CN109582291A - Develop environment control method, device, computer equipment and storage medium - Google Patents
Develop environment control method, device, computer equipment and storage medium Download PDFInfo
- Publication number
- CN109582291A CN109582291A CN201811204580.0A CN201811204580A CN109582291A CN 109582291 A CN109582291 A CN 109582291A CN 201811204580 A CN201811204580 A CN 201811204580A CN 109582291 A CN109582291 A CN 109582291A
- Authority
- CN
- China
- Prior art keywords
- exploitation
- data
- environment
- user
- client
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 53
- 230000007613 environmental effect Effects 0.000 claims abstract description 16
- 238000011161 development Methods 0.000 claims description 23
- 238000004458 analytical method Methods 0.000 claims description 16
- 230000004048 modification Effects 0.000 claims description 16
- 238000012986 modification Methods 0.000 claims description 16
- 235000015110 jellies Nutrition 0.000 claims description 11
- 239000008274 jelly Substances 0.000 claims description 11
- 238000012545 processing Methods 0.000 claims description 7
- 238000012512 characterization method Methods 0.000 claims description 4
- 230000006854 communication Effects 0.000 description 10
- 238000004891 communication Methods 0.000 description 10
- 230000006870 function Effects 0.000 description 9
- 230000008569 process Effects 0.000 description 8
- 238000010586 diagram Methods 0.000 description 4
- 230000006399 behavior Effects 0.000 description 2
- 230000008901 benefit Effects 0.000 description 2
- 230000008878 coupling Effects 0.000 description 2
- 238000010168 coupling process Methods 0.000 description 2
- 238000005859 coupling reaction Methods 0.000 description 2
- 238000009434 installation Methods 0.000 description 2
- 230000010354 integration Effects 0.000 description 2
- 238000012423 maintenance Methods 0.000 description 2
- 238000004321 preservation Methods 0.000 description 2
- 241000208340 Araliaceae Species 0.000 description 1
- 235000005035 Panax pseudoginseng ssp. pseudoginseng Nutrition 0.000 description 1
- 235000003140 Panax quinquefolius Nutrition 0.000 description 1
- 230000002159 abnormal effect Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000007175 bidirectional communication Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 238000005314 correlation function Methods 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000003920 environmental process Methods 0.000 description 1
- 238000000605 extraction Methods 0.000 description 1
- 239000004744 fabric Substances 0.000 description 1
- 235000008434 ginseng Nutrition 0.000 description 1
- 230000007257 malfunction Effects 0.000 description 1
- 230000002688 persistence Effects 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
- 230000008439 repair process Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/20—Software design
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3438—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment monitoring of user actions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Quality & Reliability (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of exploitation environment control method, device, computer equipment and storage mediums, comprising: server end obtains the access instruction of the client user in the same local area network;Access instruction includes the user account information for logging in client, operational order and the target developing environmental information for being stored in server end;The exploitation environment for judging the user right of identity attribute information representation according to preset authentication rules, whether capable of issuing operational order and being characterized using exploitation environmental information;When user right can issue operational order and use exploitation environment, the access interface of target developing environment is sent in client by server according to identity attribute information, so that user uses target developing environment in client.By the way of local area network, exploitation environment and developing instrument are built in server end, is accessed by client, the time built exploitation environment and configure developing instrument is saved, it is more convenient, it is convenient, working efficiency is provided.
Description
Technical field
The present invention relates to software systems technical fields, specifically, the present invention relates to exploitation environment control method, device,
Computer equipment and storage medium.
Background technique
The configuration for developing environment is a kind of than relatively time-consuming process, while in configuration exploitation environmental process, different times
The version of developing instrument may disunity, if in a project team develop environment disunity, to later development work
It will cause many hidden danger.
Therefore, in the prior art, the people of usually unified project team needs unitized overall development environment, and on respective computer
It builds these exploitation environment and these exploitation softwares is installed.A series of developing instruments, such as Java developing instrument are installed
Eclipse, Andriod studio etc. is sometimes also needed to build local data base etc., be had a problem in that so each
A developer requires to install one time referring to handbook, if encountering replacement machine, it is also desirable to reinstall, encounter windows
When with the machines of the different operating systems such as mac even linux, it is also necessary to which the tool of different operating system is supported in installation, is done
Many duplicate work.
Summary of the invention
The purpose of the present invention is intended at least can solve above-mentioned one of technological deficiency, especially a kind of opening based on local area network
Environment control method is sent out, without the configuration exploitation environment on local client and installation exploitation software, user is facilitated to carry out program
Exploitation also facilitates and develops summarizing for data in different clients.
The invention discloses a kind of exploitation environment control methods, comprising:
Server end obtains the access instruction of the client user in the same local area network;The access instruction includes logging in
User account information, operational order and the target developing environmental information for being stored in server end of client;
According to preset authentication rules judge the user right of the identity attribute information representation, whether can issue it is described
Operational order and the exploitation environment characterized using the exploitation environmental information;
When the user right can issue the operational order and use the exploitation environment, the server root
The access interface of the target developing environment is sent in the client according to the identity attribute information, so that user is in institute
It states client and uses the target developing environment.
Optionally, the authentication rules include the first permission, and first permission is to pass through the client with LAN connection
The permission for the user account information access exploitation environment that end logs in, the range of first permission includes checking permission, the power of amendment
Limit and/or analysis permission.
Optionally, the authentication rules further include the second permission, and second permission is to pass through the visitor with LAN connection
The permission for the exploitation software in user account information access exploitation environment that family end logs in, second extent of competence includes using
Permission checks permission, modification authority and/or analysis permission.
It optionally, further include the exploitation data saved according to operational order in the exploitation software, the exploitation data
Store method includes:
After performing the operational order of upload, the exploitation data are stored in first database;
Otherwise, the exploitation data are stored in the second database, wherein the first database and the second database phase
It is mutually independent.
Optionally, further include that the exploitation data in the first database are handled, handle the exploitation data
Method includes:
Identify the Table Header information of the exploitation data;
Location information of the exploitation data in destination document is obtained according to Table Header information, the destination document is storage
There is the document for the code data that is mutually related with the exploitation data;
The exploitation data are directed into destination document according to the positional information and are summarized.
It optionally, further include reporting an error to the exploitation data, the server end is stored with rule base, opens described
Sending out the method that data report an error includes:
Identify the first parameter information of the exploitation data, first parameter information includes data type;
According to the development rule progress for the exploitation data for being mapped with the type in the data type and the rule base
Match;
It is unsuccessful when matching, data error reporting is carried out to the data for not meeting development rule.
It optionally, further include that the exploitation data are counted, the method for the statistics exploitation data includes:
It is obtained according to time shaft and performs the second parameter information of upload operation instruction, second parameter information includes visitor
The user account information at family end and its accuracy for uploading exploitation data;
User job efficiency is carried out according to the user account information of different clients and its accuracy for uploading exploitation data
Statistics and accuracy ranking.
Invention additionally discloses a kind of exploitation environment control units, comprising:
It obtains module: being configured as execute server end and obtain the access of the client user in the same local area network referring to
It enables;The access instruction includes the user account information for logging in client, operational order and is stored in the target of server end and opens
Send out environmental information;
Processing module: it is configured as executing the user for judging the identity attribute information representation according to preset authentication rules
Whether permission can issue the operational order and the exploitation environment using the exploitation environmental information characterization;
Execution module: it is configured as executing when the user right can issue the operational order and open using described
When hair ring border, the access interface of the target developing environment is sent to described by the server according to the identity attribute information
In client, so that user uses the target developing environment in the client.
Optionally, the authentication rules include the first permission, and first permission is to pass through the client with LAN connection
The permission for the user account information access exploitation environment that end logs in, the range of first permission includes checking permission, the power of amendment
Limit and/or analysis permission.
Optionally, the authentication rules further include the second permission, and second permission is to pass through the visitor with LAN connection
The permission for the exploitation software in user account information access exploitation environment that family end logs in, second extent of competence includes using
Permission checks permission, modification authority and/or analysis permission.
Optionally, further includes:
First memory module: it is configured as executing after performing the operational order of upload, the exploitation data are stored in
In first database;
Second memory module: it is configured as the exploitation data for being not carried out upload operation instruction being stored in the second database
In, wherein the first database and the second database are mutually indepedent.
Optionally, further includes:
First identification module: it is configured as executing the Table Header information of the identification exploitation data;
Second acquisition module: it is configured as executing position of the exploitation data in destination document is obtained according to Table Header information
Confidence breath;The destination document is the document for being stored with the code data that is mutually related with the exploitation data;
Summarizing module: it is configured as that the exploitation data being directed into destination document according to the positional information and converges
Always.
Optionally, further includes:
Second identification module: it is configured as identifying the first parameter information of the exploitation data, first parameter information
Including data type;
Matching module: it is configured as executing the exploitation according to the type is mapped in the data type and the rule base
The development rule of data is matched;
Report an error module: being configured as executing when matching is unsuccessful, to the data progress data error reporting for not meeting development rule.
Optionally, further includes:
Third obtains module: being configured as executing and believe according to the second parameter that time shaft acquisition performs upload operation instruction
Breath, second parameter information include the user account information of client and its accuracy for uploading exploitation data;
Second processing module: it is configured as executing the user account information according to different clients and its uploads exploitation data
Accuracy carry out user job Efficiency Statistics and accuracy ranking.
Invention additionally discloses a kind of computer equipment, including memory and processor, calculating is stored in the memory
Machine readable instruction, when the computer-readable instruction is executed by the processor, so that the processor executes any of the above-described
The step of described exploitation environment control method.
Invention additionally discloses a kind of storage mediums for being stored with computer-readable instruction, which is characterized in that the computer
When readable instruction is executed by one or more processors, opened described in above-mentioned any one so that one or more processors execute
The step of sending out environment control method.
The beneficial effects of the present invention are:
1) by the way of local area network, exploitation environment is built in server end, and configure multiple developing instruments, by client
It accesses, saves user and build exploitation environment on local terminal and configure the time of developing instrument, and without considering more
The problem of good computer terminal needs to build exploitation environment again, or local data is lost, it is more convenient, it is convenient;
2) setting has permission, although sharing a developing instrument and exploitation environment, and respectively independent, and is provided with correlative weight
It limits and using rule, can only upload to download easily, and the confidentiality of program is stronger;
3) by obtaining the historical operating data on different developing instruments, to be monitored to development process, and it is fast
Speed analyzes the problem in development process, improves development efficiency.The history number of each developing instrument can also be passed through simultaneously
According to the Programming's quality and working efficiency of assessment process person.
The additional aspect of the present invention and advantage will be set forth in part in the description, these will become from the following description
Obviously, or practice through the invention is recognized.
Detailed description of the invention
Above-mentioned and/or additional aspect and advantage of the invention will become from the following description of the accompanying drawings of embodiments
Obviously and it is readily appreciated that, in which:
Fig. 1 is the flow chart of present invention exploitation environment control method;
Fig. 2 is the flow chart of the store method of present invention exploitation data;
Fig. 3 is the flow chart of the method for present invention processing exploitation data;
Fig. 4 is the flow chart for the method that present invention exploitation data report an error;
Fig. 5 is the flow chart of the specific method of the working efficiency of the invention counted and accuracy;
Fig. 6 is present invention exploitation environment control unit module diagram;
Fig. 7 is computer equipment basic structure block diagram of the present invention.
Specific embodiment
The embodiment of the present invention is described below in detail, examples of the embodiments are shown in the accompanying drawings, wherein from beginning to end
Same or similar label indicates same or similar element or element with the same or similar functions.Below with reference to attached
The embodiment of figure description is exemplary, and for explaining only the invention, and is not construed as limiting the claims.
Those skilled in the art of the present technique are appreciated that unless expressly stated, singular " one " used herein, " one
It is a ", " described " and "the" may also comprise plural form.It is to be further understood that being arranged used in specification of the invention
Diction " comprising " refer to that there are the feature, integer, step, operation, element and/or component, but it is not excluded that in the presence of or addition
Other one or more features, integer, step, operation, element, component and/or their group.It should be understood that when we claim member
Part is " connected " or when " coupled " to another element, it can be directly connected or coupled to other elements, or there may also be
Intermediary element.In addition, " connection " used herein or " coupling " may include being wirelessly connected or wirelessly coupling.It is used herein to arrange
Diction "and/or" includes one or more associated wholes for listing item or any cell and all combinations.
Those skilled in the art of the present technique are appreciated that unless otherwise defined, all terms used herein (including technology art
Language and scientific term), there is meaning identical with the general understanding of those of ordinary skill in fields of the present invention.Should also
Understand, those terms such as defined in the general dictionary, it should be understood that have in the context of the prior art
The consistent meaning of meaning, and unless idealization or meaning too formal otherwise will not be used by specific definitions as here
To explain.
Those skilled in the art of the present technique are appreciated that " terminal " used herein above, " terminal device " both include wireless communication
The equipment of number receiver, only has the equipment of the wireless signal receiver of non-emissive ability, and including receiving and emitting hardware
Equipment, have on bidirectional communication link, can execute two-way communication reception and emit hardware equipment.This equipment
It may include: honeycomb or other communication equipments, shown with single line display or multi-line display or without multi-line
The honeycomb of device or other communication equipments;PCS (Personal Communications Service, PCS Personal Communications System), can
With combine voice, data processing, fax and/or communication ability;PDA (Personal Digital Assistant, it is personal
Digital assistants), it may include radio frequency receiver, pager, the Internet/intranet access, web browser, notepad, day
It goes through and/or GPS (Global Positioning System, global positioning system) receiver;Conventional laptop and/or palm
Type computer or other equipment, have and/or the conventional laptop including radio frequency receiver and/or palmtop computer or its
His equipment." terminal " used herein above, " terminal device " can be it is portable, can transport, be mounted on the vehicles (aviation,
Sea-freight and/or land) in, or be suitable for and/or be configured in local runtime, and/or with distribution form, operate in the earth
And/or any other position operation in space." terminal " used herein above, " terminal device " can also be communication terminal, on
Network termination, music/video playback terminal, such as can be PDA, MID (Mobile Internet Device, mobile Internet
Equipment) and/or mobile phone with music/video playing function, it is also possible to the equipment such as smart television, set-top box.
The application discloses a kind of exploitation environment control method, referring to Fig. 1, the control method of the application includes following step
It is rapid:
S1000, server end obtain the access instruction of the client in the same local area network;The access instruction includes visitor
User account information, operational order and the target developing environmental information for being stored in server end at family end;
Server is attached with multiple and different clients by the same local area network in the application, in server end
Configured with target developing environment.Developing environment is on the basis of basic hardware and numerical software, to support system software and answering
The one group of software used with the engineering development and maintenance of software.It can further comprise one or more suitable in exploitation environment
Exploitation software for the exploitation environment.There can be multiple and different exploitation software under the same exploitation environment.It, can in the application
Multiple and different exploitation environment is configured simultaneously in the server, is carried out in order to which more available exploitation software can be provided for user
Software development.
In the application, client and server is connected to the same local area network, and exploitation environment configurations are in server end, visitor
Family end may have access to the exploitation environment on server end by access server end, and connect and develop each opening in environment
Feel like jelly part.
Further, in order to record the connection data that client accesses server end, identity category can be set to client
Property information, that is, give client that one identity information is set, for example be numbered, or name, to distinguish multiple and different visitors
Family end.Meanwhile can the different exploitation softwares in split hair ring border and exploitation environment identity informations are set, for example be numbered
Or be named, in order to distinguish different exploitation software, and the relative recording of record client access exploitation environment.It is right simultaneously
In different users, there are also respective user account, user carries out local with server by logging in user account
In the client for netting connection, it can allow and establish communication connection between client and server, user can be in its corresponding user's account
The exploitation environment and exploitation software built on the server are used in number information mapped extent of competence.
Further, the relative recording of client access exploitation environment further includes the operational order from client,
In some embodiments, operational order indicate to check the data that upload, the split part that feels like jelly are accessed and are edited on exploitation software,
Modification, the split data felt like jelly on part are downloaded, the split data felt like jelly on part are integrated and handled.Client needs
When accessing server, need to connect the same local area network with server, while sending related access instruction to server, access refers to
Order includes the specific exploitation environment letter that identity attribute information, operational order and the needs of client disclosed above access
Breath, and develop the exploitation software body that environmental information includes the exploitation environment developing the identity information of environment and specifically being accessed
Part information can be established quickly with data in target developing environment with this and be communicated.
S2000, the user right that the identity attribute information representation is judged according to preset authentication rules, whether can send out
Operational order described in cloth and the exploitation environment using the exploitation environmental information characterization;
User right, that is, user uses the right of some object, in the application, when being provided with multiple client, when multiple
Client is likely to result in that server operation data is excessive when using simultaneously, and the user of multiple and different clients is arbitrarily split
The data in part of feeling like jelly, which are modified, is easy to cause exploitation corrupt data, arbitrarily logins exploitation software, the code letter of User Exploitation
Easily stolen use is ceased, safety is low.In this application, soft to the exploitation in each exploitation environment and each exploitation environment
Part setting has permission, and the client user for only meeting default access can split hair ring border progress normal use.
Use and the preservation of exploitation data and secrecy are shunted in order to make to develop software in the application, by presetting authentication rules
Come identify and manage different clients identity attribute information user right and its relevant operation.In one embodiment, described
Authentication rules include the first permission, and first permission is by the user account information with the login of the client of LAN connection
The permission of access exploitation environment, the range of first permission include checking permission, modification authority and/or analysis permission.It checks
Permission is that the user of login client can check the relevant configuration information built in the exploitation environment of server end.It repairs
Change permission be log in client user can modify to the relevant configured parameter built in the exploitation environment of server end,
Maintenance, and some exploitation software etc. is environmentally added or deletes in related development.Analysis permission, which refers to, logs in client
User can execute analysis order to the relevant parameter built in the exploitation environment of server end, such as in each exploitation environment
The data obtained on some period are analyzed, extraction and analysis result.Such as it obtains and logs in Android exploitation ring in one month
All user account informations under border and the time logged in, obtain the distribution map etc. of login time.
Further, in another embodiment, authentication rules further include the second permission, second permission be by with office
The permission for the exploitation software in user account information access exploitation environment that the client of domain net connection logs in, second permission
Range includes checking permission, modification authority and/or analysis permission.Wherein, check that permission indicates to log in user's account in client
Number information is to the upper relevant parameter of some exploitation software and the power of the exploitation data being uploaded on the exploitation software checked
Limit.Access right refer to log in client on user to some exploitation software carry out using, i.e., exploitation software on carry out generation
The compiling and modification of code.Modification authority refers to that the user account information logged in client opens some in its use scope
The relevant parameter of part of feeling like jelly is modified, it should be noted that this is revised as after only when itself is used, relevant parameter is modification
Parameter, and for log in it is same exploitation software other users when in use, do not show its modify content.Such as user A
It requires to carry out code compilation by exploitation software C with user B, is in personal habits, user A is by the permission of oneself to exploitation
The parameter of the dependent compilation of software C is modified, and " current page shows 20 Codabar codes " that develops software C default is changed to
" current page shows 25 Codabar codes ", then for only user A when using exploitation software C, current page is display 25
Code, it is silent that user B and other users the display item number of current page when using exploitation software C remain system
The format recognized or each self-modifying.Modification i.e. in the second extent of competence, it is only effective to the user to modify.It is corresponding
, it is then that the split part that feels like jelly carries out whole modification, when the user with the first permission is split for the modification in the first permission
After the part that feels like jelly is modified, then the relevant parameter of all users using the exploitation software is all modified.Permission is analyzed,
Refer to the permission analyzed the data for being uploaded to the exploitation software, summarized using the user of some exploitation software, for example uses
The split part C that feels like jelly carries out having analysis permission using, user A to family A and user B simultaneously, and user B does not analyze permission, for
Family A and user B is uploaded to the exploitation data of exploitation software C, and user A can carry out the data uploaded on all exploitation software C
Analysis, for example the frequency that the exploitation software is used in one month is counted, pass through the number to malfunction after compiling, the number of whose error
At most, what etc. be the reason for mistake occur be, and user B is then analyzed and checked to above-mentioned data without this permission.
The relevant range of first permission and/or the second permission disclosed above is also to correspond to operational order, and user passes through
Operational order is operated in exploitation software, and each operation is mapped with corresponding permission, and different permissions combines
User is then constituted using the authentication rules of exploitation environment, meets the operation of authentication rules, then server can issue its operation
Instruction and the exploitation environment characterized using the exploitation environmental information.
S3000, the operational order can be issued and when using the exploitation environment when the user right, the clothes
The access interface of the target developing environment is sent in the client by business device according to the identity attribute information, to use
Family uses the target developing environment in the client.
After the operational order of user meets preset authentication rules on server end, the server end is according to the body
The access interface of the target developing environment is sent in the client by part attribute information, and client receives related access
Interface establishes a connection with server end, to carry out the use in permission to the target developing environment of link.
In one embodiment, referring to Fig. 2, using target developing environment further include exploitation data in the split part that feels like jelly into
Row saves, and the store method of the exploitation data includes:
S3100, after performing the operational order of upload, the exploitation data are stored in first database;
After user has compiled exploitation data in exploitation software, exploitation data can be uploaded and be saved, in order to persistence.
Data after upload are stored in first database, and first database is to preserve the exploitation software from different exploitation environment
The exploitation data uploaded.In one embodiment, for the ease of distinguishing, by device label come to difference in first database
The exploitation data compiled on exploitation environment and different exploitation softwares are saved.
First exploitation data in, the exploitation data that it is stored can also be handled, i.e., to the exploitation data of upload into
Row summarizes and analyzes, and realizes that the function corresponds to the relevant operation of analysis disclosed above.
In one embodiment, referring to Fig. 3, the method for the processing exploitation data includes:
The Table Header information of S3110, the identification exploitation data;
One complete software development data all can include Table Header information, and Table Header information is equivalent to the identity of the exploitation data
The parameter informations such as information, including used code language, number and function, by identifying that Table Header information can determine whether the exploitation
Data are a part in the data or some exploration project of independent exploration project, for some biggish projects, usually
Multiple and different development modules can be divided into, be compiled respectively by multiple developers or the same developer is according to function
Energy module is compiled respectively, and in this way after having compiled a certain section of code, needing to get up the code combination of different function can
Realize correlation function.
S3120, location information of the exploitation data in destination document is obtained according to Table Header information;The destination document
For the document for being stored with the code data that is mutually related with the exploitation data;
The exploitation data of the same project can be stored in the same destination document, and the destination document is is stored with and institute
It states exploitation data to be mutually related the document of code data, is identified and be uploaded in first database by step S3110
Exploitation data relevant parameter, and according to corresponding parameter obtain the exploitation data belonging to destination document and in target
The location information stored in document.
S3130, the exploitation data are directed into destination document summarize according to the positional information.
After obtaining related objective document and location information, related development data are inserted into the corresponding position of destination document
In, it is integrated with other exploitation data in same project.
After completing the integration of related data, exploitation software can realize the data after integration.In another implementation
In example, during exploitation software realizes the exploitation data after summarizing, if certain section of program is wrong, exploitation will lead to
Data cannot achieve its function, therefore in one embodiment, is stored with rule base in the first database of server, is uploaded to
Exploitation data in first database can report an error under the matching of rule base.Referring to Fig. 4, being carried out to the exploitation data
The method to report an error includes:
The first parameter information of S3131, the identification exploitation data, first parameter information includes data type;
The Table Header information that exploitation data are obtained by step S3110 is mapped with the different ginsengs of exploitation data in Table Header information
Number, wherein also including data type, definition data type is the first parameter information.First parameter information is in addition to from Table Header information
It obtains, can also be obtained from code itself, for example it is different for using C language edit code and using keyword used by JAVA
Sample, and the rule edited is different, for example in following example, the code and use of quadrature of circle are respectively write with C language
The code for writing quadrature of circle of JAVA language, wherein the following example 1 of the code write with C language:
And use the following example 2 of code of JAVA language quadrature of a circle:
By example 1 and example 2 it is found that the keyword that bilingual uses when edit code be it is different,
And the mode for introducing header file be also it is different, based on these differences, the first parameter of exploitation data can be quickly obtained
Information, i.e. data type.
S3132, according to the development rule for the exploitation data for being mapped with the type in the data type and the rule base
It is matched;
S3133, when match it is unsuccessful, to do not meet development rule data carry out data error reporting.
The development rule of different types of data is mapped in the rule base stored in the first database of server respectively, is led to
Crossing after step S3131 identifies the data type for developing data can be matched one by one in rule base.Development rule is practical
On the program code based on the development language write syntax rule, matched process can be using being polled program code
Mode is scanned every data line code in exploitation data with behavior unit, matches corresponding keyword and grammer rule
Then.Unsuccessful data progress to development rule is not met then is matched when the syntax rule of data code is not in rule base
Data error reporting.
Carry out data error reporting mode there are many, in one embodiment, one of which for by the way of information alert into
Row reports an error, such as in one column of operation result, and there are the line number of wrong data and miscue information for display;Or it will be present
Row where the position of mistake is highlighted, to prompt user to modify this position.
In another embodiment, it can also be reported an error by the way of alarm, when carrying out when mistake is abnormal occurs in code
Ring is rung, to remind user to check.
Further, the exploitation data being stored in first database, can also be counted, and be had in statistics very much
In, such as number, statistics uplink time of counting user upload data etc..It in the present embodiment, can be by being stored in the first number
It statistically spreads according to library and sends out the written in code accuracy of the user of data.Referring to Fig. 5, the working efficiency and accuracy of statistics
Specific method includes:
S3134, the second parameter information for performing upload operation and instructing, second parameter information are obtained according to time shaft
The accuracy of user account information and its upload exploitation data including client;
S3135, user's work is carried out according to the user account information of different clients and its accuracy of upload exploitation data
Make Efficiency Statistics and accuracy ranking.
It will record the relevant operation and its correlation of user when the user account information of oneself is logged on to client by user
Parameter information, for example, user log in time, used exploitation software, time for using on exploitation software, and using
Historical operation information, when user will be in oneself data that compile are uploaded to server end on exploitation software first database
Afterwards, it can extract relevant parameter information during being counted, in conjunction with error information disclosed above, when reporting an error,
System may recognize that occur mistake exploitation data from which user account information, after having chosen the time of statistics,
The period class difference can be counted and do not have to the quantity and content that upload exploitation data, by identifying the number that reports an error and right
The position answered can then be calculated the accuracy of the corresponding exploitation data of the user account information, be ranked up i.e. to accuracy
It can obtain accuracy ranking.On the other hand it by choosing the specific period, and obtains in the period in user account information
Spread and send out the number or line number of the code of data, then it is statistics available go out the user account information to user working efficiency.
S3200, otherwise, the exploitation data are stored in the second database, wherein the first database and the second number
It is mutually indepedent according to library.
It is provided with temporary function in exploitation software, temporary function includes temporarily storing and permanently storing, when permanently storing
Exploitation data are not uploaded in first database also by user, but to the storage sides of data when having carried out local preservation data
Formula, the data user permanently stored can permanently check or modify and edit on its basis, until having selected to upload, data
It can just move in first database and save from the second database.Second database and first database are mutually indepedent.
Interim storage refers to user in compilation process, to avoid unexpected system crash or because counting caused by the power-off of outside
According to loss, it can be arranged in exploitation software and the data write in exploitation software are automatically saved in a certain period of time,
For example automatically saved at 1 minute once, even if loss of data can also reply before 1 minute of failure in exploitation software
The data write.Also or when saved in real time, such as detect user exploitation software in inputted, then automatically into
Row saves.System automatically saves all unsaved data in the second database.Ensure sending out by the way of temporarily storing
The data for not continuing rather to permanently store can be still found when outside business.
Further disclosed above permanently storing and temporarily store can also be that subregion carries out in the second database
Storage, that is, the region permanently stored and the region temporarily stored are set, and after data have been performed storage operation, data are deposited
Storage in permanent storage area, and the data of postedit be stored in and temporarily store before not being performed storage operation
Region, in order to recovery when generating system accident to data.When user it is subsequent continued peaceful to permanently store after, before
In temporary storage area, the data of storage are stored directly in permanent storage area, and temporary storage area empties, in order to store use
Continue the data write on exploitation software in family.
On the other hand, invention additionally discloses a kind of exploitation environment control units, referring to Fig. 6, including: acquisition module
1000: being configured as the access instruction for the client user that execute server end obtains in the same local area network;The access refers to
Enabling includes user account information, operational order and the target developing environmental information for being stored in server end for logging in client;Place
Reason module 2000: be configured as executing according to preset authentication rules judge the identity attribute information representation user right,
Whether the operational order and exploitation environment using the exploitation environmental information characterization can be issued;Execution module 3000:
It is configured as executing the service when the user right can issue the operational order and using the exploitation environment
The access interface of the target developing environment is sent in the client by device according to the identity attribute information, so that user
The target developing environment is used in the client.
Optionally, the authentication rules include the first permission, and first permission is to pass through the client with LAN connection
The permission for the user account information access exploitation environment that end logs in, the range of first permission includes checking permission, the power of amendment
Limit and/or analysis permission.
Optionally, the authentication rules further include the second permission, and second permission is to pass through the visitor with LAN connection
The permission for the exploitation software in user account information access exploitation environment that family end logs in, second extent of competence includes using
Permission checks permission, modification authority and/or analysis permission.
Optionally, further includes: the first memory module: it is configured as executing after performing the operational order of upload, it is described
Exploitation data are stored in first database;Second memory module: it is configured as that the exploitation number of upload operation instruction will be not carried out
According to being stored in the second database, wherein the first database and the second database are mutually indepedent.
Optionally, further includes: the first identification module: being configured as executing the Table Header information of the identification exploitation data;The
Two acquisition modules: it is configured as executing location information of the exploitation data in destination document is obtained according to Table Header information;Institute
Stating destination document is the document for being stored with the code data that is mutually related with the exploitation data;Summarizing module: it is configured as root
The exploitation data are directed into destination document according to the location information and are summarized.
Optionally, further includes: the second identification module: being configured as identifying the first parameter information of the exploitation data, institute
Stating the first parameter information includes data type;Matching module: it is configured as executing according to the data type and the rule base
In be mapped with the type the development rules of exploitation data matched;Report an error module: be configured as execute when match it is unsuccessful,
Data error reporting is carried out to the data for not meeting development rule.
Optionally, further includes: third obtains module: being configured as executing and perform upload operation according to time shaft acquisition and refer to
The second parameter information enabled, second parameter information include the user account information of client and its upload exploitation data just
True rate;Second processing module: it is configured as executing the user account information according to different clients and its uploads exploitation data
Accuracy carries out user job Efficiency Statistics and accuracy ranking.
The embodiment of the present invention provides computer equipment basic structure block diagram and please refers to Fig. 7.
The computer equipment includes processor, non-volatile memory medium, memory and the net connected by system bus
Network interface.Wherein, the non-volatile memory medium of the computer equipment is stored with operating system, database and computer-readable finger
It enables, control information sequence can be stored in database, when which is executed by processor, may make that processor is real
Now develop environment control method.The processor of the computer equipment supports entire computer for providing calculating and control ability
The operation of equipment.Computer-readable instruction can be stored in the memory of the computer equipment, which is located
When managing device execution, processor may make to execute exploitation environment control method.The network interface of the computer equipment is used for and terminal
Connection communication.It will be understood by those skilled in the art that structure shown in Fig. 7, only part relevant to application scheme
The block diagram of structure, does not constitute the restriction for the computer equipment being applied thereon to application scheme, and specific computer is set
Standby may include perhaps combining certain components or with different component layouts than more or fewer components as shown in the figure.
The status information for prompting behavior that computer equipment is sent by receiving associated client, i.e., whether associated terminal
It opens prompt and whether user closes the prompt task.By verifying whether above-mentioned task condition is reached, and then eventually to association
End sends corresponding preset instructions, so that associated terminal can execute corresponding operation according to the preset instructions, to realize
Effective supervision to associated terminal.Meanwhile when prompt information state and preset status command be not identical, server end control
Associated terminal persistently carries out jingle bell, the problem of to prevent the prompt task of associated terminal from terminating automatically after executing a period of time.
The present invention also provides a kind of storage mediums for being stored with computer-readable instruction, and the computer-readable instruction is by one
When a or multiple processors execute, so that one or more processors execute exploitation environmental Kuznets Curves described in any of the above-described embodiment
Method.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with
Relevant hardware is instructed to complete by computer program, which can be stored in a computer-readable storage and be situated between
In matter, the program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, storage medium above-mentioned can be
The non-volatile memory mediums such as magnetic disk, CD, read-only memory (Read-Only Memory, ROM) or random storage note
Recall body (Random Access Memory, RAM) etc..
It should be understood that although each step in the flow chart of attached drawing is successively shown according to the instruction of arrow,
These steps are not that the inevitable sequence according to arrow instruction successively executes.Unless expressly stating otherwise herein, these steps
Execution there is no stringent sequences to limit, can execute in the other order.Moreover, at least one in the flow chart of attached drawing
Part steps may include that perhaps these sub-steps of multiple stages or stage are not necessarily in synchronization to multiple sub-steps
Completion is executed, but can be executed at different times, execution sequence, which is also not necessarily, successively to be carried out, but can be with other
At least part of the sub-step or stage of step or other steps executes in turn or alternately.
The above is only some embodiments of the invention, it is noted that for the ordinary skill people of the art
For member, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications are also answered
It is considered as protection scope of the present invention.
Claims (10)
1. a kind of exploitation environment control method characterized by comprising
Server end obtains the access instruction of the client user in the same local area network;The access instruction includes logging in client
User account information, operational order and the target developing environmental information for being stored in server end at end;
The user right of the identity attribute information representation is judged according to preset authentication rules, whether can issue the operation
Instruction and the exploitation environment characterized using the exploitation environmental information;
When the user right can issue the operational order and use the exploitation environment, the server is according to institute
It states identity attribute information the access interface of the target developing environment is sent in the client, so that user is in the visitor
Family end uses the target developing environment.
2. exploitation environment control method according to claim 1, which is characterized in that the authentication rules include the first power
Limit, first permission are the power by the user account information access exploitation environment with the login of the client of LAN connection
Limit, the range of first permission include checking permission, modification authority and/or analysis permission.
3. exploitation environment control method according to claim 2, which is characterized in that the authentication rules further include the second power
Limit, second permission are by opening in the user account information access exploitation environment with the login of the client of LAN connection
Feel like jelly the permission of part, second extent of competence includes access right, checks permission, modification authority and/or analysis permission.
4. exploitation environment control method according to claim 3, which is characterized in that further include saving institute according to operational order
The exploitation data in exploitation software are stated, the store method of the exploitation data includes:
After performing the operational order of upload, the exploitation data are stored in first database;
Otherwise, the exploitation data are stored in the second database, wherein the first database and the second database are mutually only
It is vertical.
5. exploitation environment control method according to claim 4, which is characterized in that further include in the first database
Exploitation data handled, handle it is described exploitation data method include:
Identify the Table Header information of the exploitation data;
Obtain the location information of the exploitation data in destination document according to Table Header information, the destination document be stored with
The exploitation data are mutually related the document of code data;
The exploitation data are directed into destination document according to the positional information and are summarized.
6. exploitation environment control method according to claim 4, which is characterized in that further include being carried out to the exploitation data
It reports an error, the server end is stored with rule base, and the method to report an error to the exploitation data includes:
Identify the first parameter information of the exploitation data, first parameter information includes data type;
It is matched according to the development rule for the exploitation data for being mapped with the type in the data type and the rule base;
It is unsuccessful when matching, data error reporting is carried out to the data for not meeting development rule.
7. exploitation environment control method according to claim 4, which is characterized in that further include being carried out to the exploitation data
Statistics, the method that the statistics develops data include:
It is obtained according to time shaft and performs the second parameter information of upload operation instruction, second parameter information includes client
User account information and its upload exploitation data accuracy;
User job Efficiency Statistics are carried out according to the user account information of different clients and its accuracy for uploading exploitation data
With accuracy ranking.
8. a kind of exploitation environment control unit characterized by comprising
It obtains module: being configured as the access instruction for the client user that execute server end obtains in the same local area network;Institute
Stating access instruction includes the user account information for logging in client, operational order and the target developing environment for being stored in server end
Information;
Processing module: it is configured as executing the user's power for judging the identity attribute information representation according to preset authentication rules
Whether limit can issue the operational order and the exploitation environment using the exploitation environmental information characterization;
Execution module: it is configured as executing when the user right can issue the operational order and use the exploitation ring
When border, the access interface of the target developing environment is sent to the client according to the identity attribute information by the server
In end, so that user uses the target developing environment in the client.
9. a kind of computer equipment, which is characterized in that including memory and processor, being stored with computer in the memory can
Reading instruction, when the computer-readable instruction is executed by the processor, so that the processor executes such as claim 1 to 7
Any one of exploitation environment control method described in claim the step of.
10. a kind of storage medium for being stored with computer-readable instruction, which is characterized in that the computer-readable instruction is by one
Or multiple processors are when executing, so that one or more processors are executed as described in any one of claims 1 to 7 claim
Exploitation environment control method the step of.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811204580.0A CN109582291A (en) | 2018-10-16 | 2018-10-16 | Develop environment control method, device, computer equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811204580.0A CN109582291A (en) | 2018-10-16 | 2018-10-16 | Develop environment control method, device, computer equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109582291A true CN109582291A (en) | 2019-04-05 |
Family
ID=65920139
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811204580.0A Pending CN109582291A (en) | 2018-10-16 | 2018-10-16 | Develop environment control method, device, computer equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109582291A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111145897A (en) * | 2019-12-26 | 2020-05-12 | 深圳开立生物医疗科技股份有限公司 | Ultrasonic system configuration and maintenance method and device |
CN112363708A (en) * | 2020-12-04 | 2021-02-12 | 中信银行股份有限公司 | Context protection method and system under Eclipse supporting tool |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20110070038A (en) * | 2009-12-18 | 2011-06-24 | 에스케이 텔레콤주식회사 | System, server and method for the drm enabled application development environment based on gpos |
CN105324750A (en) * | 2013-06-12 | 2016-02-10 | 三菱电机株式会社 | Development-environment system, development-environment device, and development-environment provision method and program |
CN106648762A (en) * | 2016-11-30 | 2017-05-10 | 武汉斗鱼网络科技有限公司 | Development environment building method and device |
CN107688464A (en) * | 2017-06-28 | 2018-02-13 | 上海壹账通金融科技有限公司 | Software customized server, method and computer-readable recording medium |
CN108628626A (en) * | 2018-05-04 | 2018-10-09 | 北京小度信息科技有限公司 | development environment building method, code update method and device |
-
2018
- 2018-10-16 CN CN201811204580.0A patent/CN109582291A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20110070038A (en) * | 2009-12-18 | 2011-06-24 | 에스케이 텔레콤주식회사 | System, server and method for the drm enabled application development environment based on gpos |
CN105324750A (en) * | 2013-06-12 | 2016-02-10 | 三菱电机株式会社 | Development-environment system, development-environment device, and development-environment provision method and program |
CN106648762A (en) * | 2016-11-30 | 2017-05-10 | 武汉斗鱼网络科技有限公司 | Development environment building method and device |
CN107688464A (en) * | 2017-06-28 | 2018-02-13 | 上海壹账通金融科技有限公司 | Software customized server, method and computer-readable recording medium |
CN108628626A (en) * | 2018-05-04 | 2018-10-09 | 北京小度信息科技有限公司 | development environment building method, code update method and device |
Non-Patent Citations (3)
Title |
---|
A. BARMAN ETC.: "LDAP application development using J2EE and .NET", PROCEEDINGS OF THE IEEE INDICON 2004. FIRST INDIA ANNUAL CONFERENCE, 2004., 22 August 2005 (2005-08-22) * |
陈育谦 等: "基于规则引擎的项目开发环境访问控制架构", 指挥信息系统与技术, vol. 5, no. 2, 28 April 2014 (2014-04-28) * |
骆海玉;: "Dreamweaver CS5.5配置PhoneGap移动开发环境", 数字技术与应用, no. 05, 15 May 2016 (2016-05-15) * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111145897A (en) * | 2019-12-26 | 2020-05-12 | 深圳开立生物医疗科技股份有限公司 | Ultrasonic system configuration and maintenance method and device |
CN111145897B (en) * | 2019-12-26 | 2024-01-12 | 深圳开立生物医疗科技股份有限公司 | Ultrasonic system configuration and maintenance method and device |
CN112363708A (en) * | 2020-12-04 | 2021-02-12 | 中信银行股份有限公司 | Context protection method and system under Eclipse supporting tool |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Singh et al. | Accountability in the IoT: Systems, law, and ways forward | |
US10462128B2 (en) | Verification of both identification and presence of objects over a network | |
CN105224869B (en) | Assembly test method and device | |
CN106339633B (en) | Method and apparatus for user's control | |
US10250721B2 (en) | System and method for testing applications with a load tester and testing translator | |
CN107992771B (en) | A kind of data desensitization method and device | |
CN101902756A (en) | M2M (Machine To Machine) business platform and working method thereof | |
CN104579830B (en) | service monitoring method and device | |
KR20170015968A (en) | High-speed application for installation on mobile devices for permitting remote configuration of such mobile devices | |
CN112149109B (en) | Modularized authority control management method and system | |
CN103646198A (en) | Method, system and device for locking working region of mobile terminal | |
CN109328339A (en) | Inter-application communication and integration proxy | |
CN110515827A (en) | Automated testing method, device, computer equipment and storage medium | |
CN109582291A (en) | Develop environment control method, device, computer equipment and storage medium | |
CN102946415A (en) | Implementation method and device for local application of mobile terminal | |
US11373004B2 (en) | Report comprising a masked value | |
CN107704499A (en) | A kind of page jump control method and device of application program | |
Cimatti et al. | Combining MILS with contract-based design for safety and security requirements | |
CN105389241A (en) | Method and system for testing performance of anti-harassment tool of mobile terminal | |
CN106162538A (en) | Long distance control system and method for mobile terminal | |
CN111552900A (en) | Access control method and device, readable storage medium and electronic equipment | |
CN111177632A (en) | Data acquisition method and related equipment, system and storage device thereof | |
CN113434217B (en) | Vulnerability scanning method, vulnerability scanning device, computer equipment and medium | |
CN105681291A (en) | Method and system for realizing unified authentication of multiple clients | |
CN111131152B (en) | Automatic verification method and system for cross-platform remote login protection system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |