`

Capturing self strongly in this block is likely to lead to a retain cycle

 
阅读更多

在block里引用self,xcode给出了这个warning:

Capturing self strongly in this block is likely to lead to a retain cycle

在SO上搜索了一番,好像和我的场景不太一样。最后我解决的办法是:

__block AddShopViewController *weakSelf = self;

然后在block里调用weakSelf:

[weakSelf clearFormAfterAppend];


分享到:
评论

相关推荐

    How is logging implemented in OSS?

    Method: In this paper, we carried out an empirical study to explore the logging practice in open source software projects so as to establish a basic understanding on how logging practice is applied ...

    微软内部资料-SQL性能优化2

    A reference to an invalid page (a page that is not in your working set) is referred to as a page fault. Assuming the page reference does not result in an access violation, a page fault can be either ...

    BUS Hound

    PASS_THROUGH data structure CDB SCSI command descriptor block (Known as a packet command for ATAPI devices) CTL 8 byte setup packet of a USB control transfer DI Data In (Device to PC ...

    A_network_location-allocation_model

    to impairment by the flow capturing objective than is the flow capturing model to the p-median objective. The results encourage us to apply the model to a real-world network using actual traffic data.

    Introduction to Visual Computing: Core Concepts in Computer Vision, Graphics

    Introduction to Visual Computing: Core Concepts in Computer Vision, Graphics, and Image Processing covers the fundamental concepts of visual computing. Whereas past books have treated these concepts ...

    software architecture in practice 2rd edition

    This award-winning book, substantially updated to reflect the latest developments in the field, introduces the concepts and best practices of software architecture-how a software system is structured ...

    Mobile DevOps-Packt Publishing(2018).epub

    It is something that can improve integration and delivery, as well as provide a greater feedback mechanism and early defect capturing tools. Mobile DevOps comes with its own implementation challenges...

    蜘蛛网站采集---封装类

    In this article, we will introduce the SharpPcap .NET assembly (library) for interfacing with libpcap or winpcap from your .NET application and give you a detailed programming tutorial on how to use ...

    Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems

    Wireshark is the world's most popular network sniffer that makes capturing packets easy, but it won't be much help if you don't have a solid foundation in packet analysis. Practical Packet Analysis, ...

    Structural Semantic Relatedness_A Knowledge-Based Method to Name Entity Disambiguation.pdf

    This paper proposes a knowledge-based method, called Structural Semantic Relatedness (SSR), which can enhance the named entity disambiguation by capturing and leveraging the structural semantic ...

    计算机网络--ICMP

    network administrator) to verify if a host is live or not. The Ping program in the source host sends a packet to the target IP address; if the target is live, the Ping program in the target host ...

    网络协议攻击

    What’s in This Book? This book contains a mix of theoretical and practical chapters. For the practical chapters, I’ve developed and made available a networking library called Canape Core, which you ...

    图像稀疏表示文献

    In this paper, we present a multi-scale dictionary learning paradigm for sparse and redundant signal representa- tions. The appeal of such a dictionary is obvious—in many cases data naturally comes ...

    Perfect_Digital_Photography

    “It is rare to discover a book on digital photography that is not technically dated by the rapid changes in the digital technology… From cover to cover this book is filled with priceless information...

    MCTS Self-Paced Training Kit (Exam 70-642) Configuring Windows Server 2008 Network Infrastructure

    This 2-in-1 kit includes the official Microsoft study guide, plus practice tests on CD to help you assess your skills. It comes packed with the tools and features exam candidates want most including ...

    Penetration Testing with Raspberry Pi

    cost hacking tool using Kali Linux 2 Protect your confidential data by...This Book Is For If you are a computer enthusiast who wants to learn advanced hacking techniques using the Raspberry Pi 3 as your ...

    Artificial Intelligence and Computer Vision

    There have been increased developments in ocean exploration using autonomous underwater vehicles (AUVs) and unmanned underwater vehicles (UUVs). However, the contrast of underwater images is still a ...

    Software Engineering with UML-CRC(2017).pdf

    Budding software engineers need to learn from the outset that developing good solutions involves a lot more than “coding.” While programming is a necessity in the eld of software, it is not su cient...

    [iPhone开发书籍大全].Professional.iPhone.and.iPod.Touch.Programming(Wrox.2008).pdf

    this book shows you how to integrate these various elements with key design concepts and principles in order to develop a highly usable interface for the touch screen. You'll learn to use existing ...

    Mastering Wireshark 2 pdf

    If you are a security professional or a network enthusiast and are interested in understanding the internal working of networks, and if you have some prior knowledge of using Wireshark, then this book...

Global site tag (gtag.js) - Google Analytics