gem 'rack-attack'
gem 'rack-cors'
1. rack-attack 可以根据ip、域名等设置黑名单、设置访问频率
Rack::Attack.blocklist('block bad domains') do |req|
next if !req.path.start_with?('/admin_api/') || Rails.env.test?
Rails.application.credentials.allowed_origins.none? { |r| Regexp.new(r) =~ req.referer }
end
allowed_origins:
- api.xxx.net
- localhost
class Rack::Attack
Rack::Attack.cache.store = ActiveSupport::Cache::MemoryStore.new
throttle('public_data/ip', limit: 2, period: 1.minutes) do |req|
req.ip if req.path.start_with?('/pc/v1/public_data')
end
self.throttled_responder = lambda do |_env|
[429,
{},
['throttling, retry later']]
end
end
2. rack-cors 可以根据域名、访问方法、资源设置跨域请求cors
Rails.application.config.middleware.insert_before 0, Rack::Cors do
allow do
origins '*'
resource '*', headers: :any, methods: [:get, :post, :put, :patch, :delete, :options, :head],
end
end
Rails.application.config.middleware.insert_before 0, Rack::Cors do
allow do
origins 'localhost:3000', '127.0.0.1:3000',
/\Ahttp:\/\/192\.168\.0\.\d{1,3}(:\d+)?\z/
resource '/file/list_all/', :headers => 'x-domain-token'
resource '/file/at/*',
methods: [:get, :post, :delete, :put, :patch, :options, :head],
headers: 'x-domain-token',
expose: ['Some-Custom-Response-Header'],
max_age: 600
end
allow do
origins '*'
resource '/public/*', headers: :any, methods: :get
resource '/api/v1/*',
headers: :any,
methods: :get,
if: proc { |env| env['HTTP_HOST'] == 'api.example.com' }
end
end