CN115080111A - Method, device and equipment for flow management of target application and storage medium - Google Patents

Method, device and equipment for flow management of target application and storage medium Download PDF

Info

Publication number
CN115080111A
CN115080111A CN202210758468.1A CN202210758468A CN115080111A CN 115080111 A CN115080111 A CN 115080111A CN 202210758468 A CN202210758468 A CN 202210758468A CN 115080111 A CN115080111 A CN 115080111A
Authority
CN
China
Prior art keywords
application
imported
environment
approval
approval result
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210758468.1A
Other languages
Chinese (zh)
Inventor
罗华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Agricultural Bank of China
Original Assignee
Agricultural Bank of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Agricultural Bank of China filed Critical Agricultural Bank of China
Priority to CN202210758468.1A priority Critical patent/CN115080111A/en
Publication of CN115080111A publication Critical patent/CN115080111A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/70Software maintenance or management
    • G06F8/71Version control; Configuration management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3664Environments for testing or debugging software

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Quality & Reliability (AREA)
  • Stored Programmes (AREA)

Abstract

The invention discloses a method, a device, equipment and a storage medium for flow management of target application. The method comprises the following steps: determining an application to be imported in a test environment; carrying out process approval of at least two dimensions on the application to be imported to obtain a process approval result; importing the application to be imported into a production environment according to the process approval result; and managing the application to be imported in the production environment. The embodiment of the invention improves the creating safety and the creating efficiency of the system application.

Description

Method, device and equipment for flow management of target application and storage medium
Technical Field
The present invention relates to the field of automated processing technologies, and in particular, to a method, an apparatus, a device, and a storage medium for managing a process of a target application.
Background
The distributed configuration center is a set of application systems capable of providing unified configuration management for the application systems in related industries, decoupling of application programs and configuration management can be achieved, the configuration management and the design of the application programs are gradually and independently separated, research and development personnel can use more time and energy on the logic research and development of the application programs, and the configuration management is achieved by a special distributed configuration center.
At present, when an industry using a distributed configuration center creates a system application in the distributed configuration center, most industry related responsible persons create the system application at will in each environment of the distributed configuration center, so that the security of the system application deployed in a formal production environment is low, and the system application needs to be created in each environment respectively, so that the creation efficiency is low.
Disclosure of Invention
The invention provides a method, a device, equipment and a storage medium for the process of a target application, which are used for improving the creation safety and the creation efficiency of a system application.
According to an aspect of the present invention, a method for managing a target application in a flow is provided, the method including:
determining an application to be imported in a test environment;
carrying out flow approval of at least two dimensions on the application to be imported to obtain a flow approval result;
importing the application to be imported into a production environment according to the process approval result;
and managing the application to be imported in the production environment.
According to another aspect of the present invention, there is provided a process management apparatus for a target application, the apparatus including:
the to-be-imported application determining module is used for determining to-be-imported applications in the test environment;
the approval result determining module is used for carrying out process approval with at least two dimensions on the application to be imported to obtain a process approval result;
the application import module is used for importing the application to be imported into a production environment according to the process approval result;
and the application management module is used for managing the application to be imported in the production environment.
According to another aspect of the present invention, there is provided an electronic apparatus including:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores a computer program executable by the at least one processor, and the computer program is executed by the at least one processor to enable the at least one processor to execute the method for managing a target application flow according to any embodiment of the present invention.
According to another aspect of the present invention, there is provided a computer-readable storage medium storing computer instructions for causing a processor to implement a method for managing a flow of a target application according to any embodiment of the present invention when the computer instructions are executed.
The scheme of the embodiment of the invention determines the application to be imported in the test environment; carrying out process approval of at least two dimensions on the application to be imported to obtain a process approval result; importing the application to be imported into the production environment according to the process approval result; and managing the application to be imported in the production environment. According to the scheme, the system application in the distributed configuration center is created and imported in a flow mode, so that the creation safety of the system application is improved, the system application is not required to be created in each environment respectively, and the system application is directly imported after the auditing is passed, so that the creation efficiency of the system environment is improved. Meanwhile, the statistical analysis of the imported system application is facilitated, and resource abuse caused by frequent and excessive system application creation by a user is avoided.
It should be understood that the statements in this section do not necessarily identify key or critical features of the embodiments of the present invention, nor do they necessarily limit the scope of the invention. Other features of the present invention will become apparent from the following description.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a flowchart of a method for managing a target application in a flow manner according to an embodiment of the present invention;
FIG. 2 is a flowchart of a method for managing a target application in a flow chart according to a second embodiment of the present invention;
fig. 3 is a schematic structural diagram of a flow management device for a target application according to a third embodiment of the present invention;
fig. 4 is a schematic structural diagram of an electronic device implementing a method for managing a target application in a flow manner according to an embodiment of the present invention.
Detailed Description
In order to make those skilled in the art better understand the technical solutions of the present invention, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the terms "first," "second," and the like in the description and claims of the present invention and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
Example one
Fig. 1 is a flowchart of a method for managing a target application in a flow manner according to an embodiment of the present invention, where the embodiment is applicable to a case where a system application created in a distributed configuration center is managed in a flow manner, and the method may be executed by a flow management device of the target application, where the flow management device of the target application may be implemented in a form of hardware and/or software, and the flow management device of the target application may be configured in an electronic device. As shown in fig. 1, the method includes:
and S110, determining the application to be imported in the test environment.
Wherein, the Test environment is a User Acceptance Test (UAT) environment. Determining the application to be imported in the test environment may be performed by a Distributed Configuration Center (DCC). The application to be imported can be a user of the distributed configuration center, and the system application to be imported is selected from the created at least one system application according to actual requirements.
It should be noted that, a user of the distributed configuration center may perform, according to the configuration items, the related configuration of the application system and the system application included in the application system in the test environment of the distributed configuration center in advance. The configuration items may include names of application systems, names of system applications, IDs (Identity codes) and notes of micro services, and the like.
In an optional embodiment, before determining at least one application to be imported in the test environment, the method further includes: responding to a creation completion instruction of a user to a system application corresponding to the application system in a test environment, and generating a first application identifier corresponding to the system application in the test environment; responding to an access instruction of the system application under the test environment, and accessing the system application under the test environment according to the first application identification; the system application comprises at least one application to be imported.
For example, the user may create the system application in the test environment in advance. And the user can perform related configuration of the application system and the corresponding system application according to the configuration items in the test environment. And after the configuration is completed, initiating a creation completion instruction. After the distributed configuration center receives the configuration completion instruction, first application identifiers under the test environment are automatically generated for the created system applications, namely, the different system applications respectively correspond to the first application identifiers. The first application identifier may be TOKEN, i.e. TOKEN.
The purpose of generating the first application identifier corresponding to each system application in the test environment is to avoid a security problem caused by using the system application in other environments after the system application in the test environment is subsequently acquired, that is, to avoid a behavior of malicious attack. For example, other environments may include a PRE-release Environment, i.e., a PRE-Production Environment (PRE-Production Environment) Environment and a Production Environment. Therefore, when the system application is imported into other environments, the unique application identification of the system application in the other environments is generated. I.e. the same system application, the corresponding application identification is different under different environments.
When each system application corresponds to different application identifiers in different environments, and the system applications are subsequently accessed or requested, access is required to be performed based on the identifiers corresponding to the environments, so that the situation that the system applications in the current environment are maliciously attacked by using configuration data of the system applications in other environments is avoided, and the created key fields corresponding to the system applications are independent and separated from each other in each environment.
For example, the user may create at least one system application corresponding to the application system in the test environment in advance according to the configuration item. According to actual requirements, at least one application to be imported, which needs to be imported into a test environment and be put into use in other subsequent environments, is selected from at least one created system application.
And S120, carrying out process approval of at least two dimensions on the application to be imported to obtain a process approval result.
It will be appreciated that, typically when using a distributed configuration center, users may be created at will in various environments, and this random creation may pose serious security problems. For example, a normal creation flow would be to create a use in a test environment first, a pre-release environment second, and a production environment last. The creating and using process of the current system application can be created and used in any environment, namely, the creating in a production environment can be skipped over by a test environment, and a greater safety problem can be caused by a random creating mode in each environment without a correct process.
The process approval of the two dimensions can be normative approval of the application to be imported, and comprises security approval, format approval and the like. In a process approval process based on two dimensions, whether an application to be imported is safe and conforms to a formatting specification is determined.
The distributed configuration center may include a management service module. The management service module can be a man-machine interaction subsystem provided by a distributed configuration center, and a user can complete various functional operations in the management service module. After applying for accessing the distributed configuration center, the user can obtain the authority of the related login and operation management service module. The distributed configuration center may also include a configuration service management module. The configuration service management module is a combination of background service logic functions provided by the management service module, and the service object is the management service module and is focused on providing services for the management service module in relation to the operation of configuration items.
In an optional embodiment, the process approval of at least two dimensions on the application to be imported to obtain the process approval result includes: carrying out security approval on the application to be imported to obtain a security approval result; controlling the application to be imported to carry out format approval according to the security approval result to obtain a format approval result; and generating a process approval result comprising the security approval result and/or the format approval result.
The security approval may be performed by configuring a security audit function in the service management module in advance, for example, the configuration service management module may have access to a related device capable of performing security audit in advance. The safety approval may be performed by related personnel in the technical field, for example, an auditor or a safety supervisor capable of performing safety audit, and the like.
The security approval may include evaluating an application amount of the application to be imported, approving whether the distributed configuration center can support the application amount of the application to be imported, and approving whether the application system to be imported includes a sensitive field. For example, a sensitive field may be a field that can indicate the identity of a user.
The format approval can be automatically approved by the management service module, and the specific approval content can be whether the approval to-be-imported application format meets the set format requirement or not. For example, the application name of the application to be imported, the configured microservice ID or remark, etc. may meet the preset format requirement.
Exemplarily, the security of the application to be imported in the test environment is approved through a configuration service management module; judging whether the security approval of the environment to be imported passes; if so, performing format approval on the application to be imported by the management service module to obtain a format approval result; if not, the process approval result of the environment to be imported does not pass, and subsequent import of other environments is not performed.
In an optional embodiment, controlling, according to the security approval result, to perform format approval on the application to be imported, so as to obtain a format approval result, including: if the security approval of the application to be imported passes, importing the application to be imported into a pre-release environment; and carrying out format approval on the application to be imported into the pre-release environment to obtain a format approval result.
And if the configuration service management module passes the security approval of the application to be imported, importing the application to be imported into a pre-release environment, and performing format approval on the application to be imported by the management service module to obtain a format approval result. If the security approval of the application to be imported is not passed, the configuration service management module does not perform subsequent format approval, and can consider that the process of the application to be imported is not approved and notify the relevant users.
Optionally, importing at least one application to be imported into the production environment according to the process approval result, including: and if the formatted approval of the application to be imported passes, importing the application to be imported into the production environment.
Exemplarily, the management service module performs format approval on the application to be imported, and if the format approval of the application to be imported passes, imports the application to be imported into the production environment; if the format of the application to be imported is not approved, the process of the application to be imported is considered to be not approved, and a related user can be notified.
In an optional embodiment, before importing at least one application to be imported into the pre-release environment, the method further includes: updating the first application identifications respectively corresponding to the applications to be imported to obtain second application identifications respectively corresponding to the applications to be imported in a pre-release environment; and responding to the access instruction of the application to be imported in the pre-release environment, and accessing the application to be imported in the pre-release environment according to the second application identifier.
The second application identifier may be a unique identifier corresponding to the application to be imported in the pre-release environment. And when the security audit of the application to be imported passes and before or after the application to be imported into the pre-release environment, regenerating the first application identifier of the application to be imported into the pre-release environment, and generating a second application identifier corresponding to the application to be imported into the pre-release environment.
The purpose of generating the second application identifier corresponding to the application to be imported in the pre-release environment is to avoid the security problem caused by using the application to be imported in the pre-release environment in other environments, that is, to avoid the behavior of malicious attack. For example, other environments may include a test environment and a production environment.
After the application to be imported generates the second application identifier in the pre-release environment, when the application to be imported in the pre-release environment is subsequently accessed or requested, the access needs to be performed based on the second application identifier in the pre-release environment, so that the situation that the configuration data of the application to be imported in other environments is used to perform malicious attack on the application to be imported in the current environment is avoided, and the created key fields corresponding to the applications to be imported are independent and separated from each other in each environment.
In a similar way, before at least one application to be imported is imported into the production environment, a corresponding unique identifier of the application to be imported under the production environment is generated.
In an optional embodiment, before importing at least one application to be imported into the production environment, the method further includes: updating the second application identifications respectively corresponding to the applications to be imported to obtain third application identifications respectively corresponding to the applications to be imported under the production environment; and responding to the access instruction of the application to be imported in the production environment, and accessing the application to be imported in the production environment according to the third application identification.
The third application identifier may be a unique identifier corresponding to the application to be imported in the production environment. And when the format audit of the application to be imported is passed and before or after the application to be imported is imported into the production environment, regenerating the second application identifier of the application to be imported, and generating a third application identifier corresponding to the application to be imported in the production environment.
After the third application identifier is generated by the application to be imported in the production environment, when the application to be imported in the production environment is subsequently accessed or requested, the access needs to be performed based on the third application identifier of the application to be imported in the production environment, so that the situation that the configuration data of the application to be imported in other environments is used and the application to be imported in the current environment is maliciously attacked is avoided, and the created key fields corresponding to the applications to be imported are mutually independent and mutually separated in each environment.
And S130, importing the application to be imported into the production environment according to the process approval result.
And if the security examination and approval and the format examination and approval to be imported pass, importing the application to be imported into the production environment.
And S140, managing the application to be imported in the production environment.
After the application to be imported is imported into the production environment, the related project group of the distributed configuration center can count the application to be imported corresponding to each user, and subsequently, the process data related to the application to be imported, the use state of each user and the condition of accessing the distributed configuration center can be visually checked and analyzed.
The scheme of the embodiment of the invention determines the application to be imported in the test environment; carrying out process approval of at least two dimensions on the application to be imported to obtain a process approval result; importing the application to be imported into a production environment according to the process approval result; and managing the application to be imported in the production environment. According to the scheme, the system application in the distributed configuration center is created and imported in a flow mode, so that the creation safety of the system application is improved, the system application is not required to be created in each environment respectively, and the system application is directly imported after the auditing is passed, so that the creation efficiency of the system environment is improved. Meanwhile, the statistical analysis of the imported system application is facilitated, and resource abuse caused by frequent and excessive system application creation by a user is avoided.
Example two
Fig. 2 is a schematic flow chart of a method for managing a target application in a flow manner according to a second embodiment of the present invention, and the second embodiment of the present invention provides a preferred implementation manner based on the technical solutions of the above embodiments.
S210, a user creates at least one system application corresponding to an application system in a test environment based on a management service module of a distributed configuration center, and automatically generates a TOKEN in the test environment for each system application;
s220, determining an application to be imported, which is selected from at least one system application by a user according to actual requirements and needs to be imported into a test environment;
s230, a configuration service management module of the distributed configuration center performs security audit on the application to be imported, and judges whether the security audit is passed; if yes, go to S240A, otherwise go to S240B;
S240A, importing the application to be imported into the pre-release environment, and simultaneously generating a TOKEN of the application to be imported into the pre-release environment;
S240B, terminating the subsequent approval and import process of the application to be imported, and informing the relevant technical personnel of the application to be imported to carry out correction;
s250, performing format approval by a management service module of the distributed configuration center, and judging whether the format approval of the application to be imported passes; if yes, go to S260A, otherwise go to S260B;
S260A, importing the application to be imported into the production environment, and simultaneously generating a TOKEN of the application to be imported into the production environment;
S260B, terminating the import flow of the application to be imported, and informing the relevant technical personnel of the application to be imported to carry out correction;
s270, accessing the application to be imported according to the corresponding TOKEN of the application to be imported in different environments, and performing visual analysis on the application to be imported corresponding to each user.
EXAMPLE III
Fig. 3 is a schematic structural diagram of a flow management device for a target application according to a third embodiment of the present invention. The device for flow management of the target application provided by the embodiment of the invention can be suitable for the condition of flow management of the system application established in the distributed configuration center, and can be realized in a software and/or hardware mode. As shown in fig. 3, the apparatus specifically includes: an application to be imported determining module 301, an approval result determining module 302, an application importing module 303 and an application managing module 304. Wherein the content of the first and second substances,
an application to be imported determining module 301, configured to determine an application to be imported in a test environment;
an approval result determining module 302, configured to perform process approval of at least two dimensions on the application to be imported, so as to obtain a process approval result;
the application importing module 303 is configured to import the application to be imported into a production environment according to the process approval result;
an application management module 304, configured to manage the application to be imported in the production environment.
According to the scheme of the embodiment of the invention, the application to be imported in the test environment is determined; carrying out process approval of at least two dimensions on the application to be imported to obtain a process approval result; importing the application to be imported into the production environment according to the process approval result; and managing the application to be imported in the production environment. According to the scheme, the system application in the distributed configuration center is created and imported in a flow mode, so that the creation safety of the system application is improved, the system application is not required to be created in each environment respectively, and the system application is directly imported after the auditing is passed, so that the creation efficiency of the system environment is improved. Meanwhile, the statistical analysis of the imported system application is facilitated, and resource abuse caused by frequent and excessive system application creation by a user is avoided.
Optionally, the approval result determining module 302 includes:
the safety approval result determining unit is used for carrying out safety approval on the application to be imported to obtain a safety approval result;
the format approval result determining unit is used for controlling the format approval of the application to be imported according to the security approval result to obtain a format approval result;
and the process approval result determining unit is used for generating a process approval result comprising a safety approval result and/or a format approval result.
Optionally, the format approval result determining unit includes:
the application importing subunit is used for importing the application to be imported into a pre-release environment if the security approval of the application to be imported passes;
and the format approval result determining subunit is used for performing format approval on the application to be imported, imported into the pre-release environment, so as to obtain a format approval result.
Optionally, the application importing subunit is specifically configured to:
and if the formatted approval of the application to be imported passes, importing the application to be imported into a production environment.
Optionally, the apparatus further comprises:
the first application identifier generating module is used for responding to a creation completion instruction of a user to a system application corresponding to an application system in the test environment before at least one application to be imported in the test environment is determined, and generating a first application identifier corresponding to the system application in the test environment;
the system application access module is used for responding to an access instruction of the system application under the test environment and accessing the system application under the test environment according to the first application identification; wherein the system application comprises at least one application to be imported.
Optionally, the apparatus further comprises:
the second application identifier generating module is configured to update the first application identifiers respectively corresponding to the applications to be imported before importing the at least one application to be imported into the pre-release environment, so as to obtain second application identifiers respectively corresponding to the applications to be imported in the pre-release environment;
and the first application access module is used for responding to an access instruction of the application to be imported in the pre-release environment and accessing the application to be imported in the pre-release environment according to the second application identifier.
Optionally, the apparatus further comprises:
a third application identifier generating module, configured to update second application identifiers corresponding to the applications to be imported, before the at least one application to be imported is imported into the production environment, so as to obtain third application identifiers corresponding to the applications to be imported in the production environment;
and the second application access module is used for responding to an access instruction of the application to be imported in the production environment and accessing the application to be imported in the production environment according to the third application identifier.
The process management device for the target application provided by the embodiment of the invention can execute the process management method for the target application provided by any embodiment of the invention, and has corresponding functional modules and beneficial effects of the execution method.
Example four
FIG. 4 shows a schematic block diagram of an electronic device 40 that may be used to implement an embodiment of the invention. Electronic devices are intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers. The electronic device may also represent various forms of mobile devices, such as personal digital assistants, cellular phones, smart phones, wearable devices (e.g., helmets, glasses, watches, etc.), and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be exemplary only, and are not meant to limit implementations of the inventions described and/or claimed herein.
As shown in fig. 4, the electronic device 40 includes at least one processor 41, and a memory communicatively connected to the at least one processor 41, such as a Read Only Memory (ROM)42, a Random Access Memory (RAM)43, and the like, wherein the memory stores a computer program executable by the at least one processor, and the processor 41 may perform various suitable actions and processes according to the computer program stored in the Read Only Memory (ROM)42 or the computer program loaded from the storage unit 48 into the Random Access Memory (RAM) 43. In the RAM 43, various programs and data necessary for the operation of the electronic apparatus 40 can also be stored. The processor 41, the ROM 42, and the RAM 43 are connected to each other via a bus 44. An input/output (I/O) interface 45 is also connected to bus 44.
A number of components in the electronic device 40 are connected to the I/O interface 45, including: an input unit 46 such as a keyboard, a mouse, etc.; an output unit 47 such as various types of displays, speakers, and the like; a storage unit 48 such as a magnetic disk, an optical disk, or the like; and a communication unit 49 such as a network card, modem, wireless communication transceiver, etc. The communication unit 49 allows the electronic device 40 to exchange information/data with other devices via a computer network such as the internet and/or various telecommunication networks.
Processor 41 may be a variety of general and/or special purpose processing components having processing and computing capabilities. Some examples of processor 41 include, but are not limited to, a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), various specialized Artificial Intelligence (AI) computing chips, various processors running machine learning model algorithms, a Digital Signal Processor (DSP), and any suitable processor, controller, microcontroller, or the like. The processor 41 performs the various methods and processes described above, such as a method of flow management of a target application.
In some embodiments, the method for procedural management of a target application may be implemented as a computer program tangibly embodied in a computer-readable storage medium, such as storage unit 48. In some embodiments, part or all of the computer program may be loaded and/or installed onto the electronic device 40 via the ROM 42 and/or the communication unit 49. When the computer program is loaded into the RAM 43 and executed by the processor 41, one or more steps of the method for the streamlined management of a target application described above may be performed. Alternatively, in other embodiments, processor 41 may be configured to perform the flow management method of the target application by any other suitable means (e.g., by way of firmware).
Various implementations of the systems and techniques described here above may be implemented in digital electronic circuitry, integrated circuitry, Field Programmable Gate Arrays (FPGAs), Application Specific Integrated Circuits (ASICs), Application Specific Standard Products (ASSPs), system on a chip (SOCs), load programmable logic devices (CPLDs), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs that are executable and/or interpretable on a programmable system including at least one programmable processor, which may be special or general purpose, receiving data and instructions from, and transmitting data and instructions to, a storage system, at least one input device, and at least one output device.
A computer program for implementing the methods of the present invention may be written in any combination of one or more programming languages. These computer programs may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus, such that the computer programs, when executed by the processor, cause the functions/acts specified in the flowchart and/or block diagram block or blocks to be performed. A computer program can execute entirely on a machine, partly on a machine, as a stand-alone software package partly on a machine and partly on a remote machine or entirely on a remote machine or server.
In the context of the present invention, a computer-readable storage medium may be a tangible medium that can contain, or store a computer program for use by or in connection with an instruction execution system, apparatus, or device. A computer readable storage medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. Alternatively, the computer readable storage medium may be a machine readable signal medium. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
To provide for interaction with a user, the systems and techniques described here can be implemented on an electronic device having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and a pointing device (e.g., a mouse or a trackball) by which a user can provide input to the electronic device. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user can be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic, speech, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a back-end component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such back-end, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), Wide Area Networks (WANs), blockchain networks, and the internet.
The computing system may include clients and servers. A client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other. The server can be a cloud server, also called a cloud computing server or a cloud host, and is a host product in a cloud computing service system, so that the defects of high management difficulty and weak service expansibility in the traditional physical host and VPS service are overcome.
It should be understood that various forms of the flows shown above may be used, with steps reordered, added, or deleted. For example, the steps described in the present invention may be executed in parallel, sequentially, or in different orders, and are not limited herein as long as the desired result of the technical solution of the present invention can be achieved.
The above-described embodiments should not be construed as limiting the scope of the invention. It should be understood by those skilled in the art that various modifications, combinations, sub-combinations and substitutions may be made in accordance with design requirements and other factors. Any modification, equivalent replacement, and improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. A method for flow management of a target application is characterized by comprising the following steps:
determining an application to be imported in a test environment;
carrying out process approval of at least two dimensions on the application to be imported to obtain a process approval result;
importing the application to be imported into a production environment according to the process approval result;
and managing the application to be imported in the production environment.
2. The method according to claim 1, wherein the process approval of the application to be imported in at least two dimensions to obtain a process approval result comprises:
carrying out security approval on the application to be imported to obtain a security approval result;
controlling to carry out format approval on the application to be imported according to the security approval result to obtain a format approval result;
and generating a process approval result comprising the security approval result and/or the format approval result.
3. The method according to claim 2, wherein controlling, according to the security approval result, to perform a format approval on the application to be imported to obtain a format approval result includes:
if the security of the application to be imported passes the approval, importing the application to be imported into a pre-release environment;
and carrying out format approval on the application to be imported into the pre-release environment to obtain a format approval result.
4. The method according to claim 3, wherein the importing the at least one application to be imported into a production environment according to the process approval result comprises:
and if the formatted approval of the application to be imported passes, importing the application to be imported into a production environment.
5. The method of claim 1, prior to the determining at least one application to import in the test environment, further comprising:
responding to a creation completion instruction of a user to a system application corresponding to an application system in a test environment, and generating a first application identifier corresponding to the system application in the test environment;
responding to an access instruction of a system application under the test environment, and accessing the system application under the test environment according to the first application identification; wherein the system application comprises at least one application to be imported.
6. The method according to any one of claims 3-5, further comprising, before importing the at least one application to be imported into the pre-release environment:
updating the first application identifications respectively corresponding to the applications to be imported to obtain second application identifications respectively corresponding to the applications to be imported under the pre-release environment;
and responding to an access instruction of the application to be imported in the pre-release environment, and accessing the application to be imported in the pre-release environment according to the second application identifier.
7. The method of claim 6, further comprising, prior to importing the at least one application to import into a production environment:
updating the second application identifications respectively corresponding to the applications to be imported to obtain third application identifications respectively corresponding to the applications to be imported under the production environment;
and responding to an access instruction of the application to be imported in the production environment, and accessing the application to be imported in the production environment according to the third application identifier.
8. A flow management device for target application is characterized by comprising:
the to-be-imported application determining module is used for determining to-be-imported applications in the test environment;
the approval result determining module is used for carrying out process approval of at least two dimensions on the application to be imported to obtain a process approval result;
the application import module is used for importing the application to be imported into a production environment according to the process approval result;
and the application management module is used for managing the application to be imported in the production environment.
9. An electronic device, characterized in that the electronic device comprises:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores a computer program executable by the at least one processor to enable the at least one processor to perform the method of procedural management of a target application of any of claims 1-7.
10. A computer-readable storage medium storing computer instructions for causing a processor to implement the method for procedural management of a target application of any one of claims 1-7 when executed.
CN202210758468.1A 2022-06-29 2022-06-29 Method, device and equipment for flow management of target application and storage medium Pending CN115080111A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210758468.1A CN115080111A (en) 2022-06-29 2022-06-29 Method, device and equipment for flow management of target application and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210758468.1A CN115080111A (en) 2022-06-29 2022-06-29 Method, device and equipment for flow management of target application and storage medium

Publications (1)

Publication Number Publication Date
CN115080111A true CN115080111A (en) 2022-09-20

Family

ID=83255615

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210758468.1A Pending CN115080111A (en) 2022-06-29 2022-06-29 Method, device and equipment for flow management of target application and storage medium

Country Status (1)

Country Link
CN (1) CN115080111A (en)

Similar Documents

Publication Publication Date Title
CN115688133A (en) Data processing method, device, equipment and storage medium
CN115576828A (en) Test case generation method, device, equipment and storage medium
CN114389969A (en) Client test method and device, electronic equipment and storage medium
CN115048352B (en) Log field extraction method, device, equipment and storage medium
CN115550413A (en) Data calling method and device, service gateway and storage medium
CN115757304A (en) Log storage method, device and system, electronic equipment and storage medium
CN115328898A (en) Data processing method and device, electronic equipment and medium
CN115080111A (en) Method, device and equipment for flow management of target application and storage medium
CN115495151A (en) Rule engine migration method, device, equipment, storage medium and program product
CN114722401A (en) Equipment safety testing method, device, equipment and storage medium
CN117081939A (en) Traffic data processing method, device, equipment and storage medium
CN115981847B (en) Service grid deployment method and device, electronic equipment and storage medium
CN115481090A (en) File processing method and device, electronic equipment and storage medium
CN114444041A (en) Interface access method and device, electronic equipment and storage medium
CN115983222A (en) EasyExcel-based file data reading method, device, equipment and medium
CN114996243A (en) Database operation method and device, electronic equipment and storage medium
CN117932671A (en) Message processing method and device, electronic equipment and storage medium
CN115526711A (en) Data processing method, device, equipment, medium and product
CN117411922A (en) Requester identification method, requester identification device, requester identification equipment and storage medium
CN115757275A (en) Asset information management method and device, electronic equipment and storage medium
CN114461963A (en) Interface access method and device, electronic equipment and storage medium
CN116719719A (en) Test method, test device, electronic equipment and storage medium
CN115567624A (en) Message processing method and device, electronic equipment and medium
CN115859349A (en) Data desensitization method and device, electronic equipment and storage medium
CN114417219A (en) Information configuration method and device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination