IP Spoofing的action导出由redirect修改为Spoofing

This commit is contained in:
duandongmei
2019-01-28 11:13:15 +06:00
parent b57176c6c1
commit 7bfcbe614a
2 changed files with 14 additions and 0 deletions

View File

@@ -268,6 +268,7 @@ public class ExcelCsv {
for (String key : keyList) {
List<E> list=dataMap.get(key);
List<List<String>> listT=new ArrayList<List<String>>();
for (E e : list){
int colunm = 0;
List<String> lisb=new ArrayList<String>();
@@ -305,9 +306,16 @@ public class ExcelCsv {
dict="block_drop";
val = msgProp.getProperty(dict,dict);
}
//ip spoofing redirect动作修改为Spoofing
if(ef.title().equals("block_type")
&& (Reflections.invokeGetter(e, "serviceId").toString().equals("518"))) {
dict="action_spoofing";
val = msgProp.getProperty(dict,dict);
}
}
}
if(ef.title().equals("whether_area_block")&&!StringUtil.isEmpty(val)){
Integer whetherAreaBlock=Integer.parseInt(valStr);
if(whetherAreaBlock.equals(0)){

View File

@@ -2274,6 +2274,12 @@ public class ExportExcel {
dict="block_drop";
val = msgProp.getProperty(dict,dict);
}
//ip spoofing redirect动作修改为Spoofing
if(ef.title().equals("block_type")
&& (Reflections.invokeGetter(e, "serviceId").toString().equals("518"))) {
dict="action_spoofing";
val = msgProp.getProperty(dict,dict);
}
}
}