CN111488182B - System configuration method, device, equipment and storage medium - Google Patents

System configuration method, device, equipment and storage medium Download PDF

Info

Publication number
CN111488182B
CN111488182B CN202010286254.XA CN202010286254A CN111488182B CN 111488182 B CN111488182 B CN 111488182B CN 202010286254 A CN202010286254 A CN 202010286254A CN 111488182 B CN111488182 B CN 111488182B
Authority
CN
China
Prior art keywords
configuration
target
visitor
shared
target visitor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010286254.XA
Other languages
Chinese (zh)
Other versions
CN111488182A (en
Inventor
郑海波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing ByteDance Network Technology Co Ltd
Original Assignee
Beijing ByteDance Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing ByteDance Network Technology Co Ltd filed Critical Beijing ByteDance Network Technology Co Ltd
Priority to CN202010286254.XA priority Critical patent/CN111488182B/en
Publication of CN111488182A publication Critical patent/CN111488182A/en
Application granted granted Critical
Publication of CN111488182B publication Critical patent/CN111488182B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44505Configuring for program initiating, e.g. using registry, configuration files

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Stored Programmes (AREA)

Abstract

The embodiment of the disclosure discloses a system configuration method, a device, equipment and a storage medium. The method comprises the following steps: responding to an access request of a target visitor to access application software in a target system, and determining a target visitor identifier of at least one preset access level corresponding to the target visitor, wherein the target visitor is a person with any preset access level; based on each target visitor identifier, calling a shared system configuration service, and determining target configuration parameters corresponding to the target visitors from a shared configuration table, wherein the shared configuration table records the mapping relation among the access level identifiers, the configuration items, the configuration parameters and the visitor identifiers; and completing the adaptation of the system configuration of the target visitor according to the target configuration parameters. Through the technical scheme, the personalized system configuration in the target system for realizing the software service through the network is realized more efficiently and flexibly, the development complexity is reduced, and the system expandability is improved.

Description

System configuration method, device, equipment and storage medium
Technical Field
Embodiments of the present disclosure relate to computer technology, and in particular, to a system configuration method, apparatus, device, and storage medium.
Background
With the rise of internet cloud Service, a Software-as-a-Service (SaaS) system has become a mainstream form of an enterprise information Service system. The multi-tenant SaaS system architecture is an architecture form commonly adopted in the industry, namely, saaS services are provided for a plurality of tenants through a set of public cloud systems, all data are stored in a set of database clusters, and each tenant uses the SaaS cloud services like a single-sharing system through a logical isolation mode.
Like conventional software systems, there is also much system configuration information in SaaS systems. In the traditional software system, only the data of the enterprise is provided in the system, so that the configuration of the system only affects the enterprise. However, in the multi-tenant SaaS system, since a plurality of tenants share the whole public cloud system, configuration of the system may affect all tenants. For example, when the system general-purpose functions are upgraded, the configuration of all tenants needs to be upgraded; when a tenant modifies configuration information, system configuration of the tenant only needs to be affected; when a user modifies configuration information according to personal preference, it is necessary to influence only the system configuration of the user. I.e. multi-tenant SaaS systems, the effective range of system configuration is different, which is a complex place than traditional software systems.
The system configuration of the existing SaaS system is implemented according to the design of a conventional software system, which designs the functional distinction of the system configuration at the system level and the system configuration at the tenant level, that is, the configuration of the system and the configuration of the tenant are regarded as different parts, one setting is applied to the "system" and one setting is applied to the "user". According to the implementation manner, if the system configuration of the user level is further increased, a configuration function design is further added, so that three independent system configuration functions exist in the SaaS system. And, every time a tenant is added in the system, a corresponding tenant-level system configuration function is added for the tenant, and a corresponding user-level system configuration function is required to be added for a real user under the tenant.
However, the system configuration implementation manner cannot exert the advantages of the SaaS system, and the multi-tenant architecture is regarded as a separate enterprise application, and each time one tenant is added, the complete system configuration is performed for the tenant, so that the implementation cost is high. And aiming at the same function, a plurality of function implementation designs exist in the system, so that the complexity of the system design is increased, the work of repeated logic development exists, code logics are crossed, but the function logics are independent, so that the system is somewhat chaotic and easy to make mistakes.
Disclosure of Invention
The present disclosure provides a system configuration method, apparatus, device, and storage medium to more efficiently implement personalized system configuration in a target system for implementing a software service through a network, reduce system complexity, and improve system scalability.
In a first aspect, an embodiment of the present disclosure provides a system configuration method, including:
responding to an access request of a target visitor to access application software in a target system, and determining a target visitor identifier of at least one preset access level corresponding to the target visitor, wherein the target visitor is a person with any preset access level;
based on each target visitor identifier, calling a shared system configuration service, and determining target configuration parameters corresponding to the target visitor from a shared configuration table, wherein the shared configuration table records the mapping relation among the access level identifiers, the configuration items, the configuration parameters and the visitor identifiers;
and completing the adaptation of the system configuration of the target visitor according to the target configuration parameters.
In a second aspect, embodiments of the present disclosure further provide a system configuration apparatus, including:
The target visitor identification determining module is used for determining target visitor identification of at least one preset access level corresponding to a target visitor in response to an access request of the target visitor to the application software in the target system, wherein the target visitor is any person with the preset access level;
the target configuration parameter determining module is used for calling a shared system configuration service based on each target visitor identifier, and determining target configuration parameters corresponding to the target visitors from a shared configuration table, wherein the shared configuration table records the mapping relation among the access level identifiers, the configuration items, the configuration parameters and the visitor identifiers;
and the system configuration module is used for completing the adaptation of the system configuration of the target visitor according to the target configuration parameters.
In a third aspect, embodiments of the present disclosure further provide an electronic device, including:
one or more processors;
storage means for storing one or more programs,
the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the system configuration methods provided by any of the embodiments of the present disclosure.
In a fourth aspect, the embodiments of the present disclosure further provide a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the system configuration method provided by any of the embodiments of the present disclosure.
According to the embodiment of the disclosure, the common system configuration service is formed by converging the functions of the common system configuration corresponding to different preset access levels in the application software of the target system for realizing the software service through the network into one set of logic, and meanwhile, the common configuration table is maintained in the target system to store the system configuration parameter information of the different preset access levels, so that a software foundation is provided for subsequent system configuration, the realization logic of the system configuration is simplified, the development complexity is reduced, and the system expandability is improved based on the expandability of the common configuration table. Determining a target visitor identifier of at least one preset access level corresponding to a target visitor by responding to an access request of the target visitor to access application software in a target system; based on the identification of each target visitor, calling a shared system configuration service, and determining target configuration parameters corresponding to the target visitor from a shared configuration table; and completing the adaptation of the system configuration of the target visitor according to the target configuration parameters. When the user accesses the application software of the target system, the configuration parameters suitable for the user are determined according to at least one preset access level corresponding to the user, the system configuration is completed, and the implementation convenience and efficiency of the personalized system configuration of the application software in the target system are improved.
Drawings
The above and other features, advantages, and aspects of embodiments of the present disclosure will become more apparent by reference to the following detailed description when taken in conjunction with the accompanying drawings. The same or similar reference numbers will be used throughout the drawings to refer to the same or like elements. It should be understood that the figures are schematic and that elements and components are not necessarily drawn to scale.
FIG. 1 is a flow chart of a system configuration method in accordance with a first embodiment of the present disclosure;
FIG. 2 is a schematic diagram of a system configuration logic relationship with multiple preset access levels in a second embodiment of the present disclosure;
fig. 3 is a flowchart of a system configuration method in a second embodiment of the present disclosure
FIG. 4 is a schematic diagram of a system configuration device according to a third embodiment of the present disclosure;
fig. 5 is a schematic structural diagram of an electronic device in a fourth embodiment of the present disclosure.
Detailed Description
Embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While certain embodiments of the present disclosure have been shown in the accompanying drawings, it is to be understood that the present disclosure may be embodied in various forms and should not be construed as limited to the embodiments set forth herein, but are provided to provide a more thorough and complete understanding of the present disclosure. It should be understood that the drawings and embodiments of the present disclosure are for illustration purposes only and are not intended to limit the scope of the present disclosure.
It should be understood that the various steps recited in the method embodiments of the present disclosure may be performed in a different order and/or performed in parallel. Furthermore, method embodiments may include additional steps and/or omit performing the illustrated steps. The scope of the present disclosure is not limited in this respect.
The term "including" and variations thereof as used herein are intended to be open-ended, i.e., including, but not limited to. The term "based on" is based at least in part on. The term "one embodiment" means "at least one embodiment"; the term "another embodiment" means "at least one additional embodiment"; the term "some embodiments" means "at least some embodiments. Related definitions of other terms will be given in the description below.
It should be noted that the terms "first," "second," and the like in this disclosure are merely used to distinguish between different devices, modules, or units and are not used to define an order or interdependence of functions performed by the devices, modules, or units.
It should be noted that references to "one", "a plurality" and "a plurality" in this disclosure are intended to be illustrative rather than limiting, and those of ordinary skill in the art will appreciate that "one or more" is intended to be understood as "one or more" unless the context clearly indicates otherwise.
Example 1
The system configuration method provided by the embodiment can be suitable for the system configuration of application software in a system (such as a SaaS system) for realizing software services through a network, and is particularly suitable for the system configuration for distinguishing the commonalities of different user levels. The method may be performed by a system configuration device of a software as a service system, which may be implemented by means of software and/or hardware, and which may be integrated in an electronic device, such as a supercomputer, a server or a server cluster, etc., on which the SaaS system is installed. Referring to fig. 1, the method of the present embodiment includes:
s110, determining a target visitor identifier of at least one preset access level corresponding to the target visitor in response to an access request of the target visitor to the application software in the target system.
The target visitor is any person with a preset access level. The target system is a system capable of implementing a software service through a network, for example, a SaaS system, and will be described hereinafter by taking the target system as an example of the SaaS system. The preset access level refers to a preset access level of a visitor in the system, which can be set according to the service requirement of the application software, and can be, for example, a system level, a tenant level, a group level, a user level and the like. For example, tenants, groups, and users herein can be understood as companies, corporate departments, and employees. The target visitor may be a person at the system level, a person at the tenant level, a person at the group level or the user level, or the like. Visitor identification refers to the visitor's code in the system, which may be a name, abbreviation, or number, etc. The system will set visitor identification for each visitor of the preset access level in advance. For example, the visitor identification at the system level needs to characterize that it does not belong to any tenant, e.g., may be set to "all"; the tenant-level visitor identification may be set to a two-digit number, such as "11"; the user-level visitor identification may be set to a four digit number, such as "1101". The target visitor identifier refers to a visitor identifier corresponding to the target visitor.
Because a plurality of preset access levels exist in the SaaS system, the scope of action is necessarily present between the preset access levels, that is, a priority difference exists between the preset access levels. Thus, for the same configuration item, the problems of data default supplement and data coverage exist among the configuration parameters corresponding to the preset access levels of different priorities. Based on the above, if a visitor with a certain preset access level accesses the system, the system responds to the access request of the target visitor to determine the priority corresponding to the preset access level and at least one preset access level corresponding to each priority below the preset access level. For example, in the case that the target visitor is at the user level and the user level is at the highest priority, four preset access levels including the system level, the tenant level, the group level and the user level may be determined. And then, determining the target visitor identifications corresponding to the target visitor identifications under different preset access levels, for example, determining 4 target visitor identifications in total.
S120, calling a shared system configuration service based on the identification of each target visitor, and determining target configuration parameters corresponding to the target visitor from a shared configuration table.
The shared system configuration service refers to a service for realizing various system configuration functions in the system, and is applicable to system configuration of each preset access level. The characteristics of the multi-tenant SaaS system determine that the configuration among all tenants can be common, namely, the configuration can be carried out on the whole cloud platform application in the SaaS system, so that all tenants on the platform are effective, and the configuration is very convenient for some general configurations. However, strict data isolation is needed between tenants, and system configuration of the tenants cannot affect other tenants. The true user on the tenant can also set some personalized configurations, such as theme colors and user head portraits, and can set on the system according to personal preference. Because of the characteristics of the SaaS system, the data are stored in a centralized way, all three types of configuration can be converged into one set of logic, so that the logic of the system configuration forms a single functional logic, and one set of shared system configuration service can be designed to realize the system configuration of each preset access level.
The common configuration table refers to a data table for storing configuration parameters and related information of various system configurations in the application software, and each application software in the SaaS system has and only has one common configuration table, and the common configuration table is applicable to the system configuration of each preset access level. Illustratively, the mapping relationship between the access level identifier, the configuration item, the configuration parameter, and the visitor identifier is recorded in the common configuration table. The access level identifier here is an identifier of a preset access level, which may be a name, abbreviation, number, or the like of the preset access level. Since the common configuration table is shared by all visitors of the preset access level, the access level identification and the visitor identification need to be recorded therein to distinguish the access level from the visitor. At the same time, the configuration items and the configuration parameters corresponding to each configuration item (i.e. the content of the configuration items) should also be recorded in the common configuration table.
Taking the example that the preset access level includes a system level, a tenant level, and a user level, a common configuration table as shown in table 1 below can be obtained. Record ids represent the table numbers of each record, access level identities are system, tenant, and user, respectively, and tenant and user ids are visitor identities. Each preset access level can set the same configuration item. For example, for the configuration item "program page theme color", the configuration parameter corresponding to the system level (i.e., tenant id is "all") is set to "gray", which indicates that the program page theme color effective for all tenants on the application software in the SaaS system is gray; setting the configuration parameter corresponding to the tenant with the tenant id of 11 as blue, which means that all users under the tenant see blue when accessing the portal page; the configuration parameter corresponding to the user with the user id of 11001 in the tenant id of 11 is set to be red, which means that the user sees red when accessing the portal page.
Table 1 common configuration table example
Figure BDA0002448615350000081
Figure BDA0002448615350000091
After each target visitor identifier is determined, a common system configuration service needs to be called to search configuration parameters of each configuration item corresponding to each target visitor identifier from a common configuration table, and data coverage processing needs to be performed on the configuration parameters of the same configuration item, so that each configuration item only retains one configuration parameter (i.e., target configuration parameter) adapted to the target visitor.
The manner in which the common system configuration service looks up the table is related to the recorded contents and structure of the common configuration table. For example, when the common configuration table is as shown in table 1, configuration parameters of all configuration items of the system level are recorded therein, but for the tenant level and the user level, configuration parameters of only configuration items of tenant and user personalized modifications are recorded. For such a common configuration table, the common system configuration service needs to acquire the configuration parameters of each corresponding configuration item according to each target visitor identifier, and then cover the configuration parameters of the same configuration item. If a set of configuration items and configuration parameters are copied for each visitor identifier in each preset access level in the common configuration table, the common system configuration service only needs to directly read the configuration parameters of each corresponding configuration item according to the target visitor identifier of the preset access level corresponding to the target visitor.
Illustratively, the common configuration table is pre-created by: if the application software is on line, initializing a common configuration table according to the system level identification, each configuration item, the preset configuration parameters of the corresponding configuration item and the system visitor identification. The preset configuration parameters are default parameter values preset for each configuration item in the application software. The system visitor identity is a visitor identity corresponding to the system level, e.g. "all". The default configuration parameters of the system of each configuration item are initially stored in the common configuration table, and are used as spam configuration parameters of each configuration item, the design is completed in the development stage of the application software, and the initialization is completed through the running of scripts along with the online of the application software. Only the data record with the tenant id of 'all' in the common configuration table at this time.
S130, completing the adaptation of the system configuration of the target visitor according to the target configuration parameters.
After determining the target configuration parameters adapted to the target visitor, the SaaS system configures the configuration items in the application software according to the target configuration parameters, thereby completing the personalized system configuration of the target visitor.
According to the technical scheme, the common system configuration service is formed by converging the functions of the common system configuration corresponding to different preset access levels in the application software of the SaaS system into one set of logic, meanwhile, a common configuration table is maintained in the SaaS system to store the system configuration parameter information of the different preset access levels, a software foundation is provided for subsequent system configuration, the realization logic of the system configuration is simplified, the development complexity is reduced, the characteristics and advantages of the multi-tenant SaaS system are fully exerted, and the system expandability is improved based on the expandability of the common configuration table. Determining a target visitor identifier of at least one preset access level corresponding to a target visitor by responding to an access request of the target visitor to access application software in a target system; based on the identification of each target visitor, calling a shared system configuration service, and determining target configuration parameters corresponding to the target visitor from a shared configuration table; and completing the adaptation of the system configuration of the target visitor according to the target configuration parameters. When the user accesses the application software of the SaaS system, the configuration parameters adapted to the user are determined according to at least one preset access level corresponding to the user, the system configuration is completed, and the implementation convenience and efficiency of the personalized system configuration of the application software in the SaaS system are improved.
On the basis of the technical scheme, if the system level in the preset access level is the lowest priority, if the function of the application software is upgraded, calling the shared system configuration service based on the system level identification, the upgrade configuration item, the upgrade configuration parameter and the system visitor identification, adding upgrade configuration data into the shared configuration table, and updating the shared configuration table.
The upgrade configuration item refers to a configuration item corresponding to an upgrade function of the application software. The upgrade configuration parameters refer to default parameters of the system corresponding to the upgrade configuration items. The upgrade configuration data refers to a table record corresponding to the upgraded function.
In the related art, after each upgrade of the cloud service system, if the upgrade in terms of system configuration is related, the configuration information is updated for each tenant, and the operation and maintenance costs are high. However, in the present disclosure, the system level is set to the lowest priority, which is used as the spam configuration of the whole application software, and each preset access level shares one shared system configuration service and shared configuration table, so if the function of the application software is upgraded, as long as there are corresponding upgrade configuration items and upgrade configuration parameters in the shared configuration table, the normal operation of the upgrade function can be ensured, so that the system configuration upgrade in the process of the function upgrade can be implemented by adding upgrade configuration data corresponding to the upgraded function in the shared configuration table. In the implementation, the shared system configuration service is called, the system level identification, the upgrade configuration item, the upgrade configuration parameter and the system visitor identification are used as upgrade configuration data and added into the shared configuration table to update the shared configuration table, so that configuration upgrade in the function upgrade process is completed, and all tenants on the SaaS system can normally use the new upgraded functions without configuration setting for each tenant, thereby better playing the architecture advantages of the multi-tenant SaaS system and reducing the maintenance cost of system configuration.
Based on the above description, only the configuration data of the preset access level corresponding to the lowest priority is added in the common configuration table when configuration is upgraded. If a new preset access level is added in the system configuration, the expansion of the access level of the system configuration can be realized only by adding configuration data such as configuration items and configuration parameters for the new preset access level in the common configuration table. Similarly, if the priority of a new access level is defined in the system configuration, since there is only one set of shared system configuration services, the requirement can be satisfied by adding a new hierarchical definition without modifying the entire service and table structure. Therefore, the technical scheme of the present disclosure improves the expandability of the system configuration in the SaaS system.
Example two
The present embodiment further optimizes "based on each target visitor identifier, invokes the common system configuration service, and determines the target configuration parameter corresponding to the target visitor from the common configuration table" based on the target visitor identifier. On this basis, the relevant step of modifying the configuration parameters can be further added. Wherein the explanation of the same or corresponding terms as those of the above embodiments is not repeated herein.
The preset access level in this embodiment includes a system level, a tenant level, and a user level; the preset access level priority includes a system level of lowest priority, a tenant level of medium priority, and a user level of highest priority. In this priority order, the logical relationship of the preset access levels is shown in fig. 2. The priority order means that in the process of reading the configuration parameters, the data needs to be overlaid step by step in the order of user level, tenant level and system level.
Referring to fig. 3, the system configuration method of the software as a service system provided in this embodiment includes:
s210, determining a target visitor identifier of at least one preset access level corresponding to the target visitor in response to an access request of the target visitor to the application software in the target system.
S220, calling a shared system configuration service according to each target visitor identifier, and acquiring configuration items and configuration parameters corresponding to each target visitor identifier from a shared configuration table.
And calling a shared system configuration service to realize that all relevant configuration items and configuration parameters in the shared configuration table are required to be extracted for each target visitor identifier when the data in the shared configuration table is read according to each target visitor identifier.
The extracting process may be to extract the configuration data with high priority according to the priority of the preset access level (i.e. the priority of the preset access level) corresponding to each target visitor identifier, and if the configuration data does not exist, then sequentially reduce the priority to extract the configuration data corresponding to the corresponding priority. If the configuration data of a certain priority is read, the lower priority configuration data is not read any more. For example, for the configuration item of "portal page theme color", the configuration parameter of the user level is read first, and "red" is read, and then the configuration item determines that the target configuration parameter is "red". For the configuration item of 'login password complexity', the configuration parameter of the user level is read first, when no data is read, the configuration parameter of the tenant tense level is read continuously, and when '12-bit characters (number+letter+special character)', the configuration item determines that the target configuration parameter is '12-bit characters (number+letter+special character)'. For the configuration item with only default configuration parameters of the system, the user level and the tenant tense level of the user need to be read sequentially, and finally the configuration parameters of the system level of the system need to be read as the target configuration parameters of the configuration item.
The extraction process may be parallel data reading, in addition to the serial data reading method described above. Illustratively, S220 includes: and calling the shared system configuration service in parallel according to each target visitor identifier so as to simultaneously acquire configuration items and configuration parameters corresponding to each target visitor identifier from the shared configuration table. In order to improve the reading efficiency of the configuration data and further improve the determining efficiency of the subsequent target configuration parameters, in this embodiment, the configuration data corresponding to each target visitor identifier may be read in parallel. When the method is implemented, a shared system configuration service is called, and each configuration item and configuration parameters thereof corresponding to a target visitor identifier (namely, tenant id is 'all') of a system level are read from a shared configuration table; meanwhile, reading each configuration item corresponding to the target visitor identifier of the tenant level (namely, tenant id is 11) from the common configuration table and configuration parameters of each configuration item; meanwhile, each configuration item and its configuration parameters corresponding to the target visitor identification of the user level (i.e. tenant id is "11" and user id is "11001") are read from the common configuration table. It should be noted that if one piece of configuration data contains both tenant id and user id, the piece of configuration data is read at the user level. Therefore, the data query of one priority is not existed, and the data is read at one time, so that the realization logic in the system configuration can be further simplified, and the data processing efficiency is improved.
S230, merging the configuration parameters according to the configuration items and the preset access level priority, and generating target configuration parameters.
The preset access level priority is set according to specific service requirements, and in this embodiment, the order of priority from high to low of the user level, the tenant level, and the system level is taken as an example, that is, the priority of the system level is the lowest, which is the spam parameters or default parameters of all configuration items.
After all the configuration items and the configuration parameters are obtained, all the repeated configuration items are screened out according to the configuration items. And then, according to the preset access level priority, covering the data with low priority by using the data with high priority, namely covering the configuration parameters corresponding to the tenant level and the configuration parameters corresponding to the system level by using the configuration parameters corresponding to the user level, and covering the configuration parameters corresponding to the system level by using the configuration parameters corresponding to the tenant level. This allows for the merging of configuration parameters for duplicate configuration items. And finally, combining the configuration parameters after combination with the configuration parameters corresponding to the unrepeated configuration items to form all the target configuration parameters of the adaptive target visitor. Thus, the aim of preferential user personalized setting can be achieved.
S240, completing the adaptation of the system configuration of the target visitor according to the target configuration parameters.
S250, if the target visitor triggers the configuration parameter modification operation, judging whether configuration data corresponding to each target visitor identifier and the configuration item to be modified exist in the common configuration table.
After the application software is run, if the target visitor wants to modify the configuration parameters of a certain configuration item or items, the target visitor triggers the configuration parameter modification operation through the interaction interface. Through this triggering operation, the system may determine the configuration item to be modified. The system then needs to query the common configuration table for the presence of the corresponding configuration parameters. For example, when the target visitor is a user-level person, the configuration parameters are searched according to the configuration item to be modified, the tenant id and the user id. If the data is found, it indicates that the configuration parameters of the configuration item to be modified exist in the common configuration table, and the modification is only needed in the following step, that is, S270 is executed. If no data is found, it indicates that there are no configuration parameters of the configuration item to be modified in the common configuration table, and a new piece of configuration data needs to be added later, that is, S260 is performed.
And S260, if not, calling a shared system configuration service based on the preset access level corresponding to the target visitors, the identification of each target visitor, the configuration items to be modified and the configuration parameters to be modified, adding configuration data into the shared configuration table, and updating the shared configuration table.
The process of adding data records to the common configuration table is: calling a shared system configuration service, adding a preset access level (such as a user) corresponding to a target visitor, each target visitor identifier (such as tenant id is 11, user id is 11002), a configuration item to be modified (such as portal page theme color) and a modification configuration parameter (such as green) as modified configuration data into a shared configuration table, so as to update the shared configuration table, and completing one-time personalized setting of the target visitor.
S270, if yes, calling a shared system configuration service based on the identification of each target visitor, the configuration item to be modified and the configuration parameter to be modified, and updating the shared configuration table by covering the original configuration parameter in the configuration data with the configuration parameter to be modified.
The data record process in the common configuration table is modified as follows: and calling a shared system configuration service, uniquely positioning one piece of configuration data according to each target visitor identifier (for example, tenant id is 11, user id is 11001) and a configuration item to be modified (for example, portal page theme color), and then replacing the original configuration parameter (for example, red) with a modified configuration parameter (for example, pink), so as to complete modification of the configuration data, update a shared configuration table and complete one-time personalized setting of the target visitor.
According to the technical scheme of the embodiment, the shared system configuration service is called according to the target visitor identifications, and configuration items and configuration parameters corresponding to each target visitor identification are obtained from a shared configuration table; and merging the configuration parameters according to the configuration items and the preset access level priority to generate target configuration parameters. The system configuration is subjected to hierarchical configuration management based on the preset access level priority, and personalized settings corresponding to the target visitor can be rapidly displayed through the step-by-step coverage of configuration parameters, so that the flexibility of the personalized settings of the application software in the SaaS system is improved. Judging whether the configuration data corresponding to each target visitor identifier and the configuration item to be modified exist in the common configuration table or not by triggering configuration parameter modification operation by the target visitor; if not, calling a shared system configuration service based on a preset access level corresponding to the target visitor, each target visitor identification, a configuration item to be modified and a configuration parameter to be modified, adding configuration data into a shared configuration table, and updating the shared configuration table; if yes, calling a shared system configuration service based on the identification of each target visitor, the configuration item to be modified and the configuration parameter to be modified, and updating the shared configuration table by covering the original configuration parameter in the configuration data with the configuration parameter to be modified. The modification of the personalized settings of the application software in the SaaS system is realized, and the convenience and the flexibility of the personalized settings of the application software in the SaaS system are further improved.
Example III
The present embodiment provides a system configuration device of a software as a service system, referring to fig. 3, the device specifically includes:
a target visitor identifier determining module 410, configured to determine a target visitor identifier of at least one preset access level corresponding to a target visitor, in response to an access request of the target visitor to access an application software in a target system, where the target visitor is a person with any preset access level;
the target configuration parameter determining module 420 is configured to invoke a shared system configuration service based on each target visitor identifier, and determine a target configuration parameter corresponding to the target visitor from a shared configuration table, where the shared configuration table records a mapping relationship between the access level identifier, the configuration item, the configuration parameter and the visitor identifier;
the system configuration module 430 is configured to complete the adaptation of the system configuration of the target visitor according to the target configuration parameter.
Optionally, the target configuration parameter determination module 420 includes:
the configuration parameter acquisition sub-module is used for calling the shared system configuration service according to the target visitor identifications and acquiring configuration items and configuration parameters corresponding to each target visitor identification from the shared configuration table;
And the target configuration parameter generation sub-module is used for combining the configuration parameters according to the configuration items and the preset access level priority to generate the target configuration parameters.
The preset access level comprises a system level, a tenant level and a user level;
the preset access level priority includes a system level of lowest priority, a tenant level of medium priority, and a user level of highest priority.
Further, the configuration parameter acquisition submodule is specifically configured to:
and calling the shared system configuration service in parallel according to each target visitor identifier, and simultaneously acquiring configuration items and configuration parameters corresponding to each target visitor identifier from a shared configuration table.
Optionally, on the basis of the above device, the device further includes a configuration parameter modification module, configured to:
if the target visitor triggers the configuration parameter modification operation, judging whether configuration data corresponding to each target visitor identifier and the configuration item to be modified exist in the common configuration table;
if not, calling a shared system configuration service based on a preset access level corresponding to the target visitor, each target visitor identification, a configuration item to be modified and a configuration parameter to be modified, adding configuration data into a shared configuration table, and updating the shared configuration table;
If yes, calling a shared system configuration service based on the identification of each target visitor, the configuration item to be modified and the configuration parameter to be modified, and updating the shared configuration table by covering the original configuration parameter in the configuration data with the configuration parameter to be modified.
Optionally, on the basis of the device, the device further comprises a system function upgrading module for:
and under the condition that the system level in the preset access level is the lowest priority, if the function of the application software is upgraded, calling the shared system configuration service based on the system level identification, the upgrade configuration item, the upgrade configuration parameter and the system visitor identification, adding upgrade configuration data into the shared configuration table, and updating the shared configuration table.
Optionally, on the basis of the above apparatus, the apparatus further includes a common configuration table creation module for creating the common configuration table in advance by:
if the application software is on line, initializing a common configuration table according to the system level identification, each configuration item, the preset configuration parameters of the corresponding configuration item and the system visitor identification.
By means of the system configuration device of the software serving system, which is the third embodiment of the invention, the function of common system configuration corresponding to different preset access levels in application software of the SaaS system is converged into one set of logic to form a common system configuration service, meanwhile, a common configuration table is maintained in the SaaS system to store system configuration parameter information of different preset access levels, a software foundation is provided for subsequent system configuration, the realization logic of the system configuration is simplified, the development complexity is reduced, and the system expandability is improved based on the expandability of the common configuration table. Meanwhile, when the user accesses the application software of the SaaS system, the configuration parameters adapted to the user are determined according to at least one preset access level corresponding to the user, the system configuration is completed, and the implementation convenience and efficiency of the personalized system configuration of the application software in the SaaS system are improved.
The system configuration device of the software serving system provided by the embodiment of the disclosure can execute the system configuration method of the software serving system provided by any embodiment of the disclosure, and has the corresponding functional modules and beneficial effects of the execution method.
It should be noted that, in the embodiment of the system configuration device of the software-as-a-service system, each unit and module included are only divided according to the functional logic, but not limited to the above-mentioned division, so long as the corresponding functions can be implemented; in addition, the specific names of the functional units are also only for distinguishing from each other, and are not used to limit the protection scope of the present disclosure.
Example IV
Referring to fig. 5, a schematic diagram of an electronic device (e.g., a supercomputer or server) 500 suitable for use in implementing embodiments of the present disclosure is shown. The electronic device shown in fig. 5 is merely an example and should not be construed to limit the functionality and scope of use of the disclosed embodiments.
As shown in fig. 5, the electronic device 500 may include a processing means (e.g., a central processing unit, a graphics processor, etc.) 501, which may perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM) 502 or a program loaded from a storage 506 into a Random Access Memory (RAM) 503. In the RAM 503, various programs and data required for the operation of the electronic apparatus 500 are also stored. The processing device 501, the ROM 502, and the RAM 503 are connected to each other via a bus 504. An input/output (I/O) interface 505 is also connected to bus 504.
In general, the following devices may be connected to the I/O interface 505: input devices 506 including, for example, a touch screen, touchpad, keyboard, mouse, camera, microphone, accelerometer, gyroscope, etc.; an output device 507 including, for example, a Liquid Crystal Display (LCD), a speaker, a vibrator, and the like; storage 508 including, for example, magnetic tape, hard disk, etc.; and communication means 509. The communication means 509 may allow the electronic device 500 to communicate with other devices wirelessly or by wire to exchange data. While fig. 5 shows an electronic device 500 having various means, it is to be understood that not all of the illustrated means are required to be implemented or provided. More or fewer devices may be implemented or provided instead.
In particular, according to embodiments of the present disclosure, the processes described above with reference to flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a non-transitory computer readable storage medium, the computer program comprising program code for performing the method shown in the flowchart. In such an embodiment, the computer program may be downloaded and installed from a network via the communication means 509, or from the storage means 508, or from the ROM 502. When the computer program is executed by the processing device 501, the above-described functions defined in the system configuration method of the software-as-a-service system of the embodiment of the present disclosure are performed.
Example five
The present embodiment provides a computer-readable storage medium having stored thereon a computer program for executing a system configuration method of a software-as-a-service system when the computer program is executed by a processor.
It should be noted that the computer readable storage medium described above in the present disclosure may be a computer readable signal medium or a computer readable storage medium, or any combination of the two. The computer readable storage medium can be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples of the computer-readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this disclosure, a computer-readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In the present disclosure, however, the computer-readable signal medium may include a data signal propagated in baseband or as part of a carrier wave, with the computer-readable program code embodied therein. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A computer readable signal medium may also be any computer readable storage medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable storage medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, fiber optic cables, RF (radio frequency), and the like, or any suitable combination of the foregoing.
In some implementations, the clients, servers may communicate using any currently known or future developed network protocol, such as HTTP (HyperText Transfer Protocol ), and may be interconnected with any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include a local area network ("LAN"), a wide area network ("WAN"), the internet (e.g., the internet), and peer-to-peer networks (e.g., ad hoc peer-to-peer networks), as well as any currently known or future developed networks.
The computer-readable storage medium may be contained in the electronic device; or may exist alone without being incorporated into the electronic device.
The computer-readable storage medium carries one or more programs that, when executed by the electronic device, cause the electronic device to: responding to an access request of a target visitor to access application software in a target system, and determining a target visitor identifier of at least one preset access level corresponding to the target visitor, wherein the target visitor is a person with any preset access level; based on each target visitor identifier, calling a shared system configuration service, and determining target configuration parameters corresponding to the target visitors from a shared configuration table, wherein the shared configuration table records the mapping relation among the access level identifiers, the configuration items, the configuration parameters and the visitor identifiers; and completing the adaptation of the system configuration of the target visitor according to the target configuration parameters.
Of course, the computer-readable storage medium provided by the embodiments of the present disclosure, whose computer-executable instructions are not limited to the above-described method operations, may also perform related operations in the system configuration method of the software-as-a-service system provided by any of the embodiments of the present disclosure.
Computer program code for carrying out operations of the present disclosure may be written in one or more programming languages, including, but not limited to, an object oriented programming language such as Java, smalltalk, C ++ and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computer (for example, through the Internet using an Internet service provider).
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units involved in the embodiments of the present disclosure may be implemented by means of software, or may be implemented by means of hardware. Where the name of the unit does not constitute a limitation of the unit itself in some cases, for example, a system configuration unit may also be described as a "configuration system parameter unit".
The functions described above herein may be performed, at least in part, by one or more hardware logic components. For example, without limitation, exemplary types of hardware logic components that may be used include: a Field Programmable Gate Array (FPGA), an Application Specific Integrated Circuit (ASIC), an Application Specific Standard Product (ASSP), a system on a chip (SOC), a Complex Programmable Logic Device (CPLD), and the like.
In the context of this disclosure, a machine-readable medium may be a tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. The machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium. The machine-readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
According to one or more embodiments of the present disclosure, there is provided a system configuration method of a software-as-a-service system, including:
responding to an access request of a target visitor to access application software in a target system, and determining a target visitor identifier of at least one preset access level corresponding to the target visitor, wherein the target visitor is a person with any preset access level;
based on each target visitor identifier, calling a shared system configuration service, and determining target configuration parameters corresponding to the target visitors from a shared configuration table, wherein the shared configuration table records the mapping relation among the access level identifiers, the configuration items, the configuration parameters and the visitor identifiers;
and completing the adaptation of the system configuration of the target visitor according to the target configuration parameters.
According to one or more embodiments of the present disclosure, there is provided a system configuration method of a software-as-a-service system, further comprising:
optionally, based on each target visitor identification, invoking the common system configuration service, and determining the target configuration parameters corresponding to the target visitor from the common configuration table includes:
calling a shared system configuration service according to each target visitor identifier, and acquiring configuration items and configuration parameters corresponding to each target visitor identifier from a shared configuration table;
And merging the configuration parameters according to the configuration items and the preset access level priority to generate target configuration parameters.
According to one or more embodiments of the present disclosure, there is provided a system configuration method of a software-as-a-service system, further comprising:
the preset access level comprises a system level, a tenant level and a user level;
the preset access level priority includes a system level of lowest priority, a tenant level of medium priority, and a user level of highest priority.
According to one or more embodiments of the present disclosure, there is provided a system configuration method of a software-as-a-service system, further comprising:
according to each target visitor identifier, calling a shared system configuration service, and acquiring configuration items and configuration parameters corresponding to each target access identifier from a shared configuration table comprises:
and calling the shared system configuration service in parallel according to each target visitor identifier so as to simultaneously acquire configuration items and configuration parameters corresponding to each target visitor identifier from the shared configuration table.
According to one or more embodiments of the present disclosure, there is provided a system configuration method of a software-as-a-service system, further comprising:
If the target visitor triggers the configuration parameter modification operation, judging whether configuration data corresponding to each target visitor identifier and the configuration item to be modified exist in the common configuration table;
if not, calling a shared system configuration service based on a preset access level corresponding to the target visitor, each target visitor identification, a configuration item to be modified and a configuration parameter to be modified, adding configuration data into a shared configuration table, and updating the shared configuration table;
if yes, calling a shared system configuration service based on the identification of each target visitor, the configuration item to be modified and the configuration parameter to be modified, and updating the shared configuration table by covering the original configuration parameter in the configuration data with the configuration parameter to be modified.
According to one or more embodiments of the present disclosure, there is provided a system configuration method of a software-as-a-service system, further comprising:
in the case that the system level in the preset access level is the lowest priority, the method further includes:
if the function of the application software is upgraded, calling the shared system configuration service based on the system level identification, the upgrade configuration item, the upgrade configuration parameter and the system visitor identification, adding upgrade configuration data into the shared configuration table, and updating the shared configuration table.
According to one or more embodiments of the present disclosure, there is provided a system configuration method of a software-as-a-service system, further comprising:
the common configuration table is created in advance by:
if the application software is on line, initializing a common configuration table according to the system level identification, each configuration item, the preset configuration parameters of the corresponding configuration item and the system visitor identification.
According to one or more embodiments of the present disclosure, there is provided a system configuration apparatus of a software-as-a-service system, the apparatus comprising:
the target visitor identification determining module is used for responding to an access request of the target visitor to access the application software in the target system and determining target visitor identification of at least one preset access level corresponding to the target visitor, wherein the target visitor is any person with the preset access level;
the target configuration parameter determining module is used for calling the shared system configuration service based on the identification of each target visitor, and determining target configuration parameters corresponding to the target visitor from a shared configuration table, wherein the shared configuration table records the mapping relation among the access level identification, the configuration items, the configuration parameters and the visitor identification;
And the system configuration module is used for completing the adaptation of the system configuration of the target visitor according to the target configuration parameters.
According to one or more embodiments of the present disclosure, there is provided an electronic device [ example nine ], the electronic device comprising:
one or more processors;
storage means for storing one or more programs,
the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the system configuration method of the software-as-a-service system provided by any embodiment of the present disclosure.
According to one or more embodiments of the present disclosure, there is provided a computer-readable storage medium having a computer program stored thereon, characterized in that the computer program, when executed by a processor, implements a system configuration method of a software as a service system provided by any embodiment of the present disclosure.
The foregoing description is only of the preferred embodiments of the present disclosure and description of the principles of the technology being employed. It will be appreciated by persons skilled in the art that the scope of the disclosure referred to in this disclosure is not limited to the specific combinations of features described above, but also covers other embodiments which may be formed by any combination of features described above or equivalents thereof without departing from the spirit of the disclosure. Such as those described above, are mutually substituted with the technical features having similar functions disclosed in the present disclosure (but not limited thereto).
Moreover, although operations are depicted in a particular order, this should not be understood as requiring that such operations be performed in the particular order shown or in sequential order. In certain circumstances, multitasking and parallel processing may be advantageous. Likewise, while several specific implementation details are included in the above discussion, these should not be construed as limiting the scope of the present disclosure. Certain features that are described in the context of separate embodiments can also be implemented in combination in a single embodiment. Conversely, various features that are described in the context of a single embodiment can also be implemented in multiple embodiments separately or in any suitable subcombination.
Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are example forms of implementing the claims.

Claims (9)

1. A system configuration method, comprising:
responding to an access request of a target visitor to access application software in a target system, and determining a target visitor identifier of at least one preset access level corresponding to the target visitor, wherein the target visitor is a person with any preset access level;
Based on each target visitor identifier, calling a shared system configuration service, and determining target configuration parameters corresponding to the target visitor from a shared configuration table, wherein the shared configuration table records the mapping relation among the access level identifiers, the configuration items, the configuration parameters and the visitor identifiers;
completing the adaptation of the system configuration of the target visitor according to the target configuration parameters;
based on each target visitor identification, invoking a common system configuration service, and determining target configuration parameters corresponding to the target visitor from a common configuration table comprises:
according to each target visitor identifier, calling the shared system configuration service, and acquiring a configuration item and a configuration parameter corresponding to each target visitor identifier from the shared configuration table;
and merging the configuration parameters according to the configuration items and the preset access level priority to generate the target configuration parameters.
2. The method of claim 1, wherein the preset access levels include a system level, a tenant level, and a user level;
the preset access level priority includes the system level being the lowest priority, the tenant level being the medium priority, and the user level being the highest priority.
3. The method of claim 1, wherein invoking a common system configuration service based on each of the target visitor identifications, obtaining configuration items and configuration parameters corresponding to each of the target visitor identifications from the common configuration table comprises:
and calling a shared system configuration service in parallel according to each target visitor identifier so as to simultaneously acquire configuration items and configuration parameters corresponding to each target visitor identifier from the shared configuration table.
4. The method according to claim 1, wherein the method further comprises:
if the target visitor triggers configuration parameter modification operation, judging whether configuration data corresponding to each target visitor identifier and a configuration item to be modified exist in the common configuration table;
if not, calling the shared system configuration service based on the preset access level corresponding to the target visitor, the target visitor identification, the configuration item to be modified and the configuration parameter to be modified, adding the configuration data into the shared configuration table, and updating the shared configuration table;
if yes, calling the shared system configuration service based on the target visitor identifications, the configuration items to be modified and the configuration parameters to be modified, covering the original configuration parameters in the configuration data with the configuration parameters to be modified, and updating the shared configuration table.
5. The method according to claim 1, wherein in case the system level of the preset access levels is the lowest priority, the method further comprises:
and if the function of the application software is upgraded, calling the shared system configuration service based on a system level identifier, an upgrade configuration item, upgrade configuration parameters and a system visitor identifier, adding upgrade configuration data into the shared configuration table, and updating the shared configuration table.
6. The method according to any of claims 1-5, wherein the common configuration table is pre-created by:
if the application software is on line, initializing the common configuration table according to the system level identification, each configuration item, the preset configuration parameters of the corresponding configuration item and the system visitor identification.
7. A system configuration apparatus, comprising:
the target visitor identification determining module is used for determining target visitor identification of at least one preset access level corresponding to a target visitor in response to an access request of the target visitor to the application software in the target system, wherein the target visitor is any person with the preset access level;
The target configuration parameter determining module is used for calling a shared system configuration service based on each target visitor identifier, and determining target configuration parameters corresponding to the target visitors from a shared configuration table, wherein the shared configuration table records the mapping relation among the access level identifiers, the configuration items, the configuration parameters and the visitor identifiers;
the system configuration module is used for completing the adaptation of the system configuration of the target visitor according to the target configuration parameters;
the target configuration parameter determining module comprises:
the configuration parameter acquisition sub-module is used for calling the shared system configuration service according to the target visitor identifications and acquiring configuration items and configuration parameters corresponding to each target visitor identification from the shared configuration table;
and the target configuration parameter generation sub-module is used for combining the configuration parameters according to the configuration items and the preset access level priority to generate the target configuration parameters.
8. An electronic device, the electronic device comprising:
one or more processors;
storage means for storing one or more programs,
when executed by the one or more processors, causes the one or more processors to implement the system configuration method of any of claims 1-6.
9. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the system configuration method according to any of claims 1-6.
CN202010286254.XA 2020-04-13 2020-04-13 System configuration method, device, equipment and storage medium Active CN111488182B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010286254.XA CN111488182B (en) 2020-04-13 2020-04-13 System configuration method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010286254.XA CN111488182B (en) 2020-04-13 2020-04-13 System configuration method, device, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN111488182A CN111488182A (en) 2020-08-04
CN111488182B true CN111488182B (en) 2023-04-28

Family

ID=71812726

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010286254.XA Active CN111488182B (en) 2020-04-13 2020-04-13 System configuration method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111488182B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113641678A (en) * 2021-08-25 2021-11-12 杭州每刻科技有限公司 Dynamic service configuration method and system based on multi-dimensional form
CN115878210B (en) * 2021-09-29 2024-08-27 华为技术有限公司 System configuration processing method and related equipment
CN114244696B (en) * 2021-11-08 2023-09-22 网宿科技股份有限公司 Deployment method and configuration platform of configuration information

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101330402A (en) * 2007-08-01 2008-12-24 中兴通讯股份有限公司 Method for collocating business for customer equipment of individual network management business
US8887132B1 (en) * 2010-09-03 2014-11-11 Christopher R. Hunter Application runtime environment and framework
CN106161378A (en) * 2015-04-13 2016-11-23 中国移动通信集团公司 Security service device, method and business processing device, method and system
CN106506650A (en) * 2016-11-14 2017-03-15 用友网络科技股份有限公司 Interface adaptation method, interface adaptive device and server
CN110598381A (en) * 2019-09-16 2019-12-20 北京字节跳动网络技术有限公司 Data access method, device, equipment and storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101330402A (en) * 2007-08-01 2008-12-24 中兴通讯股份有限公司 Method for collocating business for customer equipment of individual network management business
US8887132B1 (en) * 2010-09-03 2014-11-11 Christopher R. Hunter Application runtime environment and framework
CN106161378A (en) * 2015-04-13 2016-11-23 中国移动通信集团公司 Security service device, method and business processing device, method and system
CN106506650A (en) * 2016-11-14 2017-03-15 用友网络科技股份有限公司 Interface adaptation method, interface adaptive device and server
CN110598381A (en) * 2019-09-16 2019-12-20 北京字节跳动网络技术有限公司 Data access method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN111488182A (en) 2020-08-04

Similar Documents

Publication Publication Date Title
CN111488182B (en) System configuration method, device, equipment and storage medium
EP3628080B1 (en) Systems and methods for updating and loading application
WO2018072634A1 (en) Application processing method and device
US11275635B2 (en) Method and system for managing and executing serverless functions in a messaging service
US11341208B2 (en) Mobile application bundled with metadata database
US20110258620A1 (en) Method and Apparatus for Making a BPM Application Available to Multiple Tenants
US11838248B2 (en) Managing and executing serverless function command sets in a messaging service
CN110704833A (en) Data permission configuration method, device, electronic device and storage medium
CN114035879A (en) Page theme color changing method and device, electronic equipment and computer readable medium
CN112243016A (en) Middleware platform, terminal equipment, 5G artificial intelligence cloud processing system and processing method
US20200257809A1 (en) Managing the sharing of common library packages with subscribers
CN110096543B (en) Data operation method, device, server and medium of application program
CN110717123B (en) Page response method and device, electronic equipment and storage medium
CN114327453B (en) Page display method, device, equipment and storage medium
CN116243926A (en) Service processing method, device, medium and electronic equipment
US11757976B2 (en) Unified application management for heterogeneous application delivery
CN113133072B (en) Method and device for controlling terminal, terminal and storage medium
CN113010428B (en) Method, device, medium and electronic equipment for testing server cluster
CN109669679B (en) Service detection and processing method and device and electronic equipment
CN113127550A (en) Information processing method, information processing device, electronic equipment and storage medium
CN112084003B (en) Method, device, medium and electronic equipment for isolating data
CN116700703B (en) Service processing method, device, equipment and storage medium
CN113641966B (en) Application integration method, system, equipment and medium
CN111382389B (en) Multi-theme page generation method and device, electronic equipment and storage medium
WO2024030112A1 (en) System and method for saving history information for view parameter data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant