PHP 調(diào)試工具Debug Tools
Jun 06, 2016 pm 08:36 PM發(fā)現(xiàn)了個(gè)調(diào)試PHP源碼的好同志: PHP DEBUG TOOLS,需要的朋友可以參考下。
發(fā)現(xiàn)了個(gè)調(diào)試PHP源碼的好同志: PHP DEBUG TOOLS
其項(xiàng)目地址: http://freshmeat.net/projects/php-debug-tools/
文件下載地址: http://freshmeat.net/urls/7c58ae3fecce5763e7546b958d36e082
目前是1.03版本
這里偶的環(huán)境是WINDOW XP , APACHE2.2, PHP5.2+ Zend Optimizer,
這里結(jié)合PHP DEBUG TOOLS的幫助文檔來講解,圖有些是摘自文檔.
一.安裝篇
安裝前的準(zhǔn)備環(huán)境:必須得先裝X-Debug,
至于怎樣安裝X-Debug請(qǐng)看http://www.xdebug.org/docs/install
1. 從http://www.xdebug.org/download.php下載合適你的X-DEBUG版本
2. 解壓DLL文件到PHP安裝目錄下的ext目錄,如C:/php/ext/php_xdebug-2.0.4-5.2.8-nts.dll
3. 修改php.ini文件,加入下段:
-------------偶是變態(tài)的分割線,你看不見我------------------------
zend_extension = "C:/php/ext/php_xdebug-2.0.4-5.2.8-nts.dll"
xdebug.collect_includes = Off
xdebug.default_enable = Off
xdebug.dump_globals = Off
xdebug.dump_once = Off
xdebug.extended_info = Off
-------------偶是變態(tài)的分割線,你看不見我------------------------
注:This example is for non-thread safe version. For the thread safe version change "zend_extension" to "zend_extension_ts"
安裝完畢,解壓PHP DEBUG TOOLS壓縮包里的所有文件到網(wǎng)站發(fā)布目錄.
(假設(shè)發(fā)布目錄為c:\www,那么就在其新建一個(gè)debug目錄,把所有文件扔進(jìn)去)
在瀏覽器中輸入:http://localhost/debug/test1-debug.php
如果看見下圖則安裝成功.
二.調(diào)試篇
1.Debug errors
如以下代碼:
代碼如下:
require './lib/debug.php';
function test($a, $b)
{
echo $asd;
}
test(10, 'abc');
?>
2.用Debug()來調(diào)試
如以下代碼:
代碼如下:
require './lib/debug.php';
function test($args)
{
test_nested($args);
}
function test_nested($args)
{
debug($args);
// or: debug(get_defined_vars());
// or: debug();
}
test(array('id'=>123, 'str'=>'test'));
?>
3.用dump()或者dump_tofile()調(diào)試
如以下代碼:
代碼如下:
include_once './lib/dump.php';
function test5()
{
include './testdata/test0.php';
$test = array('int'=>1, 'float'=>2.0, 'float2'=>2.1);
dump($test, $_SERVER);
}
function test1() { test2(); }
function test2() { test3(); }
function test3() { test4(); }
function test4() { test5(); }
test1();
?>
至于dump_tofile()一般在以下情形使用:
A.當(dāng)你不想停止程序運(yùn)行時(shí)
B.不是你不想顯示調(diào)式數(shù)據(jù),而是你不能.比如當(dāng)你在AJAX請(qǐng)求狀態(tài)時(shí).
C.你還想在多處地方調(diào)式
可參見debug目錄下的test7-dump_tofile.php
注:本人在運(yùn)行dump()或者dump_tofile()時(shí)發(fā)現(xiàn)并不能出現(xiàn)PHP DEBUG TOOL文檔中所述
這里可以通過修改debug/lib/debug.php的代碼來更正.(因?yàn)閐ump_tofile()有調(diào)用到dump(),所以我們只需修改一處.
于149行處的
echo $pre;
修改成:
//edit by benben---start
echo '';
//edit by benben---end
修正后的圖:
4.跟蹤代碼,查看系統(tǒng)性能
可以瀏覽目錄下的test3-trace.php,之后點(diǎn)右下角的控制臺(tái)就可以了.
具體可參照文檔.(文檔在壓縮包內(nèi)的doc目錄下)
三,如何與項(xiàng)目結(jié)合?
先把php debug tool的解壓縮文件,放置于項(xiàng)目目錄,建個(gè)目錄就叫debug吧! : )
其實(shí)我們需要的只是幾個(gè)文件而已.
比如路徑為:c:\www\projectName\debug
之后,我們可以通過兩種方式來調(diào)試
第一種,可以在項(xiàng)目源碼中加入這么一句:
include_once('./lib/debug.php');
例如以下:c:\www\projectName\hellodebug\index.php
代碼如下:
include_once('./debug/lib/debug.php');
$faint = 'helloworld ,debuging';
debug($arrb);
?>
什么?你不想每個(gè)頁面都寫這么一句?
那么看看第二種方法,
這里也有兩種方式,
1.修改php.ini 加入以下內(nèi)容(修改成你自身的目錄):
auto_prepend_file = "c:\www\projectName\debug\auto_prepend.php"
auto_append_file = "c:\www\projectName\debug\auto_append.php"
2.修改.htaccess文件(注:此方法偶沒試過,嘿嘿)
php_value auto_prepend_file "c:\www\projectName\debug\auto_prepend.php"
php_value auto_append_file "c:\www\projectName\debug\auto_append.php"
這樣的話就可以方便整個(gè)項(xiàng)目的調(diào)試.
如果是AJAX開發(fā)的話,還有需要的地方,具體請(qǐng)參照文檔.(因本人還沒那個(gè)需要,所以暫時(shí)先跳開了,不要拍磚,嘿嘿.)

Hot AI Tools

Undress AI Tool
Undress images for free

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics

In PHP, you can use square brackets or curly braces to obtain string specific index characters, but square brackets are recommended; the index starts from 0, and the access outside the range returns a null value and cannot be assigned a value; mb_substr is required to handle multi-byte characters. For example: $str="hello";echo$str[0]; output h; and Chinese characters such as mb_substr($str,1,1) need to obtain the correct result; in actual applications, the length of the string should be checked before looping, dynamic strings need to be verified for validity, and multilingual projects recommend using multi-byte security functions uniformly.

AgeneratorinPHPisamemory-efficientwaytoiterateoverlargedatasetsbyyieldingvaluesoneatatimeinsteadofreturningthemallatonce.1.Generatorsusetheyieldkeywordtoproducevaluesondemand,reducingmemoryusage.2.Theyareusefulforhandlingbigloops,readinglargefiles,or

To prevent session hijacking in PHP, the following measures need to be taken: 1. Use HTTPS to encrypt the transmission and set session.cookie_secure=1 in php.ini; 2. Set the security cookie attributes, including httponly, secure and samesite; 3. Call session_regenerate_id(true) when the user logs in or permissions change to change to change the SessionID; 4. Limit the Session life cycle, reasonably configure gc_maxlifetime and record the user's activity time; 5. Prohibit exposing the SessionID to the URL, and set session.use_only

You can use substr() or mb_substr() to get the first N characters in PHP. The specific steps are as follows: 1. Use substr($string,0,N) to intercept the first N characters, which is suitable for ASCII characters and is simple and efficient; 2. When processing multi-byte characters (such as Chinese), mb_substr($string,0,N,'UTF-8'), and ensure that mbstring extension is enabled; 3. If the string contains HTML or whitespace characters, you should first use strip_tags() to remove the tags and trim() to clean the spaces, and then intercept them to ensure the results are clean.

There are two main ways to get the last N characters of a string in PHP: 1. Use the substr() function to intercept through the negative starting position, which is suitable for single-byte characters; 2. Use the mb_substr() function to support multilingual and UTF-8 encoding to avoid truncating non-English characters; 3. Optionally determine whether the string length is sufficient to handle boundary situations; 4. It is not recommended to use strrev() substr() combination method because it is not safe and inefficient for multi-byte characters.

The urlencode() function is used to encode strings into URL-safe formats, where non-alphanumeric characters (except -, _, and .) are replaced with a percent sign followed by a two-digit hexadecimal number. For example, spaces are converted to signs, exclamation marks are converted to!, and Chinese characters are converted to their UTF-8 encoding form. When using, only the parameter values ??should be encoded, not the entire URL, to avoid damaging the URL structure. For other parts of the URL, such as path segments, the rawurlencode() function should be used, which converts the space to . When processing array parameters, you can use http_build_query() to automatically encode, or manually call urlencode() on each value to ensure safe transfer of data. just

To set and get session variables in PHP, you must first always call session_start() at the top of the script to start the session. 1. When setting session variables, use $_SESSION hyperglobal array to assign values ??to specific keys, such as $_SESSION['username']='john_doe'; it can store strings, numbers, arrays and even objects, but avoid storing too much data to avoid affecting performance. 2. When obtaining session variables, you need to call session_start() first, and then access the $_SESSION array through the key, such as echo$_SESSION['username']; it is recommended to use isset() to check whether the variable exists to avoid errors

Key methods to prevent SQL injection in PHP include: 1. Use preprocessing statements (such as PDO or MySQLi) to separate SQL code and data; 2. Turn off simulated preprocessing mode to ensure true preprocessing; 3. Filter and verify user input, such as using is_numeric() and filter_var(); 4. Avoid directly splicing SQL strings and use parameter binding instead; 5. Turn off error display in the production environment and record error logs. These measures comprehensively prevent the risk of SQL injection from mechanisms and details.
