0%

一、配置Docker并使用IDEA新建一个Spring Boot项目

  • 配置Docker:
    vim /lib/systemd/system/docker.service,在ExecStart的行尾加上-H tcp://0.0.0.0:2375,如果服务器有安全组或者防火墙,记得把端口2375放行

docker,2375

docker,2375

  • 创建项目Spring Boot (自行创建)

二、指定Dockerfile

  • 在项目main目录中新建一个目录,名字随缘,我这里就叫:docker
  • 新建的目录中放Dockerfile
  • docker,Dockerfile

三、修改项目中的pom.xml

修改pom.xml在其build>plugins节点下插入新的配置:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
<build>
<plugins>
<!--这里是创建项目适合自动生成的打包插件-->
<plugin>
<groupId>org.springframework.boot</groupId>
<artifactId>spring-boot-maven-plugin</artifactId>
</plugin>

<!-- 下面是新加的 -->
<plugin>
<groupId>com.spotify</groupId>
<artifactId>docker-maven-plugin</artifactId>
<version>1.0.0</version>
<configuration>
<!-- IP-->
<dockerHost>http://192.168.1.48:2375</dockerHost>
<!-- Dockerfile文件位置-->
<dockerDirectory>src/main/docker</dockerDirectory>
<!-- 镜像名称以及版本号-->
<imageName>${project.name}:${project.version}</imageName>
<!-- 复制jar到docker镜像的指定位置-->
<resources>
<resource>
<targetPath>/</targetPath>
<directory>${project.build.directory}</directory>
<include>${project.build.finalName}.jar</include>
</resource>
</resources>
</configuration>
</plugin>
</plugins>
</build>

四、打包运行

  • mvn clear:
  • mvn pacagemvn install:
  • Plugins>docker>docker:build

docker,Dockerfile

上面四步执行完以后,服务器上已经生成一个基于创建项目的镜像了,剩下的就是运行创建的镜像

  • 运行:

docker,Dockerfile
docker,Dockerfile

看了好多篇文章,再根据自己的理解进行的配置。

一、Mevan相关配置

1.SpringBoot版本

1
2
3
4
5
6
<parent>
<groupId>org.springframework.boot</groupId>
<artifactId>spring-boot-starter-parent</artifactId>
<version>2.3.0.RELEASE</version>
<relativePath/> <!-- lookup parent from repository -->
</parent>

2.引入spring-redis

1
2
3
4
<dependency>
<groupId>org.springframework.boot</groupId>
<artifactId>spring-boot-starter-data-redis</artifactId>
</dependency>

二、application.yml配置

1
2
3
4
5
6
7
8
9
10
11
spring:
# 省略数据库等其它配置...
redis:
host: 127.0.0.1
port: 6379
database: 0
timeout: 1000s
cache:
redis:
time-to-live: 10000

三、redis配置类

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
package link.codedog.demo.configuration;

import com.fasterxml.jackson.annotation.JsonAutoDetect;
import com.fasterxml.jackson.annotation.PropertyAccessor;
import com.fasterxml.jackson.databind.ObjectMapper;
import org.springframework.cache.CacheManager;
import org.springframework.cache.annotation.CachingConfigurerSupport;
import org.springframework.cache.annotation.EnableCaching;
import org.springframework.cache.interceptor.KeyGenerator;
import org.springframework.context.annotation.Bean;
import org.springframework.context.annotation.Configuration;
import org.springframework.data.redis.cache.RedisCacheConfiguration;
import org.springframework.data.redis.cache.RedisCacheManager;
import org.springframework.data.redis.connection.RedisConnectionFactory;
import org.springframework.data.redis.core.RedisTemplate;
import org.springframework.data.redis.serializer.Jackson2JsonRedisSerializer;
import org.springframework.data.redis.serializer.RedisSerializationContext;
import org.springframework.data.redis.serializer.RedisSerializer;
import org.springframework.data.redis.serializer.StringRedisSerializer;

import java.time.Duration;
import java.util.HashMap;
import java.util.Map;

@Configuration
@EnableCaching//启用缓存注解 用于开启@Cacheable、@CachePut、@CacheEvict
public class RedisConfig extends CachingConfigurerSupport {

public static final String REDIS_KEY_DATABASE = "messaging";

@Bean
public RedisTemplate<String,Object> redisTemplate(RedisConnectionFactory factory){
RedisTemplate<String,Object> template = new RedisTemplate<>();
// 配置连接工厂
template.setConnectionFactory(factory);
// 使用Jackson2JsonRedisSerializer来序列化和反序列化redis的value值(默认使用JDK的序列化方式)
RedisSerializer jackson2JsonRedisSerializer = jsonSerializer();
RedisSerializer<String> stringRedisSerializer = new StringRedisSerializer();

// key采用String的序列化方式
template.setKeySerializer(stringRedisSerializer);
// hash的key也采用String的序列化方式
template.setHashKeySerializer(stringRedisSerializer);
// value序列化方式采用jackson
template.setValueSerializer(jackson2JsonRedisSerializer);
// hash的value序列化方式采用jackson
template.setHashValueSerializer(jackson2JsonRedisSerializer);
template.afterPropertiesSet();

return template;
}

@Bean
public CacheManager cacheManager(RedisConnectionFactory factory) {
RedisCacheManager cacheManager = RedisCacheManager.builder(factory)
.cacheDefaults(this.getRedisCacheConfigurationWithTtl(-1)) // 默认策略,未配置的 key 会使用这个
.withInitialCacheConfigurations(this.getRedisCacheConfigurationMap()) // 指定 key 策略
.build();
return cacheManager;
}


@Bean
public KeyGenerator simpleKeyGenerator() {
return (o, method, objects) -> {
StringBuilder stringBuilder = new StringBuilder();
stringBuilder.append(o.getClass().getSimpleName());
stringBuilder.append(".");
stringBuilder.append(method.getName());
stringBuilder.append("[");
for (Object obj : objects) {
stringBuilder.append(obj.toString());
}
stringBuilder.append("]");

return stringBuilder.toString();
};
}

/**
* 解决默认@Cacheable注解没有过期时间的问题
* @return
*/
private Map<String, RedisCacheConfiguration> getRedisCacheConfigurationMap() {
Map<String, RedisCacheConfiguration> redisCacheConfigurationMap = new HashMap<>();
redisCacheConfigurationMap.put(REDIS_KEY_DATABASE.concat(":ClueList"), this.getRedisCacheConfigurationWithTtl(3000));

return redisCacheConfigurationMap;
}

private RedisCacheConfiguration getRedisCacheConfigurationWithTtl(Integer seconds) {
RedisSerializer<String> redisSerializer = new StringRedisSerializer();

// 配置序列化(解决乱码的问题)
RedisCacheConfiguration config = RedisCacheConfiguration.defaultCacheConfig()
.entryTtl(Duration.ofSeconds(seconds))
.serializeKeysWith(RedisSerializationContext.SerializationPair.fromSerializer(redisSerializer))
.serializeValuesWith(RedisSerializationContext.SerializationPair.fromSerializer(jsonSerializer()))
.disableCachingNullValues();

return config;
}

private RedisSerializer jsonSerializer(){
Jackson2JsonRedisSerializer<Object> jackson2JsonRedisSerializer = new Jackson2JsonRedisSerializer<Object>(Object.class);
//解决查询缓存转换异常的问题
ObjectMapper om = new ObjectMapper();
om.setVisibility(PropertyAccessor.ALL, JsonAutoDetect.Visibility.ANY);
om.enableDefaultTyping(ObjectMapper.DefaultTyping.NON_FINAL);
jackson2JsonRedisSerializer.setObjectMapper(om);

return jackson2JsonRedisSerializer;
}
}

四、使用

1
2
3
4
5
@Cacheable(value = "messaging:ClueList",keyGenerator = "simpleKeyGenerator",unless = "#result==null")
public List<Clue> getList(){
List<Clue> all = clueRepository.findAll();
return all;
}

要指定 key 的过期时间,只要在getRedisCacheConfigurationMap方法中添加就可以。
然后只需要 @Cacheable 就可以把数据存入redis

1
2
@Cacheable(value = "messaging:ClueList",keyGenerator = "simpleKeyGenerator",unless = "#result==null") // 3000秒
@Cacheable(value = "这里随便写个字符串", keyGenerator = "simpleKeyGenerator") // 不过期,未指定的key,使用默认策略

前言

前一篇介绍了 Spring Security 入门的基础准备。从今天开始我们来一步步窥探它是如何工作的。

准备

Spring Boot集成 Spring Security 只需要引入其对应的依赖即可

1
2
3
4
<dependency>
<groupId>org.springframework.boot</groupId>
<artifactId>spring-boot-starter-security</artifactId>
</dependency>

添加完成后声明一个index路由:

1
2
3
4
5
6
7
8
@Controller
public class MainController {

@RequestMapping(value = {"", "/", "/index"})
public String main() {
return "index";
}
}

这里我返回了一个首页index,完成后启动项目,访问:http://127.0.0.1:8080会自动跳转到一个登陆页面http://127.0.0.1:8080/login如下:
登陆页面

这里是因为我们项目中引入了Spring Security以后,自动装配了Spring Security的环境,Spring Security的默认配置是要求经过认证成功后才可以访问到URL对应的资源,Spring Security的默认用户名是:user密码则是一串uuid字符串,输出在控制台里,仔细看一下下图,你可以发现该随机密码是由UserDetailsServiceAutoConfiguration配置生成的:
控制台输出

UserDetailsServiceAutoConfiguration

UserDetailsServiceAutoConfiguration全包名为:org.springframework.boot.autoconfigure.security.servlet.UserDetailsServiceAutoConfiguration
源码如下:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
/*
* Copyright 2012-2019 the original author or authors.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* https://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/

package org.springframework.boot.autoconfigure.security.servlet;

import java.util.List;
import java.util.regex.Pattern;

import org.apache.commons.logging.Log;
import org.apache.commons.logging.LogFactory;

import org.springframework.beans.factory.ObjectProvider;
import org.springframework.boot.autoconfigure.EnableAutoConfiguration;
import org.springframework.boot.autoconfigure.condition.ConditionalOnBean;
import org.springframework.boot.autoconfigure.condition.ConditionalOnClass;
import org.springframework.boot.autoconfigure.condition.ConditionalOnMissingBean;
import org.springframework.boot.autoconfigure.security.SecurityProperties;
import org.springframework.context.annotation.Bean;
import org.springframework.context.annotation.Configuration;
import org.springframework.context.annotation.Lazy;
import org.springframework.security.authentication.AuthenticationManager;
import org.springframework.security.authentication.AuthenticationProvider;
import org.springframework.security.config.annotation.ObjectPostProcessor;
import org.springframework.security.core.userdetails.User;
import org.springframework.security.core.userdetails.UserDetailsService;
import org.springframework.security.crypto.password.PasswordEncoder;
import org.springframework.security.provisioning.InMemoryUserDetailsManager;
import org.springframework.util.StringUtils;

/**
* {@link EnableAutoConfiguration Auto-configuration} for a Spring Security in-memory
* {@link AuthenticationManager}. Adds an {@link InMemoryUserDetailsManager} with a
* default user and generated password. This can be disabled by providing a bean of type
* {@link AuthenticationManager}, {@link AuthenticationProvider} or
* {@link UserDetailsService}.
*
* @author Dave Syer
* @author Rob Winch
* @author Madhura Bhave
* @since 2.0.0
*/
@Configuration
@ConditionalOnClass(AuthenticationManager.class)
@ConditionalOnBean(ObjectPostProcessor.class)
@ConditionalOnMissingBean({ AuthenticationManager.class, AuthenticationProvider.class, UserDetailsService.class })
public class UserDetailsServiceAutoConfiguration {

private static final String NOOP_PASSWORD_PREFIX = "{noop}";

private static final Pattern PASSWORD_ALGORITHM_PATTERN = Pattern.compile("^\\{.+}.*$");

private static final Log logger = LogFactory.getLog(UserDetailsServiceAutoConfiguration.class);

@Bean
@ConditionalOnMissingBean(
type = "org.springframework.security.oauth2.client.registration.ClientRegistrationRepository")
@Lazy
public InMemoryUserDetailsManager inMemoryUserDetailsManager(SecurityProperties properties,
ObjectProvider<PasswordEncoder> passwordEncoder) {
SecurityProperties.User user = properties.getUser();
List<String> roles = user.getRoles();
return new InMemoryUserDetailsManager(
User.withUsername(user.getName()).password(getOrDeducePassword(user, passwordEncoder.getIfAvailable()))
.roles(StringUtils.toStringArray(roles)).build());
}

private String getOrDeducePassword(SecurityProperties.User user, PasswordEncoder encoder) {
String password = user.getPassword();
if (user.isPasswordGenerated()) {
logger.info(String.format("%n%nUsing generated security password: %s%n", user.getPassword()));
}
if (encoder != null || PASSWORD_ALGORITHM_PATTERN.matcher(password).matches()) {
return password;
}
return NOOP_PASSWORD_PREFIX + password;
}

}

关于几个注解的解释:

  • @ConditionalOnBean 当给定的在bean存在时,则实例化当前Bean
  • @ConditionalOnMissingBean 当给定的在bean不存在时,则实例化当前Bean
  • @ConditionalOnClass 当给定的类名在类路径上存在,则实例化当前Bean
  • @ConditionalOnMissingClass 当给定的类名在类路径上不存在,则实例化当前Bean

从几个@Conditional注解我们可以看出UserDetailsServiceAutoConfiguration这个类在类路径下存在AuthenticationManager、在Spring容器中存在BeanObjectPostProcessor并且不存在Bean AuthenticationManager, AuthenticationProvider, UserDetailsService的情况下才会生效;
该类初始化了一个名为inMemoryUserDetailsManager的基于内存的用户管理器,并且调用getOrDeducePassword()为我们生成了一个随机密码,SecurityProperties.User user = properties.getUser();这就是我们上面项目启动时,默认加载的用户:user

InMemoryUserDetailsManager

可以看出上面的UserDetailsServiceAutoConfiguration中初始化了一个名为inMemoryUserDetailsManager的类,全包名为:org.springframework.security.provisioning.InMemoryUserDetailsManager,其源码为:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
/*
* Copyright 2002-2016 the original author or authors.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* https://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.springframework.security.provisioning;

import java.util.Collection;
import java.util.Enumeration;
import java.util.HashMap;
import java.util.Map;
import java.util.Properties;

import org.apache.commons.logging.Log;
import org.apache.commons.logging.LogFactory;
import org.springframework.security.access.AccessDeniedException;
import org.springframework.security.authentication.AuthenticationManager;
import org.springframework.security.authentication.UsernamePasswordAuthenticationToken;
import org.springframework.security.core.Authentication;
import org.springframework.security.core.context.SecurityContextHolder;
import org.springframework.security.core.userdetails.User;
import org.springframework.security.core.userdetails.UserDetails;
import org.springframework.security.core.userdetails.UserDetailsPasswordService;
import org.springframework.security.core.userdetails.UsernameNotFoundException;
import org.springframework.security.core.userdetails.memory.UserAttribute;
import org.springframework.security.core.userdetails.memory.UserAttributeEditor;
import org.springframework.util.Assert;

/**
* Non-persistent implementation of {@code UserDetailsManager} which is backed by an
* in-memory map.
* <p>
* Mainly intended for testing and demonstration purposes, where a full blown persistent
* system isn't required.
*
* @author Luke Taylor
* @since 3.1
*/
public class InMemoryUserDetailsManager implements UserDetailsManager,
UserDetailsPasswordService {
protected final Log logger = LogFactory.getLog(getClass());

private final Map<String, MutableUserDetails> users = new HashMap<>();

private AuthenticationManager authenticationManager;

public InMemoryUserDetailsManager() {
}

public InMemoryUserDetailsManager(Collection<UserDetails> users) {
for (UserDetails user : users) {
createUser(user);
}
}

public InMemoryUserDetailsManager(UserDetails... users) {
for (UserDetails user : users) {
createUser(user);
}
}

public InMemoryUserDetailsManager(Properties users) {
Enumeration<?> names = users.propertyNames();
UserAttributeEditor editor = new UserAttributeEditor();

while (names.hasMoreElements()) {
String name = (String) names.nextElement();
editor.setAsText(users.getProperty(name));
UserAttribute attr = (UserAttribute) editor.getValue();
UserDetails user = new User(name, attr.getPassword(), attr.isEnabled(), true,
true, true, attr.getAuthorities());
createUser(user);
}
}

public void createUser(UserDetails user) {
Assert.isTrue(!userExists(user.getUsername()), "user should not exist");

users.put(user.getUsername().toLowerCase(), new MutableUser(user));
}

public void deleteUser(String username) {
users.remove(username.toLowerCase());
}

public void updateUser(UserDetails user) {
Assert.isTrue(userExists(user.getUsername()), "user should exist");

users.put(user.getUsername().toLowerCase(), new MutableUser(user));
}

public boolean userExists(String username) {
return users.containsKey(username.toLowerCase());
}

public void changePassword(String oldPassword, String newPassword) {
Authentication currentUser = SecurityContextHolder.getContext()
.getAuthentication();

if (currentUser == null) {
// This would indicate bad coding somewhere
throw new AccessDeniedException(
"Can't change password as no Authentication object found in context "
+ "for current user.");
}

String username = currentUser.getName();

logger.debug("Changing password for user '" + username + "'");

// If an authentication manager has been set, re-authenticate the user with the
// supplied password.
if (authenticationManager != null) {
logger.debug("Reauthenticating user '" + username
+ "' for password change request.");

authenticationManager.authenticate(new UsernamePasswordAuthenticationToken(
username, oldPassword));
}
else {
logger.debug("No authentication manager set. Password won't be re-checked.");
}

MutableUserDetails user = users.get(username);

if (user == null) {
throw new IllegalStateException("Current user doesn't exist in database.");
}

user.setPassword(newPassword);
}

@Override
public UserDetails updatePassword(UserDetails user, String newPassword) {
String username = user.getUsername();
MutableUserDetails mutableUser = this.users.get(username.toLowerCase());
mutableUser.setPassword(newPassword);
return mutableUser;
}

public UserDetails loadUserByUsername(String username)
throws UsernameNotFoundException {
UserDetails user = users.get(username.toLowerCase());

if (user == null) {
throw new UsernameNotFoundException(username);
}

return new User(user.getUsername(), user.getPassword(), user.isEnabled(),
user.isAccountNonExpired(), user.isCredentialsNonExpired(),
user.isAccountNonLocked(), user.getAuthorities());
}

public void setAuthenticationManager(AuthenticationManager authenticationManager) {
this.authenticationManager = authenticationManager;
}
}

从该类中我们可以看出,其中的几个方法,其作用就是对用户(UserDetails)的增删改查:

  • createUser(UserDetails user)创建UserDetails
  • updateUser(UserDetails user)更新UserDetails
  • deleteUser(String username)根据username删除UserDetails
  • userExists(String username)根据username检查系统中是否存在对应的UserDetails
  • changePassword(String oldPassword, String newPassword)修改密码
  • loadUserByUsername(String username)通过用户名获得对应的UserDetails

该类还实现了UserDetailsManagerUserDetailsPasswordService接口,而UserDetailsManager类又继承了UserDetailsService接口,这几个类的关系如下图:
UserDetailsServiceAutoConfiguration结构

总结

本章简单的对Spring Security进行了一些解读,其中简单介绍了几个相关的类,相信你已经对在Spring Security中如何加载用户信息有所掌握了,后面我们会由浅入深慢慢解读Spring Security。

什么是Spring Security

Spring Security 是一个安全框架,前身是 Acegi Security,能够为 Spring 企业应用系统提供声明式的安全访问控制。Spring Security 基于 Servlet 过滤器IoCAOP,为 Web 请求和方法调用提身份认证(Authencation)用户授权(Authorization),避免了代码耦合,减少了大量重复代码工作。

什么是身份认证(Authencation)

身份认证指的是用户访问系统资源时,系统要求验证用户的身份信息,用户的身份合法才可以访问对应的资源。常见的身份认证一般要求用户提供用户名和密码,系统通过校验用户名和密码来完成认证过程。

什么是用户授权(Authorization)

当身份认证通过后,去访问系统的资源,系统会判断已经认证的用户是否拥有访问该资源的权限,只有拥有对应的权限,才能访问对应的资源,没有权限的资源则无法访问,这个过程叫做用户授权

举个现实中的例子:我们现在远行都需要乘坐交通工具,而现在坐车都是实名制,我们坐车前都需要两样东西:身份证车票。身份证是为了证明你确实是你,这就是 身份认证(Authencation),而车票是为了证明你确实买了票,可以坐车,这就是 用户授权(Authorization)。这里可以看出,如果只有认证没有授权,认证就没有意义,如果没有认证,授权就无法赋予真正的用户。两个是同时存在的

RBAC模型

RBAC(基于角色的权限控制)模型是为了解决系统中的权限管理问题,在用户和权限的基础上引入了角色这个概念,这样通过对角色的管理极大地降低了用户和权限之间的耦合,当你拥有某个角色以后,你自然就拥有了该角色所有的权限。如下图:
RBAC

关于RBAC模型的详细介绍请点击这里:RBAC模型:基于用户-角色-权限控制的一些思考

HttpClient 4.x API常用方法


HttpClient是由Apache HttpComponents™项目负责创建和维护专注于HTTP和相关协议的低级Java组件工具集。该项目在Apache Software Foundation(http://www.apache.org)下运行,是更大的开发人员和用户社区的一部分。

HttpClient的特性

  • 基于标准、纯净的 Java 语言。实现了 HTTP 1.0 和 HTTP 1.1
  • 以可扩展的面向对象的结构实现了 HTTP 全部的方法(GET, POST, PUT, DELETE, HEAD, OPTIONS, and TRACE)。
  • 支持 HTTPS 协议。
  • 通过 HTTP 代理建立透明的连接。
  • 利用 CONNECT 方法通过 HTTP 代理建立隧道的 HTTPS 连接。
  • Basic, Digest, NTLMv1, NTLMv2, NTLM2 Session, SNPNEGO/Kerberos 认证方案。
  • 插件式的自定义认证方案。
  • 便携可靠的套接字工厂使它更容易的使用第三方解决方案。
  • 连接管理器支持多线程应用。支持设置最大连接数,同时支持设置每个主机的最大连接数,发现并关闭过期的连接。
  • 自动处理 Set-Cookie 中的 Cookie。
  • 插件式的自定义 Cookie 策略。
  • Request 的输出流可以避免流中内容直接缓冲到 Socket 服务器。
  • Response 的输入流可以有效的从 Socket 服务器直接读取相应内容。
  • 在 HTTP 1.0 和 HTTP 1.1 中利用 KeepAlive 保持持久连接。
  • 直接获取服务器发送的 response code 和 headers。
  • 设置连接超时的能力。
  • 实验性的支持 HTTP 1.1 response caching。
  • 源代码基于 Apache License 可免费获取。

HttpClient 使用流程

  1. 创建HttpClient对象

    1
    CloseableHttpClient httpClient = HttpClients.createDefault();
  2. 创建请求方法实例,并制定请求URL。如果需要发送GET请求,创建HttpGet对象,如果需要发送POST请求,创建HttpPost对象

    1
    2
    3
    4
    5
    Get:
    HttpGet httpGet = new HttpGet("http://apis.juhe.cn/ip/ipNew?ip=112.112.11.11&key=56e8d1ce739a1016392097d58af41af4");
    Post:
    HttpPost httpPost = new HttpPost("http://apis.juhe.cn/ip/ipNew");

  3. 如果要发送请求参数,可调用HttpGetHttpPost共同的setParams(HttpParams params)方法来添加请求参数;对于HttpPost对象而言,也可调用setEntity(HttpEntity entity)方法来设置请求参数

    HttpClient提供一个UrlEncodedFormEntity()类以方便Post请求传递参数,UrlEncodedFormEntit继承StringEntity类,它提供了四个构造函数

    • UrlEncodedFormEntity(List<? extends NameValuePair> parameters, String charset)
    • UrlEncodedFormEntity(Iterable<? extends NameValuePair> parameters, Charset charset)
    • UrlEncodedFormEntity(List<? extends NameValuePair> parameters)
    • UrlEncodedFormEntity(Iterable<? extends NameValuePair> parameters)
  4. 可以通过调用HttpClient 对象的execute(HttpUriRequest request)方法来发送请求,这个方法返回一个HttpResponse

  5. 调用HttpResponsegetAllHeaders()getHeaders(String name)等方法可获得服务器的响应头;调用HttpResponergetEntity方法可获取HttpEntity对象,该对象包装了服务器的响应内容,可通过该对象获取服务器的响应内容

  6. 不管执行方法是否成功,都应该释放链接

使用实例


maven依赖如下:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
<!-- Apache Http Begin -->
<dependency>
<groupId>org.apache.httpcomponents</groupId>
<artifactId>httpclient</artifactId>
<version>4.5.5</version>
</dependency>
<dependency>
<groupId>org.apache.httpcomponents</groupId>
<artifactId>fluent-hc</artifactId>
<version>4.5.5</version>
</dependency>
<dependency>
<groupId>org.apache.httpcomponents</groupId>
<artifactId>httpmime</artifactId>
<version>4.5.5</version>
</dependency>
<!-- Apache Http End -->

创建GET请求:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
public class MyTest {
public static void main(String[] args) {
get();
}

private static void get() {
// 创建 HttpClient 客户端
CloseableHttpClient httpClient = HttpClients.createDefault();

// 创建 HttpGet 请求
HttpGet httpGet = new HttpGet("http://localhost:8080/content/page?draw=1&start=0&length=10");
// 设置长连接
httpGet.setHeader("Connection", "keep-alive");
// 设置代理(模拟浏览器版本)
httpGet.setHeader("User-Agent", "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36");
// 设置 Cookie
httpGet.setHeader("Cookie", "UM_distinctid=16442706a09352-0376059833914f-3c604504-1fa400-16442706a0b345; CNZZDATA1262458286=1603637673-1530123020-%7C1530123020; JSESSIONID=805587506F1594AE02DC45845A7216A4");

CloseableHttpResponse httpResponse = null;
try {
// 请求并获得响应结果
httpResponse = httpClient.execute(httpGet);
HttpEntity httpEntity = httpResponse.getEntity();
// 输出请求结果
System.out.println(EntityUtils.toString(httpEntity));
} catch (IOException e) {
e.printStackTrace();
}

// 无论如何必须关闭连接
finally {
if (httpResponse != null) {
try {
httpResponse.close();
} catch (IOException e) {
e.printStackTrace();
}
}

if (httpClient != null) {
try {
httpClient.close();
} catch (IOException e) {
e.printStackTrace();
}
}
}
}
}

创建POST请求:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
public class MyTest {
public static void main(String[] args) {
post();
}

private static void post() {
// 创建 HttpClient 客户端
CloseableHttpClient httpClient = HttpClients.createDefault();

// 创建 HttpPost 请求
HttpPost httpPost = new HttpPost("http://localhost:8080/content/page");
// 设置长连接
httpPost.setHeader("Connection", "keep-alive");
// 设置代理(模拟浏览器版本)
httpPost.setHeader("User-Agent", "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36");
// 设置 Cookie
httpPost.setHeader("Cookie", "UM_distinctid=16442706a09352-0376059833914f-3c604504-1fa400-16442706a0b345; CNZZDATA1262458286=1603637673-1530123020-%7C1530123020; JSESSIONID=805587506F1594AE02DC45845A7216A4");

// 创建 HttpPost 参数
List<BasicNameValuePair> params = new ArrayList<BasicNameValuePair>();
params.add(new BasicNameValuePair("draw", "1"));
params.add(new BasicNameValuePair("start", "0"));
params.add(new BasicNameValuePair("length", "10"));

CloseableHttpResponse httpResponse = null;
try {
// 设置 HttpPost 参数
httpPost.setEntity(new UrlEncodedFormEntity(params, "UTF-8"));
httpResponse = httpClient.execute(httpPost);
HttpEntity httpEntity = httpResponse.getEntity();
// 输出请求结果
System.out.println(EntityUtils.toString(httpEntity));
} catch (UnsupportedEncodingException e) {
e.printStackTrace();
} catch (ClientProtocolException e) {
e.printStackTrace();
} catch (IOException e) {
e.printStackTrace();
}

// 无论如何必须关闭连接
finally {
try {
if (httpResponse != null) {
httpResponse.close();
}
} catch (IOException e) {
e.printStackTrace();
}

try {
if (httpClient != null) {
httpClient.close();
}
} catch (IOException e) {
e.printStackTrace();
}
}
}
}

封装出的工具类:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
import org.apache.commons.lang3.StringUtils;
import org.apache.http.client.entity.UrlEncodedFormEntity;
import org.apache.http.client.methods.CloseableHttpResponse;
import org.apache.http.client.methods.HttpGet;
import org.apache.http.client.methods.HttpPost;
import org.apache.http.impl.client.CloseableHttpClient;
import org.apache.http.impl.client.HttpClients;
import org.apache.http.message.BasicNameValuePair;
import org.apache.http.util.EntityUtils;

import java.io.IOException;
import java.io.UnsupportedEncodingException;
import java.util.Arrays;

public class HttpClientUtils {
public static final String CONNECTION = "Connection";
public static final String USER_AGENT= "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36";

public static String doGet(String url,String cookie){
return createRequest(HttpGet.METHOD_NAME,url,cookie);
}

public static String doGet(String url){
return createRequest(HttpGet.METHOD_NAME,url,null);
}

private static String createRequest(String method, String url, String cookie, BasicNameValuePair ... basicNameValuePairs){
CloseableHttpClient closeableHttpClient = HttpClients.createDefault();
CloseableHttpResponse httpResponse = null;
String result = null;
try {
if (HttpGet.METHOD_NAME.equals(method)) {
HttpGet httpGet = new HttpGet(url);
httpGet.setHeader("Connection", CONNECTION);
httpGet.setHeader("User-Agent", USER_AGENT);
if (StringUtils.isNotBlank(cookie)) {
httpGet.setHeader("Cookie", cookie);
}
httpResponse = closeableHttpClient.execute(httpGet);
result = EntityUtils.toString(httpResponse.getEntity());
} else if (HttpPost.METHOD_NAME.equals(method)) {
HttpPost httpPost = new HttpPost();
httpPost.setHeader("Connection", CONNECTION);
httpPost.setHeader("User-Agent", USER_AGENT);
if (StringUtils.isNotBlank(cookie)) {
httpPost.setHeader("Cookie", cookie);
}

httpPost.setEntity(new UrlEncodedFormEntity(Arrays.asList(basicNameValuePairs), "UTF-8"));

httpResponse = closeableHttpClient.execute(httpPost);
System.out.println(httpResponse);
result = EntityUtils.toString(httpResponse.getEntity());
}
}catch (IOException e) {
e.printStackTrace();
}finally {
if (httpResponse!=null){
try {
httpResponse.close();
} catch (IOException e) {
e.printStackTrace();
}
}
if (closeableHttpClient!=null) {
try {
closeableHttpClient.close();
} catch (IOException e) {
e.printStackTrace();
}
}

}
return result;
}
}

背景

公司突然要做微信开发,需要做内网穿透,本人一开始使用过www.ngrok.cc,价格不贵,也很方便,不过自己比较喜欢折腾,于是自己查询资料,可以使用ngrok在云服务器上搭建来实现多客户端的内网穿透,配置上自己的域名还是很好的。

服务器选择

个人有一台阿里云服务器Ubuntu 16.04 1核1G,一般使用绝对是没问题的,其他的linux发行版本也是没有问题的。

搭建

域名配置

这里用到的域名是ngrok.codedog.link,需要将ngrok.codedog.link*.ngrok.codedog.link解析到该云服务器上。

注:博主换过域名,以前用的是codedog.link,后来感觉有点搞自己,现在用自己名字重新注册了一个luxiang.wiki

配置go语音环境

1
2
3
4
5
6
#下载
wget https://storage.googleapis.com/golang/go1.9.1.linux-amd64.tar.gz
#解压
tar -zxvf go1.9.1.linux-amd64.tar.gz
#移动到local目录
mv go /usr/local

创建软连接

1
2
3
4
5
#进入/usr/bin
cd /usr/bin
ln -s /usr/local/go/bin/go ./
ln -s /usr/local/go/bin/godoc ./
ln -s /usr/local/go/bin/gofmt ./

测试

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
go env
GOARCH="amd64"
GOBIN=""
GOEXE=""
GOHOSTARCH="amd64"
GOHOSTOS="linux"
GOOS="linux"
GOPATH="/root/go"
GORACE=""
GOROOT="/usr/local/go"
GOTOOLDIR="/usr/local/go/pkg/tool/linux_amd64"
GCCGO="gccgo"
CC="gcc"
GOGCCFLAGS="-fPIC -m64 -pthread -fmessage-length=0 -fdebug-prefix-map=/tmp/go-build025512091=/tmp/go-build -gno-record-gcc-switches"
CXX="g++"
CGO_ENABLED="1"
CGO_CFLAGS="-g -O2"
CGO_CPPFLAGS=""
CGO_CXXFLAGS="-g -O2"
CGO_FFLAGS="-g -O2"
CGO_LDFLAGS="-g -O2"
PKG_CONFIG="pkg-config"

至此go语言环境配置完成。

安装ngrok

下载源码

1
git clone https://github.com/inconshreveable/ngrok.git

生成证书

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
# 进入ngrok源码的目录
cd ngrok
# 创建保存自定义签名证书的文件夹 这里叫myssl
mkdir myssl
# 进入
cd myssl
# 设置域名,这里使用 ngrok.codedog.link
export NGROK_DOMAIN="ngrok.codedog.link"
# 然后依次执行以下命令即可
openssl genrsa -out rootCA.key 2048
openssl req -x509 -new -nodes -key rootCA.key -subj "/CN=$NGROK_DOMAIN" -days 5000 -out rootCA.pem
openssl genrsa -out device.key 2048
openssl req -new -key device.key -subj "/CN=$NGROK_DOMAIN" -out device.csr
openssl x509 -req -in device.csr -CA rootCA.pem -CAkey rootCA.key -CAcreateserial -out device.crt -days 5000
# 替换原来证书
cp rootCA.pem ../assets/client/tls/ngrokroot.crt
cp device.crt ../assets/server/tls/snakeoil.crt
cp device.key ../assets/server/tls/snakeoil.key

编译服务端

1
2
3
4
# 在ngrok目录执行
export GOOS=linux
export GOARCH=386
make release-server

编译各大平台客户端

linux

1
2
3
export GOOS=linux
export GOARCH=386
make release-client

mac

1
2
3
export GOOS=darwin
export GOARCH=amd64
make release-client

windows

1
2
3
export GOOS=windows
export GOARCH=amd64
make release-client
生成的可执行文件在 ngrok/bin 目录下,每个平台对应都有文件夹

启动服务端

由于服务器本身启动了80443端口,因此这里改为8000444端口,启动命令如下:

1
sudo ./ngrokd -domain="ngrok.codedog.link" -httpAddr=":8000" -httpsAddr=":444"

命令行
上图可以看出使用了4443端口进行通讯

  • 注意:阿里云等有安全组的服务器,需要把端口加入白名单,一共需要开启白名单(8000,444,4443)

客户端配置文件

将上面生成的客户端可执行文件拷贝到需要内网穿透的设备上即可,这里直接说多域名和多TCP内网穿透配置文件,直接在客户端同级目录下创建ngrok.cfg配置文件,内容如下(只放了部分):

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
server_addr: ngrok.codedog.link:4443
trust_host_root_certs: false
tunnels:
weixin:
subdomain: weixin
proto:
http: 8002
about:
subdomain: about
proto:
http: 192.168.0.1:80
ssh:
remote_port: 2020
proto:
tcp: 22

采用严格的单空格缩进,可以代理其他主机,直接跟端口默认是本主机,还要注意防火墙的配置。

内网穿透

启动特定的转发:

1
./ngrok -config ngrok.cfg start weixin

将所有配置转发:

1
./ngrok -config ngrok.cfg start-all

关于docker中tomcat部署项目遇到时间不正确的问题

在容器中执行date命令查看时间,发现容器中时间少了8个小时 执行以下命令,修改时间

1
2
3
cd /etc/
mv localtime localtime_bak
cp /usr/share/zoneinfo/Asia/Shanghai /etc/localtime

因为docker中的java应用是从timezone中获取时间的,因此需要修改timezone

1
echo "Asia/Shanghai" > /etc/timezone 

执行完这条语句,会发现docker 中java程序的时间也就一致了.

nginx配置:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
upstream tomcat {
server 127.0.0.1:8080 fail_timeout=0;
}

# HTTPS server
server {
listen 443 ssl;
server_name codedog.link;

ssl_certificate server.crt;
ssl_certificate_key server.key;

ssl_session_cache shared:SSL:1m;
ssl_session_timeout 5m;


location / {
root html;
index index.html index.htm;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header Host $http_host;
proxy_set_header X-Forwarded-Proto https;
proxy_redirect off;
proxy_connect_timeout 240;
proxy_send_timeout 240;
proxy_read_timeout 240;
# note, there is not SSL here! plain HTTP is used
proxy_pass http://tomcat;
}
}

nginx 80端口 转443端口

1
2
3
4
5
6
7
8
9
server {

listen 80;

server_name codedog.link;

return 301 https://$server_name$request_uri;

}

  • CentOS 7
  • jdk 1.8

CentOS 7 jdk的安装

  1. 清理系统默认自带的jdk
    首先使用rpm -qa | grep jdk查看一家安装的jdk,然后使用sudo yum remove XXX(XXX)为上一个命令查询到的结果
  2. 安装jdk
    使用sudo rpm -ivh jdk-xxx-linux-x64.rpm 进行安装,默认安装路径是:/usr/java
  3. 添加环境变量
    使用sudo vim /etc/profile命令编辑文件,在文件底部增加:
    1
    2
    3
    export JAVA_HOME=/usr/java/jdkx.x.x_xx
    export CLASSPATH=.:$JAVA_HOME/jre/lib/rt.jar:$JAVA_HOME/lib/dt.jar:$JAVA_HOME/lib/tools.jar
    export PATH=$PATH:$JAVA_HOME/bin
    使配置生效:. /etc/profile

CentOS 7 tomcat的安装

  1. tomcat官网https://tomcat.apache.org/下载对应版本tomcat,这里使用的是apache-tomcat-8.5.40.tar.gz
  2. 使用tar -zxvf apache-tomcat-8.5.40.tar.gz命令解压
  3. 添加环境变量 使用vim /etc/profile 编辑文件 在底部添加:
    1
    2
    export TOMCAT_HOME=/usr/tomcat
    export CATALINA_HOME=/usr/tomcat
    并在上面增加的PATH路径后面追加上tomcatbin地址
    1
    export PATH=$PATH:$JAVA_HOME/bin:$TOMCAT_HOME/bin

ContOS 7 maven的配置

  1. maven官网http://maven.apache.org下载对应版本maven,这里使用的是apache-maven-3.6.1-bin.tar.gz
  2. 使用tar -zxvf apache-maven-3.6.1-bin.tar.gz命令解压
  3. 添加环境变量 使用vim /etc/profile 编辑文件 在底部添加:
    1
    export MAVEN_HOME=/usr/maven
    并在上面增加的PATH路径后面追加上mavenbin地址
    1
    export PATH=$PATH:$JAVA_HOME/bin:$TOMCAT_HOME/bin:$MAVEN_HOME/bin

ContOS 7 vsftpd配置

  1. 查看是否安装了vsftpd

    1
    rpm -qa | grep vsftpd
  2. 安装vsftpd

    1
    yum install -y vsftpd
  3. 新建ftp根目录

    1
    mkdir /ftproot
  4. 添加一个ftp用户并设置主目录并指定文件的拥有者,和禁止ssh连接(useradd xxx)

    1
    2
    3
    4
    5
    6
    useradd testftp -d /ftproot/testftp/ -s /sbin/nologin
    # 或者
    useradd testftp -s /sbin/nologin
    usermod testftp -d /ftproot/testftp/
    # 指定文件拥有者为创建的用户:
    sudo chown -R testftp.testftp ./testftp/
  5. 给ftp用户添加密码(passwd xxx)

    1
    sudo passwd testftp
  6. 防火墙开放21端口

    1
    firewall-cmd --zone=public --add-port=21/tcp --permanent
  7. 防火墙添加FTP服务

    1
    2
    firewall-cmd --permanent --zone=public --add-service=ftp
    firewall-cmd --reload
  8. 无法连接ftp解决办法:

    • 查看ftp的Selinux状态:getsebool -a | grep ftp
    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    ftpd_anon_write --> off
    ftpd_connect_all_unreserved --> off
    ftpd_connect_db --> off
    ftpd_full_access --> off
    ftpd_use_cifs --> off
    ftpd_use_fusefs --> off
    ftpd_use_nfs --> off
    ftpd_use_passive_mode --> off
    httpd_can_connect_ftp --> off
    httpd_enable_ftp_server --> off
    tftp_anon_write --> off
    tftp_home_dir --> off
    • 在结果中可以看到:tftp_home_dir --> offftpd_full_access --> off
    • 将状态改为on:setsebool -P tftp_home_dir onsetsebool -P ftpd_full_access on
    • 重启vsftpd服务:systemctl restart vsftpd.service
    • 重启firewall服务:systemctl restart firewalld.service
  9. 开启ftp被动模式

    • 打开vsftpd.conf文件,在后面加上
    1
    2
    pasv_min_port=30000
    pasv_max_port=30999

    并开放30000-30999端口

    1
    2
    3
    firewall-cmd --zone=public --add-port=30000-30999/tcp --permanent 
    firewall-cmd --zone=public --add-port=30000-30999/udp --permanent
    firewall-cmd --reload
  10. 设置开机启动vsftpd

    1
    systemctl enable vsftpd.service
  11. 不允许用户切出当前目录(只有在chroot_list_file指定的文件中出现的用户才能切换到上级目录)

    1
    2
    3
    4
    chroot_local_user=YES
    chroot_list_enable=NO
    chroot_list_file=/etc/vsftpd/chroot_list
    allow_writeable_chroot=YES
  12. ftpusers和user_list  文件

    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14
    15
    16
    17
    18
    19
    vsftpd有两个默认存放用户名单的文件(默认在/etc/vsftpd/ 目录下),来对访问FTP服务的用户身份进行管理和限制。
    vsftpd会分别检查两个配置文件,只要是被任何一个文件所禁止的用户,FTP访问到本机的请求都会被拒。

    user_list:可以作为用户白名单,或者是黑名单,或者无效名单。完全由userlist_enable和userlist_deny这两个参数决定。
    ftpusers:只能是用户黑名单,不受任何参数限制。

    userlist_enable和userlist_deny参数
    决定user_list文件性质的参数 userlist_enable和userlist_deny

    (vsftpd服务程序的主配置文件默认位置 /etc/vsftpd/vsftpd.conf)


    userlist_enable=YES userlist_deny=YES 黑名单,拒绝文件中的用户FTP访问

    userlist_enable=YES userlist_deny=NO 白名单,拒绝除文件中的用户外的用户FTP访问

    userlist_enable=NO userlist_deny=YES/NO 无效名单,表示没有对任何用户限制FTP访问

    总之,要想让user_list有效,userlist_enable=YES

    ==注意!!!! 一定要把/etc/pam.d/vsftpd文件中的 auth required pam_shells.so给注释掉,否则会检查当前用户是否有登录ssh的权限,为nologin的用户会无法连接ftp==

ContOS 7 安装nginx

  1. 安装nginx所需要的依赖环境
    1
    2
    3
    4
    5
    6
    7
    8
    # gcc
    sudo yum install gcc-c++
    # pcre
    sudo yum install pcre pcre-devel
    # zlib
    sudo yum install -y zlib zlib-devel
    # openssl
    sudo yum install openssl openssl-devel
  2. nginx官网http://nginx.org/en/download.html下载nginx,并使用命令行解压、安装
    1
    2
    3
    tar -zxvf nginx-1.15.12.tar.gz 
    cd nginx-1.15.12/
    sudo ./configure && make && make install

3.nginx常用命令

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
nginx -s reload  :修改配置后重新加载生效
nginx -s reopen :重新打开日志文件
nginx -t -c /path/to/nginx.conf 测试nginx配置文件是否正确

关闭nginx:
nginx -s stop :快速停止nginx
quit :完整有序的停止nginx

其他的停止nginx 方式:

ps -ef | grep nginx

kill -QUIT 主进程号 :从容停止Nginx
kill -TERM 主进程号 :快速停止Nginx
pkill -9 nginx :强制停止Nginx

启动nginx:
nginx -c /path/to/nginx.conf

平滑重启nginx:
kill -HUP 主进程号
  1. 配置nginx
  • 首先在conf目录的nginx.conf中server:{}结尾后添加一行:include vhost/*.conf;

    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14
    15
    16
    17
    18
    19
    20
    21
    22
    23
    24
    25
    26
    27
    28
    29
    30
    31
    32
    33
    34
    35
    36
    37
    38
    39
    40
    41
    42
    43
    44
    45
    46
    47
    48
    49
    50
    51
    52
    53
    54
    55
    56
    57
    58
    59
    60
    61
    62
    63
    64
    65
    66
    67
    68
    69
    70
    71
    72
    73
    74
    75
    76
    77
    78
    79
    80
    81
    82
    83
    84
    85
    86
    87
    88
    89
    90
    91
    92
    93
    94
    95
    96
    97
    98
    99
    100
    101
    102
    103
    104
    105
    106
    107
    108
    109
    110
    111
    112
    113
    114
    115
    116
    117
    118
    119
    120
    121

    #user nobody; 如果访问文件服务器 这里修改为ftp的用户名 可以解决403
    worker_processes 1;

    #error_log logs/error.log;
    #error_log logs/error.log notice;
    #error_log logs/error.log info;

    #pid logs/nginx.pid;


    events {
    worker_connections 1024;
    }


    http {
    include mime.types;
    default_type application/octet-stream;

    #log_format main '$remote_addr - $remote_user [$time_local] "$request" '
    # '$status $body_bytes_sent "$http_referer" '
    # '"$http_user_agent" "$http_x_forwarded_for"';

    #access_log logs/access.log main;

    sendfile on;
    #tcp_nopush on;

    #keepalive_timeout 0;
    keepalive_timeout 65;

    #gzip on;

    server {
    listen 80;
    server_name localhost;

    #charset koi8-r;

    #access_log logs/host.access.log main;

    location / {
    root html;
    index index.html index.htm;
    }

    #error_page 404 /404.html;

    # redirect server error pages to the static page /50x.html
    #
    error_page 500 502 503 504 /50x.html;
    location = /50x.html {
    root html;
    }

    # proxy the PHP scripts to Apache listening on 127.0.0.1:80
    #
    #location ~ \.php$ {
    # proxy_pass http://127.0.0.1;
    #}

    # pass the PHP scripts to FastCGI server listening on 127.0.0.1:9000
    #
    #location ~ \.php$ {
    # root html;
    # fastcgi_pass 127.0.0.1:9000;
    # fastcgi_index index.php;
    # fastcgi_param SCRIPT_FILENAME /scripts$fastcgi_script_name;
    # include fastcgi_params;
    #}

    # deny access to .htaccess files, if Apache's document root
    # concurs with nginx's one
    #
    #location ~ /\.ht {
    # deny all;
    #}

    }

    ##########################vhost#####################################
    include vhost/*.conf; #这里添加一行!!!!!

    # another virtual host using mix of IP-, name-, and port-based configuration
    #
    #server {
    # listen 8000;
    # listen somename:8080;
    # server_name somename alias another.alias;

    # location / {
    # root html;
    # index index.html index.htm;
    # }
    #}


    # HTTPS server
    #
    #server {
    # listen 443 ssl;
    # server_name localhost;

    # ssl_certificate cert.pem;
    # ssl_certificate_key cert.key;

    # ssl_session_cache shared:SSL:1m;
    # ssl_session_timeout 5m;

    # ssl_ciphers HIGH:!aNULL:!MD5;
    # ssl_prefer_server_ciphers on;

    # location / {
    # root html;
    # index index.html index.htm;
    # }
    #}

    }

  • 然后新建一个vhost文件夹,里面可以放置*.conf的配置文件,两个简单的配置示例:

    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14
    15
    16
    17
    18
    19
    20
    21
    22
    23
    24
    25
    26
    27
    28
    29
    30
    31
    32
    33
    34
     # 配置反向代理到指定端口
    server {
    listen 80;
    autoindex on;
    server_name codedog.link;
    access_log /usr/local/nginx/logs/access.log combined;
    index index.html index.htm index.jsp index.php;
    if ( $query_string ~* ".*[\;'\<\>].*" ){
    return 404;
    }

    location / {
    proxy_pass http://127.0.0.1:8080/;
    }

    }
    # 配置反向代理到指定目录
    server {
    listen 80;
    autoindex off;
    server_name codedog.link;
    access_log /usr/local/nginx/logs/access.log combined;
    index index.html index.htm index.jsp index.php;
    #error_page 404 /404.html;
    if ( $query_string ~* ".*[\;'\<\>].*" ){
    return 404;
    }

    location / {
    root /product/ftpfile/img/;
    add_header Access-Control-Allow-Origin *;
    }
    }

ContOS 7 配置开放端口

ContOS 7 的防火墙是:firewalld

  • 基本用法:
  • 启动: systemctl start firewalld
  • 查看状态: systemctl status firewalld
  • 停止: systemctl disable firewalld
  • 禁用: systemctl stop firewalld
  • 添加一个端口: firewall-cmd --zone=public --add-port=80/tcp --permanent (--permanent永久生效,没有此参数重启后失效)
  • 重新载入:firewall-cmd --reload
  • 查看:firewall-cmd --zone= public --query-port=80/tcp
  • 删除:firewall-cmd --zone= public --remove-port=80/tcp --permanent

ContOS 7 安装mysql

  1. 打开mysql官网https://www.mysql.com/下载对应版本yum源的安装包
  2. 把下载的安装包上传到CentOS服务器上
  3. 执行命令:yum install mysql-community-server
  4. 安装完成后使用命令:service mysqld start启动mysql
  5. mysql启动后使用grep 'temporary password' /var/log/mysqld.log查看安装时默认设置的密码
  6. 使用命令:ALTER USER 'root'@'localhost' IDENTIFIED BY 'newpassword';修改默认密码
  7. 把root的登录地址修改为任意地址: update user set host =’%' where user =’root’;

main.go:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
package main

import (
"go_dev/day11/example1/filelist"
"net/http"
"os"
)

type appHandle func(http.ResponseWriter, *http.Request) error

// 定义一个包装类型 对出错进行统一处理
func appWrap(hand appHandle) func(http.ResponseWriter, *http.Request) {

return func(resp http.ResponseWriter, req *http.Request) {
// 对panic进行处理
defer func() {
r := recover()
if r != nil {
http.Error(resp, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
}
}()

err := hand(resp, req)
if err != nil {
switch {
case os.IsNotExist(err):
http.Error(resp, http.StatusText(http.StatusNotFound), http.StatusNotFound)
}
}
}
}

func main() {

http.HandleFunc("/list/", appWrap(filelist.HandlerFile))

err := http.ListenAndServe(":8888", nil)
if err != nil {
return
}
}

handlerFile.go:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
package filelist

import (
"fmt"
"io/ioutil"
"net/http"
"os"
)

func HandlerFile(resp http.ResponseWriter, req *http.Request) error {
path := req.URL.Path[len("/list/"):]
fmt.Println("HandlerFile:", path)
file, err := os.Open(path)
if err != nil {
return err
}

all, err := ioutil.ReadAll(file)
if err != nil {
return err
}
resp.Write(all)
return nil
}