|
|
@ -664,7 +664,7 @@ public class CustomerFormServiceImpl implements CustomerFormService { |
|
|
|
|
|
|
|
|
*/ |
|
|
*/ |
|
|
@Override |
|
|
@Override |
|
|
public ArrayList<CustomerFormTableSingleFieldValue> getAsfDataTitles(String key, String token,String formId, String dataTitle,String rangeFormula, String rangeString, String hideFormula, String hideString,String masterOnField, String fillFieldsMaster, JSONArray fillFieldsChild) { |
|
|
public ArrayList<CustomerFormTableSingleFieldValue> getAsfDataTitles(String key, String token,String glbbddbd,String formId, String dataTitle,String rangeFormula, String rangeString, String hideFormula, String hideString,String masterOnField, String fillFieldsMaster, JSONArray fillFieldsChild) { |
|
|
//关联表单的id
|
|
|
//关联表单的id
|
|
|
String AsfFormId = formId; |
|
|
String AsfFormId = formId; |
|
|
//根据formId(cfid)查询关联表单表名
|
|
|
//根据formId(cfid)查询关联表单表名
|
|
|
@ -720,7 +720,7 @@ public class CustomerFormServiceImpl implements CustomerFormService { |
|
|
keytokenmap.put("usertoken",token); |
|
|
keytokenmap.put("usertoken",token); |
|
|
UserDetail userDetail = userService.getUserDetailFromRedis(keytokenmap); |
|
|
UserDetail userDetail = userService.getUserDetailFromRedis(keytokenmap); |
|
|
|
|
|
|
|
|
logger.error("用户进行了SQL注入攻击:key--"+userDetail.getWmKey()+"姓名--"+userDetail.getName()+"输入的条件"+rangeFormula); |
|
|
logger.error("条件含有非法字符,主表单->"+glbbddbd+"###关联表单->"+asfFormName+"###非法条件->"+rangeFormula); |
|
|
dataTitleMapList = new ArrayList<>();//直接返回空数据标题列表
|
|
|
dataTitleMapList = new ArrayList<>();//直接返回空数据标题列表
|
|
|
}else{ |
|
|
}else{ |
|
|
if(operator.equals("包含")){ |
|
|
if(operator.equals("包含")){ |
|
|
@ -1570,6 +1570,36 @@ public class CustomerFormServiceImpl implements CustomerFormService { |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
//数据填充规则数据字段准备 start
|
|
|
//数据填充规则数据字段准备 start
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
System.out.println(fillFieldsChild); |
|
|
|
|
|
|
|
|
|
|
|
if(fillFieldsChild.size()>0){ |
|
|
|
|
|
for(int i = 0; i<fillFieldsChild.size();i++){ |
|
|
|
|
|
System.out.println(fillFieldsChild.get(i)); |
|
|
|
|
|
|
|
|
|
|
|
com.alibaba.fastjson2.JSONObject singleAsfChildTableFillRoleObject = (com.alibaba.fastjson2.JSONObject)fillFieldsChild.get(i); |
|
|
|
|
|
com.alibaba.fastjson2.JSONObject filterCondition = (com.alibaba.fastjson2.JSONObject)singleAsfChildTableFillRoleObject.get("filterCondition"); |
|
|
|
|
|
System.out.println(1); |
|
|
|
|
|
String singleAsfChildTableConditionHtml = filterCondition.get("conditionHtml").toString(); |
|
|
|
|
|
if(!StringUtils.isBlank(singleAsfChildTableConditionHtml)){ |
|
|
|
|
|
if(containsDangerousWords(filterCondition.get("conditionHtml").toString())){//子表条件带有非法字符
|
|
|
|
|
|
logger.error("子表条件带有非法字符"); |
|
|
|
|
|
|
|
|
|
|
|
}else{ |
|
|
|
|
|
|
|
|
|
|
|
String singleAsfChildTableFormulaHtml = ((com.alibaba.fastjson2.JSONObject) filterCondition.get("gongShi")).get("formulaHtml").toString(); |
|
|
|
|
|
String singleAsfChildTableMathsFormula = ((com.alibaba.fastjson2.JSONObject) filterCondition.get("gongShi")).get("mathsFormula").toString(); |
|
|
|
|
|
String singleAsfChildTableMathsString = ((com.alibaba.fastjson2.JSONObject) filterCondition.get("gongShi")).get("mathsString").toString(); |
|
|
|
|
|
|
|
|
|
|
|
System.out.println(1); |
|
|
|
|
|
} |
|
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
} |
|
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
ArrayList<String> masterFillRoleFields = new ArrayList<>(); |
|
|
ArrayList<String> masterFillRoleFields = new ArrayList<>(); |
|
|
if(fillFieldsMaster.length()>0){ |
|
|
if(fillFieldsMaster.length()>0){ |
|
|
fillFieldsMaster = fillFieldsMaster.substring(0, fillFieldsMaster.length() - 1); |
|
|
fillFieldsMaster = fillFieldsMaster.substring(0, fillFieldsMaster.length() - 1); |
|
|
|