Disclosure of Invention
The invention provides a user information out-of-band management method, a device, server equipment and a storage medium, which are used for solving the defects of large maintenance task amount and complex maintenance operation when user information of a server system and a BMC system is maintained in the prior art, and further lower maintenance efficiency is caused.
The invention provides a user information out-of-band management method, which is applied to a server system, and comprises the following steps:
Determining a target service request corresponding to a target service under the condition of calling the target service, wherein the target service is used for representing the type of the called service;
The target service request is sent to a BMC system based on a KCS channel in a daemon, wherein the BMC system is in communication connection with the server system through the KCS channel, and user information corresponding to the server system is stored in the BMC system;
and receiving target user information corresponding to the target service request fed back by the BMC system.
According to the user information out-of-band management method provided by the invention, the determining the target service request corresponding to the target service comprises the following steps:
Determining a target service strategy corresponding to the target service based on a target configuration file corresponding to the target service, wherein the target service strategy is used for representing the acquisition mode of the target user information;
Executing the target service strategy and determining a target calling function corresponding to the target service;
and determining a target service request corresponding to the target service based on the target calling function.
According to the user information out-of-band management method provided by the invention, the target service comprises a PAM authentication service;
before invoking the target service, the method further comprises:
And when the target service comprises the PAM authentication service, adding a PAM authentication policy based on the BMC system in a PAM configuration file corresponding to the PAM authentication service.
According to the user information out-of-band management method provided by the invention, the target service also comprises NSS service;
before invoking the target service, the method further comprises:
And adding a second priority data source based on the BMC system in an NSS configuration file corresponding to the NSS service under the condition that the target service comprises the NSS service.
The invention also provides a user information out-of-band management method which is applied to the BMC system, and the method comprises the following steps:
receiving a target service request sent by a server system;
determining target user information corresponding to the target service request based on the pre-stored user information corresponding to the server system;
And transmitting the target user information to the server system based on a KCS channel, wherein the BMC system is in communication connection with the server system through the KCS channel.
According to the user information out-of-band management method provided by the invention, the determining the target user information corresponding to the target service request based on the pre-stored user information corresponding to the server system comprises the following steps:
Under the condition that the target service request is a user authentication request, checking information to be checked in the user authentication request based on user information corresponding to the pre-stored server system, and determining a checking result as target user information corresponding to the user authentication request;
And under the condition that the target service request is a user service request, determining a target file corresponding to the user service request from the user information, and determining target user information corresponding to the user service request based on the target file, wherein the target file comprises a user account file, a user group file or a user password file.
The invention also provides a device for out-of-band management of user information, which is applied to a server system and comprises:
The first determining module is used for determining a target service request corresponding to the target service under the condition of calling the target service;
The system comprises a daemon process, a first sending module, a BMC system and a server system, wherein the daemon process is used for receiving a target service request from the BMC system, and the daemon process is used for receiving the target service request;
And the first receiving module is used for receiving target user information corresponding to the target service request fed back by the BMC system.
The invention also provides a device for out-of-band management of user information, which is applied to a BMC system and comprises:
The second receiving module is used for receiving the target service request sent by the server system;
the second determining module is used for determining target user information corresponding to the target service request based on the pre-stored user information corresponding to the server system;
And the second sending module is used for sending the target user information to the server system based on a KCS channel, and the BMC system is in communication connection with the server system through the KCS channel.
The invention also provides a server device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing any of the above methods for out-of-band management of user information when executing the computer program.
The present invention also provides a non-transitory computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements a method of user information out-of-band management as described in any of the above.
The invention also provides a computer program product comprising a computer program which when executed by a processor implements a method of out-of-band management of user information as described in any of the above.
According to the user information out-of-band management method, the device, the server equipment and the storage medium, when the server system invokes the target service, the target service request corresponding to the target service is determined, and the target service request is sent to the BMC system through the KVS channel in the daemon, so that the BMC system determines target user information corresponding to the target service request from the user information corresponding to the pre-stored server system, and receives the target user information fed back by the BMC system, and the functions of the user information of the server system are not affected after the user information is stored in the BMC system. In the invention, the BMC system provides out-of-band management of the user information of the server system, so that an administrator can use one account to complete maintenance of the user information of the server system and the BMC system, thereby reducing maintenance workload, simplifying maintenance operation, reducing operation and maintenance difficulty and further improving maintenance efficiency.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the present invention more apparent, the technical solutions of the present invention will be clearly and completely described below with reference to the accompanying drawings, and it is apparent that the described embodiments are some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Aiming at the problems of large maintenance task amount and complex maintenance operation and lower maintenance efficiency in the prior art when maintaining the user information of a server system and a BMC system, the embodiment of the invention provides a user information out-of-band management method which is applied to the server system, and FIG. 1 is one of flow diagrams of the user information out-of-band management method provided by the embodiment of the invention, as shown in FIG. 1, the method comprises the following steps 110 to 130.
And 110, under the condition of calling the target service, determining a target service request corresponding to the target service, wherein the target service is used for representing the type of the called service.
The server system comprises a PAM (Pluggable Authentication Modules, pluggable authentication module) authentication module and an NSS (Network Security Services, network security service) service module. The PAM authentication module is inserted with a BMC-based authentication plug-in unit for ensuring normal operation of a user authentication function in a server system. The NSS service module is inserted with a plug-in based on the BMC, so that the server system supports to acquire corresponding data from the BMC system when accessing user information. The user information in the server system is stored in the BMC system in advance, and based on the pluggable property of the PAM authentication module and the NSS service module in the server system, the user information is stored in the BMC system and is not different from the user information stored in the local file system of the server system.
It should be noted that, the user information pre-stored in the BMC system by the server system includes user account information, user group information and user account password information.
It should be noted that a target service is used to characterize the type of the invoked service, and the target service includes a PAM authentication service or an NSS service. The PAM authentication service is used for performing user authentication verification and belongs to the authentication management type. The NSS service is used for accessing user information and belongs to a user access type. Fig. 2 is a schematic software architecture of a server system according to an embodiment of the present invention, as shown in fig. 2, when a PAM authentication service is invoked, which means that upper layer software invokes a related function in PAM dynamic library pam_bmc. When the NSS service is invoked, this means that the upper layer software invokes the relevant function in the BMC-based NSS dynamic library libnss _bmc.so.2 in the NSS service module.
Alternatively, the upper layer software may include SSH (Secure Shell protocol), shell, other, and the like, which is not limited by the embodiment of the present invention.
In addition, the PAM authentication module may further include an account management service, a session management service, and a password management service, which is not limited in the embodiment of the present invention.
After the upper layer software calls the target service, a target service request corresponding to the target service can be generated, and the target service request is an IPMI (INTELLIGENT PLATFORM MANAGEMENT INTERFACE ) command, so that the target service request can be conveniently sent to an IPMI interface in the BMC system for the server system to carry out-of-band management of user information.
When the target service is PAM authentication service, the corresponding target service request includes a user name and a password, and the corresponding IPMI command, and when the target service is NSS service, the corresponding target service request includes an IPMI command of target user information to be accessed.
Further, before invoking the target service, the method further comprises:
And when the target service comprises the PAM authentication service, adding a PAM authentication policy based on the BMC system in a PAM configuration file corresponding to the PAM authentication service.
Specifically, because the user information is stored in the BMC system, before the PAM authentication service is invoked, a PAM authentication policy based on the BMC system needs to be added in the PAM configuration file, so that the server system can perform user authentication through the BMC system. Taking a Linux user login module as an example, adding a PAM authentication strategy based on a BMC system in a PAM configuration file/etc/pam.d/login.
It should be noted that the PAM authentication module has pluggable property, which is characterized in that at least one PAM authentication policy and the authentication sequence of various PAM authentication policies can be added in the PAM configuration file in a self-defined manner. For example, a PAM authentication policy based on a local file system may be added, and/or a PAM authentication policy based on a BMC system may be added in an authentication order of executing a PAM authentication policy based on a local file system first, then executing a PAM authentication policy based on a BMC system, or executing a PAM authentication policy based on a BMC system first, then executing a PAM authentication policy based on a local file system, and so on. In the embodiment of the invention, the normal operation of the authentication function of the server system can be ensured through the pluggable property of the PAM authentication module.
Further, before invoking the target service, the method further comprises:
And adding a second priority data source based on the BMC system in an NSS configuration file corresponding to the NSS service under the condition that the target service comprises the NSS service.
Specifically, since the user information is stored in the BMC system, a second priority data source based on the BMC system needs to be added in the NSS configuration file/etc/nsswitch. For example, fig. 3 is a schematic configuration diagram of an NSS configuration file provided in an embodiment of the present invention, where, as shown in fig. 3, in the NSS configuration file, when data retrieval is performed on user account information passwd, user group information group, and user account password information shadow, local file system files are used as a first priority data source. Before the NSS service is called, the BMC system is added into the NSS configuration file, and is used as a second priority data source when the user account information passwd, the user group information group and the user account password information shadow are used for data retrieval, so that when the server system fails to access the local file system to acquire the target user information, the server system can continue to access the BMC system to acquire the target user information.
In the embodiment of the invention, through the pluggable property of the PAM authentication module and the NSS service module, the normal operation of the functions of user authentication, user data access, authority control and the like of the server system after the user information is stored in the BMC system can be ensured.
Further, determining a target service request corresponding to the target service includes:
Determining a target service strategy corresponding to the target service based on a target configuration file corresponding to the target service, wherein the target service strategy is used for representing an acquisition mode of target user information;
Executing a target service strategy and determining a target calling function corresponding to the target service;
and determining a target service request corresponding to the target service based on the target calling function.
Specifically, after the PAM configuration file and the NSS configuration file are modified in advance, the corresponding target configuration file may be determined to be the PAM configuration file or the NSS configuration file according to the invoked target service, and a target service policy corresponding to the target service is determined by reading the target configuration file, where the target service policy is used to characterize an acquisition mode of target user information, and the target service policy may include policy content, a policy execution order, and the like, for example, the target service policy includes a PAM authentication policy based on a local file system, and/or a PAM authentication policy based on a BMC system, an authentication order, and a data source retrieval priority, and the like. After determining the target service policy, executing the target service policy, determining a target call function from a target dynamic library corresponding to the target service, and generating a corresponding target service request, namely an IPMI command, according to the target function. For example, when the target service is a PAM authentication service, it may be determined that the target function is PAM authentication interface function pam_ authenticate (), from a PAM dynamic library pam_bmc. For another example, when the target service is an NSS service, an objective function may be determined from libnss _bmc.so.2 in the glibc library to be a_ NSS _bmc_ getpwnam _r () function, where the function is used to obtain a data record of a specified user name from a password database of the BMC system, and then, a corresponding NSS service request is generated according to the function.
And 120, transmitting a target service request to the BMC system based on the KCS channel in the daemon, wherein the BMC system is in communication connection with the server system through the KCS channel, and user information corresponding to the server system is stored in the BMC system.
Specifically, a daemon (NAME SERVER BMC client Daemon, nsbcd) is provided in the server system through which the server system can communicate with the BMC system. After determining the target service request, the server system may send the target service request (IPMI command) to the BMC system through the KCS channel in the daemon to implement communication with the BMC system.
And 130, receiving target user information corresponding to a target service request fed back by the BMC system.
Specifically, after the BMC system processes the target service request, the server system may receive target user information corresponding to the target service request fed back by the BMC system. When the target service is PAM authentication service, the target user information may include an authentication result of the BMC system on a user name and a password included in the target service request. When the target service is NSS service, the target user information may include a search result of the BMC system for analyzing the target file corresponding to the target service request.
According to the user information out-of-band management method provided by the embodiment of the invention, when the server system invokes the target service, the target service request corresponding to the target service is determined, and the target service request is sent to the BMC system through the KVS channel in the daemon, so that the BMC system determines target user information corresponding to the target service request from the user information corresponding to the pre-stored server system, receives the target user information fed back by the BMC system, and the functions of the user information of the server system are not affected after the user information is stored in the BMC system. In the invention, the BMC system provides out-of-band management of the user information of the server system, so that an administrator can use one account to complete maintenance of the user information of the server system and the BMC system, thereby reducing maintenance workload, simplifying maintenance operation, reducing operation and maintenance difficulty and further improving maintenance efficiency.
The embodiment of the invention also provides a method for managing user information out of band, which is applied to a BMC system, and FIG. 4 is a second flow chart of the method for managing user information out of band provided by the embodiment of the invention, as shown in FIG. 4, the method comprises the following steps 410 to 430.
Step 410, receiving a target service request sent by a server system.
Step 420, determining target user information corresponding to the target service request based on the user information corresponding to the pre-stored server system.
And step 430, transmitting the target user information to the server system based on the KCS channel, wherein the BMC system is in communication connection with the server system through the KCS channel.
Specifically, after the server system sends the target service request, the BMC system may receive the target service request sent by the server system through the KCS channel, and parse the IPMI command in the target service request, and the BMC system may determine the request intention of the server system through the IPMI command. Then, the BMC system can determine target user information corresponding to the target service request from user information corresponding to the pre-stored server system based on the request intention, and feed the determined target user information back to the server system through the KCS channel to complete a data access function or an authentication function of the server system.
It should be noted that, the user information corresponding to the server system is pre-stored in the BMC system, where the user information includes user account information, user group information and user account password information, where the user account information is stored in a user account file/etc/passwg of the BMC system, the user group information is stored in a user group file/etc/group of the BMC system, the user account password information is stored in a user password file/etc/shadow of the BMC system, and the content format in each file is kept consistent with the format of the Linux system. In addition, after the BMC system completes the storage of the user information, the BMC needs to provide a corresponding data access interface for the server system to use.
Further, determining target user information corresponding to the target service request based on the user information corresponding to the pre-stored server system includes:
Under the condition that the target service request is a user authentication request, checking information to be checked in the user authentication request based on user information corresponding to a pre-stored server system, and determining a checking result as target user information corresponding to the user authentication request;
And under the condition that the target service request is a user service request, determining a target file corresponding to the user service request from the user information, and determining target user information corresponding to the user service request based on the target file, wherein the target file comprises a user account file, a user group file or a user password file.
Specifically, if the IPMI command obtained by the BMC system analyzing the target service request is User Authentication, which indicates that the target service request is a user authentication request, the request of the server system is intended to be user authentication, that is, the user name and the password carried in the target service request are checked, and at this time, the BMC system may check the user name and the password according to the user information corresponding to the pre-stored server system, so as to obtain an authentication result.
If the IPMI command obtained by the BMC system analyzing the target service request is Get User Account Info, get User groups Info, or Get User password Info, it indicates that the target service request is a user service request. When the IPMI command is Get User Account Info, it indicates that the request of the server system is intended to obtain the user account information, at this time, the BMC system may parse the user account file/etc/passwg to obtain a target user request, where the target user request includes a user name, UID (User Identification ), GID (Group Identifier), user directory, shell type, and the like. When the IPMI command is Get User groups Info, it indicates that the request of the server system is intended to obtain the user group information, at this time, the BMC system may parse the user group file/etc/group to obtain a target user request, where the target user request includes the user group name, the GID, the group member, and the like. When the IPMI command is Get User password Info, it indicates that the request of the server system is intended to obtain the user password information, at this time, the BMC system may parse the user password file/etc/shadow to obtain the target user information, where the target user information includes all the user names, the last modification time, the password interval, the maximum interval, and other password policies. In order to ensure the safety of the user password, the target user information does not comprise the user password, so that the user password is prevented from being revealed in the communication process of the BMC system and the server system.
In addition, the target service request may further include an IPMI command related to operations such as modifying a password and adding a user, and the BMC system may execute an operation corresponding to the IPMI command after parsing the IPMI command.
According to the user information out-of-band management method provided by the embodiment of the invention, the user information corresponding to the server system is pre-stored in the BMC system, a corresponding data service interface is provided for the server system, after a target service request sent by the server system is received, the target user information is determined from the pre-stored user information corresponding to the server system by analyzing the request intention corresponding to the target service request, and is fed back to the server system through a KCS channel, so that the out-of-band management of the user information corresponding to the server system is realized, and the server system is not required to be logged in. On the basis, the user information corresponding to the BMC system and the server system can be integrated and combined, so that the user unification of the BMC system and the server system is realized, the quantity of user information maintained by an administrator is reduced, the maintenance workload is reduced, the operation and maintenance difficulty is reduced, and the purpose of improving the maintenance efficiency is achieved.
The user information out-of-band management device provided by the invention is described below, and the user information out-of-band management device described below and the user information out-of-band management method described above can be correspondingly referred to each other.
An embodiment of the present invention provides a user information out-of-band management device, which is applied to a server system, and fig. 5 is a schematic structural diagram of the user information out-of-band management device provided by the embodiment of the present invention, as shown in fig. 5, the user information out-of-band management device 500 includes a first determining module 510, a first transmitting module 520, and a first receiving module 530.
The first determining module 510 is configured to determine, when the target service is invoked, a target service request corresponding to the target service.
The first sending module 520 is configured to send the target service request to the BMC system based on the KCS channel in the daemon, where the BMC system is communicatively connected to the server system through the KCS channel, and user information corresponding to the server system is stored in the BMC system.
The first receiving module 530 is configured to receive target user information corresponding to a target service request fed back by the BMC system.
According to the user information out-of-band management device provided by the embodiment of the invention, when the server system invokes the target service, the target service request corresponding to the target service is determined, and the target service request is sent to the BMC system through the KVS channel in the daemon, so that the BMC system determines target user information corresponding to the target service request from the user information corresponding to the pre-stored server system, receives the target user information fed back by the BMC system, and the functions of the user information of the server system are not affected after the user information is stored in the BMC system. In the invention, the BMC system provides out-of-band management of the user information of the server system, so that an administrator can use one account to complete maintenance of the user information of the server system and the BMC system, thereby reducing maintenance workload, simplifying maintenance operation, reducing operation and maintenance difficulty and further improving maintenance efficiency.
Optionally, the first determining module 510 is specifically configured to:
Determining a target service strategy corresponding to the target service based on a target configuration file corresponding to the target service, wherein the target service strategy is used for representing the acquisition mode of the target user information;
Executing the target service strategy and determining a target calling function corresponding to the target service;
and determining a target service request corresponding to the target service based on the target calling function.
Optionally, the target service includes PAM authentication service or NSS service.
Optionally, the user information out-of-band management apparatus 500 further includes a first configuration module, where the first configuration module is specifically configured to, before invoking the target service:
And when the target service comprises the PAM authentication service, adding a PAM authentication policy based on the BMC system in a PAM configuration file corresponding to the PAM authentication service.
Optionally, the user information out-of-band management apparatus 500 further includes a second configuration module, where the second configuration module is specifically configured to, before invoking the target service:
And adding a second priority data source based on the BMC system in an NSS configuration file corresponding to the NSS service under the condition that the target service comprises the NSS service.
The embodiment of the invention also provides a device for managing user information out-of-band, which is applied to a BMC system, and fig. 6 is a second schematic structural diagram of the device for managing user information out-of-band provided by the embodiment of the invention, as shown in fig. 6, the device 600 for managing user information out-of-band includes a second receiving module 610, a second determining module 620 and a second sending module 630.
The second receiving module 610 is configured to receive a target service request sent by the server system.
The second determining module 620 is configured to determine target user information corresponding to the target service request based on the user information corresponding to the pre-stored server system.
And the second sending module 630 is configured to send the target user information to the server system based on the KCS channel, where the BMC system is communicatively connected to the server system through the KCS channel.
The user information out-of-band management device provided by the embodiment of the invention stores the user information corresponding to the server system in the BMC system in advance, provides a corresponding data service interface for the server system, determines the target user information from the user information corresponding to the pre-stored server system by analyzing the request intention corresponding to the target service request after receiving the target service request sent by the server system, and feeds back the target user information to the server system through the KCS channel, thereby realizing out-of-band management of the user information corresponding to the server system without logging in the server system. On the basis, the user information corresponding to the BMC system and the server system can be integrated and combined, so that the user unification of the BMC system and the server system is realized, the quantity of user information maintained by an administrator is reduced, the maintenance workload is reduced, the operation and maintenance difficulty is reduced, and the purpose of improving the maintenance efficiency is achieved.
Optionally, the second determining module 620 is specifically configured to:
Under the condition that the target service request is a user authentication request, checking information to be checked in the user authentication request based on user information corresponding to the pre-stored server system, and determining a checking result as target user information corresponding to the user authentication request;
And under the condition that the target service request is a user service request, determining a target file corresponding to the user service request from the user information, and determining target user information corresponding to the user service request based on the target file, wherein the target file comprises a user account file, a user group file or a user password file.
Fig. 7 is a schematic structural diagram of a server device according to an embodiment of the present invention, as shown in fig. 7, the electronic device may include a processor (processor) 710, a communication interface (Communications Interface) 720, a memory (memory) 730, and a communication bus 740, where the processor 710, the communication interface 720, and the memory 730 complete communication with each other through the communication bus 740. Processor 710 may invoke logic instructions in memory 730 to perform a user information out-of-band management method comprising:
Determining a target service request corresponding to a target service under the condition of calling the target service, wherein the target service is used for representing the type of the called service;
The target service request is sent to a BMC system based on a KCS channel in a daemon, wherein the BMC system is in communication connection with the server system through the KCS channel, and user information corresponding to the server system is stored in the BMC system;
receiving target user information corresponding to the target service request fed back by the BMC system;
Or alternatively
Receiving a target service request sent by a server system;
determining target user information corresponding to the target service request based on the pre-stored user information corresponding to the server system;
And transmitting the target user information to the server system based on a KCS channel, wherein the BMC system is in communication connection with the server system through the KCS channel.
Further, the logic instructions in the memory 730 described above may be implemented in the form of software functional units and may be stored in a computer readable storage medium when sold or used as a stand alone product. Based on this understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art or in a part of the technical solution in the form of a software product stored in a storage medium, comprising several instructions for causing a computer device (which may be a personal computer, a server, a network device, etc.) to perform all or part of the steps of the method of the embodiments of the present invention. The storage medium includes a U disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a magnetic disk, an optical disk, or other various media capable of storing program codes.
Fig. 8 is a second schematic structural diagram of a server device according to an embodiment of the present invention, where, as shown in fig. 8, a BMC system is communicatively connected to a server system through a KCS channel.
In another aspect, the present invention also provides a computer program product, where the computer program product includes a computer program, where the computer program can be stored on a non-transitory computer readable storage medium, and when the computer program is executed by a processor, the computer can perform a method for out-of-band management of user information provided by the above methods, where the method includes:
Determining a target service request corresponding to a target service under the condition of calling the target service, wherein the target service is used for representing the type of the called service;
The target service request is sent to a BMC system based on a KCS channel in a daemon, wherein the BMC system is in communication connection with the server system through the KCS channel, and user information corresponding to the server system is stored in the BMC system;
receiving target user information corresponding to the target service request fed back by the BMC system;
Or alternatively
Receiving a target service request sent by a server system;
determining target user information corresponding to the target service request based on the pre-stored user information corresponding to the server system;
And transmitting the target user information to the server system based on a KCS channel, wherein the BMC system is in communication connection with the server system through the KCS channel.
In yet another aspect, the present invention also provides a non-transitory computer readable storage medium having stored thereon a computer program which, when executed by a processor, is implemented to perform a method of out-of-band management of user information provided by the above methods, the method comprising:
Determining a target service request corresponding to a target service under the condition of calling the target service, wherein the target service is used for representing the type of the called service;
The target service request is sent to a BMC system based on a KCS channel in a daemon, wherein the BMC system is in communication connection with the server system through the KCS channel, and user information corresponding to the server system is stored in the BMC system;
receiving target user information corresponding to the target service request fed back by the BMC system;
Or alternatively
Receiving a target service request sent by a server system;
determining target user information corresponding to the target service request based on the pre-stored user information corresponding to the server system;
And transmitting the target user information to the server system based on a KCS channel, wherein the BMC system is in communication connection with the server system through the KCS channel.
The apparatus embodiments described above are merely illustrative, wherein elements illustrated as separate elements may or may not be physically separate, and elements shown as elements may or may not be physical elements, may be located in one place, or may be distributed over a plurality of network elements. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of this embodiment. Those of ordinary skill in the art will understand and implement the present invention without undue burden.
From the above description of the embodiments, it will be apparent to those skilled in the art that the embodiments may be implemented by means of software plus necessary general hardware platforms, or of course may be implemented by means of hardware. Based on such understanding, the foregoing technical solutions may be embodied essentially or in part in the form of a software product, which may be stored in a computer-readable storage medium, such as a ROM/RAM, a magnetic disk, an optical disk, etc., including several instructions to cause a computer device (which may be a personal computer, a server, or a network device, etc.) to perform the various embodiments or methods of some parts of the embodiments.
It should be noted that the above-mentioned embodiments are merely for illustrating the technical solution of the present invention, and not for limiting the same, and although the present invention has been described in detail with reference to the above-mentioned embodiments, it should be understood by those skilled in the art that the technical solution described in the above-mentioned embodiments may be modified or some technical features may be equivalently replaced, and these modifications or substitutions do not make the essence of the corresponding technical solution deviate from the spirit and scope of the technical solution of the embodiments of the present invention.