CN108933713A - The method, apparatus and service server of sandbox debugging are realized based on shadow link - Google Patents

The method, apparatus and service server of sandbox debugging are realized based on shadow link Download PDF

Info

Publication number
CN108933713A
CN108933713A CN201810804365.8A CN201810804365A CN108933713A CN 108933713 A CN108933713 A CN 108933713A CN 201810804365 A CN201810804365 A CN 201810804365A CN 108933713 A CN108933713 A CN 108933713A
Authority
CN
China
Prior art keywords
business interface
user
client
sandbox
called
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810804365.8A
Other languages
Chinese (zh)
Other versions
CN108933713B (en
Inventor
皮维
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201810804365.8A priority Critical patent/CN108933713B/en
Publication of CN108933713A publication Critical patent/CN108933713A/en
Application granted granted Critical
Publication of CN108933713B publication Critical patent/CN108933713B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/50Testing arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/34Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters 

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Debugging And Monitoring (AREA)
  • Telephonic Communication Services (AREA)

Abstract

Disclose a kind of method, apparatus and service server that sandbox debugging is realized based on shadow link, the described method includes: receiving the business interface call request that client is sent, wherein, the business interface call request at least carries the interface message of business interface to be called, caller mark, the caller identifies the user identity for identifying login user in the client, and the user identity is following one of them: user on sandbox test user, true line;The caller carried in the business interface call request is identified;If recognition result indicates that the user identity of login user in the client is that sandbox tests user, and the business interface to be called has been contracted, then the business interface to be called is called using preconfigured shadow link, wherein, the shadow link simulations are and mutually isolated with the true line uplink in true line uplink;The call result for being directed to the business interface to be called is returned to the client.

Description

The method, apparatus and service server of sandbox debugging are realized based on shadow link
Technical field
This specification embodiment is related to technical field of data processing, more particularly to a kind of based on shadow link realization sandbox tune The method, apparatus and service server of examination.
Background technique
With the development of internet technology, more and more network service platforms externally provide opening API The service of itself, i.e., be packaged by (Application Programming Interface, application programming calling interface) Series of computation machine data-interface easy to identify opens away, is developed for third party developer based on those data-interfaces new Using and the application for making this new can be run on network service platform, wherein provide platform of opening API itself by Referred to as open platform.
In the prior art, for the ease of the exploitation of application and debugging, open platform provides the debugging enironment of an emulation, i.e., Sandbox environment, the sandbox environment simulate environment in the true line of open platform, have the measured result intuitively emulated, meanwhile, Sandbox environment can answer the third party that Complete inspection is not yet received in the development phase as an independent virtual environment It is isolated with code and environment on true line, avoids that environment on true line is impacted and destroyed, it may be said that provided husky Case environment is to make up the essential ring of platform.
For traditional sandbox environment, since it belongs to environment under a kind of line, thus be easy to by external environment because Element, such as equipment etc. are influenced and are changed, that is, traditional sandbox environment has unstability, and the shakiness of sandbox environment The qualitative effect that further influence is carried out to business interface debugging based on the sandbox environment, meanwhile, also brought to application and development Added burden.
Summary of the invention
In view of the above technical problems, this specification embodiment provides a kind of side that sandbox debugging is realized based on shadow link Method, device and service server, technical solution are as follows:
According to this specification embodiment in a first aspect, provide it is a kind of based on shadow link realize sandbox debugging method, The described method includes:
Receive the business interface call request that client is sent, wherein the business interface call request at least carries Interface message, the caller mark of business interface to be called, the caller mark are used for identifying to log in the client The user identity at family, the user identity are following one of them: user on sandbox test user, true line;
The caller carried in the business interface call request is identified;
If recognition result indicates that the user identity of login user in the client is sandbox test user, and described wait adjust It has been contracted with business interface, has then called the business interface to be called using preconfigured shadow link, wherein the shadow Link simulations are and mutually isolated with the true line uplink in true line uplink;
The call result for being directed to the business interface to be called is returned to the client.
According to the second aspect of this specification embodiment, a kind of device that sandbox debugging is realized based on shadow link is provided, Described device includes:
First receiving module, for receiving the business interface call request of client transmission, wherein the business interface tune Interface message, the caller mark of business interface to be called are at least carried with request, the caller mark is for identifying The user identity of login user in client is stated, the user identity is following one of them: on sandbox test user, true line User;
Identification module is identified, for knowing to the caller carried in the business interface call request Not;
Interface calling module, if indicating the user identity of login user in the client for sandbox survey for recognition result Family on probation, and the business interface to be called has been contracted, then calls the business to be called using preconfigured shadow link Interface, wherein the shadow link simulations are in true line uplink, and isolation related to the true line uplink;
First return module, for returning to the call result for being directed to the business interface to be called to the client.
According to the third aspect of this specification embodiment, a kind of service server is provided, including memory, processor and deposit Store up the computer program that can be run on a memory and on a processor, wherein the processor is realized when executing described program Any method that sandbox debugging is realized based on shadow link that this specification embodiment provides.
Technical solution provided by this specification embodiment, the business interface call request sent by receiving client, Wherein, which at least carries the interface message of business interface to be called, caller mark, the caller The user identity for identifying login user in client is identified, which is that sandbox tests user or true line Upper user;The caller carried in business interface call request is identified;If recognition result indicates to step in client The user identity for employing family is that sandbox tests user, and business interface to be called has been contracted, then utilizes preconfigured shadow chain Call business interface to be called in road, wherein shadow link simulations in true line uplink, and with true line uplink mutually every From;The call result for being directed to the business interface to be called is returned to client, is realized using environment on line and network and is mentioned For sandbox testing service, to improve the stability of sandbox testing service, also just it has been effectively ensured based on sandbox testing service Carry out the effect of business interface debugging.
It should be understood that above general description and following detailed description be only it is exemplary and explanatory, not This specification embodiment can be limited.
In addition, any embodiment in this specification embodiment does not need to reach above-mentioned whole effects.
Detailed description of the invention
In order to illustrate more clearly of this specification embodiment or technical solution in the prior art, below will to embodiment or Attached drawing needed to be used in the description of the prior art is briefly described, it should be apparent that, the accompanying drawings in the following description is only The some embodiments recorded in this specification embodiment for those of ordinary skill in the art can also be attached according to these Figure obtains other attached drawings.
Fig. 1 is a kind of application for the method that sandbox debugging is realized based on shadow link for realizing that this specification embodiment proposes Schematic diagram of a scenario;
Fig. 2 is a kind of method for realizing sandbox debugging based on shadow link that one exemplary embodiment of this specification provides Embodiment flow chart;
Fig. 3 is another method for realizing sandbox debugging based on shadow link that one exemplary embodiment of this specification provides Embodiment flow chart;
Fig. 4 is a kind of device that sandbox debugging is realized based on shadow link that one exemplary embodiment of this specification provides Embodiment block diagram;
Fig. 5 shows one kind provided by this specification embodiment, and more specifically service server hardware configuration is illustrated Figure.
Specific embodiment
In order to make those skilled in the art more fully understand the technical solution in this specification embodiment, below in conjunction with this Attached drawing in specification embodiment is described in detail the technical solution in this specification embodiment, it is clear that described Embodiment is only a part of the embodiment of this specification, instead of all the embodiments.The embodiment of base in this manual, Those of ordinary skill in the art's every other embodiment obtained, all should belong to the range of protection.
To solve the above-mentioned problems, this specification embodiment provides a kind of side that sandbox debugging is realized based on shadow link Method, it is as follows, this method is illustrated.
Firstly, referring to Figure 1, for the side for realizing sandbox debugging based on shadow link for realizing the proposition of this specification embodiment A kind of application scenarios schematic diagram of method.
As shown in Figure 1, including client 110, aol server cluster 120, it will be appreciated by persons skilled in the art that The aol server cluster 120 may include multiple servers (not showing that in Fig. 1), in Fig. 1, according to the aol server collection The function that group 120 is realized, shows Major Systems framework included by the aol server cluster from functional perspective, comprising: System platform, gateway, operation system, database.Wherein, client 110 can pass through system platform and aol server cluster 120 Carry out it is directly interactive, such as can by system platform to aol server cluster application user account, application gateway code key, step on Record the operations such as user account, requested service processing;Gateway then can be controlled or be shunted to service traffics;Operation system then can be right The requested specific business of user carries out business processing, such as carries out business interface calling;Database then can be used for storage service Business datum caused by handling.
It is as follows, on the basis of the application scenarios shown in above-mentioned Fig. 1, it is husky to realizing based on shadow link that following embodiments are shown The method of case debugging is illustrated.
Embodiment one:
Fig. 2 is referred to, shadow link is based on for one kind that one exemplary embodiment of this specification provides and realizes sandbox debugging Method embodiment flow chart, method includes the following steps:
Step 202: receiving the business interface call request that client is sent, wherein business interface call request is at least taken Interface message, caller mark with business interface to be called, the caller are identified for identifying login user in client User identity, which is following one of them: sandbox tests user, user in true line.
In this specification embodiment, aol server cluster 120 exemplified by Fig. 1 can handle normal business simultaneously and connect Mouth call request and the business interface call request for sandbox test, in order to distinguish the two classes business interface call request, industry Interface call request be engaged in addition to the interface message (such as interface name) for carrying business interface to be called, can also carry Caller mark, which identifies the user identity for identifying login user in client, wherein the user identity can be with User on user or true line is tested for sandbox.
In this specification embodiment, above-mentioned business interface to be called has been contracted, that is, has opened debugging permission, so that Sandbox test user can debug the business interface to be called.
In one embodiment, above-mentioned caller mark may include the user account of login user in client, this field It is understood that the user account is that sandbox tests the pre- first to file of user, specific application process refers to technical staff Associated description in following embodiments two is not described further first herein.
Based on foregoing description it is found that can distinguish sandbox by caller mark tests user in user and true line, that , sandbox tests user can be with different from the respective user account of user in true line.In one embodiment, sandbox is tested It may include in the character string of specified format, such as the user account of sandbox test user in the user account of user including "@ The character string of this specified format of test ", in another example sandbox test user user account in most end two for letter.
Step 204: the caller carried in business interface call request is identified.
Based on the associated description in above-mentioned steps 202, in this step, then it can identify that the business interface received calls Whether include the character string of specified format in the user account carried in request, it, can be with if including the character string of specified format Show that the user identity for indicating login user in client is the recognition result that sandbox tests user;Conversely, if not including The character string of specified format is, it is concluded that the user identity for indicating login user in client is the identification of user in true line As a result.
Based on application scenarios exemplified by Fig. 1, can the gateway of example as shown in Figure 1 execute the step.
Step 206: if recognition result indicates that the user identity of login user in client is sandbox test user, and described Business interface to be called has been contracted, then calls the business interface to be called using preconfigured shadow link, wherein shadow chain Road is simulation in true line uplink, and the link mutually isolated with the true line uplink.
In this specification embodiment, if the recognition result of step 204 indicates the user identity of login user in client User is tested for sandbox, and when business interface to be called has been contracted, then can use that preconfigured shadow link calls should be to Call business interface.
Shadow link simulations true line uplink in this specification embodiment, the major function with true line uplink And main logic, although being also based on the realization of online service cluster, it is mutually isolated with true line uplink, from And data on true line can be avoided pollution.
Based on application scenarios exemplified by Fig. 1, can the operation system of example as shown in Figure 1 execute the step.
It should be noted that in this specification embodiment, in order to realize test data in true line data it is complete Isolation can will be called caused by business interface to be called using shadow link and data is called to be stored in preconfigured shadow In tables of data, the shadow tables of data can tables of data be mutually isolated on the line of calling data in true line with for storing.
It in one embodiment, can be by the way that two class tables of data be deposited in different databases, to realize the correlation of the two Isolation.
It in another embodiment, can be by by the storage of two class tables of data and same database, but in the form of different tables Realize the related isolation of the two.
Step 208: the call result for being directed to business interface to be called is returned to client.
In addition, crossing multiprocessing in this specification embodiment in order to avoid aol server cluster 120 and being tested from sandbox The business interface call request of user, and business on true line is influenced, it proposes to lay monitoring in server cluster 120 on line System and operational system (not shown in figure 1), to pass through the monitoring system and operational system to the industry for testing user from sandbox Business interface call request carries out security control or cuts stream process work, specifically, can be for what is received, sandbox tests user The business interface call request that the client logged in is sent is counted;If statistical result meets pre-set control strip Part, then when newly receiving the business interface call request that the client that is logged in of sandbox test user is sent, according to setting in advance The control strategy set handles the business interface call request newly received.
In one embodiment, above-mentioned pre-set control condition can be with are as follows: in preset time period, receive from sand The quantity of the business interface call request of case test user reaches certain amount rank, such as reaches preset threshold.
In one embodiment, above-mentioned pre-set control strategy can be with are as follows: at the appointed time in section, refusal processing is newly connect The business interface call request from sandbox test user received;Either, what delay process newly received surveys from sandbox The business interface call request at family on probation.
It will be appreciated by persons skilled in the art that above-mentioned about pre-set control condition, pre-set control The associated description of strategy is as just citing, in practical applications, pre-set control condition, pre-set control strategy Can also be other forms, this specification embodiment to this with no restriction.
Technical solution provided by this specification embodiment, the business interface call request sent by receiving client, Wherein, which at least carries the interface message of business interface to be called, caller mark, the caller The user identity for identifying login user in client is identified, which is that sandbox tests user or true line Upper user;The caller carried in business interface call request is identified;If recognition result indicates to step in client The user identity for employing family is that sandbox tests user, and business interface to be called has been contracted, then utilizes preconfigured shadow chain Call business interface to be called in road, wherein shadow link simulations in true line uplink, and with true line uplink mutually every From;The call result for being directed to the business interface to be called is returned to client, is realized using environment on line and network and is mentioned For sandbox testing service, to improve the stability of sandbox testing service, also just it has been effectively ensured based on sandbox testing service Carry out the effect of business interface debugging.
So far, the associated description of embodiment one is completed.
Embodiment two:
Illustrate first, on the basis of the above embodiment 1, to sandbox, test user carries out user's registration to the embodiment two Entire flow to finishing service interface debugging is illustrated.
Fig. 3 is referred to, shadow link is based on for the another kind that one exemplary embodiment of this specification provides and realizes sandbox tune The embodiment flow chart of the method for examination, method includes the following steps:
Step 302: receiving the sandbox test account application request that client is sent, which tests account application request and use Apply for user account in testing user for sandbox, and account application is tested according to the sandbox and requests to return to user's account to client Number, wherein the user account returned includes the character string of specified format.
In this specification embodiment, sandbox tests user can be by the client 110 and aol server collection exemplified by Fig. 1 System platform in group 120 sends sandbox test account application request, aol server cluster to aol server cluster 120 Operation system in 120 is then handled sandbox test account application request, specifically, testing account according to the sandbox Application request generates user account, and returns to the user account to client 110 by system platform.
It should be noted that including the character string of specified format in the user account of the return, to identify the use of the return Family account belongs to sandbox test user.
The detailed process that account application request generates user account, art technology are tested according to sandbox as operation system Personnel may refer to associated description in the prior art, this is no longer described in detail in this specification embodiment.
Step 304: receiving the gateway code key application request that client is sent, gateway code key application request is for being sandbox It tests user and applies for gateway code key, and requested to return to gateway code key to client according to the gateway code key application.
In this specification embodiment, in order to ensure the safety of follow-up business interface calling, sandbox test user may be used also To pass through client 110 exemplified by Fig. 1 and the system platform in aol server cluster 120, to aol server cluster 120 It sends the application of gateway code key to request, which requests to be used for test user's application gateway code key for the sandbox, on line Gateway in server cluster 120 is then handled gateway code key application request, specifically, according to the gateway code key Shen It please request to generate gateway code key, and the gateway code key is returned to client 110 by system platform.
The detailed process of generation gateway code key is requested according to the gateway code key application as gateway, those skilled in the art can With referring to associated description in the prior art, this is no longer described in detail in this specification embodiment.
Step 306: receiving the business interface test request that client is sent, wherein business interface test request is at least taken Interface message with business interface to be called.
In this specification embodiment, sandbox test user can utilize the use applied in above-mentioned steps 302 and step 304 Family account logs in the system platform of aol server cluster 120, sends industry to aol server cluster 120 by the system platform Business interface testing request, the business interface test request at least carry the interface message of business interface to be called, such as interface Title.
Step 308: determining whether business interface to be called has contracted, if unsigned, then follow the steps 310;If having contracted, Then follow the steps 312;
It, can be in advance to certain during being pre-configured to aol server cluster 120 in this specification embodiment A little business interfaces are contracted, namely open the debugging permission of the business interface.
It is subsequent, after receiving business interface test request, it can first determine whether indicated by the business interface test request Whether business interface to be called has contracted, if so, step 312 can be executed directly;If unsigned, 310 are thened follow the steps.
Step 310: contracting to business interface to be called, to open the debugging permission of business interface to be called.
Step 312: returning to client for indicating the application result for allowing to debug business interface to be called.
Step 314: the business interface call request that client is sent is received, to the tune carried in business interface call request User identifies, if recognition result indicates that the user identity of login user in client is that sandbox tests user, benefit Business interface to be called is called with preconfigured shadow link, the calling knot for being directed to business interface to be called is returned to client Fruit.
In this specification embodiment, client 110 receives allowing for expression for the return of aol server cluster 120 After the application result debugged to business interface to be called, this application can be tested user to sandbox as the result is shown, so as to sand Case test user continues through client 110 and the system platform of aol server cluster 120 is sent out to aol server cluster 120 Business interface call request is sent, aol server cluster 120 then can be found in based on the processing that the business interface call request is done Description in above-described embodiment one is not repeated to describe herein.
It should be noted that can also carry the net applied in above-mentioned steps 204 in the business interface call request Code key is closed, then, the gateway in aol server cluster 120 is then secret to the gateway carried in the business interface call request first Key is verified, and after verification passes through, then turns the shadow link calling business interface to be called of operation system.
Technical solution provided by above-described embodiment realizes using environment on line and network and provides sandbox test clothes Business has also just been effectively ensured to improve the stability of sandbox testing service and has carried out business interface based on sandbox testing service The effect of debugging.
So far, the associated description of embodiment two is completed.
Corresponding to above method embodiment, this specification embodiment also provides a kind of based on the realization sandbox debugging of shadow link Device, refer to Fig. 4, for one exemplary embodiment of this specification provide it is a kind of based on shadow link realize sandbox debugging The embodiment block diagram of device, the apparatus may include: the first receiving module 41, mark identification module 42, interface calling module 43, And first return module 44.
Wherein, the first receiving module 41 can be used for receiving the business interface call request of client transmission, wherein institute It states business interface call request and at least carries the interface message of business interface to be called, caller mark, the caller mark Know the user identity for identifying login user in the client, the user identity is following one of them: sandbox test User on user, true line;
Identify identification module 42, can be used for identifying the caller carried in the business interface call request into Row identification;
Interface calling module 43, if can be used for recognition result indicates that the user identity of login user in the client is Sandbox tests user, and the business interface to be called has been contracted, then is called using preconfigured shadow link described wait adjust With business interface, wherein the shadow link simulations are in true line uplink, and isolation related to the true line uplink;
First return module 44 can be used for returning to the calling knot for being directed to the business interface to be called to the client Fruit.
In one embodiment, described device can also include (being not shown in Fig. 4):
Second receiving module, for receiving the business interface test request of client transmission, wherein the business interface is surveyed Examination request at least carries the interface message of business interface to be called;
Determining module, for determining whether the business interface to be called has contracted;
Module of contracting signs the business interface to be called if unsigned for the business interface to be called About, to open the debugging permission of the business interface to be called.
In one embodiment, described device can also include (being not shown in Fig. 4):
Memory module calls data for that will call using the shadow link caused by the business interface to be called It is stored in preconfigured shadow tables of data;
Wherein, tables of data is mutually isolated on the line of calling data in true line with for storing for the shadow tables of data.
In one embodiment, described device can also include (being not shown in Fig. 4):
Statistical module, for for what is received, sandbox to test the business interface tune that the client that user is logged in is sent It is counted with request;
Processing module, if meeting pre-set control condition for statistical result, when the sandbox test newly received When the business interface call request that the client that user is logged in is sent, newly connect according to the processing of pre-set control strategy is described The business interface call request received.
In one embodiment, the caller mark includes: user account;
The mark identification module 42 is specifically used for:
Identify in the user account carried in the business interface call request whether include specified format character string;If Character string in the user account including specified format is, it is concluded that for indicating user's body of login user in the client Part is the recognition result that sandbox tests user;If not including the character string of specified format in the user account, it is concluded that being used for The user identity for indicating login user in the client is the recognition result of user in true line.
In one embodiment, the business interface call request also carries gateway code key;
The interface calling module 43 is specifically used for:
The gateway code key carried in the business interface call request is verified;If verification passes through, using in advance The shadow link of configuration calls the business interface to be called.
In one embodiment, described device can also include (being not shown in Fig. 4):
Third receiving module, for receiving the sandbox test account application request of client transmission, the sandbox tests account Number application request for for sandbox test user apply user account;
Second return module requests to return to user's account to the client for testing account application according to the sandbox Number, wherein the user account returned includes the character string of specified format;
4th receiving module, for receiving the gateway code key application request of client transmission, the gateway code key application is asked It asks and applies for gateway code key for testing user for the sandbox;
Third return module returns to gateway code key to the client for requesting according to the gateway code key application.
It is understood that the first receiving module 41, mark identification module 42, interface calling module 43 and first return Module of the module 44 as four kinds of functional independences is returned, can both have been configured simultaneously as shown in Figure 4 in a device, it can also be individually It configures in a device, therefore structure shown in Fig. 4 should not be construed as the restriction to this specification example scheme.
In addition, the function of modules and the realization process of effect are specifically detailed in the above method corresponding step in above-mentioned apparatus Rapid realization process, details are not described herein.
This specification embodiment also provides a kind of service server, includes at least memory, processor and is stored in On reservoir and the computer program that can run on a processor, wherein processor realizes one kind above-mentioned when executing described program Based on the method that shadow link realizes sandbox debugging, this method is included at least: being received the business interface calling that client is sent and is asked It asks, wherein the business interface call request at least carries the interface message of business interface to be called, caller mark, institute It states caller and identifies user identity for identifying login user in the client, the user identity is following wherein one : user on sandbox test user, true line;The caller mark carried in the business interface call request is carried out Identification;If recognition result indicates that the user identity of login user in the client is sandbox test user, and described to be called Business interface has been contracted, then calls the business interface to be called using preconfigured shadow link, wherein the shadow chain Road is simulated in true line uplink, and mutually isolated with the true line uplink;To the client return for it is described to Call the call result of business interface.
Fig. 5 shows one kind provided by this specification embodiment, and more specifically service server hardware configuration is illustrated Figure, the service server may include: processor 510, memory 520, input/output interface 530, communication interface 540 and total Line 550.Wherein processor 510, memory 520, input/output interface 530 and communication interface 540 realize that by bus 550 Communication connection between this inside equipment.
Processor 510 can use general CPU (Central Processing Unit, central processing unit), micro process Device, application specific integrated circuit (Application Specific Integrated Circuit, ASIC) or one or The modes such as multiple integrated circuits are realized, for executing relative program, to realize technical solution provided by this specification embodiment.
Memory 520 can use ROM (Read Only Memory, read-only memory), RAM (Random Access Memory, random access memory), static storage device, the forms such as dynamic memory realize.Memory 520 can store Operating system and other applications are realizing technical solution provided by this specification embodiment by software or firmware When, relevant program code is stored in memory 520, and execution is called by processor 510.
Input/output interface 530 is for connecting input/output module, to realize information input and output.Input and output/ Module can be used as component Configuration and (be not shown in Fig. 5) in a device, can also be external in equipment to provide corresponding function.Wherein Input equipment may include keyboard, mouse, touch screen, microphone, various kinds of sensors etc., output equipment may include display, Loudspeaker, vibrator, indicator light etc..
Communication interface 540 is used for connection communication module (being not shown in Fig. 5), to realize the communication of this equipment and other equipment Interaction.Wherein communication module can be realized by wired mode (such as USB, cable etc.) and be communicated, can also be wirelessly (such as mobile network, WIFI, bluetooth etc.) realizes communication.
Bus 550 includes an access, in various components (such as the processor 510, memory 520, input/output of equipment Interface 530 and communication interface 540) between transmit information.
It should be noted that although above equipment illustrates only processor 510, memory 520, input/output interface 530, communication interface 540 and bus 550, but in the specific implementation process, which can also include realizing to operate normally Necessary other assemblies.In addition, it will be appreciated by those skilled in the art that, it can also be only comprising realizing in above equipment Component necessary to this specification example scheme, without including all components shown in figure.
This specification embodiment also provides a kind of computer readable storage medium, is stored thereon with computer program, the journey It realizes that the method above-mentioned for realizing sandbox debugging based on shadow link, this method include at least when sequence is executed by processor: receiving The business interface call request that client is sent, wherein the business interface call request at least carries business to be called and connects Interface message, the caller mark of mouth, the caller identify the user identity for identifying login user in the client, The user identity is following one of them: user on sandbox test user, true line;To in the business interface call request The caller carried is identified;If recognition result indicates the user identity of login user in the client for sand Case tests user, and the business interface to be called has been contracted, then is called using preconfigured shadow link described to be called Business interface, wherein the shadow link simulations are and mutually isolated with the true line uplink in true line uplink;To The client returns to the call result for being directed to the business interface to be called.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM), Digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devices Or any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, it calculates Machine readable medium does not include temporary computer readable media (transitory media), such as the data-signal and carrier wave of modulation.
As seen through the above description of the embodiments, those skilled in the art can be understood that this specification Embodiment can be realized by means of software and necessary general hardware platform.Based on this understanding, this specification is implemented Substantially the part that contributes to existing technology can be embodied in the form of software products the technical solution of example in other words, The computer software product can store in storage medium, such as ROM/RAM, magnetic disk, CD, including some instructions are to make It is each to obtain computer equipment (can be personal computer, server or the network equipment etc.) execution this specification embodiment Method described in certain parts of a embodiment or embodiment.
System, device, module or the unit that above-described embodiment illustrates can specifically realize by computer chip or entity, Or it is realized by the product with certain function.A kind of typically to realize that equipment is computer, the concrete form of computer can To be personal computer, laptop computer, cellular phone, camera phone, smart phone, personal digital assistant, media play In device, navigation equipment, E-mail receiver/send equipment, game console, tablet computer, wearable device or these equipment The combination of any several equipment.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for device reality For applying example, since it is substantially similar to the method embodiment, so describing fairly simple, related place is referring to embodiment of the method Part explanation.The apparatus embodiments described above are merely exemplary, wherein described be used as separate part description Module may or may not be physically separated, can be each module when implementing this specification example scheme Function realize in the same or multiple software and or hardware.Can also select according to the actual needs part therein or Person's whole module achieves the purpose of the solution of this embodiment.Those of ordinary skill in the art are not the case where making the creative labor Under, it can it understands and implements.
The above is only the specific embodiment of this specification embodiment, it is noted that for the general of the art For logical technical staff, under the premise of not departing from this specification embodiment principle, several improvements and modifications can also be made, this A little improvements and modifications also should be regarded as the protection scope of this specification embodiment.

Claims (15)

1. a kind of method for realizing sandbox debugging based on shadow link, which comprises
Receive the business interface call request that client is sent, wherein the business interface call request is at least carried wait adjust It is identified with the interface message of business interface, caller, the caller mark is for identifying login user in the client User identity, the user identity are following one of them: user on sandbox test user, true line;
The caller carried in the business interface call request is identified;
If recognition result indicates that the user identity of login user in the client is that sandbox tests user, and the industry to be called Business interface has been contracted, then calls the business interface to be called using preconfigured shadow link, wherein the shadow link It simulates in true line uplink, and mutually isolated with the true line uplink;
The call result for being directed to the business interface to be called is returned to the client.
2. according to the method described in claim 1, it is described reception client send business interface call request before, it is described Method further include:
Receive the business interface test request that client is sent, wherein the business interface test request is at least carried wait adjust With the interface message of business interface;
Determine whether the business interface to be called has contracted;
If the business interface to be called is unsigned, contract to the business interface to be called, it is described wait adjust to open With the debugging permission of business interface.
3. according to the method described in claim 1, calling the business to be called using preconfigured shadow link described After interface, the method also includes:
Calling data caused by the business interface to be called will be called to be stored in using the shadow link preconfigured Shadow tables of data;
Wherein, tables of data is mutually isolated on the line of calling data in true line with for storing for the shadow tables of data.
4. according to the method described in claim 1, the method also includes:
For what is received, the business interface call request that the client that sandbox test user is logged in is sent is counted;
If statistical result meets pre-set control condition, sent out when newly receiving the client that sandbox test user is logged in When the business interface call request sent, the business interface calling newly received is handled according to pre-set control strategy and is asked It asks.
5. according to the method described in claim 1, caller mark includes: user account;
It is described that the caller carried in the business interface call request is identified, comprising:
Identify in the user account carried in the business interface call request whether include specified format character string;
If the character string in the user account including specified format is, it is concluded that for indicating login user in the client User identity is the recognition result that sandbox tests user;If in the user account not including the character string of specified format, Out for indicating that the user identity of login user in the client is the recognition result of user in true line.
6. according to the method described in claim 5, the business interface call request also carries gateway code key;
It is described to call the business interface to be called using preconfigured shadow link, comprising:
The gateway code key carried in the business interface call request is verified;
If verification passes through, the business interface to be called is called using preconfigured shadow link.
7. according to the method described in claim 6, the method also includes:
The sandbox test account application request that client is sent is received, the sandbox test account application request for sandbox for surveying Apply for user account in family on probation;
It tests account application according to the sandbox to request to return to user account to the client, wherein the user's account returned Number include specified format character string;
The gateway code key application request that client is sent is received, the gateway code key application request for sandbox test for using Apply for gateway code key in family;
It is requested to return to gateway code key to the client according to the gateway code key application.
8. a kind of device for realizing sandbox debugging based on shadow link, described device include:
First receiving module, for receiving the business interface call request of client transmission, wherein the business interface calling is asked The interface message at least carrying business interface to be called, caller mark are asked, the caller mark is for identifying the visitor The user identity of login user on the end of family, the user identity are following one of them: being used on sandbox test user, true line Family;
Identification module is identified, for identifying to the caller carried in the business interface call request;
Interface calling module, if indicating that the user identity of login user in the client is that sandbox test is used for recognition result Family, and the business interface to be called has been contracted, then calls the business interface to be called using preconfigured shadow link, Wherein, the shadow link simulations are in true line uplink, and isolation related to the true line uplink;
First return module, for returning to the call result for being directed to the business interface to be called to the client.
9. device according to claim 8, described device further include:
Second receiving module, for receiving the business interface test request of client transmission, wherein the business interface test is asked Seek the interface message at least carrying business interface to be called;
Determining module, for determining whether the business interface to be called has contracted;
Module of contracting contracts to the business interface to be called if unsigned for the business interface to be called, with Open the debugging permission of the business interface to be called.
10. device according to claim 8, described device further include:
Memory module calls data to store for that will call using the shadow link caused by the business interface to be called In preconfigured shadow tables of data;
Wherein, tables of data is mutually isolated on the line of calling data in true line with for storing for the shadow tables of data.
11. device according to claim 8, described device further include:
Statistical module, for for what is received, the business interface calling that the client that sandbox test user is logged in is sent to be asked It asks and is counted;
Processing module, if meeting pre-set control condition for statistical result, when the sandbox newly received tests user When the business interface call request that the client logged in is sent, newly received according to the processing of pre-set control strategy is described Business interface call request.
12. device according to claim 8, the caller mark includes: user account;
The mark identification module is specifically used for:
Identify in the user account carried in the business interface call request whether include specified format character string;If described Character string in user account including specified format is, it is concluded that be used to indicate that the user identity of login user in the client to be The recognition result of sandbox test user;If not including the character string of specified format in the user account, it is concluded that for indicating The user identity of login user is the recognition result of user in true line in the client.
13. device according to claim 12, the business interface call request also carries gateway code key;
The interface calling module is specifically used for:
The gateway code key carried in the business interface call request is verified;If verification passes through, using being pre-configured with Shadow link call the business interface to be called.
14. device according to claim 13, described device further include:
Third receiving module, for receiving the sandbox test account application request of client transmission, the sandbox tests account Shen It please request to apply for user account for testing user for sandbox;
Second return module requests to return to user account to the client for testing account application according to the sandbox, In, the user account returned includes the character string of specified format;
4th receiving module, for receiving the gateway code key application request of client transmission, the gateway code key application request is used Apply for gateway code key in testing user for the sandbox;
Third return module returns to gateway code key to the client for requesting according to the gateway code key application.
15. a kind of service server including memory, processor and stores the meter that can be run on a memory and on a processor Calculation machine program, wherein the processor realizes the method as described in claim 1-7 when executing described program.
CN201810804365.8A 2018-07-20 2018-07-20 Method and device for realizing sandbox debugging based on shadow link and business server Active CN108933713B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810804365.8A CN108933713B (en) 2018-07-20 2018-07-20 Method and device for realizing sandbox debugging based on shadow link and business server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810804365.8A CN108933713B (en) 2018-07-20 2018-07-20 Method and device for realizing sandbox debugging based on shadow link and business server

Publications (2)

Publication Number Publication Date
CN108933713A true CN108933713A (en) 2018-12-04
CN108933713B CN108933713B (en) 2022-08-26

Family

ID=64448220

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810804365.8A Active CN108933713B (en) 2018-07-20 2018-07-20 Method and device for realizing sandbox debugging based on shadow link and business server

Country Status (1)

Country Link
CN (1) CN108933713B (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109683997A (en) * 2018-12-21 2019-04-26 前锦网络信息技术(上海)有限公司 Pass through the method for sandbox access application interface, sandbox and sandbox equipment
CN110597723A (en) * 2019-09-18 2019-12-20 达疆网络科技(上海)有限公司 Lightweight joint debugging system for rapid test of merchant system docking
CN111552610A (en) * 2020-04-17 2020-08-18 上海中通吉网络技术有限公司 Full link monitoring method and device
CN111966426A (en) * 2019-05-20 2020-11-20 顺丰科技有限公司 API (application program interface) docking method, system, equipment and storage medium
US20210089419A1 (en) * 2019-09-25 2021-03-25 Alibaba Group Holding Limited Debugging unit and processor
CN112835731A (en) * 2021-03-09 2021-05-25 浙江网商银行股份有限公司 Data processing method and device
CN113411269A (en) * 2021-07-07 2021-09-17 杭州网易云音乐科技有限公司 Current limiting control method, current limiting control device, storage medium and electronic equipment
CN113610651A (en) * 2021-08-17 2021-11-05 上海镁信健康科技有限公司 PBM ecosystem's open platform
CN113704117A (en) * 2021-08-31 2021-11-26 北京三快在线科技有限公司 Algorithm testing system, method and device
CN114143236A (en) * 2020-08-13 2022-03-04 网联清算有限公司 Business system testing method and device, electronic equipment and readable storage medium
CN115225666A (en) * 2022-07-07 2022-10-21 支付宝(杭州)信息技术有限公司 Production drilling method, device and system, emergency rule platform and injection platform

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9455887B1 (en) * 2013-08-14 2016-09-27 Amazon Technologies, Inc. Distributed performance evaluation framework
CN106528362A (en) * 2015-09-10 2017-03-22 阿里巴巴集团控股有限公司 Method and device for flow quantity isolation
CN106878045A (en) * 2016-10-11 2017-06-20 阿里巴巴集团控股有限公司 Service calling method and device
CN107483534A (en) * 2017-06-28 2017-12-15 阿里巴巴集团控股有限公司 A kind of method and device of business processing

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9455887B1 (en) * 2013-08-14 2016-09-27 Amazon Technologies, Inc. Distributed performance evaluation framework
CN106528362A (en) * 2015-09-10 2017-03-22 阿里巴巴集团控股有限公司 Method and device for flow quantity isolation
CN106878045A (en) * 2016-10-11 2017-06-20 阿里巴巴集团控股有限公司 Service calling method and device
CN107483534A (en) * 2017-06-28 2017-12-15 阿里巴巴集团控股有限公司 A kind of method and device of business processing

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109683997A (en) * 2018-12-21 2019-04-26 前锦网络信息技术(上海)有限公司 Pass through the method for sandbox access application interface, sandbox and sandbox equipment
CN111966426A (en) * 2019-05-20 2020-11-20 顺丰科技有限公司 API (application program interface) docking method, system, equipment and storage medium
CN110597723A (en) * 2019-09-18 2019-12-20 达疆网络科技(上海)有限公司 Lightweight joint debugging system for rapid test of merchant system docking
US20210089419A1 (en) * 2019-09-25 2021-03-25 Alibaba Group Holding Limited Debugging unit and processor
US11755441B2 (en) * 2019-09-25 2023-09-12 Alibaba Group Holding Limited Debugging unit and processor
CN111552610A (en) * 2020-04-17 2020-08-18 上海中通吉网络技术有限公司 Full link monitoring method and device
CN114143236A (en) * 2020-08-13 2022-03-04 网联清算有限公司 Business system testing method and device, electronic equipment and readable storage medium
CN112835731A (en) * 2021-03-09 2021-05-25 浙江网商银行股份有限公司 Data processing method and device
CN112835731B (en) * 2021-03-09 2024-06-28 浙江网商银行股份有限公司 Data processing method and device
CN113411269A (en) * 2021-07-07 2021-09-17 杭州网易云音乐科技有限公司 Current limiting control method, current limiting control device, storage medium and electronic equipment
CN113411269B (en) * 2021-07-07 2022-05-17 杭州网易云音乐科技有限公司 Current limiting control method, current limiting control device, storage medium and electronic equipment
CN113610651A (en) * 2021-08-17 2021-11-05 上海镁信健康科技有限公司 PBM ecosystem's open platform
CN113704117A (en) * 2021-08-31 2021-11-26 北京三快在线科技有限公司 Algorithm testing system, method and device
CN113704117B (en) * 2021-08-31 2023-06-02 北京三快在线科技有限公司 Algorithm testing system, method and device
CN115225666A (en) * 2022-07-07 2022-10-21 支付宝(杭州)信息技术有限公司 Production drilling method, device and system, emergency rule platform and injection platform

Also Published As

Publication number Publication date
CN108933713B (en) 2022-08-26

Similar Documents

Publication Publication Date Title
CN108933713A (en) The method, apparatus and service server of sandbox debugging are realized based on shadow link
US10235480B2 (en) Simulation of internet of things environment
Dias et al. A brief overview of existing tools for testing the internet-of-things
Rosenkranz et al. A distributed test system architecture for open-source IoT software
CN108345535A (en) Mock test methods, device and equipment
CN109729141A (en) Mixing BOT frame for enterprise
CN108140007A (en) Across deployed position safely disposing application program
US10423408B2 (en) Identifying and isolating library code in software applications
CN108182058A (en) A kind of software development methodology and cloud development platform based on cloud platform
CN108536578A (en) A kind of test method and device
CN110007921A (en) A kind of code dissemination method and device
CN110008111A (en) A kind of service test method and device
CN109302423A (en) A kind of vulnerability scanning aptitude tests method and apparatus
Zhang et al. Towards a virtual network function research agenda: A systematic literature review of vnf design considerations
CN109117143A (en) A kind of application dispositions method and system
CN108052444A (en) A kind of method and apparatus of performance test for mobile application
Beilharz et al. Continuously testing distributed iot systems: An overview of the state of the art
US10229318B2 (en) Activity-based robotic testing of wearable devices
TWI626538B (en) Infrastructure rule generation
CN110162452A (en) A kind of analog detection method, device and storage medium for testing and control service
CN112817855A (en) System crowd test method, device and computer storage medium
CN110022327B (en) Short message authentication test method and device
CN109656825A (en) The method and device of fine arts resource processing, electronic equipment, storage medium
CN108134709A (en) A kind of test method and device applied to protenchyma networking transport
CN110489342A (en) A kind of Android application testing method, system, device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20200929

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Applicant before: Alibaba Group Holding Ltd.

Effective date of registration: 20200929

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant before: Advanced innovation technology Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant