Warning: file_get_contents(/data/phpspider/zhask/data//catemap/6/codeigniter/3.json): failed to open stream: No such file or directory in /data/phpspider/zhask/libs/function.php on line 167

Warning: Invalid argument supplied for foreach() in /data/phpspider/zhask/libs/tag.function.php on line 1116

Notice: Undefined index: in /data/phpspider/zhask/libs/function.php on line 180

Warning: array_chunk() expects parameter 1 to be array, null given in /data/phpspider/zhask/libs/function.php on line 181
Php Mongo db utf-8异常_Php_Codeigniter_Mongodb - Fatal编程技术网

Php Mongo db utf-8异常

Php Mongo db utf-8异常,php,codeigniter,mongodb,Php,Codeigniter,Mongodb,我想知道为什么在db中插入字符串时会遇到问题,例如嘿嘿%80而'%80'仍然会产生一个eception: Uncaught exception 'MongoException' with message 'non-utf8 string: hey hey �' 我需要做什么(是否%80不是utf-8;字符?:O js将字符串传递给控制器: function new_pool_post(_url,_data,_starter){ $.ajax({ type:'POST', dat

我想知道为什么在db中插入字符串时会遇到问题,例如
嘿嘿%80
'%80'
仍然会产生一个eception:

Uncaught exception 'MongoException' with message 'non-utf8 string: hey hey �'
我需要做什么(是否%80不是utf-8;字符?:O

js将字符串传递给控制器:

function new_pool_post(_url,_data,_starter){
$.ajax({
    type:'POST',
    data:_data,
    dataType:'json',
    url:_url,
    beforeSend:function(){
     $('.ajax-loading').show();
     $(_starter).attr('disabled','disabled');
    },
    error:function(){
        $('.ajax-loading').hide();
        $(_starter).removeAttr('disabled');
    },
    success:function(json){
    $('.ajax-loading').hide();
    $(_starter).removeAttr('disabled');
    if(json){
        $('.pool-append').prepend(json.pool_post);

    }
     }
});
}
控制器接收数据:

$id_project = $this->input->post('id_project',true);
               $id_user = $this->session->userdata('user_id');
               $pool_post = $this->input->post('pool_post',true);
控制器清理数据:

public function xss_clean($str, $is_image = FALSE)
    {
        /*
         * Is the string an array?
         *
         */
        if (is_array($str))
        {
            while (list($key) = each($str))
            {
                $str[$key] = $this->xss_clean($str[$key]);
            }

            return $str;
        }
                /*Remove non utf-8; chars*/

               $str =  htmlspecialchars(urlencode(preg_replace('/[\x00-\x1F\x80-\xFF]/','',$str)));

        /*
         * Remove Invisible Characters
         */
        $str = remove_invisible_characters($str);

        // Validate Entities in URLs
        $str = $this->_validate_entities($str);

        /*
         * URL Decode
         *
         * Just in case stuff like this is submitted:
         *
         * <a href="http://%77%77%77%2E%67%6F%6F%67%6C%65%2E%63%6F%6D">Google</a>
         *
         * Note: Use rawurldecode() so it does not remove plus signs
         *
         */
        $str = rawurldecode($str);

        /*
         * Convert character entities to ASCII
         *
         * This permits our tests below to work reliably.
         * We only convert entities that are within tags since
         * these are the ones that will pose security problems.
         *
         */

        $str = preg_replace_callback("/[a-z]+=([\'\"]).*?\\1/si", array($this, '_convert_attribute'), $str);

        $str = preg_replace_callback("/<\w+.*?(?=>|<|$)/si", array($this, '_decode_entity'), $str);

        /*
         * Remove Invisible Characters Again!
         */
        $str = remove_invisible_characters($str);

        /*
         * Convert all tabs to spaces
         *
         * This prevents strings like this: ja  vascript
         * NOTE: we deal with spaces between characters later.
         * NOTE: preg_replace was found to be amazingly slow here on 
         * large blocks of data, so we use str_replace.
         */

        if (strpos($str, "\t") !== FALSE)
        {
            $str = str_replace("\t", ' ', $str);
        }

        /*
         * Capture converted string for later comparison
         */
        $converted_string = $str;

        // Remove Strings that are never allowed
        $str = $this->_do_never_allowed($str);

        /*
         * Makes PHP tags safe
         *
         * Note: XML tags are inadvertently replaced too:
         *
         * <?xml
         *
         * But it doesn't seem to pose a problem.
         */
        if ($is_image === TRUE)
        {
            // Images have a tendency to have the PHP short opening and 
            // closing tags every so often so we skip those and only 
            // do the long opening tags.
            $str = preg_replace('/<\?(php)/i', "&lt;?\\1", $str);
        }
        else
        {
            $str = str_replace(array('<?', '?'.'>'),  array('&lt;?', '?&gt;'), $str);
        }

        /*
         * Compact any exploded words
         *
         * This corrects words like:  j a v a s c r i p t
         * These words are compacted back to their correct state.
         */
        $words = array(
                'javascript', 'expression', 'vbscript', 'script', 
                'applet', 'alert', 'document', 'write', 'cookie', 'window'
            );

        foreach ($words as $word)
        {
            $temp = '';

            for ($i = 0, $wordlen = strlen($word); $i < $wordlen; $i++)
            {
                $temp .= substr($word, $i, 1)."\s*";
            }

            // We only want to do this when it is followed by a non-word character
            // That way valid stuff like "dealer to" does not become "dealerto"
            $str = preg_replace_callback('#('.substr($temp, 0, -3).')(\W)#is', array($this, '_compact_exploded_words'), $str);
        }

        /*
         * Remove disallowed Javascript in links or img tags
         * We used to do some version comparisons and use of stripos for PHP5, 
         * but it is dog slow compared to these simplified non-capturing 
         * preg_match(), especially if the pattern exists in the string
         */
        do
        {
            $original = $str;

            if (preg_match("/<a/i", $str))
            {
                $str = preg_replace_callback("#<a\s+([^>]*?)(>|$)#si", array($this, '_js_link_removal'), $str);
            }

            if (preg_match("/<img/i", $str))
            {
                $str = preg_replace_callback("#<img\s+([^>]*?)(\s?/?>|$)#si", array($this, '_js_img_removal'), $str);
            }

            if (preg_match("/script/i", $str) OR preg_match("/xss/i", $str))
            {
                $str = preg_replace("#<(/*)(script|xss)(.*?)\>#si", '[removed]', $str);
            }
        }
        while($original != $str);

        unset($original);

        // Remove evil attributes such as style, onclick and xmlns
        $str = $this->_remove_evil_attributes($str, $is_image);

        /*
         * Sanitize naughty HTML elements
         *
         * If a tag containing any of the words in the list
         * below is found, the tag gets converted to entities.
         *
         * So this: <blink>
         * Becomes: &lt;blink&gt;
         */
        $naughty = 'alert|applet|audio|basefont|base|behavior|bgsound|blink|body|embed|expression|form|frameset|frame|head|html|ilayer|iframe|input|isindex|layer|link|meta|object|plaintext|style|script|textarea|title|video|xml|xss';
        $str = preg_replace_callback('#<(/*\s*)('.$naughty.')([^><]*)([><]*)#is', array($this, '_sanitize_naughty_html'), $str);

        /*
         * Sanitize naughty scripting elements
         *
         * Similar to above, only instead of looking for
         * tags it looks for PHP and JavaScript commands
         * that are disallowed.  Rather than removing the
         * code, it simply converts the parenthesis to entities
         * rendering the code un-executable.
         *
         * For example: eval('some code')
         * Becomes:     eval&#40;'some code'&#41;
         */
        $str = preg_replace('#(alert|cmd|passthru|eval|exec|expression|system|fopen|fsockopen|file|file_get_contents|readfile|unlink)(\s*)\((.*?)\)#si', "\\1\\2&#40;\\3&#41;", $str);


        // Final clean up
        // This adds a bit of extra precaution in case
        // something got through the above filters
        $str = $this->_do_never_allowed($str);

        /*
         * Images are Handled in a Special Way
         * - Essentially, we want to know that after all of the character 
         * conversion is done whether any unwanted, likely XSS, code was found.  
         * If not, we return TRUE, as the image is clean.
         * However, if the string post-conversion does not matched the 
         * string post-removal of XSS, then it fails, as there was unwanted XSS 
         * code found and removed/changed during processing.
         */

        if ($is_image === TRUE)
        {
            return ($str == $converted_string) ? TRUE: FALSE;
        }

        log_message('debug', "XSS Filtering completed");
        return $str;
    }
公共函数xss_clean($str,$is_image=FALSE)
{
/*
*字符串是数组吗?
*
*/
if(is_数组($str))
{
while(列表($key)=每个($str))
{
$str[$key]=$this->xss_clean($str[$key]);
}
返回$str;
}
/*移除非utf-8;字符*/
$str=htmlspecialchars(urlencode(preg_replace('/[\x00-\x1F\x80-\xFF]/',''$str));
/*
*删除不可见字符
*/
$str=删除不可见字符($str);
//验证URL中的实体
$str=$this->\u验证\u实体($str);
/*
*URL解码
*
*以防像这样的东西被提交:
*
* 
*
*注意:请使用rawurldecode(),这样它就不会删除加号
*
*/
$str=rawurldecode($str);
/*
*将字符实体转换为ASCII
*
*这使得我们下面的测试能够可靠地工作。
*我们只转换标记中的实体,因为
*这些都会带来安全问题。
*
*/
$str=preg\u replace\u回调(“/[a-z]+=([\'\'\“]).\\1/si”,数组($this,'.\u convert\u属性'),$str);
$str=preg_replace_回调(“/|我遇到了相关问题

情商

UTF-8的ucfirst需要使用mb_ucfirst('helo','UTF-8')

我认为在您的情况下,问题在于:substr需要使用mb_substr

其他:


因此,请将begin图标转换为iso-8859-1,并将write to db图标转换为Utf-8,以防止出现您可以使用的问题

header("Content-Type: text/html; charset=UTF-8");
在php文件的顶部。

在中找到了解决方案,并在使用拉丁特殊字符将MySQL DB迁移到MongoDB时为我工作。

即使您通过uri请求发送查询并且没有正确编码,
%80
的计算结果为ASCII
p
。请发布一些完整的代码片段。我正在使用codeigniter php框架,并在Post me中通过XHR请求传递字符串当然,问题出在其他地方。请尝试发布有问题的代码。我发布了大部分代码,但这是一个简单的数据转义,通过ajax插入mongo db。xss_clean()中的行$str=htmlspecialchars(urlencode(preg_replace('/[\x00-\x1F\x80-\xFF]/','',$str))方法是我添加的bean,尝试删除所有utf-8;字符,然后在您的回答之后,我添加了urlencode(),现在似乎可以处理字符,如“%80”嗯,我想我不明白…:P您能做得更好吗?您有同样的问题吗?将$temp.=substr($word,$i,1)。“\s*”替换为mb\U substr