技術情報

Chart.js – 外側にテキスト表示する方法 とテキストの代わりに画像を表示する方法

最近Chart.jsというライブラリーを使って開発してるので、Chart.jsで外側にテキスト表示するには色々な方法があるのを気づきました。

というので、今回はChart PieceLabel を使って円グラフ描く方法をご紹介していきたいと思います。

必要となるパッケージをインポートします。

<script src="https://cdnjs.cloudflare.com/ajax/libs/Chart.js/2.6.0/Chart.min.js"></script>
<script src="https://cdnjs.cloudflare.com/ajax/libs/jquery/3.2.1/jquery.min.js"></script>
<script src="https://rawgit.com/beaver71/Chart.PieceLabel.js/master/build/Chart.PieceLabel.min.js"></script>

また、円グラフの表示に必要なデータを挿入します。

 var data = {
            datasets: [{
                data: [16,11,16,30],
                backgroundColor: ['#ee7571', '#438067', '#d0dfad', '#b4e1d1'],
                label: '季' ,// for legend
            }],
          labels : ['春','夏','秋','冬'],
        };

データをキャンバスに表示するためには、キャンバスを作成する必要があります。そして、スクリプトファイルを書くためには、canvas-idを取得する必要があります。

    <div class="col-md-6" style="width: 40%; margin-left: 200px;">
        <canvas id="pieChart" class="chart chart-pie"></canvas>
    </div>
 var pieChartCanvas = $("#pieChart");

PieceLabelの設定をoptionsに追加し、typeを「pie」に設定する必要もある

        var pieChart = new Chart(pieChartCanvas, {
          type: 'pie', 
          data: data,
          options: pieOptions 
        });
        var pieOptions = {
          pieceLabel: {
            render: function(d) { 
               return d.label;
           },
           fontColor: '#000',
           position: 'outside',
           arc : true,
           fontSize:35,
            fontFamily: '"Helvetica , "游ゴシック", sans-serif'
        },
        };

外側にラベル表示するには position に outside と設定する必要があります。FontColor, fontSize, fontFamily も変更したいなら、簡単にできます。

legendを非表示にしたい場合は、displayfalseにします。

legend: {
   display: false
 },

その結果は:

また、renderにimageを設定して画像を表示することもできます。

render: 'image',
            images: [
                { src: './images/spring.jpeg', width: 65, height: 65 },
                { src: './images/Summer.jpeg', width: 65, height: 65 },
                { src: './images/Autumn.jpeg', width: 65, height: 65 },
                { src: './images/Winter.jpeg', width: 65, height: 65 }
            ]
}

結果は記事の一番上にあります。

最後までお読みいただき、ありがとうございます。この記事を楽しんでいただければ幸いです。

By Ami



PHP QRコード生成ライブラリ「endroid/qr-code」

今回はPHPでQRコードを生成するためのライブラリ「endroid/qr-code」を紹介したいと思います。

続きを読む

次世代機で実行可能なUnreal Engine 5 の技術デモが公開されます

映画マトリックスの世界を題材にしたUnreal Engine 5 の技術デモ
The Matrix Awakens: An Unreal Engine 5 Experience
がPlayStation5とXbox Series X|S向けに12月10日から公開予定のようです。

続きを読む

Some Web Security tools which developers should use

Today I would like to share about some web security tools that should be used by developers. When we develop a software, we must also consider the aspects of security. So, in some situations, not only have to write secure codes but reverse testing is also needed. Let’s take a look at some web security tools as follows.

1. Zed Attack Proxy (ZAP)

Developed by OWASP (Open Web Application Security Project), ZAP or Zed Attack Proxy is a multi-platform, open-source web application security testing tool. ZAP is used for finding a number of security vulnerabilities in a web app during the development as well as the testing phase.

2. Wapiti

Wapiti is a open source project. Wapiti performs black box testing to check web applications for security vulnerabilities. As it is a command-line application, it is important to have a knowledge of various commands used by Wapiti. You can find all the Wapiti instructions on the official documentation. For checking whether a script is vulnerable or not, Wapiti injects payloads. This tool provides support for both GET and POST HTTP attack methods.

Vulnerabilities exposed by Wapiti are:

  • Command Execution detection
  • CRLF injection
  • Database injection
  • File disclosure
  • Shellshock or Bash bug
  • SSRF (Server Side Request Forgery)
  • Weak .htaccess configurations that can be bypassed
  • XSS injection
  • XXE injection

3. Sqlmap

SQLMap is entirely free to use that allow automating the process of detecting and utilizing SQL injection vulnerability in a website’s database. This tool supports 6 types of SQL injection techniques:

  • Boolean-based blind
  • Error-based
  • Out-of-band
  • Stacked queries
  • Time-based blind
  • UNION query

4. Skipfish

Skipfish is a web application security tool that crawls your website and then checks each page for various security threats and provides a final security report. It is highly optimized for HTTP handling and utilizing minimum CPU.

5. Burp Suite

Burp Suite is a Java-based web penetration testing framework. Its various tools work seamlessly together to support the entire testing process, from initial mapping and analysis of an application’s attack surface, through to finding and exploiting security vulnerabilities. The tool intercepts HTTP/S requests and acts as a middle-man between the user and web pages. The paid version provides a more agile automated testing tool with integrations with other frameworks such as Jenkins.

6. Nikto

The Nikto web server scanner is a security tool that will test a website for thousands of possible security issues including dangerous files, mis-configured services, vulnerable scripts and other issues. It is open source and structured with plugins that extend the capabilities.

Hope you enjoy that.

By Asahi



PHP 8.1 is here

The PHP team has released PHP 8.1. Let’s see a bit of some main features they have added.

https://twitter.com/official_php/status/1463943033234276360

Improvements

There are many improvements as follow.

  • Enumerations
  • Readonly properties
  • Pure Intersection Types
  • never return type
  • First-class Callable Syntax
  • New array_is_list function
  • and many more

We will walk through some feature more details.

Enumerations

PHP 8.1 supports Enumerations (Enums) natively, providing an API for defining and working with Enums:

enum Data
{
    case Draft;
    case Published;
    case Archived;
}
function acceptStatus(Data $data) {...}

Read-only Properties

Read-only properties cannot be changed after they are initialized. You can be confident that your data classes are consistent. PHP 8.1 can reduce boilerplate by defining public properties the author does not intend to change.

class Sample
{
    public readonly Data $data;
 
    public function __construct(Data $data)
    {
        $this->data = $data;
    }
}

First-class Callable Syntax

You can make make a closure from a callable by calling it and passing "...

function sum(int $a, int $b) {
    // ...
}
 
$sum = sum(...);
$sum(1, 5);
$sum(5, 3);

and there are still more interesting features to look more detail. Please check the official documentation for more detail.

Yuuma




アプリ関連ニュース

お問い合わせはこちら

お問い合わせ・ご相談はお電話、またはお問い合わせフォームよりお受け付けいたしております。

tel. 06-6454-8833(平日 10:00~17:00)

お問い合わせフォーム