CN112260855A - Method, equipment and storage medium for configuring functional module of network equipment - Google Patents

Method, equipment and storage medium for configuring functional module of network equipment Download PDF

Info

Publication number
CN112260855A
CN112260855A CN202011001859.6A CN202011001859A CN112260855A CN 112260855 A CN112260855 A CN 112260855A CN 202011001859 A CN202011001859 A CN 202011001859A CN 112260855 A CN112260855 A CN 112260855A
Authority
CN
China
Prior art keywords
network equipment
request
operation request
api
fed back
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011001859.6A
Other languages
Chinese (zh)
Other versions
CN112260855B (en
Inventor
周伊凡
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Abt Networks Co ltd
Original Assignee
Beijing Abt Networks Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Abt Networks Co ltd filed Critical Beijing Abt Networks Co ltd
Priority to CN202011001859.6A priority Critical patent/CN112260855B/en
Publication of CN112260855A publication Critical patent/CN112260855A/en
Application granted granted Critical
Publication of CN112260855B publication Critical patent/CN112260855B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]

Abstract

The invention relates to a method, a device and a storage medium for configuring a functional module of a network device, wherein the method comprises the following steps: sending an API operation request to the network equipment through an API interface of the network equipment so that the network equipment can verify the content in the API operation request, wherein the API request is json format data, and the content of the API operation request at least comprises an account password and operation content; and after the network equipment verifies the content in the API operation request, receiving an operation result fed back by the network equipment through an API interface of the network equipment, wherein the operation result is json format data. The invention solves the problem that the positioning element is not needed while the front-end and back-end interactive tests cannot be realized at present.

Description

Method, equipment and storage medium for configuring functional module of network equipment
Technical Field
The present invention relates to the field of network device testing technologies, and in particular, to a method, a device, and a storage medium for configuring a function module of a network device.
Background
At present, network devices generally implement function module addition, deletion, modification, and configuration tests through web pages or command lines.
When the Web page configuration is used, the data is generally transmitted to the PHP module through an html data format, the PHP module converts the data into xml format data and transmits the xml format data to the XMLD module, the XMLD module assembles the data into data which can be identified by a background and submits the data to the background through an IPC message, and after the background is executed, the result is returned to the Web page through the XMLD module and the PHP module; the method has no problem in realizing the basic configuration issuing test of the adding, deleting, modifying and checking of the functional module, if the automation is realized, the element of each button of the functional module must be positioned, the element positioning is time-consuming, and once the element position changes, the automation test is influenced, so the cost for automation through the web page is high.
When command line configuration is used, compared with web page configuration issuing, a plurality of processes are simplified, the configuration is directly sent to a function module background through an IPC message on a command line, the background executes the IPC message and then returns the result to the command line.
Therefore, in the prior art, there is no configuration method that can realize front-end and back-end interactive tests and does not need a positioning element.
Disclosure of Invention
In view of the above, it is desirable to provide a method, a device and a storage medium for configuring a function module of a network device, so as to solve the problem that no element needs to be located while the front-end and back-end interactive tests cannot be implemented at present.
In a first aspect, the present invention provides a method for configuring a functional module of a network device, including the following steps:
sending an API operation request to the network equipment through an API interface of the network equipment so that the network equipment can verify the content in the API operation request, wherein the API request is json format data, and the content of the API operation request at least comprises an account password and operation content;
and after the network equipment verifies the content in the API operation request, receiving an operation result fed back by the network equipment through an API interface of the network equipment, wherein the operation result is json format data.
Preferably, in the method for configuring a function module of a network device, the API operation request is one of an add operation request, a modify operation request, a delete operation request, and a query operation request.
Preferably, in the method for configuring a function module of a network device, when the API operation request is an add operation request, the step of receiving, by an API interface of the network device, an operation result fed back by the network device after the network device verifies the content in the API operation request specifically includes:
when the network equipment verifies that no account password exists in the adding operation request or the account password is incorrect, receiving a first state code fed back by the network equipment;
when the network equipment verifies that the account password exists in the operation adding request and the account password is correct, if the network equipment verifies that the operation adding request is illegal, receiving a second state code fed back by the network equipment;
and when the network equipment verifies that the operation adding request is legal, if the network equipment verifies that the operation content in the operation adding request exists, receiving a second state code fed back by the network equipment, otherwise, receiving a third state code fed back by the network equipment.
Preferably, in the method for configuring a function module of a network device, when the API operation request is a modification operation request, the step of receiving, by the API interface of the network device, an operation result fed back by the network device after the network device verifies the content in the API operation request specifically includes:
when the network equipment verifies that the account password does not exist in the modification operation request or the account password is incorrect, receiving a first state code fed back by the network equipment;
when the network equipment verifies that the modification operation request contains an account password and the account password is correct, if the data modified by the network equipment verification request does not exist, receiving a second state code fed back by the network equipment;
when the network equipment verifies that the data requested to be modified exists, if the network equipment verifies that the operation content in the modification operation request is illegal, receiving a second state code fed back by the network equipment, otherwise, receiving a third state code fed back by the network equipment.
Preferably, in the method for configuring a function module of a network device, when the API operation request is a delete operation request, the step of receiving, by the API interface of the network device, the operation result fed back by the network device after the network device verifies the content in the API operation request specifically includes:
when the network equipment verifies that the account password does not exist in the deletion operation request or the account password is incorrect, receiving a first status code fed back by the network equipment;
when the network equipment verifies that the deletion operation request contains an account password and the account password is correct, if the data deleted by the network equipment verification request does not exist, receiving a fourth status code fed back by the network equipment;
when the network equipment verifies that the data requested to be deleted exist, if the network equipment verifies that the data requested to be deleted are quoted, receiving a fourth status code fed back by the network equipment, otherwise, receiving a fifth status code fed back by the network equipment.
Preferably, in the method for configuring a function module of a network device, when the API operation request is a query operation request, the step of receiving, by an API interface of the network device, an operation result fed back by the network device after the network device verifies the content in the API operation request specifically includes:
when the network equipment verifies that the account password is not available in the inquiry operation request or the account password is incorrect, receiving a first status code fed back by the network equipment;
when the network equipment verifies that the inquiry operation request contains an account password and the account password is correct, if the data inquired by the network equipment verification request does not exist, receiving a fourth status code fed back by the network equipment, otherwise, receiving a fifth status code fed back by the network equipment.
Preferably, in the method for configuring a function module of a network device, the first status code is a 401 status code, the second status code is a 400 status code, the third status code is a 201 status code, the fourth status code is a 404 status code, and the fifth status code is a 200 status code.
In a second aspect, the present invention further provides a function module configuration device of a network device, including: a processor and a memory;
the memory has stored thereon a computer readable program executable by the processor;
the processor, when executing the computer readable program, implements the steps in the method for configuring a functional module of a network device as described above.
In a third aspect, the present invention also provides a computer-readable storage medium storing one or more programs, which are executable by one or more processors to implement the steps in the method for configuring the functional modules of the network device as described above.
[ PROBLEMS ] the present invention
The method, the equipment and the storage medium for configuring the functional module of the network equipment provided by the invention carry out configuration issuing and automatic testing of the functional module by introducing API configuration, can realize related tests of front-end and back-end interaction without a command line, and can realize addition, deletion, modification, testing and automatic testing of the functional module without positioning elements and without relation to page change positions.
Drawings
Fig. 1 is a flowchart of a method for configuring functional modules of a network device according to a preferred embodiment of the present invention;
FIG. 2 is a diagram of an operating environment of a function module configuration program of a network device according to a preferred embodiment of the present invention.
Detailed Description
The accompanying drawings, which are incorporated in and constitute a part of this application, illustrate preferred embodiments of the invention and together with the description, serve to explain the principles of the invention and not to limit the scope of the invention.
Referring to fig. 1, a method for configuring a function module of a network device according to an embodiment of the present invention includes the following steps:
s100, an API operation request is sent to the network equipment through an API interface of the network equipment, so that the network equipment can verify the content in the API operation request, wherein the API request is json format data, and the content of the API operation request at least comprises an account password and operation content.
In this embodiment, API configuration is introduced to perform function module configuration issuing and automated testing, where API configuration issues json format data to a PHP module of a network device, the PHP module of the network device converts the data into xml format data and issues the xml format data to an XMLD module, the XMLD module assembles the data into data that can be identified by a function module background and submits the data to the function module background through IPC messages, and after the function module background is executed, a result is returned to an API interface through the XMLD module and the PHP module.
In specific implementation, the API operation request is one of an add operation request, a modify operation request, a delete operation request, and a query operation request. A user can realize the automatic execution of one test key through a tool or a script and ensure the configuration issuing stability of the functional module.
S200, after the network equipment verifies the content in the API operation request, receiving an operation result fed back by the network equipment through an API interface of the network equipment, wherein the operation result is json format data.
In this embodiment, after verifying the API operation requests sent by the terminal provided by the present invention one by one, the network device feeds back the operation result, and the terminal can obtain the operation result through the terminal to further know whether the operation request is successfully completed. In the embodiment of the present invention, the API operation requests have four types, the contents to be verified of each API operation request are different, and the feedback operation results are inconsistent, so the present invention provides four embodiments of step S200.
In the first embodiment of the step S200, the API operation request is an add operation request, and the step S200 specifically includes:
when the network equipment verifies that no account password exists in the adding operation request or the account password is incorrect, receiving a first state code fed back by the network equipment;
when the network equipment verifies that the account password exists in the operation adding request and the account password is correct, if the network equipment verifies that the operation adding request is illegal, receiving a second state code fed back by the network equipment;
and when the network equipment verifies that the operation adding request is legal, if the network equipment verifies that the operation content in the operation adding request exists, receiving a second state code fed back by the network equipment, otherwise, receiving a third state code fed back by the network equipment.
Specifically, the terminal sends an add operation request (post request) to the network device, the network device firstly checks whether the request has an account password and whether the account password is normal, and if not, the terminal directly returns a first status code to the terminal. And then, the network equipment checks whether the post request content is legal or not on the premise of checking that the account password is correct, for example, checks whether the grammar of the post request content is legal or not, and the like, and if the post request content is illegal, the network equipment directly feeds back a second state code to the terminal and returns the reason of the request error. And if the post request content is verified to be legal, whether the request content exists on the network equipment is also needed to be verified, if so, the second state code is directly returned to the terminal, and the reason of the request error is returned. And if the request of the post request content on the network equipment does not exist, directly creating the content on the network equipment, feeding back a third status code to the terminal, and feeding back the data of the module after the creation is successful to the terminal.
In specific implementation, the first status code is a 401 status code, the second status code is a 400 status code, and the third status code is a 201 status code. The 401 status code indicates that no authorization, i.e. the request requires authentication, the 400 status code indicates that the request is erroneous, i.e. the server does not understand the syntax of the request, and the 201 status code indicates that the request has been created, i.e. that the request was successful and that the network device function module has created a new resource.
In a specific embodiment, a new keyword object configuration is added through a post request, an interface url is http://192.168.2.31/api/v3/Objects/Keywords, and the specific method is as follows:
increasing keyword | #
uul3=’http://192.168.2.31/api/v3/Objects/Keywords’
data=json.dumps({″name″:″test123″,″description″:″deskeyword″,″keyword″:[{″name″:″aaaa″},{″name″:’bbbbbbbb’}]})
res3=requests.post(url3data=data,auth=auth)
print ('status code returned by newly added keyword object configuration:', res3.status _ code)
print ('json format data returned by newly added keyword object configuration:' res3.json ())
In a second embodiment of the step S200, the API operation request is a modification operation request, and the step S200 specifically includes:
when the network equipment verifies that the account password does not exist in the modification operation request or the account password is incorrect, receiving a first state code fed back by the network equipment;
when the network equipment verifies that the modification operation request contains an account password and the account password is correct, if the data modified by the network equipment verification request does not exist, receiving a second state code fed back by the network equipment;
when the network equipment verifies that the data requested to be modified exists, if the network equipment verifies that the operation content in the modification operation request is illegal, receiving a second state code fed back by the network equipment, otherwise, receiving a third state code fed back by the network equipment.
Specifically, the terminal sends a modification operation request (put request) to the network device, the network device firstly checks whether the request has an account password and whether the account password is correct, and if the request is incorrect, the terminal directly returns a first status code to the terminal. And on the premise that the network equipment verifies that the account password is correct, whether the request data exist is checked, if not, the second state code is directly returned to the terminal, and the reason of the request error is returned. If the request data is verified to exist, whether the request content is legal or not needs to be verified, for example, whether the grammar of the put request content is legal or not needs to be verified, and the like, and if the grammar is not legal, a second state code is directly returned to the terminal, and the reason of the request error is fed back. And if the put content is verified to be legal, directly performing configuration modification operation on the network equipment, returning a third status code to the terminal equipment after modification, and returning the modified data.
In specific implementation, the first status code is a 401 status code, the second status code is a 400 status code, and the third status code is a 201 status code. The 401 status code indicates that no authorization, i.e. the request requires authentication, the 400 status code indicates that the request is erroneous, i.e. the server does not understand the syntax of the request, and the 201 status code indicates that the request has been created, i.e. that the request was successful and that the network device function module has created a new resource.
In a specific embodiment, a keyword object configuration is modified by a put request, and the interface url is http://192.168.2.31/api/v3/Objects/Keywords/name/{ obj-Keywords-name }, and the specific method is as follows:
# Modify Key
url4=’http://192.168.2.31/api/v3/Objects/Keywords/name/test123’
data2=json.dumps({’name’:’test123’,’description’:’mod_deskeyword’,’keyword’:[{’name’:’test1234’}]})
res4=requests.put(url4,data=data2,auth=auth)
print ('Modify a Key object configuration Return status code:', res4.status _ code)
print ('modifying json format data returned by a Key object configuration:', res4.json ())
In a third embodiment of the step S200, the API operation request is a delete operation request, and the step S200 specifically includes:
when the network equipment verifies that the account password does not exist in the deletion operation request or the account password is incorrect, receiving a first status code fed back by the network equipment;
when the network equipment verifies that the deletion operation request contains an account password and the account password is correct, if the data deleted by the network equipment verification request does not exist, receiving a fourth status code fed back by the network equipment;
when the network equipment verifies that the data requested to be deleted exist, if the network equipment verifies that the data requested to be deleted are quoted, receiving a fourth status code fed back by the network equipment, otherwise, receiving a fifth status code fed back by the network equipment.
Specifically, the terminal sends a delete request (delete request) to the network device, the network device first checks whether the request has an account password and whether the account password is correct, and if the request is incorrect, the terminal directly returns the first status code to the terminal. And then the network equipment verifies whether the request data exists on the premise of correct account password, and if not, the second state code is directly returned to the terminal, and the reason of request error is returned. If the request data exists, whether the request data is quoted or not needs to be checked, if the request data is quoted, the configuration deletion can not be carried out, the fourth status code is directly returned to the terminal, and the reason of the request error is returned. And if the request data is not referred, the data is deleted successfully, and a fifth status code is directly returned to the terminal.
The first status code is a 401 status code, the fourth status code is a 404 status code, and the fifth status code is a 200 status code. The 401 status code indicates that authorization is not granted, i.e., the request requires authentication, the 404 status code indicates that the request data is not found, i.e., the network device cannot be found, the 200 status code indicates success, and the network device has successfully processed the request.
In a specific embodiment, a keyword object configuration is deleted by a delete request, and the interface url is http://192.168.2.31/api/v3/Objects/Keywords/name/{ obj-Keywords-name }, and the specific method is as follows:
# delete Key
url5=’http://192.168.2.31/api/v3/Objects/Keywords/name/qq’
res5=requests.delete(url5,auth=auth)
print ('delete a key object configuration return status code:', res5.status _ code)
print ('delete a keyword object configuration return json format data:', res5.json ())
In a fourth embodiment of the step S200, the API operation request is a query operation request, and the step S200 specifically includes:
when the network equipment verifies that the account password is not available in the inquiry operation request or the account password is incorrect, receiving a first status code fed back by the network equipment;
when the network equipment verifies that the inquiry operation request contains an account password and the account password is correct, if the data inquired by the network equipment verification request does not exist, receiving a fourth status code fed back by the network equipment, otherwise, receiving a fifth status code fed back by the network equipment.
Specifically, the terminal sends an inquiry operation request (get request) to the network device, the network device firstly checks whether the request has an account password and whether the account password is correct, and if not, the terminal directly returns a first status code to the terminal. And then, on the premise that the account password is checked to be correct by the network equipment, checking whether the content of the get request exists, if so, directly returning a fifth status code to the terminal, and returning the data to be requested by the terminal to the terminal, so that the terminal acquires the required data. And if the content of the get request does not exist, the network equipment directly returns the fourth status code to the terminal.
The first status code is a 401 status code, the fourth status code is a 404 status code, and the fifth status code is a 200 status code. The 401 status code indicates that authorization is not granted, i.e., the request requires authentication, the 404 status code indicates that the request data is not found, i.e., the network device cannot be found, the 200 status code indicates success, and the network device has successfully processed the request.
In a specific embodiment, all configurations of the keyword object are queried through the get request, and the interface url is http: //192.168.2.31/api/v3/Objects/Keywords, implemented by Python script as follows:
|import requests
|import json
auth ═ ('admin', 'admin.123') # device account password
# query all Key object configurations
url1=’http://192.168.2.31/api/v3/Objects/Keywords’
Get (url1, auth) # queries all keyword object configurations by get request
print ('status code returned by query keyword object configuration:', res1.status _ code)
print ('json format data returned by query key object:', res1.json ()).
On the premise of inquiring all the keyword object configurations, a single keyword can be inquired, an existing keyword object is inquired, and the state code of 200 is returned, which is specifically as follows:
i # query Single keyword
url2=’http://192.168.2.31/api/v3/Objects/Keywords/name/qq’
res2=requests.eet(url2,auth=auth)
print ('State code returned for Single keyword object query:', res2.status-code)
print ('json format data returned by querying a single key object:', res2.json ()).
Querying a non-existent keyword object, which would not be queried, returns a status code of 404:
i # query Single keyword
url2=’http://192.168.2.31/api/v3/Objects/Keywords/name/abc’
res2=requests.get(url2,auth=auth)
print ('State code returned for Single keyword object query:', res2.status _ code)
print ('json format data returned by querying a single key object:', res2.json ()).
The method for configuring the functional modules of the network equipment can test the functions of adding, deleting, modifying and checking the interaction of the front end and the back end of each functional module without logging in a web page of the equipment, and can realize the automatic execution of one-key test through a tool or a script to ensure the configuration issuing stability of the functional modules.
As shown in fig. 2, based on the method for configuring the functional module of the network device, the present invention also provides a device for configuring the functional module of the network device, where the device for configuring the functional module of the network device may be a mobile terminal, a desktop computer, a notebook computer, a palm computer, a server, or other computing devices. The functional module configuration device of the network device comprises a processor 10, a memory 20 and a display 30. Fig. 2 shows only some of the components of the functional block configuration device of the network device, but it should be understood that not all of the shown components are required to be implemented, and that more or fewer components may be implemented instead.
The storage 20 may be an internal storage unit of the function module configuration device of the network device in some embodiments, for example, a hard disk or a memory of the function module configuration device of the network device. The memory 20 may also be an external storage device of the function module configuration device of the network device in other embodiments, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, which are equipped on the function module configuration device of the network device. Further, the memory 20 may also include both an internal storage unit and an external storage device of the function module configuration device of the network device. The memory 20 is used for storing application software installed in the function module configuration device of the network device and various data, such as program codes of the function module configuration device of the installation network device. The memory 20 may also be used to temporarily store data that has been output or is to be output. In an embodiment, the memory 20 stores a function module configuration program 40 of a network device, and the function module configuration program 40 of the network device can be executed by the processor 10, so as to implement the function module configuration method of the network device according to the embodiments of the present application.
The processor 10 may be a Central Processing Unit (CPU), a microprocessor or other data Processing chip in some embodiments, and is used to execute the program codes stored in the memory 20 or process data, such as executing the functional module configuration method of the network device.
The display 30 may be an LED display, a liquid crystal display, a touch-sensitive liquid crystal display, an OLED (Organic Light-Emitting Diode) touch panel, or the like in some embodiments. The display 30 is used for displaying information of the function module configuration device at the network device and for displaying a visualized user interface. The functional modules of the network device configure the components 10-30 of the device to communicate with each other via a system bus.
In an embodiment, when the processor 10 executes the function module configuration program 40 of the network device in the memory 20, the steps in the function module configuration method of the network device according to the above embodiment are implemented, and since the function module configuration method of the network device has been described in detail above, no further description is provided here.
In summary, the method, the device and the storage medium for configuring the functional module of the network device provided by the present invention perform configuration issue and automated test of the functional module by introducing API configuration, and can implement related tests of front-end and back-end interaction without requiring a command line.
Of course, it will be understood by those skilled in the art that all or part of the processes of the methods of the above embodiments may be implemented by a computer program instructing relevant hardware (such as a processor, a controller, etc.), and the program may be stored in a computer readable storage medium, and when executed, the program may include the processes of the above method embodiments. The storage medium may be a memory, a magnetic disk, an optical disk, etc.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present invention are included in the scope of the present invention.

Claims (10)

1. A method for configuring a functional module of a network device, comprising the steps of:
sending an API operation request to the network equipment through an API interface of the network equipment so that the network equipment can verify the content in the API operation request, wherein the API request is json format data, and the content of the API operation request at least comprises an account password and operation content;
and after the network equipment verifies the content in the API operation request, receiving an operation result fed back by the network equipment through an API interface of the network equipment, wherein the operation result is json format data.
2. The method according to claim 1, wherein the API operation request is one of an add operation request, a modify operation request, a delete operation request, and a query operation request.
3. The method according to claim 2, wherein, when the API operation request is an add operation request, the step of receiving, by the network device through the API interface of the network device, the operation result fed back by the network device after the network device verifies the content in the API operation request specifically includes:
when the network equipment verifies that no account password exists in the adding operation request or the account password is incorrect, receiving a first state code fed back by the network equipment;
when the network equipment verifies that the account password exists in the operation adding request and the account password is correct, if the network equipment verifies that the operation adding request is illegal, receiving a second state code fed back by the network equipment;
and when the network equipment verifies that the operation adding request is legal, if the network equipment verifies that the operation content in the operation adding request exists, receiving a second state code fed back by the network equipment, otherwise, receiving a third state code fed back by the network equipment.
4. The method according to claim 2, wherein, when the API operation request is a modification operation request, the step of receiving, by the network device through the API interface of the network device, the operation result fed back by the network device after the network device verifies the content in the API operation request specifically includes:
when the network equipment verifies that the account password does not exist in the modification operation request or the account password is incorrect, receiving a first state code fed back by the network equipment;
when the network equipment verifies that the modification operation request contains an account password and the account password is correct, if the data modified by the network equipment verification request does not exist, receiving a second state code fed back by the network equipment;
when the network equipment verifies that the data requested to be modified exists, if the network equipment verifies that the operation content in the modification operation request is illegal, receiving a second state code fed back by the network equipment, otherwise, receiving a third state code fed back by the network equipment.
5. The method according to claim 2, wherein, when the API operation request is a delete operation request, the step of receiving, through the API interface of the network device, the operation result fed back by the network device after the network device verifies the content in the API operation request specifically includes:
when the network equipment verifies that the account password does not exist in the deletion operation request or the account password is incorrect, receiving a first status code fed back by the network equipment;
when the network equipment verifies that the deletion operation request contains an account password and the account password is correct, if the data deleted by the network equipment verification request does not exist, receiving a fourth status code fed back by the network equipment;
when the network equipment verifies that the data requested to be deleted exist, if the network equipment verifies that the data requested to be deleted are quoted, receiving a fourth status code fed back by the network equipment, otherwise, receiving a fifth status code fed back by the network equipment.
6. The method according to claim 2, wherein, when the API operation request is an inquiry operation request, the step of receiving, by the network device through the API interface of the network device, the operation result fed back by the network device after the network device verifies the content in the API operation request specifically includes:
when the network equipment verifies that the account password is not available in the inquiry operation request or the account password is incorrect, receiving a first status code fed back by the network equipment;
when the network equipment verifies that the inquiry operation request contains an account password and the account password is correct, if the data inquired by the network equipment verification request does not exist, receiving a fourth status code fed back by the network equipment, otherwise, receiving a fifth status code fed back by the network equipment.
7. The method according to any of claims 3 to 4, wherein the first status code is a 401 status code, the second status code is a 400 status code, and the third status code is a 201 status code.
8. The method according to any of claims 5 to 6, wherein the first status code is a 401 status code, the fourth status code is a 404 status code, and the fifth status code is a 200 status code.
9. A function module configuration device of a network device, comprising: a processor and a memory;
the memory has stored thereon a computer readable program executable by the processor;
the processor, when executing the computer readable program, implements the steps in the method of configuring a functional module of a network device according to any of claims 1-8.
10. A computer-readable storage medium storing one or more programs, the one or more programs being executable by one or more processors to implement the steps in the method for configuring the functional modules of the network device according to any one of claims 1 to 8.
CN202011001859.6A 2020-09-22 2020-09-22 Method, equipment and storage medium for configuring functional module of network equipment Active CN112260855B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011001859.6A CN112260855B (en) 2020-09-22 2020-09-22 Method, equipment and storage medium for configuring functional module of network equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011001859.6A CN112260855B (en) 2020-09-22 2020-09-22 Method, equipment and storage medium for configuring functional module of network equipment

Publications (2)

Publication Number Publication Date
CN112260855A true CN112260855A (en) 2021-01-22
CN112260855B CN112260855B (en) 2023-04-18

Family

ID=74232768

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011001859.6A Active CN112260855B (en) 2020-09-22 2020-09-22 Method, equipment and storage medium for configuring functional module of network equipment

Country Status (1)

Country Link
CN (1) CN112260855B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115426266A (en) * 2022-10-09 2022-12-02 中国工商银行股份有限公司 Configuration issuing method and device
CN115426266B (en) * 2022-10-09 2024-04-30 中国工商银行股份有限公司 Configuration issuing method and device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150213449A1 (en) * 2014-01-24 2015-07-30 Ca, Inc. Risk-based control of application interface transactions
US20170046135A1 (en) * 2015-08-13 2017-02-16 PositiveEdge Solutions LLC Configurable Development Platform Integrating Heterogeneous Persistence Systems
CN106559251A (en) * 2015-09-30 2017-04-05 中兴通讯股份有限公司 A kind of Compilation Method and corresponding interface, component and system based on YANG models
CN107122258A (en) * 2017-04-18 2017-09-01 上海雷腾软件股份有限公司 Method and apparatus for the state code check of test interface
CN109617907A (en) * 2019-01-04 2019-04-12 平安科技(深圳)有限公司 Authentication method, electronic device and computer readable storage medium
CN111614476A (en) * 2019-02-22 2020-09-01 华为技术有限公司 Equipment configuration method, system and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150213449A1 (en) * 2014-01-24 2015-07-30 Ca, Inc. Risk-based control of application interface transactions
US20170046135A1 (en) * 2015-08-13 2017-02-16 PositiveEdge Solutions LLC Configurable Development Platform Integrating Heterogeneous Persistence Systems
CN106559251A (en) * 2015-09-30 2017-04-05 中兴通讯股份有限公司 A kind of Compilation Method and corresponding interface, component and system based on YANG models
CN107122258A (en) * 2017-04-18 2017-09-01 上海雷腾软件股份有限公司 Method and apparatus for the state code check of test interface
CN109617907A (en) * 2019-01-04 2019-04-12 平安科技(深圳)有限公司 Authentication method, electronic device and computer readable storage medium
CN111614476A (en) * 2019-02-22 2020-09-01 华为技术有限公司 Equipment configuration method, system and device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115426266A (en) * 2022-10-09 2022-12-02 中国工商银行股份有限公司 Configuration issuing method and device
CN115426266B (en) * 2022-10-09 2024-04-30 中国工商银行股份有限公司 Configuration issuing method and device

Also Published As

Publication number Publication date
CN112260855B (en) 2023-04-18

Similar Documents

Publication Publication Date Title
CN108900464B (en) Electronic device, block chain-based data processing method, and computer storage medium
US10979440B1 (en) Preventing serverless application package tampering
JP4470069B2 (en) Input assist device, input assist system, input assist method, and input assist program
CN111695156A (en) Service platform access method, device, equipment and storage medium
CN111935318B (en) Cross-link data verification method, device, equipment and medium
CN102664874B (en) A kind of method and system for secure logging in
WO2019019646A1 (en) Method and apparatus for platform to login to website, computer device, and readable storage medium
CN107948148B (en) Method and device for simulating replacement filling
US20210390006A1 (en) Method and electronic device for querying application programming interfaces of webpage
CN111930489A (en) Task scheduling method, device, equipment and storage medium
CN108471433A (en) A kind of synchronization message verification method of reseptance, system and the storage medium of configurationization
JP5676823B2 (en) Method for updating a data card, personal computer, and data card
CN112260855B (en) Method, equipment and storage medium for configuring functional module of network equipment
US20200042697A1 (en) Buffer overflow detection based on a synthesis of assertions from templates and k-induction
CN110716956A (en) Data request intercepting method and device
US11146571B2 (en) Data transmission method, apparatus, terminal device, and medium
US9684557B2 (en) System and method for facilitating recovery from a document creation error
US20110138296A1 (en) Method and device for browsing web page securely
US9361303B2 (en) Systems and methods to facilitate a request for oilfield services using a data transfer protocol
CN111190577B (en) Framework construction method for uniformly managing toolkit and realizing lightweight MVC
KR20210091327A (en) Batch processing method, apparatus, electronic device and readable storage medium of applet
JP2022054382A (en) Authentication method and apparatus, computing device, and medium
GB2519118A (en) Web page reload
CN111464594A (en) Http interface connection method, apparatus and storage medium
CN116149757B (en) Plug-in virtual route realization method, device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant