firewall 服务介绍

firewall 服务是 redhat7 和 centos7 系统默认安装好的防火墙服务,一个信任级别的概念来管理与之相关联的连接与接口。它支持 ipv4 与 ipv6,并支持网桥,采用 firewall-cmd (command) 或 firewall-config (gui) 来动态的管理 kernel netfilter 的临时或永久的接口规则,并实时生效而无需重启服务。

Firewall 能将不同的网络连接归类到不同的信任级别,Zone 提供了以下几个级别:

  1. drop: 丢弃所有进入的包,而不给出任何响应
  2. block: 拒绝所有外部发起的连接,允许内部发起的连接
  3. public: 允许指定的进入连接
  4. external: 同上,对伪装的进入连接,一般用于路由转发
  5. dmz: 允许受限制的进入连接
  6. work: 允许受信任的计算机被限制的进入连接,类似 workgroup
  7. home: 同上,类似 homegroup
  8. internal: 同上,范围针对所有互联网用户
  9. trusted: 信任所有连接
  10. ```

  

firewall 的安装和使用规则

1. 安装firewall 服务

  1. yum install firewalld -y

  

2. 安装firewall 图形操作界面

  1. yum install firewall-config -y

3. firewall 服务的启动和关闭操作
启动firewall服务

  1. systemctl start firewalld.service

开机启动firewall服务

  1. systemctl enable firewalld.service

关闭firewall服务

  1. systemctl stop firewalld.service

取消开机启动firewall服务

  1. systemctl disable firewalld.service

重启firewall服务

  1. systemctl restart firewalld.service

  

4. firewall 服务的规则管理,使用firwwall-cmd命令

查看规则的具体使用方法

  1. firewall-cmd --help

  

查看firewall服务的运行状态

  1. firwwall-cmd --state

  

查看已被激活的 Zone 信息

  1. firewall-cmd --get-active-zones

查看指定接口的 Zone 信息

  1. firewall-cmd --get-zone-of-interface=ens160

查看指定级别的端口

  1. firewall-cmd --zone=public --list-all

查看所有级别被允许的信息

  1. firewall-cmd --get-service

查看所有 zones 级别中被允许的服务

  1. firewall-cmd --get-service --permanent

5. firewall服务的规则管理

  1. firewall-cmd --panic-on # 丢弃
  2. firewall-cmd --panic-off # 取消丢弃
  3. firewall-cmd --query-panic # 查看丢弃状态
  4. firewall-cmd --reload # 更新规则,不重启服务
  5. firewall-cmd --complete-reload # 更新规则,重启服务

  

添加某接口至某信任等级

  1. firewall-cmd --zone=public --add-interface=ens160 --permanent

设置 public 为默认的信任级别

  1. firewall-cmd --set-default-zone=public

  

6. firewall管理端口

列出 dmz 级别的被允许的进入端口

  1. firewall-cmd --zone=dmz --list-ports

  

允许 tcp 端口 8080 至 dmz 级别

  1. firewall-cmd --zone=dmz --add-port=8080/tcp
  2. firewall-cmd --reload

  

允许某范围的 udp 端口至 public 级别,并永久生效

  1. firewall-cmd --zone=public --add-port=5000-5020/udp --permanent

  

7. firewall管理服务

添加 smtp 服务至 work zone

  1. firewall-cmd --zone=work --add-service=smtp

  

移除 work zone 中的 smtp 服务

  1. firewall-cmd --zone=work --remove-service=smtp

  

8. firewall 配置 ip 地址伪装

查看伪装

  1. firewall-cmd --zone=external --query-masquerade

  

打开伪装

  1. firewall-cmd --zone=external --add-masquerade

  

关闭伪装

  1. firewall-cmd --zone=external --remove-masquerade

  

9. firewall 端口转发

要打开端口转发,则需要先

  1. firewall-cmd --zone=external --add-masquerade

  

然后转发 tcp 22 端口至 3753

  1. firewall-cmd --zone=external --add-forward-port=port=22:proto=tcp:toport=3753

  

转发 22 端口数据至另一个 ip为192.168.1.100 的相同端口上

  1. firewall-cmd --zone=external --add-forward-port=port=22:proto=tcp:toaddr=192.168.1.100

  

转发 22 端口数据至另一 ip为192.168.1.100 的 2055 端口上

  1. firewall-cmd --zone=external --add-forward-port=port=22:proto=tcp:toport=2055:toaddr=192.168.1.100

firewall-cmd --help

  1. ```
  2. [root@cinder01 ~]# firewall-cmd --help
  3.  
  4. Usage: firewall-cmd [OPTIONS...]
  5.  
  6. General Options
  7. -h, --help Prints a short help text and exists
  8. -V, --version Print the version string of firewalld
  9. -q, --quiet Do not print status messages
  10.  
  11. Status Options
  12. --state Return and print firewalld state
  13. --reload Reload firewall and keep state information
  14. --complete-reload Reload firewall and lose state information
  15. --runtime-to-permanent
  16. Create permanent from runtime configuration
  17.  
  18. Log Denied Options
  19. --get-log-denied Print the log denied value
  20. --set-log-denied=<value>
  21. Set log denied value
  22. --get-ipset-types Print the supported ipset types
  23.  
  24. Permanent Options
  25. --permanent Set an option permanently
  26. Usable for options marked with [P]
  27.  
  28. Zone Options
  29. --get-default-zone Print default zone for connections and interfaces
  30. --set-default-zone=<zone>
  31. Set default zone
  32. --get-active-zones Print currently active zones
  33. --get-zones Print predefined zones [P]
  34. --get-services Print predefined services [P]
  35. --get-icmptypes Print predefined icmptypes [P]
  36. --get-zone-of-interface=<interface>
  37. Print name of the zone the interface is bound to [P]
  38. --get-zone-of-source=<source>[/<mask>]|<MAC>|ipset:<ipset>
  39. Print name of the zone the source is bound to [P]
  40. --list-all-zones List everything added for or enabled in all zones [P]
  41. --new-zone=<zone> Add a new zone [P only]
  42. --new-zone-from-file=<filename> [--name=<zone>]
  43. Add a new zone from file with optional name [P only]
  44. --delete-zone=<zone> Delete an existing zone [P only]
  45. --load-zone-defaults=<zone>
  46. Load zone default settings [P only] [Z]
  47. --zone=<zone> Use this zone to set or query options, else default zone
  48. Usable for options marked with [Z]
  49. --get-target Get the zone target [P only] [Z]
  50. --set-target=<target>
  51. Set the zone target [P only] [Z]
  52. --info-zone=<zone> Print information about a zone
  53. --path-zone=<zone> Print file path of a zone [P only]
  54.  
  55. IPSet Options
  56. --get-ipset-types Print the supported ipset types
  57. --new-ipset=<ipset> --type=<ipset type> [--option=<key>[=<value>]]..
  58. Add a new ipset [P only]
  59. --new-ipset-from-file=<filename> [--name=<ipset>]
  60. Add a new ipset from file with optional name [P only]
  61. --delete-ipset=<ipset>
  62. Delete an existing ipset [P only]
  63. --load-ipset-defaults=<ipset>
  64. Load ipset default settings [P only]
  65. --info-ipset=<ipset> Print information about an ipset
  66. --path-ipset=<ipset> Print file path of an ipset [P only]
  67. --get-ipsets Print predefined ipsets
  68. --ipset=<ipset> --set-description=<description>
  69. Set new description to ipset [P only]
  70. --ipset=<ipset> --get-description
  71. Print description for ipset [P only]
  72. --ipset=<ipset> --set-short=<description>
  73. Set new short description to ipset [P only]
  74. --ipset=<ipset> --get-short
  75. Print short description for ipset [P only]
  76. --ipset=<ipset> --add-entry=<entry>
  77. Add a new entry to an ipset [P]
  78. --ipset=<ipset> --remove-entry=<entry>
  79. Remove an entry from an ipset [P]
  80. --ipset=<ipset> --query-entry=<entry>
  81. Return whether ipset has an entry [P]
  82. --ipset=<ipset> --get-entries
  83. List entries of an ipset [P]
  84. --ipset=<ipset> --add-entries-from-file=<entry>
  85. Add a new entries to an ipset [P]
  86. --ipset=<ipset> --remove-entries-from-file=<entry>
  87. Remove entries from an ipset [P]
  88.  
  89. IcmpType Options
  90. --new-icmptype=<icmptype>
  91. Add a new icmptype [P only]
  92. --new-icmptype-from-file=<filename> [--name=<icmptype>]
  93. Add a new icmptype from file with optional name [P only]
  94. --delete-icmptype=<icmptype>
  95. Delete an existing icmptype [P only]
  96. --load-icmptype-defaults=<icmptype>
  97. Load icmptype default settings [P only]
  98. --info-icmptype=<icmptype>
  99. Print information about an icmptype
  100. --path-icmptype=<icmptype>
  101. Print file path of an icmptype [P only]
  102. --icmptype=<icmptype> --set-description=<description>
  103. Set new description to icmptype [P only]
  104. --icmptype=<icmptype> --get-description
  105. Print description for icmptype [P only]
  106. --icmptype=<icmptype> --set-short=<description>
  107. Set new short description to icmptype [P only]
  108. --icmptype=<icmptype> --get-short
  109. Print short description for icmptype [P only]
  110. --icmptype=<icmptype> --add-destination=<ipv>
  111. Enable destination for ipv in icmptype [P only]
  112. --icmptype=<icmptype> --remove-destination=<ipv>
  113. Disable destination for ipv in icmptype [P only]
  114. --icmptype=<icmptype> --query-destination=<ipv>
  115. Return whether destination ipv is enabled in icmptype [P only]
  116. --icmptype=<icmptype> --get-destinations
  117. List destinations in icmptype [P only]
  118.  
  119. Service Options
  120. --new-service=<service>
  121. Add a new service [P only]
  122. --new-service-from-file=<filename> [--name=<service>]
  123. Add a new service from file with optional name [P only]
  124. --delete-service=<service>
  125. Delete an existing service [P only]
  126. --load-service-defaults=<service>
  127. Load icmptype default settings [P only]
  128. --info-service=<service>
  129. Print information about a service
  130. --path-service=<service>
  131. Print file path of a service [P only]
  132. --service=<service> --set-description=<description>
  133. Set new description to service [P only]
  134. --service=<service> --get-description
  135. Print description for service [P only]
  136. --service=<service> --set-short=<description>
  137. Set new short description to service [P only]
  138. --service=<service> --get-short
  139. Print short description for service [P only]
  140. --service=<service> --add-port=<portid>[-<portid>]/<protocol>
  141. Add a new port to service [P only]
  142. --service=<service> --remove-port=<portid>[-<portid>]/<protocol>
  143. Remove a port from service [P only]
  144. --service=<service> --query-port=<portid>[-<portid>]/<protocol>
  145. Return whether the port has been added for service [P only]
  146. --service=<service> --get-ports
  147. List ports of service [P only]
  148. --service=<service> --add-protocol=<protocol>
  149. Add a new protocol to service [P only]
  150. --service=<service> --remove-protocol=<protocol>
  151. Remove a protocol from service [P only]
  152. --service=<service> --query-protocol=<protocol>
  153. Return whether the protocol has been added for service [P only]
  154. --service=<service> --get-protocols
  155. List protocols of service [P only]
  156. --service=<service> --add-source-port=<portid>[-<portid>]/<protocol>
  157. Add a new source port to service [P only]
  158. --service=<service> --remove-source-port=<portid>[-<portid>]/<protocol>
  159. Remove a source port from service [P only]
  160. --service=<service> --query-source-port=<portid>[-<portid>]/<protocol>
  161. Return whether the source port has been added for service [P only]
  162. --service=<service> --get-source-ports
  163. List source ports of service [P only]
  164. --service=<service> --add-module=<module>
  165. Add a new module to service [P only]
  166. --service=<service> --remove-module=<module>
  167. Remove a module from service [P only]
  168. --service=<service> --query-module=<module>
  169. Return whether the module has been added for service [P only]
  170. --service=<service> --get-modules
  171. List modules of service [P only]
  172. --service=<service> --set-destination=<ipv>:<address>[/<mask>]
  173. Set destination for ipv to address in service [P only]
  174. --service=<service> --remove-destination=<ipv>
  175. Disable destination for ipv i service [P only]
  176. --service=<service> --query-destination=<ipv>:<address>[/<mask>]
  177. Return whether destination ipv is set for service [P only]
  178. --service=<service> --get-destinations
  179. List destinations in service [P only]
  180.  
  181. Options to Adapt and Query Zones
  182. --list-all List everything added for or enabled in a zone [P] [Z]
  183. --list-services List services added for a zone [P] [Z]
  184. --timeout=<timeval> Enable an option for timeval time, where timeval is
  185. a number followed by one of letters 's' or 'm' or 'h'
  186. Usable for options marked with [T]
  187. --set-description=<description>
  188. Set new description to zone [P only] [Z]
  189. --get-description Print description for zone [P only] [Z]
  190. --set-short=<description>
  191. Set new short description to zone [P only] [Z]
  192. --get-short Print short description for zone [P only] [Z]
  193. --add-service=<service>
  194. Add a service for a zone [P] [Z] [T]
  195. --remove-service=<service>
  196. Remove a service from a zone [P] [Z]
  197. --query-service=<service>
  198. Return whether service has been added for a zone [P] [Z]
  199. --list-ports List ports added for a zone [P] [Z]
  200. --add-port=<portid>[-<portid>]/<protocol>
  201. Add the port for a zone [P] [Z] [T]
  202. --remove-port=<portid>[-<portid>]/<protocol>
  203. Remove the port from a zone [P] [Z]
  204. --query-port=<portid>[-<portid>]/<protocol>
  205. Return whether the port has been added for zone [P] [Z]
  206. --list-protocols List protocols added for a zone [P] [Z]
  207. --add-protocol=<protocol>
  208. Add the protocol for a zone [P] [Z] [T]
  209. --remove-protocol=<protocol>
  210. Remove the protocol from a zone [P] [Z]
  211. --query-protocol=<protocol>
  212. Return whether the protocol has been added for zone [P] [Z]
  213. --list-source-ports List source ports added for a zone [P] [Z]
  214. --add-source-port=<portid>[-<portid>]/<protocol>
  215. Add the source port for a zone [P] [Z] [T]
  216. --remove-source-port=<portid>[-<portid>]/<protocol>
  217. Remove the source port from a zone [P] [Z]
  218. --query-source-port=<portid>[-<portid>]/<protocol>
  219. Return whether the source port has been added for zone [P] [Z]
  220. --list-icmp-blocks List Internet ICMP type blocks added for a zone [P] [Z]
  221. --add-icmp-block=<icmptype>
  222. Add an ICMP block for a zone [P] [Z] [T]
  223. --remove-icmp-block=<icmptype>
  224. Remove the ICMP block from a zone [P] [Z]
  225. --query-icmp-block=<icmptype>
  226. Return whether an ICMP block has been added for a zone
  227. [P] [Z]
  228. --add-icmp-block-inversion
  229. Enable inversion of icmp blocks for a zone [P] [Z]
  230. --remove-icmp-block-inversion
  231. Disable inversion of icmp blocks for a zone [P] [Z]
  232. --query-icmp-block-inversion
  233. Return whether inversion of icmp blocks has been enabled
  234. for a zone [P] [Z]
  235. --list-forward-ports List IPv4 forward ports added for a zone [P] [Z]
  236. --add-forward-port=port=<portid>[-<portid>]:proto=<protocol>[:toport=<portid>[-<portid>]][:toaddr=<address>[/<mask>]]
  237. Add the IPv4 forward port for a zone [P] [Z] [T]
  238. --remove-forward-port=port=<portid>[-<portid>]:proto=<protocol>[:toport=<portid>[-<portid>]][:toaddr=<address>[/<mask>]]
  239. Remove the IPv4 forward port from a zone [P] [Z]
  240. --query-forward-port=port=<portid>[-<portid>]:proto=<protocol>[:toport=<portid>[-<portid>]][:toaddr=<address>[/<mask>]]
  241. Return whether the IPv4 forward port has been added for
  242. a zone [P] [Z]
  243. --add-masquerade Enable IPv4 masquerade for a zone [P] [Z] [T]
  244. --remove-masquerade Disable IPv4 masquerade for a zone [P] [Z]
  245. --query-masquerade Return whether IPv4 masquerading has been enabled for a
  246. zone [P] [Z]
  247. --list-rich-rules List rich language rules added for a zone [P] [Z]
  248. --add-rich-rule=<rule>
  249. Add rich language rule 'rule' for a zone [P] [Z] [T]
  250. --remove-rich-rule=<rule>
  251. Remove rich language rule 'rule' from a zone [P] [Z]
  252. --query-rich-rule=<rule>
  253. Return whether a rich language rule 'rule' has been
  254. added for a zone [P] [Z]
  255.  
  256. Options to Handle Bindings of Interfaces
  257. --list-interfaces List interfaces that are bound to a zone [P] [Z]
  258. --add-interface=<interface>
  259. Bind the <interface> to a zone [P] [Z]
  260. --change-interface=<interface>
  261. Change zone the <interface> is bound to [Z]
  262. --query-interface=<interface>
  263. Query whether <interface> is bound to a zone [P] [Z]
  264. --remove-interface=<interface>
  265. Remove binding of <interface> from a zone [P] [Z]
  266.  
  267. Options to Handle Bindings of Sources
  268. --list-sources List sources that are bound to a zone [P] [Z]
  269. --add-source=<source>[/<mask>]|<MAC>|ipset:<ipset>
  270. Bind the source to a zone [P] [Z]
  271. --change-source=<source>[/<mask>]|<MAC>|ipset:<ipset>
  272. Change zone the source is bound to [Z]
  273. --query-source=<source>[/<mask>]|<MAC>|ipset:<ipset>
  274. Query whether the source is bound to a zone [P] [Z]
  275. --remove-source=<source>[/<mask>]|<MAC>|ipset:<ipset>
  276. Remove binding of the source from a zone [P] [Z]
  277.  
  278. Direct Options
  279. --direct First option for all direct options
  280. --get-all-chains
  281. Get all chains [P]
  282. --get-chains {ipv4|ipv6|eb} <table>
  283. Get all chains added to the table [P]
  284. --add-chain {ipv4|ipv6|eb} <table> <chain>
  285. Add a new chain to the table [P]
  286. --remove-chain {ipv4|ipv6|eb} <table> <chain>
  287. Remove the chain from the table [P]
  288. --query-chain {ipv4|ipv6|eb} <table> <chain>
  289. Return whether the chain has been added to the table [P]
  290. --get-all-rules
  291. Get all rules [P]
  292. --get-rules {ipv4|ipv6|eb} <table> <chain>
  293. Get all rules added to chain in table [P]
  294. --add-rule {ipv4|ipv6|eb} <table> <chain> <priority> <arg>...
  295. Add rule to chain in table [P]
  296. --remove-rule {ipv4|ipv6|eb} <table> <chain> <priority> <arg>...
  297. Remove rule with priority from chain in table [P]
  298. --remove-rules {ipv4|ipv6|eb} <table> <chain>
  299. Remove rules from chain in table [P]
  300. --query-rule {ipv4|ipv6|eb} <table> <chain> <priority> <arg>...
  301. Return whether a rule with priority has been added to
  302. chain in table [P]
  303. --passthrough {ipv4|ipv6|eb} <arg>...
  304. Pass a command through (untracked by firewalld)
  305. --get-all-passthroughs
  306. Get all tracked passthrough rules [P]
  307. --get-passthroughs {ipv4|ipv6|eb} <arg>...
  308. Get tracked passthrough rules [P]
  309. --add-passthrough {ipv4|ipv6|eb} <arg>...
  310. Add a new tracked passthrough rule [P]
  311. --remove-passthrough {ipv4|ipv6|eb} <arg>...
  312. Remove a tracked passthrough rule [P]
  313. --query-passthrough {ipv4|ipv6|eb} <arg>...
  314. Return whether the tracked passthrough rule has been
  315. added [P]
  316.  
  317. Lockdown Options
  318. --lockdown-on Enable lockdown.
  319. --lockdown-off Disable lockdown.
  320. --query-lockdown Query whether lockdown is enabled
  321.  
  322. Lockdown Whitelist Options
  323. --list-lockdown-whitelist-commands
  324. List all command lines that are on the whitelist [P]
  325. --add-lockdown-whitelist-command=<command>
  326. Add the command to the whitelist [P]
  327. --remove-lockdown-whitelist-command=<command>
  328. Remove the command from the whitelist [P]
  329. --query-lockdown-whitelist-command=<command>
  330. Query whether the command is on the whitelist [P]
  331. --list-lockdown-whitelist-contexts
  332. List all contexts that are on the whitelist [P]
  333. --add-lockdown-whitelist-context=<context>
  334. Add the context context to the whitelist [P]
  335. --remove-lockdown-whitelist-context=<context>
  336. Remove the context from the whitelist [P]
  337. --query-lockdown-whitelist-context=<context>
  338. Query whether the context is on the whitelist [P]
  339. --list-lockdown-whitelist-uids
  340. List all user ids that are on the whitelist [P]
  341. --add-lockdown-whitelist-uid=<uid>
  342. Add the user id uid to the whitelist [P]
  343. --remove-lockdown-whitelist-uid=<uid>
  344. Remove the user id uid from the whitelist [P]
  345. --query-lockdown-whitelist-uid=<uid>
  346. Query whether the user id uid is on the whitelist [P]
  347. --list-lockdown-whitelist-users
  348. List all user names that are on the whitelist [P]
  349. --add-lockdown-whitelist-user=<user>
  350. Add the user name user to the whitelist [P]
  351. --remove-lockdown-whitelist-user=<user>
  352. Remove the user name user from the whitelist [P]
  353. --query-lockdown-whitelist-user=<user>
  354. Query whether the user name user is on the whitelist [P]
  355.  
  356. Panic Options
  357. --panic-on Enable panic mode
  358. --panic-off Disable panic mode
  359. --query-panic Query whether panic mode is enabled
  360.  
  361. [root@cinder01 ~]#
  362. ```

  

部分参考:http://blog.csdn.net/gbenson/article/details/50056713

RHEL7 CentOS7 的 firewall命令简单介绍的更多相关文章

  1. Git flow的分支模型与及经常使用命令简单介绍

    Git flow是git的一个扩展集,它基于Vincent Driessen 的分支模型,文章"A successful Git branching model"对这一分支模型进行 ...

  2. awk命令简单介绍

    简介 awk是一个强大的文本分析工具,相对于grep的查找,sed的编辑,awk在其对数据分析并生成报告时,显得尤为强大.简单来说awk就是把文件逐行的读入,以空格为默认分隔符将每行切片,切开的部分再 ...

  3. ps与top命令简单介绍

    Linux中ps与top命令 这两个命令都是查看系统进程信息的命令,但是用处有点儿不同 1.ps命令--提供系统过去信息的一次性快照 也就是说ps命令能够查看刚刚系统的进程信息  命令:ps aux或 ...

  4. Linux的bg和fg和jobs和nohup命令简单介绍

    我们都知道,在 Windows 上面,我们要么让一个程序作为服务在后台一直运行,要么停止这个服务.而不能让程序在前台后台之间切换.而 Linux 提供了 fg 和 bg 命令,让我们轻松调度正在运行的 ...

  5. firewall 命令简单操作

    Firewalld 是维护防火墙策略的守护程序的名称.使用 firewall-cmd 命令与防火墙配置进行交互, 使用区域概念对与系统交互的流量进行分段.网络接口分配给一个或多个区域,每个区域都包含允 ...

  6. linux常用命令简单介绍(netstat,awk,top,tail,head,less,more,cat,nl)

    1.netstat netstat -tnl | grep 443 (查看443端口是否被占用) root用户,用netstat -pnl | grep 443 (还可显示出占用本机443端口的进程P ...

  7. Linux的bg和fg命令简单介绍

    我们都知道,在 Windows 上面,我们要么让一个程序作为服务在后台一直运行,要么停止这个服务.而不能让程序在前台后台之间切换.而 Linux 提供了 fg 和 bg 命令,让我们轻松调度正在运行的 ...

  8. Linux使用sudo提权时,出现xx 不在 sudoers 文件中。此事将被报告。visudo 命令简单介绍。

    在使用 sudo 临时提权时,出现:不在 sudoers 文件中.此事将被报告. 可以使用 visudo命令 来配置/etc/sudoers文件,将目标用户赋予使用sudo命令的能力. visudo命 ...

  9. Linux_常用命令简单介绍(netstat,awk,top,tail,head,less,more,cat,nl)

    1.netstat netstat -tnl | grep 443 (查看443端口是否被占用) root用户,用netstat -pnl | grep 443 (还可显示出占用本机443端口的进程P ...

随机推荐

  1. windows系统redmine安装总结

    今天在公司服务器上安装了redmine,主要用于项目管理和缺陷跟踪.安装过程比较简单,总结如下: 1.网上下载redmine安装包(bitnami-redmine-3.3.1-0-windows-in ...

  2. pip升级时报错--- No module named 'pip._internal'

           一.问题:        之前python3.6是安装的pip版本为:pip=9.0.1,我按照提示升级报错,一直装不上pip18.0,于是直接在site-package目录下删掉了pi ...

  3. dll相关总结

    1.动态链接库的使用有两种方式,一种是显式调用.一种是隐式调用. (1) 显式调用:使用LoadLibrary载入动态链接库.使用GetProcAddress获取某函数地址. (2) 隐式调用:可以使 ...

  4. sap component 导航 链接

    1: 定义一个导航链接名字,这个名子如果在程序中遇到(该名字会在程序中使用),就会触发这样一个导航. 导航有两个view,一个原来的view,一个出发abc之后的target view,也就是目标视图 ...

  5. jenkins借助winscp传本地文件到远程服务器上

    有这样的场景,我们的ftp上都是些重要的资料,所以大家基本只有可看的权限,只有部分管理人员有可读可写的权限,但是jenkins上基本使用的都是ftp的路径,这个时候就存在一些问题,某些开发需要将自己构 ...

  6. 删除sonarqube仪表盘上无用的工程

    管理员账号登陆,点击进入工程,比如我要删除sonar_source, 1.进入工程 2.配置-->删除

  7. 2019年UI和UX设计趋势:大概是最全的汇总了!

    朋友们,很快,2018就要跟我们说

  8. 命令行方式调用winrar对文件夹进行zip压缩示例代码

    调用winRAR进行压缩 using System; using System.Collections.Generic; using System.Linq; using System.Text; u ...

  9. Elasticsearch5.x Head插件安装

    在5.0版本中不支持直接安装head插件,需要启动一个服务. 由于head插件本质上还是一个nodejs的工程,因此需要安装node,使用npm来安装依赖的包.(npm可以理解为maven) 1.安装 ...

  10. Jmeter-----邮件观察仪

    设置邮件观察仪的目的,将测试结果通过邮件的方式发送给相关的人员,可及时获取到当前测试结果情况. 说明: 本人公司使用的为腾讯企业邮箱,因此下面的介绍方式将以腾讯企业邮箱为准来进行描述 必要的设置: 邮 ...