The method and device of service request processingTechnical field
This application involves technical field of data processing, more specifically, being the method and device of service request processing.
Background technique
Transaction processing system can receive the business processing request of exterior transmission, according to preset processing logicRequest is handled, and processing result is returned to the sender of business processing request.It is carried out by taking a specific example as an exampleExplanation.Bank's processing system can receive user and be requested by the transaction detail query that terminal is sent, in data-storage systemMiddle inquiry associated transaction detail data, and associated transaction detail data are returned into user terminal.
It is realized currently, data process method generally passes through JAVA file, i.e., writes data process method in JAVA file,JAVA file is called to execute treatment process during processing.However, this processing mode efficiency is lower.
Summary of the invention
In view of this, this application provides a kind of method of service request processing, to improve the place of business processing requestManage efficiency.In addition, present invention also provides a kind of device of service request processing, to guarantee the method answering in practiceWith and realize.
In order to achieve the object, technical solution provided by the present application is as follows:
In a first aspect, this application provides a kind of methods of service request processing, comprising:
After receiving business processing request, corresponding with business processing request the first XML configuration file and the are obtainedTwo XML configuration files;The resolution rules and processing returns to knots that wherein the first XML configuration file record has business processing to requestThe assembling rule of fruit;The second XML configuration file record has the business processing to request relevant processing logical statement, describedIt handles logical statement and includes at least data base manipulation statement;
According to the resolution rules in first XML configuration file, target component is extracted from business processing request;
The data base manipulation statement in second XML configuration file is read, and the target component is passed to the numberAccording to being executed in the action statement of library, to obtain database manipulation result;
According to the assembling rule in first XML configuration file, the database manipulation result is assembled into processing knotFruit returned packet;
Return to the processing result returned packet.
Second aspect, this application provides a kind of devices of service request processing, comprising:
Configuration file obtains module, after receiving business processing request, obtains corresponding with business processing requestThe first XML configuration file and the second XML configuration file;Wherein the first XML configuration file record has business processing requestResolution rules and processing returns to the assembling of result rule;The second XML configuration file record has the business processing to requestRelevant processing logical statement, the processing logical statement include at least data base manipulation statement;
The extraction module of target component, for according to the resolution rules in first XML configuration file, from the businessTarget component is extracted in processing request;
Database manipulation result obtains module, for reading the data base manipulation statement in second XML configuration file,And the target component is passed in the data base manipulation statement and is executed, to obtain database manipulation result;
Returned packet assembles module, for regular according to the assembling in first XML configuration file, by the databaseOperating result is assembled into processing result returned packet;
Returned packet return module, for returning to the processing result returned packet.
This application provides a kind of method of operating database, this method obtains after receiving business processing requestBusiness processing requests corresponding first XML configuration file and the second XML configuration file, and the first XML configuration file is for parameterIt extracts and the encapsulation of result, the second XML configuration file is used to be operated to obtain as a result, using in turn according to library using parameter logisticFirst XML configuration file extracts target component from business processing request, reads the database in the second XML configuration fileAction statement simultaneously executes, to obtain database manipulation as a result, and according to first XML configuration file by the database manipulationAs a result it is assembled into processing result returned packet, returns to the processing result returned packet.It is counted with existing using JAVA fileIt is compared according to the mode that library operates, the application does not use JAVA file, but the database of record in the second XML configuration fileAction statement, since the execution efficiency of the second XML configuration file is better than JAVA file, so that the execution efficiency of the application is higher than nowSome database manipulation modes.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show belowThere is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only thisThe embodiment of application for those of ordinary skill in the art without creative efforts, can also basisThe attached drawing of offer obtains other attached drawings.
Fig. 1 is a flow chart of the method for service request provided by the present application processing;
Fig. 2 is an example of the second XML configuration file provided by the present application;
Fig. 3 is a structural schematic diagram of the device of service request provided by the present application processing.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, completeSite preparation description, it is clear that described embodiments are only a part of embodiments of the present application, instead of all the embodiments.It is based onEmbodiment in the application, it is obtained by those of ordinary skill in the art without making creative efforts every otherEmbodiment shall fall in the protection scope of this application.
Technical solution in order to facilitate understanding, the application connected applications scene first are illustrated.
Business processing scene is that a method, apparatus can send business processing request to another method, apparatus, is sent out for ease of descriptionMethod, apparatus is sent to be properly termed as request equipment, receiver equipment is properly termed as processing equipment.Request equipment can be user terminal,It can be other kinds of terminal or system.
It should be noted that the treatment process that processing equipment requests business processing is logical in the application scenarios of the applicationOften need to obtain required business datum from Database Systems using Database Systems.Also, in order to carry out data base setThe inquiry operation of system, it is also necessary to extract required query argument from business processing request.Therefore, it can be seen that processing equipment pairThe treatment process of business processing request can be divided into two parts, inquire required parameter first is that extracting from business processing requestProcess, second is that, using parameter logistic according to the operating process in library.
The operating process of the parameter extraction process and database of current business processing request, all relies on JAVA fileIn the processing logic write, and the execution efficiency of JAVA file is lower.
Explanation about extracting parameter process in business processing request.
Business processing request is generally sent by way of message, that is to say, that business processing is requested to seal by request equipmentDress is sent to processing equipment in messages.In order to make it easy to understand, message is explained.Message (message), is networkThe data cell of middle exchange and transmission, i.e. the website data block disposably to be sent.Message contains to be sent completeBusiness processing solicited message, length is very inconsistent, and length is unlimited and variable.It is also the unit of network transmission, in transmission processGrouping can be constantly packaged into, packet, frame transmit, the mode of encapsulation is exactly to add some message segments, those be exactly heading withThe data that certain format is organized.For example there are type of message, message version, message length, message entity etc. information in the inside.Message is exactly when making requests and respond between each system for exchanging information, it is also necessary to the format abided by the regulations.In addition, being mostly when needing to communicate between multiple systems using message, for example bank's ESB system arrives Unionpay to gateway system againSystem.
After processing equipment receives message, is extracted and looked into from business processing request using the extraction logic of JAVA file editAsk parameter.The development process of JAVA file is complex, and implementation procedure needs compilation run, and execution efficiency is lower.
Explanation about database manipulation process.
The processing of one business function usually requires to call the business datum in Database Systems.Concrete implementation modeIt is that the module of operating database can receive the business processing request of external interface transmission, according to wanting for business processing requestIt asks, relevant business datum is called from Database Systems.
The module of operating database is properly termed as database operating modules, and the module is in order to realize the processing function to databaseCan, it needs to call the data base manipulation statement in the JAVA file write in advance, the mode efficiency of this processing database is lower.
In addition, one business processing request may need database manipulation mould due to the complexity of business scenario in realityTables of data in block and Database Systems carries out multiple interactive operation.The logic of interaction process is included in JAVA file.It shouldInteraction process logic in file includes that the data that previous secondary data base manipulation statement obtains are assigned to latter secondary database manipulationSentence, then the operation that carries out database connection etc., and primary data base manipulation statement and Database Systems after executing again intoRow interactive operation.It interacts repeatedly, database code should be developed, corresponding calling logic is also developed in JAVA fileCode.Not only execution efficiency is slow for this processing logic, but also versatility is poor, and development efficiency is also relatively low.
In order to solve at least one above-mentioned technical problem, this application provides a kind of method flows of operating database, seeFig. 1, this method process specifically comprise the following steps S101~S105.
S101: after receiving business processing request, corresponding with business processing request the first XML configuration file and the are obtainedTwo XML configuration files;The resolution rules and processing returns to results that wherein the first XML configuration file record has business processing to requestAssembling rule;Second XML configuration file record has business processing to request relevant processing logical statement, and processing logical statement is at leastIncluding data base manipulation statement.
Wherein, processing equipment can receive business processing request, need after receiving business processing request according to businessProcessing request determines corresponding XML configuration file.XML configuration file includes two classes, wherein the first XML configuration file is for extractingTarget component and return processing result, the second XML configuration file are used for operating database.For ease of description, two XML configurationsFile is referred to as the first XML configuration file and the second XML configuration file.
Different business processing requests use different types of message, and different types of message, message field (MFLD) is different, thusAlso different the first XML configuration file need to set.
For example, some business processing request for inquiry the same day transaction details, the business processing request in include card number,The fields such as Query Dates, coded format;Another business processing request is query history transaction details, is wrapped in business processing requestContain the fields such as card number, from date, date of expiry, coded format.Two service inquiries request corresponding to be two differentFirst XML configuration file.It should be noted that the particular content of type of message is arranged according to actual needs, do not limit toIn above-mentioned examples cited.
In order to search the first required XML configuration file, the mark and the first XML that business processing request can be set are configuredThe corresponding relationship of file.In this way, in practical applications, after receiving business processing request, according to business processing requestMark and above-mentioned corresponding relationship can find the business processing and request corresponding first XML configuration file.
It should be noted that the number of the first XML configuration file can not be one, it can be two.Two the first XMLConfiguration file is respectively intended to extract target component, and assembling processing result returned packet.
It is the explanation about the first XML configuration file above, about being described as follows for the second XML configuration file.
It is understood that database processing logic corresponding to different business processing requests is different.
The type of business processing request first is different, and processing logic is then different.For example, a certain business processing request isTransaction details are inquired, then are needed using query sentence of database;The request of another business processing to delete contact person, then need usingDatabase cancel statement.Furthermore even same type business processing is requested, processing logic is not also identical.It such as is all dataLibrary inquiry sentence, but inquire content difference may cause query logic may also be different, as may include in a kind of processing logicThe verifying of query argument, another kind is handled not to be needed to verify query argument in logic.
Therefore, it can be requested in advance for different business processings, write corresponding processing logical statement.It needs to illustrateIt is that the application is protected using the configuration file of XML (Extensible Markup Language, extensible markup language) formatDeposit processing logical statement, that is to say, that different corresponding the second different XML configuration files of business processing request.
After receiving business processing request, the corresponding relationship between the second XML configuration file is requested according to business processing,The second XML configuration file corresponding to it is determined for received business processing request.
Record has business processing to request corresponding processing logical statement, processing logical statement point in second XML configuration fileFor multiple types, in order to realize the operation to database, processing logical statement includes at least data base manipulation statement.
Wherein, data base manipulation statement refers to the sentence that operation is executed to database, and operation may include inquiry, deleteThe various types such as remove, increase, modifying.Data base manipulation statement can be specially SQL (Structured Query Language,Structured query language) sentence.
S102: according to the resolution rules in the first XML configuration file, target component is extracted from business processing request.
Wherein, the first XML configuration file is write according to message field (MFLD), includes which field in message, then firstThe extracting rule of which field will be set in XML configuration file.
In one example, business processing request is encapsulated in request message, and resolution rules mainly include, order of the field andField length.Then the specific implementation of this step is that the message of each matching field length is successively extracted from request messageSegment;And the corresponding parameter of each message segment is determined according to the setting rule of order of the field, wherein the parameter determinedThe target component extracted.
Specifically, each field arranges in a certain order in request message, and each field is according to the rulesLength setting.Therefore after receiving request message, it can split, split according to field length from request messageEach message segment may be considered each field, according still further to the regulation of order of the field, determine that each message segment is assorted respectivelyField.The field determined i.e. target component.
For example, order of the field is: card number, day in the extracting rule of certain request message for being used to inquire day trade transaction detailPhase and currency type;Field length is respectively 16,8,3.After the request message for receiving day trade transaction detail, first out of messageThe message segment of 16 length is first extracted in appearance, it is assumed that be 1234567890987654, according to the order of the field message pieceSection is card number;The message segment of 8 length is extracted again, it is assumed that is 20180505, according to order of the field, the message segment isDate;The message segment of 3 length is extracted again, it is assumed that is RMB, is currency type according to the order of the field message segment.It is comprehensiveFrom the point of view of, three target components, respectively card number, date and currency type can be extracted from message content.On it should be noted thatIt states in extracting mode, determines the corresponding content of parameter of message segment after first extracting a message segment, can also be and mentionIt gets whole message segments and determines the corresponding content of parameter of each message segment respectively again.
On the basis of the above, resolution rules can also include field type, and field type is used to verify extracted meshMark parameter data type whether the rule of matching field type.If the field type of target component does not meet preset field typeRule, then can return to miscue message.
For example, the field type for some target component extracted is card number, the field type of card number is number, it is assumed that fromThe card number parameter extracted in message includes character, then illustrates the type of the parameter and incongruent field type provides;AgainSuch as, the field type for some target component extracted is the date, it is assumed that the date parameter extracted from message is20181345, the target component and the rule for not meeting the date, rule be four figures in year, the moon is double figures, and day is double figures,It can then determine the target component and illegal.
Be below include resolution rules the first XML configuration file an example.
In above-mentioned resolution rules, field length is as shown in length attribute, field name such as name attribute, order of the fieldAs shown in the successive sequential write of field.The target component for including in request message can be extracted according to the resolution rules.
The target component extracted includes parameter name and parameter value, and target component can be used and carry out into databaseData query, detailed process is as follows shown in a step.
S103: the data base manipulation statement in the second XML configuration file is read, and target component is passed to database manipulationIt is executed in sentence, to obtain database manipulation result.
It wherein, include data base manipulation statement in the second XML configuration file, data base manipulation statement may be embodied in labelIn node, the label node of the second XML configuration file is read, parses data base manipulation statement wherein included, and execute and solvedThe data base manipulation statement analysed, and then database manipulation result can be obtained.
It should be noted that the data base manipulation statement in this step can be multiple, in practical applications, need successivelyEach label node in the second XML configuration file is read, the data base manipulation statement in each label node is parsed, by upper oneThe target component that step obtains is passed to data base manipulation statement and executes.
More specifically, pieces of data library action statement in the second XML configuration file have front and back sequential write, then according toThe front and back sequential write, the data base manipulation statement being successively read in the second XML configuration file and execution.2nd XML configuration textWhen the first data library action statement executes in part, need to connect database, the first data library executes sentence and is finished itAfterwards, subsequent data base manipulation statement can be directly read and executed, and be not required to the mode of operation such as existing JAVA file,There is still a need for connect to be operated with Database.
S104: according to the assembling rule in the first XML configuration file, database manipulation result is assembled into processing result and is returnedReturn text.
Wherein, the assembling rule of returned packet is set in the first XML configuration file, and assembling rule may include: that field is suitableSequence, assembling format etc..
It is an example for including the first regular XML configuration file of assembling below.In following assembling rules, returnField respectively include transaction code, return code, return information, summary journal item number, Record to return, customer ID, customer name, friendshipEasy card number, Transaction Account number ... charge account, the following sequential write of order of the field, for example following name attributes of assembling format andShown in length attribute.
After obtaining database manipulation result, data manipulation result is assembled into returned packet according to above-mentioned assembling rule.
S105: processing result returned packet is returned.
Wherein, returned packet is returned to the sender of business processing request.
From the above technical scheme, this application provides a kind of method of operating database, this method is receiving industryAfter business processing request, obtains business processing and request corresponding first XML configuration file and the second XML configuration file, the first XMLConfiguration file is for the extraction of parameter and the encapsulation of result, and the second XML configuration file using parameter logistic according to library for being graspedIt obtains as a result, extracting target component from business processing request using the first XML configuration file in turn, the 2nd XML of reading matchesThe data base manipulation statement in file and execution are set, to obtain database manipulation as a result, and will count according to the first XML configuration fileIt is assembled into processing result returned packet according to library operating result, returns to processing result returned packet.With it is existing using JAVA file intoThe mode of row database manipulation is compared, and the application does not use JAVA file, but records number in the second XML configuration fileAccording to library action statement, since the execution efficiency of the second XML configuration file is better than JAVA file, so that the execution efficiency of the application is highIn existing database manipulation mode.
Specifically, the execution speed of the second XML configuration file is better than the execution speed of JAVA file.The reason is that theTwo XML configuration files are loaded into memory, if the query result that last data library action statement obtains is needed in subsequent numberAccording to being used in the action statement of library, then the query result that last data library action statement obtains can be transmitted directly to subsequent numberIt is used according to library action statement, does not need to be sentenced as the query result of data base manipulation statement each in JAVA fileThe logical process such as disconnected, assignment are used to other data base manipulation statements again after processing.
In addition, the operational process of the first XML configuration file does not need the Complied executing of JAVA file, to transportLine efficiency is higher.
Advantage in terms of in addition to execution efficiency, the exploitation of the development efficiency of the second XML configuration file also superior to JAVA fileEfficiency.The reason is that needing to recompilate the exploitation such as packing after JAVA file modification if the logic of business processing needs to modifyOperation.However, not needing to execute these exploitation operations, only configuration file content after the modification of the second XML configuration fileModification.
In the prior art, code development larger workload increases the burden of developer.However, the application can rootAccording to label rule, the processing such as flexible configuration parsing, biography value, result of return inquiry database are patrolled in the second XML configuration fileVolume.User only needs to write second XML configuration file and introduces response Jar packet, can realize flexible configuration automatically,Additional any workload is not needed, the unnecessary development amount of developer can be greatly decreased in the application.
The concrete form of the second XML configuration file is illustrated below.
Second XML configuration file is made of label node one by one, and each label node has respective processingContent, the processing logic for collectively forming the second XML configuration file and being recorded of process content.The process content of label node canTo be to be operated to database, can be and carry out format verification etc. content to incoming parameter.Second XML configuration file is heldLine mode is, according to the successive sequential write of label node, successively executes process content represented by label node.
Processing logical statement in second XML configuration file includes incoming parameter, and the source for being passed to parameter includes two typesThe request of type, respectively business processing and database manipulation result.That is, extracting parameter in being requested from business processing,The parameter of extraction is as the incoming parameter in data base manipulation statement.Alternatively, the operating result of a data base manipulation statement canUsing the incoming parameter as another data base manipulation statement.
If the incoming parameter of data base manipulation statement is requested from business processing, the second XML configuration file is readIn data base manipulation statement and execution, specific implementation include:
Target component is extracted from business processing request;Read the data base manipulation statement in the second XML configuration file;It willTarget component is passed to data base manipulation statement as incoming parameter, and executes the incoming data base manipulation statement for having parameter.
Processing logical statement in second XML configuration file is in addition to that can also include including above data library action statementThe sentence of following two type, i.e. Verification sentence and verification result return statement.
The second XML configuration file based on above-mentioned form, the method for operating database provided by the present application further include followingStep, it may be assumed that
It reads the Verification sentence in the second XML configuration file and executes, to obtain the verification result of target component;WithAnd read the verification result return statement in the second XML configuration file and execute, with return parameters verification result.
It wherein include proof rule and parameter and standard in Verification sentence, according to proof rule verifying business processing requestIn parameter whether meet parameter and standard.The effect of verification result return statement is that verification result is returned to business processing requestSender.
Below by way of specific application scenarios and several second XML configuration file examples, to the shape of the second XML configuration fileFormula is illustrated.
Database operating modules receive the business processing request of external interface transmission, it is assumed that business processing requestPurpose be, request from database inquire certain time period in bank card business dealing detail.Then database operating modules parseParameter required for inquiry database is therefrom extracted in business processing request, and parameter includes from date and the termination of periodDate.
By taking the second XML configuration file shown in Fig. 2 as an example, it is assumed that the time parameter that extracts is from business processing requestSTR_DATE (from date of period) and END_DATE (date of expiry of period) includes label in the configuration fileNode<ifbf>includes condition field in the label node, and what which indicated is the judgement to two time parametersCondition.The content of Rule of judgment is to judge whether the format of time parameter is inaccurate.According to the processing logic of configuration file, such asThe format inaccuracy of fruit time parameter, then return to the content for including in label node<key>, the content which includes is usedIn expression time parameter format inaccuracy.
It requires supplementation with a bit, the R in Fig. 2 in condition field can be used to indicate that external incoming parameter.
About data base manipulation statement it should be noted that including this type of data base manipulation statement in processing logical statementThe sentence of type, query sentence of database may be embodied in various types of label nodes and execute.
A kind of example is that query sentence of database may be embodied in<atom>label node.
The example code of second XML configuration file shown in see below, include in label node<atom>subtab<Content >, it include the SQL statement for indicating inquiry, i.e. SELECT statement in the subtab.
It requires supplementation with a bit, the D in the condition field of above-mentioned example code can be indicated, parameter TIME_SCOPEFrom the resulting query result of other query sentence of database.
In another example, query sentence of database be may be embodied in Rule of judgment<ifbf>label node.
Still by taking above-mentioned example code as an example, what the condition field in<ifbf>label node may include is dataLibrary action statement.
In another example, data base manipulation statement is further included in circulation class label node.
Circulation class label node refers to that circulation repeatedly carries out the label node of the operation of same treatment.Database manipulationSentence is included in such label node, can realize the processing to the multiple identical content of database.
In another example, data base manipulation statement is further included in the label node of the types such as text class label nodeIn.
Text class label node refers to the label node comprising JAVA sentence.Data base manipulation statement also may includeIn such label node.For example, the function of JAVA sentence is, looked into obtaining data base manipulation statement from databaseAfter all query results ask, select the partial query result for meeting condition as the inquiry finally returned that from query resultAs a result.
It should be noted that in addition to above several examples, data base manipulation statement is further included in other kinds of markIt signs in node.
No matter label section of the data base manipulation statement in the label node of which seed type, in the second XML configuration filePoint has successive sequential write.
In practical applications, the method for operating database provided by the present application can also include: to the second XML configuration fileVerification step.Specifically: the verification step to the second XML configuration file may include:
Obtain the second XML configuration file content format rule, and verify the second XML configuration file content format whetherMeet content format rule.
Wherein, the second XML configuration file has certain content format rule, for example, may in the second XML configuration fileWhich the label node that will appear has, what kind of the title of each label node is, how the cannonical format of label node is, which the field that label node may include has, what kind of the title of field is, what kind of the cannonical format of field is,Etc..
Before executing the processing logical statement in the second XML configuration file, the content to the second XML configuration file is neededFormat is verified, its no requirement for meeting above content format convention is verified.Similarly, can to the first XML configuration file intoRow verifying.
Two XML configuration files in the application can be run and be executed by JAR packet.From the point of view of specific, JAR packet be can parseResolution rules in first XML configuration file extract target component from business processing request according to the resolution rules, can also be withAccording to the assembling of the processing result returned packet in the first XML configuration file rule, database manipulation result is assembled into returnMessage.The data base manipulation statement in the second XML configuration file can also be performed in JAR packet, to obtain database manipulation result.
See Fig. 3, this application provides a kind of devices of operating database, it specifically includes: configuration file acquisition module 301,The extraction module 302 of target component, database manipulation result obtain module 303, returned packet assembles module 304, returned packetReturn module 305.
Configuration file obtains module 301, after receiving business processing request, obtains corresponding with business processing requestFirst XML configuration file and the second XML configuration file;The wherein parsing that the first XML configuration file record has business processing to requestRule and processing returns to the assembling of result rule;Second XML configuration file record has business processing to request relevant processing logicSentence, processing logical statement include at least data base manipulation statement;
The extraction module 302 of target component, for according to the resolution rules in the first XML configuration file, from business processingTarget component is extracted in request;
Database manipulation result obtains module 303, for reading the data base manipulation statement in the second XML configuration file,And target component is passed in data base manipulation statement and is executed, to obtain database manipulation result;
Returned packet assembles module 304, for regular according to the assembling in the first XML configuration file, by database manipulationAs a result it is assembled into processing result returned packet;
Returned packet return module 305, for returning to processing result returned packet.
In one example, data base manipulation statement includes a plurality of, and pieces of data library action statement configures text in the 2nd XMLThere is front and back sequential write in part;Then database manipulation result obtains module and is used to read the data in the second XML configuration fileLibrary action statement simultaneously executes, comprising: database manipulation result obtains module, is specifically used for successively reading according to front and back sequential writeTake the data base manipulation statement in the second XML configuration file and execution.
In one example, business processing request is encapsulated in request message, and resolution rules include: order of the field and fieldLength;Then the extraction module of target component is used for according to the resolution rules in the first XML configuration file, from business processing requestExtract target component, comprising: the extraction module of target component, specifically for successively extracting each matching field from request messageThe message segment of length;And the corresponding parameter of each message segment is determined according to the setting rule of order of the field, wherein reallyThe target component that the parameter made is extracted.
In one example, logical statement is handled further include: Verification sentence and verification result return statement;The then dressIt sets further include: Verification module, for reading the Verification sentence in the second XML configuration file and executing, to obtain meshMark the verification result of parameter;And read the verification result return statement in the second XML configuration file and execute, with return parametersVerification result.
In one example, the device of service request processing further include: configuration file authentication module, for obtaining firstThe content format of XML configuration file and the second XML configuration file rule, and verify the first XML configuration file and the 2nd XML configurationWhether the content format of file meets content format rule.
It should be noted that all the embodiments in this specification are described in a progressive manner, each embodiment weightPoint explanation is the difference from other embodiments, and the same or similar parts between the embodiments can be referred to each other.
It should also be noted that, herein, relational terms such as first and second and the like are used merely to oneEntity or operation are distinguished with another entity or operation, without necessarily requiring or implying between these entities or operationThere are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant are intended to containLid non-exclusive inclusion, so that the process, method, article or equipment including a series of elements is not only wanted including thoseElement, but also including other elements that are not explicitly listed, or further include for this process, method, article or equipmentIntrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded thatThere is also other identical elements in process, method, article or equipment including above-mentioned element.
The foregoing description of the disclosed embodiments makes professional and technical personnel in the field can be realized or use the application.Various modifications to these embodiments will be readily apparent to those skilled in the art, as defined hereinGeneral Principle can be realized in other embodiments without departing from the spirit or scope of the application.Therefore, the applicationIt is not intended to be limited to the embodiments shown herein, and is to fit to and the principles and novel features disclosed herein phase oneThe widest scope of cause.