技术领域Technical field
本申请涉及微服务领域,尤其涉及一种微服务调用方法、装置、设备及存储介质。This application relates to the field of microservices, and in particular, to a microservice calling method, device, equipment and storage medium.
背景技术Background technique
随着互联网技术的发展,微服务的应用也越来越广泛,例如,随着时间推移单体项目越来越庞大,为了开发和维护项目,需要将庞大的单体项目拆分为多个微服务。在项目开发及维护期间,微服务的之间的调用越来越频繁,为了保证项目的正常开发,亟需解决微服务调用安全的问题。With the development of Internet technology, the application of microservices is becoming more and more widespread. For example, as time goes by, single projects become larger and larger. In order to develop and maintain the project, it is necessary to split the huge single project into multiple microservices. Serve. During project development and maintenance, calls between microservices become more and more frequent. In order to ensure the normal development of the project, it is urgent to solve the problem of microservice call security.
传统的微服务调用方法是通过调用微服务接口ip实现微服务调用。The traditional method of calling microservices is to implement microservice calling by calling the microservice interface IP.
但是,这种传统方法只需要知道需要调用的微服务的ip、端口及接口地址,就可以调用该微服务,被调用的微服务不知道是哪些微服务调用,无法保证微服务自身的接口安全,使得微服务调用的安全性较低。However, this traditional method only needs to know the IP, port and interface address of the microservice to be called before it can call the microservice. The called microservice does not know which microservice is being called, and cannot guarantee the interface security of the microservice itself. , making microservice calls less secure.
发明内容Contents of the invention
本申请提供一种微服务调用方法、装置、设备及存储介质,其主要目的是提高微服务调用的效率及安全性。This application provides a microservice calling method, device, equipment and storage medium, the main purpose of which is to improve the efficiency and security of microservice calling.
为了解决上述技术问题,本申请实施例提供一种微服务调用方法,采用了如下所述的技术方案:In order to solve the above technical problems, embodiments of this application provide a microservice calling method, which adopts the following technical solution:
接收微服务请求方发起的调用请求;Receive the call request initiated by the microservice requester;
调用配置好的鉴权组件以及配置中心,并利用所述鉴权组件解析所述调用请求,得到微服务请求信息;Call the configured authentication component and configuration center, and use the authentication component to parse the call request to obtain the microservice request information;
获取所述配置中心存储的微服务请求方的鉴权信息;Obtain the authentication information of the microservice requester stored in the configuration center;
根据所述鉴权信息利用所述鉴权组件对所述微服务请求信息进行鉴权,得到鉴权结果;Use the authentication component to authenticate the microservice request information according to the authentication information, and obtain the authentication result;
根据所述鉴权结果向所述微服务请求方返回调用结果。Return the calling result to the microservice requester according to the authentication result.
进一步的,所述根据所述鉴权信息利用所述鉴权组件对所述微服务请求信息进行鉴权,得到鉴权结果,包括:Further, the authentication component is used to authenticate the microservice request information according to the authentication information, and the authentication result is obtained, including:
查询所述微服务请求信息是否存在于所述鉴权信息中的权限记录表中;Query whether the microservice request information exists in the permission record table in the authentication information;
当所述微服务请求信息不存在于所述权限记录表中,则确定所述鉴权结果为鉴权不通过;When the microservice request information does not exist in the permission record table, it is determined that the authentication result is that the authentication fails;
当所述微服务请求信息存在于所述权限记录表中,则确定所述鉴权结果为鉴权通过。When the microservice request information exists in the permission record table, it is determined that the authentication result is authentication passed.
进一步的,所述根据所述鉴权信息利用所述鉴权组件对所述微服务请求信息进行鉴权,得到鉴权结果,还包括:Further, using the authentication component to authenticate the microservice request information according to the authentication information to obtain the authentication result also includes:
获取所述微服务请求信息的数字签名;Obtain the digital signature of the microservice request information;
验证所述数字签名与预设公钥是否匹配;Verify whether the digital signature matches the preset public key;
当所述数字签名与所述预设公钥匹配,确定所述微服务请求信息的鉴权结果为鉴权通过;When the digital signature matches the preset public key, it is determined that the authentication result of the microservice request information is authentication passed;
当所述数字签名与所述预设公钥不匹配,确定所述微服务请求信息的鉴权结果为鉴权未通过。When the digital signature does not match the preset public key, it is determined that the authentication result of the microservice request information is that the authentication failed.
进一步的,所述利用所述鉴权组件解析所述调用请求,得到微服务请求信息,包括:Further, the authentication component is used to parse the call request to obtain microservice request information, including:
利用所述鉴权组件中的过滤器拦截所述调用请求,并判断所述调用请求的合法性;Use the filter in the authentication component to intercept the call request and determine the legality of the call request;
当所述调用请求合法,则利用所述过滤拦截器读取所述调用请求的微服务请求信息;When the call request is legal, use the filter interceptor to read the microservice request information of the call request;
当所述调用请求不合法,则确定所述调用请求的微服务请求方不存在请求权限。When the calling request is illegal, it is determined that the microservice requester of the calling request does not have the request authority.
进一步的,所述根据所述鉴权结果向所述微服务请求方返回调用结果,包括:Further, returning a call result to the microservice requester based on the authentication result includes:
若所述鉴权结果为鉴权通过,从所述微服务请求信息中获取目标微服务标识及接口,并将所述接口的调用信息返回至所述微服务请求方;If the authentication result is authentication passed, obtain the target microservice identifier and interface from the microservice request information, and return the calling information of the interface to the microservice requester;
若所述鉴权结果为鉴权未通过,向所述微服务请求方返回调用错误提示。If the authentication result is that the authentication fails, a call error message is returned to the microservice requester.
进一步的,所述调用配置好的鉴权组件以及配置中心之前,所述方法还包括:Further, before calling the configured authentication component and configuration center, the method also includes:
获取待配置的鉴权插件,配置所述鉴权插件的过滤器、身份信息、资源及操作类型参数,得到初始鉴权组件;Obtain the authentication plug-in to be configured, configure the filter, identity information, resources and operation type parameters of the authentication plug-in, and obtain the initial authentication component;
判断所述初始鉴权组件与所述配置中心连接是否成功;Determine whether the connection between the initial authentication component and the configuration center is successful;
当所述初始鉴权组件与所述配置中心连接失败,则确定所述初始鉴权组件的鉴权功能异常,需要重新对所述鉴权插件进行配置,直至所述鉴权组件与所述配置中心连接成功,得到所述鉴权组件;When the connection between the initial authentication component and the configuration center fails, it is determined that the authentication function of the initial authentication component is abnormal, and the authentication plug-in needs to be reconfigured until the authentication component is connected to the configuration center. The central connection is successful and the authentication component is obtained;
当所述初始鉴权组件与所述配置中心连接成功,则确定所述初始鉴权组件的鉴权功能正常,并将所述初始鉴权组件作为所述鉴权组件。When the initial authentication component is successfully connected to the configuration center, it is determined that the authentication function of the initial authentication component is normal, and the initial authentication component is used as the authentication component.
进一步的,所述调用配置好的鉴权组件以及配置中心之前,所述方法还包括:Further, before calling the configured authentication component and configuration center, the method also includes:
获取待配置的配置中心源码及运行环境,并在所述运行环境中编译所述配置中心源码,得到配置文件;Obtain the configuration center source code and operating environment to be configured, and compile the configuration center source code in the operating environment to obtain the configuration file;
在所述配置文件中增加鉴权信息、运行属性及微服务注册功能,根据所述运行属性及所述微服务注册功能将微服务部署至所述配置文件中,得到所述配置中心。Authentication information, running attributes and a microservice registration function are added to the configuration file, and microservices are deployed to the configuration file according to the running attributes and the microservice registration function to obtain the configuration center.
为了解决上述技术问题,本申请实施例还提供一种微服务调用装置,采用了如下所述的技术方案:In order to solve the above technical problems, embodiments of the present application also provide a microservice calling device, which adopts the following technical solution:
接收模块,用于接收微服务请求方发起的调用请求;The receiving module is used to receive the call request initiated by the microservice requester;
解析模块,用于调用配置好的鉴权组件以及配置中心,并利用所述鉴权组件解析所述调用请求,得到微服务请求信息;The parsing module is used to call the configured authentication component and configuration center, and use the authentication component to parse the call request to obtain the microservice request information;
获取模块,用于获取所述配置中心存储的微服务请求方的鉴权信息;An acquisition module, used to acquire the authentication information of the microservice requester stored in the configuration center;
鉴权模块,用于根据所述鉴权信息利用所述鉴权组件对所述微服务请求信息进行鉴权,得到鉴权结果;及An authentication module, configured to use the authentication component to authenticate the microservice request information according to the authentication information and obtain an authentication result; and
调用模块,用于根据所述鉴权结果向所述微服务请求方返回调用结果。A calling module, configured to return a calling result to the microservice requester according to the authentication result.
为了解决上述技术问题,本申请实施例还提供一种计算机设备,采用了如下所述的技术方案:In order to solve the above technical problems, embodiments of the present application also provide a computer device, which adopts the following technical solution:
存储器,存储至少一个计算机程序;及memory storing at least one computer program; and
处理器,执行所述存储器中存储的计算机程序以实现上述所述的微服务调用。The processor executes the computer program stored in the memory to implement the above-mentioned microservice invocation.
为了解决上述技术问题,本申请实施例还提供一种计算机可读存储介质,采用了如下所述的技术方案:In order to solve the above technical problems, embodiments of the present application also provide a computer-readable storage medium, which adopts the following technical solution:
所述计算机可读存储介质中存储有至少一个计算机程序,所述至少一个计算机程序被电子设备中的处理器执行以实现上述所述的微服务调用。At least one computer program is stored in the computer-readable storage medium, and the at least one computer program is executed by a processor in the electronic device to implement the above-mentioned microservice invocation.
与现有技术相比,本申请主要有以下有益效果:Compared with the existing technology, this application mainly has the following beneficial effects:
本申请实施例中,首先接收微服务请求方发起的调用请求,其次,通过调用配置好的鉴权组件以及配置中心,并利用鉴权组件解析调用请求,得到微服务请求信息,由于配置好的鉴权组件为通用组件,各个微服务都可以使用,可以提高鉴权效率,便于后续提高微服务调用的效率,并且获取配置中心存储的微服务请求方的鉴权信息,通过将鉴权信息及各个微服务信息托管在配置中心,可以统一不同微服务的数据格式,提高鉴权效果;最后,通过利用所述鉴权组件解析所述调用请求,能够实现不同微服务的连接,并通过对所述微服务请求信息进行鉴权,提高了微服务调用的安全性。因此本申请提出的微服务调用方法、装置、设备及存储介质可以提高微服务调用的效率及安全性。In the embodiment of this application, the call request initiated by the microservice requester is first received. Secondly, by calling the configured authentication component and the configuration center, and using the authentication component to parse the call request, the microservice request information is obtained. Since the configured The authentication component is a universal component that can be used by all microservices. It can improve the authentication efficiency and facilitate the subsequent improvement of the efficiency of microservice calls. It also obtains the authentication information of the microservice requester stored in the configuration center. By combining the authentication information with Each microservice information is hosted in the configuration center, which can unify the data formats of different microservices and improve the authentication effect; finally, by using the authentication component to parse the call request, the connection of different microservices can be realized, and all the microservices can be connected through The above microservice request information is authenticated, which improves the security of microservice invocation. Therefore, the microservice calling method, device, equipment and storage medium proposed in this application can improve the efficiency and security of microservice calling.
附图说明Description of the drawings
为了更清楚地说明本申请中的方案,下面将对本申请实施例描述中所需要使用的附图作一个简单介绍,显而易见地,下面描述中的附图是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the solutions in this application, a brief introduction will be made below to the drawings needed to be used in describing the embodiments of this application. Obviously, the drawings in the following description are some embodiments of this application and are very useful for this field. Ordinary technicians can also obtain other drawings based on these drawings without exerting creative work.
图1是本申请可以应用于其中的示例性系统架构图;Figure 1 is an exemplary system architecture diagram to which the present application can be applied;
图2是根据本申请的微服务调用方法的一个实施方式的流程图;Figure 2 is a flow chart of an embodiment of the microservice calling method according to the present application;
图3是本根据本申请的微服务调用系统中所述布控端的一个实施例的结构图;Figure 3 is a structural diagram of an embodiment of the control terminal in the microservice calling system according to the present application;
图4是根据本申请的计算机设备的一个实施例的结构示意图。Figure 4 is a schematic structural diagram of an embodiment of a computer device according to the present application.
具体实施方式Detailed ways
本申请实施例提供的数据格式的确定方法应用于数据处理系统除非另有定义,本文所使用的所有的技术和科学术语与属于本申请的技术领域的技术人员通常理解的含义相同;本文中在申请的说明书中所使用的术语只是为了描述具体的实施例的目的,不是旨在于限制本申请;本申请的说明书和权利要求书及上述附图说明中的术语“包括”和“具有”以及它们的任何变形,意图在于覆盖不排他的包含。本申请的说明书和权利要求书或上述附图中的术语“第一”、“第二”等是用于区别不同对象,而不是用于描述特定顺序。The method for determining the data format provided by the embodiments of this application is applied to the data processing system. Unless otherwise defined, all technical and scientific terms used in this article have the same meaning as commonly understood by those skilled in the technical field of this application; in this article, The terms used in the description of the application are only for the purpose of describing specific embodiments and are not intended to limit the application; the terms "including" and "having" in the description and claims of the application and the description of the drawings above and their Any variation of is intended to cover non-exclusive inclusion. The terms "first", "second", etc. in the description and claims of this application or the above-mentioned drawings are used to distinguish different objects, rather than to describe a specific sequence.
在本文中提及“实施例”意味着,结合实施例描述的特定特征、结构或特性可以包含在本申请的至少一个实施例中。在说明书中的各个位置出现该短语并不一定均是指相同的实施例,也不是与其它实施例互斥的独立的或备选的实施例。本领域技术人员显式地和隐式地理解的是,本文所描述的实施例可以与其它实施例相结合。Reference herein to "an embodiment" means that a particular feature, structure or characteristic described in connection with the embodiment can be included in at least one embodiment of the present application. The appearances of this phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Those skilled in the art understand, both explicitly and implicitly, that the embodiments described herein may be combined with other embodiments.
为了使本技术领域的人员更好地理解本申请方案,下面将结合附图,对本申请实施例中的技术方案进行清楚、完整地描述。In order to enable those skilled in the art to better understand the solution of the present application, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the accompanying drawings.
如图1所示,系统架构100可以包括终端设备101、102、103,网络104和服务器105。网络104用以在终端设备101、102、103和服务器105之间提供通信链路的介质。网络104可以包括各种连接类型,例如有线、无线通信链路或者光纤电缆等等。As shown in Figure 1, the system architecture 100 may include terminal devices 101, 102, 103, a network 104 and a server 105. The network 104 is a medium used to provide communication links between the terminal devices 101, 102, 103 and the server 105. Network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, among others.
用户可以使用终端设备101、102、103通过网络104与服务器105交互,以接收或发送消息等。终端设备101、102、103上可以安装有各种通讯客户端应用,例如网页浏览器应用、购物类应用、搜索类应用、即时通信工具、邮箱客户端、社交线上平台软件等。Users can use terminal devices 101, 102, 103 to interact with the server 105 through the network 104 to receive or send messages, etc. Various communication client applications can be installed on the terminal devices 101, 102, and 103, such as web browser applications, shopping applications, search applications, instant messaging tools, email clients, social online platform software, etc.
终端设备101、102、103可以是具有显示屏并且支持网页浏览的各种电子设备,包括但不限于智能手机、平板电脑、电子书阅读器、MP3播放器(Moving Picture ExpertsGroup Audio Layer III,动态影像专家压缩标准音频层面3)、MP4(Moving PictureExperts Group Audio Layer IV,动态影像专家压缩标准音频层面4)播放器、膝上型便携计算机和台式计算机等等。Terminal devices 101, 102, and 103 may be various electronic devices with display screens and supporting web browsing, including but not limited to smartphones, tablet computers, e-book readers, MP3 players (Moving Picture Experts Group Audio Layer III, moving image Experts Compression Standard Audio Layer 3), MP4 (Moving PictureExperts Group Audio Layer IV, Motion Picture Experts Group Audio Layer IV) players, laptops and desktop computers, etc.
服务器105可以是提供各种服务的服务器,例如对终端设备101、102、103上显示的页面提供支持的后台服务器。The server 105 may be a server that provides various services, such as a backend server that provides support for pages displayed on the terminal devices 101, 102, and 103.
需要说明的是,本申请实施例所提供的微服务调用方法一般由服务器/终端设备执行,相应地,微服务调用系统一般设置于服务器/终端设备中。It should be noted that the microservice calling method provided by the embodiments of the present application is generally executed by a server/terminal device. Correspondingly, the microservice calling system is generally set up in the server/terminal device.
应该理解,图1中的终端设备、网络和服务器的数目仅仅是示意性的。根据实现需要,可以具有任意数目的终端设备、网络和服务器。It should be understood that the number of terminal devices, networks and servers in Figure 1 is only illustrative. Depending on implementation needs, there can be any number of end devices, networks, and servers.
继续参考图2,示出了根据本申请提出的微服务调用方法的一个实施例的流程图。其中,所述微服务调用方法,包括以下步骤:Continuing to refer to Figure 2, a flow chart of one embodiment of the microservice invoking method proposed according to this application is shown. Among them, the microservice calling method includes the following steps:
S210、接收微服务请求方发起的调用请求。S210. Receive the calling request initiated by the microservice requester.
本申请实施例中,所述调用请求是指微服务请求方发起的跨微服务调用请求。例如,有一微服务请求方A需要查询微服务B的用户信息,则微服务请求方发起调用微服务B的调用请求。In the embodiment of this application, the call request refers to a cross-microservice call request initiated by the microservice requester. For example, if there is a microservice requester A that needs to query the user information of microservice B, the microservice requester initiates a call request to call microservice B.
S220、调用配置好的鉴权组件以及配置中心,并利用所述鉴权组件解析所述调用请求,得到微服务请求信息。S220: Call the configured authentication component and configuration center, and use the authentication component to parse the call request to obtain microservice request information.
本申请实施例中,所述微服务请求信息包括微服务标识及待调用的目标微服务接口。In this embodiment of the present application, the microservice request information includes the microservice identifier and the target microservice interface to be called.
本申请实施例中,所述鉴权组件的作用为进行微服务调用的鉴权,且该鉴权组件为通用组件,各个微服务都可使用,可以提高微服务调用时的鉴权效率。所述配置中心可以为nacos,主要作用是存储鉴权信息及微服务信息。In the embodiment of this application, the authentication component is used to authenticate microservice calls, and the authentication component is a universal component that can be used by all microservices, which can improve the authentication efficiency when microservices are called. The configuration center can be nacos, and its main function is to store authentication information and microservice information.
本申请一可选实施例中,所述调用配置好的鉴权组件以及配置中心之前,所述方法还包括:In an optional embodiment of this application, before calling the configured authentication component and configuration center, the method further includes:
获取待配置的配置中心源码及运行环境,并在所述运行环境中编译所述配置中心源码,得到配置文件;Obtain the configuration center source code and operating environment to be configured, and compile the configuration center source code in the operating environment to obtain the configuration file;
在所述配置文件中增加鉴权信息、运行属性及微服务注册功能,根据所述运行属性及所述微服务注册功能将微服务部署至所述配置文件中,得到所述配置中心。Authentication information, running attributes and a microservice registration function are added to the configuration file, and microservices are deployed to the configuration file according to the running attributes and the microservice registration function to obtain the configuration center.
其中,所述配置中心源码可以从Github上获取;所述运行环境可以为java+maven环境;所述配置文件(如application.properties)包含实现配置中心运行的逻辑参数。所述鉴权信息可以为微服务调用的权限参数,包括待调用的目标微服务标识、待调用的目标微服务接口信息、具备访问权限的微服务请求方的标识列表及权限令牌信息等。Wherein, the source code of the configuration center can be obtained from Github; the running environment can be a java+maven environment; and the configuration file (such as application.properties) contains logical parameters to implement the operation of the configuration center. The authentication information may be permission parameters for microservice invocation, including the target microservice identification to be called, the target microservice interface information to be called, the identification list of microservice requesters with access permissions, permission token information, etc.
本申请实施例中,通过根据所述运行属性及所述微服务注册功能将微服务部署至所述配置文件中,得到所述配置中心,能够实现配置中心对微服务及鉴权信息的管理,在微服务信息或鉴权信息变化时,无需重启微服务,通过配置中心进行集中管理,便于提高后续微服务调用的效率。In the embodiment of this application, by deploying microservices to the configuration file according to the operation attributes and the microservice registration function, the configuration center is obtained, and the management of the microservices and authentication information by the configuration center can be realized. When the microservice information or authentication information changes, there is no need to restart the microservice. Centralized management is carried out through the configuration center to improve the efficiency of subsequent microservice calls.
进一步的,本申请实施例中,所述调用配置好的鉴权组件以及配置中心之前,所述方法还包括:Further, in this embodiment of the present application, before calling the configured authentication component and configuration center, the method further includes:
获取待配置的鉴权插件,配置所述鉴权插件的过滤器、身份信息、资源及操作类型参数,得到初始鉴权组件;Obtain the authentication plug-in to be configured, configure the filter, identity information, resources and operation type parameters of the authentication plug-in, and obtain the initial authentication component;
判断所述初始鉴权组件与所述配置中心连接是否成功;Determine whether the connection between the initial authentication component and the configuration center is successful;
当所述初始鉴权组件与所述配置中心连接失败,则确定所述初始鉴权组件的鉴权功能异常,需要重新对所述鉴权插件进行配置,直至所述鉴权组件与所述配置中心连接成功,得到所述鉴权组件;When the connection between the initial authentication component and the configuration center fails, it is determined that the authentication function of the initial authentication component is abnormal, and the authentication plug-in needs to be reconfigured until the authentication component is connected to the configuration center. The central connection is successful and the authentication component is obtained;
当所述初始鉴权组件与所述配置中心连接成功,则确定所述初始鉴权组件的鉴权功能正常,并将所述初始鉴权组件作为所述鉴权组件。When the initial authentication component is successfully connected to the configuration center, it is determined that the authentication function of the initial authentication component is normal, and the initial authentication component is used as the authentication component.
其中,通过获取鉴权插件的jar包(如cp.api.auth.jar),并通过配置Filter过滤器、微服务的身份信息、微服务的资源及调用请求的操作类型,得到初始鉴权组件。Among them, the initial authentication component is obtained by obtaining the jar package of the authentication plug-in (such as cp.api.auth.jar), and configuring the Filter filter, the identity information of the microservice, the resources of the microservice, and the operation type of the call request. .
本申请一实施例中,由于初始鉴权组件的正常运行需要依赖配置中心实现,所以需要判断初始鉴权组件与配置中心连接是否成功,可以通过将鉴权插件jar包通过maven依赖与配置中心进行连接或在配置中心的配置文件application.properties中添加连接配置中心nacos的参数进行连接,并启动鉴权插件,若在启动过程中有日志输出,表示连接成功,若在启动过程中没有日志输出,表示连接失败。In an embodiment of this application, since the normal operation of the initial authentication component needs to rely on the configuration center, it is necessary to determine whether the connection between the initial authentication component and the configuration center is successful. This can be done by passing the authentication plug-in jar package through the maven dependency and configuration center. Connect or add the parameters to connect to the configuration center nacos in the configuration file application.properties of the configuration center to connect and start the authentication plug-in. If there is log output during the startup process, it means the connection is successful. If there is no log output during the startup process, Indicates that the connection failed.
作为本申请的一个实施例,利用所述鉴权组件解析所述调用请求,得到微服务请求信息,包括:As an embodiment of this application, the authentication component is used to parse the call request to obtain microservice request information, including:
利用所述鉴权组件中的过滤器拦截所述调用请求,并判断所述调用请求的合法性;Use the filter in the authentication component to intercept the call request and determine the legality of the call request;
当所述调用请求合法,则利用所述过滤拦截器读取所述调用请求的微服务请求信息;When the call request is legal, use the filter interceptor to read the microservice request information of the call request;
当所述调用请求不合法,则确定所述调用请求的微服务请求方不存在请求权限。When the calling request is illegal, it is determined that the microservice requester of the calling request does not have the request authority.
其中,所述过滤器为Filter过滤器,通过Filter的javax.servlet.Filte接口拦截调用请求,并通过void doFilter实现过滤功能,以对调用请求进行响应,并读取调用请求的微服务请求信息。Wherein, the filter is a Filter filter, which intercepts the call request through the javax.servlet.Filte interface of Filter, and implements the filtering function through void doFilter to respond to the call request and read the microservice request information of the call request.
本申请一实施例中,可以通过获取微服务请求方的调用请求中包含的AccessKeyId及SecretAccessKey,将AccessKeyId与对应的SecretAccessKey生成认证字符串,并将认证字符串与调用请求的AccessKeyId及SecretAccessKey进行对比,若对比结果一致,表示调用请求合法,若对比结果不一致,表示调用请求不合法。In one embodiment of this application, the AccessKeyId and SecretAccessKey included in the call request of the microservice requester can be obtained, the AccessKeyId and the corresponding SecretAccessKey can be used to generate an authentication string, and the authentication string can be compared with the AccessKeyId and SecretAccessKey of the call request. If the comparison results are consistent, it means the call request is legal. If the comparison results are inconsistent, it means the call request is illegal.
进一步的,本申请实施例中,可以通过Filter从配置文件application.properties中的spring.application.name配置项读取微服务请求方的微服务标识,例如:spring.application.name=order-app;并从配置文件application.properties中读取待调用的目标微服务接口信息。Further, in the embodiment of this application, the microservice identifier of the microservice requester can be read from the spring.application.name configuration item in the configuration file application.properties through Filter, for example: spring.application.name=order-app; And read the target microservice interface information to be called from the configuration file application.properties.
本申请实施例中,通过判断所述调用请求的合法性,能够确认微服务请求方的身份信息,避免调用请求是伪造的指令,便于后续调用目标微服务时,保证目标微服务自身的接口安全,提高了后续微服务调用的安全性。In the embodiment of this application, by judging the legality of the call request, the identity information of the microservice requester can be confirmed, avoiding that the call request is a forged instruction, so as to ensure the security of the target microservice's own interface when subsequently calling the target microservice. , which improves the security of subsequent microservice calls.
S230、获取所述配置中心存储的微服务请求方的鉴权信息。S230: Obtain the authentication information of the microservice requester stored in the configuration center.
本申请实施例中,所述鉴权信息是指所述鉴权信息可以为微服务调用的权限参数,并通过json格式数据存储于配置中心中,便于鉴权信息的实时修改、即时生效。其中,所述鉴权信息包括待调用的目标微服务标识、待调用的目标微服务接口信息、具备访问权限的微服务请求方的标识列表及权限令牌信息等。In the embodiment of this application, the authentication information refers to the authentication information that can be permission parameters called by microservices, and is stored in the configuration center through json format data, which facilitates real-time modification of the authentication information and takes immediate effect. The authentication information includes the identification of the target microservice to be called, the interface information of the target microservice to be called, the identification list and permission token information of the microservice requester with access rights, etc.
本申请实施例中,将鉴权信息存储于配置中心中,在鉴权信息发生变化时,无需重启微服务,便于提高后续微服务调用的效率。In the embodiment of this application, the authentication information is stored in the configuration center. When the authentication information changes, there is no need to restart the microservice, which facilitates improving the efficiency of subsequent microservice calls.
S240、根据所述鉴权信息利用所述鉴权组件对所述微服务请求信息进行鉴权,得到鉴权结果。S240: Use the authentication component to authenticate the microservice request information according to the authentication information to obtain an authentication result.
本申请实施例中,所述鉴权结果是指微服务请求信息是否有调用目标微服务的权限,包括鉴权通过及鉴权未通过两种结果。In the embodiment of this application, the authentication result refers to whether the microservice request information has the authority to call the target microservice, including two results: authentication passed and authentication failed.
作为本申请的一个实施例,所述根据所述鉴权信息利用所述鉴权组件对所述微服务请求信息进行鉴权,得到鉴权结果,包括:As an embodiment of the present application, the authentication component is used to authenticate the microservice request information according to the authentication information, and the authentication result is obtained, including:
查询所述微服务请求信息是否存在于所述鉴权信息中的权限记录表中;Query whether the microservice request information exists in the permission record table in the authentication information;
当所述微服务请求信息不存在于所述权限记录表中,则确定所述鉴权结果为鉴权不通过;When the microservice request information does not exist in the permission record table, it is determined that the authentication result is that the authentication fails;
当所述微服务请求信息存在于所述权限记录表中,则确定所述所述鉴权结果为鉴权通过。When the microservice request information exists in the permission record table, it is determined that the authentication result is authentication passed.
其中,所述权限记录表是指能够调用目标微服务的微服务请求方的清单列表,基于实际业务场景确定。The permission record table refers to a list of microservice requestors that can call the target microservice, and is determined based on actual business scenarios.
本申请一实施例中,通过解析鉴权信息的json数据,可以获取待调用的目标微服务对应接口下的具备访问权限的请求方微服务名称列表,判断微服务请求方是否在这个列表内,就能确定微服务请求信息是否有调用权限。In one embodiment of this application, by parsing the JSON data of the authentication information, the list of requester microservice names with access permissions under the corresponding interface of the target microservice to be called can be obtained, and it can be determined whether the microservice requester is in this list. It can be determined whether the microservice request information has the calling permission.
例如,微服务请求方A想要查询目标微服务B中的用户信息,则权限记录表中记录微服务请求方A的微服务标识,则表示该微服务请求信息鉴权通过,若权限记录表中未记录微服务请求方A的微服务表示,则该微服务请求信息鉴权未通过。For example, if microservice requester A wants to query the user information in target microservice B, the microservice identifier of microservice requester A is recorded in the permission record table, which means that the microservice request information is authenticated. If the permission record table If the microservice representation of microservice requester A is not recorded in , the microservice request information fails to pass the authentication.
本申请实施例中,通过查询所述微服务请求信息是否存在于所述鉴权信息中的权限记录表中,能够进一步确认微服务请求方的身份信息,进一步提高后续微服务调用的安全性。In the embodiment of this application, by querying whether the microservice request information exists in the permission record table in the authentication information, the identity information of the microservice requester can be further confirmed, and the security of subsequent microservice calls can be further improved.
本申请另一实施例中,所述根据所述鉴权信息利用所述鉴权组件对所述微服务请求信息进行鉴权,得到鉴权结果,还包括:In another embodiment of the present application, using the authentication component to authenticate the microservice request information based on the authentication information to obtain the authentication result also includes:
获取所述微服务请求信息的数字签名;Obtain the digital signature of the microservice request information;
验证所述数字签名与预设公钥是否匹配;Verify whether the digital signature matches the preset public key;
当所述数字签名与所述预设公钥匹配,确定所述微服务请求信息的鉴权结果为鉴权通过;When the digital signature matches the preset public key, it is determined that the authentication result of the microservice request information is authentication passed;
当所述数字签名与所述预设公钥不匹配,确定所述微服务请求信息的鉴权结果为鉴权未通过。When the digital signature does not match the preset public key, it is determined that the authentication result of the microservice request information is that the authentication failed.
其中,所述数字签名是指微服务请求信息的微服务标识及待调用的接口信息对应的密钥,包括微服务标识的访问令牌(如AccessToken)、时间戳及随机正整数;所述预设公钥的作用为对密钥进行解密以获取待调用的接口信息权限。Wherein, the digital signature refers to the microservice identification of the microservice request information and the key corresponding to the interface information to be called, including the access token (such as AccessToken) of the microservice identification, timestamp and random positive integer; the predetermined Assume that the function of the public key is to decrypt the key to obtain the information permission of the interface to be called.
本申请实施例中,通过验证所述数字签名与预设公钥是否匹配,能够在微服务调用时,进一步识别微服务请求方是否有调用目标微服务接口权限,保证了目标微服务的自身接口安全。In the embodiment of this application, by verifying whether the digital signature matches the preset public key, when the microservice is called, it can be further identified whether the microservice requester has the authority to call the target microservice interface, ensuring the target microservice's own interface Safety.
S250、根据所述鉴权结果向所述微服务请求方返回调用结果。S250: Return the calling result to the microservice requester according to the authentication result.
本申请实施例中,所述调用结果是指微服务请求方调用目标微服务的结果,包括调用失败及调用成功结果。In the embodiment of this application, the call result refers to the result of the microservice requester calling the target microservice, including the result of call failure and call success.
进一步的,本申请实施例中,所述根据所述鉴权结果向所述微服务请求方返回调用结果,包括:Further, in this embodiment of the present application, the calling result returned to the microservice requester according to the authentication result includes:
若所述鉴权结果为鉴权通过,从所述微服务请求信息中获取目标微服务标识及接口,并将所述接口的调用信息返回至所述微服务请求方;If the authentication result is authentication passed, obtain the target microservice identifier and interface from the microservice request information, and return the calling information of the interface to the microservice requester;
若所述鉴权结果为鉴权未通过,向所述微服务请求方返回调用错误提示。If the authentication result is that the authentication fails, a call error message is returned to the microservice requester.
其中,当鉴权通过,可以基于微服务标识确定调用的目标微服务,并通过目标微服务接口将目标微服务的调用信息返回至微服务请求方。例如,微服务请求方A调用目标微服务B查询用户C的用户信息,则通过目标微服务B接口将用户C的用户信息返回至微服务请求方A中。Among them, when the authentication is passed, the target microservice to be called can be determined based on the microservice identification, and the calling information of the target microservice is returned to the microservice requester through the target microservice interface. For example, if microservice requester A calls target microservice B to query user C's user information, user C's user information will be returned to microservice requester A through the target microservice B interface.
进一步的,当鉴权未通过,表示微服务请求方没有调用权限,为了保证目标微服务的接口安全,向微服务请求方返回调用错误提示。Furthermore, when the authentication fails, it means that the microservice requester does not have the calling authority. In order to ensure the interface security of the target microservice, a calling error message is returned to the microservice requester.
与现有技术相比,本申请实施例主要有以下有益效果:Compared with the prior art, the embodiments of the present application mainly have the following beneficial effects:
本申请实施例中,首先接收微服务请求方发起的调用请求,其次,通过调用配置好的鉴权组件以及配置中心,并利用鉴权组件解析调用请求,得到微服务请求信息,由于配置好的鉴权组件为通用组件,各个微服务都可以使用,可以提高鉴权效率,便于后续提高微服务调用的效率,并且获取配置中心存储的微服务请求方的鉴权信息,通过将鉴权信息及各个微服务信息托管在配置中心,可以统一不同微服务的数据格式,提高鉴权效果;最后,通过利用所述鉴权组件解析所述调用请求,能够实现不同微服务的连接,并通过对所述微服务请求信息进行鉴权,提高了微服务调用的安全性。因此本申请实施例提出的微服务调用方法可以提高微服务调用的效率及安全性。In the embodiment of this application, the call request initiated by the microservice requester is first received. Secondly, by calling the configured authentication component and the configuration center, and using the authentication component to parse the call request, the microservice request information is obtained. Since the configured The authentication component is a universal component that can be used by all microservices. It can improve the authentication efficiency and facilitate the subsequent improvement of the efficiency of microservice calls. It also obtains the authentication information of the microservice requester stored in the configuration center. By combining the authentication information with Each microservice information is hosted in the configuration center, which can unify the data formats of different microservices and improve the authentication effect; finally, by using the authentication component to parse the call request, the connection of different microservices can be realized, and all the microservices can be connected through The above microservice request information is authenticated, which improves the security of microservice invocation. Therefore, the microservice calling method proposed in the embodiment of this application can improve the efficiency and security of microservice calling.
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,是可以通过计算机程序来指令相关的硬件来完成,该计算机程序可存储于一计算机可读取存储介质中,该程序在执行时,可包括如上述各方法的实施例的流程。其中,前述的存储介质可为磁碟、光盘、只读存储记忆体(Read-Only Memory,ROM)等非易失性存储介质,或随机存储记忆体(Random Access Memory,RAM)等。Those of ordinary skill in the art can understand that all or part of the processes in the methods of the above embodiments can be implemented by instructing relevant hardware through a computer program. The computer program can be stored in a computer-readable storage medium. The program can be stored in a computer-readable storage medium. When executed, the process may include the processes of the above method embodiments. Among them, the aforementioned storage medium can be a non-volatile storage medium such as a magnetic disk, an optical disk, a read-only memory (Read-Only Memory, ROM), or a random access memory (Random Access Memory, RAM).
应该理解的是,虽然附图的流程图中的各个步骤按照箭头的指示依次显示,但是这些步骤并不是必然按照箭头指示的顺序依次执行。除非本文中有明确的说明,这些步骤的执行并没有严格的顺序限制,其可以以其他的顺序执行。而且,附图的流程图中的至少一部分步骤可以包括多个子步骤或者多个阶段,这些子步骤或者阶段并不必然是在同一时刻执行完成,而是可以在不同的时刻执行,其执行顺序也不必然是依次进行,而是可以与其他步骤或者其他步骤的子步骤或者阶段的至少一部分轮流或者交替地执行。It should be understood that although various steps in the flowchart of the accompanying drawings are shown in sequence as indicated by arrows, these steps are not necessarily performed in the order indicated by arrows. Unless explicitly stated in this article, the execution of these steps is not strictly limited in order, and they can be executed in other orders. Moreover, at least some of the steps in the flow chart of the accompanying drawings may include multiple sub-steps or multiple stages. These sub-steps or stages are not necessarily executed at the same time, but may be executed at different times, and their execution order is also It does not necessarily need to be performed sequentially, but may be performed in turn or alternately with other steps or sub-steps of other steps or at least part of the stages.
进一步参考图3,作为对上述图2所示方法的实现,本申请提供了一种微服务调用装置310的一个实施例,该装置实施例与图2所示的方法实施例相对应,该装置具体可以应用于各种电子设备中。With further reference to Figure 3, as an implementation of the method shown in Figure 2 above, this application provides an embodiment of a microservice invoking device 310. This device embodiment corresponds to the method embodiment shown in Figure 2. This device Specifically, it can be applied to various electronic devices.
本申请实施例提供的一种微服务调用系统,所述微服务调用系统包括;An embodiment of the present application provides a microservice calling system. The microservice calling system includes;
接收模块311,用于接收微服务请求方发起的调用请求;The receiving module 311 is used to receive the call request initiated by the microservice requester;
解析模块312,用于调用配置好的鉴权组件以及配置中心,并利用所述鉴权组件解析所述调用请求,得到微服务请求信息;The parsing module 312 is used to call the configured authentication component and configuration center, and use the authentication component to parse the call request to obtain the microservice request information;
获取模块313,用于获取所述配置中心存储的微服务请求方的鉴权信息;The acquisition module 313 is used to obtain the authentication information of the microservice requester stored in the configuration center;
鉴权模块314,用于根据所述鉴权信息利用所述鉴权组件对所述微服务请求信息进行鉴权,得到鉴权结果;及The authentication module 314 is configured to use the authentication component to authenticate the microservice request information according to the authentication information to obtain an authentication result; and
调用模块315,用于根据所述鉴权结果向所述微服务请求方返回调用结果。The calling module 315 is configured to return a calling result to the microservice requester according to the authentication result.
与现有技术相比,本申请实施例主要有以下有益效果:Compared with the prior art, the embodiments of the present application mainly have the following beneficial effects:
本申请实施例中,首先接收微服务请求方发起的调用请求,其次,通过调用配置好的鉴权组件以及配置中心,并利用鉴权组件解析调用请求,得到微服务请求信息,由于配置好的鉴权组件为通用组件,各个微服务都可以使用,可以提高鉴权效率,便于后续提高微服务调用的效率,并且获取配置中心存储的微服务请求方的鉴权信息,通过将鉴权信息及各个微服务信息托管在配置中心,可以统一不同微服务的数据格式,提高鉴权效果;最后,通过利用所述鉴权组件解析所述调用请求,能够实现不同微服务的连接,并通过对所述微服务请求信息进行鉴权,提高了微服务调用的安全性。因此本申请实施例提出的微服务调用方装置可以提高微服务调用的效率及安全性。In the embodiment of this application, the call request initiated by the microservice requester is first received. Secondly, by calling the configured authentication component and the configuration center, and using the authentication component to parse the call request, the microservice request information is obtained. Since the configured The authentication component is a universal component that can be used by all microservices. It can improve the authentication efficiency and facilitate the subsequent improvement of the efficiency of microservice calls. It also obtains the authentication information of the microservice requester stored in the configuration center. By combining the authentication information with Each microservice information is hosted in the configuration center, which can unify the data formats of different microservices and improve the authentication effect; finally, by using the authentication component to parse the call request, the connection of different microservices can be realized, and all the microservices can be connected through The above microservice request information is authenticated, which improves the security of microservice invocation. Therefore, the microservice calling device proposed in the embodiment of this application can improve the efficiency and security of microservice calling.
为解决上述技术问题,本申请实施例还提供计算机设备。具体请参阅图4,图4为本实施例计算机设备基本结构框图。In order to solve the above technical problems, embodiments of the present application also provide computer equipment. Please refer to Figure 4 for details. Figure 4 is a basic structural block diagram of the computer equipment in this embodiment.
所述计算机设备4包括通过系统总线相互通信连接存储器41、处理器42、网络接口43。需要指出的是,图中仅示出了具有组件41-43的计算机设备4,但是应理解的是,并不要求实施所有示出的组件,可以替代的实施更多或者更少的组件。其中,本技术领域技术人员可以理解,这里的计算机设备是一种能够按照事先设定或存储的指令,自动进行数值计算和/或信息处理的设备,其硬件包括但不限于微处理器、专用集成电路(ApplicationSpecific Integrated Circuit,ASIC)、可编程门阵列(Field-Programmable GateArray,FPGA)、数字处理器(Digital Signal Processor,DSP)、嵌入式设备等。The computer device 4 includes a memory 41, a processor 42, and a network interface 43 that are connected to each other for communication through a system bus. It should be noted that only the computer device 4 having components 41 - 43 is shown in the figure, but it should be understood that implementation of all the components shown is not required, and more or less components may be implemented instead. Among them, those skilled in the art can understand that the computer device here is a device that can automatically perform numerical calculations and/or information processing according to preset or stored instructions. Its hardware includes but is not limited to microprocessors, special-purpose Integrated circuits (ApplicationSpecific Integrated Circuit, ASIC), programmable gate array (Field-Programmable GateArray, FPGA), digital processor (Digital Signal Processor, DSP), embedded devices, etc.
所述计算机设备可以是桌上型计算机、笔记本、掌上电脑及云端服务器等计算设备。所述计算机设备可以与用户通过键盘、鼠标、遥控器、触摸板或声控设备等方式进行人机交互。The computer device may be a desktop computer, a notebook, a PDA, a cloud server and other computing devices. The computer device can perform human-computer interaction with the user through keyboard, mouse, remote control, touch panel or voice control device.
所述存储器41至少包括一种类型的可读存储介质,所述可读存储介质包括闪存、硬盘、多媒体卡、卡型存储器(例如,SD或DX存储器等)、随机访问存储器(RAM)、静态随机访问存储器(SRAM)、只读存储器(ROM)、电可擦除可编程只读存储器(EEPROM)、可编程只读存储器(PROM)、磁性存储器、磁盘、光盘等。在一些实施例中,所述存储器41可以是所述计算机设备4的内部存储单元,例如该计算机设备4的硬盘或内存。在另一些实施例中,所述存储器41也可以是所述计算机设备4的外部存储设备,例如该计算机设备4上配备的插接式硬盘,智能存储卡(Smart Media Card,SMC),安全数字(Secure Digital,SD)卡,闪存卡(FlashCard)等。当然,所述存储器41还可以既包括所述计算机设备4的内部存储单元也包括其外部存储设备。本实施例中,所述存储器41通常用于存储安装于所述计算机设备4的操作系统和各类应用软件,例如微服务调用方法的程序代码等。此外,所述存储器41还可以用于暂时地存储已经输出或者将要输出的各类数据。The memory 41 includes at least one type of readable storage medium, which includes flash memory, hard disk, multimedia card, card-type memory (for example, SD or DX memory, etc.), random access memory (RAM), static memory, etc. Random access memory (SRAM), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), programmable read-only memory (PROM), magnetic memory, magnetic disks, optical disks, etc. In some embodiments, the memory 41 may be an internal storage unit of the computer device 4 , such as a hard disk or memory of the computer device 4 . In other embodiments, the memory 41 may also be an external storage device of the computer device 4, such as a plug-in hard disk, a smart media card (SMC), or a secure digital device equipped on the computer device 4. (Secure Digital, SD) card, flash card (FlashCard), etc. Of course, the memory 41 may also include both the internal storage unit of the computer device 4 and its external storage device. In this embodiment, the memory 41 is usually used to store operating systems and various application software installed on the computer device 4, such as program codes for microservice calling methods. In addition, the memory 41 can also be used to temporarily store various types of data that have been output or will be output.
所述处理器42在一些实施例中可以是中央处理器(Central Processing Unit,CPU)、控制器、微控制器、微处理器、或其他数据处理芯片。该处理器42通常用于控制所述计算机设备4的总体操作。本实施例中,所述处理器42用于运行所述存储器41中存储的程序代码或者处理数据,例如运行所述微服务调用方法的程序代码。In some embodiments, the processor 42 may be a central processing unit (CPU), a controller, a microcontroller, a microprocessor, or other data processing chips. The processor 42 is generally used to control the overall operation of the computer device 4 . In this embodiment, the processor 42 is used to run the program code stored in the memory 41 or process data, for example, run the program code of the microservice calling method.
所述网络接口43可包括无线网络接口或有线网络接口,该网络接口43通常用于在所述计算机设备4与其他电子设备之间建立通信连接。The network interface 43 may include a wireless network interface or a wired network interface. The network interface 43 is generally used to establish a communication connection between the computer device 4 and other electronic devices.
本申请还提供了另一种实施方式,即提供一种计算机可读存储介质,所述计算机可读存储介质存储有所述微服务调用方法程序,所述微服务调用方法程序可被至少一个处理器执行,以使所述至少一个处理器执行如上述的微服务调用方法的步骤。This application also provides another implementation manner, that is, a computer-readable storage medium is provided. The computer-readable storage medium stores the microservice invoking method program. The microservice invoking method program can be processed by at least one The processor is executed, so that the at least one processor executes the steps of the microservice invoking method as described above.
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上述实施例方法可借助软件加必需的通用硬件线上平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端设备(可以是手机,计算机,服务器,空调器,或者网络设备等)执行本申请各个实施例所述的方法。Through the above description of the embodiments, those skilled in the art can clearly understand that the methods of the above embodiments can be implemented by means of software plus the necessary general hardware online platform. Of course, it can also be implemented by hardware, but in many cases the former is Better implementation. Based on this understanding, the technical solution of the present application can be embodied in the form of a software product in essence or that contributes to the existing technology. The computer software product is stored in a storage medium (such as ROM/RAM, disk, CD), including several instructions to cause a terminal device (which can be a mobile phone, computer, server, air conditioner, or network device, etc.) to execute the methods described in various embodiments of the present application.
本申请可用于众多通用或专用的计算机系统环境或配置中。例如:个人计算机、服务器计算机、手持设备或便携式设备、平板型设备、多处理器系统、基于微处理器的系统、置顶盒、可编程的消费电子设备、网络PC、小型计算机、大型计算机、包括以上任何系统或设备的分布式计算环境等等。本申请可以在由计算机执行的计算机可执行指令的一般上下文中描述,例如程序模块。一般地,程序模块包括执行特定任务或实现特定抽象数据类型的例程、程序、对象、组件、数据结构等等。也可以在分布式计算环境中实践本申请,在这些分布式计算环境中,由通过通信网络而被连接的远程处理设备来执行任务。在分布式计算环境中,程序模块可以位于包括存储设备在内的本地和远程计算机存储介质中。The application may be used in a variety of general or special purpose computer system environments or configurations. For example: personal computers, server computers, handheld or portable devices, tablet devices, multiprocessor systems, microprocessor-based systems, set-top boxes, programmable consumer electronics devices, network PCs, minicomputers, mainframe computers, including Distributed computing environment for any of the above systems or devices, etc. The application may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform specific tasks or implement specific abstract data types. The present application may also be practiced in distributed computing environments where tasks are performed by remote processing devices connected through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including storage devices.
显然,以上所描述的实施例仅仅是本申请一部分实施例,而不是全部的实施例,附图中给出了本申请的较佳实施例,但并不限制本申请的专利范围。本申请可以以许多不同的形式来实现,相反地,提供这些实施例的目的是使对本申请的公开内容的理解更加透彻全面。尽管参照前述实施例对本申请进行了详细的说明,对于本领域的技术人员来而言,其依然可以对前述各具体实施方式所记载的技术方案进行修改,或者对其中部分技术特征进行等效替换。凡是利用本申请说明书及附图内容所做的等效结构,直接或间接运用在其他相关的技术领域,均同理在本申请专利保护范围之内。Obviously, the above-described embodiments are only some of the embodiments of the present application, rather than all the embodiments. The preferred embodiments of the present application are given in the drawings, but do not limit the patent scope of the present application. The present application may be embodied in many different forms; rather, these embodiments are provided in order to provide a thorough and comprehensive understanding of the disclosure of the present application. Although the present application has been described in detail with reference to the foregoing embodiments, those skilled in the art can still modify the technical solutions described in the foregoing specific embodiments, or make equivalent substitutions for some of the technical features. . Any equivalent structure made using the contents of the specification and drawings of this application and directly or indirectly used in other related technical fields shall likewise fall within the scope of patent protection of this application.
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202310949383.6ACN116723247A (en) | 2023-07-28 | 2023-07-28 | Microservice calling methods, devices, equipment and storage media |
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202310949383.6ACN116723247A (en) | 2023-07-28 | 2023-07-28 | Microservice calling methods, devices, equipment and storage media |
| Publication Number | Publication Date |
|---|---|
| CN116723247Atrue CN116723247A (en) | 2023-09-08 |
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202310949383.6APendingCN116723247A (en) | 2023-07-28 | 2023-07-28 | Microservice calling methods, devices, equipment and storage media |
| Country | Link |
|---|---|
| CN (1) | CN116723247A (en) |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN118233182A (en)* | 2024-03-28 | 2024-06-21 | 三峡高科信息技术有限责任公司 | Method for realizing application system API authentication in componentization mode |
| CN120066607A (en)* | 2025-01-09 | 2025-05-30 | 北京联讯星烨科技有限公司 | Microprogram configuration method and system |
| CN120378235A (en)* | 2025-06-30 | 2025-07-25 | 青岛大数据科技发展有限公司 | Intelligent industrial production data configuration processing method and device |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN109683988A (en)* | 2018-12-25 | 2019-04-26 | 鼎信信息科技有限责任公司 | Micro services start method, apparatus, computer equipment and storage medium |
| CN110099031A (en)* | 2018-01-30 | 2019-08-06 | 普天信息技术有限公司 | A kind of service calling method, device and micro services platform |
| CN111258781A (en)* | 2020-01-15 | 2020-06-09 | 中国平安人寿保险股份有限公司 | Calling authentication method, device, equipment and storage medium of microservice |
| CN111835789A (en)* | 2020-07-28 | 2020-10-27 | 北京金山云网络技术有限公司 | Service authentication method, device, equipment, system and storage medium |
| CN115086047A (en)* | 2022-06-20 | 2022-09-20 | 未鲲(上海)科技服务有限公司 | Interface authentication method and device, electronic equipment and storage medium |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN110099031A (en)* | 2018-01-30 | 2019-08-06 | 普天信息技术有限公司 | A kind of service calling method, device and micro services platform |
| CN109683988A (en)* | 2018-12-25 | 2019-04-26 | 鼎信信息科技有限责任公司 | Micro services start method, apparatus, computer equipment and storage medium |
| CN111258781A (en)* | 2020-01-15 | 2020-06-09 | 中国平安人寿保险股份有限公司 | Calling authentication method, device, equipment and storage medium of microservice |
| CN111835789A (en)* | 2020-07-28 | 2020-10-27 | 北京金山云网络技术有限公司 | Service authentication method, device, equipment, system and storage medium |
| CN115086047A (en)* | 2022-06-20 | 2022-09-20 | 未鲲(上海)科技服务有限公司 | Interface authentication method and device, electronic equipment and storage medium |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN118233182A (en)* | 2024-03-28 | 2024-06-21 | 三峡高科信息技术有限责任公司 | Method for realizing application system API authentication in componentization mode |
| CN120066607A (en)* | 2025-01-09 | 2025-05-30 | 北京联讯星烨科技有限公司 | Microprogram configuration method and system |
| CN120066607B (en)* | 2025-01-09 | 2025-08-29 | 北京联讯星烨科技有限公司 | A microprogram configuration method and system |
| CN120378235A (en)* | 2025-06-30 | 2025-07-25 | 青岛大数据科技发展有限公司 | Intelligent industrial production data configuration processing method and device |
| CN120378235B (en)* | 2025-06-30 | 2025-08-22 | 青岛大数据科技发展有限公司 | Intelligent industrial production data configuration processing method and device |
| Publication | Publication Date | Title |
|---|---|---|
| CN112333198B (en) | Secure cross-domain login method, system and server | |
| CN111414407A (en) | Data query method, device, computer equipment and storage medium for database | |
| CN116723247A (en) | Microservice calling methods, devices, equipment and storage media | |
| WO2022095518A1 (en) | Automatic interface test method and apparatus, and computer device and storage medium | |
| CN110197075B (en) | Resource access method, device, computing equipment and storage medium | |
| CN113742235B (en) | Method and device for verifying code | |
| CN113282591B (en) | Authority filtering method, authority filtering device, computer equipment and storage medium | |
| US20230229752A1 (en) | Attestation of application identity for inter-app communications | |
| CN115659378A (en) | Evidence storage method and related equipment for case record information | |
| CN112272093B (en) | Token management method, electronic equipment and readable storage medium | |
| WO2022088710A1 (en) | Mirror image management method and apparatus | |
| CN113468611A (en) | Security authentication method, system, device, and medium | |
| CN113765876A (en) | Report processing software access method and device | |
| CN115733685A (en) | Web session authentication management method and device, computer equipment and storage medium | |
| CN112214769A (en) | Active measurement system of Windows system based on SGX architecture | |
| US20210089497A1 (en) | Method, device, and computer program product for managing data object | |
| CN111552663A (en) | File consistency verification method, device, computer equipment and storage medium | |
| CN115567595B (en) | Information processing method, apparatus, computer device, and storage medium | |
| CN112416875B (en) | Log management method, device, computer equipment and storage medium | |
| CN118590251A (en) | A data processing method, device, equipment and medium | |
| CN115391801A (en) | Method and device for updating encryption module in blockchain system, and related products | |
| CN115221562A (en) | Browser file signature method, device and computer-readable storage medium | |
| CN112583606A (en) | Security verification method, server, terminal and storage medium | |
| TW202145033A (en) | Computer program product and apparatus for encrypting and verifying sensitive parameters | |
| CN112748960A (en) | Process control method and device, electronic equipment and storage medium |
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination |