External program calling method and system based on environment isolation mechanism

An environment isolation and external program technology, applied in the computer field, can solve the problems of single applicable scene and complex deployment method, and achieve the effect of alleviating the single applicable scene and strong versatility

Pending Publication Date: 2022-06-24
以萨技术股份有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In view of this, the purpose of the present invention is to provide an external program calling method and system based on an environment isolation mechanism, so as to alleviate the technical problems in the prior art of single applicable scenarios and complex deployment methods

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • External program calling method and system based on environment isolation mechanism
  • External program calling method and system based on environment isolation mechanism
  • External program calling method and system based on environment isolation mechanism

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0024] figure 1 It is a flowchart of an external program calling method based on an environment isolation mechanism provided according to an embodiment of the present invention. like figure 1 As shown, the method specifically includes the following steps:

[0025] In step S102, the target script fragment is checked for compliance.

[0026] Optionally, in this embodiment of the present invention, the compliance check includes: a security check and a rule check.

[0027] Specifically, script fragments are first written according to the established rules, and the security verification of the script fragments will be carried out after the writing is completed. After the verification is passed, the main script program will be verified, and the main script management program will verify the incoming parameters and the rules of the script fragments.

[0028] Step S104, if the target script fragment is checked, load the target script fragment into the main script to obtain the targ...

Embodiment 2

[0040] figure 2 It is a schematic diagram of an external program calling system based on an environment isolation mechanism provided according to an embodiment of the present invention. like figure 2 As shown, the system includes: a checking module 10 , a loading module 20 , an injecting module 30 and a calling module 40 .

[0041] Specifically, the checking module 10 is configured to perform compliance checking on the target script fragment. Optionally, the checking module 10 is further configured to: perform security checking and rule checking on the target script fragment.

[0042] The loading module 20 is configured to load the target script fragment into the main script to obtain the target script program if the target script fragment passes the check.

[0043] The injection module 30 is used for injecting the target script program into the target isolation container through the API to obtain the target script container. Optionally, the target isolation container is...

Embodiment 3

[0048] Figure 4It is a schematic structural diagram of a script processing program provided according to an embodiment of the present invention. like Figure 4 As shown, the script handler includes a script fragment security check, a script fragment rule check, a main run script validator, a container generator, and a main script program.

[0049] Among them, the script fragment security check is used to check whether the submitted script fragment of the main operation logic is safe, using static code scanning and security rule checking.

[0050] Script fragment rule checking is used to check the compliance of script fragments. Only script fragments that meet the rules can be run.

[0051] The main run script validator, which validates the incoming script parameters of the main script.

[0052] The container generator is used to package the main script runner after all rules are verified, and notify the container maintenance program in the form of API to generate one or mo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an external program calling method and system based on an environment isolation mechanism. The external program calling method comprises the following steps: performing compliance check on a target script fragment; if the target script fragment is checked to be qualified, loading the target script fragment into the main script to obtain a target script program; injecting the target script program into the target isolation container through the API to obtain a target script container; and calling and running the target script container through the API to obtain a running result. According to the invention, the technical problems of single application scene and complex deployment mode in the prior art are relieved.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to an external program calling method and system based on an environment isolation mechanism. Background technique [0002] At present, the complexity of various systems is getting higher and higher, and often one development language cannot handle all the business logic. When the main language is developed, other languages ​​are required to participate, which leads to the problem of heterogeneous language interaction. Developers have limited technology stacks, and at the same time need to consider the impact of external code on the system, so the use of such isolated heterogeneous technology calls is increasing. The application scenarios of the invocation technology in the prior art are single and have certain limitations, the scripting language is limited to Python, and the way of deploying into the docker container is complex and professional. SUMMARY OF THE INVENTION [000...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/53G06F9/455
CPCG06F21/53G06F9/45558G06F2009/45587
Inventor 栾晓东李凡平王堃
Owner 以萨技术股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products