Interceptor configuration method and device, storage medium and electronic equipment

A configuration method and interceptor technology, which is applied in the field of data processing, can solve problems such as business method transactions that cannot be submitted, and achieve the effects of improving user experience, ensuring normal processing, and meeting user requirements

Pending Publication Date: 2019-06-28
NEUSOFT CORP +1
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when multiple transaction interceptors are configured in a business project, according to the existing automatic proxy configuration, the business method will execute the processing logic of each transaction interceptor, resulting in the failure of the transaction corresponding to the business method to be submitted

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Interceptor configuration method and device, storage medium and electronic equipment
  • Interceptor configuration method and device, storage medium and electronic equipment
  • Interceptor configuration method and device, storage medium and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] Specific embodiments of the present disclosure will be described in detail below in conjunction with the accompanying drawings. It should be understood that the specific embodiments described here are only used to illustrate and explain the present disclosure, and are not intended to limit the present disclosure.

[0047] figure 1 As shown, it is a flowchart of an interceptor configuration method provided according to an embodiment of the present disclosure. As an example, a proxy class can be created, and the following methods can be executed when the proxy class is implemented, and corresponding interception can be configured for each business method device, specifically, such as figure 1 As shown, the method includes:

[0048] In S11, when the application corresponding to the business method is started, it is determined whether there is metadata in the configuration file of the business method, wherein the metadata is generated when the business method is created a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an interceptor configuration method and device, a storage medium and electronic equipment. The method comprises the steps that when an application corresponding to a businessmethod is started, whether metadata exists in a configuration file of the business method or not is determined, the metadata is generated when the business method is established and indicates the corresponding relation between the business method and target transaction interceptors, and the number of the target transaction interceptors is one; And when the metadata exists in the configuration file, the target transaction interceptor is configured for the business method according to the metadata. Therefore, through the technical scheme, the problem that the transaction cannot be processed dueto the fact that the business method executes the processing logics of the transaction interceptors can be effectively avoided, normal processing of the business method is further guaranteed, the userequirement of a user is met, and the use experience of the user is improved.

Description

technical field [0001] The present disclosure relates to the field of data processing, and in particular, to an interceptor configuration method, device, storage medium and electronic equipment. Background technique [0002] Aspect Oriented Programming (AOP, Aspect Oriented Programming) is often used in business projects to extract aspects in the business processing process, so as to achieve low-coupling isolation effects between various parts in the business processing logic. In the existing technology, transaction control is usually implemented through AOP. The most commonly used AOP open source framework is the Spring AOP framework. The transaction management in Spring AOP is realized through AOP proxy, which intercepts the proxied business method. In this business method The transaction interceptor is started before execution, and the business method is committed or rolled back according to whether there is an exception and the type of the exception after execution, so a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F8/30G06F9/445
Inventor 陆国际
Owner NEUSOFT CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products