CN109460236A - Program version building and inspection method and system - Google Patents

Program version building and inspection method and system Download PDF

Info

Publication number
CN109460236A
CN109460236A CN201811221216.5A CN201811221216A CN109460236A CN 109460236 A CN109460236 A CN 109460236A CN 201811221216 A CN201811221216 A CN 201811221216A CN 109460236 A CN109460236 A CN 109460236A
Authority
CN
China
Prior art keywords
program
node
version
cryptographic hash
executable code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811221216.5A
Other languages
Chinese (zh)
Other versions
CN109460236B (en
Inventor
曹璐
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN201811221216.5A priority Critical patent/CN109460236B/en
Publication of CN109460236A publication Critical patent/CN109460236A/en
Application granted granted Critical
Publication of CN109460236B publication Critical patent/CN109460236B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/40Transformation of program code
    • G06F8/41Compilation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/70Software maintenance or management
    • G06F8/71Version control; Configuration management

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Stored Programmes (AREA)

Abstract

The invention discloses a kind of buildings of program version and inspection method and system.This method comprises: extracting the source program of program to be processed from version repository according to version sign;Executable code inventory is read in self-configuring file, is analyzed calling dependence of each executable code in executable code inventory in the source program of program to be processed, is formed dependency tiee;Each node in dependency tiee is traversed, the cryptographic Hash of each node is calculated;The source program of program to be processed is compiled into executable code;By the executable code of the cryptographic Hash write-in compiling of dependency tiee top mode;Version building is checked using the cryptographic Hash of dependency tiee top mode.The automatic building and inspection to program version may be implemented in the present invention.

Description

Program version building and inspection method and system
Technical field
The present invention relates to program development techniques field more particularly to a kind of buildings of program version and inspection method and system.
Background technique
In program development process, the building of version is always comparatively laborious, and is easy error.When constructing version, It needs correctly to construct source program to be built and all source programs being called to, could finally construct correctly Executable code.Program version building is carried out under the minicomputers environment such as AIX (Advanced Interactive Xecutive) When, there is presently no the automatic the build tools of available version, and to any given executable code that building is completed, also do not have Method is inferred to whether it has been built up success, and the prior art is mainly according to the executable code size after building, building time Etc. information ancillary staff judge that efficiency is relatively low, and reliability is poor.
Therefore it provides a kind of program version building and inspection method and system are very necessary.
Summary of the invention
The embodiment of the present invention provides a kind of building of program version and inspection method, to realize the automatic building of program version And inspection, this method comprises:
According to version sign, the source program of program to be processed is extracted from version repository;
Executable code inventory is read in self-configuring file, each executable code analyzed in executable code inventory exists Calling dependence in the source program of program to be processed forms dependency tiee;
Each node in dependency tiee is traversed, the cryptographic Hash of each node is calculated;
The source program of program to be processed is compiled into executable code;
By the executable code of the cryptographic Hash write-in compiling of dependency tiee top mode;
Version building is checked using the cryptographic Hash of dependency tiee top mode.
Optionally, after the source program of program to be processed is compiled into executable code, by compiled executable code It is stored in version repository;
Version building result is checked, extracts the source program of program to be processed from version repository again, and calculates weight The cryptographic Hash of the corresponding dependency tiee top mode of the source program newly extracted, if the cryptographic Hash of the dependency tiee top mode Cryptographic Hash corresponding with given executable code any in version repository is consistent, then the executable code has passed through version building inspection It looks into.
Optionally, the method also includes:
It is created according to inspection result and checks inventory, show that version constructs inspection result using inspection inventory.
Optionally, each node in dependency tiee is traversed, the cryptographic Hash of each node is calculated, comprising:
Judge whether node to be processed is dependency tiee bottom node;
If bottom node, then Hash operation is carried out using the source program that the node corresponds to program, calculate the bottom The cryptographic Hash of node;
If the node of the non-bottom, then the node is corresponded to the source program of program and the cryptographic Hash of all nodes of next layer It is combined, then carries out Hash operation, calculate the cryptographic Hash of the node.
Optionally, the source program of program to be processed is compiled into executable code, comprising:
The coded format of program source program is judged;
If GBK format, then the building file for executing GBK format is constructed;
If UTF-8 format, then the building file for executing UTF-8 format is constructed.
The embodiment of the invention also provides a kind of building of program version and system is checked, to realize the automatic of program version Building and inspection, the system include:
Extraction module, for extracting the source program of program to be processed from version repository according to version sign;
Analysis module is analyzed every in executable code inventory for reading executable code inventory in self-configuring file Calling dependence of a executable code in the source program of program to be processed forms dependency tiee;
Node computing module calculates the cryptographic Hash of each node for traversing each node in dependency tiee;
Executable code constructs module, for the source program of program to be processed to be compiled into executable code;
Writing module, the executable code for compiling the cryptographic Hash write-in of dependency tiee top mode;
It checks module, version building is checked for the cryptographic Hash using dependency tiee top mode.
Optionally, the inspection module is further used for:
It will be in compiled executable code deposit version repository;
Again the source program of program to be processed is extracted from version repository, and calculates the corresponding dependence of source program extracted again The cryptographic Hash of relational tree top mode, if any given in the cryptographic Hash and version repository of the dependency tiee top mode hold The corresponding cryptographic Hash of line code is consistent, then the executable code has passed through version building and checked.
Optionally, the system further include:
Display module checks inventory for creating according to inspection result, shows that version building checks knot using inspection inventory Fruit.
Optionally, the node computing module is further used for:
Judge whether node to be processed is dependency tiee bottom node;
If bottom node, then Hash operation is carried out using the source program that the node corresponds to program, calculate the bottom The cryptographic Hash of node;
If the node of the non-bottom, then the node is corresponded to the source program of program and the cryptographic Hash of all nodes of next layer It is combined, then carries out Hash operation, calculate the cryptographic Hash of the node.
Optionally, the executable code building module is further used for:
The coded format of program source program is judged;
If GBK format, then the building file for executing GBK format is constructed;
If UTF-8 format, then the building file for executing UTF-8 format is constructed.
The embodiment of the present invention also provides a kind of computer equipment, including memory, processor and storage are on a memory simultaneously The computer program that can be run on a processor, the processor realize the above method when executing the computer program.
The embodiment of the present invention also provides a kind of computer readable storage medium, and the computer-readable recording medium storage has Execute the computer program of the above method.
In the embodiment of the present invention, by reading executable code inventory in self-configuring file, executable code inventory is analyzed In calling dependence of each executable code in the source program of program to be processed, form dependency tiee;Traversal according to Rely each node on relational tree, calculates the cryptographic Hash of each node;The source program of program to be processed is compiled into executable generation Code;And the cryptographic Hash of dependency tiee top mode is adhered to the executable code of write-in compiling, while utilizing dependency tiee The cryptographic Hash of top mode checks version building, realizes the automatic building and inspection to program version.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with It obtains other drawings based on these drawings.In the accompanying drawings:
Fig. 1 is the flow diagram of program version building and inspection method in the embodiment of the present invention;
Fig. 2 is the schematic diagram of program version building and inspection system in the embodiment of the present invention;
Fig. 3 is a specific example figure of program version building and inspection system in the embodiment of the present invention;
Fig. 4 is a specific example figure of program version building and inspection method in the embodiment of the present invention.
Specific embodiment
Understand in order to make the object, technical scheme and advantages of the embodiment of the invention clearer, with reference to the accompanying drawing to this hair Bright embodiment is described in further details.Here, the illustrative embodiments of the present invention and their descriptions are used to explain the present invention, but simultaneously It is not as a limitation of the invention.
Below to the present invention relates to noun explain:
" cryptographic Hash ": by Hash operation the data conversion of random length at regular length data.
" Hash operation ": the process of cryptographic Hash is calculated by hash function.
The embodiment of the invention provides a kind of building of program version and inspection methods, as shown in Fig. 1, this method comprises:
Step 101, according to version sign, the source program of program to be processed is extracted from version repository.
Executable code inventory is read in step 102, self-configuring file, each of analysis executable code inventory can be held Calling dependence of the line code in the source program of program to be processed forms dependency tiee.
Each node in step 103, traversal dependency tiee, calculates the cryptographic Hash of each node.
The source program of program to be processed is compiled into executable code by step 104.
Step 105, the executable code for compiling the cryptographic Hash write-in of dependency tiee top mode.
Step 106 checks version building using the cryptographic Hash of dependency tiee top mode.
The process as shown in attached drawing 1 is it is known that in embodiments of the present invention, can be performed generation by reading in self-configuring file Code inventory analyzes calling of each executable code in executable code inventory in the source program of program to be processed and relies on pass System forms dependency tiee;Each node in dependency tiee is traversed, the cryptographic Hash of each node is calculated;By journey to be processed The source program of sequence is compiled into executable code;And the cryptographic Hash of dependency tiee top mode is adhered into the executable of write-in compiling Code, while version building is checked using the cryptographic Hash of dependency tiee top mode, it realizes to program version Automatic building and inspection.
Wherein, each node traversed in dependency tiee refers to accessing each node from bottom to top.
In order to smoothly check its correctness after compiled executable code, the Hash of dependency tiee top mode is utilized Value checks program version building, comprising:
It will be in compiled executable code deposit version repository;
Again the source program of program to be processed is extracted from version repository, and calculates the corresponding dependence of source program extracted again The cryptographic Hash of relational tree top mode, if any given in the cryptographic Hash and version repository of the dependency tiee top mode hold The corresponding cryptographic Hash of line code is consistent, then the executable code has passed through version building and checked.
In order to clearly show that the inspection result of version building, the building of described program version and inspection method are also wrapped to user It includes:
It is created according to inspection result and checks inventory, show that version constructs inspection result using inspection inventory.
In embodiments of the present invention, each node in dependency tiee is traversed, the cryptographic Hash of each node is calculated, is wrapped It includes:
Judge whether node to be processed is dependency tiee bottom node;
If bottom node, then Hash operation is carried out using the source program that the node corresponds to program, calculate the bottom The cryptographic Hash of node;
If the node of the non-bottom, then the node is corresponded to the source program of program and the cryptographic Hash of all nodes of next layer It is combined, then carries out Hash operation, calculate the cryptographic Hash of the node.
Specifically, the cryptographic Hash for calculating each node in dependency tiee is step by step calculation from bottom to top, when wait count When the non-bottom node of the node of calculation, then the cryptographic Hash of the source program and all nodes of next layer that are corresponded to program always carries out Combination, then Hash operation is carried out, the cryptographic Hash of the node is calculated, is so recycled, until calculating dependency tiee top layer section The cryptographic Hash of point.
In order to be well on building for different formats to program version, the source program of program to be processed is compiled into can Execute code, comprising:
The coded format of program source program is judged;
If GBK format, then the building file for executing GBK format is constructed;
If UTF-8 format, then the building file for executing UTF-8 format is constructed.
Wherein, (GBK is the first character of " national standard ", " extension " Chinese phonetic alphabet to GBK full name " Chinese Internal Code Specification " Mother, English name: Chinese Internal Code Specification).UTF-8(Unicode Transformation It Format) is a kind of variable length character coding for Unicode, also known as Unicode.
In addition, the specific example of the embodiment of the present invention can be found in attached drawing 4.
Based on the same inventive concept, a kind of building of program version is additionally provided in the embodiment of the present invention and checks system, such as Described in the following examples.Since program version constructs and check the principle that system solves the problems, such as and program version building and checks Method is similar, and therefore, program version constructs and check that the implementation of system may refer to the reality of program version building and inspection method It applies, overlaps will not be repeated.Used below, the software of predetermined function may be implemented in term " unit " or " module " And/or the combination of hardware.Although system described in following embodiment is preferably realized with software, hardware or soft The realization of the combination of part and hardware is also that may and be contemplated.
The embodiment of the invention provides a kind of building of program version and check system, as shown in Fig. 2, which includes:
Extraction module 201, for extracting the source program of program to be processed from version repository according to version sign;
Analysis module 202 is analyzed in executable code inventory for reading executable code inventory in self-configuring file Calling dependence of each executable code in the source program of program to be processed forms dependency tiee;
Node computing module 203 calculates the cryptographic Hash of each node for traversing each node in dependency tiee;
Executable code constructs module 204, for the source program of program to be processed to be compiled into executable code;
Writing module 205, the executable code for compiling the cryptographic Hash write-in of dependency tiee top mode.
It checks module 206, version building is checked for the cryptographic Hash using dependency tiee top mode.
In embodiments of the present invention, check that module 206 is further used for:
It will be in compiled executable code deposit version repository;
Again the source program of program to be processed is extracted from version repository, and calculates the corresponding dependence of source program extracted again The cryptographic Hash of relational tree top mode, if any given in the cryptographic Hash and version repository of the dependency tiee top mode hold The corresponding cryptographic Hash of line code is consistent, then the executable code has passed through version building and checked.
As shown in Fig. 3, the system further include:
Display module 207 checks inventory for creating according to inspection result, shows that version building checks using inspection inventory As a result.
In one embodiment, the node computing module 203 is further used for:
Judge whether node to be processed is dependency tiee bottom node;
If bottom node, then Hash operation is carried out using the source program that the node corresponds to program, calculate the bottom The cryptographic Hash of node;
If the node of the non-bottom, then the node is corresponded to the source program of program and the cryptographic Hash of all nodes of next layer It is combined, then carries out Hash operation, calculate the cryptographic Hash of the node.
In one embodiment, the executable code building module 204 is further used for:
The coded format of program source program is judged;
If GBK format, then the building file for executing GBK format is constructed;
If UTF-8 format, then the building file for executing UTF-8 format is constructed.
The embodiment of the invention also provides a kind of computer equipments, including memory, processor and storage are on a memory And the computer program that can be run on a processor, the processor realize the above method when executing the computer program.
The embodiment of the invention also provides a kind of computer readable storage medium, the computer-readable recording medium storage There is the computer program for executing the above method.
In the embodiment of the present invention, executable code inventory is read in self-configuring file, is analyzed in executable code inventory Calling dependence of each executable code in the source program of program to be processed forms dependency tiee;Traversal, which relies on, closes Each node on system tree, calculates the cryptographic Hash of each node;The source program of program to be processed is compiled into executable code;And By the executable code of the cryptographic Hash attachment write-in compiling of dependency tiee top mode, the automatic structure to program version is realized It builds.
In embodiment, by checking any given executable code, it is ensured that the correctness of version building, It improves version building and checks efficiency.Inventory is checked by being formed after checking, inspection result can be checked in order to user.
It should be understood by those skilled in the art that, the embodiment of the present invention can provide as method, system or computer program Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the present invention Apply the form of example.Moreover, it wherein includes the computer of computer usable program code that the present invention, which can be used in one or more, The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) produces The form of product.
The present invention be referring to according to the method for the embodiment of the present invention, the process of equipment (system) and computer program product Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real The system for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates, Enable the manufacture of system, the instruction system realize in one box of one or more flows of the flowchart and/or block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one The step of function of being specified in a box or multiple boxes.
Particular embodiments described above has carried out further in detail the purpose of the present invention, technical scheme and beneficial effects Describe in detail it is bright, it should be understood that the above is only a specific embodiment of the present invention, the guarantor being not intended to limit the present invention Range is protected, all within the spirits and principles of the present invention, any modification, equivalent substitution, improvement and etc. done should be included in this Within the protection scope of invention.

Claims (12)

1. a kind of program version building and inspection method characterized by comprising
According to version sign, the source program of program to be processed is extracted from version repository;
Executable code inventory is read in self-configuring file, analyzes each executable code in executable code inventory wait locate The calling dependence in the source program of program is managed, dependency tiee is formed;
Each node in dependency tiee is traversed, the cryptographic Hash of each node is calculated;
The source program of program to be processed is compiled into executable code;
By the executable code of the cryptographic Hash write-in compiling of dependency tiee top mode;
Version building is checked using the cryptographic Hash of dependency tiee top mode.
2. the method as described in claim 1, which is characterized in that using the cryptographic Hash of dependency tiee top mode to program version This building is checked, comprising:
It will be in compiled executable code deposit version repository;
Again the source program of program to be processed is extracted from version repository, and calculates the corresponding dependence of source program extracted again The cryptographic Hash of treetop node layer, if any given executable generation in the cryptographic Hash and version repository of the dependency tiee top mode The corresponding cryptographic Hash of code is consistent, then the executable code has passed through version building and checked.
3. the method as described in claim 1, which is characterized in that the method also includes:
It is created according to inspection result and checks inventory, show that version constructs inspection result using inspection inventory.
4. the method as described in claim 1, which is characterized in that each node in traversal dependency tiee calculates each section The cryptographic Hash of point, comprising:
Judge whether node to be processed is dependency tiee bottom node;
If bottom node, then Hash operation is carried out using the source program that the node corresponds to program, calculate bottom node Cryptographic Hash;
If the node of the non-bottom, then the cryptographic Hash of source program and all nodes of next layer that the node corresponds to program is carried out Combination, then Hash operation is carried out, calculate the cryptographic Hash of the node.
5. the method as described in claim 1, which is characterized in that the source program of program to be processed is compiled into executable code, Include:
The coded format of program source program is judged;
If GBK format, then the building file for executing GBK format is constructed;
If UTF-8 format, then the building file for executing UTF-8 format is constructed.
6. a kind of program version building and inspection system characterized by comprising
Extraction module, for extracting the source program of program to be processed from version repository according to version sign;
Analysis module, for reading executable code inventory in self-configuring file, each of analysis executable code inventory can Calling dependence of the code in the source program of program to be processed is executed, dependency tiee is formed;
Node computing module calculates the cryptographic Hash of each node for traversing each node in dependency tiee;
Executable code constructs module, for the source program of program to be processed to be compiled into executable code;
Writing module, the executable code for compiling the cryptographic Hash write-in of dependency tiee top mode;
It checks module, version building is checked for the cryptographic Hash using dependency tiee top mode.
7. system as claimed in claim 6, which is characterized in that the inspection module is further used for:
It will be in compiled executable code deposit version repository;
Again the source program of program to be processed is extracted from version repository, and calculates the corresponding dependence of source program extracted again The cryptographic Hash of treetop node layer, if any given executable generation in the cryptographic Hash and version repository of the dependency tiee top mode The corresponding cryptographic Hash of code is consistent, then the executable code has passed through version building and checked.
8. system as claimed in claim 6, which is characterized in that further include:
Display module checks inventory for creating according to inspection result, shows that version constructs inspection result using inspection inventory.
9. system as claimed in claim 6, which is characterized in that the node computing module is further used for:
Judge whether node to be processed is dependency tiee bottom node;
If bottom node, then Hash operation is carried out using the source program that the node corresponds to program, calculate bottom node Cryptographic Hash;
If the node of the non-bottom, then the cryptographic Hash of source program and all nodes of next layer that the node corresponds to program is carried out Combination, then Hash operation is carried out, calculate the cryptographic Hash of the node.
10. system as claimed in claim 6, which is characterized in that the executable code building module is further used for:
The coded format of program source program is judged;
If GBK format, then the building file for executing GBK format is constructed;
If UTF-8 format, then the building file for executing UTF-8 format is constructed.
11. a kind of computer equipment including memory, processor and stores the meter that can be run on a memory and on a processor Calculation machine program, which is characterized in that the processor realizes any side of claim 1 to 5 when executing the computer program Method.
12. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage has perform claim It is required that the computer program of 1 to 5 any the method.
CN201811221216.5A 2018-10-19 2018-10-19 Program version construction and checking method and system Active CN109460236B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811221216.5A CN109460236B (en) 2018-10-19 2018-10-19 Program version construction and checking method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811221216.5A CN109460236B (en) 2018-10-19 2018-10-19 Program version construction and checking method and system

Publications (2)

Publication Number Publication Date
CN109460236A true CN109460236A (en) 2019-03-12
CN109460236B CN109460236B (en) 2021-12-07

Family

ID=65607911

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811221216.5A Active CN109460236B (en) 2018-10-19 2018-10-19 Program version construction and checking method and system

Country Status (1)

Country Link
CN (1) CN109460236B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111367563A (en) * 2020-03-06 2020-07-03 中国银行股份有限公司 Host version merging method and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170372068A1 (en) * 2015-02-26 2017-12-28 Alpha Mice Ltd. Method to identify known compilers functions, libraries and objects inside files and data items containing an executable code
CN108363580A (en) * 2018-03-12 2018-08-03 平安普惠企业管理有限公司 Application program installation method, device, computer equipment and storage medium
CN108595186A (en) * 2018-03-27 2018-09-28 天津麒麟信息技术有限公司 Multiversion software management method based on total function on a kind of platform of soaring

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170372068A1 (en) * 2015-02-26 2017-12-28 Alpha Mice Ltd. Method to identify known compilers functions, libraries and objects inside files and data items containing an executable code
CN108363580A (en) * 2018-03-12 2018-08-03 平安普惠企业管理有限公司 Application program installation method, device, computer equipment and storage medium
CN108595186A (en) * 2018-03-27 2018-09-28 天津麒麟信息技术有限公司 Multiversion software management method based on total function on a kind of platform of soaring

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111367563A (en) * 2020-03-06 2020-07-03 中国银行股份有限公司 Host version merging method and device
CN111367563B (en) * 2020-03-06 2024-02-23 中国银行股份有限公司 Host version merging method and device

Also Published As

Publication number Publication date
CN109460236B (en) 2021-12-07

Similar Documents

Publication Publication Date Title
US9146712B2 (en) Extensible code auto-fix framework based on XML query languages
CN105446725B (en) Method and system for Mode-driven architecture
CN105335412A (en) Method and device for data conversion and data migration
US9552348B2 (en) System and method for operating a computer application with spreadsheet functionality
US20210157553A1 (en) Source code auto-suggestion based on structural and semantic features
US20160321218A1 (en) System and method for transforming image information for a target system interface
US20170054790A1 (en) System and Method for Object Compression and State Synchronization
CN110134604A (en) A kind of unit or interface test method, device and computer equipment without code
CN107797805B (en) Code packaging method and device and computer readable storage medium
CN106293687B (en) A kind of control method and device being packaged process
US8516457B2 (en) Method, system and program storage device that provide for automatic programming language grammar partitioning
CN114077430A (en) Interface generation method and device, electronic equipment and storage medium
US10387288B2 (en) Interactive analysis of a security specification
US9576085B2 (en) Selective importance sampling
CN112486490B (en) Front-end code packaging method and device, electronic equipment and storage medium
CN112199261A (en) Application program performance analysis method and device and electronic equipment
CN109460236A (en) Program version building and inspection method and system
CN111124541B (en) Configuration file generation method, device, equipment and medium
US20150088482A1 (en) Simulated component connector definition and connection process
CN109359055A (en) A kind of method and apparatus of data test
CN111539200B (en) Method, device, medium and electronic equipment for generating rich text
CN114398282A (en) Test script generation method, device, equipment and storage medium
CN114791885A (en) Interface test method, device, equipment and medium
EP3834080B1 (en) Static reconcilliation of application view hierarchies
CN112652039A (en) Animation segmentation data acquisition method, segmentation method, device, equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant