openssl3.2/test/certs - 073 - CA-PSS

文章目录

    • openssl3.2/test/certs - 073 - CA-PSS
    • 概述
    • 笔记
    • setup073.sh
    • setup073_sc1.sh
    • setup073_sc2.sh
    • setup073_sc3.sh
    • setup073_sc4.sh
    • setup073_sc5.sh
    • END

openssl3.2/test/certs - 073 - CA-PSS

概述

openssl3.2 - 官方demo学习 - test - certs

这个官方脚本里面学到东西了, 看到了如何生成ECC证书.
也从这个脚本中看到, 官方的脚本中参数写错了导致证书生成由于openssl命令行错误没生成.
就不知道写的这么粗放的脚本, 官方是准备来干啥用的.
如果脚本因为错误没有生成, 也不知道退出报错, 让这个脚本的维护者知道自己写错了?
就这么哗哗的将大量的证书生成出来, 也不知道对错, 这让人感到浑身不适.
这几天学习这个setup.sh, 已经发现至少有7,8个证书因为参数错误无法生成.
如果生成的这些证书用于自动化测试, 证书都没生成, 咋能保证自动化测试靠谱呢?

笔记

将实验73的脚本整理出来如下

setup073.sh

#! /bin/bash# \file setup073.sh# openssl3.2/test/certs - 073 - CA-PSS# sc1
openssl -v
./mkcert.sh genca "CA-PSS" ca-pss-key ca-pss-cert root-key root-cert \-sha256 -sigopt rsa_padding_mode:pss -sigopt rsa_pss_saltlen:-1# sc2
openssl -v
./mkcert.sh genee "EE-PSS" ee-key ee-pss-cert ca-pss-key ca-pss-cert \-sha256 -sigopt rsa_padding_mode:pss -sigopt rsa_pss_saltlen:-1# sc3
openssl -v
# Should not have been possible to produce, see issue #13968: (https://github.com/openssl/openssl/pull/13968)
#./mkcert.sh genee "EE-PSS-wrong1.5" ee-key ee-pss-wrong1.5-cert ca-pss-key ca-pss-cert -sha256# sc4
openssl -v
OPENSSL_KEYALG=ec OPENSSL_KEYBITS=brainpoolP256r1 ./mkcert.sh genee \"Server ECDSA brainpoolP256r1 cert" server-ecdsa-brainpoolP256r1-key \server-ecdsa-brainpoolP256r1-cert rootkey rootcert# sc5
openssl -v
openssl req -new -noenc -subj "/CN=localhost" \-newkey rsa-pss -keyout server-pss-restrict-key.pem \-pkeyopt rsa_pss_keygen_md:sha256 -pkeyopt rsa_pss_keygen_saltlen:32 | \./mkcert.sh geneenocsr "Server RSA-PSS restricted cert" \server-pss-restrict-cert rootkey rootcert# sc5
openssl -v
openssl req -new -noenc -subj "/CN=Client-RSA-PSS" \-newkey rsa-pss -keyout client-pss-restrict-key.pem \-pkeyopt rsa_pss_keygen_md:sha256 -pkeyopt rsa_pss_keygen_saltlen:32 | \./mkcert.sh geneenocsr -p clientAuth "Client RSA-PSS restricted cert" \client-pss-restrict-cert rootkey rootcert

官方脚本中有5步, 有2步参数都写错了.
分成了5个小实验来做.

setup073_sc1.sh

/*!
* \file D:\my_dev\my_local_git_prj\study\openSSL\test_certs\073\my_openssl_linux_doc_sc1.txt
* \note openssl3.2/test/certs - 073 - CA-PSS - sc1
*/// --------------------------------------------------------------------------------
// official bash script
// --------------------------------------------------------------------------------
#! /bin/bash# \file setup073_sc1.sh# openssl3.2/test/certs - 073 - CA-PSS# sc1./mkcert.sh genca "CA-PSS" ca-pss-key ca-pss-cert root-key root-cert \-sha256 -sigopt rsa_padding_mode:pss -sigopt rsa_pss_saltlen:-1// --------------------------------------------------------------------------------
// openssl cmd line parse
// --------------------------------------------------------------------------------
// cmd 1
openssl genpkey -algorithm rsa -pkeyopt rsa_keygen_bits:2048 -out ca-pss-key.pem // cmd 2
// cfg_exp073_sc1_cmd2.txt
string_mask=utf8only
[req]
prompt = no
distinguished_name = dn
[dn]
CN = CA-PSSopenssl req -new -sha256 -key ca-pss-key.pem -config cfg_exp073_sc1_cmd2.txt -out req_exp073_sc1_cmd2.pem// cmd 3
// cfg_exp073_sc1_cmd3.txt
basicConstraints = critical,CA:true
keyUsage = keyCertSign,cRLSign
subjectKeyIdentifier = hash
authorityKeyIdentifier = keyidopenssl x509 -req -sha256 -out ca-pss-cert.pem -extfile cfg_exp073_sc1_cmd3.txt -CA root-cert.pem -CAkey root-key.pem -set_serial 2 -days 36525 -sha256 -sigopt rsa_padding_mode:pss -sigopt rsa_pss_saltlen:-1 -in req_exp073_sc1_cmd2.pem// 报错 : x509: Multiple digest or unknown options: -sha256 and -sha256
// 修正如下:openssl x509 -req -sha256 -out ca-pss-cert.pem -extfile cfg_exp073_sc1_cmd3.txt -CA root-cert.pem -CAkey root-key.pem -set_serial 2 -days 36525 -sigopt rsa_padding_mode:pss -sigopt rsa_pss_saltlen:-1 -in req_exp073_sc1_cmd2.pem// --------------------------------------------------------------------------------
// openssl log
// --------------------------------------------------------------------------------openssl genpkey -algorithm rsa -pkeyopt rsa_keygen_bits:2048 -out ca-pss-key.pem 
openssl req -new -sha256 -key ca-pss-key.pem -config /dev/fd/63 -config /dev/fd/63 => /home/lostspeed/openssl/openssl-3.2.0_debian/test/certs/my_openssl_linux_log.txtstring_mask=utf8only
[req]
prompt = no
distinguished_name = dn
[dn]
CN = CA-PSS
openssl x509 -req -sha256 -out ca-pss-cert.pem -extfile /dev/fd/63 -CA root-cert.pem -CAkey root-key.pem -set_serial 2 -days 36525 -sha256 -sigopt rsa_padding_mode:pss -sigopt rsa_pss_saltlen:-1 -extfile /dev/fd/63 => /home/lostspeed/openssl/openssl-3.2.0_debian/test/certs/my_openssl_linux_log.txtbasicConstraints = critical,CA:true
keyUsage = keyCertSign,cRLSign
subjectKeyIdentifier = hash
authorityKeyIdentifier = keyid

setup073_sc2.sh

/*!
* \file D:\my_dev\my_local_git_prj\study\openSSL\test_certs\073\my_openssl_linux_doc_sc2.txt
* \note 
*/// --------------------------------------------------------------------------------
// official bash script
// --------------------------------------------------------------------------------
#! /bin/bash# \file setup073_sc2.sh# openssl3.2/test/certs - 073 - CA-PSS# sc2
./mkcert.sh genee "EE-PSS" ee-key ee-pss-cert ca-pss-key ca-pss-cert \-sha256 -sigopt rsa_padding_mode:pss -sigopt rsa_pss_saltlen:-1// --------------------------------------------------------------------------------
// openssl cmd line parse
// --------------------------------------------------------------------------------// cmd 1
openssl genpkey -algorithm rsa -pkeyopt rsa_keygen_bits:2048 -out ee-key.pem // cmd 2
// cfg_exp073_sc2_cmd2.txt
string_mask=utf8only
[req]
prompt = no
distinguished_name = dn
[dn]
CN = EE-PSSopenssl req -new -sha256 -key ee-key.pem -config cfg_exp073_sc2_cmd2.txt -out req_exp073_sc2_cmd2.pem// cmd 3
// cfg_exp073_sc2_cmd3.txt
subjectKeyIdentifier = hash
authorityKeyIdentifier = keyid, issuer
basicConstraints = CA:falseextendedKeyUsage = serverAuth
[alts]
subjectAltName = @alts
DNS=EE-PSS
[alts]openssl x509 -req -sha256 -out ee-pss-cert.pem -extfile cfg_exp073_sc2_cmd3.txt -CA ca-pss-cert.pem -CAkey ca-pss-key.pem -set_serial 2 -days 36525 -sha256 -sigopt rsa_padding_mode:pss -sigopt rsa_pss_saltlen:-1 -in req_exp073_sc2_cmd2.pem// 报错 : x509: Multiple digest or unknown options: -sha256 and -sha256
// 修正如下:
openssl x509 -req -sha256 -out ee-pss-cert.pem -extfile cfg_exp073_sc2_cmd3.txt -CA ca-pss-cert.pem -CAkey ca-pss-key.pem -set_serial 2 -days 36525 -sigopt rsa_padding_mode:pss -sigopt rsa_pss_saltlen:-1 -in req_exp073_sc2_cmd2.pem// --------------------------------------------------------------------------------
// openssl log
// --------------------------------------------------------------------------------openssl genpkey -algorithm rsa -pkeyopt rsa_keygen_bits:2048 -out ee-key.pem 
openssl req -new -sha256 -key ee-key.pem -config /dev/fd/63 -config /dev/fd/63 => /home/lostspeed/openssl/openssl-3.2.0_debian/test/certs/my_openssl_linux_log.txtstring_mask=utf8only
[req]
prompt = no
distinguished_name = dn
[dn]
CN = EE-PSS
openssl x509 -req -sha256 -out ee-pss-cert.pem -extfile /dev/fd/63 -CA ca-pss-cert.pem -CAkey ca-pss-key.pem -set_serial 2 -days 36525 -sha256 -sigopt rsa_padding_mode:pss -sigopt rsa_pss_saltlen:-1 -extfile /dev/fd/63 => /home/lostspeed/openssl/openssl-3.2.0_debian/test/certs/my_openssl_linux_log.txtsubjectKeyIdentifier = hash
authorityKeyIdentifier = keyid, issuer
basicConstraints = CA:falseextendedKeyUsage = serverAuth
[alts]
subjectAltName = @alts
DNS=EE-PSS[alts]

setup073_sc3.sh

/*!
\file D:\my_dev\my_local_git_prj\study\openSSL\test_certs\073\my_openssl_linux_doc_sc3.txt
\note 
*/// --------------------------------------------------------------------------------
// official bash script
// --------------------------------------------------------------------------------
#! /bin/bash# \file setup073_sc3.sh# openssl3.2/test/certs - 073 - CA-PSS# sc3
# Should not have been possible to produce, see issue #13968: (https://github.com/openssl/openssl/pull/13968)
./mkcert.sh genee "EE-PSS-wrong1.5" ee-key ee-pss-wrong1.5-cert ca-pss-key ca-pss-cert -sha256// --------------------------------------------------------------------------------
// openssl cmd line parse
// --------------------------------------------------------------------------------// cmd 1
// cfg_exp073_sc3_cmd1.txt
string_mask=utf8only
[req]
prompt = no
distinguished_name = dn
[dn]
CN = EE-PSS-wrong1.5openssl req -new -sha256 -key ee-key.pem -config cfg_exp073_sc3_cmd1.txt -out req_exp073_sc3_cmd1.pem// cmd 2
// cfg_exp073_sc3_cmd2.txt
subjectKeyIdentifier = hash
authorityKeyIdentifier = keyid, issuer
basicConstraints = CA:falseextendedKeyUsage = serverAuth
[alts]
subjectAltName = @alts
DNS=EE-PSS-wrong1.5
[alts]openssl x509 -req -sha256 -out ee-pss-wrong1.5-cert.pem -extfile cfg_exp073_sc3_cmd2.txt -CA ca-pss-cert.pem -CAkey ca-pss-key.pem -set_serial 2 -days 36525 -sha256 -in req_exp073_sc3_cmd1.pem// 报错 : x509: Multiple digest or unknown options: -sha256 and -sha256
// 修正如下:
openssl x509 -req -sha256 -out ee-pss-wrong1.5-cert.pem -extfile cfg_exp073_sc3_cmd2.txt -CA ca-pss-cert.pem -CAkey ca-pss-key.pem -set_serial 2 -days 36525 -in req_exp073_sc3_cmd1.pem// 官方注释说, 这句脚本无法生成错误的证书, 但是生成了, 这啥情况?
// issue #13968 是 2021年的// --------------------------------------------------------------------------------
// openssl log
// --------------------------------------------------------------------------------
openssl req -new -sha256 -key ee-key.pem -config /dev/fd/63 -config /dev/fd/63 => /home/lostspeed/openssl/openssl-3.2.0_debian/test/certs/my_openssl_linux_log.txtstring_mask=utf8only
[req]
prompt = no
distinguished_name = dn
[dn]
CN = EE-PSS-wrong1.5
openssl x509 -req -sha256 -out ee-pss-wrong1.5-cert.pem -extfile /dev/fd/63 -CA ca-pss-cert.pem -CAkey ca-pss-key.pem -set_serial 2 -days 36525 -sha256 -extfile /dev/fd/63 => /home/lostspeed/openssl/openssl-3.2.0_debian/test/certs/my_openssl_linux_log.txtsubjectKeyIdentifier = hash
authorityKeyIdentifier = keyid, issuer
basicConstraints = CA:falseextendedKeyUsage = serverAuth
[alts]
subjectAltName = @alts
DNS=EE-PSS-wrong1.5[alts]

setup073_sc4.sh

/*!
* \file D:\my_dev\my_local_git_prj\study\openSSL\test_certs\073\my_openssl_linux_doc_sc4.txt
*/// --------------------------------------------------------------------------------
// official bash script
// --------------------------------------------------------------------------------
#! /bin/bash# \file setup073_sc4.sh# openssl3.2/test/certs - 073 - CA-PSS# sc4
openssl -v
OPENSSL_KEYALG=ec OPENSSL_KEYBITS=brainpoolP256r1 ./mkcert.sh genee \"Server ECDSA brainpoolP256r1 cert" server-ecdsa-brainpoolP256r1-key \server-ecdsa-brainpoolP256r1-cert rootkey rootcert# 这句脚本后2个参数是指定CA证书, 但是写错了, 应该是 root-key root-cert
# 我没改脚本, 将证书root-cert.pem, root-key.pem拷贝成了rootcert.pem, rootkey.pem
# 官方这个脚本都写错了, 他们咋用生成的证书啊? 不可想象// --------------------------------------------------------------------------------
// openssl cmd line parse
// --------------------------------------------------------------------------------
// cmd 1
// 终于看到如何生成ECC的私钥了:P
openssl genpkey -algorithm ec -pkeyopt ec_paramgen_curve:brainpoolP256r1 -pkeyopt ec_param_enc:named_curve -out server-ecdsa-brainpoolP256r1-key.pem // cmd 2
// cfg_exp073_sc4_cmd2.txt
string_mask=utf8only
[req]
prompt = no
distinguished_name = dn
[dn]
CN = Server ECDSA brainpoolP256r1 certopenssl req -new -sha256 -key server-ecdsa-brainpoolP256r1-key.pem -config cfg_exp073_sc4_cmd2.txt -out req_exp073_sc4_cmd3.pem// cmd 3
// cfg3_exp073_sc4_cmd3.txt
subjectKeyIdentifier = hash
authorityKeyIdentifier = keyid, issuer
basicConstraints = CA:falseextendedKeyUsage = serverAuth
[alts]
subjectAltName = @alts
DNS=Server ECDSA brainpoolP256r1 cert
[alts]// 能看出来证书采用哪种私钥种类, 是跟着证书请求文件走的
openssl x509 -req -sha256 -out server-ecdsa-brainpoolP256r1-cert.pem -extfile cfg3_exp073_sc4_cmd3.txt -CA rootcert.pem -CAkey rootkey.pem -set_serial 2 -days 36525 -in req_exp073_sc4_cmd3.pem// --------------------------------------------------------------------------------
// openssl log
// --------------------------------------------------------------------------------openssl -v 
openssl genpkey -algorithm ec -pkeyopt ec_paramgen_curve:brainpoolP256r1 -pkeyopt ec_param_enc:named_curve -out server-ecdsa-brainpoolP256r1-key.pem 
openssl req -new -sha256 -key server-ecdsa-brainpoolP256r1-key.pem -config /dev/fd/63 -config /dev/fd/63 => /home/lostspeed/openssl/openssl-3.2.0_debian/test/certs/my_openssl_linux_log.txtstring_mask=utf8only
[req]
prompt = no
distinguished_name = dn
[dn]
CN = Server ECDSA brainpoolP256r1 cert
openssl x509 -req -sha256 -out server-ecdsa-brainpoolP256r1-cert.pem -extfile /dev/fd/63 -CA rootcert.pem -CAkey rootkey.pem -set_serial 2 -days 36525 -extfile /dev/fd/63 => /home/lostspeed/openssl/openssl-3.2.0_debian/test/certs/my_openssl_linux_log.txtsubjectKeyIdentifier = hash
authorityKeyIdentifier = keyid, issuer
basicConstraints = CA:falseextendedKeyUsage = serverAuth
[alts]
subjectAltName = @alts
DNS=Server ECDSA brainpoolP256r1 cert[alts]

setup073_sc5.sh

/*!
* \file D:\my_dev\my_local_git_prj\study\openSSL\test_certs\073\my_openssl_linux_doc_sc5.txt
* \note 
*/ // --------------------------------------------------------------------------------
// official bash script
// --------------------------------------------------------------------------------
#! /bin/bash# \file setup073_sc5.sh# openssl3.2/test/certs - 073 - CA-PSS# sc5
openssl req -new -noenc -subj "/CN=Client-RSA-PSS" \-newkey rsa-pss -keyout client-pss-restrict-key.pem \-pkeyopt rsa_pss_keygen_md:sha256 -pkeyopt rsa_pss_keygen_saltlen:32 | \./mkcert.sh geneenocsr -p clientAuth "Client RSA-PSS restricted cert" \client-pss-restrict-cert rootkey rootcert// --------------------------------------------------------------------------------
// openssl cmd line parse
// --------------------------------------------------------------------------------
// cmd 1
openssl req -new -noenc -subj /CN=Client-RSA-PSS -newkey rsa-pss -keyout client-pss-restrict-key.pem -pkeyopt rsa_pss_keygen_md:sha256 -pkeyopt rsa_pss_keygen_saltlen:32 -out req_exp073_sc5_cmd1.pem// cmd 2
// cfg_exp073_sc5_cmd2.txt
subjectKeyIdentifier = hash
authorityKeyIdentifier = keyid, issuer
basicConstraints = CA:false
extendedKeyUsage = clientAuth
subjectAltName = @alts
[alts]
DNS=Client RSA-PSS restricted certopenssl x509 -req -sha256 -out client-pss-restrict-cert.pem -extfile cfg_exp073_sc5_cmd2.txt -CA rootcert.pem -CAkey rootkey.pem -set_serial 2 -days 36525 -in req_exp073_sc5_cmd1.pem// --------------------------------------------------------------------------------
// openssl log
// --------------------------------------------------------------------------------openssl req -new -noenc -subj /CN=Client-RSA-PSS -newkey rsa-pss -keyout client-pss-restrict-key.pem -pkeyopt rsa_pss_keygen_md:sha256 -pkeyopt rsa_pss_keygen_saltlen:32 
openssl x509 -req -sha256 -out client-pss-restrict-cert.pem -extfile /dev/fd/63 -CA rootcert.pem -CAkey rootkey.pem -set_serial 2 -days 36525 -extfile /dev/fd/63 => /home/lostspeed/openssl/openssl-3.2.0_debian/test/certs/my_openssl_linux_log.txtsubjectKeyIdentifier = hash
authorityKeyIdentifier = keyid, issuer
basicConstraints = CA:false
extendedKeyUsage = clientAuth
subjectAltName = @alts
[alts]
DNS=Client RSA-PSS restricted cert

END

本文来自互联网用户投稿,该文观点仅代表作者本人,不代表本站立场。本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如若转载,请注明出处:http://www.mzph.cn/news/649935.shtml

如若内容造成侵权/违法违规/事实不符,请联系多彩编程网进行投诉反馈email:809451989@qq.com,一经查实,立即删除!

相关文章

微信小程序(十八)组件通信(父传子)

注释很详细,直接上代码 上一篇 新增内容: 1.组件属性变量的定义 2.组件属性变量的默认状态 3.组件属性变量的传递方法 解释一下为什么是父传子,因为组件是页面的一部分,数据是从页面传递到组件的,所以是父传子&#xf…

防火墙的用户认证

目录 1. 认证的区别 2. 用户认证的分类 区别: 3. 上网用户认证的认证方式 3.1 置用户认证的位置: 3.1.1 认证域 创建认证域: 新建一个用户组: 新建一个用户 创建安全组 4. 认证策略 4.1 认证策略方式: 4.2…

MR image smoothing or filtering 既 FWHM与sigma之间的换算关系 fslmaths -s参数

这里写目录标题 FWHM核高斯核中的sigma是有一个换算公式:结果 大量的文献中都使用FWHM 作为单位,描述对MR等数据的平滑(smoothing)或者滤波(filtering)过程。FWHM 通常是指full width at half maximum的缩写…

yaml学习笔记

文章目录 yaml语言学习yaml 简介yaml 和json 区别基本语法数据类型YAML 对象YAML 数组锚点和引用纯量 参考文档 yaml语言学习 最近发现在学习k8s中各种配置文件 都是使用的yaml 这种格式, 包括 docker-compose.yaml 也都是用这个格式配置部署项目信息,我就了解了一下这个语法就…

字符串随机生成工具(开源)-Kimen(奇门)

由于最近笔者在开发数据脱敏相关功能,其中一类脱敏需求为能够按照指定的格式随机生成一个字符串来代替原有信息,数据看起来格式需要与原数据相同,如:电话号码,身份证号以及邮箱等。在网上搜索了下,发现没有…

【新书推荐】3.5 char类型

本节必须掌握的知识点: 示例十 代码分析 汇编解析 3.5.1 示例十 char类型是比较古怪的,int\short\long类型如果在使用时不指定signed还是unsigned时都默认是signed,但char不一样,编译器可以实现为带符号的,也可以实现…

洛谷B3621枚举元组

枚举元组 题目描述 n n n 元组是指由 n n n 个元素组成的序列。例如 ( 1 , 1 , 2 ) (1,1,2) (1,1,2) 是一个三元组、 ( 233 , 254 , 277 , 123 ) (233,254,277,123) (233,254,277,123) 是一个四元组。 给定 n n n 和 k k k,请按字典序输出全体 n n n 元组&am…

Flink实现数据写入MySQL

先准备一个文件里面数据有: a, 1547718199, 1000000 b, 1547718200, 1000000 c, 1547718201, 1000000 d, 1547718202, 1000000 e, 1547718203, 1000000 f, 1547718204, 1000000 g, 1547718205, 1000000 h, 1547718210, 1000000 i, 1547718210, 1000000 j, 154771821…

【QT】文件目录操作

目录 1 文件目录操作相关的类 2 实例概述 2.1 实例功能 2.2 信号发射者信息的获取 3 QCoreApplication类 4 QFile类 5 QFilelnfo类 6 QDir类 7 QTemporaryDir和QTemporaryFiIe 8 QFiIeSystemWatcher类 文件的读写是很多应用程序具有的功能,甚至某些应用程序就是围绕…

C语言赋值表达式中什么是左值和右值?数组名作为左右值时又具有怎样的意义?

一、问题 赋值表达式中可以分为左值和右值,那么什么是左值和右值?数组名做为左右值时又具有怎样的意义? 二、解答 在C语言中,左值和右值的概念对于理解赋值表达式以及程序的正确性非常重要: 1、左值 • 左值是一个…

内存管理(mmu)/内存分配原理/多级页表

1.为什么要做内存管理? 随着进程对内存需求的扩大,和同时调度的进程增加,内存是比较瓶颈的资源,如何更好的高效的利于存储资源是一个重要问题。 这个内存管理的需求也是慢慢发展而来,早期总线上的master是直接使用物…

Oracle篇—分区索引的重建和管理(第三篇,总共五篇)

☘️博主介绍☘️: ✨又是一天没白过,我是奈斯,DBA一名✨ ✌✌️擅长Oracle、MySQL、SQLserver、Linux,也在积极的扩展IT方向的其他知识面✌✌️ ❣️❣️❣️大佬们都喜欢静静的看文章,并且也会默默的点赞收藏加关注❣…

ES的一些名称和概念总结

概念 先看看ElasticSearch的整体架构: 一个 ES Index 在集群模式下,有多个 Node (节点)组成。每个节点就是 ES 的Instance (实例)。每个节点上会有多个 shard (分片), P1 P2 是主分片, R1 R2…

达梦数据库——记录一次离谱的登录失败报错

好久没更新了哇 前面有整理过一些常见的数据库登录失败问题哈,今天记录一个遇到概率比较小,但碰上了一般不太容易找到原因的登录失败问题。 今天给客户同时初始化了三台服务器数据库,惟独这一台死活登不进去,满脑子问号&#xf…

【论文解读】Object Goal Navigation usingGoal-Oriented Semantic Exploration

论文:https://devendrachaplot.github.io/papers/semantic-exploration.pdf 代码:https://github.com/devendrachaplot/Object-Goal-Navigation 项目: Object Goal Navigation using Goal-Oriented Semantic Exploration example&#xff1…

代码随想录算法训练60 | 单调栈part03

84.柱状图中最大的矩形 代码随想录 今天是训练营最后一天,恭喜坚持两个月的录友们,接下来可以写一篇自己 代码随想录一刷的总结。好好回顾一下,这两个月自己的博客内容,以及自己的收获。

2、鼠标事件、键盘事件、浏览器事件、监听事件、冒泡事件、默认事件、属性操作

一、鼠标事件 1、单击事件&#xff1a;onclick <body><header id"head">我是头部标签</header> </body> <script> var head document.getElementById("head")head.onclick function () {console.log("我是鼠标单击…

金蝶云星空--写插件不重启IIS热更新简单配置指南

云星空7.5版本&#xff0c;以简单方式配置并测试了热更新的实现方式可行&#xff0c;操作如下&#xff08;7.5外版本没试过&#xff0c;大家可试下&#xff09;&#xff1a; 1、打开WebSite\App_Data\Common.config&#xff0c;修改appSettings&#xff0c;设置IsEnablePlugIn…

go slice 扩容实现

基于 Go 1.19。 go 的切片我们都知道可以自动地进行扩容&#xff0c;具体来说就是在切片的容量容纳不下新的元素的时候&#xff0c; 底层会帮我们为切片的底层数组分配更大的内存空间&#xff0c;然后把旧的切片的底层数组指针指向新的内存中&#xff1a; 目前网上一些关于扩容…

ElasticSearch 开发总结(九)——SearchType:DFS_QUERY_THEN_FETCH和QUERY_THEN_FETCH

ElasticSearch 开发总结&#xff08;九&#xff09;——SearchType&#xff1a;DFS_QUERY_THEN_FETCH和QUERY_THEN_FETCH-CSDN博客 1.SearchType ES的搜索类型 有一个类SearchType&#xff08;如下图示&#xff09;&#xff0c;关于该类的描述&#xff1a; Search type repre…