' + this.time + '</p></li>'
});
html += '</ul></div>'
$('.con').html(html);
document.getElementsByTagName('li')[0].className = 'first';
} else {
// alert(data.status);
}
},
error: function(xhr, type, errorThrown) {           //异常处理;  
// alert(type);      
}
}); 
})