IP Spoofing的action导出由redirect修改为Spoofing

(cherry picked from commit 7bfcbe614a)
This commit is contained in:
duandongmei
2019-01-28 05:13:15 +00:00
committed by 王鑫
parent c458bb0e6b
commit 453ed153bc
2 changed files with 14 additions and 0 deletions

View File

@@ -268,6 +268,7 @@ public class ExcelCsv {
for (String key : keyList) {
List<E> list=dataMap.get(key);
List<List<String>> listT=new ArrayList<List<String>>();
for (E e : list){
int colunm = 0;
List<String> lisb=new ArrayList<String>();
@@ -305,9 +306,16 @@ public class ExcelCsv {
dict="block_drop";
val = msgProp.getProperty(dict,dict);
}
//ip spoofing redirect动作修改为Spoofing
if(ef.title().equals("block_type")
&& (Reflections.invokeGetter(e, "serviceId").toString().equals("518"))) {
dict="action_spoofing";
val = msgProp.getProperty(dict,dict);
}
}
}
if(ef.title().equals("whether_area_block")&&!StringUtil.isEmpty(val)){
Integer whetherAreaBlock=Integer.parseInt(valStr);
if(whetherAreaBlock.equals(0)){

View File

@@ -2274,6 +2274,12 @@ public class ExportExcel {
dict="block_drop";
val = msgProp.getProperty(dict,dict);
}
//ip spoofing redirect动作修改为Spoofing
if(ef.title().equals("block_type")
&& (Reflections.invokeGetter(e, "serviceId").toString().equals("518"))) {
dict="action_spoofing";
val = msgProp.getProperty(dict,dict);
}
}
}