Author|vivo official website mall development team - Zhou Longjian 1. BackgroundWith the continuous expansion of O2O online and offline businesses, e-commerce platforms are also gradually improving product functions related to the transaction side. In the latest demand version, the business side has planned the logic of pickup code generation and order verification to further improve the user experience, so that online users can pick up the goods in the store or arrange for shopping guide delivery after paying. In daily life, most of our experience with functions such as pickup codes and verification comes from: picking up tickets before watching a movie, showing coupon codes after eating, picking up packages at express lockers, etc. They all have some similar characteristics, such as:
The pickup code is very simple to use, but like an "iceberg", it requires rigorous design and meticulous logic hidden under the simple appearance. It can be said that it is small but complete. The design introduced in this article is also quite interesting, and according to this idea, it can realize the generation of most verification voucher codes on the market, and it can also meet the SaaS of the business. It is a relatively common capability. Here I share the whole design with you. 2. Single-table business of simple systemIf the business volume is small, the store traffic is relatively small, and the platform scale has not been formed, such as a system for individual operators. Then the implementation of the pickup code or coupon code is relatively simple. Just share a large horizontal table with the order or use an extended table to associate with the order. There is no need to do excessive design at this stage. The design of the table is as follows: However, it should be noted that the order number is generally long, usually in the 10s or 20s (of course, there are shorter order numbers. If the order number is shorter, the pickup code can also use the order number). Let's assume that the order number is 18 digits and the pickup code is 8 digits, that is, the value range of the order number is much larger than the pickup code. Then, within the life cycle of the order number, there is a high probability that the pickup code will be repeated. The solution is relatively simple. We only need to ensure that under any conditions, the unverified digital code is not repeated, that is, the verified digital code can be recycled. Then the generation logic of the pickup code is very clear. The following pseudo code simulates the actual implementation logic: Pseudocode implementation for (;;) { *Note: Step 2 and step 4 are not atomic operations, and there are concurrency issues. In actual applications, it is best to use distributed locks to lock the operations. 3. Database and table sharding services for complex platformsThrough the simple single-table design, we can get a glimpse of the general implementation logic of the pickup code. However, when we implement a simple solution on a large project, we need to consider many aspects and the design needs to be more sophisticated. The SaaS e-commerce platform is much more complicated than a simple single-table business, and the key points are:
3.1 Detailed designThe design of the pickup code table recommends using a database and table sharding strategy that is consistent with the order. The benefits are:
When considering the implementation, the first point of discussion we encountered was whether the pickup code should be "store-unique" or "globally unique"? 3.2 Store-only solutionAt first, we considered using a logic similar to the restaurant pickup code to ensure that the pickup code remains unique in each store. Similar to the interaction shown in the following figure, user A and user B hold the same pickup code. Users A and B go to their corresponding stores to complete the verification, and the entire transaction process is over. However, this requires ensuring that users A and B can correctly complete the verification at the stores to which their orders belong. Obviously, this solution is risky! In the case shown in the figure below, users A and B can also cancel orders normally, but the orders are mixed up, and the order originally belonging to user A is cancelled by user B. The fundamental reason for this problem is that the pure digital code cannot carry the user's identity. Although it can be avoided by manually verifying the identity before cancellation, it is still a high-risk system design, so the store-only solution is not advisable! 3.3 Globally unique solutionThe global unique solution has low risk, but is slightly more difficult to implement. The core issue is how to determine whether the randomly generated pickup code is globally unique. Of course, if the system itself relies on storage media such as ES, you can query ES before inserting it, but querying and writing ES is a bit heavy for real-time interfaces, and it is not as direct as directly querying the library table. Suppose a business party is divided into 4 libraries and 4 tables, a total of 16 tables, and the length of the pickup code is determined to be 8 digits. How to query and ensure global uniqueness in Mysql with multiple libraries and tables? Traversing the table is definitely not advisable! To solve the above questions, we can do something about the arrangement of the pickup code during design. The following steps are explained in detail: Step 1: The 8-digit pickup code can be divided into two areas, "random code area" + "warehouse table location", as shown in the following figure: Step 2: The random code area will not be introduced for now. Let's take a look at how the 2-bit library table is mapped to 16 tables consisting of 4 libraries and 4 tables. There are also two solutions here: [Solution 1] You can choose the first digit of the 2-digit library table as the library number and the last digit as the table number. The advantage is that the mapping is simpler, but the capacity is not large enough. If the number of libraries or tables is greater than 9, expansion will be a bit troublesome. As shown in the figure below, we logically map the last "12" to "table number 2 in library 1"; [Solution 2] Convert the two-dimensional structure of 4 libraries and 4 tables into one dimension, and increment it with 0 as the initial value, (0 library, 0 table) → 00, (0 library, 1 table) → 01..., (3 libraries, 3 tables) → 15. The advantage is that the capacity is larger, supporting up to 99 tables, and is not limited by the library or table condition. The disadvantage is that the mapping logic is more difficult to write, but this is not a problem. After a simple arrangement of the pickup code, we completed the mapping logic of the pickup code to the database table, solving the problem of accessing the pickup code. In fact, if you think about it carefully, the problem of global uniqueness has also been solved. We only need to ensure that the first 6 random codes are unique in a single table. In theory, the range of supported records in a single table in the unwritten-off state is: 000000 ~ 999999, and the capacity is sufficient. The key is that we have simplified the query of multiple databases and tables to only run one SQL, which greatly improves efficiency. 3.4 Problems encountered in implementing the solutionSince this article introduces a complete SaaS solution, you will encounter some problems when implementing it. Here are three typical problems encountered in practice and some solutions: [Question 1] The 6-digit random code generated by Math.random() is the same as the one in the table. How to deal with it? [Solution] In fact, there are two types of duplication:
The occurrence of these two situations requires us to retry gracefully! The general idea is as follows in pseudo code: // step1 Get the database and table ID according to the database and table partitioning factors, userCode-user ID, tenantId-tenant ID 【Notice】
[Question 2] How to dynamically modify the data source when using sharding components (such as ShardingSphere-JDBC) in the project? That is, to support sharding factors (such as member_id, open_id, etc.) and dynamic query of the database table calculated based on the pickup code. [Solution] We use ShardingSphere-JDBC as an example to give some configurations and pseudocodes. For details, please refer to: "Forced Routing:: ShardingSphere". Other open source sharding components or self-developed products will not be described in detail. You can write a plug-in manually. Don't be afraid. No matter how difficult it is, you must believe in light! Configuration and pseudo code // ShardingSphere-JDBC depends on the configuration file jdbc-sharding.yaml 【Notice】
[Question 3] How to achieve stronger scalability and be applicable to SaaS platforms and different business scenarios? [Solution] Careful friends should have noticed the "tenantId" field, which is a tenant code, which will be transparently transmitted in the actual code. We can use this field to make different configurations for different tenants (or business parties), such as: the length of the pickup code, the way the pickup code is arranged, the strategy for mapping the pickup code to the database table location, etc., as long as the main logic is further abstracted and the strategy mode is used for personalized coding. IV. ConclusionWhen implementing the pickup code logic, I found that there were relatively few solutions and technical articles for online coupon codes. At that time, I had the idea of writing an article to share my experience. In fact, I believe that most companies may do the same thing to a certain extent, and even if they adopt other solutions, they can achieve the same result. This article as a whole only introduces an idea, and this idea is similar to a simplified version of order sub-library and sub-table, but this is the magic. In fact, we can also implement some commonly used technical solutions in different application scenarios, make some bold attempts, and take more paths that have never been imagined! |
<<: Is iOS 16 worth upgrading? Here’s a sneak peek at the main features of the official version
>>: WeChat keyboard protects personal privacy: it just takes up too much storage space on your phone
Today we solve a problem: "Weight loss is so...
1. Introduction to Wenchang Tower Wenchang Pagoda...
2021 Douyin no source of goods practical operatio...
Let me share how I would write a community plan ....
Nowadays, due to the increasing bidding costs, ma...
What is the difference between 2B products and 2C...
In recent exchanges with some readers, I have dis...
This article will talk about "How to build I...
Mini programs provide convenience for publicity a...
Five years ago, Ye Chen was thrown into the river...
Starting from January 30, the Dark Horse Universi...
The hottest trend in 2020 is undoubtedly live str...
Android Binder is one of the most core IPC (inter...
How to define "SEO thinking" Generally ...
If today's children choose their own "mo...