1、修复审批人 创建人bug

2、容器内时间和宿主机器一致-v /etc/localtime:/etc/localtime
3、loginserver解决
This commit is contained in:
PushM
2024-06-07 04:17:04 +08:00
parent bb390b3ba8
commit 465c1d1496
11 changed files with 40 additions and 32 deletions

View File

@@ -37,10 +37,11 @@ public class DynamicRuleController implements DynamicRuleControllerApi {
HttpSession session = request.getSession(); HttpSession session = request.getSession();
UserFull user = (UserFull) session.getAttribute("user"); UserFull user = (UserFull) session.getAttribute("user");
if (user != null) { if (user != null) {
dynamicRuleObject.setAuditUserName(user.name); dynamicRuleObject.setDynamicRuleCreateUsername(user.name);
dynamicRuleObject.setAuditUserId(user.uid); dynamicRuleObject.setDynamicRuleCreateUserId(Integer.valueOf(user.uid));
dynamicRuleObject.setAuditUserDepart(user.getOrgName()); dynamicRuleObject.setDynamicRuleCreateDepart(user.getOrgName());
} }
//调用service新增 //调用service新增
Integer dynamicRuleObjectId = dynamicRuleService.newDynamicRuleObject(dynamicRuleObject); Integer dynamicRuleObjectId = dynamicRuleService.newDynamicRuleObject(dynamicRuleObject);
return ResponseResult.ok(). return ResponseResult.ok().

View File

@@ -66,7 +66,7 @@ public class StaticRuleService {
@Transactional @Transactional
public Integer newStaticRuleObject(StaticRuleObject object) { public Integer newStaticRuleObject(StaticRuleObject object) {
object.setStaticRuleCreateTime(LocalDateTime.now()); // object.setStaticRuleCreateTime(LocalDateTime.now());
object.setAuditStatus(0); object.setAuditStatus(0);
if (!isIpMaskValid(object.getStaticRuleSip(),object.getStaticRuleMsip()) || if (!isIpMaskValid(object.getStaticRuleSip(),object.getStaticRuleMsip()) ||

View File

@@ -51,7 +51,8 @@ public class LoginService {
String accessToken = ""; String accessToken = "";
// 获取 ACCESS_TOKEN // 获取 ACCESS_TOKEN
ObjectMapper objectMapper = new ObjectMapper(); ObjectMapper objectMapper = new ObjectMapper();
// OkHttpClient client = new OkHttpClient();
// OkHttpClient client = new OkHttpClient();
//不做证书验证的OkHttpClient //不做证书验证的OkHttpClient
OkHttpClient client = new OkHttpClient.Builder() OkHttpClient client = new OkHttpClient.Builder()
@@ -61,14 +62,17 @@ public class LoginService {
Request request = new Request.Builder() Request request = new Request.Builder()
// .url("https://114.243.134.122:10217/passport/accessToken?grant_type=client_credentials") // .url("https://114.243.134.122:10217/passport/accessToken?grant_type=client_credentials")
.url("https://passport.iam.pub/passport/accessToken?grant_type=client_credentials") // .url("https://passport.iam.pub/passport/accessToken?grant_type=client_credentials")
.url("http://10.60.15.14:8080/passport/accessToken?grant_type=client_credentials")
// .header("Authorization", "Basic TlNBRERAWlguT1JHOk14a1hHZ1ltOUNROUE3TCRSOCNLRW02R1pSeEhwd1c2") // .header("Authorization", "Basic TlNBRERAWlguT1JHOk14a1hHZ1ltOUNROUE3TCRSOCNLRW02R1pSeEhwd1c2")
.header("Authorization", "Basic TlNBREQ6bkhRbE5zN3lLeVd5bzJOc2JmNk5oRmFhYmlWWUlBU1NsdWJRZ3pUaDhOU2xOUkE1V2xQUTF3PT0=") // .header("Authorization", "Basic TlNBREQ6bkhRbE5zN3lLeVd5bzJOc2JmNk5oRmFhYmlWWUlBU1NsdWJRZ3pUaDhOU2xOUkE1V2xQUTF3PT0=")
.header("Authorization", "Basic TlNBRERAWlguT1JHOm5IUWxOczd5S3lXeW8yTnNiZjZOaEZhYWJpVllJQVNTbHViUWd6VGg4TlNsTlJBNVdsUFExdz09")
.post(okhttp3.internal.Util.EMPTY_REQUEST) .post(okhttp3.internal.Util.EMPTY_REQUEST)
.build(); .build();
try { try {
Response response = client.newCall(request).execute(); Response response = client.newCall(request).execute();
String rsp = response.body().string(); String rsp = response.body().string();
System.out.println("rsp:" + rsp);
try { try {
AccessTokenResponse atr = objectMapper.readValue(rsp, AccessTokenResponse.class); AccessTokenResponse atr = objectMapper.readValue(rsp, AccessTokenResponse.class);
accessToken = atr.getAccess_token(); accessToken = atr.getAccess_token();
@@ -87,8 +91,9 @@ public class LoginService {
.addFormDataPart("sessionData", sessionData).build(); .addFormDataPart("sessionData", sessionData).build();
request = new Request.Builder() request = new Request.Builder()
// .url("https://passport.zx.com:10217/passport/accessApplication") // .url("https://passport.zx.com:10217/passport/accessApplication")
.url("https://114.243.134.122:10217/passport/accessApplication") // .url("https://114.243.134.122:10217/passport/accessApplication")
// .url("https://passport.iam.pub/passport/accessApplication") // .url("https://passport.iam.pub/passport/accessApplication")
.url("http://10.60.15.14:8080/passport/accessApplication")
.header("Authorization", "Bearer " + accessToken) .header("Authorization", "Bearer " + accessToken)
.header("Content-Type", "application/x-www-form-urlencoded") .header("Content-Type", "application/x-www-form-urlencoded")
.post(body) .post(body)

View File

@@ -39,7 +39,7 @@ public class WhiteListController implements WhiteListControllerApi {
UserFull user = (UserFull) session.getAttribute("user"); UserFull user = (UserFull) session.getAttribute("user");
if (user != null) { if (user != null) {
object.setCreateUserName(user.name); object.setCreateUserName(user.name);
object.setAuditUserId(user.uid); object.setCreateUserId(user.uid);
object.setCreateUserDepartment(user.getOrgName()); object.setCreateUserDepartment(user.getOrgName());
} }
@@ -184,7 +184,7 @@ public class WhiteListController implements WhiteListControllerApi {
@PathVariable Integer auditStatus, @PathVariable Integer auditStatus,
@Autowired HttpServletRequest request) { @Autowired HttpServletRequest request) {
if (id <= 0 || auditStatus < 0 || auditStatus > 2) { if (id <= 0 || auditStatus < 0 || auditStatus > 2) {
return new ResponseResult(400, "id or status is invalid") return new ResponseResult(400, "id或状态无效")
.setData("whiteobj_id", id) .setData("whiteobj_id", id)
.setData("success", false); .setData("success", false);
} }

View File

@@ -143,10 +143,10 @@
<result column="protect_object_create_username" property="protectObjectCreateUsername"/> <result column="protect_object_create_username" property="protectObjectCreateUsername"/>
<result column="protect_object_create_user_id" property="protectObjectCreateUserId"/> <result column="protect_object_create_user_id" property="protectObjectCreateUserId"/>
<result column="protect_object_create_user_depart" property="protectObjectCreateDepart"/> <result column="protect_object_create_depart" property="protectObjectCreateDepart"/>
<result column="audit_user_name" property="auditUserName"/> <result column="audit_user_name" property="auditUserName"/>
<result column="audit_user_id" property="auditUserId"/> <result column="audit_user_id" property="auditUserId"/>
<result column="audit_user_depart" property="auditUserDepart"/> <result column="audit_user_deaprt" property="auditUserDepart"/>
<result column="create_time" property="createTime"/> <result column="create_time" property="createTime"/>
<result column="modify_time" property="modifyTime"/> <result column="modify_time" property="modifyTime"/>
@@ -157,10 +157,9 @@
<select id="queryProtectObjects" resultMap="protectObjectMap"> <select id="queryProtectObjects" resultMap="protectObjectMap">
SELECT SELECT
protect_object_id, protect_object_name, protect_object_system_name, *,
INET_NTOA(protect_object_ip) as protect_object_ip, INET_NTOA(protect_object_ip) as protect_object_ip
protect_object_port, protect_object_url, protect_object_protocol, protect_object_audit_status
,protect_object_display_id
FROM t_protect_object FROM t_protect_object
<where> <where>
<if test="proobj_name != null and proobj_name != '' ">AND protect_object_name LIKE CONCAT('%', #{proobj_name}, '%')</if> <if test="proobj_name != null and proobj_name != '' ">AND protect_object_name LIKE CONCAT('%', #{proobj_name}, '%')</if>

View File

@@ -15,7 +15,7 @@
static_rule_url, static_rule_priority, static_rule_url, static_rule_priority,
static_rule_frequency, static_rule_audit_status, static_rule_frequency, static_rule_audit_status,
static_rule_display_id,event_type,static_rule_modify_time) static_rule_display_id,event_type,static_rule_modify_time)
values (#{object.staticRuleName}, #{object.staticRuleCreateTime}, #{object.staticRuleCreateUsername}, values (#{object.staticRuleName}, NOW(), #{object.staticRuleCreateUsername},
#{object.staticRuleCreateDepart}, #{object.staticRuleCreateUserId}, INET_ATON(#{object.staticRuleSip}), #{object.staticRuleCreateDepart}, #{object.staticRuleCreateUserId}, INET_ATON(#{object.staticRuleSip}),
INET_ATON(#{object.staticRuleMsip}), #{object.staticRuleSport}, #{object.staticRuleMsport}, INET_ATON(#{object.staticRuleMsip}), #{object.staticRuleSport}, #{object.staticRuleMsport},
INET_ATON(#{object.staticRuleDip}), INET_ATON(#{object.staticRuleMdip}), #{object.staticRuleDport}, INET_ATON(#{object.staticRuleDip}), INET_ATON(#{object.staticRuleMdip}), #{object.staticRuleDport},

View File

@@ -143,7 +143,7 @@
audit_user_name, audit_user_name,
audit_user_id, audit_user_id,
audit_user_depart audit_user_depart
)
from t_strategy_template_new from t_strategy_template_new
where strategy_template_id in where strategy_template_id in
<foreach collection="ids" item="id" open="(" separator="," close=")"> <foreach collection="ids" item="id" open="(" separator="," close=")">

View File

@@ -165,16 +165,19 @@ class ProtectObjectServiceTest extends ProtectionApplicationTests {
@Test @Test
void changeProtectObjectAuditStatus() { void changeProtectObjectAuditStatus() {
int testNum = 0; // int testNum = 0;
for (int i = 300; i < 100000; i++) { // for (int i = 300; i < 100000; i++) {
if (protectObjectService.queryProtectObject(i) != null) { // if (protectObjectService.queryProtectObject(i) != null) {
testNum = i; // testNum = i;
break; // break;
} // }
} // }
assertTrue((Boolean) protectObjectService.changeProtectObjectAuditStatus(testNum, 1).get("success")); // assertTrue((Boolean) protectObjectService.changeProtectObjectAuditStatus(testNum, 1).get("success"));
int finalTestNum = testNum; // int finalTestNum = testNum;
assertThrows(IllegalArgumentException.class, () -> protectObjectService.changeProtectObjectAuditStatus(finalTestNum, 2)); // assertThrows(IllegalArgumentException.class, () -> protectObjectService.changeProtectObjectAuditStatus(finalTestNum, 2));
assertTrue((Boolean) protectObjectService.changeProtectObjectAuditStatus(70330, 1,"sss",111,"ssssss").get("success"));
} }
@Test @Test

View File

@@ -78,6 +78,6 @@ public class NewTemplateServiceTest {
List<TemplateNew> templates = templateService.queryTemplates( List<TemplateNew> templates = templateService.queryTemplates(
null, null, null, null, null,null, null,1,3); null, null, null, null, null,null, null,1,3);
TemplateNew testTemplate = templates.get(0); TemplateNew testTemplate = templates.get(0);
templateService.updateAuditStatus(testTemplate.getTemplateId(), 2, null,null,null); templateService.updateAuditStatus(testTemplate.getTemplateId(), 2, "sss",1111,"depart");
} }
} }

View File

@@ -45,7 +45,7 @@ public class DynamicRuleServiceTest extends ProtectionApplicationTests {
// null,null, 1, 1); // null,null, 1, 1);
// List<Template> templates = templateService.queryTemplates( // List<Template> templates = templateService.queryTemplates(
// null, null, null, null, null,1, 1); // null, null, null, null, null,1, 1);
for (int i = 0;i<30; i++) { for (int i = 0;i<2; i++) {
DynamicRuleObject object = new DynamicRuleObject(); DynamicRuleObject object = new DynamicRuleObject();
object.setDynamicRuleName("动态规则"+i); object.setDynamicRuleName("动态规则"+i);
object.setDescription("动态规则新建测试"); object.setDescription("动态规则新建测试");

View File

@@ -48,7 +48,7 @@ class WhiteListServiceTest extends ProtectionApplicationTests {
WhiteListObject object = new WhiteListObject(); WhiteListObject object = new WhiteListObject();
object.setWhiteListName("test"); object.setWhiteListName("test");
object.setWhiteListSystemName("china"); object.setWhiteListSystemName("china");
object.setWhiteListIP("1.1.1.1"); object.setWhiteListIP("1.1.9.1");
object.setWhiteListPort(80); object.setWhiteListPort(80);
object.setWhiteListUrl("www.baidu.com"); object.setWhiteListUrl("www.baidu.com");
object.setWhiteListProtocol("TCP"); object.setWhiteListProtocol("TCP");
@@ -86,7 +86,7 @@ class WhiteListServiceTest extends ProtectionApplicationTests {
@Test @Test
void testUpdateWhiteListAuditStatus() { void testUpdateWhiteListAuditStatus() {
whiteListService.updateWhiteListObjectAuditStatus(7222, 2, "mh", 1, "mmeess"); whiteListService.updateWhiteListObjectAuditStatus(7229, 2, "mh2222", 1, "mmee ess");
} }
@Test @Test