Table of Contents
PHP实现linux命令tail -f
如果初始文件太大或者改变内容太多
如何检测文件大小的变化
代码实现
下面是结果
Home Backend Development PHP Tutorial PHP实现linux命令tail -f

PHP实现linux命令tail -f

Jun 20, 2016 pm 12:36 PM

PHP实现linux命令tail -f

今天突然想到之前有人问过我的一个问题,如何通过PHP实现linux中的命令 tail -f ,这里就来分析实现下。

这个想一想也挺简单,通过一个循环检测文件,看文件的大小是否有变化,如果有变化,输出文件变化的部分,当然了这里面会有好多的细节,这里具体分析下。

如果初始文件太大或者改变内容太多

这个时候一下输出好多内容可能看不清,因此我这里设置了一个阈值 8192 ,当内容长度超过这个阈值的时候,只输出最后面的 8192 个字节,这样就不会出现大面积的刷新导致看不清的问题。

如何检测文件大小的变化

这个问题是这个程序的核心,能不能成功,性能的好坏就靠这部分了。我在这里的实现是下面这样:

  • 打开文件句柄 $fp ,这里要注意,这里的文件句柄全程需中只打开一次关闭一次,因此要将他放在循环的外面。
  • 初始化当前文件大小 file_size 和 file_size_new 都为0。
    • 循环里面更新 file_size_new 文件大小,这里要注意,php中获取文件大小之前一定要运行函数 clearstatcache() ,清除文件状态缓存,否则获取文件大小可能会有偏差。
    • 计算 add_size = file_size_new - file_size ,看文件大小是否有变化,如果有变化,将文件指针移动到指定位置,然后输出新加的内容,更新 file_size 值为 new_file_size 。
    • usleep(50000),睡眠1/20秒。

代码实现

#!/usr/bin/env php <?phpif(2 != count($argv)){    fwrite(        STDERR,        "调用格式错误!使用格式 ./tail filename".PHP_EOL    );      return 1;}$file_name      = $argv[1];define("MAX_SHOW", 8192);$file_size      = 0;$file_size_new  = 0;$add_size       = 0;$ignore_size    = 0;$fp = fopen($file_name, "r");while(1){    clearstatcache();    $file_size_new  = filesize($file_name);    $add_size       = $file_size_new - $file_size;    if($add_size > 0){         if($add_size > MAX_SHOW){            $ignore_size    = $add_size - MAX_SHOW;            $add_size       = MAX_SHOW;            fseek($fp, $file_size + $ignore_size);        }           fwrite(            STDOUT,            fread($fp, $add_size)        );          $file_size  = $file_size_new;    }    usleep(50000);}fclose($fp);
Copy after login

代码实现这里第一行的 #!/usr/bin/env php 是告诉可执行文件,可执行文件 php 在系统 PATH 中查找,这样的好处就是移植性好。

2016-02-22 11:28:51改进

查了PHP官方手册, fseek 函数这里可以改进改进,这个函数还接受第三个参数,表示偏移指针的类型,默认是 SEEK_SET ,从开始偏移,还可以设置为 SEEK_CUR ,表示从当前位置偏移,因此这里改为 fseek($fp, $ignore_size, $ignore_size);

下面是结果

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

Explain JSON Web Tokens (JWT) and their use case in PHP APIs. Explain JSON Web Tokens (JWT) and their use case in PHP APIs. Apr 05, 2025 am 12:04 AM

JWT is an open standard based on JSON, used to securely transmit information between parties, mainly for identity authentication and information exchange. 1. JWT consists of three parts: Header, Payload and Signature. 2. The working principle of JWT includes three steps: generating JWT, verifying JWT and parsing Payload. 3. When using JWT for authentication in PHP, JWT can be generated and verified, and user role and permission information can be included in advanced usage. 4. Common errors include signature verification failure, token expiration, and payload oversized. Debugging skills include using debugging tools and logging. 5. Performance optimization and best practices include using appropriate signature algorithms, setting validity periods reasonably,

How does session hijacking work and how can you mitigate it in PHP? How does session hijacking work and how can you mitigate it in PHP? Apr 06, 2025 am 12:02 AM

Session hijacking can be achieved through the following steps: 1. Obtain the session ID, 2. Use the session ID, 3. Keep the session active. The methods to prevent session hijacking in PHP include: 1. Use the session_regenerate_id() function to regenerate the session ID, 2. Store session data through the database, 3. Ensure that all session data is transmitted through HTTPS.

Describe the SOLID principles and how they apply to PHP development. Describe the SOLID principles and how they apply to PHP development. Apr 03, 2025 am 12:04 AM

The application of SOLID principle in PHP development includes: 1. Single responsibility principle (SRP): Each class is responsible for only one function. 2. Open and close principle (OCP): Changes are achieved through extension rather than modification. 3. Lisch's Substitution Principle (LSP): Subclasses can replace base classes without affecting program accuracy. 4. Interface isolation principle (ISP): Use fine-grained interfaces to avoid dependencies and unused methods. 5. Dependency inversion principle (DIP): High and low-level modules rely on abstraction and are implemented through dependency injection.

How to debug CLI mode in PHPStorm? How to debug CLI mode in PHPStorm? Apr 01, 2025 pm 02:57 PM

How to debug CLI mode in PHPStorm? When developing with PHPStorm, sometimes we need to debug PHP in command line interface (CLI) mode...

How to automatically set permissions of unixsocket after system restart? How to automatically set permissions of unixsocket after system restart? Mar 31, 2025 pm 11:54 PM

How to automatically set the permissions of unixsocket after the system restarts. Every time the system restarts, we need to execute the following command to modify the permissions of unixsocket: sudo...

Explain late static binding in PHP (static::). Explain late static binding in PHP (static::). Apr 03, 2025 am 12:04 AM

Static binding (static::) implements late static binding (LSB) in PHP, allowing calling classes to be referenced in static contexts rather than defining classes. 1) The parsing process is performed at runtime, 2) Look up the call class in the inheritance relationship, 3) It may bring performance overhead.

Framework Security Features: Protecting against vulnerabilities. Framework Security Features: Protecting against vulnerabilities. Mar 28, 2025 pm 05:11 PM

Article discusses essential security features in frameworks to protect against vulnerabilities, including input validation, authentication, and regular updates.

See all articles