From 465c1d149664d8df4fc89f8da2f5dd509257d88d Mon Sep 17 00:00:00 2001
From: PushM <584406942@qq.com>
Date: Fri, 7 Jun 2024 04:17:04 +0800
Subject: [PATCH] =?UTF-8?q?1=E3=80=81=E4=BF=AE=E5=A4=8D=E5=AE=A1=E6=89=B9?=
=?UTF-8?q?=E4=BA=BA=20=E5=88=9B=E5=BB=BA=E4=BA=BAbug=202=E3=80=81?=
=?UTF-8?q?=E5=AE=B9=E5=99=A8=E5=86=85=E6=97=B6=E9=97=B4=E5=92=8C=E5=AE=BF?=
=?UTF-8?q?=E4=B8=BB=E6=9C=BA=E5=99=A8=E4=B8=80=E8=87=B4-v=20/etc/localtim?=
=?UTF-8?q?e:/etc/localtime=203=E3=80=81loginserver=E8=A7=A3=E5=86=B3?=
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
---
.../dynamicrule/DynamicRuleController.java | 7 +++---
.../rule/staticrule/StaticRuleService.java | 2 +-
.../server/user/login/LoginService.java | 13 +++++++----
.../server/whitelist/WhiteListController.java | 4 ++--
.../resources/mappers/ProtectObjectMapper.xml | 11 ++++-----
.../resources/mappers/StaticRuleMapper.xml | 2 +-
.../resources/mappers/TemplateNewMapper.xml | 2 +-
.../object/ProtectObjectServiceTest.java | 23 +++++++++++--------
.../templatenew/NewTemplateServiceTest.java | 2 +-
.../rule/dynamic/DynamicRuleServiceTest.java | 2 +-
.../whitelist/WhiteListServiceTest.java | 4 ++--
11 files changed, 40 insertions(+), 32 deletions(-)
diff --git a/src/main/java/com/realtime/protection/server/rule/dynamicrule/DynamicRuleController.java b/src/main/java/com/realtime/protection/server/rule/dynamicrule/DynamicRuleController.java
index 3309bee..f51cf68 100644
--- a/src/main/java/com/realtime/protection/server/rule/dynamicrule/DynamicRuleController.java
+++ b/src/main/java/com/realtime/protection/server/rule/dynamicrule/DynamicRuleController.java
@@ -37,10 +37,11 @@ public class DynamicRuleController implements DynamicRuleControllerApi {
HttpSession session = request.getSession();
UserFull user = (UserFull) session.getAttribute("user");
if (user != null) {
- dynamicRuleObject.setAuditUserName(user.name);
- dynamicRuleObject.setAuditUserId(user.uid);
- dynamicRuleObject.setAuditUserDepart(user.getOrgName());
+ dynamicRuleObject.setDynamicRuleCreateUsername(user.name);
+ dynamicRuleObject.setDynamicRuleCreateUserId(Integer.valueOf(user.uid));
+ dynamicRuleObject.setDynamicRuleCreateDepart(user.getOrgName());
}
+
//调用service新增
Integer dynamicRuleObjectId = dynamicRuleService.newDynamicRuleObject(dynamicRuleObject);
return ResponseResult.ok().
diff --git a/src/main/java/com/realtime/protection/server/rule/staticrule/StaticRuleService.java b/src/main/java/com/realtime/protection/server/rule/staticrule/StaticRuleService.java
index be27d48..b22c34c 100644
--- a/src/main/java/com/realtime/protection/server/rule/staticrule/StaticRuleService.java
+++ b/src/main/java/com/realtime/protection/server/rule/staticrule/StaticRuleService.java
@@ -66,7 +66,7 @@ public class StaticRuleService {
@Transactional
public Integer newStaticRuleObject(StaticRuleObject object) {
- object.setStaticRuleCreateTime(LocalDateTime.now());
+// object.setStaticRuleCreateTime(LocalDateTime.now());
object.setAuditStatus(0);
if (!isIpMaskValid(object.getStaticRuleSip(),object.getStaticRuleMsip()) ||
diff --git a/src/main/java/com/realtime/protection/server/user/login/LoginService.java b/src/main/java/com/realtime/protection/server/user/login/LoginService.java
index 8bb63fb..4b3083e 100644
--- a/src/main/java/com/realtime/protection/server/user/login/LoginService.java
+++ b/src/main/java/com/realtime/protection/server/user/login/LoginService.java
@@ -51,7 +51,8 @@ public class LoginService {
String accessToken = "";
// 获取 ACCESS_TOKEN
ObjectMapper objectMapper = new ObjectMapper();
-// OkHttpClient client = new OkHttpClient();
+
+ // OkHttpClient client = new OkHttpClient();
//不做证书验证的OkHttpClient
OkHttpClient client = new OkHttpClient.Builder()
@@ -61,14 +62,17 @@ public class LoginService {
Request request = new Request.Builder()
// .url("https://114.243.134.122:10217/passport/accessToken?grant_type=client_credentials")
- .url("https://passport.iam.pub/passport/accessToken?grant_type=client_credentials")
+// .url("https://passport.iam.pub/passport/accessToken?grant_type=client_credentials")
+ .url("http://10.60.15.14:8080/passport/accessToken?grant_type=client_credentials")
// .header("Authorization", "Basic TlNBRERAWlguT1JHOk14a1hHZ1ltOUNROUE3TCRSOCNLRW02R1pSeEhwd1c2")
- .header("Authorization", "Basic TlNBREQ6bkhRbE5zN3lLeVd5bzJOc2JmNk5oRmFhYmlWWUlBU1NsdWJRZ3pUaDhOU2xOUkE1V2xQUTF3PT0=")
+// .header("Authorization", "Basic TlNBREQ6bkhRbE5zN3lLeVd5bzJOc2JmNk5oRmFhYmlWWUlBU1NsdWJRZ3pUaDhOU2xOUkE1V2xQUTF3PT0=")
+ .header("Authorization", "Basic TlNBRERAWlguT1JHOm5IUWxOczd5S3lXeW8yTnNiZjZOaEZhYWJpVllJQVNTbHViUWd6VGg4TlNsTlJBNVdsUFExdz09")
.post(okhttp3.internal.Util.EMPTY_REQUEST)
.build();
try {
Response response = client.newCall(request).execute();
String rsp = response.body().string();
+ System.out.println("rsp:" + rsp);
try {
AccessTokenResponse atr = objectMapper.readValue(rsp, AccessTokenResponse.class);
accessToken = atr.getAccess_token();
@@ -87,8 +91,9 @@ public class LoginService {
.addFormDataPart("sessionData", sessionData).build();
request = new Request.Builder()
// .url("https://passport.zx.com:10217/passport/accessApplication")
- .url("https://114.243.134.122:10217/passport/accessApplication")
+// .url("https://114.243.134.122:10217/passport/accessApplication")
// .url("https://passport.iam.pub/passport/accessApplication")
+ .url("http://10.60.15.14:8080/passport/accessApplication")
.header("Authorization", "Bearer " + accessToken)
.header("Content-Type", "application/x-www-form-urlencoded")
.post(body)
diff --git a/src/main/java/com/realtime/protection/server/whitelist/WhiteListController.java b/src/main/java/com/realtime/protection/server/whitelist/WhiteListController.java
index 59902cf..1e0213b 100644
--- a/src/main/java/com/realtime/protection/server/whitelist/WhiteListController.java
+++ b/src/main/java/com/realtime/protection/server/whitelist/WhiteListController.java
@@ -39,7 +39,7 @@ public class WhiteListController implements WhiteListControllerApi {
UserFull user = (UserFull) session.getAttribute("user");
if (user != null) {
object.setCreateUserName(user.name);
- object.setAuditUserId(user.uid);
+ object.setCreateUserId(user.uid);
object.setCreateUserDepartment(user.getOrgName());
}
@@ -184,7 +184,7 @@ public class WhiteListController implements WhiteListControllerApi {
@PathVariable Integer auditStatus,
@Autowired HttpServletRequest request) {
if (id <= 0 || auditStatus < 0 || auditStatus > 2) {
- return new ResponseResult(400, "id or status is invalid")
+ return new ResponseResult(400, "id或状态无效")
.setData("whiteobj_id", id)
.setData("success", false);
}
diff --git a/src/main/resources/mappers/ProtectObjectMapper.xml b/src/main/resources/mappers/ProtectObjectMapper.xml
index f36f304..ef48291 100644
--- a/src/main/resources/mappers/ProtectObjectMapper.xml
+++ b/src/main/resources/mappers/ProtectObjectMapper.xml
@@ -143,10 +143,10 @@
-
+
-
+
@@ -157,10 +157,9 @@