php读取eml实例、php解析eml、eml解析成网页
php读取eml实例,本实例可以将导出eml文件解析成正文,并且可以将附件保存到服务器。不多说直接贴代码了。
如果你觉得此代码不错,请点个赞。谢谢~~~~
<?php // Author: richard [email protected]// gets parameterserror_reporting(E_ALL ^ (E_WARNING|E_NOTICE));header("Content-type: text/html; charset=utf-8");echo "<pre class="brush:php;toolbar:false">";define(EML_FILE_PATH,'./yjdata/');//if ($filename == '') $filename = '[email protected]_ZC4422-r7GMz_R9QF3K6XUhmJOXd4c.eml';//if ($filename == '') $filename = '[email protected]_ZC3218-dGquMgm7ytdF6HQgpSReC4c.eml';//if ($filename == '') $filename = '163.eml';//if ($filename == '') $filename = '166.eml';//if ($filename == '') $filename = 'nyf.eml';//if ($filename == '') $filename = 'email_header_icon.eml';if ($filename == '') $filename = '20141230133705.eml';$eml_file = EML_FILE_PATH.$filename;if (!($content = fread(fopen(EML_FILE_PATH.$filename, 'rb'), filesize(EML_FILE_PATH.$filename)))) die('File not found ('.EML_FILE_PATH.$filename.')'); //标题内容$pattern="/Subject: (.*?)\n/ims";preg_match($pattern,$content,$subject_results);$subject = getdecodevalue($subject_results[1]);echo "标题:".$subject;//发件人:$pattern="/From: .*?/ims";preg_match($pattern,$content,$from_results);$from = $from_results[1];echo "\n\r";echo "发件人:".$from;//收件人:$pattern="/To:(.*?):/ims";preg_match($pattern,$content,$to_results);$pattern="//ims";preg_match_all($pattern,$to_results[1],$to_results2);if(count($to_results2[1])>0){ $to = $to_results2[1];}else{ $pattern="/To:(.*?)\n/ims"; preg_match($pattern,$content,$to_results); $to = $to_results[1];}echo "\n\r";echo "收件人:";print_r($to);echo "\n\r";//正文内容$pattern = "/Content-Type: multipart\/alternative;.*?boundary=\"(.*?)\"/ims";preg_match($pattern,$content,$results);if($results[1]!=""){ $seperator = "--".$results[1];}else{ die("boundary匹配失败");}$spcontent = explode($seperator, $content);$items = array();$keyid = 0;$email_front_content_array = array();foreach($spcontent as $spkey=>$item) { //匹配header编码等信息 $pattern = "/Content-Type: ([^;]*?);.*?charset=(.*?)\nContent-Transfer-Encoding: (.*?)\n/ims"; preg_match($pattern,$item,$item_results); if(count($item_results)==4){ $Content_code = str_replace($item_results[0],"",$item); $item_results[4] = $Content_code; if(trim($item_results[3])=="base64"){ $item_results[5] = base64_decode($item_results[4]); } if(trim($item_results[3])=="quoted-printable"){ $item_results[5] = quoted_printable_decode($item_results[4]); } $item_results[5] = mb_convert_encoding($item_results[5], 'UTF-8', trim($item_results[2])); //echo $item_results[5];exit; $email_front_content_array[] = $item_results; }}foreach ($email_front_content_array as $email_front_content_each_key=>$email_front_content_each_value){ if($email_front_content_each_value[1]=='text/html'){ $content_html = $email_front_content_each_value[5]; break; }else{ $content_html = $email_front_content_each_value[5]; }}echo "内容:";echo "\n\r";echo $content_html;echo "\n\r";//附件内容$pattern = "/Content-Type: multipart\/mixed;.*?boundary=\"(.*?)\"/ims";preg_match($pattern,$content,$results);if($results[1]!=""){ $seperator = "--".$results[1]; $spcontent = explode($seperator, $content); $items = array(); $keyid = 0; $email_attachment_content_array = array(); foreach($spcontent as $spkey=>$item) { //匹配header编码等信息 $pattern = "/Content-Type: ([^;]*?);.*?name=(.*?)\nContent-Transfer-Encoding: (.*?)\nContent-Disposition: attachment;.*?filename=(.*?)\n/ims"; preg_match($pattern,$item,$item_results); //print_r($item_results); if(count($item_results)==5){ $Content_code = str_replace($item_results[0],"",$item); $item_results[5] = trim($Content_code); if(trim($item_results[3])=="base64"){ $item_results[6] = base64_decode($item_results[5]); } if(trim($item_results[3])=="quoted-printable"){ $item_results[6] = quoted_printable_decode($item_results[5]); } $item_results[7] = str_replace("\"","",getdecodevalue($item_results[2])); $item_results[8] = str_replace("\"","",getdecodevalue($item_results[4])); //保存附件内容到服务器? //符合规范的文件名时:有后缀名时。 if(strrpos($item_results[8], '.')!==false){ $ext = substr($item_results[8], strrpos($item_results[8], '.') + 1); //$filename = "./yjdata/attachment/".date("YmdHis").mt_rand(10000,99999).".".trim($ext); $attachment_filename = "./yjdata/attachment/".trim(str_replace("\"","",getbase64code($item_results[4]))).".".trim($ext); mkdirs(dirname($attachment_filename)); $fp = fopen($attachment_filename, "w+"); if (flock($fp, LOCK_EX)) { // 进行排它型锁定 fwrite($fp, $item_results[6]); flock($fp, LOCK_UN); // 释放锁定 } else { //echo "Couldn't lock the file !"; } fclose($fp); $item_results[9] = $attachment_filename; $email_attachment_content_array[] = $item_results; } } } //print_r($email_attachment_content_array);}if(count($email_attachment_content_array)>0){ echo "附件:"; echo "\n\r"; //附件读取 foreach($email_attachment_content_array as $email_attachment_content_each_key=>$email_attachment_content_each_value){ unset($email_attachment_content_each_value[5]); unset($email_attachment_content_each_value[6]); print_r($email_attachment_content_each_value[8]); print_r($email_attachment_content_each_value[9]); }}function getbase64code($content){ $pattern="/=\?GB2312\?B\?(.*?)\?=|=\?GBK\?B\?(.*?)\?=|=\?UTF-8\?B\?(.*?)\?=/ims"; preg_match($pattern,$content,$subject_results); if($subject_results[1]!=""){ $subject = $subject_results[1]; $charset = "GB2312"; } elseif($subject_results[2]!=""){ $subject = $subject_results[2]; $charset = "GBK"; } elseif($subject_results[3]!=""){ $subject = $subject_results[3]; $charset = "UTF-8"; }else{ $subject = $content; $charset = ""; } return $subject;}function getdecodevalue($content){ $pattern="/=\?GB2312\?B\?(.*?)\?=|=\?GBK\?B\?(.*?)\?=|=\?UTF-8\?B\?(.*?)\?=/ims"; preg_match($pattern,$content,$subject_results); if($subject_results[1]!=""){ $subject = base64_decode($subject_results[1]); $charset = "GB2312"; } elseif($subject_results[2]!=""){ $subject = base64_decode($subject_results[2]); $charset = "GBK"; } elseif($subject_results[3]!=""){ $subject = base64_decode($subject_results[3]); $charset = "UTF-8"; }else{ $subject = $content; $charset = ""; } if($charset!=""){ $subject = mb_convert_encoding($subject, 'UTF-8', $charset); } return $subject;}function mkdirs($dir){ if(!is_dir($dir)) { if(!mkdirs(dirname($dir))){ return false; } if(!mkdir($dir,0777)){ return false; } } chmod($dir, 777); //给目录操作权限 return true; }?>
有图有真相:
代码下载:
http://download.csdn.net/detail/e421083458/8365495

aphpdepentioncontiveContainerIsatoolThatManagesClassDeptions,增强codemodocultion,可验证性和Maintainability.itactsasaceCentralHubForeatingingIndections,因此reducingTightCightTightCoupOulplingIndeSingantInting。

选择DependencyInjection(DI)用于大型应用,ServiceLocator适合小型项目或原型。1)DI通过构造函数注入依赖,提高代码的测试性和模块化。2)ServiceLocator通过中心注册获取服务,方便但可能导致代码耦合度增加。

phpapplicationscanbeoptimizedForsPeedAndeffificeby:1)启用cacheInphp.ini,2)使用preparedStatatementSwithPdoforDatabasequesies,3)3)替换loopswitharray_filtaray_filteraray_maparray_mapfordataprocrocessing,4)conformentnginxasaseproxy,5)

phpemailvalidation invoLvesthreesteps:1)格式化进行regulareXpressecthemailFormat; 2)dnsvalidationtoshethedomainhasavalidmxrecord; 3)

tomakephpapplicationsfaster,关注台词:1)useopcodeCachingLikeLikeLikeLikeLikePachetoStorePreciledScompiledScriptbyTecode.2)MinimimiedAtabaseSqueriSegrieSqueriSegeriSybysequeryCachingandeffeftExting.3)Leveragephp7 leveragephp7 leveragephp7 leveragephpphp7功能forbettercodeefficy.4)

到ImprovephPapplicationspeed,关注台词:1)启用opcodeCachingwithapCutoredUcescriptexecutiontime.2)实现databasequerycachingusingpdotominiminimizedatabasehits.3)usehttp/2tomultiplexrequlexrequestsandredececonnection.4 limitsclection.4.4

依赖注入(DI)通过显式传递依赖关系,显着提升了PHP代码的可测试性。 1)DI解耦类与具体实现,使测试和维护更灵活。 2)三种类型中,构造函数注入明确表达依赖,保持状态一致。 3)使用DI容器管理复杂依赖,提升代码质量和开发效率。

databasequeryOptimizationinphpinvolVolVOLVESEVERSEVERSTRATEMIESOENHANCEPERANCE.1)SELECTONLYNLYNESSERSAYCOLUMNSTORMONTOUMTOUNSOUDSATATATATATATATATATATRANSFER.3)


热AI工具

Undresser.AI Undress
人工智能驱动的应用程序,用于创建逼真的裸体照片

AI Clothes Remover
用于从照片中去除衣服的在线人工智能工具。

Undress AI Tool
免费脱衣服图片

Clothoff.io
AI脱衣机

Video Face Swap
使用我们完全免费的人工智能换脸工具轻松在任何视频中换脸!

热门文章

热工具

SecLists
SecLists是最终安全测试人员的伙伴。它是一个包含各种类型列表的集合,这些列表在安全评估过程中经常使用,都在一个地方。SecLists通过方便地提供安全测试人员可能需要的所有列表,帮助提高安全测试的效率和生产力。列表类型包括用户名、密码、URL、模糊测试有效载荷、敏感数据模式、Web shell等等。测试人员只需将此存储库拉到新的测试机上,他就可以访问到所需的每种类型的列表。

DVWA
Damn Vulnerable Web App (DVWA) 是一个PHP/MySQL的Web应用程序,非常容易受到攻击。它的主要目标是成为安全专业人员在合法环境中测试自己的技能和工具的辅助工具,帮助Web开发人员更好地理解保护Web应用程序的过程,并帮助教师/学生在课堂环境中教授/学习Web应用程序安全。DVWA的目标是通过简单直接的界面练习一些最常见的Web漏洞,难度各不相同。请注意,该软件中

Dreamweaver CS6
视觉化网页开发工具

Atom编辑器mac版下载
最流行的的开源编辑器

Dreamweaver Mac版
视觉化网页开发工具