开发环境下如何进行安全加固呢
作者:人工智能 来源:数据库 浏览: 【大中小】 发布时间:2025-11-05 00:46:53 评论数:

复制root@develop:/usr/local/nginx/scripts# cat filter_white.lua -- 默认配置 local redis = require resty.redis local allow = false -- 连接Redis local red = redis:new() local ok,环境 err = red:connect(172.17.173.183, 26379) if not ok then ngx.log(ngx.ERR, connect to redis failed: .. err) end local res, err = red:auth(Huajianghu@123) if not res then ngx.log(ngx.ERR, failed to authenticate: .. err) end -- 过滤精确IP --if red:sismember(white:dev:ip, ngx.var.remote_addr) == 1 then -- allow = true --end -- 过滤IP地址段 local iputils = require("resty.iputils") iputils.enable_lrucache() local white_ips =red:smembers(white:dev:ip) local whitelist = iputils.parse_cidrs(white_ips) if iputils.ip_in_cidrs(ngx.var.remote_addr, whitelist) then allow = true end -- 过滤URL if not allow then local url = ngx.var.http_host .. ngx.var.uri local white_urls = red:smembers(white:dev:url) forindex, white_url in ipairs(white_urls) do if url:match(white_url) then allow = true break end end end -- 默认策略 if not allow then ngx.log(ngx.ERR, "not allow: " .. ngx.var.http_host .. ngx.var.uri) ngx.status = ngx.HTTP_FORBIDDEN ngx.say(请申请白名单) ngx.exit(200) end 1.2.3.4.5.6.7.8.9.10.11.12.13.14.15.16.17.18.19.20.21.22.23.24.25.26.27.28.29.30.31.32.33.34.35.36.37.38.39.40.41.42.43.44.45.46.47.48.49.50.
