CN115758334A - Cloud application access method and device, electronic equipment and storage medium - Google Patents

Cloud application access method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN115758334A
CN115758334A CN202310014940.5A CN202310014940A CN115758334A CN 115758334 A CN115758334 A CN 115758334A CN 202310014940 A CN202310014940 A CN 202310014940A CN 115758334 A CN115758334 A CN 115758334A
Authority
CN
China
Prior art keywords
target
client
application
target container
container
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310014940.5A
Other languages
Chinese (zh)
Inventor
张作宸
卢伟
曹挺伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianjin Zhuolang Kunlun Cloud Software Technology Co ltd
Original Assignee
Tianjin Zhuolang Kunlun Cloud Software Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tianjin Zhuolang Kunlun Cloud Software Technology Co ltd filed Critical Tianjin Zhuolang Kunlun Cloud Software Technology Co ltd
Priority to CN202310014940.5A priority Critical patent/CN115758334A/en
Publication of CN115758334A publication Critical patent/CN115758334A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Information Transfer Between Computers (AREA)

Abstract

The invention provides an access method and device of cloud application, electronic equipment and a storage medium, wherein the access method comprises the following steps: if an access request of a client is received, a target container is created and operated; the client is used for responding to selection operation aiming at the application control and generating an access request corresponding to a target application control, wherein the access request carries an application identifier of the target application control; installing a target application program corresponding to the application identifier in the target container; and sending the address information of the target container to the client so that the client is connected with the target container based on the address information and accesses the target application program in the target container. The invention not only can provide high-quality network isolation, but also can allow users to access internet resources, thereby meeting the requirements of the users on accessing the internet on the premise of ensuring the data security.

Description

Cloud application access method and device, electronic equipment and storage medium
Technical Field
The invention relates to the technical field of cloud computing, in particular to an access method and device of cloud application, electronic equipment and a storage medium.
Background
In order to improve data security, some enterprises cannot normally access the internet by configuring office equipment (such as a personal computer, etc.), and the office process necessarily needs to access the internet, such as searching materials and transmitting files. However, it is difficult to satisfy the requirement of the user for accessing the internet on the premise of ensuring the data security.
Disclosure of Invention
In view of this, an object of the present invention is to provide an access method, an access apparatus, an electronic device, and a storage medium for a cloud application, which can not only provide high-quality network isolation, but also allow a user to access internet resources, so as to meet the requirement of the user on accessing the internet on the premise of ensuring data security.
In a first aspect, an embodiment of the present invention provides an access method for a cloud application, where the method is applied to a server, and the method includes: if an access request of a client is received, a target container is created and operated; the client is used for responding to selection operation aiming at the application control and generating an access request corresponding to a target application control, wherein the access request carries an application identifier of the target application control; installing a target application program corresponding to the application identifier in the target container; and sending the address information of the target container to the client so that the client is connected with the target container based on the address information and accesses the target application program in the target container.
In one embodiment, the method further comprises: if a program closing request sent by the client is received, executing destruction operation on the target container; wherein the client is further configured to generate a program close request in response to a close operation for the target application program.
In one embodiment, the step of installing the target application program corresponding to the application identifier in the target container includes: and deploying the first operating system matched with the application identifier in the target container, and installing a target application program corresponding to the application identifier in the first operating system.
In one embodiment, the client is configured to prohibit access to other networks than the specified network, and/or the client deploys a second operating system different from the first operating system.
In one embodiment, the step of deploying the first operating system in the target container, where the application identifier matches, and installing the target application program corresponding to the application identifier in the first operating system includes: executing a first specific command for the target container to enter the target container; deploying a first operating system matched with the application identifier in the target container, and installing a target application program corresponding to the application identifier in the first operating system; the method further comprises the following steps: when the target application program is installed, generating a mirror image compression package corresponding to the target application program; executing a second specific command aiming at the mirror image compression packet to determine a mirror image file corresponding to the target application program; wherein the image file is used for providing the target application program for the client.
In a second aspect, an embodiment of the present invention further provides an access method for a cloud application, where the method is applied to a client, and a graphical user interface is provided by the client, and the method includes: displaying at least one application control through the graphical user interface; responding to the selection operation aiming at the application control, and generating an access request corresponding to a target application control, wherein the access request carries an application identifier of the target application control; sending the access request to a server; the server is used for creating and operating a target container, installing a target application program corresponding to the application identifier in the target container, and sending address information of the target container to the client; and receiving the address information sent by the server, linking the target container based on the address information, and accessing the target application program in the target container.
In a third aspect, an embodiment of the present invention further provides an access apparatus for cloud applications, where the apparatus is applied to a server, and the apparatus includes: the container creating module is used for creating and operating a target container if an access request of a client is received; the client is used for responding to selection operation aiming at the application control and generating an access request corresponding to a target application control, wherein the access request carries an application identifier of the target application control; the program installation module is used for installing the target application program corresponding to the application identifier in the target container; and the address sending module is used for sending the address information of the target container to the client so that the client is connected with the target container based on the address information and accesses the target application program in the target container.
In a fourth aspect, an embodiment of the present invention further provides an access apparatus for a cloud application, where the apparatus is applied to a client, and provides a graphical user interface through the client, and the apparatus includes: the control display module is used for displaying at least one application control through the graphical user interface; the request generation module is used for responding to the selection operation aiming at the application control and generating an access request corresponding to a target application control, wherein the access request carries an application identifier of the target application control; the request sending module is used for sending the access request to a server; the server is used for creating and operating a target container, installing a target application program corresponding to the application identifier in the target container, and sending address information of the target container to the client; and the address receiving module is used for receiving the address information sent by the server, linking the target container based on the address information and accessing the target application program in the target container.
In a fifth aspect, the present invention further provides an electronic device, including a processor and a memory, where the memory stores computer-executable instructions that can be executed by the processor, and the processor executes the computer-executable instructions to implement the method provided in any one of the first aspect or the second aspect.
In a sixth aspect, embodiments of the present invention further provide a computer-readable storage medium storing computer-executable instructions that, when invoked and executed by a processor, cause the processor to implement the method of any one of the first aspect, or the second aspect.
The cloud application access method, the cloud application access device, the electronic equipment and the storage medium are applied to a server, if an access request of a client is received, a target container is created and operated, at least one application control is displayed on a graphical user interface of the client, the client is used for responding to selection operation aiming at the application control and generating an access request corresponding to the target application control, the access request carries an application identifier of the target application control, so that a target application program corresponding to the application identifier is installed in the target container, and finally address information of the target container is sent to the client so that the client can be connected with the target container based on the address information and can access the target application program in the target container. The method deploys the target application program to be accessed in the target container, can provide high-quality network isolation, and the user can access the target application program in the target container through the connection between the client and the target container, namely the client does not need to really access the internet but accesses the internet through the server, thereby meeting the requirement of the user on accessing the internet on the premise of ensuring the data security.
The cloud application access method, the cloud application access device, the electronic equipment and the storage medium are applied to a client, a graphical user interface is provided through the client, at least one application control is displayed through the graphical user interface, a selection operation aiming at the application control is responded, and an access request corresponding to a target application control is generated, wherein the access request carries an application identifier of the target application control; and the client receives the address information sent by the server, so as to link the target container based on the address information and access the target application program in the target container. The method generates and sends the access request based on the selection operation of the user, so that the server deploys the target application program to be accessed in the target container, high-quality network isolation can be provided, the user can access the target application program in the target container through the connection between the client and the target container, namely the client does not need to really access the internet, but the server accesses the internet, and therefore the requirement of the user for accessing the internet is met on the premise of ensuring data security.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
In order to make the aforementioned and other objects, features and advantages of the present invention comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the embodiments or the prior art descriptions will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and other drawings can be obtained by those skilled in the art without creative efforts.
Fig. 1 is a schematic flowchart of an access method for a cloud application according to an embodiment of the present invention;
fig. 2 is a cloud application architecture diagram according to an embodiment of the present invention;
FIG. 3 is a diagram of a container image generation according to an embodiment of the present invention;
fig. 4 is a schematic flowchart of another access method for a cloud application according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of an access apparatus for a cloud application according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of an access apparatus for a cloud application according to an embodiment of the present invention;
fig. 7 is a schematic structural diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions of the present invention will be clearly and completely described below with reference to the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
At present, the requirement of a user for accessing the internet is difficult to be met on the premise of ensuring data security, and therefore, the invention provides the access method, the access device, the electronic equipment and the storage medium of the cloud application, which not only can provide high-quality network isolation, but also can allow the user to access internet resources, so that the requirement of the user for accessing the internet is met on the premise of ensuring data security.
To facilitate understanding of the present embodiment, first, a detailed description is given of an access method for a cloud application, which is disclosed in the present embodiment and is applied to a server, referring to a flowchart of the access method for a cloud application shown in fig. 1, where the method mainly includes the following steps S102 to S106:
step S102, if an access request of the client is received, a target container is created and operated. The application control can be an icon of a communication application (such as nailing, weChat and the like) or a retrieval application (such as Baidu, google and the like), and the client is used for responding to selection operation of the application control to generate an access request corresponding to a target application control, wherein the access request carries an application identifier of the target application control. In practical application, if the client monitors that the user clicks the application control displayed in the graphical user interface, the application control clicked by the user is determined as a target application control, an access request corresponding to the target application control is generated, the server receives the access request sent by the client, and a docker-wire base mirror is operated to obtain a target container.
And step S104, installing the target application program corresponding to the application identifier in the target container. In one embodiment, an operating system required for installing the target application may be deployed within the target container, and the target application may be installed on the operating system, such that the target application is compatible with the win system, which may require deployment of the win system in the target container and installation of the target application in the win system after deployment of the win system is complete.
And step S106, sending the address information of the target container to the client so that the client can be connected with the target container based on the address information and access the target application program in the target container. The address information may be an IP (Internet Protocol) address. In one implementation, after the target application is installed, the target container will actively tell the client with its own IP address, and the client only needs to connect to the target container through the relevant communication protocol and IP address.
According to the access method of the cloud application, the target application program to be accessed is deployed in the target container, high-quality network isolation can be provided, and the user can access the target application program in the target container through the connection between the client and the target container, namely the client does not need to really access the internet but accesses the internet through the server, so that the requirement of the user on accessing the internet is met on the premise of ensuring data security.
To facilitate understanding of the foregoing embodiments, the embodiment of the present invention provides a cloud application architecture diagram as shown in fig. 2, where fig. 2 illustrates a server and a client, a communication connection may be established between the server and the client through RDP (remote desktop protocol), X11 (X Window System), or other protocols, the client is installed with "cloud application" software, and when a user runs the "cloud application" software, the client displays an application control, such as a WeChat, a browser, etc., that is supported by a target and can access the internet through a graphical user interface. When the corresponding application control is clicked on the client, the server receives a corresponding access request, and at the moment, the server creates a wire-based container (pod).
The following are exemplary: when a user needs to use the WeChat, the user only needs to click the WeChat icon in the cloud application software as it is, then waits for the server to finish creating the pod with the WeChat, the pod can carry the IP address of the user to actively tell the client after the creation is finished, and the client only needs to be connected to the corresponding pod through the X11 protocol and the IP address. The server side mainly uses a container to deploy a wire system, and a required networking or application with specific requirements is installed in the wire system, and the required application can be installed according to different requirements. The wire is deployed in the pod of the kubernets, so that the isolation, cross-platform, high efficiency and other characteristics of the kubernets can be utilized, and automatic extension and automatic upgrading of services are achieved.
In one embodiment, if a program closing request sent by a client is received, the destruction operation is executed on the target container, and the client is further used for responding to the closing operation aiming at the target application program and generating the program closing request. In specific implementation, the graphical user interface of the client may display a closing control of the target application program, and if it is monitored that the user clicks the closing control, it is determined that the user closes the target application program, at this time, the server receives a program closing request sent by the client, and the target container is automatically destroyed.
For convenience of understanding, an embodiment of the present invention further provides a specific implementation manner of installing a target application program corresponding to an application identifier in a target container, where a first operating system with a matching application identifier may be deployed in the target container, and the target application program corresponding to the application identifier may be installed in the first operating system. The first operating system is used for providing a running environment for the target application program. For example, assuming the target application is installed on the win system, the win system is deployed in the target container and the target application is installed within the win system.
In one embodiment: (1) Executing a first specific command aiming at the target container to enter the target container, wherein the first specific command can be a docker exec command; (2) Deploying a first operating system matched with the application identifier in the target container, and installing a target application program corresponding to the application identifier in the first operating system; (3) When the target application program is installed, generating a mirror image compression package corresponding to the target application program; (4) And executing a second specific command aiming at the image compression packet to determine an image file corresponding to the target application program, wherein the second specific command can be a docker load command, and the image file is used for providing the target application program for the client. For easy understanding, the embodiment of the present invention takes customized wire image as an example, and provides a container image generation diagram as shown in fig. 3, which runs a docker-wire base image first, then enters a running target container, installs a required Windows application (i.e., the above target application), runs a docker export command to export the target container after all applications are installed, runs a docker import command to create an image, and runs a docker run command to run an image.
It should be noted that in the embodiment of the present invention, the client is configured to prohibit access to other networks except the specified network (i.e., prohibit access to an external network), and/or the client deploys a second operating system different from the first operating system, for example, assuming that the target application needs to be installed on the win system, and the client deploys an operating system which is a linux system, that is, the client cannot install the target application.
In an implementation mode, the client can be a computer which cannot access the external network, and as the windows cloud application is deployed at the server, it is only required to ensure that the server can access the internet, and meanwhile, the client can access the server. That is to say, the client does not need to really access the internet, and the advantage of doing so is that network isolation is performed physically, so that the network security is ensured and the network attack is avoided while the internet resources are accessed.
In another embodiment, the client can also be a machine of the linux desktop system, and also the reason why the windows cloud application is not operated locally is that even the machine of the linux desktop system can use the windows application. And the network intercommunication between the client and the server is ensured, so that the application of the linux desktop system is greatly expanded.
In summary, the client can exist in a variety of scenarios where windows applications cannot be used in the traditional sense, so as to meet the requirements for using windows applications. Even if the same cloud application is used in various scenes, the application data can still be kept synchronous because the application is deployed in the cloud.
In an implementation manner, an embodiment of the present invention provides another cloud application access method, where the method is applied to a client, and a graphical user interface is provided by the client, referring to a flowchart of another cloud application access method shown in fig. 4, the method mainly includes the following steps S402 to S408:
step S402, displaying at least one application control through a graphical user interface;
step S404, responding to the selection operation aiming at the application control, and generating an access request corresponding to the target application control, wherein the access request carries an application identifier of the target application control;
step S406, sending the access request to a server; the server is used for creating and operating a target container, installing a target application program corresponding to the application identifier in the target container, and sending address information of the target container to the client;
and step S408, receiving the address information sent by the server, linking the target container based on the address information, and accessing the target application program in the target container.
According to the access method of the cloud application provided by the embodiment of the invention, the access request is generated and sent based on the selection operation of the user, so that the server deploys the target application program to be accessed in the target container, high-quality network isolation can be provided, the user can access the target application program in the target container through the connection between the client and the target container, namely the client does not need to really access the internet, but the server accesses the internet, and therefore, the requirement of the user for accessing the internet is met on the premise of ensuring the data security.
According to the access method of the cloud application, the application needing to access the internet is deployed in the wire, and then the application is deployed in the pod of the kubernets by using the container technology, so that the internet resource can be accessed while good network isolation is performed. Moreover, the linux desktop system can also use windows application, because the cloud application runs in the cloud, even in the linux system, the linux desktop system can be normally accessed through a specific protocol, so that the traditional system limitation is broken through, and the problems that the software version of the linux system is not matched with that of the windows system, or some software does not exist in the linux system and the like are solved.
In summary, the access method for the cloud application provided in the embodiment of the present invention at least has the following characteristics:
a. the use of accessing some special software can be realized based on kubernets by using minimum resources, and a plug-and-play application experience is provided.
b. With the use of the wire and container technology, in kubernets, a container is started to specifically deploy the required software, such as: the advantages of the software such as WeChat, nailing and the like are also obvious: firstly, because the application is deployed at the cloud, the occupied resources are scalable, and the required amount of the resources can be obtained by applying the resources. Secondly, the client accesses internet resources, real internet connection is not needed, the client is only required to be connected with a server for deploying cloud services, and the cloud server can access the internet. And the requirement that windows applications need to be used under different operating systems can be met.
c. Because the application is installed in the cloud, the network requirements are relatively high.
For the access method of the cloud application provided in the foregoing embodiment, an embodiment of the present invention provides an access apparatus of a cloud application, where the apparatus is applied to a server, and referring to a schematic structural diagram of an access apparatus of a cloud application shown in fig. 5, the apparatus mainly includes the following components:
a container creation module 502, configured to create and run a target container if an access request of a client is received; the client is used for responding to selection operation aiming at the application control and generating an access request corresponding to the target application control, and the access request carries an application identifier of the target application control;
a program installation module 504, configured to install a target application program corresponding to the application identifier in the target container;
and an address sending module 506, configured to send the address information of the target container to the client, so that the client connects to the target container based on the address information and accesses the target application in the target container.
According to the access device for the cloud application, provided by the embodiment of the invention, the target application program to be accessed is deployed in the target container, so that high-quality network isolation can be provided, and a user can access the target application program in the target container through the connection between the client and the target container, namely the client does not need to really access the internet but accesses the internet through the server, so that the requirement of the user on accessing the internet is met on the premise of ensuring the data security.
In one embodiment, the apparatus further comprises a destruction module configured to: if a program closing request sent by a client is received, executing destruction operation on the target container; the client is further used for responding to the closing operation of the target application program and generating a program closing request.
In one embodiment, the program installation module 504 is further configured to: and deploying the first operating system matched with the application identifier in the target container, and installing a target application program corresponding to the application identifier in the first operating system.
In one embodiment, the client is configured to prohibit access to networks other than the specified network, and/or the client is deployed with a second operating system that is different from the first operating system.
In one embodiment, the program installation module 504 is further configured to: executing a first specific command for a target container to enter the target container; deploying a first operating system matched with the application identifier in the target container, and installing a target application program corresponding to the application identifier in the first operating system; the apparatus further comprises a mirror module configured to: when the target application program is installed, generating a mirror image compression package corresponding to the target application program; executing a second specific command aiming at the mirror image compression package to determine a mirror image file corresponding to the target application program; the mirror image file is used for providing a target application program for the client.
For the access method of a cloud application provided in the foregoing embodiment, an embodiment of the present invention provides an access apparatus for a cloud application, where the apparatus is applied to a client, and provides a graphical user interface through the client, as shown in fig. 6, for a structural schematic diagram of another access apparatus for a cloud application, the apparatus mainly includes the following components:
a control display module 602, configured to display at least one application control through a graphical user interface;
a request generating module 604, configured to generate, in response to a selection operation for an application control, an access request corresponding to a target application control, where the access request carries an application identifier of the target application control;
a request sending module 606, configured to send the access request to a server; the server is used for creating and operating a target container, installing a target application program corresponding to the application identifier in the target container, and sending address information of the target container to the client;
and the address receiving module 608 is configured to receive address information sent by the server, to link the target container based on the address information, and to access the target application program in the target container.
The access device for the cloud application, provided by the embodiment of the invention, generates and sends the access request based on the selection operation of the user, so that the server deploys the target application program to be accessed into the target container, high-quality network isolation can be provided, the user can also access the target application program in the target container through the connection between the client and the target container, namely the client does not need to really access the internet, but the server accesses the internet, and the requirement of the user on accessing the internet is met on the premise of ensuring the data security.
The device provided by the embodiment of the present invention has the same implementation principle and the same technical effects as those of the foregoing method embodiments, and for the sake of brief description, reference may be made to corresponding contents in the foregoing method embodiments for the parts of the device embodiments that are not mentioned.
The embodiment of the invention provides electronic equipment, which particularly comprises a processor and a storage device; the storage means has stored thereon a computer program which, when executed by the processor, performs the method of any of the above described embodiments.
Fig. 7 is a schematic structural diagram of an electronic device 100 according to an embodiment of the present invention, where the electronic device 100 includes: a processor 70, a memory 71, a bus 72 and a communication interface 73, wherein the processor 70, the communication interface 73 and the memory 71 are connected through the bus 72; the processor 70 is arranged to execute executable modules, such as computer programs, stored in the memory 71.
The Memory 71 may include a Random Access Memory (RAM) and a non-volatile Memory (non-volatile Memory), such as at least one disk Memory. The communication connection between the network element of the system and at least one other network element is realized through at least one communication interface 73 (which may be wired or wireless), and the internet, a wide area network, a local network, a metropolitan area network, and the like can be used.
The bus 72 may be an ISA bus, PCI bus, EISA bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one double-headed arrow is shown in FIG. 7, but this does not indicate only one bus or one type of bus.
The memory 71 is configured to store a program, and the processor 70 executes the program after receiving an execution instruction, and the method executed by the apparatus defined by the flow process disclosed in any of the foregoing embodiments of the present invention may be applied to the processor 70, or implemented by the processor 70.
The processor 70 may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by instructions in the form of hardware integrated logic circuits or software in the processor 70. The Processor 70 may be a general-purpose Processor, and includes a Central Processing Unit (CPU), a Network Processor (NP), and the like; the device can also be a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field-Programmable Gate Array (FPGA), or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components. The various methods, steps, and logic blocks disclosed in the embodiments of the present invention may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present invention may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in a memory 71, and the processor 70 reads the information in the memory 71 and completes the steps of the method in combination with the hardware thereof.
The computer program product of the readable storage medium provided in the embodiment of the present invention includes a computer readable storage medium storing a program code, where instructions included in the program code may be used to execute the method described in the foregoing method embodiment, and specific implementation may refer to the foregoing method embodiment, which is not described herein again.
The functions may be stored in a computer-readable storage medium if they are implemented in the form of software functional units and sold or used as separate products. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
Finally, it should be noted that: the above-mentioned embodiments are only specific embodiments of the present invention, which are used for illustrating the technical solutions of the present invention and not for limiting the same, and the protection scope of the present invention is not limited thereto, although the present invention is described in detail with reference to the foregoing embodiments, those skilled in the art should understand that: any person skilled in the art can modify or easily conceive the technical solutions described in the foregoing embodiments or equivalent substitutes for some technical features within the technical scope of the present disclosure; such modifications, changes or substitutions do not depart from the spirit and scope of the embodiments of the present invention, and they should be construed as being included therein. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (10)

1. An access method for a cloud application, wherein the method is applied to a server, and the method comprises the following steps:
if an access request of a client is received, a target container is created and operated; the client is used for responding to selection operation aiming at the application control and generating an access request corresponding to a target application control, wherein the access request carries an application identifier of the target application control;
installing a target application program corresponding to the application identifier in the target container;
and sending the address information of the target container to the client so that the client is connected with the target container based on the address information and accesses the target application program in the target container.
2. The method of claim 1, further comprising:
if a program closing request sent by the client is received, executing destruction operation on the target container; wherein the client is further configured to generate a program close request in response to a close operation for the target application program.
3. The method of claim 1, wherein the step of installing the target application program corresponding to the application identifier in the target container comprises:
and deploying the first operating system matched with the application identifier in the target container, and installing a target application program corresponding to the application identifier in the first operating system.
4. The method of claim 3, wherein the client is configured to prohibit access to other networks than the specified network, and/or wherein the client is deployed with a second operating system different from the first operating system.
5. The method according to claim 3, wherein the step of deploying the first operating system in the target container, the first operating system matching the application identifier, and installing the target application program corresponding to the application identifier in the first operating system, comprises:
executing a first specific command for the target container to enter the target container;
deploying a first operating system matched with the application identifier in the target container, and installing a target application program corresponding to the application identifier in the first operating system;
the method further comprises the following steps:
when the target application program is installed, generating a mirror image compression package corresponding to the target application program;
executing a second specific command aiming at the image compression package to determine an image file corresponding to the target application program; wherein the image file is used for providing the target application program for the client.
6. An access method for a cloud application, the method being applied to a client through which a graphical user interface is provided, the method comprising:
displaying at least one application control through the graphical user interface;
responding to the selection operation aiming at the application control, and generating an access request corresponding to a target application control, wherein the access request carries an application identifier of the target application control;
sending the access request to a server; the server is used for creating and operating a target container, installing a target application program corresponding to the application identifier in the target container, and sending address information of the target container to the client;
and receiving the address information sent by the server, linking the target container based on the address information, and accessing the target application program in the target container.
7. An access apparatus for a cloud application, the apparatus being applied to a server, the apparatus comprising:
the container creating module is used for creating and operating a target container if an access request of a client is received; the client is used for responding to selection operation aiming at the application control and generating an access request corresponding to a target application control, wherein the access request carries an application identifier of the target application control;
the program installation module is used for installing the target application program corresponding to the application identifier in the target container;
and the address sending module is used for sending the address information of the target container to the client so that the client is connected with the target container based on the address information and accesses the target application program in the target container.
8. An access apparatus for a cloud application, the apparatus being applied to a client through which a graphical user interface is provided, the apparatus comprising:
the control display module is used for displaying at least one application control through the graphical user interface;
the request generation module is used for responding to the selection operation aiming at the application control and generating an access request corresponding to a target application control, wherein the access request carries an application identifier of the target application control;
the request sending module is used for sending the access request to a server; the server is used for creating and operating a target container, installing a target application program corresponding to the application identifier in the target container, and sending address information of the target container to the client;
and the address receiving module is used for receiving the address information sent by the server, linking the target container based on the address information and accessing the target application program in the target container.
9. An electronic device comprising a processor and a memory, the memory storing computer-executable instructions executable by the processor to perform the method of any one of claims 1 to 5 or to perform the method of claim 6.
10. A computer-readable storage medium having computer-executable instructions stored thereon, which, when invoked and executed by a processor, cause the processor to perform the method of any one of claims 1 to 5, or the method of claim 6.
CN202310014940.5A 2023-01-06 2023-01-06 Cloud application access method and device, electronic equipment and storage medium Pending CN115758334A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310014940.5A CN115758334A (en) 2023-01-06 2023-01-06 Cloud application access method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310014940.5A CN115758334A (en) 2023-01-06 2023-01-06 Cloud application access method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN115758334A true CN115758334A (en) 2023-03-07

Family

ID=85348282

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310014940.5A Pending CN115758334A (en) 2023-01-06 2023-01-06 Cloud application access method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN115758334A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116708423A (en) * 2023-08-08 2023-09-05 天津卓朗昆仑云软件技术有限公司 Cloud application-based application sharing and multiparty collaboration method, device and server

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105490860A (en) * 2015-12-24 2016-04-13 北京奇虎科技有限公司 Method, device and system for deploying application program operation environment
CN111752640A (en) * 2020-06-28 2020-10-09 中国银行股份有限公司 Cloud service-based computer software installation-free method, device and system
CN111881470A (en) * 2020-07-20 2020-11-03 易通星云(北京)科技发展有限公司 Data access method and device and computer readable storage medium
CN112044079A (en) * 2020-10-14 2020-12-08 腾讯科技(深圳)有限公司 Game running method and device, storage medium and electronic equipment
CN112799688A (en) * 2021-01-18 2021-05-14 中国银联股份有限公司 Method and device for installing software package in container application, computer equipment and medium
CN114389874A (en) * 2022-01-12 2022-04-22 平安壹钱包电子商务有限公司 Cloud application service response method and device, server and storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105490860A (en) * 2015-12-24 2016-04-13 北京奇虎科技有限公司 Method, device and system for deploying application program operation environment
CN111752640A (en) * 2020-06-28 2020-10-09 中国银行股份有限公司 Cloud service-based computer software installation-free method, device and system
CN111881470A (en) * 2020-07-20 2020-11-03 易通星云(北京)科技发展有限公司 Data access method and device and computer readable storage medium
CN112044079A (en) * 2020-10-14 2020-12-08 腾讯科技(深圳)有限公司 Game running method and device, storage medium and electronic equipment
CN112799688A (en) * 2021-01-18 2021-05-14 中国银联股份有限公司 Method and device for installing software package in container application, computer equipment and medium
CN114389874A (en) * 2022-01-12 2022-04-22 平安壹钱包电子商务有限公司 Cloud application service response method and device, server and storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116708423A (en) * 2023-08-08 2023-09-05 天津卓朗昆仑云软件技术有限公司 Cloud application-based application sharing and multiparty collaboration method, device and server
CN116708423B (en) * 2023-08-08 2023-10-31 天津卓朗昆仑云软件技术有限公司 Cloud application-based application sharing and multiparty collaboration method, device and server

Similar Documents

Publication Publication Date Title
CN108809722B (en) Method, device and storage medium for deploying Kubernetes cluster
CN112214330A (en) Method and device for deploying master nodes in cluster and computer-readable storage medium
US6874021B1 (en) Techniques for configuring network devices with consistent forms for getting and setting device properties
WO2017166446A1 (en) Vulnerability-fixing method and device
US8332490B2 (en) Method, apparatus and program product for provisioning a computer system
CN113645071B (en) Cluster deployment method, system, medium and electronic terminal
US10817267B2 (en) State machine representation of a development environment deployment process
US20240007347A1 (en) Method and system for configuring bmc ip addresses of bare metal servers, medium and device
CN111026982A (en) Intelligent contract processing method, computer equipment and storage medium
CN113259479B (en) Data processing method and equipment
US10404568B2 (en) Agent manager for distributed transaction monitoring system
JP2018500688A (en) Computer-readable storage medium for dynamic service deployment and method and system for utilizing the same
CN106648838B (en) Resource pool management configuration method and device
CN114422618B (en) Cloud-protogenesis-based IOT platform protocol adaptation method, device, equipment and medium
CN110855746A (en) Middleware management method, electronic device and storage medium
CN111079048A (en) Page loading method and device
CN110928554A (en) Deployment method, device, equipment and storage medium
US10120707B2 (en) Deployment of development environments
CN115758334A (en) Cloud application access method and device, electronic equipment and storage medium
CN111163167A (en) System installation method and device
CN112199621B (en) Method and device for quickly generating poster and computer equipment
CN108365976B (en) Network service optimization method and device
CN107301053B (en) Picture configuration method and device and electronic terminal
WO2015003570A1 (en) Data downloading method,device and system thereof
CN114615285B (en) Physical machine deployment method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20230307