作者 钟来

运维告警服务

package com.ruoyi.quartz.task;
import cn.hutool.core.bean.BeanUtil;
import cn.hutool.http.HttpUtil;
import com.alibaba.fastjson.JSONObject;
import com.google.gson.JsonObject;
import com.ruoyi.common.utils.DateUtils;
import com.ruoyi.system.domain.sys.SysMonitorServer;
import com.zhonglai.luhui.dao.service.PublicService;
import org.springframework.beans.factory.annotation.Autowired;
import org.springframework.stereotype.Component;
import java.util.Date;
import java.util.List;
import java.util.Map;
/**
* 服务器告警
*/
@Component("serverAlarmTask")
public class ServerAlarmTask {
@Autowired
private PublicService publicService;
//检测服务器运行状态
public void checkServerStatus(Integer cpu_usage, Integer memory_usage, Integer disk_usage, Integer connection_count) throws Exception {
List<Map<String,Object>> list = publicService.getObjectListBySQL("SELECT * FROM `sys_monitor_server` WHERE cpu_usage>="+cpu_usage+" OR memory_usage>="+memory_usage+" OR disk_usage>="+disk_usage+" OR connection_count>="+connection_count);
if(null != list && list.size()!=0)
{
StringBuffer stringBuffer = new StringBuffer("**服务器运维状态:**");
for (Map<String,Object> map:list)
{
SysMonitorServer sms = BeanUtil.mapToBean(map,SysMonitorServer.class,false,null);
stringBuffer.append("\n");
stringBuffer.append("\n");
stringBuffer.append(">ip:");
stringBuffer.append(sms.getIp());
stringBuffer.append("\n");
if(sms.getCpu_usage()>=cpu_usage)
{
stringBuffer.append("<font color=\"warning\">");
stringBuffer.append(">CPU使用率:");
stringBuffer.append(sms.getCpu_usage()/100+"%");
stringBuffer.append("</font>");
}else{
stringBuffer.append(">CPU使用率:");
stringBuffer.append(sms.getCpu_usage()/100+"%");
}
stringBuffer.append("\n");
if(sms.getMemory_usage()>=memory_usage)
{
stringBuffer.append("<font color=\"warning\">");
stringBuffer.append(">内存使用率:");
stringBuffer.append(sms.getMemory_usage()/100+"%");
stringBuffer.append("</font>");
}else{
stringBuffer.append(">内存使用率:");
stringBuffer.append(sms.getMemory_usage()/100+"%");
}
stringBuffer.append("\n");
if(sms.getDisk_usage()>=disk_usage)
{
stringBuffer.append("<font color=\"warning\">");
stringBuffer.append(">磁盘使用率:");
stringBuffer.append(sms.getDisk_usage()/100+"%");
stringBuffer.append("</font>");
}else{
stringBuffer.append(">磁盘使用率:");
stringBuffer.append(sms.getDisk_usage()/100+"%");
}
stringBuffer.append("\n");
if (sms.getConnection_count()>=connection_count)
{
stringBuffer.append("<font color=\"warning\">");
stringBuffer.append(">系统连接数:");
stringBuffer.append(sms.getConnection_count());
stringBuffer.append("</font>");
}else{
stringBuffer.append(">系统连接数:");
stringBuffer.append(sms.getConnection_count());
}
stringBuffer.append("\n");
stringBuffer.append(DateUtils.parseDateToStr("yyyy年MM月dd日HH时mm分ss秒",new Date()));
}
JSONObject jsonObject = new JSONObject();
jsonObject.put("msgtype","markdown");
JSONObject text = new JSONObject();
text.put("content",stringBuffer.toString());
text.put("mentioned_mobile_list",new String[]{"@all"});
jsonObject.put("markdown",text);
HttpUtil.post("https://qyapi.weixin.qq.com/cgi-bin/webhook/send?key=0c811725-6ee8-4bb5-b7de-378b6fa5b9b0",jsonObject.toJSONString());
}
}
public static void main(String[] args) {
StringBuffer stringBuffer = new StringBuffer("颜色测试:");
stringBuffer.append("<font color=\"warning\">警告</font>");
JSONObject jsonObject = new JSONObject();
jsonObject.put("msgtype","markdown");
JSONObject text = new JSONObject();
text.put("content",stringBuffer.toString());
text.put("mentioned_mobile_list",new String[]{"@all"});
jsonObject.put("markdown",text);
String str = HttpUtil.post("https://qyapi.weixin.qq.com/cgi-bin/webhook/send?key=0c811725-6ee8-4bb5-b7de-378b6fa5b9b0",jsonObject.toJSONString());
System.out.println(str);
}
}
... ...
package com.zhonglai.luhui.admin.controller.monitor;
import cn.hutool.core.bean.BeanUtil;
import com.alibaba.fastjson.JSONObject;
import com.ruoyi.common.core.domain.AjaxResult;
import com.ruoyi.common.core.page.TableDataInfo;
import com.ruoyi.common.utils.DateUtils;
import com.ruoyi.common.utils.ServletUtils;
import com.ruoyi.common.utils.ip.IpUtils;
import com.ruoyi.framework.web.domain.Server;
... ... @@ -9,35 +12,37 @@ import com.ruoyi.system.domain.sys.SysMonitorServer;
import com.ruoyi.system.domain.sys.SysMonitorServerLog;
import com.zhonglai.luhui.action.BaseController;
import com.zhonglai.luhui.admin.dto.MonitorServerUploadDto;
import com.zhonglai.luhui.admin.qywx.AesException;
import com.zhonglai.luhui.admin.qywx.QyWxApplication;
import com.zhonglai.luhui.admin.qywx.WXBizMsgCrypt;
import com.zhonglai.luhui.admin.service.SendSysMonitorServerMessge;
import com.zhonglai.luhui.dao.service.PublicService;
import com.zhonglai.luhui.device.domain.IotAlertLog;
import io.swagger.annotations.Api;
import io.swagger.annotations.ApiOperation;
import org.springframework.beans.factory.annotation.Autowired;
import org.springframework.scheduling.concurrent.ThreadPoolTaskExecutor;
import org.springframework.security.access.prepost.PreAuthorize;
import org.springframework.util.StreamUtils;
import org.springframework.web.bind.annotation.*;
import org.w3c.dom.Document;
import org.w3c.dom.Element;
import org.w3c.dom.NodeList;
import org.xml.sax.InputSource;
import org.xml.sax.SAXException;
import javax.servlet.http.HttpServletRequest;
import java.io.UnsupportedEncodingException;
import java.net.URLDecoder;
import javax.xml.parsers.DocumentBuilder;
import javax.xml.parsers.DocumentBuilderFactory;
import javax.xml.parsers.ParserConfigurationException;
import java.io.IOException;
import java.io.StringReader;
import java.util.Date;
import java.util.HashMap;
import java.util.List;
import java.util.Map;
import java.security.MessageDigest;
import java.security.NoSuchAlgorithmException;
import java.util.Arrays;
import java.util.stream.Collectors;
import javax.crypto.Cipher;
import javax.crypto.spec.IvParameterSpec;
import javax.crypto.spec.SecretKeySpec;
import java.security.MessageDigest;
import java.security.NoSuchAlgorithmException;
import java.util.Base64;
import java.util.Arrays;
import java.util.stream.Collectors;
import java.util.concurrent.ScheduledExecutorService;
import java.util.concurrent.TimeUnit;
/**
... ... @@ -52,6 +57,10 @@ public class ServerController extends BaseController
{
@Autowired
private PublicService publicService;
@Autowired
private ScheduledExecutorService scheduledExecutorService;
@ApiOperation("获取详情")
@PreAuthorize("@ss.hasPermi('monitor:server:list')")
@GetMapping()
... ... @@ -93,104 +102,80 @@ public class ServerController extends BaseController
return AjaxResult.success();
}
@ApiOperation("企业微信消息")
@RequestMapping("/uploadWxMessage/{agentId}")
public AjaxResult uploadWxMessage(@PathVariable String agentId)
@RequestMapping("/uploadWxMessage/{sCorpID}")
public String uploadWxMessage(@PathVariable String sCorpID, HttpServletRequest httpServletRequest)
{
return AjaxResult.success();
}
public static void main(String[] args) throws UnsupportedEncodingException {
String TOKEN = "DDbVb3cSiTAbCSgI4UndPlvy"; // 替换为你的token
String ENCODING_AES_KEY = "FH1CDpqZhNkcXCWEYJOyAO4HLG2mxYrE1c4j83mXruB";
String msgSignature = "6cfbf56d42c00a182a6da650023ef5ba407cb203";
String timestamp = "1724921459";
String nonce = "1725665565";
String echoStr = "FQYmaDL0vzQPBz5rRVYYGVLx62EmD8krbPYO6RzVaAtsIuFz+n8nPZ8fPtnNTbMCiGaRrjZCYgbsaeDcqPqvNQ\u003d\u003d";
// URL解码
String decodedEchoStr = decodeEchoStr(echoStr);
// 校验msg_signature
boolean isValid = validateMsgSignature(TOKEN, timestamp, nonce, decodedEchoStr, msgSignature);
if (isValid) {
System.out.println("请求合法");
} else {
System.out.println("请求不合法");
}
// 解密echostr
String messageContent = decryptEchoStr(decodedEchoStr,ENCODING_AES_KEY);
System.out.println("消息内容: " + messageContent);
}
private static String decodeEchoStr(String echoStr) throws UnsupportedEncodingException {
// 假设echoStr已经被Base64编码过,这里直接返回
return URLDecoder.decode(echoStr, "UTF-8"); // 实际上需要根据情况解码
}
private static boolean validateMsgSignature(String token, String timestamp, String nonce, String msgEncrypt, String msgSignature) {
String sToken = "JC52PriN";
String sEncodingAESKey = "U8Ofa8HdXHlZdg6qVPOg0GurYC35Tufhs11K612Uy5b";
WXBizMsgCrypt wxcpt = null;
try {
String signature = sha1(Arrays.asList(token, timestamp, nonce, msgEncrypt).stream().sorted().collect(Collectors.joining()));
return msgSignature.equals(signature);
} catch (NoSuchAlgorithmException e) {
e.printStackTrace();
return false;
}
}
private static String sha1(String input) throws NoSuchAlgorithmException {
MessageDigest mDigest = MessageDigest.getInstance("SHA1");
byte[] result = mDigest.digest(input.getBytes());
StringBuilder sb = new StringBuilder();
for (byte aResult : result) {
sb.append(Integer.toString((aResult & 0xff) + 0x100, 16).substring(1));
}
return sb.toString();
}
private static final String CORPID = "wx5823bf96d3bd56c7";
private static String decryptEchoStr(String encryptedMsg,String ENCODING_AES_KEY) {
// 这里需要实现具体的解密逻辑
try {
// 1. BASE64解码
byte[] base64Decoded = Base64.getDecoder().decode(encryptedMsg);
// 2. AES解密
byte[] keyBytes = Base64.getDecoder().decode(ENCODING_AES_KEY + "=");
SecretKeySpec keySpec = new SecretKeySpec(keyBytes, "AES");
IvParameterSpec ivSpec = new IvParameterSpec(keyBytes, 0, 16); // 使用前16个字节作为IV
Cipher cipher = Cipher.getInstance("AES/CBC/PKCS5Padding");
cipher.init(Cipher.DECRYPT_MODE, keySpec, ivSpec);
byte[] decrypted = cipher.doFinal(base64Decoded);
// 3. 去除随机字节和msg_len
byte[] content = Arrays.copyOfRange(decrypted, 16, decrypted.length);
int msgLen = ((content[0] & 0xFF) << 24) |
((content[1] & 0xFF) << 16) |
((content[2] & 0xFF) << 8) |
(content[3] & 0xFF);
byte[] msg = Arrays.copyOfRange(content, 4, 4 + msgLen);
byte[] receiveId = Arrays.copyOfRange(content, 4 + msgLen, content.length);
// 4. 转换为字符串
String msgStr = new String(msg, "UTF-8");
String receiveIdStr = new String(receiveId, "UTF-8");
// 5. 验证receiveId
if (receiveIdStr.equals(CORPID)) {
return msgStr;
} else {
throw new IllegalArgumentException("ReceiveId 不匹配");
wxcpt = new WXBizMsgCrypt(sToken, sEncodingAESKey, sCorpID);
switch (httpServletRequest.getMethod().toUpperCase())
{
case "GET":
String sVerifyMsgSig = httpServletRequest.getParameter("msg_signature");
String sVerifyTimeStamp = httpServletRequest.getParameter("timestamp");
String sVerifyNonce = httpServletRequest.getParameter("nonce");
String sVerifyEchoStr = httpServletRequest.getParameter("echostr");
String sEchoStr = wxcpt.VerifyURL(sVerifyMsgSig, sVerifyTimeStamp,
sVerifyNonce, sVerifyEchoStr);
return sEchoStr;
case "POST":
String sReqMsgSig = httpServletRequest.getParameter("msg_signature");
String sReqTimeStamp = httpServletRequest.getParameter("timestamp");
String sReqNonce = httpServletRequest.getParameter("nonce");
String sReqData = new String(StreamUtils.copyToByteArray(httpServletRequest.getInputStream()));
String sMsg = wxcpt.DecryptMsg(sReqMsgSig, sReqTimeStamp, sReqNonce, sReqData);
System.out.println("after decrypt msg: " + sMsg);
// TODO: 解析出明文xml标签的内容进行处理
// For example:
DocumentBuilderFactory dbf = DocumentBuilderFactory.newInstance();
DocumentBuilder db = dbf.newDocumentBuilder();
StringReader sr = new StringReader(sMsg);
InputSource is = new InputSource(sr);
Document document = db.parse(is);
Element root = document.getDocumentElement();
NodeList nodelist1 = root.getElementsByTagName("Content");
String Content = nodelist1.item(0).getTextContent();
System.out.println("Content:" + Content);
NodeList nodelist2 = root.getElementsByTagName("FromUserName");
String FromUserName = nodelist2.item(0).getTextContent();
System.out.println("FromUserName:" + FromUserName);
NodeList nodelist3 = root.getElementsByTagName("AgentID");
String AgentID = nodelist3.item(0).getTextContent();
System.out.println("AgentID:" + AgentID);
logger.info("接收到消息:{}",Content);
scheduledExecutorService.schedule(SendSysMonitorServerMessge.createSendConmmd(publicService,FromUserName,Content,Integer.parseInt(AgentID)),0, TimeUnit.SECONDS);
return AjaxResult.success().toString();
default:
return AjaxResult.success().toString();
}
} catch (Exception e) {
e.printStackTrace();
} catch (AesException e) {
logger.error("企业微信消息错误",e);
return null;
} catch (IOException e) {
logger.error("消息解码失败",e);
return null;
} catch (ParserConfigurationException e) {
logger.error("消息解析失败",e);
return null;
} catch (SAXException e) {
logger.error("消息解析失败",e);
return null;
}
}
@ApiOperation("获取状态列表")
@GetMapping("/getSysMonitorServerList")
public TableDataInfo getSysMonitorServerList(SysMonitorServer sysMonitorServer) throws Exception
... ...
package com.zhonglai.luhui.admin.qywx;
@SuppressWarnings("serial")
public class AesException extends Exception {
public final static int OK = 0;
public final static int ValidateSignatureError = -40001;
public final static int ParseXmlError = -40002;
public final static int ComputeSignatureError = -40003;
public final static int IllegalAesKey = -40004;
public final static int ValidateCorpidError = -40005;
public final static int EncryptAESError = -40006;
public final static int DecryptAESError = -40007;
public final static int IllegalBuffer = -40008;
//public final static int EncodeBase64Error = -40009;
//public final static int DecodeBase64Error = -40010;
//public final static int GenReturnXmlError = -40011;
private int code;
private static String getMessage(int code) {
switch (code) {
case ValidateSignatureError:
return "签名验证错误";
case ParseXmlError:
return "xml解析失败";
case ComputeSignatureError:
return "sha加密生成签名失败";
case IllegalAesKey:
return "SymmetricKey非法";
case ValidateCorpidError:
return "corpid校验失败";
case EncryptAESError:
return "aes加密失败";
case DecryptAESError:
return "aes解密失败";
case IllegalBuffer:
return "解密后得到的buffer非法";
// case EncodeBase64Error:
// return "base64加密错误";
// case DecodeBase64Error:
// return "base64解密错误";
// case GenReturnXmlError:
// return "xml生成失败";
default:
return null; // cannot be
}
}
public int getCode() {
return code;
}
AesException(int code) {
super(getMessage(code));
this.code = code;
}
}
... ...
package com.zhonglai.luhui.admin.qywx;
import java.util.ArrayList;
class ByteGroup {
ArrayList<Byte> byteContainer = new ArrayList<Byte>();
public byte[] toBytes() {
byte[] bytes = new byte[byteContainer.size()];
for (int i = 0; i < byteContainer.size(); i++) {
bytes[i] = byteContainer.get(i);
}
return bytes;
}
public ByteGroup addBytes(byte[] bytes) {
for (byte b : bytes) {
byteContainer.add(b);
}
return this;
}
public int size() {
return byteContainer.size();
}
}
... ...
package com.zhonglai.luhui.admin.qywx;
/**
* 获取token对象
*/
public class GettokenDto {
private Integer errcode;
private String errmsg;
private String access_token;
private Integer expires_in;
public Integer getErrcode() {
return errcode;
}
public void setErrcode(Integer errcode) {
this.errcode = errcode;
}
public String getErrmsg() {
return errmsg;
}
public void setErrmsg(String errmsg) {
this.errmsg = errmsg;
}
public String getAccess_token() {
return access_token;
}
public void setAccess_token(String access_token) {
this.access_token = access_token;
}
public Integer getExpires_in() {
return expires_in;
}
public void setExpires_in(Integer expires_in) {
this.expires_in = expires_in;
}
}
... ...
/**
* 对企业微信发送给企业后台的消息加解密示例代码.
*
* @copyright Copyright (c) 1998-2014 Tencent Inc.
*/
// ------------------------------------------------------------------------
package com.zhonglai.luhui.admin.qywx;
import java.nio.charset.Charset;
import java.util.Arrays;
/**
* 提供基于PKCS7算法的加解密接口.
*/
class PKCS7Encoder {
static Charset CHARSET = Charset.forName("utf-8");
static int BLOCK_SIZE = 32;
/**
* 获得对明文进行补位填充的字节.
*
* @param count 需要进行填充补位操作的明文字节个数
* @return 补齐用的字节数组
*/
static byte[] encode(int count) {
// 计算需要填充的位数
int amountToPad = BLOCK_SIZE - (count % BLOCK_SIZE);
if (amountToPad == 0) {
amountToPad = BLOCK_SIZE;
}
// 获得补位所用的字符
char padChr = chr(amountToPad);
String tmp = new String();
for (int index = 0; index < amountToPad; index++) {
tmp += padChr;
}
return tmp.getBytes(CHARSET);
}
/**
* 删除解密后明文的补位字符
*
* @param decrypted 解密后的明文
* @return 删除补位字符后的明文
*/
static byte[] decode(byte[] decrypted) {
int pad = (int) decrypted[decrypted.length - 1];
if (pad < 1 || pad > 32) {
pad = 0;
}
return Arrays.copyOfRange(decrypted, 0, decrypted.length - pad);
}
/**
* 将数字转化成ASCII码对应的字符,用于对明文进行补码
*
* @param a 需要转化的数字
* @return 转化得到的字符
*/
static char chr(int a) {
byte target = (byte) (a & 0xFF);
return (char) target;
}
}
... ...
package com.zhonglai.luhui.admin.qywx;
import cn.hutool.http.HttpUtil;
import com.google.gson.JsonObject;
import com.ruoyi.common.utils.DateUtils;
import com.ruoyi.common.utils.GsonConstructor;
import com.zhonglai.luhui.admin.qywx.message.BaseMessage;
import com.zhonglai.luhui.admin.qywx.message.MessageResp;
import com.zhonglai.luhui.admin.qywx.message.Text;
import com.zhonglai.luhui.admin.qywx.message.TextMessage;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
/**
* 企业微信应用
*/
public class QyWxApplication {
protected final static Logger logger = LoggerFactory.getLogger(QyWxApplication.class);
private static GettokenDto gettokenDto = new GettokenDto();
private final static String corpid = "ww140afc6429653bd8";
private final static String corpsecret = "Xl12XcP3eMJKt1I1YAPz5Dum9JO-ATq8OKpSLx8huiU";
public static String getToken() {
if(null == gettokenDto.getExpires_in() || DateUtils.getNowTimeMilly()-gettokenDto.getExpires_in()>=0)
{
String str = HttpUtil.get("https://qyapi.weixin.qq.com/cgi-bin/gettoken?corpid="+corpid+"&corpsecret="+corpsecret);
GettokenDto gettokenDto = GsonConstructor.get().fromJson(str, GettokenDto.class);
if(0==gettokenDto.getErrcode())
{
QyWxApplication.gettokenDto.setAccess_token(gettokenDto.getAccess_token());
QyWxApplication.gettokenDto.setExpires_in(DateUtils.getNowTimeMilly()+gettokenDto.getExpires_in());
return gettokenDto.getAccess_token();
}else{
logger.error("获取token失败:"+str);
return null;
}
}
return gettokenDto.getAccess_token();
}
/**
* 发送文本消息
* @param content 消息内容,最长不超过2048个字节,超过将截断(支持id转译)
* @param touser 指定接收消息的成员,成员ID列表(多个接收者用‘|’分隔,最多支持1000个)。
* 特殊情况:指定为"@all",则向该企业应用的全部成员发送
* @param toparty 指定接收消息的部门,部门ID列表,多个接收者用‘|’分隔,最多支持100个。
* 当touser为"@all"时忽略本参数
* @param totag 指定接收消息的标签,标签ID列表,多个接收者用‘|’分隔,最多支持100个。
* 当touser为"@all"时忽略本参数
*/
public static void sendTextMessage(String content,String touser,String toparty,String totag,Integer agentid)
{
TextMessage textMessage = new TextMessage();
textMessage.setTouser(touser);
textMessage.setToparty(toparty);
textMessage.setTotag(totag);
textMessage.setMsgtype("text");
textMessage.setAgentid(agentid);
textMessage.setText(new Text(content));
textMessage.setSafe(0);
textMessage.setEnable_id_trans(0);
textMessage.setEnable_duplicate_check(0);
textMessage.setDuplicate_check_interval(1800);
send(textMessage);
}
private static void send(BaseMessage baseMessage)
{
String str = HttpUtil.post(" https://qyapi.weixin.qq.com/cgi-bin/message/send?access_token="+getToken(),GsonConstructor.get().toJson(baseMessage));
MessageResp messageResp = GsonConstructor.get().fromJson(str, MessageResp.class);
if(0!=messageResp.getErrcode())
{
logger.error("发送企业微信消息失败:"+str);
return;
}
logger.info("发送企业微信消息成功:"+str);
}
}
... ...
/**
* 对企业微信发送给企业后台的消息加解密示例代码.
*
* @copyright Copyright (c) 1998-2014 Tencent Inc.
*/
// ------------------------------------------------------------------------
package com.zhonglai.luhui.admin.qywx;
import java.security.MessageDigest;
import java.util.Arrays;
/**
* SHA1 class
*
* 计算消息签名接口.
*/
class SHA1 {
/**
* 用SHA1算法生成安全签名
* @param token 票据
* @param timestamp 时间戳
* @param nonce 随机字符串
* @param encrypt 密文
* @return 安全签名
* @throws AesException
*/
public static String getSHA1(String token, String timestamp, String nonce, String encrypt) throws AesException
{
try {
String[] array = new String[] { token, timestamp, nonce, encrypt };
StringBuffer sb = new StringBuffer();
// 字符串排序
Arrays.sort(array);
for (int i = 0; i < 4; i++) {
sb.append(array[i]);
}
String str = sb.toString();
// SHA1签名生成
MessageDigest md = MessageDigest.getInstance("SHA-1");
md.update(str.getBytes());
byte[] digest = md.digest();
StringBuffer hexstr = new StringBuffer();
String shaHex = "";
for (int i = 0; i < digest.length; i++) {
shaHex = Integer.toHexString(digest[i] & 0xFF);
if (shaHex.length() < 2) {
hexstr.append(0);
}
hexstr.append(shaHex);
}
return hexstr.toString();
} catch (Exception e) {
e.printStackTrace();
throw new AesException(AesException.ComputeSignatureError);
}
}
}
... ...
package com.zhonglai.luhui.admin.qywx;
import java.io.StringReader;
import javax.xml.parsers.DocumentBuilder;
import javax.xml.parsers.DocumentBuilderFactory;
import org.w3c.dom.Document;
import org.w3c.dom.Element;
import org.w3c.dom.NodeList;
import org.xml.sax.InputSource;
public class Sample {
public static void main(String[] args) throws Exception {
String sToken = "QDG6eK";
String sCorpID = "wx5823bf96d3bd56c7";
String sEncodingAESKey = "jWmYm7qr5nMoAUwZRjGtBxmz3KA1tkAj3ykkR6q2B2C";
WXBizMsgCrypt wxcpt = new WXBizMsgCrypt(sToken, sEncodingAESKey, sCorpID);
/*
------------使用示例一:验证回调URL---------------
*企业开启回调模式时,企业微信会向验证url发送一个get请求
假设点击验证时,企业收到类似请求:
* GET /cgi-bin/wxpush?msg_signature=5c45ff5e21c57e6ad56bac8758b79b1d9ac89fd3&timestamp=1409659589&nonce=263014780&echostr=P9nAzCzyDtyTWESHep1vC5X9xho%2FqYX3Zpb4yKa9SKld1DsH3Iyt3tP3zNdtp%2B4RPcs8TgAE7OaBO%2BFZXvnaqQ%3D%3D
* HTTP/1.1 Host: qy.weixin.qq.com
接收到该请求时,企业应 1.解析出Get请求的参数,包括消息体签名(msg_signature),时间戳(timestamp),随机数字串(nonce)以及企业微信推送过来的随机加密字符串(echostr),
这一步注意作URL解码。
2.验证消息体签名的正确性
3. 解密出echostr原文,将原文当作Get请求的response,返回给企业微信
第2,3步可以用企业微信提供的库函数VerifyURL来实现。
*/
// 解析出url上的参数值如下:
// String sVerifyMsgSig = HttpUtils.ParseUrl("msg_signature");
String sVerifyMsgSig = "5c45ff5e21c57e6ad56bac8758b79b1d9ac89fd3";
// String sVerifyTimeStamp = HttpUtils.ParseUrl("timestamp");
String sVerifyTimeStamp = "1409659589";
// String sVerifyNonce = HttpUtils.ParseUrl("nonce");
String sVerifyNonce = "263014780";
// String sVerifyEchoStr = HttpUtils.ParseUrl("echostr");
String sVerifyEchoStr = "P9nAzCzyDtyTWESHep1vC5X9xho/qYX3Zpb4yKa9SKld1DsH3Iyt3tP3zNdtp+4RPcs8TgAE7OaBO+FZXvnaqQ==";
String sEchoStr; //需要返回的明文
try {
sEchoStr = wxcpt.VerifyURL(sVerifyMsgSig, sVerifyTimeStamp,
sVerifyNonce, sVerifyEchoStr);
System.out.println("verifyurl echostr: " + sEchoStr);
// 验证URL成功,将sEchoStr返回
// HttpUtils.SetResponse(sEchoStr);
} catch (Exception e) {
//验证URL失败,错误原因请查看异常
e.printStackTrace();
}
/*
------------使用示例二:对用户回复的消息解密---------------
用户回复消息或者点击事件响应时,企业会收到回调消息,此消息是经过企业微信加密之后的密文以post形式发送给企业,密文格式请参考官方文档
假设企业收到企业微信的回调消息如下:
POST /cgi-bin/wxpush? msg_signature=477715d11cdb4164915debcba66cb864d751f3e6&timestamp=1409659813&nonce=1372623149 HTTP/1.1
Host: qy.weixin.qq.com
Content-Length: 613
<xml> <ToUserName><![CDATA[wx5823bf96d3bd56c7]]></ToUserName><Encrypt><![CDATA[RypEvHKD8QQKFhvQ6QleEB4J58tiPdvo+rtK1I9qca6aM/wvqnLSV5zEPeusUiX5L5X/0lWfrf0QADHHhGd3QczcdCUpj911L3vg3W/sYYvuJTs3TUUkSUXxaccAS0qhxchrRYt66wiSpGLYL42aM6A8dTT+6k4aSknmPj48kzJs8qLjvd4Xgpue06DOdnLxAUHzM6+kDZ+HMZfJYuR+LtwGc2hgf5gsijff0ekUNXZiqATP7PF5mZxZ3Izoun1s4zG4LUMnvw2r+KqCKIw+3IQH03v+BCA9nMELNqbSf6tiWSrXJB3LAVGUcallcrw8V2t9EL4EhzJWrQUax5wLVMNS0+rUPA3k22Ncx4XXZS9o0MBH27Bo6BpNelZpS+/uh9KsNlY6bHCmJU9p8g7m3fVKn28H3KDYA5Pl/T8Z1ptDAVe0lXdQ2YoyyH2uyPIGHBZZIs2pDBS8R07+qN+E7Q==]]></Encrypt>
<AgentID><![CDATA[218]]></AgentID>
</xml>
企业收到post请求之后应该 1.解析出url上的参数,包括消息体签名(msg_signature),时间戳(timestamp)以及随机数字串(nonce)
2.验证消息体签名的正确性。
3.将post请求的数据进行xml解析,并将<Encrypt>标签的内容进行解密,解密出来的明文即是用户回复消息的明文,明文格式请参考官方文档
第2,3步可以用企业微信提供的库函数DecryptMsg来实现。
*/
// String sReqMsgSig = HttpUtils.ParseUrl("msg_signature");
String sReqMsgSig = "477715d11cdb4164915debcba66cb864d751f3e6";
// String sReqTimeStamp = HttpUtils.ParseUrl("timestamp");
String sReqTimeStamp = "1409659813";
// String sReqNonce = HttpUtils.ParseUrl("nonce");
String sReqNonce = "1372623149";
// post请求的密文数据
// sReqData = HttpUtils.PostData();
String sReqData = "<xml><ToUserName><![CDATA[wx5823bf96d3bd56c7]]></ToUserName><Encrypt><![CDATA[RypEvHKD8QQKFhvQ6QleEB4J58tiPdvo+rtK1I9qca6aM/wvqnLSV5zEPeusUiX5L5X/0lWfrf0QADHHhGd3QczcdCUpj911L3vg3W/sYYvuJTs3TUUkSUXxaccAS0qhxchrRYt66wiSpGLYL42aM6A8dTT+6k4aSknmPj48kzJs8qLjvd4Xgpue06DOdnLxAUHzM6+kDZ+HMZfJYuR+LtwGc2hgf5gsijff0ekUNXZiqATP7PF5mZxZ3Izoun1s4zG4LUMnvw2r+KqCKIw+3IQH03v+BCA9nMELNqbSf6tiWSrXJB3LAVGUcallcrw8V2t9EL4EhzJWrQUax5wLVMNS0+rUPA3k22Ncx4XXZS9o0MBH27Bo6BpNelZpS+/uh9KsNlY6bHCmJU9p8g7m3fVKn28H3KDYA5Pl/T8Z1ptDAVe0lXdQ2YoyyH2uyPIGHBZZIs2pDBS8R07+qN+E7Q==]]></Encrypt><AgentID><![CDATA[218]]></AgentID></xml>";
try {
String sMsg = wxcpt.DecryptMsg(sReqMsgSig, sReqTimeStamp, sReqNonce, sReqData);
System.out.println("after decrypt msg: " + sMsg);
// TODO: 解析出明文xml标签的内容进行处理
// For example:
DocumentBuilderFactory dbf = DocumentBuilderFactory.newInstance();
DocumentBuilder db = dbf.newDocumentBuilder();
StringReader sr = new StringReader(sMsg);
InputSource is = new InputSource(sr);
Document document = db.parse(is);
Element root = document.getDocumentElement();
NodeList nodelist1 = root.getElementsByTagName("Content");
String Content = nodelist1.item(0).getTextContent();
System.out.println("Content:" + Content);
} catch (Exception e) {
// TODO
// 解密失败,失败原因请查看异常
e.printStackTrace();
}
/*
------------使用示例三:企业回复用户消息的加密---------------
企业被动回复用户的消息也需要进行加密,并且拼接成密文格式的xml串。
假设企业需要回复用户的明文如下:
<xml>
<ToUserName><![CDATA[mycreate]]></ToUserName>
<FromUserName><![CDATA[wx5823bf96d3bd56c7]]></FromUserName>
<CreateTime>1348831860</CreateTime>
<MsgType><![CDATA[text]]></MsgType>
<Content><![CDATA[this is a test]]></Content>
<MsgId>1234567890123456</MsgId>
<AgentID>128</AgentID>
</xml>
为了将此段明文回复给用户,企业应: 1.自己生成时间时间戳(timestamp),随机数字串(nonce)以便生成消息体签名,也可以直接用从企业微信的post url上解析出的对应值。
2.将明文加密得到密文。 3.用密文,步骤1生成的timestamp,nonce和企业在企业微信设定的token生成消息体签名。 4.将密文,消息体签名,时间戳,随机数字串拼接成xml格式的字符串,发送给企业。
以上2,3,4步可以用企业微信提供的库函数EncryptMsg来实现。
*/
String sRespData = "<xml><ToUserName><![CDATA[mycreate]]></ToUserName><FromUserName><![CDATA[wx5823bf96d3bd56c7]]></FromUserName><CreateTime>1348831860</CreateTime><MsgType><![CDATA[text]]></MsgType><Content><![CDATA[this is a test]]></Content><MsgId>1234567890123456</MsgId><AgentID>128</AgentID></xml>";
try{
String sEncryptMsg = wxcpt.EncryptMsg(sRespData, sReqTimeStamp, sReqNonce);
System.out.println("after encrypt sEncrytMsg: " + sEncryptMsg);
// 加密成功
// TODO:
// HttpUtils.SetResponse(sEncryptMsg);
}
catch(Exception e)
{
e.printStackTrace();
// 加密失败
}
}
}
... ...
/**
* 对企业微信发送给企业后台的消息加解密示例代码.
*
* @copyright Copyright (c) 1998-2014 Tencent Inc.
*/
// ------------------------------------------------------------------------
/**
* 针对org.apache.commons.codec.binary.Base64,
* 需要导入架包commons-codec-1.9(或commons-codec-1.8等其他版本)
* 官方下载地址:http://commons.apache.org/proper/commons-codec/download_codec.cgi
*/
package com.zhonglai.luhui.admin.qywx;
import java.nio.charset.Charset;
import java.util.Arrays;
import java.util.Random;
import javax.crypto.Cipher;
import javax.crypto.spec.IvParameterSpec;
import javax.crypto.spec.SecretKeySpec;
import org.apache.commons.codec.binary.Base64;
/**
* 提供接收和推送给企业微信消息的加解密接口(UTF8编码的字符串).
* <ol>
* <li>第三方回复加密消息给企业微信</li>
* <li>第三方收到企业微信发送的消息,验证消息的安全性,并对消息进行解密。</li>
* </ol>
* 说明:异常java.security.InvalidKeyException:illegal Key Size的解决方案
* <ol>
* <li>在官方网站下载JCE无限制权限策略文件(JDK7的下载地址:
* http://www.oracle.com/technetwork/java/javase/downloads/jce-7-download-432124.html</li>
* <li>下载后解压,可以看到local_policy.jar和US_export_policy.jar以及readme.txt</li>
* <li>如果安装了JRE,将两个jar文件放到%JRE_HOME%\lib\security目录下覆盖原来的文件</li>
* <li>如果安装了JDK,将两个jar文件放到%JDK_HOME%\jre\lib\security目录下覆盖原来文件</li>
* </ol>
*/
public class WXBizMsgCrypt {
static Charset CHARSET = Charset.forName("utf-8");
Base64 base64 = new Base64();
byte[] aesKey;
String token;
String receiveid;
/**
* 构造函数
* @param token 企业微信后台,开发者设置的token
* @param encodingAesKey 企业微信后台,开发者设置的EncodingAESKey
* @param receiveid, 不同场景含义不同,详见文档
*
* @throws AesException 执行失败,请查看该异常的错误码和具体的错误信息
*/
public WXBizMsgCrypt(String token, String encodingAesKey, String receiveid) throws AesException {
if (encodingAesKey.length() != 43) {
throw new AesException(AesException.IllegalAesKey);
}
this.token = token;
this.receiveid = receiveid;
aesKey = Base64.decodeBase64(encodingAesKey + "=");
}
// 生成4个字节的网络字节序
byte[] getNetworkBytesOrder(int sourceNumber) {
byte[] orderBytes = new byte[4];
orderBytes[3] = (byte) (sourceNumber & 0xFF);
orderBytes[2] = (byte) (sourceNumber >> 8 & 0xFF);
orderBytes[1] = (byte) (sourceNumber >> 16 & 0xFF);
orderBytes[0] = (byte) (sourceNumber >> 24 & 0xFF);
return orderBytes;
}
// 还原4个字节的网络字节序
int recoverNetworkBytesOrder(byte[] orderBytes) {
int sourceNumber = 0;
for (int i = 0; i < 4; i++) {
sourceNumber <<= 8;
sourceNumber |= orderBytes[i] & 0xff;
}
return sourceNumber;
}
// 随机生成16位字符串
String getRandomStr() {
String base = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789";
Random random = new Random();
StringBuffer sb = new StringBuffer();
for (int i = 0; i < 16; i++) {
int number = random.nextInt(base.length());
sb.append(base.charAt(number));
}
return sb.toString();
}
/**
* 对明文进行加密.
*
* @param text 需要加密的明文
* @return 加密后base64编码的字符串
* @throws AesException aes加密失败
*/
String encrypt(String randomStr, String text) throws AesException {
ByteGroup byteCollector = new ByteGroup();
byte[] randomStrBytes = randomStr.getBytes(CHARSET);
byte[] textBytes = text.getBytes(CHARSET);
byte[] networkBytesOrder = getNetworkBytesOrder(textBytes.length);
byte[] receiveidBytes = receiveid.getBytes(CHARSET);
// randomStr + networkBytesOrder + text + receiveid
byteCollector.addBytes(randomStrBytes);
byteCollector.addBytes(networkBytesOrder);
byteCollector.addBytes(textBytes);
byteCollector.addBytes(receiveidBytes);
// ... + pad: 使用自定义的填充方式对明文进行补位填充
byte[] padBytes = PKCS7Encoder.encode(byteCollector.size());
byteCollector.addBytes(padBytes);
// 获得最终的字节流, 未加密
byte[] unencrypted = byteCollector.toBytes();
try {
// 设置加密模式为AES的CBC模式
Cipher cipher = Cipher.getInstance("AES/CBC/NoPadding");
SecretKeySpec keySpec = new SecretKeySpec(aesKey, "AES");
IvParameterSpec iv = new IvParameterSpec(aesKey, 0, 16);
cipher.init(Cipher.ENCRYPT_MODE, keySpec, iv);
// 加密
byte[] encrypted = cipher.doFinal(unencrypted);
// 使用BASE64对加密后的字符串进行编码
String base64Encrypted = base64.encodeToString(encrypted);
return base64Encrypted;
} catch (Exception e) {
e.printStackTrace();
throw new AesException(AesException.EncryptAESError);
}
}
/**
* 对密文进行解密.
*
* @param text 需要解密的密文
* @return 解密得到的明文
* @throws AesException aes解密失败
*/
String decrypt(String text) throws AesException {
byte[] original;
try {
// 设置解密模式为AES的CBC模式
Cipher cipher = Cipher.getInstance("AES/CBC/NoPadding");
SecretKeySpec key_spec = new SecretKeySpec(aesKey, "AES");
IvParameterSpec iv = new IvParameterSpec(Arrays.copyOfRange(aesKey, 0, 16));
cipher.init(Cipher.DECRYPT_MODE, key_spec, iv);
// 使用BASE64对密文进行解码
byte[] encrypted = Base64.decodeBase64(text);
// 解密
original = cipher.doFinal(encrypted);
} catch (Exception e) {
e.printStackTrace();
throw new AesException(AesException.DecryptAESError);
}
String xmlContent, from_receiveid;
try {
// 去除补位字符
byte[] bytes = PKCS7Encoder.decode(original);
// 分离16位随机字符串,网络字节序和receiveid
byte[] networkOrder = Arrays.copyOfRange(bytes, 16, 20);
int xmlLength = recoverNetworkBytesOrder(networkOrder);
xmlContent = new String(Arrays.copyOfRange(bytes, 20, 20 + xmlLength), CHARSET);
from_receiveid = new String(Arrays.copyOfRange(bytes, 20 + xmlLength, bytes.length),
CHARSET);
} catch (Exception e) {
e.printStackTrace();
throw new AesException(AesException.IllegalBuffer);
}
// receiveid不相同的情况
if (!from_receiveid.equals(receiveid)) {
throw new AesException(AesException.ValidateCorpidError);
}
return xmlContent;
}
/**
* 将企业微信回复用户的消息加密打包.
* <ol>
* <li>对要发送的消息进行AES-CBC加密</li>
* <li>生成安全签名</li>
* <li>将消息密文和安全签名打包成xml格式</li>
* </ol>
*
* @param replyMsg 企业微信待回复用户的消息,xml格式的字符串
* @param timeStamp 时间戳,可以自己生成,也可以用URL参数的timestamp
* @param nonce 随机串,可以自己生成,也可以用URL参数的nonce
*
* @return 加密后的可以直接回复用户的密文,包括msg_signature, timestamp, nonce, encrypt的xml格式的字符串
* @throws AesException 执行失败,请查看该异常的错误码和具体的错误信息
*/
public String EncryptMsg(String replyMsg, String timeStamp, String nonce) throws AesException {
// 加密
String encrypt = encrypt(getRandomStr(), replyMsg);
// 生成安全签名
if (timeStamp == "") {
timeStamp = Long.toString(System.currentTimeMillis());
}
String signature = SHA1.getSHA1(token, timeStamp, nonce, encrypt);
// System.out.println("发送给平台的签名是: " + signature[1].toString());
// 生成发送的xml
String result = XMLParse.generate(encrypt, signature, timeStamp, nonce);
return result;
}
/**
* 检验消息的真实性,并且获取解密后的明文.
* <ol>
* <li>利用收到的密文生成安全签名,进行签名验证</li>
* <li>若验证通过,则提取xml中的加密消息</li>
* <li>对消息进行解密</li>
* </ol>
*
* @param msgSignature 签名串,对应URL参数的msg_signature
* @param timeStamp 时间戳,对应URL参数的timestamp
* @param nonce 随机串,对应URL参数的nonce
* @param postData 密文,对应POST请求的数据
*
* @return 解密后的原文
* @throws AesException 执行失败,请查看该异常的错误码和具体的错误信息
*/
public String DecryptMsg(String msgSignature, String timeStamp, String nonce, String postData)
throws AesException {
// 密钥,公众账号的app secret
// 提取密文
Object[] encrypt = XMLParse.extract(postData);
// 验证安全签名
String signature = SHA1.getSHA1(token, timeStamp, nonce, encrypt[1].toString());
// 和URL中的签名比较是否相等
// System.out.println("第三方收到URL中的签名:" + msg_sign);
// System.out.println("第三方校验签名:" + signature);
if (!signature.equals(msgSignature)) {
throw new AesException(AesException.ValidateSignatureError);
}
// 解密
String result = decrypt(encrypt[1].toString());
return result;
}
/**
* 验证URL
* @param msgSignature 签名串,对应URL参数的msg_signature
* @param timeStamp 时间戳,对应URL参数的timestamp
* @param nonce 随机串,对应URL参数的nonce
* @param echoStr 随机串,对应URL参数的echostr
*
* @return 解密之后的echostr
* @throws AesException 执行失败,请查看该异常的错误码和具体的错误信息
*/
public String VerifyURL(String msgSignature, String timeStamp, String nonce, String echoStr)
throws AesException {
String signature = SHA1.getSHA1(token, timeStamp, nonce, echoStr);
if (!signature.equals(msgSignature)) {
throw new AesException(AesException.ValidateSignatureError);
}
String result = decrypt(echoStr);
return result;
}
}
\ No newline at end of file
... ...
/**
* 对企业微信发送给企业后台的消息加解密示例代码.
*
* @copyright Copyright (c) 1998-2014 Tencent Inc.
*/
// ------------------------------------------------------------------------
package com.zhonglai.luhui.admin.qywx;
import java.io.StringReader;
import javax.xml.parsers.DocumentBuilder;
import javax.xml.parsers.DocumentBuilderFactory;
import org.w3c.dom.Document;
import org.w3c.dom.Element;
import org.w3c.dom.NodeList;
import org.xml.sax.InputSource;
/**
* XMLParse class
*
* 提供提取消息格式中的密文及生成回复消息格式的接口.
*/
class XMLParse {
/**
* 提取出xml数据包中的加密消息
* @param xmltext 待提取的xml字符串
* @return 提取出的加密消息字符串
* @throws AesException
*/
public static Object[] extract(String xmltext) throws AesException {
Object[] result = new Object[3];
try {
DocumentBuilderFactory dbf = DocumentBuilderFactory.newInstance();
String FEATURE = null;
// This is the PRIMARY defense. If DTDs (doctypes) are disallowed, almost all XML entity attacks are prevented
// Xerces 2 only - http://xerces.apache.org/xerces2-j/features.html#disallow-doctype-decl
FEATURE = "http://apache.org/xml/features/disallow-doctype-decl";
dbf.setFeature(FEATURE, true);
// If you can't completely disable DTDs, then at least do the following:
// Xerces 1 - http://xerces.apache.org/xerces-j/features.html#external-general-entities
// Xerces 2 - http://xerces.apache.org/xerces2-j/features.html#external-general-entities
// JDK7+ - http://xml.org/sax/features/external-general-entities
FEATURE = "http://xml.org/sax/features/external-general-entities";
dbf.setFeature(FEATURE, false);
// Xerces 1 - http://xerces.apache.org/xerces-j/features.html#external-parameter-entities
// Xerces 2 - http://xerces.apache.org/xerces2-j/features.html#external-parameter-entities
// JDK7+ - http://xml.org/sax/features/external-parameter-entities
FEATURE = "http://xml.org/sax/features/external-parameter-entities";
dbf.setFeature(FEATURE, false);
// Disable external DTDs as well
FEATURE = "http://apache.org/xml/features/nonvalidating/load-external-dtd";
dbf.setFeature(FEATURE, false);
// and these as well, per Timothy Morgan's 2014 paper: "XML Schema, DTD, and Entity Attacks"
dbf.setXIncludeAware(false);
dbf.setExpandEntityReferences(false);
// And, per Timothy Morgan: "If for some reason support for inline DOCTYPEs are a requirement, then
// ensure the entity settings are disabled (as shown above) and beware that SSRF attacks
// (http://cwe.mitre.org/data/definitions/918.html) and denial
// of service attacks (such as billion laughs or decompression bombs via "jar:") are a risk."
// remaining parser logic
DocumentBuilder db = dbf.newDocumentBuilder();
StringReader sr = new StringReader(xmltext);
InputSource is = new InputSource(sr);
Document document = db.parse(is);
Element root = document.getDocumentElement();
NodeList nodelist1 = root.getElementsByTagName("Encrypt");
result[0] = 0;
result[1] = nodelist1.item(0).getTextContent();
return result;
} catch (Exception e) {
e.printStackTrace();
throw new AesException(AesException.ParseXmlError);
}
}
/**
* 生成xml消息
* @param encrypt 加密后的消息密文
* @param signature 安全签名
* @param timestamp 时间戳
* @param nonce 随机字符串
* @return 生成的xml字符串
*/
public static String generate(String encrypt, String signature, String timestamp, String nonce) {
String format = "<xml>\n" + "<Encrypt><![CDATA[%1$s]]></Encrypt>\n"
+ "<MsgSignature><![CDATA[%2$s]]></MsgSignature>\n"
+ "<TimeStamp>%3$s</TimeStamp>\n" + "<Nonce><![CDATA[%4$s]]></Nonce>\n" + "</xml>";
return String.format(format, encrypt, signature, timestamp, nonce);
}
}
... ...
package com.zhonglai.luhui.admin.qywx.message;
/**
* 消息公共参数
*
* touser 否 指定接收消息的成员,成员ID列表(多个接收者用‘|’分隔,最多支持1000个)。
* 特殊情况:指定为"@all",则向该企业应用的全部成员发送
* toparty 否 指定接收消息的部门,部门ID列表,多个接收者用‘|’分隔,最多支持100个。
* 当touser为"@all"时忽略本参数
* totag 否 指定接收消息的标签,标签ID列表,多个接收者用‘|’分隔,最多支持100个。
* 当touser为"@all"时忽略本参数
* msgtype 是 消息类型,此时固定为:text
* agentid 是 企业应用的id,整型。企业内部开发,可在应用的设置页面查看;第三方服务商,可通过接口 获取企业授权信息 获取该参数值
* enable_duplicate_check 否 表示是否开启重复消息检查,0表示否,1表示是,默认0
* duplicate_check_interval 否 表示是否重复消息检查的时间间隔,默认1800s,最大不超过4小时
*/
public class BaseMessage {
private String touser;
private String toparty;
private String totag;
private String msgtype;
private Integer agentid;
private Integer enable_duplicate_check;
private Integer duplicate_check_interval;
public String getTouser() {
return touser;
}
public void setTouser(String touser) {
this.touser = touser;
}
public String getToparty() {
return toparty;
}
public void setToparty(String toparty) {
this.toparty = toparty;
}
public String getTotag() {
return totag;
}
public void setTotag(String totag) {
this.totag = totag;
}
public String getMsgtype() {
return msgtype;
}
public void setMsgtype(String msgtype) {
this.msgtype = msgtype;
}
public Integer getAgentid() {
return agentid;
}
public void setAgentid(Integer agentid) {
this.agentid = agentid;
}
public Integer getEnable_duplicate_check() {
return enable_duplicate_check;
}
public void setEnable_duplicate_check(Integer enable_duplicate_check) {
this.enable_duplicate_check = enable_duplicate_check;
}
public Integer getDuplicate_check_interval() {
return duplicate_check_interval;
}
public void setDuplicate_check_interval(Integer duplicate_check_interval) {
this.duplicate_check_interval = duplicate_check_interval;
}
}
... ...
package com.zhonglai.luhui.admin.qywx.message;
/**
* 返回参数
* errcode 返回码
* errmsg 对返回码的文本描述内容
* invaliduser 不合法的userid,不区分大小写,统一转为小写
* invalidparty 不合法的partyid
* invalidtag 不合法的标签id
* unlicenseduser 没有基础接口许可(包含已过期)的userid
* msgid 消息id,用于撤回应用消息
* response_code 仅消息类型为“按钮交互型”,“投票选择型”和“多项选择型”的模板卡片消息返回,应用可使用response_code调用更新模版卡片消息接口,72小时内有效,且只能使用一次
*/
public class MessageResp {
private Integer errcode;
private String errmsg;
private String invaliduser;
private String invalidparty;
private String invalidtag;
private String unlicenseduser;
private String msgid;
private String response_code;
public Integer getErrcode() {
return errcode;
}
public void setErrcode(Integer errcode) {
this.errcode = errcode;
}
public String getErrmsg() {
return errmsg;
}
public void setErrmsg(String errmsg) {
this.errmsg = errmsg;
}
public String getInvaliduser() {
return invaliduser;
}
public void setInvaliduser(String invaliduser) {
this.invaliduser = invaliduser;
}
public String getInvalidparty() {
return invalidparty;
}
public void setInvalidparty(String invalidparty) {
this.invalidparty = invalidparty;
}
public String getInvalidtag() {
return invalidtag;
}
public void setInvalidtag(String invalidtag) {
this.invalidtag = invalidtag;
}
public String getUnlicenseduser() {
return unlicenseduser;
}
public void setUnlicenseduser(String unlicenseduser) {
this.unlicenseduser = unlicenseduser;
}
public String getMsgid() {
return msgid;
}
public void setMsgid(String msgid) {
this.msgid = msgid;
}
public String getResponse_code() {
return response_code;
}
public void setResponse_code(String response_code) {
this.response_code = response_code;
}
}
... ...
package com.zhonglai.luhui.admin.qywx.message;
public class Text {
private String content;
public Text(String content) {
this.content = content;
}
public String getContent() {
return content;
}
public void setContent(String content) {
this.content = content;
}
}
... ...
package com.zhonglai.luhui.admin.qywx.message;
/**
* 发送文本消息
*
* content 是 消息内容,最长不超过2048个字节,超过将截断(支持id转译)
* safe 否 表示是否是保密消息,0表示可对外分享,1表示不能分享且内容显示水印,默认为0
* enable_id_trans 否 表示是否开启id转译,0表示否,1表示是,默认0。
*/
public class TextMessage extends BaseMessage{
private Text text;
private Integer safe;
private Integer enable_id_trans;
public Text getText() {
return text;
}
public void setText(Text text) {
this.text = text;
}
public Integer getSafe() {
return safe;
}
public void setSafe(Integer safe) {
this.safe = safe;
}
public Integer getEnable_id_trans() {
return enable_id_trans;
}
public void setEnable_id_trans(Integer enable_id_trans) {
this.enable_id_trans = enable_id_trans;
}
}
... ...
package com.zhonglai.luhui.admin.service;
import cn.hutool.core.bean.BeanUtil;
import com.ruoyi.common.utils.DateUtils;
import com.ruoyi.system.domain.sys.SysMonitorServer;
import com.zhonglai.luhui.admin.qywx.QyWxApplication;
import com.zhonglai.luhui.dao.service.PublicService;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
import org.springframework.beans.factory.annotation.Autowired;
import org.springframework.stereotype.Service;
import java.util.Date;
import java.util.List;
import java.util.Map;
public class SendSysMonitorServerMessge implements Runnable{
private final Logger logger = LoggerFactory.getLogger(this.getClass());
private PublicService publicService;
private String Content;
private String toUser;
private Integer agentid;
public static SendSysMonitorServerMessge createSendConmmd(PublicService publicService, String toUser, String content,Integer agentid)
{
return new SendSysMonitorServerMessge(publicService,toUser,content,agentid);
}
private SendSysMonitorServerMessge(PublicService publicService, String toUser, String content,Integer agentid) {
this.publicService = publicService;
Content = content;
this.toUser = toUser;
this.agentid = agentid;
}
@Override
public void run() {
logger.info("开始执行企业微信消息发送");
String string = null;
switch (Content.split(":")[0])
{
case "1":
string = conmmd_1();
break;
// case "2":
// string = conmmd_2();
// break;
// case "3":
// string = conmmd_3();
// break;
default:
string = conmmd_default();
break;
}
if(null != string && string.length()!=0)
{
QyWxApplication.sendTextMessage(string,"ZhongLai",null,null,agentid);
}
}
private String conmmd_default()
{
StringBuffer stringBuffer = new StringBuffer("机器人指令:");
stringBuffer.append("\n");
stringBuffer.append("1 ---》查询所有服务器状态");
stringBuffer.append("2:{ip} ---》指定服务器内存使用前10");
stringBuffer.append("3:{ip} ---》指定服务器cpu使用前10");
return stringBuffer.toString();
}
private String conmmd_1()
{
SysMonitorServer sysMonitorServer = new SysMonitorServer();
List<Map<String,Object>> list = publicService.getObjectList(sysMonitorServer,"*",null,null,0,0);
StringBuffer stringBuffer = null;
if(null != list && list.size()!=0)
{
stringBuffer = new StringBuffer("服务器运维状态:");
for (Map<String,Object> map:list)
{
SysMonitorServer sms = BeanUtil.mapToBean(map,SysMonitorServer.class,false,null);
stringBuffer.append("\n");
stringBuffer.append("\n");
stringBuffer.append("ip:");
stringBuffer.append(sms.getIp());
stringBuffer.append("\n");
stringBuffer.append("CPU使用率:");
stringBuffer.append(sms.getCpu_usage()/100+"%");
stringBuffer.append("\n");
stringBuffer.append("内存使用率:");
stringBuffer.append(sms.getMemory_usage()/100+"%");
stringBuffer.append("\n");
stringBuffer.append("磁盘使用率:");
stringBuffer.append(sms.getDisk_usage()/100+"%");
stringBuffer.append("\n");
stringBuffer.append("系统连接数:");
stringBuffer.append(sms.getConnection_count());
stringBuffer.append("\n");
stringBuffer.append("当前时间:");
stringBuffer.append(DateUtils.parseDateToStr("yyyy年MM月dd日HH时mm分ss秒",new Date()));
}
return stringBuffer.toString();
}
return null;
}
// private StringBuffer conmmd_2()
// {
//
// }
//
// private StringBuffer conmmd_3()
// {
//
// }
}
... ...