CN109471658A - A method of the fast construction target drone environment based on container - Google Patents

A method of the fast construction target drone environment based on container Download PDF

Info

Publication number
CN109471658A
CN109471658A CN201811375937.1A CN201811375937A CN109471658A CN 109471658 A CN109471658 A CN 109471658A CN 201811375937 A CN201811375937 A CN 201811375937A CN 109471658 A CN109471658 A CN 109471658A
Authority
CN
China
Prior art keywords
target drone
environment
loophole
container
mirror image
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811375937.1A
Other languages
Chinese (zh)
Inventor
罗阿文
江佳峻
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan Changhong Electric Co Ltd
Original Assignee
Sichuan Changhong Electric Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Changhong Electric Co Ltd filed Critical Sichuan Changhong Electric Co Ltd
Priority to CN201811375937.1A priority Critical patent/CN109471658A/en
Publication of CN109471658A publication Critical patent/CN109471658A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/70Software maintenance or management
    • G06F8/71Version control; Configuration management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/70Software maintenance or management

Abstract

The method of the invention discloses a kind of fast construction target drone environment based on container, comprising steps of A. builds container cloud infrastructure using open source kubernetes technology;B. target drone environment Dockerfile file is write, target drone mirror image is constructed using docker build, the Version Control of target drone is carried out by the tag label of mirror image;C. step B is repeated to each loophole and builds standard target drone mirror image, kubernetes API is called to write each loophole target drone environment constructed in key deployment program creation web program unified management step B;D. it submits publication to write the Dockerfile file finished, automation building mirrored procedure is realized by pipeline pipeline, the mirror image of building is published in the target drone image listing of web terminal and service is provided.Method of the invention the building come unified target drone loophole environment using containerization technique docker, is included in management for docker container customize in conjunction with container orchestration technology kubernetes, has the advantages that with with burning after building use.

Description

A method of the fast construction target drone environment based on container
Technical field
The present invention relates to target drone environmental structure technical field, in particular to a kind of fast construction target drone environment based on container Method.
Background technique
Currently, the mode for now generalling use conventional virtual machine deployment in industry builds target drone environment, virtual machine builds operation Complexity, preparation process is long, even if build still can lead to the ring built because of the factor of various environment in the same fashion Border is different, and distributing target drone by way of virtual machine image can be limited by mirror image size.
And another vagrant technology used is built involved in scheme and this patent of target drone environment on the market Docker technology, which is compared, also lacks certain ease for use.The docker technology referred in patent is widely used currently on the market, There are many reliable container cloud containerization application is deployed in items in commerce, is a kind of more mature technology choosing Type, and our information security field target drone environment also lack standard, the target that leak analysis personnel are respectively built by various technologies Machine can not effectively integration get up with the target drone of help company or community distribution, dispose, test.
Summary of the invention
It is insufficient in above-mentioned background technique the purpose of the present invention is overcoming, a kind of fast construction target drone ring based on container is provided The method in border using containerization technique docker building come unified target drone loophole environment, and combines container orchestration technology The docker container customized is included in management by kubernetes, with with building, is burnt after, is rationally utilized server resource, More easily distribution target drone environment assists leak analysis personnel, and penetration testing personnel learn reproduction, analysis, study loophole technology.
In order to reach above-mentioned technical effect, the present invention takes following technical scheme:
A method of the fast construction target drone environment based on container, comprising the following steps:
A. container cloud infrastructure is built using open source kubernetes technology, that is, establishes target drone environmental infrastructure;
B. target drone environment Dockerfile file is write, target drone mirror image is constructed using docker build, specifically such as in standard It executes instruction under the target drone associated documents catalogue got ready such as `docker build-tsome-vul:lastest-f Mirror image building can be completed in Dockerfile.`, is become by the some-vul:latest in the tag label such as above-metioned instruction of mirror image More latest is v1.0, Version Control of the customized tag label such as v2.0 to target drone;
In this step, when writing target drone environment Dockerfile file, which can make target drone build process complete Automation after constructing target drone mirror image using docker build, can pay attention to excellent by mirror image persistent storage, and during customizing Change, mirror image size can be effectively reduced, the mirror image of building can arbitrarily be distributed, and ensure that each personnel got get standard The target drone of change reduces unnecessary trouble, while the Version Control of target drone can be carried out by the tag label of mirror image;
C. step B is repeated to each loophole and builds standard target drone mirror image, kubernetes API is called to write a key portion The each loophole target drone environment constructed in administration program creation web program unified management step B;
Concrete principle are as follows: the docker mirror for being built us using kubernetes API Calls docker daemon As operation is at docker container, it is easily accessible that kubernetes can provide interim port for target drone environmental chamber, can using API The ip of container is easily got, the occupation condition monitoring information of the network informations such as port and current container is convenient for The scheduling of machine resources equally can use after the test of target drone environmental chamber or research of operation to be utilized Mono- key pin of kubernetes API is disfeatured device, recycling machine resource;
D. it submits publication to write the Dockerfile file finished, automation building mirror image is realized by pipeline pipeline Process, while the mirror image of building being published in the target drone image listing of web terminal, service is provided;Loophole target drone environment can be completed Container cloud foundation.
Further, target drone environment Dockerfile file write in the step B be specifically includes the following steps:
S1. specific target drone environment is established for loophole, document is described according to loophole and is reappeared using virtual machine simulation loophole Required environment;
S2. it records operating system, be related to the element of component, environment configurations, the process of record debugging loophole reproduction environment In used instruction;
S3. dockerfile is write as loophole target drone environment scripting according to record, is abstracted the artificial build process of target drone Dockerlize is docker container, and same loophole target drone environment is constructed by dockerfile;It then may make loophole environment It is standardized, and is distributed using dockerfile, transmitted, reconstruct is founded a capital very convenient, and is easy to achieve.
Further, submit publication that can call continuous integrating when writing the Dockerfile file finished in the step D Tool, in the prior art existing continuous integrating tool.
Further, the continuous integrating tool is jenkins.
Compared with prior art, the present invention have it is below the utility model has the advantages that
The method of fast construction target drone environment based on container of the invention, solves the target drone ring needed in penetration testing Border can not rapid deployment, delete, pollute hosted environment, generate the technical problems such as insecurity factor, in technical solution of the present invention This is solved the problems, such as using containerization technique currently popular, is disposed when reaching use, is burnt after, guarantees host safety Effect;
And in combination with each company's situation realize a key deployment, with build with, have the characteristics that be easily managed, for establish public affairs The loophole target drone environment data base of department, assist infiltration tester study etc. have very big help.It is realized using container technique Occupied space is smaller, transmission of being more convenient for, the effect shared, in conjunction with the container orchestration technology such as kubernetes etc. of existing maturation, Easy-to-use standardization " target drone cloud " can be achieved, there are certain market prospects.
Detailed description of the invention
Fig. 1 is the loophole target drone environment mirror building flow diagram in one embodiment of the present of invention.
Specific embodiment
Below with reference to the embodiment of the present invention, the invention will be further elaborated.
As shown in Figure 1, a kind of method of the fast construction target drone environment based on container, possesses and once builds, use at any time, Be conveniently distributed, i.e. the characteristics of burning after, can help information safety staff with low O&M cost, the mode of fast and flexible is built Target drone is used to study and test, and can effectively solve target drone method complicated difficult of manually building traditional in information security field and use, nothing The full-automatic scripting of method realizes that the target drone environment built lacks standard, and not easy to maintain, O&M cost is high, is not easy to distribute etc. and ask Topic.
Basic technology stack employed in the method for the fast construction target drone environment based on container of the present embodiment mainly wraps It includes: instantly popular container technique docker and container orchestration technology kubernetes, instantly with being related in extensive DevOps And the automatic flow thought that arrives and in scripting target drone environmental structure process, reduction manually adjusts, and establishes standardization loophole Target drone enviroline introduces the technical essential of community's contribution.
Specifically, in conjunction with above-mentioned technology stack, the side of the fast construction target drone environment based on container of the present embodiment Method the following steps are included:
Step 1. establishes target drone environmental infrastructure;Container cloud infrastructure is built using open source kubernetes technology.
Specifically, container cloud infrastructure builds the complete kubernetes container cloud environment that usable cloud manufacturer provides Or it is built in self-built computer room by kubernetes official document (https: //kubernetes.io/docs/setup/) guide Kubernetes environment, building for docker environment is precondition in the process, has deployment in detail in official document Guidance, when specific implementation, can be used as reference, and details are not described herein again.
Step 2. writes target drone environment Dockerfile file, which be fully automated target drone build process, uses After docker build constructs target drone mirror image, can mirror image persistent storage be paid attention to optimization during customizing, can be effectively reduced Mirror image size adds rm instruction and cleans up the caching generated in current building stage stage in time when such as writing Dockerfile Rubbish, downloading remnants etc. reach optimization purpose, and the mirror image constructed can arbitrarily be distributed, and ensure that compress mirror image size The personnel each got get standardized target drone, reduce unnecessary trouble, while as above by the tag label of mirror image The some-vul:latest change latest stated in instruction is v1.0, version control of the customized tag label such as v2.0 to target drone System.
Specific target drone environment specially is established for loophole, describing document or specific condition manual type according to loophole makes The environment needed for virtual machine simulation loophole reproduction, records operating system (OS), is related to component (Component), environment is matched Elements such as (env config) are set, instruction used during debugging loophole reproduction environment is recorded, is write as according to record Loophole target drone environment scripting, specific embodiment can refer to phase when target drone is built in following embodiments by dockerfile Step is closed, being abstracted the artificial build process dockerlize of target drone is docker container, and same loophole target drone environment is thus Dockerfile building so that loophole environment is standardized, and is distributed using dockerfile, is transmitted, reconstruct is founded a capital It is very convenient, it is easy to achieve.
It is as follows that specific target drone builds example:
Specifically with Apache Synapse Remote Code Execution Vulnerability (vulnerability number: CVE-2017- in the present embodiment 15708) target drone illustrates for building:
S1.1. loophole document (http://cve.mitre.org/cgi-bin/cvename.cgi is read? name=CVE- 2017-15708) and other relevant documentations, it is simulated in the present embodiment especially by virtual machine Ubuntu 16.04LTS is built, Impacted ApacheSynapse version are as follows: 3.0.0,2.1.0,2.0.0,1.2,1.1.2,1.1.1,
S1.2. corresponding Java version can be obtained from loophole document, and the corresponding Java version used is obtained in the present embodiment This is 1.8.0_112,
S1.3. it is downloaded containing leaky Apache Synapse version 3 .0.0 from official website according to aforementioned selection one Apache Synapse 3.0.0, (http://synapse.apache.org/download/3.0.0/download.cgi), Entering under installation directory bin after decompression, operation ./synapse.sh starting service checks 1099 port opens,
S1.4. target drone builds completion, whether checks target drone using poc corresponding to the loophole (Proof of Concept) Success is built, if poc executes the desired effect for failing to obtain the description of loophole document, repeatedly above step, describes according to document Gradually adjustment reappears the condition of loophole triggering, until the target drone finally built generates poc and executes desired result.
Above-mentioned steps S1.1 to S1.4 is converted into Dockerfile file by S1.5, specific as follows:
1FROM java:8u111-alpine
2ADD synapse-3.0.0-bin.tar.gz/opt/software
3EXPOSE 1099
4CMD[“sh”,“/opt/software/synapse-3.0.0/bin/synapse.sh”]
S1.6. using the standardization target drone of docker build instruction one loophole of building, ` is executed instruction The Wait Orders such as dockerbuilf-t some-vul:latest-f Dockerfile.` execute instruction ` after being finished again Docker run--rm some-vul` run a target drone container, to the container execute poc check docker mirror image whether structure Build up function;
Step 3: each loophole repeats step 2 and builds standard target drone mirror image, and kubernetes API is called to create web journey Sequence is managed collectively each loophole target drone environment constructed in step 2, and the open source container tube of Google is specifically used in the present embodiment Reason scheme kubernetes implements the management and monitoring of target drone container, and complete Container Management side has been provided in kubernetes Case can be created, be monitored, dispatching, destroying target drone container, and principle is that docker API can be called to control using kubernetes Docker daemon runs the docker mirror image built in advance at docker container, and mentions automatically for target drone environmental chamber It is easily accessible for port, and the ip of these containers can be got using kubernetes API, the network informations such as port, and work as The occupation condition monitoring information of preceding container, it is fixed that these information provide being customized of behaviors such as creation, publication, destruction The foundation of system, entire customization procedure combine the thought of DevOps using provided by continuous integrating software jenkins Entire customization procedure is together in series by pipeline, illustrates this by taking the whole life cycle of a target drone container as an example below Customization process is core of the present invention:
A. after Dockerfile is committed to code storage by target drone founder in step 2, set out jenkins's Pipeline, it is automatic to construct mirror image and mirror image deposit docker registry, container instance is finally run into, such as:
B. the container instance in (a) can by kubernetes API acquire monitoring information, api interface such as:
GET/apis/apps/v1/namespaces/{namespace}/deployments/{name}/status
C. it by the occupation condition information and own service demand that obtain in (b), needs to close after being such as completed The demand for destroying container recycling computing resource, calls kubernetes API to realize this operation:
Interface is as follows:
$kubectl proxy
$curl-X DELETE-H'Content-Type:application/yaml'--data'
gracePeriodSeconds:0
orphanDependents:false
''http://127.0.0.1:8001/apis/apps/v1/namespaces/default/deployments/ deployment-example'
It is so that can easily create to construct in web program unified management step 2 using kubernetes API Each loophole target drone environment flexibly builds distribution target drone and fills company's slack resources to researcher or tester, while also Divide to use and build the not high target drone container of calculating demand, has saved company's O&M cost, and penetration testing personnel and loophole Analysis personnel flexibly and easily can be studied, exchange and be analyzed using target drone environment.
Step 4: the mirror image of building is published to in the target drone image listing of web terminal the service that provides, integration intra-company power Amount and community's strength are established container cloud -- " the target drone cloud " of loophole target drone environment jointly, back feeding community, study people for Community Safety Member provides fast and easily target drone usage experience, attracts more community's strength contribution target drones to build script with this.
It is understood that the principle that embodiment of above is intended to be merely illustrative of the present and the exemplary implementation that uses Mode, however the present invention is not limited thereto.For those skilled in the art, essence of the invention is not being departed from In the case where mind and essence, various changes and modifications can be made therein, these variations and modifications are also considered as protection scope of the present invention.

Claims (4)

1. a kind of method of the fast construction target drone environment based on container, which comprises the following steps:
A. container cloud infrastructure is built using open source kubernetes technology, that is, establishes target drone environmental infrastructure;
B. target drone environment Dockerfile file is write, constructs target drone mirror image using docker build, is marked by the tag of mirror image Label carry out the Version Control of target drone;
C. step B is repeated to each loophole and builds standard target drone mirror image, call kubernetes API creation web program unified The each loophole target drone environment constructed in management process B;
D. it submits publication to write the Dockerfile file finished, automation building target drone mirror image is realized by pipeline pipeline Process, while the target drone mirror image of building being published in the target drone image listing of web terminal, service is provided.
2. a kind of method of fast construction target drone environment based on container according to claim 1, which is characterized in that described Write target drone environment Dockerfile file in step B and be specifically includes the following steps:
S1. specific target drone environment is established for loophole, document is described according to loophole and is used needed for virtual machine simulation loophole reproduction Environment;
S2. it records operating system, be related to the element of component, environment configurations, institute during record debugging loophole reproduction environment The instruction used;
S3. dockerfile is write as loophole target drone environment scripting according to the record of step S2, abstract target drone was manually built Journey dockerlize is docker container, and same loophole target drone environment is constructed by dockerfile.
3. a kind of method of fast construction target drone environment based on container according to claim 1 or 2, which is characterized in that Continuous integrating tool can be called when realizing automation building target drone mirrored procedure by pipeline pipeline in the step D.
4. a kind of method of fast construction target drone environment based on container according to claim 3, which is characterized in that described Continuous integrating tool is jenkins.
CN201811375937.1A 2018-11-19 2018-11-19 A method of the fast construction target drone environment based on container Pending CN109471658A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811375937.1A CN109471658A (en) 2018-11-19 2018-11-19 A method of the fast construction target drone environment based on container

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811375937.1A CN109471658A (en) 2018-11-19 2018-11-19 A method of the fast construction target drone environment based on container

Publications (1)

Publication Number Publication Date
CN109471658A true CN109471658A (en) 2019-03-15

Family

ID=65673067

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811375937.1A Pending CN109471658A (en) 2018-11-19 2018-11-19 A method of the fast construction target drone environment based on container

Country Status (1)

Country Link
CN (1) CN109471658A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110888655A (en) * 2019-11-14 2020-03-17 中国民航信息网络股份有限公司 Application publishing method and device
CN111259406A (en) * 2020-01-14 2020-06-09 中国传媒大学 Automatic construction method and system for cloud native application vulnerability reproduction environment
CN111273926A (en) * 2020-01-14 2020-06-12 一飞智控(天津)科技有限公司 Airport client remote upgrade management method, system, storage medium and unmanned aerial vehicle
CN111708610A (en) * 2020-06-19 2020-09-25 北京神州泰岳软件股份有限公司 Database client construction method and database operation method
CN112468463A (en) * 2020-11-13 2021-03-09 福建福诺移动通信技术有限公司 Device and method for arranging scene capacity based on cloud native capacity gateway
CN113162954A (en) * 2021-06-23 2021-07-23 西南石油大学 Target drone creating method and network attack and defense training system
CN113157550A (en) * 2020-01-23 2021-07-23 北京华顺信安科技有限公司 Vulnerability environment management method and system based on container
CN113760448A (en) * 2021-04-30 2021-12-07 中科天玑数据科技股份有限公司 Big data management platform based on kubernets
US11500980B2 (en) 2020-02-11 2022-11-15 International Business Machines Corporation Automated and auditable framework to control software component changes in an application build process

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102436390A (en) * 2012-01-09 2012-05-02 华为数字技术有限公司 Method and equipment for upgrading software of multi-core processor
CN104410617A (en) * 2014-11-21 2015-03-11 西安邮电大学 Information safety attack and defense system structure of cloud platform
CN106406849A (en) * 2015-07-27 2017-02-15 索尼互动娱乐美国有限责任公司 Backward compatibility by algorithm matching, disabling features, or throttling performance
CN106873975A (en) * 2016-12-30 2017-06-20 武汉默联股份有限公司 Devops based on Docker persistently pays and automated system and method
CN106888254A (en) * 2017-01-20 2017-06-23 华南理工大学 A kind of exchange method between container cloud framework based on Kubernetes and its each module
US20170242689A1 (en) * 2016-02-22 2017-08-24 International Business Machines Corporation Language-Independent Program Composition using Containers
CN107179938A (en) * 2017-05-12 2017-09-19 北京理工大学 A kind of information security technology contest attacking and defending environment automatic deployment method
CN107409126A (en) * 2015-02-24 2017-11-28 思科技术公司 System and method for protecting enterprise computing environment safety
CN108512935A (en) * 2018-04-16 2018-09-07 腾讯科技(深圳)有限公司 data service system, method, server and computer readable storage medium

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102436390A (en) * 2012-01-09 2012-05-02 华为数字技术有限公司 Method and equipment for upgrading software of multi-core processor
CN104410617A (en) * 2014-11-21 2015-03-11 西安邮电大学 Information safety attack and defense system structure of cloud platform
CN107409126A (en) * 2015-02-24 2017-11-28 思科技术公司 System and method for protecting enterprise computing environment safety
CN106406849A (en) * 2015-07-27 2017-02-15 索尼互动娱乐美国有限责任公司 Backward compatibility by algorithm matching, disabling features, or throttling performance
US20170242689A1 (en) * 2016-02-22 2017-08-24 International Business Machines Corporation Language-Independent Program Composition using Containers
CN106873975A (en) * 2016-12-30 2017-06-20 武汉默联股份有限公司 Devops based on Docker persistently pays and automated system and method
CN106888254A (en) * 2017-01-20 2017-06-23 华南理工大学 A kind of exchange method between container cloud framework based on Kubernetes and its each module
CN107179938A (en) * 2017-05-12 2017-09-19 北京理工大学 A kind of information security technology contest attacking and defending environment automatic deployment method
CN108512935A (en) * 2018-04-16 2018-09-07 腾讯科技(深圳)有限公司 data service system, method, server and computer readable storage medium

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110888655A (en) * 2019-11-14 2020-03-17 中国民航信息网络股份有限公司 Application publishing method and device
CN111259406A (en) * 2020-01-14 2020-06-09 中国传媒大学 Automatic construction method and system for cloud native application vulnerability reproduction environment
CN111273926A (en) * 2020-01-14 2020-06-12 一飞智控(天津)科技有限公司 Airport client remote upgrade management method, system, storage medium and unmanned aerial vehicle
CN113157550A (en) * 2020-01-23 2021-07-23 北京华顺信安科技有限公司 Vulnerability environment management method and system based on container
US11500980B2 (en) 2020-02-11 2022-11-15 International Business Machines Corporation Automated and auditable framework to control software component changes in an application build process
CN111708610A (en) * 2020-06-19 2020-09-25 北京神州泰岳软件股份有限公司 Database client construction method and database operation method
CN111708610B (en) * 2020-06-19 2024-02-27 北京神州泰岳软件股份有限公司 Database client construction method and database operation method
CN112468463A (en) * 2020-11-13 2021-03-09 福建福诺移动通信技术有限公司 Device and method for arranging scene capacity based on cloud native capacity gateway
CN112468463B (en) * 2020-11-13 2023-04-11 福建福诺移动通信技术有限公司 Device and method for arranging scene capacity based on cloud native capacity gateway
CN113760448A (en) * 2021-04-30 2021-12-07 中科天玑数据科技股份有限公司 Big data management platform based on kubernets
CN113162954A (en) * 2021-06-23 2021-07-23 西南石油大学 Target drone creating method and network attack and defense training system

Similar Documents

Publication Publication Date Title
CN109471658A (en) A method of the fast construction target drone environment based on container
EP3115902B1 (en) Framework for automated testing of mobile apps
US10462018B2 (en) Managing a number of secondary clouds by a master cloud service manager
CN104750487B (en) A kind of development approach and starting method of mobile terminal APP
US20140129457A1 (en) An interactive organizational decision-making and compliance facilitation portal
US20120233588A1 (en) Blended service creation, test, and deployment environment for multiple service endpoints
US20120233589A1 (en) Software development kit for blended services
van Beek et al. Digital forensics as a service: Stepping up the game
CN113434158B (en) Custom management method, device, equipment and medium for big data component
CN105556505A (en) Legacy system
Dobrica et al. Experiencing native mobile health applications development
US20240086239A1 (en) Services development and deployment for backend system integration
US20210232494A1 (en) Network application testing using domain-specific natural language
KR102173137B1 (en) Method for providing remote test service for mobile application
Chowhan Hands-on Serverless Computing: Build, Run and Orchestrate Serverless Applications Using AWS Lambda, Microsoft Azure Functions, and Google Cloud Functions
Chen et al. On developing and deploying large-file upload services of personal cloud storage
CN115543491A (en) Microservice processing method and device
Sreeram Azure Serverless Computing Cookbook: Build and monitor Azure applications hosted on serverless architecture using Azure functions
Dumont et al. A mobile distributed system for remote resource access
CN110083589A (en) A kind of ability warehouse towards avionics system
Yuen et al. GitOps and Kubernetes: Continuous Deployment with Argo CD, Jenkins X, and Flux
Sen et al. Using DevOps paradigm to deploy web applications.
CN109960649A (en) Automatization test system
CN109167826A (en) The restocking method, apparatus and system of WEB application
Mustafa Understanding DevOps Concepts

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190315