sys_czrz_data.py 5.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186
  1. #!/usr/bin/env python3
  2. # -*- coding: utf-8 -*-
  3. from . import mpfun
  4. from models import *
  5. from utils import *
  6. from sqlalchemy.orm import Session
  7. from database import get_local_db
  8. # 操作日志表
  9. # 加密和HMAC签名
  10. def sign_row(db: Session, row: CzrzEntity) -> None:
  11. if row.sign != '':
  12. return
  13. user_id = str(row.user_id) # 用户ID
  14. user_name = mpfun.enc_data(row.user_name) # 用户账号
  15. nick_name = mpfun.base64_data(row.nick_name) # 用户昵称
  16. czrz = mpfun.base64_data(row.czrz) # 操作日志
  17. gxsj = get_datetime_str(row.gxsj) # 更新时间
  18. ip = str(row.ip) # IP地址
  19. action = mpfun.base64_data(row.action) # 动作
  20. sign_data = ",".join([user_id, user_name, nick_name, czrz, gxsj, ip, action])
  21. sign_hmac = mpfun.sign_data(sign_data)
  22. # print('sign_tbl_czrz sign_data:', sign_data)
  23. # print('sign_tbl_czrz sign_hmac:', sign_hmac)
  24. row.user_name = user_name
  25. row.sign = sign_hmac
  26. db.commit()
  27. # 比较字段合并字符串是否和MAC值匹配上,调用密码服务器[验证HMAC]接口
  28. def sign_valid_row(row: CzrzEntity) -> bool:
  29. return True
  30. if row.sign == '':
  31. return True
  32. # 关键字段合并字符串
  33. sign_data = get_sign_str(row)
  34. # print('sys_user sign_data:', sign_data)
  35. # 原HMACSM3数值
  36. sign_hmac = row.sign
  37. # print('sign_hmac:', sign_hmac)
  38. return mpfun.hmac_verify(sign_data, sign_hmac)
  39. # 生成待签名的字符串
  40. def get_sign_str(row: CzrzEntity) -> str:
  41. user_id = str(row.user_id) # 用户ID
  42. user_name = row.user_name # 用户账号
  43. nick_name = mpfun.base64_data(row.nick_name) # 用户昵称
  44. czrz = mpfun.base64_data(row.czrz) # 操作日志
  45. gxsj = get_datetime_str(row.gxsj) # 更新时间
  46. ip = str(row.ip) # IP地址
  47. action = mpfun.base64_data(row.action) # 动作
  48. # 关键字段合并字符串
  49. sign_data = ",".join([user_id, user_name, nick_name, czrz, gxsj, ip, action])
  50. return sign_data
  51. # 生成HAMC签名值
  52. def get_sign_hmac(row: CzrzEntity) -> str:
  53. sign_data = get_sign_str(row)
  54. return mpfun.sign_data(sign_data)
  55. # 对所有数据进行签名
  56. def sign_table():
  57. print('sign_tp_czrz table =====>>>')
  58. with get_local_db() as db:
  59. rows = db.query(CzrzEntity).filter(CzrzEntity.sign == '').all()
  60. for row in rows:
  61. sign_row(db, row)
  62. def create_data(begin_time: datetime):
  63. # create_data1(begin_time)
  64. # create_data2(begin_time)
  65. pass
  66. def create_data1(begin_time: datetime):
  67. import random
  68. from datetime import datetime
  69. with get_local_db() as db:
  70. dt = begin_time
  71. while dt < datetime.now():
  72. random_hour = random.randint(1, 5)
  73. random_second = random.randint(1, 3600)
  74. dt = dt + timedelta(hours=random_hour)
  75. dt = dt + timedelta(seconds=random_second)
  76. r = random_hour % 3
  77. if r == 0:
  78. user_id = 1
  79. user_name = 'admin'
  80. nick_name = '超级管理员'
  81. elif r == 1:
  82. user_id = 3
  83. user_name = 'test1'
  84. nick_name = '本部门及以下 密码666666'
  85. else:
  86. user_id = 8
  87. user_name = 'test'
  88. nick_name = '工作人员测试账号'
  89. db_entity = CzrzEntity()
  90. db_entity.user_id = user_id
  91. db_entity.user_name = user_name
  92. db_entity.nick_name = nick_name
  93. db_entity.czrz = '后台管理登录成功' if r < 2 else '后台USBKEY登录成功'
  94. db_entity.gxsj = dt
  95. db_entity.ip = '172.26.1.92'
  96. db_entity.action = '登录'
  97. db_entity.sign = ''
  98. print("new log:" + str(dt))
  99. db.add(db_entity)
  100. db.commit()
  101. def create_data2(begin_time: datetime):
  102. import random
  103. from datetime import datetime
  104. with get_local_db() as db:
  105. dt = begin_time
  106. while dt < datetime.now():
  107. random_hour = random.randint(6, 24)
  108. random_second = random.randint(1, 3600)
  109. dt = dt + timedelta(hours=random_hour)
  110. dt = dt + timedelta(seconds=random_second)
  111. r = random_hour % 6
  112. if r == 0:
  113. user_id = 1
  114. user_name = 'admin'
  115. nick_name = '超级管理员'
  116. czrz = "创建事件"
  117. elif r == 1:
  118. user_id = 1
  119. user_name = 'admin'
  120. nick_name = '超级管理员'
  121. czrz = "大屏登录成功"
  122. elif r == 3:
  123. user_id = 1
  124. user_name = 'admin'
  125. nick_name = '超级管理员'
  126. czrz = "启动预案"
  127. elif r == 4:
  128. user_id = 7
  129. user_name = '001'
  130. nick_name = '领导测试账号'
  131. czrz = "预案任务下发"
  132. elif r == 5:
  133. user_id = 8
  134. user_name = 'test'
  135. nick_name = '工作人员测试账号'
  136. czrz = "发起会议"
  137. else:
  138. user_id = 8
  139. user_name = 'test'
  140. nick_name = '工作人员测试账号'
  141. czrz = "任务下达"
  142. db_entity = CzrzEntity()
  143. db_entity.user_id = user_id
  144. db_entity.user_name = user_name
  145. db_entity.nick_name = nick_name
  146. db_entity.czrz = czrz
  147. db_entity.gxsj = dt
  148. db_entity.ip = '172.26.1.92'
  149. db_entity.action = '应急一张图'
  150. db_entity.sign = ''
  151. print("new log:" + str(dt))
  152. db.add(db_entity)
  153. db.commit()