PHP-developed API multi-version management practices
This article focuses on mobile Internet clients that need to be compatible with the old version. force upgrade to the latest version of the app is not discussed here.
In the bugtags.com project, our version complies with the following specifications.1.0.1Major features, minor updates, bug fixesOur version list
1. BackgroundREST(English: Representational State Transfer Representational State transfer) describes a schema-style network system, such as a Web application.At present, the Internet is flooded with RESTful API articles about how to design (for convenience, " RESTful API shorthand for" API ), but there is no "universal" design standard: How to Authentication? Wh
BackgroundThe internet is awash with articles about restful APIs (for convenience, the "RESTful API" shorthand for "API" below), but there is no "universal" design standard: How to do authentication? What is the API format? Should your API include version information? When you start to write an app, especially when the
"college", they may be more theoretical, but sometimes derail the real world (so I'm a liberal). So my goal in this article is to start from a practical point of view, give the current Web application of API design best practices (of course, I think the best ~), if it is not appropriate, I will not comply with the standard. Of course, as the basis of design, a few of the principles must be adhered to:
a liberal). So my goal in this article is to start from a practical point of view, give the current Web application of API design best practices (of course, I think the best ~), if it is not appropriate, I will not comply with the standard. Of course, as the basis of design, a few of the principles must be adhered to:
Comply with standards when the standards are reasonable.
The
that better practices are placed in URLs, which makes it more intuitive to see the version of the API that is currently in use.
However, there are tradeoffs between how to use the--strip API versioning:
The main version number is placed in the URL to indicate the overall structure of the API
The time-based mi
the credential information, which of course is not required and optional.2.4 API keyword (API key)Every request for an API contains a keyword that uniquely identifies the user.2.5 OAuth 1.X/2HTTP-based interactions and workflows that authorize the use of resources such as APIs, the Web, and so on.OAuth includes a step
] Public classUsercontroller:apicontroller { Public stringGet () {//Get back user information (in Apiauthorize by parsing token's payload and saving in Routedata)AuthInfo AuthInfo = This. requestcontext.routedata.values["Auth"] asAuthInfo; if(AuthInfo = =NULL) return "Invalid acceptance Information"; Else return string. Format ("hello: {0}, successful data acquisition", Authinfo.username); } }Front-end siteTo this, the API
Asp. Net Core project practices-permission management system (0) out of nothing, core permission management system
0 Asp. Net Core: permission management system (0)
1 Asp. Net Core project practice-permission management system (1) Use AdminLTE to build a front-end
2 Asp. Net
Python calls Sina Weibo API project practices, pythonapi
I recently came into use to call the Sina Weibo open interface, so I would like to try using python to call the Weibo API.
SDK: http://open.weibo.com/wiki/SDK code is not more than a dozen K, can fully understand.
If you have a Weibo account, you can create an APP and then obtain the app
Vue-based website front-end permission management (frontend and backend separation practices) and vue permission management
As a popular language, Javascript is widely used. It can be seen everywhere from the front-end to the back-end, this technology is also widely used in our project to develop front-end pages such as CMS and other data analysis systems, for th
API test Best Practices-AuthenticationApplicable class: Advanced1. OverviewAuthentication is typically defined as an activity that confirms the identity of a resource, in which the identity of the resource refers to the consumer of the API (or, in other words, the caller). Once a user's authentication has passed, he will be granted access to resources or APIs tha
Self-owned Baidu Map API Key resolution Cooply "Map API not authorized" issue?????Sometimes, when we, will see that Baidu is not authorized to use the Map API, this is because coolpy developers are using their own Baidu open platform key to do the test, and we have coolpy do
: using internal telemarketing for the small and medium-sized enterprise market; combining multiple steps into one event so that the sales process does not exceed three steps; and use web conferencing tools (such as Live Meeting) to work with your website to promote your company and products.
Precise management is the key. Create a sales, marketing, and operation form for your cloud
Use SSH to log on with a key and disable Password Logon practices.
Preface
Whether it's a personal VPS or a server that enterprises allow access to the public network, if the SSH password authentication method for port 22 is enabled, it may also happen frequently when it is cracked by many hackers. Enterprises can use firewalls for restrictions. Common users may also use ports 22, weak passwords, and other
SSH key-based logon and password-disabled logon practices
Preface
Whether it's a personal VPS or a server that enterprises allow access to the public network, if the SSH password authentication method for port 22 is enabled, it may also happen frequently when it is cracked by many hackers. Enterprises can use firewalls for restrictions. Common users may also use ports 22, weak passwords, and other protectio
SSH key-based logon and password-disabled logon practices
Preface
Whether it's a personal VPS or a server that enterprises allow access to the public network, if the SSH password authentication method for port 22 is enabled, it may also happen frequently when it is cracked by many hackers. Enterprises can use firewalls for restrictions. Common users may also use ports 22, weak passwords, and other protecti
When considering subjects such as primary Data Management (MDM) and Master Data Management, it is the only natural way to seek consultations from people who have already experienced or experienced primary Data Management.
However, the best practices of primary data management
Department to participate in the internal and external customer needs of the upstream and downstream line to meet the work, and enhance the understanding and sensitivity of customer requirements. Secondly, sort out and optimize the operation process at the operation level, so as to clearly define delivery requirements and Responsibility organization, and continuously enrich the good practices into the operation specifications and operation guides to
This book is designed to address a problem that plagues the software industry:How to organize software project management to achieve optimal performance and perfect delivery. Author Neil White (PMP, an expert in project management) introduced a new approach: Enterprize organization.This book describes key roles and responsibilities in the projects defined by the
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.