CN113779638A - Method and device for realizing interface caller authentication in dynamic proxy mode - Google Patents

Method and device for realizing interface caller authentication in dynamic proxy mode Download PDF

Info

Publication number
CN113779638A
CN113779638A CN202111344191.XA CN202111344191A CN113779638A CN 113779638 A CN113779638 A CN 113779638A CN 202111344191 A CN202111344191 A CN 202111344191A CN 113779638 A CN113779638 A CN 113779638A
Authority
CN
China
Prior art keywords
class
authentication
service
caller
defining
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111344191.XA
Other languages
Chinese (zh)
Inventor
丁福祥
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inspur Software Co Ltd
Original Assignee
Inspur Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inspur Software Co Ltd filed Critical Inspur Software Co Ltd
Priority to CN202111344191.XA priority Critical patent/CN113779638A/en
Publication of CN113779638A publication Critical patent/CN113779638A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication
    • G06F9/547Remote procedure calls [RPC]; Web services
    • G06F9/548Object oriented; Remote method invocation [RMI]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Automation & Control Theory (AREA)
  • Databases & Information Systems (AREA)
  • Stored Programmes (AREA)

Abstract

The invention particularly relates to a method and a device for realizing the authentication of an interface caller in a dynamic proxy mode. The method and device for realizing the authentication of the interface caller in the dynamic proxy mode define a service interface and an implementation class to realize the service interface, and rewrite a method for realizing business logic; then defining a section abstract type, and rewriting according to the requirement when defining the section abstract type, and finishing, abnormal, prepositive enhancing and postpositive enhancing service logic methods; creating a tangent plane class, configuring an entry point and enhancement in the tangent plane class, and verifying the identity of a caller; and finally, testing to generate the dynamic proxy class. The method and the device for realizing the authentication of the interface caller in the dynamic proxy mode realize the non-invasive code expansion, can realize the enhancement of the method under the condition of not modifying a source code, simultaneously, the proxy logic and the service logic are mutually independent and are not coupled, and the high reliability and the high availability of the system use and the service provision are ensured.

Description

Method and device for realizing interface caller authentication in dynamic proxy mode
Technical Field
The invention relates to the technical field of government affair services, in particular to a method and a device for realizing interface caller authentication in a dynamic proxy mode.
Background
Different authentication logic is added for the service interface API, the currently used approach is static proxy. The proxy mode in Java may be implemented to help the proxied to do some early preparation and late benevolent work, but the core business logic is still done by the proxied. The proxied class only needs to be concentrated on the core code of the proxied class, and other work is given to the proxied class, so that the code is simpler and the division of labor is clear.
But static proxies also have their own drawbacks:
the first, proxy and delegate classes implement the same service interface API, and the proxy class implements the same method via the delegate class, which results in a large amount of code duplication. If a method is added to the service interface API, all implementation classes and all proxy classes need to implement the method, and the complexity of code maintenance is increased.
Second, proxy objects serve only one type of object, and if multiple types of objects are to be served, proxy must be performed for each type of object. Therefore, static agents are not adequate when the program size is slightly larger. That is, the static agent class can only serve a specific service interface API (service), and many agent classes need to be established if a plurality of service interface APIs are to be served.
In the field of government affair service products, whether business data are docked with an examination and approval business department in a service interface API mode or a data query service interface API is provided for an external network to display a statistical analysis page. The agent can carry out unified management on the implementation classes, for example, the operations such as authentication and the like need to be added before the specific implementation classes are called, only one agent class needs to be added, the authentication function is added in the agent class, and then the implementation classes are called, so that the specific implementation classes can be prevented from being modified, and the switching principle is met. However, if each implementation class is required to add an authentication function, a plurality of proxy classes are required to be added, and the authentication function is required to be added for each method in the proxy classes, which undoubtedly makes codes redundant and is not good for maintenance and upgrade in the future.
Based on the above situation, the invention provides a method and a device for realizing the authentication of an interface caller in a dynamic proxy mode.
Disclosure of Invention
In order to make up for the defects of the prior art, the invention provides a simple and efficient method and device for realizing the authentication of an interface caller in a dynamic proxy mode.
The invention is realized by the following technical scheme:
a method for realizing interface caller authentication in dynamic proxy mode is characterized in that: when the external system is in butt joint with the government affair application system for service data, the government affair service application system authenticates visiting external system users first, if the authentication is successful, the external system calls the government affair service application system data through a service interface API, otherwise, the government affair service application system refuses the external system users to access the calling system data;
the method comprises the following steps:
firstly, defining main service logic;
defining a service interface API for a government affair service application system, then defining an implementation class to implement the service interface API, and rewriting a method for implementing business logic;
secondly, defining a section abstract class;
defining a section abstract class by using a design mode of a template method, and rewriting, starting, ending, abnormal, pre-enhancing and post-enhancing service logic methods according to requirements when defining the section abstract class;
thirdly, defining a section class;
creating a tangent plane class, configuring an entry point and enhancement in the tangent plane class, and rewriting a tangent plane abstract class template preposed enhancement interface after the entry point is determined; when the front end accesses a government affair service application system, whether a caller has the right to call the service interface API is verified according to the application software number App ID configured in the application system and the signature Sign of a caller of the service interface API;
fourthly, testing and generating a dynamic proxy class;
creating a service interface API object needing authentication, then defining a section object, dynamically creating a proxy object, increasing the authentication operation of a service interface API caller according to the preposed enhancement of the section class, and directly calling the proxied service interface API if the authentication is successful so as to realize the calling of service logic.
In the second step, the isIntercept () method is rewritten to determine whether the access point is correct.
And in the third step, judging whether the configured access point executes the operation or not according to the method name.
In the third step, the preposed enhanced interface performs MD5 encryption calculation by using App ID and AppSecre, and compares whether the obtained result is consistent with a signature Sign of a calling party of the API of the service interface, if so, the authentication is considered to be successful, otherwise, the authentication fails.
And in the fourth step, a CGlib dynamic proxy mode is adopted to dynamically create a proxy object.
In the fourth step, a target object and a tangent plane class are respectively created, and then a proxy object is created by using a JAVA reflection mechanism.
A device for realizing the authentication of an interface caller in a dynamic proxy mode is characterized in that: comprises that
The main business logic definition module is used for defining a service interface API for a government affair service application system, defining an implementation class to implement the service interface API and rewriting a method for implementing business logic;
the section abstract class definition module is used for defining a section abstract class by using a design mode of a template method, and rewriting the section abstract class according to needs when defining the section abstract class, wherein the section abstract class is a service logic method of starting, ending, abnormal, prepositive enhancement and postpositive enhancement;
the section class definition module is used for creating a section class, configuring an entry point and an enhancement in the section class, rewriting a section abstract class template preposed enhancement interface after determining the entry point, and verifying the identity of a caller;
and the generation dynamic proxy class test module is used for testing whether the interface authentication of the service interface API caller can be realized by generating a dynamic proxy class, and comprises the steps of creating a service interface API object needing authentication, then defining a tangent plane object, dynamically creating a proxy object, increasing the authentication operation of the service interface API caller according to the preposed enhancement of the tangent plane class, and directly calling the proxied service interface API if the authentication is successful so as to realize the calling of service logic.
And the section class definition module performs MD5 encryption calculation on the preposed enhanced interface by using App ID and AppSecre, compares the result with a signature Sign of a calling party of the service interface API to determine whether the result is consistent, and if so, considers that the authentication is successful, otherwise, fails.
The dynamic proxy class test generation module dynamically creates a proxy object by adopting a CGlib dynamic proxy mode, and creates the proxy object by utilizing a JAVA reflection mechanism after a target object and a tangent plane class are created.
The invention has the beneficial effects that: the method and the device for realizing the authentication of the interface caller in the dynamic proxy mode can automatically verify whether the user has the authority to call the service interface when the front end accesses the government affair service application system, realize the noninvasive code expansion, realize the enhancement of the method under the condition of not modifying the source code, simultaneously ensure the mutual independence and no coupling of the proxy logic and the business logic, and ensure the high reliability and the high availability of the system use and the service provision.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
FIG. 1 is a schematic diagram of a method for defining main service logic according to the present invention.
FIG. 2 is a schematic diagram of the method for abstracting class by section of the invention.
FIG. 3 is a schematic diagram of the method for creating sliced surfaces according to the present invention.
FIG. 4 is a schematic diagram of a method for generating dynamic proxy classes for testing according to the present invention.
Detailed Description
In order to make those skilled in the art better understand the technical solution of the present invention, the technical solution in the embodiment of the present invention will be clearly and completely described below with reference to the embodiment of the present invention. It is to be understood that the described embodiments are merely exemplary of the invention, and not restrictive of the full scope of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
When an external system and a government affair application system are in butt joint with service data, the government affair service application system authenticates visiting external system users first, if the authentication is successful, the external system calls the government affair service application system data through a service interface API, otherwise, the government affair service application system refuses the external system users to access the calling system data;
the method comprises the following steps:
firstly, defining main service logic;
defining a service interface API for a government affair service application system, then defining an implementation class to implement the service interface API, and rewriting a method for implementing business logic;
secondly, defining a section abstract class;
defining a section abstract class by using a design mode of a template method, and rewriting, starting, ending, abnormal, pre-enhancing and post-enhancing service logic methods according to requirements when defining the section abstract class;
thirdly, defining a section class;
creating a tangent plane class, configuring an entry point and enhancement in the tangent plane class, and rewriting a tangent plane abstract class template preposed enhancement interface after the entry point is determined; when the front end accesses a government affair service application system, whether a caller has the right to call the service interface API is verified according to the application software number App ID configured in the application system and the signature Sign of a caller of the service interface API;
fourthly, testing and generating a dynamic proxy class;
creating a service interface API object needing authentication, then defining a section object, dynamically creating a proxy object, increasing the authentication operation of a service interface API caller according to the preposed enhancement of the section class, and directly calling the proxied service interface API if the authentication is successful so as to realize the calling of service logic.
In the second step, the isIntercept () method is rewritten to determine whether the access point is correct.
And in the third step, judging whether the configured access point executes the operation or not according to the method name.
In the third step, the preposed enhanced interface performs MD5 encryption calculation by using App ID and AppSecre, and compares whether the obtained result is consistent with a signature Sign of a calling party of the API of the service interface, if so, the authentication is considered to be successful, otherwise, the authentication fails.
And in the fourth step, a CGlib dynamic proxy mode is adopted to dynamically create a proxy object.
In the fourth step, a target object and a tangent plane class are respectively created, and then a proxy object is created by using a JAVA reflection mechanism.
The device for realizing the authentication of the interface caller in the dynamic proxy mode is characterized in that: comprises that
The main business logic definition module is used for defining a service interface API for a government affair service application system, defining an implementation class to implement the service interface API and rewriting a method for implementing business logic;
the section abstract class definition module is used for defining a section abstract class by using a design mode of a template method, and rewriting the section abstract class according to needs when defining the section abstract class, wherein the section abstract class is a service logic method of starting, ending, abnormal, prepositive enhancement and postpositive enhancement;
the section class definition module is used for creating a section class, configuring an entry point and an enhancement in the section class, rewriting a section abstract class template preposed enhancement interface after determining the entry point, and verifying the identity of a caller;
and the generation dynamic proxy class test module is used for testing whether the interface authentication of the service interface API caller can be realized by generating a dynamic proxy class, and comprises the steps of creating a service interface API object needing authentication, then defining a tangent plane object, dynamically creating a proxy object, increasing the authentication operation of the service interface API caller according to the preposed enhancement of the tangent plane class, and directly calling the proxied service interface API if the authentication is successful so as to realize the calling of service logic.
And the section class definition module performs MD5 encryption calculation on the preposed enhanced interface by using App ID and AppSecre, compares the result with a signature Sign of a calling party of the service interface API to determine whether the result is consistent, and if so, considers that the authentication is successful, otherwise, fails.
The dynamic proxy class test generation module dynamically creates a proxy object by adopting a CGlib dynamic proxy mode, and creates the proxy object by utilizing a JAVA reflection mechanism after a target object and a tangent plane class are created.
The JAVA reflection mechanism refers to that in a running state, all attributes and methods of any class can be known; any method and property can be called for any object. This dynamically acquired information and the functionality of the method of dynamically invoking objects is referred to as the reflection mechanism of the java language. To dissect a class, the bytecode file object of the class must be acquired first. The method of Class is used for anatomy, so that an object of Class corresponding to each bytecode file is obtained first. Reflection is the mapping of the various components in the Java class into individual Java objects.
Reflection provides several functions:
firstly, judging the class to which any one object belongs during running;
secondly, constructing an object of any class at runtime;
thirdly, judging member variables and methods of any class during running;
and fourthly, calling a method of any object at runtime.
The Class is used for obtaining various information related to the Class, and provides a related method for obtaining Class information, the Class inherits from an Object Class, the Class is a common drawing of all classes, each Class has an Object, meanwhile, each Class is also regarded as an Object, and has a common drawing Class, the structure information of the Class is stored, and the corresponding information can be taken out through the corresponding method: class name, property, method, construction method, parent class, and service interface API.
The dynamic proxy mode is a common JAVA design mode and is characterized in that a proxy class and a proxy class have the same service interface API. The proxy class is primarily responsible for pre-processing messages for the delegate class, filtering messages, forwarding messages to the delegate class, post-processing messages, and the like. There is usually an association relationship between the proxy class and the proxy class, and an object of a proxy class is associated with an object of a proxy class, and the object of the proxy class does not actually implement a service, but provides a specific service by calling a related method of the object of the proxy class. In short, the actual object is accessed through the proxy object. The proxy mode introduces a certain degree of indirection when accessing the actual object, and multiple purposes can be added due to the indirection. The dynamic proxy is a process of dynamically generating a Class file of a proxy Class according to a proxied service interface API and loading and running in the process of program running.
JDK (Java Development Kit, software Development Kit in Java language) provides Java. Meanwhile, the actual processing of the service interface API of the agent is java, lang, reflect, invoke handler, and an invoke method is provided for an implementer to provide corresponding agent logic. Some special handling may be done for the actual implementation.
The above-described embodiment is only one specific embodiment of the present invention, and general changes and substitutions by those skilled in the art within the technical scope of the present invention are included in the protection scope of the present invention.

Claims (9)

1. A method for realizing interface caller authentication in dynamic proxy mode is characterized in that: when the external system is in butt joint with the government affair application system for service data, the government affair service application system authenticates visiting external system users first, if the authentication is successful, the external system calls the government affair service application system data through a service interface API, otherwise, the government affair service application system refuses the external system users to access the calling system data;
the method comprises the following concrete steps:
firstly, defining main service logic;
defining a service interface API for a government affair service application system, then defining an implementation class to implement the service interface API, and rewriting a method for implementing business logic;
secondly, defining a section abstract class;
defining a section abstract class by using a design mode of a template method, and rewriting, starting, ending, abnormal, pre-enhancing and post-enhancing service logic methods according to requirements when defining the section abstract class;
thirdly, defining a section class;
creating a tangent plane class, configuring an entry point and enhancement in the tangent plane class, and rewriting a tangent plane abstract class template preposed enhancement interface after the entry point is determined; when the front end accesses a government affair service application system, whether a caller has the right to call the service interface API is verified according to the application software number App ID configured in the application system and the signature Sign of a caller of the service interface API;
fourthly, testing and generating a dynamic proxy class;
creating a service interface API object needing authentication, then defining a section object, dynamically creating a proxy object, increasing the authentication operation of a service interface API caller according to the preposed enhancement of the section class, and directly calling the proxied service interface API if the authentication is successful so as to realize the calling of service logic.
2. The method for implementing authentication of interface caller in dynamic proxy mode according to claim 1, wherein: in the second step, the isIntercept () method is rewritten to determine whether the access point is correct.
3. The method for implementing authentication of interface caller in dynamic proxy mode according to claim 1, wherein: and in the third step, judging whether the configured access point executes the operation or not according to the method name.
4. The method for implementing authentication of interface caller in dynamic proxy mode according to claim 1, wherein: in the third step, the preposed enhanced interface performs MD5 encryption calculation by using App ID and AppSecre, and compares whether the obtained result is consistent with a signature Sign of a calling party of the API of the service interface, if so, the authentication is considered to be successful, otherwise, the authentication fails.
5. The method for implementing authentication of interface caller in dynamic proxy mode according to claim 4, wherein: and in the fourth step, a CGlib dynamic proxy mode is adopted to dynamically create a proxy object.
6. The method for implementing authentication of interface caller in dynamic proxy mode according to claim 5, wherein: in the fourth step, a target object and a tangent plane class are respectively created, and then a proxy object is created by using a JAVA reflection mechanism.
7. A device for realizing the authentication of an interface caller in a dynamic proxy mode is characterized in that: comprises that
The main business logic definition module is used for defining a service interface API for a government affair service application system, defining an implementation class to implement the service interface API and rewriting a method for implementing business logic;
the section abstract class definition module is used for defining a section abstract class by using a design mode of a template method, and rewriting the section abstract class according to needs when defining the section abstract class, wherein the section abstract class is a service logic method of starting, ending, abnormal, prepositive enhancement and postpositive enhancement;
the section class definition module is used for creating a section class, configuring an entry point and an enhancement in the section class, rewriting a section abstract class template preposed enhancement interface after determining the entry point, and verifying the identity of a caller;
and the generation dynamic proxy class test module is used for testing whether the interface authentication of the service interface API caller can be realized by generating a dynamic proxy class, and comprises the steps of creating a service interface API object needing authentication, then defining a tangent plane object, dynamically creating a proxy object, increasing the authentication operation of the service interface API caller according to the preposed enhancement of the tangent plane class, and directly calling the proxied service interface API if the authentication is successful so as to realize the calling of service logic.
8. The apparatus for implementing interface caller authentication in dynamic proxy mode according to claim 7, wherein: and the section class definition module performs MD5 encryption calculation on the preposed enhanced interface by using App ID and AppSecre, compares the result with a signature Sign of a calling party of the service interface API to determine whether the result is consistent, and if so, considers that the authentication is successful, otherwise, fails.
9. The apparatus for implementing interface caller authentication in dynamic proxy mode according to claim 7, wherein: the dynamic proxy class test generation module dynamically creates a proxy object by adopting a CGlib dynamic proxy mode, and creates the proxy object by utilizing a JAVA reflection mechanism after a target object and a tangent plane class are created.
CN202111344191.XA 2021-11-15 2021-11-15 Method and device for realizing interface caller authentication in dynamic proxy mode Pending CN113779638A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111344191.XA CN113779638A (en) 2021-11-15 2021-11-15 Method and device for realizing interface caller authentication in dynamic proxy mode

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111344191.XA CN113779638A (en) 2021-11-15 2021-11-15 Method and device for realizing interface caller authentication in dynamic proxy mode

Publications (1)

Publication Number Publication Date
CN113779638A true CN113779638A (en) 2021-12-10

Family

ID=78957106

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111344191.XA Pending CN113779638A (en) 2021-11-15 2021-11-15 Method and device for realizing interface caller authentication in dynamic proxy mode

Country Status (1)

Country Link
CN (1) CN113779638A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116049582A (en) * 2023-03-31 2023-05-02 深圳依时货拉拉科技有限公司 WebView monitoring method, computer device and computer readable storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060156418A1 (en) * 2005-01-10 2006-07-13 Ibm Corporation Method and apparatus for preventing unauthorized access to data
CN106528185A (en) * 2015-09-09 2017-03-22 阿里巴巴集团控股有限公司 Application interface management method and apparatus
CN111314306A (en) * 2020-01-17 2020-06-19 网易(杭州)网络有限公司 Interface access method and device, electronic equipment and storage medium
CN111881102A (en) * 2020-07-29 2020-11-03 浪潮云信息技术股份公司 Method, device and readable medium for collecting audit logs based on AOP (automatic optical plane protocol) section

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060156418A1 (en) * 2005-01-10 2006-07-13 Ibm Corporation Method and apparatus for preventing unauthorized access to data
CN106528185A (en) * 2015-09-09 2017-03-22 阿里巴巴集团控股有限公司 Application interface management method and apparatus
CN111314306A (en) * 2020-01-17 2020-06-19 网易(杭州)网络有限公司 Interface access method and device, electronic equipment and storage medium
CN111881102A (en) * 2020-07-29 2020-11-03 浪潮云信息技术股份公司 Method, device and readable medium for collecting audit logs based on AOP (automatic optical plane protocol) section

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116049582A (en) * 2023-03-31 2023-05-02 深圳依时货拉拉科技有限公司 WebView monitoring method, computer device and computer readable storage medium

Similar Documents

Publication Publication Date Title
US9665463B2 (en) In-process wrapped execution engine(s) for tooling a dynamic program across a process boundary
CN111367821B (en) Software testing method and system
CN112491948A (en) Non-invasive monomer application micro-service method and device and computer equipment
CN113225379A (en) Method and device for sending HTTP request message
CN113779638A (en) Method and device for realizing interface caller authentication in dynamic proxy mode
CN112395568A (en) Interface authority configuration method, device, equipment and storage medium
CN111338866B (en) Cloud host pressure testing method and system based on shadow virtual machine
CN112835639A (en) Hook implementation method, device, equipment, medium and product
CN112650689A (en) Test method, test device, electronic equipment and storage medium
CN113760397A (en) Interface call processing method, device, equipment and storage medium
CN110599112B (en) Network page development and maintenance method and device
CN111414154A (en) Method and device for front-end development, electronic equipment and storage medium
CN112417402B (en) Authority control method, authority control device, authority control equipment and storage medium
CN109739666A (en) Striding course call method, device, equipment and the storage medium of singleton method
CN115757084A (en) Test method and test device and storage medium
US11429383B2 (en) Method, device, and program product for managing development job in development environment
CN112053137A (en) Flow prediction method, electronic device and server cluster
CN112363700A (en) Cooperative creation method and device of intelligent contract, computer equipment and storage medium
JP2001350650A (en) Inspecting method and device for software program equivalency, and recording medium therefor
CN110286956B (en) Plug-in operation method and device and electronic equipment
CN111506301B (en) Method for bypassing system restriction reflection call and related equipment
CN113656312A (en) Test data generation method and device and computing equipment
CN117234626A (en) Method and device for checking interface parameters, server and storage medium
CN115878349A (en) Application programming interface calling method, computer device and readable storage medium
CN113760707A (en) Interface testing method, device, equipment and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20211210