<dfn id="w48us"></dfn><ul id="w48us"></ul>
  • <ul id="w48us"></ul>
  • <del id="w48us"></del>
    <ul id="w48us"></ul>
  • PHP CURL內(nèi)存泄露的解決方法

    時間:2024-10-23 13:35:58 PHP 我要投稿
    • 相關推薦

    PHP CURL內(nèi)存泄露的解決方法

      curl配置平淡無奇,長時間運行發(fā)現(xiàn)一個嚴重問題,內(nèi)存泄露!不論用單線程和多線程都無法避免!是curl訪問https站點的時候有bug!

      內(nèi)存泄露可以通過linux的top命令發(fā)現(xiàn),使用php函數(shù)memory_get_usage()不會發(fā)現(xiàn)。

      經(jīng)過反復調(diào)試找到解決辦法,curl配置添加如下幾項解決問題:

      復制代碼 代碼如下:

      [CURLOPT_HTTPPROXYTUNNEL] = true;

      [CURLOPT_SSL_VERIFYPEER] = false;

      [CURLOPT_SSL_VERIFYHOST] = false;

      CURLOPT_HTTPPROXYTUNNEL具體說明stackoverflow上有,直接貼原文:

      Without CURLOPT_HTTPPROXYTUNNEL

      Without CURLOPT_HTTPPROXYTUNNEL : You just use the proxy address/port as a destination of your HTTP request. The proxy will read the HTTP headers of your query, forward your request to the destination (with your HTTP headers) and then write the response to you.

      Example steps :

      1)HTTP GET / sent to 1.1.1.1 (proxy)

      2)1.1.1.1 receive request and parse header for getting the final destination of your HTTP request.

      3)1.1.1.1 forward your query and headers to www.site.com (destination in request headers).

      4)1.1.1.1 write back to you the response receive from www.site.com

      With CURLOPT_HTTPPROXYTUNNEL

      With CURLOPT_HTTPPROXYTUNNEL : You ask the proxy to open a direct binary connection (like HTTPS, called a TCP Tunnel) directly to your destination by doing a CONNECT HTTP request. When the tunnel is ok, the proxy write you back a HTTP/1.1 200 Connection established. When it received your browser start to query the destination directly : The proxy does not parse HTTP headers and theoretically does not read tunnel datas, it just forward it, thats why it is called a tunnel !

      Example steps :

      1)HTTP CONNECT sent to 1.1.1.1

      2)1.1.1.1 receive HTTP CONNECT and get the ip/port of your final destination (header field of HTTP CONNECT).

      3)1.1.1.1 open a TCP Socket by doing a TCP handshake to your destination 2.22.63.73:80 (ip/port of www.site.com).

      4)1.1.1.1 Make a tunnel by piping your TCP Socket to the TCP Socket opened to 2.22.63.73:80and then write you back HTTP/1.1 200 Connection established witch means that your client can now make your query throw the TCP Tunnel (TCP datas received will be transmited directly to server and vice versa).

    【PHP CURL內(nèi)存泄露的解決方法】相關文章:

    JAVA垃圾收集算法與內(nèi)存泄露的解決方法12-04

    PHP中curl的使用實例07-31

    Javascript 閉包引起IE內(nèi)存泄露分析07-05

    PHP的cURL庫有效地抓網(wǎng)頁的技巧08-08

    關于深入PHP內(nèi)存相關的功能特性詳解09-02

    電腦內(nèi)存常見故障及解決方法05-12

    手機內(nèi)存卡故障及解決方法10-10

    電腦內(nèi)存六大故障以及解決方法09-26

    Intel傲騰內(nèi)存是內(nèi)存還是固態(tài)硬盤06-17

    電腦內(nèi)存的作用08-26

    主站蜘蛛池模板: 国产精品狼人久久久久影院| 中文精品人人永久免费| 午夜精品久久久内射近拍高清| 精品国产第一国产综合精品| 久久久久亚洲精品男人的天堂 | 国产精品v欧美精品v日本精| 久久精品国产亚洲AV无码偷窥| 久久国产精品免费一区二区三区| 欧美一区二区精品久久| 精品国产一区二区三区久久久狼 | 久久99国产精品久久| 久久亚洲精品国产精品| 亚洲七七久久精品中文国产| 精品午夜福利1000在线观看 | 亚洲愉拍99热成人精品热久久| 国精品无码A区一区二区| 中文字幕一区二区精品区| 99在线精品视频| 国产欧美亚洲精品A| 精品卡一卡二卡乱码高清| 亚洲国产精品嫩草影院在线观看| 欧美精品综合视频一区二区| 精品一区二区三区四区在线| 国产精品成人国产乱一区| 一区二区三区国产精品| 日韩精品免费视频| 欧美精品免费在线| 久久精品无码一区二区三区| 久久精品成人免费网站| 精品999在线| 欧美精品一区二区三区在线| 久久99热精品| 亚洲国产精品久久66| 91精品国产91热久久久久福利| 99久久99久久精品国产片果冻| 91精品国产91久久久久久青草| 中文精品久久久久国产网址| 成人亚洲日韩精品免费视频| 国产欧美精品专区一区二区| 精品国产亚洲男女在线线电影| 久久性精品|