CN112364338B - Management method and device of micro-service framework, electronic device and storage medium - Google Patents

Management method and device of micro-service framework, electronic device and storage medium Download PDF

Info

Publication number
CN112364338B
CN112364338B CN202011379139.3A CN202011379139A CN112364338B CN 112364338 B CN112364338 B CN 112364338B CN 202011379139 A CN202011379139 A CN 202011379139A CN 112364338 B CN112364338 B CN 112364338B
Authority
CN
China
Prior art keywords
service
rights
micro
management module
management
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011379139.3A
Other languages
Chinese (zh)
Other versions
CN112364338A (en
Inventor
郑玉聪
范渊
苗春雨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
DBAPPSecurity Co Ltd
Original Assignee
DBAPPSecurity Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by DBAPPSecurity Co Ltd filed Critical DBAPPSecurity Co Ltd
Priority to CN202011379139.3A priority Critical patent/CN112364338B/en
Publication of CN112364338A publication Critical patent/CN112364338A/en
Application granted granted Critical
Publication of CN112364338B publication Critical patent/CN112364338B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The application relates to a right management method, a device, an electronic device and a storage medium of a micro-service framework, wherein the method comprises the steps of adding a right field and a unique identifier into a database table which needs to be managed by the right in a downstream service, and providing an internal interface for modifying the right field; when the user triggers the rights management operation, the corresponding internal interface is called by the unique identification to manage the corresponding rights in the downstream service. The method and the device solve the problems that the rights management framework occupies large internal resources and is inconvenient to modify the internal resources, and improve the efficiency of modifying the internal resources.

Description

Management method and device of micro-service framework, electronic device and storage medium
Technical Field
The present application relates to the field of computer networks, and in particular, to a method, an apparatus, an electronic device, and a storage medium for managing a micro service framework.
Background
Rights management frameworks refer to frameworks that are deployed on a system according to security rules or security policies set by the system that users can access and only access their own authorized resources.
In the related art, the rights management framework needs to be matched with library tables of a plurality of databases, and when users in the system are too many, the operation of the rights management framework can cause great operation pressure to the operation of the system; meanwhile, in the related technology, the security performance of the rights management framework is low, so that the rights management framework is easy to invade and access resources in the system; in addition, when the data volume occupied by the memory resources in the system is too large, a large amount of associated data can be generated, so that the inquiry and maintenance of the internal resources are not facilitated, and meanwhile, the use experience is influenced.
Aiming at the problems that the rights management framework occupies large internal resources and is inconvenient to modify the internal resources in the related art, an effective solution is not proposed.
Disclosure of Invention
Firstly, adding a permission field into a database table of a database in a downstream module, wherein the permission field plays a role of identification, and then providing an interface which is convenient to call when the database is modified to modify the downstream database; and then a micro-service license management module is built, library tables of databases in a downstream module are uniformly placed in the micro-service license management module, the micro-service license management module is triggered to carry out permission modification operation, the permission field in the micro-service license management module is obtained, the attribute values of fields in the library tables of the databases in the downstream module are modified through the internal interface of the permission field, and the problem that the memory resources of a system are occupied due to the fact that the library tables of a plurality of data are called can be reduced through the steps, so that the efficiency of accessing the library tables of the databases is improved.
The embodiment of the application provides a right management method, device, system, electronic device and storage medium of a micro-service framework, which at least solve the problems that the right management framework occupies larger internal resources and is inconvenient to modify the internal resources in the related technology.
In a first aspect, an embodiment of the present application provides a rights management method for a micro service framework, including:
adding a permission field and a unique identifier into a database table which needs to be subjected to permission management in a downstream service, and providing an internal interface for modifying the permission field;
when the user triggers the rights management operation, the corresponding internal interface is called by the unique identification to manage the corresponding rights in the downstream service.
In some of these embodiments, the rights management operation includes granting rights, canceling rights, or uploading rights-related files.
In some embodiments, when the user triggers the rights management operation, the corresponding internal interface is called by the unique identifier to modify the corresponding rights in the downstream service, including the following steps:
constructing a micro-service license management module, extracting database tables which need to be subjected to authority management in the downstream service, and maintaining the database tables in the micro-service license management module;
when the user triggers the right management operation, the unique identification of the data to be modified is obtained from the micro-service license management module, and the attribute value of the right field corresponding to the downstream service is modified by calling the corresponding internal interface by utilizing the unique identification.
In some embodiments, a micro-service license management module is set up, a database table which needs to be managed by the authority in the downstream service is extracted, and the database table maintenance is performed in the micro-service license management module, including:
and extracting database tables which need to be subjected to authority management in the downstream service, and uniformly arranging the database tables into a new database table in the micro-service license management module for maintaining the database tables.
In some of these embodiments, after invoking the corresponding internal interface with the unique identification to manage the corresponding rights field in the downstream service when the user triggers a rights management operation, the method further comprises:
and transmitting the change record for modifying the corresponding authority field in the downstream service to an authority database for recording.
In some of these embodiments, after said modifying the attribute value of the corresponding rights field in the downstream service using the unique identification call corresponding to the internal interface, the method further comprises
And cleaning the running process of the micro-service license management module at regular time. In a second aspect, an embodiment of the present application provides a rights management apparatus for a micro-service framework, including: the identification module and the management module;
the identification module is used for adding a permission field and a unique identification into a database library table which needs to be subjected to permission management in downstream service and providing an internal interface for modifying the permission field;
and the management module is used for calling the corresponding internal interface by utilizing the unique identifier to manage the corresponding authority in the downstream service when the user triggers the authority management operation.
In some of these embodiments, the management module includes a build unit and a call unit;
the building unit is used for building a micro-service license management module, extracting database tables which need to be subjected to authority management in the downstream service, and maintaining the database tables in the micro-service license management module;
and the calling unit is used for acquiring the unique identifier of the data to be modified from the micro-service license management module when the user triggers the right management operation, and calling the corresponding internal interface by utilizing the unique identifier to modify the attribute value of the right field corresponding to the downstream service. In a third aspect, an embodiment of the present application provides an electronic device, including a memory, a processor, and a computer program stored on the memory and capable of running on the processor, where the processor implements a rights management method for a micro-service framework according to the first aspect.
In a fourth aspect, embodiments of the present application provide a storage medium having stored thereon a computer program which, when executed by a processor, implements a rights management method for a micro-service framework as described in the first aspect above.
Compared with the related art, the authority management method, the device, the electronic device and the storage medium of the micro-service framework are provided, wherein an authority field and a unique identifier are added into a database table which needs to be subjected to authority management in downstream service, and an internal interface for modifying the authority field is provided; when the user triggers the rights management operation, the corresponding internal interface is called by the unique identification to manage the corresponding rights in the downstream service. The method solves the problems that the rights management framework occupies larger internal resources and is inconvenient to modify the internal resources, and improves the efficiency of modifying the internal resources.
The details of one or more embodiments of the application are set forth in the accompanying drawings and the description below to provide a more thorough understanding of the other features, objects, and advantages of the application.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiments of the application and together with the description serve to explain the application and do not constitute an undue limitation to the application. In the drawings:
fig. 1 is a hardware configuration block diagram of a terminal for management of a micro service framework according to an embodiment of the present application;
FIG. 2 is a flow chart of a method of managing a micro-service framework according to an embodiment of the present application;
FIG. 3 is a flow chart of another method of managing a micro-service framework according to an embodiment of the present application;
FIG. 4 is a block diagram of a rights management unit of a micro-service framework according to an embodiment of the present application;
fig. 5 is a block diagram of a computer-readable storage medium according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described and illustrated below with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the present application. All other embodiments, which can be made by one of ordinary skill in the art without undue burden on the person of ordinary skill in the art based on the embodiments provided herein, are intended to be within the scope of the present application. Moreover, it should be appreciated that while such a development effort might be complex and lengthy, it would nevertheless be a routine undertaking of design, fabrication, or manufacture for those of ordinary skill having the benefit of this disclosure, and thus should not be construed as having the benefit of this disclosure.
Reference in the specification to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment may be included in at least one embodiment of the application. The appearances of such phrases in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is to be expressly and implicitly understood by those of ordinary skill in the art that the embodiments described herein can be combined with other embodiments without conflict.
Unless defined otherwise, technical or scientific terms used herein should be given the ordinary meaning as understood by one of ordinary skill in the art to which this application belongs. Reference to "a," "an," "the," and similar terms herein do not denote a limitation of quantity, but rather denote the singular or plural. The terms "comprising," "including," "having," and any variations thereof, are intended to cover a non-exclusive inclusion; for example, a process, method, system, article, or apparatus that comprises a list of steps or modules (elements) is not limited to only those steps or elements but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus. The terms "connected," "coupled," and the like in this application are not limited to physical or mechanical connections, but may include electrical connections, whether direct or indirect. The term "plurality" as used herein means greater than or equal to two. "and/or" describes an association relationship of an association object, meaning that there may be three relationships, e.g., "a and/or B" may mean: a exists alone, A and B exist together, and B exists alone. The terms "first," "second," "third," and the like, as used herein, are merely distinguishing between similar objects and not representing a particular ordering of objects.
The method embodiment provided in this embodiment may be executed in a terminal, a computer or a similar computing device. Taking the operation on a terminal as an example, fig. 1 is a block diagram of a hardware structure of a terminal for managing a micro service framework according to an embodiment of the present application. As shown in fig. 1, the terminal 10 may include one or more (only one is shown in fig. 1) processors 102 (the processor 102 may include, but is not limited to, a microprocessor MCU or a processing device such as a programmable logic device FPGA) and a memory 104 for storing data, and optionally a transmission device 106 for communication functions and an input-output device 108. It will be appreciated by those skilled in the art that the structure shown in fig. 1 is merely illustrative and not limiting on the structure of the terminal described above. For example, the terminal 10 may also include more or fewer components than shown in FIG. 1, or have a different configuration than shown in FIG. 1.
The memory 104 may be used to store a computer program, for example, a software program of application software and a module, such as a computer program corresponding to a method for managing a micro service framework in an embodiment of the present invention, and the processor 102 executes the computer program stored in the memory 104 to perform various functional applications and data processing, that is, implement the above-mentioned method. Memory 104 may include high-speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, the memory 104 may further include memory located remotely from the processor 102, which may be connected to the terminal 10 via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The transmission device 106 is used to receive or transmit data via a network. The specific examples of the network described above may include a wireless network provided by a communication provider of the terminal 10. In one example, the transmission device 106 includes a network adapter (Network Interface Controller, simply referred to as NIC) that can connect to other network devices through a base station to communicate with the internet. In one example, the transmission device 106 may be a Radio Frequency (RF) module, which is configured to communicate with the internet wirelessly.
The present embodiment provides a method for managing a micro service framework, and fig. 2 is a flowchart of a method for managing a micro service framework according to an embodiment of the present application, as shown in fig. 2, where the flowchart includes the following steps:
in step S201, a rights field and a unique identifier are added to a database table to be rights-managed in a downstream service, and an internal interface for modifying the rights field is provided.
The downstream service is a service for providing resources. Due to the number of downstream services and the number of resources involved, management is inconvenient. Therefore, it is necessary to provide an upstream service whose role is to aggregate and centrally manage resources that need to be managed in a unified manner in all downstream services.
For example, there are many types of goods in an e-commerce system, each type can be considered a downstream service, and each type of specific goods can be considered a resource in the downstream service. A management platform may be provided in which resources in each type may be manually or automatically managed, and may be considered an upstream service.
At this time, since there are more resources in the downstream service, there may be problems in managing the resources by name or some other way, for example, there may be a resource with a duplicate name, so a unique identifier is required, and the upstream service can locate the resource in the downstream service by using the unique identifier to manage the resource.
The management mode is that by modifying the authority field, for example, I have a commodity list, a field is_show is arranged in the commodity list, a field code is arranged in the commodity list, the function of the is_show is whether to display on a page or not or whether to enable a user to see, the return value can be displayed when set to true, and the return value is not displayed when set to false.
While the code is a non-repeating string, the code of each piece of data is non-repeating. For example, the upstream service triggers the rights management by some operations, at this time, the upstream service only needs to fetch a code from a database in the upstream service according to the rule of management, and transfer the code to the downstream service through network communication, and after the downstream service takes the code, the return value of is_show is modified to true or false according to the code, so that the operations of rights management are completed once.
Further, the advantage of setting the code is that when there are two categories, one being a book and one being a TV series, if there is a book in the book with the name of "three-country show", and the TV series also has a TV series with the name of "three-country show", this time if only the resources of the book are wanted to be modified, if the transmission is performed by the name, errors may occur or both resources are modified. The benefit of setting the rights field Is that if some resources are not wanted to be shown to the user or not wanted to be shown to the user within certain conditions, for example, the resource Is not purchased by the user or I'm resource Is not already put on shelf, etc., at this time, the database in the downstream service actually contains the data, the rights management operation can be triggered by the upstream service to set the is_show of the resource to false, instead of deleting the data, or waiting until the user purchases the data and then adding the data to the database, which increases a lot of cost, if the server where the project Is located Is mailed to the user for use, the added resources need to be modified by the user, and only one rights management need to be triggered by the rights field.
Step S202, when the user triggers the right management operation, the unique identification is used for calling the corresponding internal interface to manage the corresponding right in the downstream service.
When the user triggers the rights management operation, the rights management operation is invoked according to the internal interface corresponding to the unique identifier to manage the rights in the downstream service, and in step S202, the rights management operation includes granting the rights, canceling the rights, or uploading the rights related file.
Specifically, the user may trigger rights management operations by uploading some rights files. For example, the rights management module provides an interface for modifying rights, the parameters of which are an encrypted file specifying rules, through which the user uploads to trigger rights management operations.
After the user uploads the file, the license management module analyzes the file and decrypts the file. Wherein some content, such as packages, may be contained in the file. The package is a resource package, for example, I have a package name of ex01, only need to write it into a file for uploading, and after ex01 is acquired, the rights management module queries its own database according to ex01 to acquire unique identifiers of all resources under ex 01. At this time, all the resources required by the rights management module are acquired, then I acquire the internal interface corresponding to the downstream service according to the types of the resources, and then call the internal interface to modify the rights field in the downstream service. For example, the field is_show added as described above. By the method, the internal interface capable of modifying the resource authority field can be obtained through the type in the resource more easily, so that quick calling can be realized.
The data in each module in the related technology is comparatively independent, and each module is independent of each other and has the function of each other, and the data are mutually called through the communication between the modules in an http (feign) or rpc (dubbo) mode.
Through the steps S201 to S202, the fields and the unique identifiers of the rights management are added into the downstream service, so that the library table to be rights managed in the downstream service is invoked upstream, and the features of the service, such as service registration, discovery and network communication, are utilized to extract the fields of the rights management into a single module, the module only serves as the related service of the rights management, the corresponding rights in the downstream service are effectively managed, and when a user triggers the rights management operation, the internal interface corresponding to the unique identifier is invoked, so that the effect of managing the corresponding rights in the downstream service is achieved.
The present embodiment provides another method for managing a micro service framework, and fig. 3 is a flowchart of another method for managing a micro service framework according to an embodiment of the present application, as shown in fig. 3, where the flowchart includes the following steps:
step S301, adding a permission field and a unique identifier into a database table which needs to be subjected to permission management in a downstream service, and providing an internal interface for modifying the permission field;
the method comprises the steps of calling a database table in a downstream service in an upstream service, wherein the action of calling the database table in the downstream service in the upstream service is complex, so that a permission field and a unique identifier are added in the database table in the permission management, and the database table in the downstream service, which needs to be subjected to the permission management, is conveniently called through the unique identifier.
Step S302, a micro-service license management module is built, database tables which need to be managed by the authority in the downstream service are extracted, and the database tables are maintained in the micro-service license management module;
the micro-service license management module divides a single application program into a group of small modules, the small modules are mutually coordinated and matched, a lightweight communication mechanism is adopted between the modules, each module is constructed around specific business and can be independently deployed into a production environment and a class production environment, so that the database table which needs to be managed by the authority in downstream service is extracted by constructing the micro-service license management module, and then the database table is maintained for the micro-service license management module.
Step S303, when the user triggers the right management operation, the unique identification of the data to be modified is obtained from the micro-service license management module, and the attribute value of the right field corresponding to the downstream service is modified by calling the corresponding internal interface by using the unique identification.
The database table which needs to be managed by the authority in the downstream service is extracted by constructing the micro-service license management module and is put into the service license management module for maintaining the database table, when the user needs to modify the attribute value of the authority field in the downstream service, the unique identifier can be directly obtained in the micro-service license management module, the processing time is saved, and the centralized management of the database table in the micro-service license management module is realized.
In some embodiments, a micro-service license management module is set up, the database table which needs to be managed by the authority in the downstream service is extracted, and the database table maintenance is performed in the micro-service license management module, including:
and extracting database tables which need to be subjected to authority management in the downstream service, and uniformly arranging the database tables into a new database table in the micro-service license management module for maintaining the database tables.
The user can select the frequently-needed authority management from the plurality of downstream services, so that the micro-service license management modules can be unified and tidied into a new database table for maintenance, and the efficiency of maintaining the database table is enhanced while the management is convenient.
In some embodiments, after invoking the corresponding internal interface with the unique identification to manage the corresponding rights field in the downstream service when the user triggers a rights management operation, the method further comprises:
and transmitting the change record for modifying the corresponding authority field in the downstream service to an authority database for recording.
In this case, since the user may generate many records during modification, sometimes a problem occurs in terms of system rights management, but the user forgets the modification process, the modification process of the corresponding rights field in the downstream service is recorded and then transmitted to the rights database. By saving the modification process of the rights management field, the efficiency of managing the rights field in the downstream database table is improved.
In some of these embodiments, after the modifying the attribute value of the corresponding rights field in the downstream service using the unique identification call corresponding to the internal interface, the method further comprises
The running process of the micro service license management module is cleaned up regularly.
The attribute values of the corresponding permission fields in the downstream service are modified for a long time, so that a large number of caches are generated during running, and the system memory is occupied, so that the running of the micro-service permission management module needs to be cleaned regularly, the stability of the system is ensured, and the running speed of the system is accelerated.
The embodiment also provides a rights management device of the micro-service framework, which is used for implementing the embodiment and the preferred implementation of the web project configuration management method, and the description is omitted. As used below, the terms "module," "unit," "sub-unit," and the like may be a combination of software and/or hardware that implements a predetermined function. While the means described in the following embodiments are preferably implemented in software, implementation in hardware, or a combination of software and hardware, is also possible and contemplated.
Fig. 4 is a block diagram of a rights management unit of a micro service framework according to an embodiment of the present application, and as shown in fig. 4, the unit includes: an identification module 41 and a management module 42;
the identification module 41 adds a rights field and a unique identification in a database table to be rights managed in a downstream service, and provides an internal interface for modifying the rights field;
the management module 42 is configured to use the unique identifier to invoke the corresponding internal interface to manage the corresponding rights in the downstream service when the rights management operation is triggered by the user.
In some of these embodiments, the rights management operation includes granting rights, canceling rights, or uploading rights-related files.
In some of these embodiments, the apparatus further comprises: a building unit and a calling unit;
the construction unit is used for constructing a micro-service license management module, extracting database tables which need to be subjected to authority management in the downstream service, and maintaining the database tables in the micro-service license management module;
and the calling unit is used for acquiring the unique identifier of the data to be modified from the micro-service license management module when the user triggers the right management operation, and calling the corresponding internal interface by utilizing the unique identifier to modify the attribute value of the right field corresponding to the downstream service.
In some embodiments, a micro-service license management module is set up, the database table which needs to be managed by the authority in the downstream service is extracted, and the database table maintenance is performed in the micro-service license management module, including:
and extracting database tables which need to be subjected to authority management in the downstream service, and uniformly arranging the database tables into a new database table in the micro-service license management module for maintaining the database tables.
In some of these embodiments, after invoking the corresponding internal interface with the unique identification to manage the corresponding rights field in the downstream service when the user triggers a rights management operation, the method further comprises:
and transmitting the change record for modifying the corresponding authority field in the downstream service to an authority database for recording.
In some of these embodiments, after the modifying the attribute value of the corresponding rights field in the downstream service using the unique identification call corresponding to the internal interface, the method further comprises
The running process of the micro service license management module is cleaned up regularly.
The above-described respective modules may be functional modules or program modules, and may be implemented by software or hardware. For modules implemented in hardware, the various modules described above may be located in the same processor; or the above modules may be located in different processors in any combination.
The present embodiment also provides an electronic device comprising a memory having stored therein a computer program and a processor arranged to run the computer program to perform the steps of any of the method embodiments described above.
Optionally, the electronic apparatus may further include a transmission device and an input/output device, where the transmission device is connected to the processor, and the input/output device is connected to the processor.
Alternatively, in the present embodiment, the above-described processor may be configured to execute the following steps by a computer program:
step S1, adding a permission field and a unique identifier into a database table which needs to be subjected to permission management in a downstream service, and providing an internal interface for modifying the permission field.
Step S2, when a user triggers the authority management operation, the unique identifier is utilized to call the corresponding internal interface to manage the corresponding authority in the downstream service;
in some of these embodiments, the rights management operation includes granting rights, canceling rights, or uploading rights-related files.
In some embodiments, when the user triggers a rights management operation, invoking the corresponding internal interface with the unique identification to modify the corresponding rights in the downstream service, comprising the steps of:
constructing a micro-service license management module, extracting database tables which need to be subjected to authority management in the downstream service, and maintaining the database tables in the micro-service license management module;
when the user triggers the right management operation, the unique identification of the data to be modified is obtained from the micro-service license management module, and the attribute value of the right field corresponding to the downstream service is modified by calling the corresponding internal interface by utilizing the unique identification.
In some embodiments, a micro-service license management module is set up, the database table which needs to be managed by the authority in the downstream service is extracted, and the database table maintenance is performed in the micro-service license management module, including:
and extracting database tables which need to be subjected to authority management in the downstream service, and uniformly arranging the database tables into a new database table in the micro-service license management module for maintaining the database tables.
In some of these embodiments, after invoking the corresponding internal interface with the unique identification to manage the corresponding rights field in the downstream service when the user triggers a rights management operation, the method further comprises:
and transmitting the change record for modifying the corresponding authority field in the downstream service to an authority database for recording.
In some of these embodiments, after the modifying the attribute value of the corresponding rights field in the downstream service using the unique identification call corresponding to the internal interface, the method further comprises
The running process of the micro service license management module is cleaned up regularly.
It should be noted that, specific examples in this embodiment may refer to examples described in the foregoing embodiments and alternative implementations, and this embodiment is not repeated herein.
In one embodiment, a computer readable storage medium is provided, fig. 5 is a block diagram of a structure of a computer readable storage medium according to an embodiment of the present application, as shown in fig. 5, where a computer program is stored, and the steps in authority management of a micro service framework provided in the foregoing embodiments are implemented when the computer program is executed by a processor, where the steps are as follows:
step S1, adding a permission field and a unique identifier into a database table which needs to be subjected to permission management in a downstream service, and providing an internal interface for modifying the permission field;
and step S2, when the user triggers the authority management operation, the unique identification is utilized to call the corresponding internal interface to manage the corresponding authority in the downstream service.
In some of these embodiments, the rights management operation includes granting rights, canceling rights, or uploading rights-related files.
In some embodiments, when the user triggers a rights management operation, invoking the corresponding internal interface with the unique identification to modify the corresponding rights in the downstream service, comprising the steps of:
constructing a micro-service license management module, extracting database tables which need to be subjected to authority management in the downstream service, and maintaining the database tables in the micro-service license management module;
when the user triggers the right management operation, the unique identification of the data to be modified is obtained from the micro-service license management module, and the attribute value of the right field corresponding to the downstream service is modified by calling the corresponding internal interface by utilizing the unique identification.
In some embodiments, a micro-service license management module is set up, the database table which needs to be managed by the authority in the downstream service is extracted, and the database table maintenance is performed in the micro-service license management module, including:
and extracting database tables which need to be subjected to authority management in the downstream service, and uniformly arranging the database tables into a new database table in the micro-service license management module for maintaining the database tables.
In some of these embodiments, after invoking the corresponding internal interface with the unique identification to manage the corresponding rights field in the downstream service when the user triggers a rights management operation, the method further comprises:
and transmitting the change record for modifying the corresponding authority field in the downstream service to an authority database for recording.
In some of these embodiments, after the modifying the attribute value of the corresponding rights field in the downstream service using the unique identification call corresponding to the internal interface, the method further comprises
The running process of the micro service license management module is cleaned up regularly.
It will be appreciated by those skilled in the art that the architecture shown in fig. 5 is merely a block diagram of some of the architecture relevant to the present application and is not limiting of the computer readable storage media on which the present application applies, and that a particular computer device may include more or fewer components than shown, or may combine some of the components, or have a different arrangement of components.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed may comprise the steps of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the various embodiments provided herein may include non-volatile and/or volatile memory. The nonvolatile memory can include Read Only Memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), memory bus direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), among others.
The technical features of the above embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The above examples represent only a few embodiments of the present application, which are described in more detail and are not to be construed as limiting the scope of the invention. It should be noted that it would be apparent to those skilled in the art that various modifications and improvements could be made without departing from the spirit of the present application, which would be within the scope of the present application. Accordingly, the scope of protection of the present application is to be determined by the claims appended hereto.

Claims (8)

1. A rights management method for a micro-service framework, comprising:
adding a permission field and a unique identifier into a database table which needs to be subjected to permission management in a downstream service, and providing an internal interface for modifying the permission field;
when a user triggers the rights management operation, the corresponding internal interface is called by utilizing the unique identifier to manage the corresponding rights in the downstream service;
when the user triggers the rights management operation, the unique identifier is used for calling the corresponding internal interface to manage the corresponding rights in the downstream service, and the method comprises the following steps:
constructing a micro-service license management module, extracting database tables which need to be subjected to authority management in the downstream service, and maintaining the database tables in the micro-service license management module;
when the user triggers the right management operation, the unique identification of the data to be modified is obtained from the micro-service license management module, and the attribute value of the right field corresponding to the downstream service is modified by calling the corresponding internal interface by utilizing the unique identification.
2. The method of claim 1, wherein the rights management operation comprises granting rights, canceling rights, or uploading rights-related files.
3. The method of claim 1, wherein building a micro-service license management module, extracting database tables in the downstream service that need to be rights managed, and performing library table maintenance in the micro-service license management module, comprises:
and extracting database tables which need to be subjected to authority management in the downstream service, and uniformly arranging the database tables into a new database table in the micro-service license management module for maintaining the database tables.
4. The method of claim 1, wherein after invoking the corresponding internal interface with the unique identification to manage the corresponding rights field in the downstream service when the user triggers a rights management operation, the method further comprises:
and transmitting the change record for modifying the corresponding authority field in the downstream service to an authority database for recording.
5. The method of claim 1, wherein after said modifying the attribute value of the corresponding rights field in the downstream service using the unique identification call corresponding to the internal interface, the method further comprises
And cleaning the running process of the micro-service license management module at regular time.
6. A rights management apparatus for a micro-service framework, comprising: the identification module and the management module;
the identification module is used for adding a permission field and a unique identification into a database library table which needs to be subjected to permission management in downstream service and providing an internal interface for modifying the permission field;
the management module is used for calling the corresponding internal interface by utilizing the unique identifier to manage the corresponding authority in the downstream service when the user triggers the authority management operation;
the management module comprises a building unit and a calling unit;
the building unit is used for building a micro-service license management module, extracting database tables which need to be subjected to authority management in the downstream service, and maintaining the database tables in the micro-service license management module;
and the calling unit is used for acquiring the unique identifier of the data to be modified from the micro-service license management module when the user triggers the right management operation, and calling the corresponding internal interface by utilizing the unique identifier to modify the attribute value of the right field corresponding to the downstream service.
7. An electronic device comprising a memory and a processor, characterized in that the memory has stored therein a computer program, the processor being arranged to run the computer program to perform a rights management method of a micro-service framework according to any of claims 1 to 5.
8. A storage medium, wherein a computer program is stored in the storage medium, wherein the computer program is arranged to perform a rights management method of a micro-service framework according to any of claims 1 to 5 at run-time.
CN202011379139.3A 2020-11-30 2020-11-30 Management method and device of micro-service framework, electronic device and storage medium Active CN112364338B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011379139.3A CN112364338B (en) 2020-11-30 2020-11-30 Management method and device of micro-service framework, electronic device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011379139.3A CN112364338B (en) 2020-11-30 2020-11-30 Management method and device of micro-service framework, electronic device and storage medium

Publications (2)

Publication Number Publication Date
CN112364338A CN112364338A (en) 2021-02-12
CN112364338B true CN112364338B (en) 2024-04-09

Family

ID=74535708

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011379139.3A Active CN112364338B (en) 2020-11-30 2020-11-30 Management method and device of micro-service framework, electronic device and storage medium

Country Status (1)

Country Link
CN (1) CN112364338B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108416199A (en) * 2018-03-07 2018-08-17 北京恒华伟业科技股份有限公司 A kind of user authority control method of application, device and server
CN111291360A (en) * 2020-01-21 2020-06-16 中电福富信息科技有限公司 Big data authority management method and system based on service governance
WO2020134838A1 (en) * 2018-12-29 2020-07-02 深圳云天励飞技术有限公司 Authority verification method and related device
CN111767095A (en) * 2020-06-30 2020-10-13 平安国际智慧城市科技股份有限公司 Micro-service generation method and device, terminal equipment and storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108416199A (en) * 2018-03-07 2018-08-17 北京恒华伟业科技股份有限公司 A kind of user authority control method of application, device and server
WO2020134838A1 (en) * 2018-12-29 2020-07-02 深圳云天励飞技术有限公司 Authority verification method and related device
CN111291360A (en) * 2020-01-21 2020-06-16 中电福富信息科技有限公司 Big data authority management method and system based on service governance
CN111767095A (en) * 2020-06-30 2020-10-13 平安国际智慧城市科技股份有限公司 Micro-service generation method and device, terminal equipment and storage medium

Also Published As

Publication number Publication date
CN112364338A (en) 2021-02-12

Similar Documents

Publication Publication Date Title
KR102297592B1 (en) Method and apparatus for sharing big data using block chain
CN109936571B (en) Mass data sharing method, open sharing platform and electronic equipment
CN107402821B (en) Access control method, device and equipment for shared resources
CN114064690A (en) Data processing method and device
CN107103011B (en) Method and device for realizing terminal data search
CN112532413A (en) Business support Saas system, method, medium and device based on micro-service architecture
CN108173839B (en) Authority management method and system
CN110532493B (en) Data processing method and device, storage medium and electronic device
CN110070467A (en) Source of houses dissemination method, equipment, storage medium and device by all kinds of means
CN108154024A (en) A kind of data retrieval method, device and electronic equipment
CN102316128A (en) A kind ofly be used to generate network service method and device
CN114218156A (en) Data export method, data export device, computer equipment and storage medium
CN112364338B (en) Management method and device of micro-service framework, electronic device and storage medium
CN113204427A (en) Resource management method, resource management device, computer equipment and storage medium
CN111045928B (en) Interface data testing method, device, terminal and storage medium
CN111142989B (en) Object management method, device and storage medium
CN116594834A (en) Operation and maintenance data processing method and device for multi-protocol server
CN115037789B (en) Method, apparatus, device, storage medium and program product for limiting current
US20220327242A1 (en) Data management method and apparatus
CN116339694A (en) Extension method and device of low-code platform assembly, electronic equipment and storage medium
CN106559454B (en) Resource access method, device and system
CN114090785A (en) Service processing method, device, computer equipment and storage medium
CN114547055A (en) Data processing method and device
CN112699149A (en) Target data acquisition method and device, storage medium and electronic device
CN112667682A (en) Data processing method, data processing device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant