From 465c1d149664d8df4fc89f8da2f5dd509257d88d Mon Sep 17 00:00:00 2001 From: PushM <584406942@qq.com> Date: Fri, 7 Jun 2024 04:17:04 +0800 Subject: [PATCH] =?UTF-8?q?1=E3=80=81=E4=BF=AE=E5=A4=8D=E5=AE=A1=E6=89=B9?= =?UTF-8?q?=E4=BA=BA=20=E5=88=9B=E5=BB=BA=E4=BA=BAbug=202=E3=80=81?= =?UTF-8?q?=E5=AE=B9=E5=99=A8=E5=86=85=E6=97=B6=E9=97=B4=E5=92=8C=E5=AE=BF?= =?UTF-8?q?=E4=B8=BB=E6=9C=BA=E5=99=A8=E4=B8=80=E8=87=B4-v=20/etc/localtim?= =?UTF-8?q?e:/etc/localtime=203=E3=80=81loginserver=E8=A7=A3=E5=86=B3?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- .../dynamicrule/DynamicRuleController.java | 7 +++--- .../rule/staticrule/StaticRuleService.java | 2 +- .../server/user/login/LoginService.java | 13 +++++++---- .../server/whitelist/WhiteListController.java | 4 ++-- .../resources/mappers/ProtectObjectMapper.xml | 11 ++++----- .../resources/mappers/StaticRuleMapper.xml | 2 +- .../resources/mappers/TemplateNewMapper.xml | 2 +- .../object/ProtectObjectServiceTest.java | 23 +++++++++++-------- .../templatenew/NewTemplateServiceTest.java | 2 +- .../rule/dynamic/DynamicRuleServiceTest.java | 2 +- .../whitelist/WhiteListServiceTest.java | 4 ++-- 11 files changed, 40 insertions(+), 32 deletions(-) diff --git a/src/main/java/com/realtime/protection/server/rule/dynamicrule/DynamicRuleController.java b/src/main/java/com/realtime/protection/server/rule/dynamicrule/DynamicRuleController.java index 3309bee..f51cf68 100644 --- a/src/main/java/com/realtime/protection/server/rule/dynamicrule/DynamicRuleController.java +++ b/src/main/java/com/realtime/protection/server/rule/dynamicrule/DynamicRuleController.java @@ -37,10 +37,11 @@ public class DynamicRuleController implements DynamicRuleControllerApi { HttpSession session = request.getSession(); UserFull user = (UserFull) session.getAttribute("user"); if (user != null) { - dynamicRuleObject.setAuditUserName(user.name); - dynamicRuleObject.setAuditUserId(user.uid); - dynamicRuleObject.setAuditUserDepart(user.getOrgName()); + dynamicRuleObject.setDynamicRuleCreateUsername(user.name); + dynamicRuleObject.setDynamicRuleCreateUserId(Integer.valueOf(user.uid)); + dynamicRuleObject.setDynamicRuleCreateDepart(user.getOrgName()); } + //调用service新增 Integer dynamicRuleObjectId = dynamicRuleService.newDynamicRuleObject(dynamicRuleObject); return ResponseResult.ok(). diff --git a/src/main/java/com/realtime/protection/server/rule/staticrule/StaticRuleService.java b/src/main/java/com/realtime/protection/server/rule/staticrule/StaticRuleService.java index be27d48..b22c34c 100644 --- a/src/main/java/com/realtime/protection/server/rule/staticrule/StaticRuleService.java +++ b/src/main/java/com/realtime/protection/server/rule/staticrule/StaticRuleService.java @@ -66,7 +66,7 @@ public class StaticRuleService { @Transactional public Integer newStaticRuleObject(StaticRuleObject object) { - object.setStaticRuleCreateTime(LocalDateTime.now()); +// object.setStaticRuleCreateTime(LocalDateTime.now()); object.setAuditStatus(0); if (!isIpMaskValid(object.getStaticRuleSip(),object.getStaticRuleMsip()) || diff --git a/src/main/java/com/realtime/protection/server/user/login/LoginService.java b/src/main/java/com/realtime/protection/server/user/login/LoginService.java index 8bb63fb..4b3083e 100644 --- a/src/main/java/com/realtime/protection/server/user/login/LoginService.java +++ b/src/main/java/com/realtime/protection/server/user/login/LoginService.java @@ -51,7 +51,8 @@ public class LoginService { String accessToken = ""; // 获取 ACCESS_TOKEN ObjectMapper objectMapper = new ObjectMapper(); -// OkHttpClient client = new OkHttpClient(); + + // OkHttpClient client = new OkHttpClient(); //不做证书验证的OkHttpClient OkHttpClient client = new OkHttpClient.Builder() @@ -61,14 +62,17 @@ public class LoginService { Request request = new Request.Builder() // .url("https://114.243.134.122:10217/passport/accessToken?grant_type=client_credentials") - .url("https://passport.iam.pub/passport/accessToken?grant_type=client_credentials") +// .url("https://passport.iam.pub/passport/accessToken?grant_type=client_credentials") + .url("http://10.60.15.14:8080/passport/accessToken?grant_type=client_credentials") // .header("Authorization", "Basic TlNBRERAWlguT1JHOk14a1hHZ1ltOUNROUE3TCRSOCNLRW02R1pSeEhwd1c2") - .header("Authorization", "Basic TlNBREQ6bkhRbE5zN3lLeVd5bzJOc2JmNk5oRmFhYmlWWUlBU1NsdWJRZ3pUaDhOU2xOUkE1V2xQUTF3PT0=") +// .header("Authorization", "Basic TlNBREQ6bkhRbE5zN3lLeVd5bzJOc2JmNk5oRmFhYmlWWUlBU1NsdWJRZ3pUaDhOU2xOUkE1V2xQUTF3PT0=") + .header("Authorization", "Basic TlNBRERAWlguT1JHOm5IUWxOczd5S3lXeW8yTnNiZjZOaEZhYWJpVllJQVNTbHViUWd6VGg4TlNsTlJBNVdsUFExdz09") .post(okhttp3.internal.Util.EMPTY_REQUEST) .build(); try { Response response = client.newCall(request).execute(); String rsp = response.body().string(); + System.out.println("rsp:" + rsp); try { AccessTokenResponse atr = objectMapper.readValue(rsp, AccessTokenResponse.class); accessToken = atr.getAccess_token(); @@ -87,8 +91,9 @@ public class LoginService { .addFormDataPart("sessionData", sessionData).build(); request = new Request.Builder() // .url("https://passport.zx.com:10217/passport/accessApplication") - .url("https://114.243.134.122:10217/passport/accessApplication") +// .url("https://114.243.134.122:10217/passport/accessApplication") // .url("https://passport.iam.pub/passport/accessApplication") + .url("http://10.60.15.14:8080/passport/accessApplication") .header("Authorization", "Bearer " + accessToken) .header("Content-Type", "application/x-www-form-urlencoded") .post(body) diff --git a/src/main/java/com/realtime/protection/server/whitelist/WhiteListController.java b/src/main/java/com/realtime/protection/server/whitelist/WhiteListController.java index 59902cf..1e0213b 100644 --- a/src/main/java/com/realtime/protection/server/whitelist/WhiteListController.java +++ b/src/main/java/com/realtime/protection/server/whitelist/WhiteListController.java @@ -39,7 +39,7 @@ public class WhiteListController implements WhiteListControllerApi { UserFull user = (UserFull) session.getAttribute("user"); if (user != null) { object.setCreateUserName(user.name); - object.setAuditUserId(user.uid); + object.setCreateUserId(user.uid); object.setCreateUserDepartment(user.getOrgName()); } @@ -184,7 +184,7 @@ public class WhiteListController implements WhiteListControllerApi { @PathVariable Integer auditStatus, @Autowired HttpServletRequest request) { if (id <= 0 || auditStatus < 0 || auditStatus > 2) { - return new ResponseResult(400, "id or status is invalid") + return new ResponseResult(400, "id或状态无效") .setData("whiteobj_id", id) .setData("success", false); } diff --git a/src/main/resources/mappers/ProtectObjectMapper.xml b/src/main/resources/mappers/ProtectObjectMapper.xml index f36f304..ef48291 100644 --- a/src/main/resources/mappers/ProtectObjectMapper.xml +++ b/src/main/resources/mappers/ProtectObjectMapper.xml @@ -143,10 +143,10 @@ - + - + @@ -157,10 +157,9 @@