当前位置:网站首页>Mmdrawercontroller gets the current VC for push and pop
Mmdrawercontroller gets the current VC for push and pop
2022-07-24 13:52:00 【Muzi string music】
When using MMDrawerController As the root attempt controller is stay Model perhaps View Get the current VC And carry on Push perhaps Pop
Just post the code
+ (UIViewController *)getCurrentVC{
// Define a variable to store the currently displayed viewcontroller
UIViewController *result = nil;
// Get the main window of the current application
UIWindow * window = [[UIApplication sharedApplication] keyWindow];
// windowLevel Is in Z Axis Window position in direction , The default value is UIWindowLevelNormal
if (window.windowLevel != UIWindowLevelNormal)
{
// Get all the windows of the application
NSArray *windows = [[UIApplication sharedApplication] windows];
for(UIWindow * tmpWin in windows)
{
// Find the default window of the program ( Window being displayed )
if (tmpWin.windowLevel == UIWindowLevelNormal)
{
// Assign the key window as the default window
window = tmpWin;
边栏推荐
- Explain flex layout in detail
- 网络安全——文件上传竞争条件绕过
- 网络安全——文件上传内容检查绕过
- How to verify the domain name after applying for SSL digital certificate?
- 5年接触近百位老板,身为猎头的我,发现升职的秘密不过4个字
- Game thinking 04 summary: a summary of frame, state and physical synchronization (it was too long before, and now it's brief)
- Add an element to the object array with unshift
- The R language uses the DOTPLOT function of epidisplay package to visualize the frequency of data points in different intervals in the form of point graphs, uses the by parameter to specify the groupi
- Cocoapod installation problems
- R language uses the statstack function of epidisplay package to view the statistics (mean, median, etc.) of continuous variables and the corresponding hypothesis test in a hierarchical manner based on
猜你喜欢

Network security -- man in the middle attack penetration test

Network security - Cookie injection

Unity pedestrians walk randomly without collision

网络安全——中间人攻击渗透测试

在EXCEL表格中如何进行快速换行

CSDN garbage has no bottom line!

网络安全——使用Evil Maid物理访问安全漏洞进行渗透

Network security - war backdoor deployment

5年接触近百位老板,身为猎头的我,发现升职的秘密不过4个字

Chapter VI bus
随机推荐
JS execution mechanism
网络安全——文件上传渗透测试
uni-app 背景音频 熄屏或者退回桌面之后不在播放
CSP2021 T3 回文
Hcip day 13
How to generate expected data? Emory University and others' latest "deep learning controllable data generation" review, 52 page PDF, covering 346 documents, comprehensively expounds the controllable g
Explain flex layout in detail
Sringboot-plugin-framework 实现可插拔插件服务
Is it safe for Huatai Securities to open an account through channels? Is it formal
XSS white list
R语言使用epiDisplay包的tableStack函数制作统计汇总表格(基于目标变量分组的描述性统计、假设检验等)、设置by参数为目标变量、设置percent参数配置是否显示百分比信息
【C语言笔记分享】——动态内存管理malloc、free、calloc、realloc、柔性数组
Network security - file upload competitive conditions bypass
Flinktable & SQL (VII)
Nmap security testing tool tutorial
Click event to create a new node
[untitled]
Detailed analysis of common command modules of ansible service
Paper notes: swing UNET: UNET like pure transformer for medicalimage segmentation
网络安全——Web信息收集