认证和权限

  所谓认证就是检测用户登陆与否,通常与权限对应使用。网站中都是通过用户登录后由该用户相应的角色认证以给予对应的权限。

  权限是对用户对网站进行操作的限制,只有在拥有相应权限时才可对网站中某个功能进行操作。权限总是与认证相辅相成。w

自定制认证规则的重点是继承内置的BaseAuthentication类,重写其authenticate()方法。

自定制认证方式一:通过url传参进行认证

from django.conf.urls import url, include
from app01.views import TestView urlpatterns = [
url(r'^test/', TestView.as_view()),
]

ulrs.py

from rest_framework.views import APIView
from rest_framework.response import Response
from rest_framework.authentication import BaseAuthentication
from rest_framework.request import Request
from rest_framework import exceptions ######伪造的数据库中存有的token########
token_list = [
'sfsfss123kuf3j123',
'asijnfowerkkf9812',
] ######自定制的认证规则的类,必须继承BaseAuthentication#####
class TestAuthentication(BaseAuthentication):
def authenticate(self, request):
"""
用户认证,如果验证成功后返回元组: (用户,用户Token)
:param request:
:return:
None,表示跳过该验证;
如果跳过了所有认证,默认用户和Token和使用配置文件进行设置
self._authenticator = None
if api_settings.UNAUTHENTICATED_USER:
self.user = api_settings.UNAUTHENTICATED_USER()
else:
self.user = None if api_settings.UNAUTHENTICATED_TOKEN:
self.auth = api_settings.UNAUTHENTICATED_TOKEN()
else:
self.auth = None
(user,token)表示验证通过并设置用户名和Token;
AuthenticationFailed异常
"""
val = request.query_params.get('token')
if val not in token_list:
raise exceptions.AuthenticationFailed("用户认证失败") return ('登录用户', '用户token') def authenticate_header(self, request):
"""
Return a string to be used as the value of the `WWW-Authenticate`
header in a `401 Unauthenticated` response, or `None` if the
authentication scheme should return `403 Permission Denied` responses.
"""
# 验证失败时,返回的响应头WWW-Authenticate对应的值
pass #####视图函数,必须继承APIView#####
class TestView(APIView):
authentication_classes = [TestAuthentication, ]#中括号中写入定义了认证规则的类
permission_classes = []#这是权限规则,下文会进行详述 #只有通过了上述的规则,才能以下执行视图函数
def get(self, request, *args, **kwargs):
print(request.user)
print(request.auth)
return Response('GET请求,响应内容') def post(self, request, *args, **kwargs):
return Response('POST请求,响应内容') def put(self, request, *args, **kwargs):
return Response('PUT请求,响应内容')

views.py

自定制认证方式二:通过请求头认证

from django.conf.urls import url, include
from app01.views import TestView urlpatterns = [
url(r'^test/', TestView.as_view()),
]

ulrs.py

from rest_framework.views import APIView
from rest_framework.response import Response
from rest_framework.authentication import BaseAuthentication
from rest_framework.request import Request
from rest_framework import exceptions ######自定制的认证规则的类,必须继承BaseAuthentication#####
class TestAuthentication(BaseAuthentication):
def authenticate(self, request):
"""
用户认证,如果验证成功后返回元组: (用户,用户Token)
:param request:
:return:
None,表示跳过该验证;
如果跳过了所有认证,默认用户和Token和使用配置文件进行设置
self._authenticator = None
if api_settings.UNAUTHENTICATED_USER:
self.user = api_settings.UNAUTHENTICATED_USER()
else:
self.user = None if api_settings.UNAUTHENTICATED_TOKEN:
self.auth = api_settings.UNAUTHENTICATED_TOKEN()
else:
self.auth = None
(user,token)表示验证通过并设置用户名和Token;
AuthenticationFailed异常
"""
import base64
auth = request.META.get('HTTP_AUTHORIZATION', b'')#获取请求头
if auth:
auth = auth.encode('utf-8')#将bytes类型编码成utf-8
auth = auth.split()
if not auth or auth[0].lower() != b'basic':
raise exceptions.AuthenticationFailed('验证失败')
if len(auth) != 2:
raise exceptions.AuthenticationFailed('验证失败')
username, part, password = base64.b64decode(auth[1]).decode('utf-8').partition(':')
if username == 'Damon' and password == '':
return ('登录用户', '用户token')
else:
raise exceptions.AuthenticationFailed('用户名或密码错误') def authenticate_header(self, request):
"""
Return a string to be used as the value of the `WWW-Authenticate`
header in a `401 Unauthenticated` response, or `None` if the
authentication scheme should return `403 Permission Denied` responses.
"""
return 'Basic realm=api' #####视图函数,必须继承APIView#####
class TestView(APIView):
authentication_classes = [TestAuthentication, ]#中括号中写入定义了认证规则的类,可放入多个
permission_classes = []#这是权限规则,下文会进行详述
#只有通过了上述的规则,才能以下执行视图函数
def get(self, request, *args, **kwargs):
print(request.user)
print(request.auth)
return Response('GET请求,响应内容') def post(self, request, *args, **kwargs):
return Response('POST请求,响应内容') def put(self, request, *args, **kwargs):
return Response('PUT请求,响应内容')

views.py

使用自定制认证和自定制权限

from django.db import models

class UserInfo(models.Model):
username = models.CharField(max_length=32)
password = models.CharField(max_length=64)
token = models.CharField(max_length=64,null=True)

models.py

from django.conf.urls import url
from django.contrib import admin
from app02 import views as app02_view urlpatterns = [
# url(r'^admin/', admin.site.urls), url(r'^auth/', app02_view.AuthView.as_view()),
url(r'^hosts/', app02_view.HostView.as_view()),
url(r'^users/', app02_view.UserView.as_view()),
url(r'^salary/', app02_view.SalaryView.as_view()), ]
from django.views import View

from rest_framework.views import APIView
from rest_framework.authentication import BaseAuthentication
from rest_framework import exceptions
from rest_framework.response import Response from app02 import models
import hashlib
import time #####自定制认证规则的类#####
class MyAuthentication(BaseAuthentication): def authenticate(self, request):
token = request.query_params.get('token')
obj = models.UserInfo.objects.filter(token=token).first()
if obj:
return (obj.username,obj)
return None def authenticate_header(self, request):
"""
Return a string to be used as the value of the `WWW-Authenticate`
header in a `401 Unauthenticated` response, or `None` if the
authentication scheme should return `403 Permission Denied` responses.
"""
# return 'Basic realm="api"'
pass
#####自定制权限的类#####
class MyPermission(object):
message = "无权访问"
def has_permission(self,request,view):
if request.user:
return True
return False
#####自定制管理员权限的类#####
class AdminPermission(object):
message = "无权访问"
def has_permission(self,request,view):
if request.user == 'Damon':#管理员
return True
return False #####视图函数#####
class HostView(APIView):
"""
匿名用户和用户都能访问
"""
authentication_classes = [MyAuthentication,]
permission_classes = []
def get(self,request,*args,**kwargs):
# 原来request对象,django.core.handlers.wsgi.WSGIRequest
# 现在的request对象,rest_framework.request.Request\
self.dispatch
print(request.user)
# print(request.user)
# print(request.auth)
return Response('主机列表') class UserView(APIView):
"""
普通用户能访问
"""
authentication_classes = [MyAuthentication, ]
permission_classes = [MyPermission,]#自定制普通用户拥有的权限
def get(self,request,*args,**kwargs):
return Response('用户列表') class SalaryView(APIView):
"""
管理员用户才能访问
"""
authentication_classes = [MyAuthentication, ]
permission_classes = [MyPermission,AdminPermission,]#自定制普通用户和管理员拥有的权限
def get(self,request,*args,**kwargs):
self.dispatch
return Response('薪资列表') def permission_denied(self, request, message=None):
#如果没有通过认证,并且权限中return False,就会报下面的异常,detail为自定制的错误信息
if request.authenticators and not request.successful_authenticator:
raise exceptions.NotAuthenticated(detail='无权访问')
raise exceptions.PermissionDenied(detail=message)

views.py

设置全局变量

  对于认证和权限,我们可新建utils.py文件,将自定制的类写入该py文件中,之后在settings.py中进行配置,就可快速使用。在views.py中只需写入相应视图函数,无需关心中括号即可实现认证和权限的配置,使得views.py文件中的代码可读性更高。

REST_FRAMEWORK = {
'UNAUTHENTICATED_USER': None,
'UNAUTHENTICATED_TOKEN': None,#将匿名用户名称设置为None,默认为Anonymous
"DEFAULT_AUTHENTICATION_CLASSES": [
"app02.utils.MyAuthentication",#配置自定制认证类的路径
],
"DEFAULT_PERMISSION_CLASSES": [
"app02.utils.MyPermission",#配置自定制权限类的路径
"app02.utils.AdminPermission",#配置自定制权限类的路径
],
}

settings.py

限制访问频率

  建网站的宗旨是为人民服务,供人民访问。但总有刁民想害朕,如利用机器人爬虫肆意爬取数据、侵占流量缓存、洪水攻击等等。所以我们需要对可以访问网站的用户进行相应的访问频率的限制,以保护我们网站的安全。

  访问的用户有两种——登录用户、匿名用户。对于登录用户我们可采用唯一标识进行标记,而匿名用户我们通常采用IP对其进行标记。

a、基于用户IP限制访问频率

流程分析:

  • 首先获取用户信息,如果是匿名用户,获取IP。如果不是匿名用户获取其用户名。
  • 在request里面获取匿名用户IP(也有可能是代理的IP),如IP= 127.1.1.1。
  • 将获取到的IP添加到到recode字典里面,需要在添加之前先限制一下。
  • 如果时间间隔大于60秒(可自定制时长),说明村吃的该用户最早一次访问的时间久远、已失效,将该次访问的时间pop。在timelist列表里现在留的是有效的访问时间段。
  • 判断该IP访问次数是否超过10次,如果超过return False予以限制。

具体实现:重点是继承BaseThrottle类,重写其allow_request()和wait()方法

from django.shortcuts import render
from rest_framework.views import APIView
from rest_framework.response import Response
from rest_framework.throttling import BaseThrottle,SimpleRateThrottle from rest_framework import exceptions RECORD = { }
#####自定制对访问频率限制的类#####
class MyThrottle(BaseThrottle):
def allow_request(self,request,view):
"""
# 返回False,限制
# 返回True,通行
:param request:
:param view:
:return:
"""
"""
对匿名用户进行限制:每个用户1分钟允许访问10次
- 获取用户IP request 1.1.1.1
"""
import time
ctime = time.time()
ip = self.get_ident()
if ip not in RECORD:
RECORD[ip] = [ctime,]#该IP是首次访问,存储当前访问时间
else:
# [4507862389234,3507862389234,2507862389234,1507862389234,],原先存有的访问时间
time_list = RECORD[ip]
while True:
val = time_list[-1]#取出最早访问的时间
if (ctime-60) > val:#检测这次访问时间与最早访问时间间隔是否超过一分钟
time_list.pop()#是,则更新列表中最早的访问时间(确保列表内的访问时间与此次访问的时间间隔在一分钟内)
else:
break#否,则表示在一分钟内有多次访问
if len(time_list) > 10:#检测一分钟访问次数是否超过十次则限制
return False#是则限制
time_list.insert(0,ctime)#不超过十次则将当前时间存入列表
return True
def wait(self):
import time
ctime = time.time()
first_in_time = RECORD[self.get_ident()][-1]
wt = 60 - (ctime - first_in_time)#动态显示需要等待的时间60-(当前时间 - 最近一次访问时间)
return wt #####视图函数#####
class LimitView(APIView):
authentication_classes = []
permission_classes = []
throttle_classes=[MyThrottle,]
def get(self,request,*args,**kwargs):
self.dispatch
return Response('控制访问频率示例') def throttled(self, request, wait):
"""
If request is throttled, determine what kind of exception to raise.
"""
#可自定制该方法设置中文的错误提示信息
class MyThrottled(exceptions.Throttled):
default_detail = '请求被限制.'
extra_detail_singular = 'Expected available in {wait} second.'
extra_detail_plural = '还需要再等待{wait}秒' raise MyThrottled(wait)

views.py

b. 使用配置文件,基于用户IP限制访问频率(利于Django缓存)

源码分析

class SimpleRateThrottle(BaseThrottle):
"""
一个简单的缓存实现,只需要` get_cache_key() `。被覆盖。
速率(请求/秒)是由视图上的“速率”属性设置的。类。该属性是一个字符串的形式number_of_requests /期。
周期应该是:(的),“秒”,“M”,“min”,“h”,“小时”,“D”,“一天”。
以前用于节流的请求信息存储在高速缓存中。
A simple cache implementation, that only requires `.get_cache_key()`
to be overridden. The rate (requests / seconds) is set by a `throttle` attribute on the View
class. The attribute is a string of the form 'number_of_requests/period'. Period should be one of: ('s', 'sec', 'm', 'min', 'h', 'hour', 'd', 'day') Previous request information used for throttling is stored in the cache.
"""
cache = default_cache
timer = time.time
cache_format = 'throttle_%(scope)s_%(ident)s'
scope = None
THROTTLE_RATES = api_settings.DEFAULT_THROTTLE_RATES def __init__(self):
if not getattr(self, 'rate', None):
self.rate = self.get_rate()#点进去看到需要些一个scope ,2/m
self.num_requests, self.duration = self.parse_rate(self.rate) def get_cache_key(self, request, view):#这个相当于是一个半成品,我们可以来补充它
"""
Should return a unique cache-key which can be used for throttling.
Must be overridden. May return `None` if the request should not be throttled.
"""
raise NotImplementedError('.get_cache_key() must be overridden') def get_rate(self):
"""
Determine the string representation of the allowed request rate.
"""
if not getattr(self, 'scope', None):#检测必须有scope,没有就报错了
msg = ("You must set either `.scope` or `.rate` for '%s' throttle" %
self.__class__.__name__)
raise ImproperlyConfigured(msg) try:
return self.THROTTLE_RATES[self.scope]
except KeyError:
msg = "No default throttle rate set for '%s' scope" % self.scope
raise ImproperlyConfigured(msg) def parse_rate(self, rate):
"""
Given the request rate string, return a two tuple of:
<allowed number of requests>, <period of time in seconds>
"""
if rate is None:
return (None, None)
num, period = rate.split('/')#取配置文件并切分 'wdp':'2/minute'
num_requests = int(num)#
duration = {'s': 1, 'm': 60, 'h': 3600, 'd': 86400}[period[0]]#用于配置文件的信息minute取m,即60秒
return (num_requests, duration) # 2、执行完构造方法后执行,
def allow_request(self, request, view):
"""
Implement the check to see if the request should be throttled. On success calls `throttle_success`.
On failure calls `throttle_failure`.
"""
if self.rate is None:
return True self.key = self.get_cache_key(request, view)#3、执行get_cache_key
if self.key is None:
return True#不限制 self.history = self.cache.get(self.key, [])#4、得到的key,默认是一个列表,赋值给了self.history,
# self.history可以理解为每一个ip对应的访问记录
self.now = self.timer() # Drop any requests from the history which have now passed the
# throttle duration
while self.history and self.history[-1] <= self.now - self.duration:
self.history.pop()
if len(self.history) >= self.num_requests:
return self.throttle_failure()
return self.throttle_success() def throttle_success(self):
"""
Inserts the current request's timestamp along with the key
into the cache.
"""
self.history.insert(0, self.now)
self.cache.set(self.key, self.history, self.duration)
return True def throttle_failure(self):
"""
Called when a request to the API has failed due to throttling.
"""
return False def wait(self):
"""
Returns the recommended next request time in seconds.
"""
if self.history:
remaining_duration = self.duration - (self.now - self.history[-1])
else:
remaining_duration = self.duration available_requests = self.num_requests - len(self.history) + 1
if available_requests <= 0:
return None return remaining_duration / float(available_requests)

源码SimpleRateThrottle

自定制

settings.py中:

REST_FRAMEWORK = {
'DEFAULT_THROTTLE_RATES': {
'test_scope': '10/m',#自定制限制的时间 一分钟10次
},
}
from rest_framework.views import APIView
from rest_framework.response import Response
from rest_framework.throttling import BaseThrottle,SimpleRateThrottle
from rest_framework import exceptions class MySimpleRateThrottle(SimpleRateThrottle):
scope = "test_scope"#scope不可改,字符串需与配置文件相同 def get_cache_key(self, request, view):
return self.get_ident(request) class LimitView(APIView):
authentication_classes = []
permission_classes = []
throttle_classes=[MySimpleRateThrottle,]
def get(self,request,*args,**kwargs):
# self.dispatch
return Response('控制访问频率示例') def throttled(self, request, wait):
"""
If request is throttled, determine what kind of exception to raise.
"""
#可自定制该方法设置中文的错误提示信息
class MyThrottled(exceptions.Throttled):
default_detail = '请求被限制.'
extra_detail_singular = 'Expected available in {wait} second.'
extra_detail_plural = '还需要再等待{wait}秒'

views.py

c.对不同用户进行不同的限流操作

  对匿名用户每个用户1分钟允许访问5次,对于登录的普通用户1分钟访问10次,VIP用户一分钟访问20次。

操作流程:

  • 首页可以匿名访问
  • 先认证,只有认证了才知道是不是匿名的,
  • 权限登录成功之后才能访问, index页面无需权限即可访问
  • 限流在配置文件中

settings.py 中进行配置

REST_FRAMEWORK = {
'UNAUTHENTICATED_USER': None,
'UNAUTHENTICATED_TOKEN': None,
'DEFAULT_THROTTLE_RATES': {#自定制键值对
'obj_anon': '10/m',#匿名用户
'obj_user': '20/m',#登录用户
'obj_VIPuser':'20/minute',#VIP用户
},
}
from rest_framework.views import APIView
from rest_framework.response import Response
from rest_framework.throttling import BaseThrottle,SimpleRateThrottle
from rest_framework.authentication import BaseAuthentication
from rest_framework import exceptions
from app02 import models class MyAuthentication(BaseAuthentication):
#检测用户是否登录
def authenticate(self, request):
token = request.query_params.get('token')#登录用户有tocken字段
obj = models.UserInfo.objects.filter(token=token).first()
if obj:
return (obj.username,obj)
return None#未登录用户不处理 def authenticate_header(self, request):
pass class MyPermission(object):
message = "无权访问"
def has_permission(self,request,view):
if request.user:
return True #True表示有权限
return False #False表示无权限 class AdminPermission(object):
message = "无权访问"
def has_permission(self,request,view):
if request.user == 'DamonVIP':#VIP用户
return True
return False ######对匿名用户进行限流的类#####
class AnonThrottle(SimpleRateThrottle):
scope = "obj_anon" def get_cache_key(self, request, view):
# 返回None,表示我不限制
# 登录用户我不管
if request.user:
return None
# 匿名用户
return self.get_ident(request) ######对登录用户进行限流的类#####
class UserThrottle(SimpleRateThrottle):
scope = "obj_user" def get_cache_key(self, request, view):
# 登录用户
if request.user:
return request.user
# 匿名用户我不管
return None ######对VIP用户进行限流的类#####
class VIPUserThrottle(SimpleRateThrottle):
scope = "obj_VIPuser" def get_cache_key(self, request, view):
# VIP用户
if request.user=='DamonVIP':#VIP用户
return request.user
# 匿名用户我不管
return None #####视图函数#####
# 首页无需登录就可以访问
class IndexView(APIView):
authentication_classes = [MyAuthentication,]#认证判断他是不是匿名用户
permission_classes = [] #主页无需权限验证
throttle_classes=[AnonThrottle,UserThrottle,VIPUserThrottle]#对匿名用户和普通用户的访问限制
def get(self,request,*args,**kwargs):
# self.dispatch
return Response('访问首页') def throttled(self, request, wait):
'''可定制方法设置中文错误'''
# raise exceptions.Throttled(wait)
class MyThrottle(exceptions.Throttled): default_detail = '请求被限制'
extra_detail_singular = 'Expected available in {wait} second.'
extra_detail_plural = 'Expected available in {wait} seconds.'
default_code = '还需要再等{wait}秒'
raise MyThrottle(wait) # 需登录就可以访问
class ManageView(APIView):
authentication_classes = [MyAuthentication,]
permission_classes = [MyPermission,]
throttle_classes=[AnonThrottle,UserThrottle,VIPUserThrottle]
def get(self,request,*args,**kwargs):
# self.dispatch
return Response('访问首页') # 需登录就可以访问
class SalaryView(APIView):
authentication_classes = [MyAuthentication,]
permission_classes = [MyPermission,]
throttle_classes=[AnonThrottle,UserThrottle,VIPUserThrottle]
def get(self,request,*args,**kwargs):
# self.dispatch
return Response('访问首页')

views.py

设置全局变量

  与认证和权限相似,限流操作也可新建utils.py文件,将自定制的类写入该py文件中,之后在settings.py中进行配置,就可快速使用。在views.py中只需写入相应视图函数,无需关心中括号即可实现认证和权限的配置,使得views.py文件中的代码可读性更高。

REST_FRAMEWORK = {
'DEFAULT_THROTTLE_CLASSES': [
'app04.utils.throttles.throttles.MyAnonRateThrottle',
'app04.utils.throttles.throttles.MyUserRateThrottle',
],
'DEFAULT_THROTTLE_RATES': {
'anon': '10/day',
'user': '10/day',
'My_anon': '10/m',
'My_user': '20/m',
'My_VIPuser': '50/m',
},
}

RestFramework自定制之认证和权限、限制访问频率的更多相关文章

  1. rest_framework组件之认证,权限,访问频率

    共用的models from django.db import models # Create your models here. class User(models.Model): username ...

  2. Django REST framework 自定义(认证、权限、访问频率)组件

    本篇随笔在 "Django REST framework 初识" 基础上扩展 一.认证组件 # models.py class Account(models.Model): &qu ...

  3. DRF框架之 用户角色权限与访问频率的权限设置

    1. 简单演示,创建一个models的数据库表 class User(models.Model): name=models.CharField(max_length=32) pwd=models.Ch ...

  4. django Rest Framework----认证/访问权限控制/访问频率限制 执行流程 Authentication/Permissions/Throttling 源码分析

    url: url(r'books/$',views.BookView.as_view({'get':'list','post':'create'})) 为例 当django启动的时候,会调用执行vie ...

  5. django rest-framework 4.REST的认证和权限

    目前,我们的API对谁可以编辑或删除代码段没有任何限制.我们想要一些更先进的行为,以确保:(这段话抄自官网) 代码段始终与创建者相关联. 只有身份验证的用户可以创建片段. 只有片段的创建者可以更新或删 ...

  6. rest-framework框架——认证、权限、频率组件

    一.rest-framework登录验证 1.models.py添加User和Token模型 class User(models.Model): name = models.CharField(max ...

  7. rest-framework组件 之 认证与权限组件

    浏览目录 认证组件 权限组件 频率组件 认证与权限组件 认证组件 局部视图认证 在app01.service.auth.py: class Authentication(BaseAuthenticat ...

  8. rest-framework认证、权限组件

    认证组件: models class User(models.Model): username = models.CharField(max_length=32) password = models. ...

  9. restframework 认证、权限、频率组件

    一.认证 1.表的关系 class User(models.Model): name = models.CharField(max_length=32) pwd = models.CharField( ...

随机推荐

  1. Python 函数 (关键字参数)

    关键字参数 可变参数允许你传入0个或者任意个参数,这些可变参数在函数调用时会自动组装成一个tuple,而关键字参数允许你传入0个或者任意个含参数名的参数,这些参数在函数内部自动组装成为一个dict d ...

  2. Android开发训练之第五章第六节——Transferring Data Using Sync Adapters

    Transferring Data Using Sync Adapters GET STARTED DEPENDENCIES AND PREREQUISITES Android 2.1 (API Le ...

  3. C#模拟登录后请求查询

    需求是这样子的,想开发一个外挂程序,能够抓取别的系统的数据,从而实现数据验证. 比如这样一个界面: 使用Chrome浏览器分析http请求和响应过程以及页面的html代码,发现这是一个ajax请求,于 ...

  4. 宝宝刷 leetcode

    12/3 1.Two Sum Given nums = [2, 7, 11, 15], target = 9, Because nums[0] + nums[1] = 2 + 7 = 9, retur ...

  5. /usr/bin/ld: 找不到 -lmsc----解决方案

    系统的默认搜索依赖库路径为,/usr/local/lib 在camkelists.txt文件中对可执行文件链接libmsc.so add_executable(iat_publish src/iat_ ...

  6. {MySQL的库、表的详细操作}一 库操作 二 表操作 三 行操作

    MySQL的库.表的详细操作 MySQL数据库 本节目录 一 库操作 二 表操作 三 行操作 一 库操作 1.创建数据库 1.1 语法 CREATE DATABASE 数据库名 charset utf ...

  7. RMQ算法详解

    RMQ算法,是一个快速求区间最值的离线算法,预处理时间复杂度O(n*log(n)),查询O(1),所以是一个很快速的算法. 当然这个问题用线段树同样能够解决,算法复杂度为:O(N)~O(logN) . ...

  8. 用Python下载美国国家气候数据中心(NCDC)的气候数据

    美国国家气候数据中心的官网地址是https://www.ncdc.noaa.gov/ 气候数据的下载地址是: 长格式:ftp://ftp.ncdc.noaa.gov/pub/data/noaa/,这种 ...

  9. Elasticsearch 2.3.3 JAVA api说明文档

    原文地址:https://www.blog-china.cn/template\documentHtml\1484101683485.html 翻译作者:@青山常在人不老 加入翻译:cdcnsuper ...

  10. CSS:元素类型

    元素分类 在CSS中,html中的标签元素大体分为三种不同的类型:块状元素.内联元素(又叫行内元素)和内联块状元素. 块状元素 <div>.<p>.<h1>...& ...