CN109582291A - Develop environment control method, device, computer equipment and storage medium - Google Patents

Develop environment control method, device, computer equipment and storage medium Download PDF

Info

Publication number
CN109582291A
CN109582291A CN201811204580.0A CN201811204580A CN109582291A CN 109582291 A CN109582291 A CN 109582291A CN 201811204580 A CN201811204580 A CN 201811204580A CN 109582291 A CN109582291 A CN 109582291A
Authority
CN
China
Prior art keywords
exploitation
data
environment
user
client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811204580.0A
Other languages
Chinese (zh)
Inventor
张敏
龙撷宇
徐志成
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
OneConnect Smart Technology Co Ltd
Original Assignee
OneConnect Smart Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by OneConnect Smart Technology Co Ltd filed Critical OneConnect Smart Technology Co Ltd
Priority to CN201811204580.0A priority Critical patent/CN109582291A/en
Publication of CN109582291A publication Critical patent/CN109582291A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/20Software design
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3438Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment monitoring of user actions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Quality & Reliability (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of exploitation environment control method, device, computer equipment and storage mediums, comprising: server end obtains the access instruction of the client user in the same local area network;Access instruction includes the user account information for logging in client, operational order and the target developing environmental information for being stored in server end;The exploitation environment for judging the user right of identity attribute information representation according to preset authentication rules, whether capable of issuing operational order and being characterized using exploitation environmental information;When user right can issue operational order and use exploitation environment, the access interface of target developing environment is sent in client by server according to identity attribute information, so that user uses target developing environment in client.By the way of local area network, exploitation environment and developing instrument are built in server end, is accessed by client, the time built exploitation environment and configure developing instrument is saved, it is more convenient, it is convenient, working efficiency is provided.

Description

Develop environment control method, device, computer equipment and storage medium
Technical field
The present invention relates to software systems technical fields, specifically, the present invention relates to exploitation environment control method, device, Computer equipment and storage medium.
Background technique
The configuration for developing environment is a kind of than relatively time-consuming process, while in configuration exploitation environmental process, different times The version of developing instrument may disunity, if in a project team develop environment disunity, to later development work It will cause many hidden danger.
Therefore, in the prior art, the people of usually unified project team needs unitized overall development environment, and on respective computer It builds these exploitation environment and these exploitation softwares is installed.A series of developing instruments, such as Java developing instrument are installed Eclipse, Andriod studio etc. is sometimes also needed to build local data base etc., be had a problem in that so each A developer requires to install one time referring to handbook, if encountering replacement machine, it is also desirable to reinstall, encounter windows When with the machines of the different operating systems such as mac even linux, it is also necessary to which the tool of different operating system is supported in installation, is done Many duplicate work.
Summary of the invention
The purpose of the present invention is intended at least can solve above-mentioned one of technological deficiency, especially a kind of opening based on local area network Environment control method is sent out, without the configuration exploitation environment on local client and installation exploitation software, user is facilitated to carry out program Exploitation also facilitates and develops summarizing for data in different clients.
The invention discloses a kind of exploitation environment control methods, comprising:
Server end obtains the access instruction of the client user in the same local area network;The access instruction includes logging in User account information, operational order and the target developing environmental information for being stored in server end of client;
According to preset authentication rules judge the user right of the identity attribute information representation, whether can issue it is described Operational order and the exploitation environment characterized using the exploitation environmental information;
When the user right can issue the operational order and use the exploitation environment, the server root The access interface of the target developing environment is sent in the client according to the identity attribute information, so that user is in institute It states client and uses the target developing environment.
Optionally, the authentication rules include the first permission, and first permission is to pass through the client with LAN connection The permission for the user account information access exploitation environment that end logs in, the range of first permission includes checking permission, the power of amendment Limit and/or analysis permission.
Optionally, the authentication rules further include the second permission, and second permission is to pass through the visitor with LAN connection The permission for the exploitation software in user account information access exploitation environment that family end logs in, second extent of competence includes using Permission checks permission, modification authority and/or analysis permission.
It optionally, further include the exploitation data saved according to operational order in the exploitation software, the exploitation data Store method includes:
After performing the operational order of upload, the exploitation data are stored in first database;
Otherwise, the exploitation data are stored in the second database, wherein the first database and the second database phase It is mutually independent.
Optionally, further include that the exploitation data in the first database are handled, handle the exploitation data Method includes:
Identify the Table Header information of the exploitation data;
Location information of the exploitation data in destination document is obtained according to Table Header information, the destination document is storage There is the document for the code data that is mutually related with the exploitation data;
The exploitation data are directed into destination document according to the positional information and are summarized.
It optionally, further include reporting an error to the exploitation data, the server end is stored with rule base, opens described Sending out the method that data report an error includes:
Identify the first parameter information of the exploitation data, first parameter information includes data type;
According to the development rule progress for the exploitation data for being mapped with the type in the data type and the rule base Match;
It is unsuccessful when matching, data error reporting is carried out to the data for not meeting development rule.
It optionally, further include that the exploitation data are counted, the method for the statistics exploitation data includes:
It is obtained according to time shaft and performs the second parameter information of upload operation instruction, second parameter information includes visitor The user account information at family end and its accuracy for uploading exploitation data;
User job efficiency is carried out according to the user account information of different clients and its accuracy for uploading exploitation data Statistics and accuracy ranking.
Invention additionally discloses a kind of exploitation environment control units, comprising:
It obtains module: being configured as execute server end and obtain the access of the client user in the same local area network referring to It enables;The access instruction includes the user account information for logging in client, operational order and is stored in the target of server end and opens Send out environmental information;
Processing module: it is configured as executing the user for judging the identity attribute information representation according to preset authentication rules Whether permission can issue the operational order and the exploitation environment using the exploitation environmental information characterization;
Execution module: it is configured as executing when the user right can issue the operational order and open using described When hair ring border, the access interface of the target developing environment is sent to described by the server according to the identity attribute information In client, so that user uses the target developing environment in the client.
Optionally, the authentication rules include the first permission, and first permission is to pass through the client with LAN connection The permission for the user account information access exploitation environment that end logs in, the range of first permission includes checking permission, the power of amendment Limit and/or analysis permission.
Optionally, the authentication rules further include the second permission, and second permission is to pass through the visitor with LAN connection The permission for the exploitation software in user account information access exploitation environment that family end logs in, second extent of competence includes using Permission checks permission, modification authority and/or analysis permission.
Optionally, further includes:
First memory module: it is configured as executing after performing the operational order of upload, the exploitation data are stored in In first database;
Second memory module: it is configured as the exploitation data for being not carried out upload operation instruction being stored in the second database In, wherein the first database and the second database are mutually indepedent.
Optionally, further includes:
First identification module: it is configured as executing the Table Header information of the identification exploitation data;
Second acquisition module: it is configured as executing position of the exploitation data in destination document is obtained according to Table Header information Confidence breath;The destination document is the document for being stored with the code data that is mutually related with the exploitation data;
Summarizing module: it is configured as that the exploitation data being directed into destination document according to the positional information and converges Always.
Optionally, further includes:
Second identification module: it is configured as identifying the first parameter information of the exploitation data, first parameter information Including data type;
Matching module: it is configured as executing the exploitation according to the type is mapped in the data type and the rule base The development rule of data is matched;
Report an error module: being configured as executing when matching is unsuccessful, to the data progress data error reporting for not meeting development rule.
Optionally, further includes:
Third obtains module: being configured as executing and believe according to the second parameter that time shaft acquisition performs upload operation instruction Breath, second parameter information include the user account information of client and its accuracy for uploading exploitation data;
Second processing module: it is configured as executing the user account information according to different clients and its uploads exploitation data Accuracy carry out user job Efficiency Statistics and accuracy ranking.
Invention additionally discloses a kind of computer equipment, including memory and processor, calculating is stored in the memory Machine readable instruction, when the computer-readable instruction is executed by the processor, so that the processor executes any of the above-described The step of described exploitation environment control method.
Invention additionally discloses a kind of storage mediums for being stored with computer-readable instruction, which is characterized in that the computer When readable instruction is executed by one or more processors, opened described in above-mentioned any one so that one or more processors execute The step of sending out environment control method.
The beneficial effects of the present invention are:
1) by the way of local area network, exploitation environment is built in server end, and configure multiple developing instruments, by client It accesses, saves user and build exploitation environment on local terminal and configure the time of developing instrument, and without considering more The problem of good computer terminal needs to build exploitation environment again, or local data is lost, it is more convenient, it is convenient;
2) setting has permission, although sharing a developing instrument and exploitation environment, and respectively independent, and is provided with correlative weight It limits and using rule, can only upload to download easily, and the confidentiality of program is stronger;
3) by obtaining the historical operating data on different developing instruments, to be monitored to development process, and it is fast Speed analyzes the problem in development process, improves development efficiency.The history number of each developing instrument can also be passed through simultaneously According to the Programming's quality and working efficiency of assessment process person.
The additional aspect of the present invention and advantage will be set forth in part in the description, these will become from the following description Obviously, or practice through the invention is recognized.
Detailed description of the invention
Above-mentioned and/or additional aspect and advantage of the invention will become from the following description of the accompanying drawings of embodiments Obviously and it is readily appreciated that, in which:
Fig. 1 is the flow chart of present invention exploitation environment control method;
Fig. 2 is the flow chart of the store method of present invention exploitation data;
Fig. 3 is the flow chart of the method for present invention processing exploitation data;
Fig. 4 is the flow chart for the method that present invention exploitation data report an error;
Fig. 5 is the flow chart of the specific method of the working efficiency of the invention counted and accuracy;
Fig. 6 is present invention exploitation environment control unit module diagram;
Fig. 7 is computer equipment basic structure block diagram of the present invention.
Specific embodiment
The embodiment of the present invention is described below in detail, examples of the embodiments are shown in the accompanying drawings, wherein from beginning to end Same or similar label indicates same or similar element or element with the same or similar functions.Below with reference to attached The embodiment of figure description is exemplary, and for explaining only the invention, and is not construed as limiting the claims.
Those skilled in the art of the present technique are appreciated that unless expressly stated, singular " one " used herein, " one It is a ", " described " and "the" may also comprise plural form.It is to be further understood that being arranged used in specification of the invention Diction " comprising " refer to that there are the feature, integer, step, operation, element and/or component, but it is not excluded that in the presence of or addition Other one or more features, integer, step, operation, element, component and/or their group.It should be understood that when we claim member Part is " connected " or when " coupled " to another element, it can be directly connected or coupled to other elements, or there may also be Intermediary element.In addition, " connection " used herein or " coupling " may include being wirelessly connected or wirelessly coupling.It is used herein to arrange Diction "and/or" includes one or more associated wholes for listing item or any cell and all combinations.
Those skilled in the art of the present technique are appreciated that unless otherwise defined, all terms used herein (including technology art Language and scientific term), there is meaning identical with the general understanding of those of ordinary skill in fields of the present invention.Should also Understand, those terms such as defined in the general dictionary, it should be understood that have in the context of the prior art The consistent meaning of meaning, and unless idealization or meaning too formal otherwise will not be used by specific definitions as here To explain.
Those skilled in the art of the present technique are appreciated that " terminal " used herein above, " terminal device " both include wireless communication The equipment of number receiver, only has the equipment of the wireless signal receiver of non-emissive ability, and including receiving and emitting hardware Equipment, have on bidirectional communication link, can execute two-way communication reception and emit hardware equipment.This equipment It may include: honeycomb or other communication equipments, shown with single line display or multi-line display or without multi-line The honeycomb of device or other communication equipments;PCS (Personal Communications Service, PCS Personal Communications System), can With combine voice, data processing, fax and/or communication ability;PDA (Personal Digital Assistant, it is personal Digital assistants), it may include radio frequency receiver, pager, the Internet/intranet access, web browser, notepad, day It goes through and/or GPS (Global Positioning System, global positioning system) receiver;Conventional laptop and/or palm Type computer or other equipment, have and/or the conventional laptop including radio frequency receiver and/or palmtop computer or its His equipment." terminal " used herein above, " terminal device " can be it is portable, can transport, be mounted on the vehicles (aviation, Sea-freight and/or land) in, or be suitable for and/or be configured in local runtime, and/or with distribution form, operate in the earth And/or any other position operation in space." terminal " used herein above, " terminal device " can also be communication terminal, on Network termination, music/video playback terminal, such as can be PDA, MID (Mobile Internet Device, mobile Internet Equipment) and/or mobile phone with music/video playing function, it is also possible to the equipment such as smart television, set-top box.
The application discloses a kind of exploitation environment control method, referring to Fig. 1, the control method of the application includes following step It is rapid:
S1000, server end obtain the access instruction of the client in the same local area network;The access instruction includes visitor User account information, operational order and the target developing environmental information for being stored in server end at family end;
Server is attached with multiple and different clients by the same local area network in the application, in server end Configured with target developing environment.Developing environment is on the basis of basic hardware and numerical software, to support system software and answering The one group of software used with the engineering development and maintenance of software.It can further comprise one or more suitable in exploitation environment Exploitation software for the exploitation environment.There can be multiple and different exploitation software under the same exploitation environment.It, can in the application Multiple and different exploitation environment is configured simultaneously in the server, is carried out in order to which more available exploitation software can be provided for user Software development.
In the application, client and server is connected to the same local area network, and exploitation environment configurations are in server end, visitor Family end may have access to the exploitation environment on server end by access server end, and connect and develop each opening in environment Feel like jelly part.
Further, in order to record the connection data that client accesses server end, identity category can be set to client Property information, that is, give client that one identity information is set, for example be numbered, or name, to distinguish multiple and different visitors Family end.Meanwhile can the different exploitation softwares in split hair ring border and exploitation environment identity informations are set, for example be numbered Or be named, in order to distinguish different exploitation software, and the relative recording of record client access exploitation environment.It is right simultaneously In different users, there are also respective user account, user carries out local with server by logging in user account In the client for netting connection, it can allow and establish communication connection between client and server, user can be in its corresponding user's account The exploitation environment and exploitation software built on the server are used in number information mapped extent of competence.
Further, the relative recording of client access exploitation environment further includes the operational order from client, In some embodiments, operational order indicate to check the data that upload, the split part that feels like jelly are accessed and are edited on exploitation software, Modification, the split data felt like jelly on part are downloaded, the split data felt like jelly on part are integrated and handled.Client needs When accessing server, need to connect the same local area network with server, while sending related access instruction to server, access refers to Order includes the specific exploitation environment letter that identity attribute information, operational order and the needs of client disclosed above access Breath, and develop the exploitation software body that environmental information includes the exploitation environment developing the identity information of environment and specifically being accessed Part information can be established quickly with data in target developing environment with this and be communicated.
S2000, the user right that the identity attribute information representation is judged according to preset authentication rules, whether can send out Operational order described in cloth and the exploitation environment using the exploitation environmental information characterization;
User right, that is, user uses the right of some object, in the application, when being provided with multiple client, when multiple Client is likely to result in that server operation data is excessive when using simultaneously, and the user of multiple and different clients is arbitrarily split The data in part of feeling like jelly, which are modified, is easy to cause exploitation corrupt data, arbitrarily logins exploitation software, the code letter of User Exploitation Easily stolen use is ceased, safety is low.In this application, soft to the exploitation in each exploitation environment and each exploitation environment Part setting has permission, and the client user for only meeting default access can split hair ring border progress normal use.
Use and the preservation of exploitation data and secrecy are shunted in order to make to develop software in the application, by presetting authentication rules Come identify and manage different clients identity attribute information user right and its relevant operation.In one embodiment, described Authentication rules include the first permission, and first permission is by the user account information with the login of the client of LAN connection The permission of access exploitation environment, the range of first permission include checking permission, modification authority and/or analysis permission.It checks Permission is that the user of login client can check the relevant configuration information built in the exploitation environment of server end.It repairs Change permission be log in client user can modify to the relevant configured parameter built in the exploitation environment of server end, Maintenance, and some exploitation software etc. is environmentally added or deletes in related development.Analysis permission, which refers to, logs in client User can execute analysis order to the relevant parameter built in the exploitation environment of server end, such as in each exploitation environment The data obtained on some period are analyzed, extraction and analysis result.Such as it obtains and logs in Android exploitation ring in one month All user account informations under border and the time logged in, obtain the distribution map etc. of login time.
Further, in another embodiment, authentication rules further include the second permission, second permission be by with office The permission for the exploitation software in user account information access exploitation environment that the client of domain net connection logs in, second permission Range includes checking permission, modification authority and/or analysis permission.Wherein, check that permission indicates to log in user's account in client Number information is to the upper relevant parameter of some exploitation software and the power of the exploitation data being uploaded on the exploitation software checked Limit.Access right refer to log in client on user to some exploitation software carry out using, i.e., exploitation software on carry out generation The compiling and modification of code.Modification authority refers to that the user account information logged in client opens some in its use scope The relevant parameter of part of feeling like jelly is modified, it should be noted that this is revised as after only when itself is used, relevant parameter is modification Parameter, and for log in it is same exploitation software other users when in use, do not show its modify content.Such as user A It requires to carry out code compilation by exploitation software C with user B, is in personal habits, user A is by the permission of oneself to exploitation The parameter of the dependent compilation of software C is modified, and " current page shows 20 Codabar codes " that develops software C default is changed to " current page shows 25 Codabar codes ", then for only user A when using exploitation software C, current page is display 25 Code, it is silent that user B and other users the display item number of current page when using exploitation software C remain system The format recognized or each self-modifying.Modification i.e. in the second extent of competence, it is only effective to the user to modify.It is corresponding , it is then that the split part that feels like jelly carries out whole modification, when the user with the first permission is split for the modification in the first permission After the part that feels like jelly is modified, then the relevant parameter of all users using the exploitation software is all modified.Permission is analyzed, Refer to the permission analyzed the data for being uploaded to the exploitation software, summarized using the user of some exploitation software, for example uses The split part C that feels like jelly carries out having analysis permission using, user A to family A and user B simultaneously, and user B does not analyze permission, for Family A and user B is uploaded to the exploitation data of exploitation software C, and user A can carry out the data uploaded on all exploitation software C Analysis, for example the frequency that the exploitation software is used in one month is counted, pass through the number to malfunction after compiling, the number of whose error At most, what etc. be the reason for mistake occur be, and user B is then analyzed and checked to above-mentioned data without this permission.
The relevant range of first permission and/or the second permission disclosed above is also to correspond to operational order, and user passes through Operational order is operated in exploitation software, and each operation is mapped with corresponding permission, and different permissions combines User is then constituted using the authentication rules of exploitation environment, meets the operation of authentication rules, then server can issue its operation Instruction and the exploitation environment characterized using the exploitation environmental information.
S3000, the operational order can be issued and when using the exploitation environment when the user right, the clothes The access interface of the target developing environment is sent in the client by business device according to the identity attribute information, to use Family uses the target developing environment in the client.
After the operational order of user meets preset authentication rules on server end, the server end is according to the body The access interface of the target developing environment is sent in the client by part attribute information, and client receives related access Interface establishes a connection with server end, to carry out the use in permission to the target developing environment of link.
In one embodiment, referring to Fig. 2, using target developing environment further include exploitation data in the split part that feels like jelly into Row saves, and the store method of the exploitation data includes:
S3100, after performing the operational order of upload, the exploitation data are stored in first database;
After user has compiled exploitation data in exploitation software, exploitation data can be uploaded and be saved, in order to persistence. Data after upload are stored in first database, and first database is to preserve the exploitation software from different exploitation environment The exploitation data uploaded.In one embodiment, for the ease of distinguishing, by device label come to difference in first database The exploitation data compiled on exploitation environment and different exploitation softwares are saved.
First exploitation data in, the exploitation data that it is stored can also be handled, i.e., to the exploitation data of upload into Row summarizes and analyzes, and realizes that the function corresponds to the relevant operation of analysis disclosed above.
In one embodiment, referring to Fig. 3, the method for the processing exploitation data includes:
The Table Header information of S3110, the identification exploitation data;
One complete software development data all can include Table Header information, and Table Header information is equivalent to the identity of the exploitation data The parameter informations such as information, including used code language, number and function, by identifying that Table Header information can determine whether the exploitation Data are a part in the data or some exploration project of independent exploration project, for some biggish projects, usually Multiple and different development modules can be divided into, be compiled respectively by multiple developers or the same developer is according to function Energy module is compiled respectively, and in this way after having compiled a certain section of code, needing to get up the code combination of different function can Realize correlation function.
S3120, location information of the exploitation data in destination document is obtained according to Table Header information;The destination document For the document for being stored with the code data that is mutually related with the exploitation data;
The exploitation data of the same project can be stored in the same destination document, and the destination document is is stored with and institute It states exploitation data to be mutually related the document of code data, is identified and be uploaded in first database by step S3110 Exploitation data relevant parameter, and according to corresponding parameter obtain the exploitation data belonging to destination document and in target The location information stored in document.
S3130, the exploitation data are directed into destination document summarize according to the positional information.
After obtaining related objective document and location information, related development data are inserted into the corresponding position of destination document In, it is integrated with other exploitation data in same project.
After completing the integration of related data, exploitation software can realize the data after integration.In another implementation In example, during exploitation software realizes the exploitation data after summarizing, if certain section of program is wrong, exploitation will lead to Data cannot achieve its function, therefore in one embodiment, is stored with rule base in the first database of server, is uploaded to Exploitation data in first database can report an error under the matching of rule base.Referring to Fig. 4, being carried out to the exploitation data The method to report an error includes:
The first parameter information of S3131, the identification exploitation data, first parameter information includes data type;
The Table Header information that exploitation data are obtained by step S3110 is mapped with the different ginsengs of exploitation data in Table Header information Number, wherein also including data type, definition data type is the first parameter information.First parameter information is in addition to from Table Header information It obtains, can also be obtained from code itself, for example it is different for using C language edit code and using keyword used by JAVA Sample, and the rule edited is different, for example in following example, the code and use of quadrature of circle are respectively write with C language The code for writing quadrature of circle of JAVA language, wherein the following example 1 of the code write with C language:
And use the following example 2 of code of JAVA language quadrature of a circle:
By example 1 and example 2 it is found that the keyword that bilingual uses when edit code be it is different, And the mode for introducing header file be also it is different, based on these differences, the first parameter of exploitation data can be quickly obtained Information, i.e. data type.
S3132, according to the development rule for the exploitation data for being mapped with the type in the data type and the rule base It is matched;
S3133, when match it is unsuccessful, to do not meet development rule data carry out data error reporting.
The development rule of different types of data is mapped in the rule base stored in the first database of server respectively, is led to Crossing after step S3131 identifies the data type for developing data can be matched one by one in rule base.Development rule is practical On the program code based on the development language write syntax rule, matched process can be using being polled program code Mode is scanned every data line code in exploitation data with behavior unit, matches corresponding keyword and grammer rule Then.Unsuccessful data progress to development rule is not met then is matched when the syntax rule of data code is not in rule base Data error reporting.
Carry out data error reporting mode there are many, in one embodiment, one of which for by the way of information alert into Row reports an error, such as in one column of operation result, and there are the line number of wrong data and miscue information for display;Or it will be present Row where the position of mistake is highlighted, to prompt user to modify this position.
In another embodiment, it can also be reported an error by the way of alarm, when carrying out when mistake is abnormal occurs in code Ring is rung, to remind user to check.
Further, the exploitation data being stored in first database, can also be counted, and be had in statistics very much In, such as number, statistics uplink time of counting user upload data etc..It in the present embodiment, can be by being stored in the first number It statistically spreads according to library and sends out the written in code accuracy of the user of data.Referring to Fig. 5, the working efficiency and accuracy of statistics Specific method includes:
S3134, the second parameter information for performing upload operation and instructing, second parameter information are obtained according to time shaft The accuracy of user account information and its upload exploitation data including client;
S3135, user's work is carried out according to the user account information of different clients and its accuracy of upload exploitation data Make Efficiency Statistics and accuracy ranking.
It will record the relevant operation and its correlation of user when the user account information of oneself is logged on to client by user Parameter information, for example, user log in time, used exploitation software, time for using on exploitation software, and using Historical operation information, when user will be in oneself data that compile are uploaded to server end on exploitation software first database Afterwards, it can extract relevant parameter information during being counted, in conjunction with error information disclosed above, when reporting an error, System may recognize that occur mistake exploitation data from which user account information, after having chosen the time of statistics, The period class difference can be counted and do not have to the quantity and content that upload exploitation data, by identifying the number that reports an error and right The position answered can then be calculated the accuracy of the corresponding exploitation data of the user account information, be ranked up i.e. to accuracy It can obtain accuracy ranking.On the other hand it by choosing the specific period, and obtains in the period in user account information Spread and send out the number or line number of the code of data, then it is statistics available go out the user account information to user working efficiency.
S3200, otherwise, the exploitation data are stored in the second database, wherein the first database and the second number It is mutually indepedent according to library.
It is provided with temporary function in exploitation software, temporary function includes temporarily storing and permanently storing, when permanently storing Exploitation data are not uploaded in first database also by user, but to the storage sides of data when having carried out local preservation data Formula, the data user permanently stored can permanently check or modify and edit on its basis, until having selected to upload, data It can just move in first database and save from the second database.Second database and first database are mutually indepedent.
Interim storage refers to user in compilation process, to avoid unexpected system crash or because counting caused by the power-off of outside According to loss, it can be arranged in exploitation software and the data write in exploitation software are automatically saved in a certain period of time, For example automatically saved at 1 minute once, even if loss of data can also reply before 1 minute of failure in exploitation software The data write.Also or when saved in real time, such as detect user exploitation software in inputted, then automatically into Row saves.System automatically saves all unsaved data in the second database.Ensure sending out by the way of temporarily storing The data for not continuing rather to permanently store can be still found when outside business.
Further disclosed above permanently storing and temporarily store can also be that subregion carries out in the second database Storage, that is, the region permanently stored and the region temporarily stored are set, and after data have been performed storage operation, data are deposited Storage in permanent storage area, and the data of postedit be stored in and temporarily store before not being performed storage operation Region, in order to recovery when generating system accident to data.When user it is subsequent continued peaceful to permanently store after, before In temporary storage area, the data of storage are stored directly in permanent storage area, and temporary storage area empties, in order to store use Continue the data write on exploitation software in family.
On the other hand, invention additionally discloses a kind of exploitation environment control units, referring to Fig. 6, including: acquisition module 1000: being configured as the access instruction for the client user that execute server end obtains in the same local area network;The access refers to Enabling includes user account information, operational order and the target developing environmental information for being stored in server end for logging in client;Place Reason module 2000: be configured as executing according to preset authentication rules judge the identity attribute information representation user right, Whether the operational order and exploitation environment using the exploitation environmental information characterization can be issued;Execution module 3000: It is configured as executing the service when the user right can issue the operational order and using the exploitation environment The access interface of the target developing environment is sent in the client by device according to the identity attribute information, so that user The target developing environment is used in the client.
Optionally, the authentication rules include the first permission, and first permission is to pass through the client with LAN connection The permission for the user account information access exploitation environment that end logs in, the range of first permission includes checking permission, the power of amendment Limit and/or analysis permission.
Optionally, the authentication rules further include the second permission, and second permission is to pass through the visitor with LAN connection The permission for the exploitation software in user account information access exploitation environment that family end logs in, second extent of competence includes using Permission checks permission, modification authority and/or analysis permission.
Optionally, further includes: the first memory module: it is configured as executing after performing the operational order of upload, it is described Exploitation data are stored in first database;Second memory module: it is configured as that the exploitation number of upload operation instruction will be not carried out According to being stored in the second database, wherein the first database and the second database are mutually indepedent.
Optionally, further includes: the first identification module: being configured as executing the Table Header information of the identification exploitation data;The Two acquisition modules: it is configured as executing location information of the exploitation data in destination document is obtained according to Table Header information;Institute Stating destination document is the document for being stored with the code data that is mutually related with the exploitation data;Summarizing module: it is configured as root The exploitation data are directed into destination document according to the location information and are summarized.
Optionally, further includes: the second identification module: being configured as identifying the first parameter information of the exploitation data, institute Stating the first parameter information includes data type;Matching module: it is configured as executing according to the data type and the rule base In be mapped with the type the development rules of exploitation data matched;Report an error module: be configured as execute when match it is unsuccessful, Data error reporting is carried out to the data for not meeting development rule.
Optionally, further includes: third obtains module: being configured as executing and perform upload operation according to time shaft acquisition and refer to The second parameter information enabled, second parameter information include the user account information of client and its upload exploitation data just True rate;Second processing module: it is configured as executing the user account information according to different clients and its uploads exploitation data Accuracy carries out user job Efficiency Statistics and accuracy ranking.
The embodiment of the present invention provides computer equipment basic structure block diagram and please refers to Fig. 7.
The computer equipment includes processor, non-volatile memory medium, memory and the net connected by system bus Network interface.Wherein, the non-volatile memory medium of the computer equipment is stored with operating system, database and computer-readable finger It enables, control information sequence can be stored in database, when which is executed by processor, may make that processor is real Now develop environment control method.The processor of the computer equipment supports entire computer for providing calculating and control ability The operation of equipment.Computer-readable instruction can be stored in the memory of the computer equipment, which is located When managing device execution, processor may make to execute exploitation environment control method.The network interface of the computer equipment is used for and terminal Connection communication.It will be understood by those skilled in the art that structure shown in Fig. 7, only part relevant to application scheme The block diagram of structure, does not constitute the restriction for the computer equipment being applied thereon to application scheme, and specific computer is set Standby may include perhaps combining certain components or with different component layouts than more or fewer components as shown in the figure.
The status information for prompting behavior that computer equipment is sent by receiving associated client, i.e., whether associated terminal It opens prompt and whether user closes the prompt task.By verifying whether above-mentioned task condition is reached, and then eventually to association End sends corresponding preset instructions, so that associated terminal can execute corresponding operation according to the preset instructions, to realize Effective supervision to associated terminal.Meanwhile when prompt information state and preset status command be not identical, server end control Associated terminal persistently carries out jingle bell, the problem of to prevent the prompt task of associated terminal from terminating automatically after executing a period of time.
The present invention also provides a kind of storage mediums for being stored with computer-readable instruction, and the computer-readable instruction is by one When a or multiple processors execute, so that one or more processors execute exploitation environmental Kuznets Curves described in any of the above-described embodiment Method.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with Relevant hardware is instructed to complete by computer program, which can be stored in a computer-readable storage and be situated between In matter, the program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, storage medium above-mentioned can be The non-volatile memory mediums such as magnetic disk, CD, read-only memory (Read-Only Memory, ROM) or random storage note Recall body (Random Access Memory, RAM) etc..
It should be understood that although each step in the flow chart of attached drawing is successively shown according to the instruction of arrow, These steps are not that the inevitable sequence according to arrow instruction successively executes.Unless expressly stating otherwise herein, these steps Execution there is no stringent sequences to limit, can execute in the other order.Moreover, at least one in the flow chart of attached drawing Part steps may include that perhaps these sub-steps of multiple stages or stage are not necessarily in synchronization to multiple sub-steps Completion is executed, but can be executed at different times, execution sequence, which is also not necessarily, successively to be carried out, but can be with other At least part of the sub-step or stage of step or other steps executes in turn or alternately.
The above is only some embodiments of the invention, it is noted that for the ordinary skill people of the art For member, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications are also answered It is considered as protection scope of the present invention.

Claims (10)

1. a kind of exploitation environment control method characterized by comprising
Server end obtains the access instruction of the client user in the same local area network;The access instruction includes logging in client User account information, operational order and the target developing environmental information for being stored in server end at end;
The user right of the identity attribute information representation is judged according to preset authentication rules, whether can issue the operation Instruction and the exploitation environment characterized using the exploitation environmental information;
When the user right can issue the operational order and use the exploitation environment, the server is according to institute It states identity attribute information the access interface of the target developing environment is sent in the client, so that user is in the visitor Family end uses the target developing environment.
2. exploitation environment control method according to claim 1, which is characterized in that the authentication rules include the first power Limit, first permission are the power by the user account information access exploitation environment with the login of the client of LAN connection Limit, the range of first permission include checking permission, modification authority and/or analysis permission.
3. exploitation environment control method according to claim 2, which is characterized in that the authentication rules further include the second power Limit, second permission are by opening in the user account information access exploitation environment with the login of the client of LAN connection Feel like jelly the permission of part, second extent of competence includes access right, checks permission, modification authority and/or analysis permission.
4. exploitation environment control method according to claim 3, which is characterized in that further include saving institute according to operational order The exploitation data in exploitation software are stated, the store method of the exploitation data includes:
After performing the operational order of upload, the exploitation data are stored in first database;
Otherwise, the exploitation data are stored in the second database, wherein the first database and the second database are mutually only It is vertical.
5. exploitation environment control method according to claim 4, which is characterized in that further include in the first database Exploitation data handled, handle it is described exploitation data method include:
Identify the Table Header information of the exploitation data;
Obtain the location information of the exploitation data in destination document according to Table Header information, the destination document be stored with The exploitation data are mutually related the document of code data;
The exploitation data are directed into destination document according to the positional information and are summarized.
6. exploitation environment control method according to claim 4, which is characterized in that further include being carried out to the exploitation data It reports an error, the server end is stored with rule base, and the method to report an error to the exploitation data includes:
Identify the first parameter information of the exploitation data, first parameter information includes data type;
It is matched according to the development rule for the exploitation data for being mapped with the type in the data type and the rule base;
It is unsuccessful when matching, data error reporting is carried out to the data for not meeting development rule.
7. exploitation environment control method according to claim 4, which is characterized in that further include being carried out to the exploitation data Statistics, the method that the statistics develops data include:
It is obtained according to time shaft and performs the second parameter information of upload operation instruction, second parameter information includes client User account information and its upload exploitation data accuracy;
User job Efficiency Statistics are carried out according to the user account information of different clients and its accuracy for uploading exploitation data With accuracy ranking.
8. a kind of exploitation environment control unit characterized by comprising
It obtains module: being configured as the access instruction for the client user that execute server end obtains in the same local area network;Institute Stating access instruction includes the user account information for logging in client, operational order and the target developing environment for being stored in server end Information;
Processing module: it is configured as executing the user's power for judging the identity attribute information representation according to preset authentication rules Whether limit can issue the operational order and the exploitation environment using the exploitation environmental information characterization;
Execution module: it is configured as executing when the user right can issue the operational order and use the exploitation ring When border, the access interface of the target developing environment is sent to the client according to the identity attribute information by the server In end, so that user uses the target developing environment in the client.
9. a kind of computer equipment, which is characterized in that including memory and processor, being stored with computer in the memory can Reading instruction, when the computer-readable instruction is executed by the processor, so that the processor executes such as claim 1 to 7 Any one of exploitation environment control method described in claim the step of.
10. a kind of storage medium for being stored with computer-readable instruction, which is characterized in that the computer-readable instruction is by one Or multiple processors are when executing, so that one or more processors are executed as described in any one of claims 1 to 7 claim Exploitation environment control method the step of.
CN201811204580.0A 2018-10-16 2018-10-16 Develop environment control method, device, computer equipment and storage medium Pending CN109582291A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811204580.0A CN109582291A (en) 2018-10-16 2018-10-16 Develop environment control method, device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811204580.0A CN109582291A (en) 2018-10-16 2018-10-16 Develop environment control method, device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN109582291A true CN109582291A (en) 2019-04-05

Family

ID=65920139

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811204580.0A Pending CN109582291A (en) 2018-10-16 2018-10-16 Develop environment control method, device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN109582291A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111145897A (en) * 2019-12-26 2020-05-12 深圳开立生物医疗科技股份有限公司 Ultrasonic system configuration and maintenance method and device
CN112363708A (en) * 2020-12-04 2021-02-12 中信银行股份有限公司 Context protection method and system under Eclipse supporting tool

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20110070038A (en) * 2009-12-18 2011-06-24 에스케이 텔레콤주식회사 System, server and method for the drm enabled application development environment based on gpos
CN105324750A (en) * 2013-06-12 2016-02-10 三菱电机株式会社 Development-environment system, development-environment device, and development-environment provision method and program
CN106648762A (en) * 2016-11-30 2017-05-10 武汉斗鱼网络科技有限公司 Development environment building method and device
CN107688464A (en) * 2017-06-28 2018-02-13 上海壹账通金融科技有限公司 Software customized server, method and computer-readable recording medium
CN108628626A (en) * 2018-05-04 2018-10-09 北京小度信息科技有限公司 development environment building method, code update method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20110070038A (en) * 2009-12-18 2011-06-24 에스케이 텔레콤주식회사 System, server and method for the drm enabled application development environment based on gpos
CN105324750A (en) * 2013-06-12 2016-02-10 三菱电机株式会社 Development-environment system, development-environment device, and development-environment provision method and program
CN106648762A (en) * 2016-11-30 2017-05-10 武汉斗鱼网络科技有限公司 Development environment building method and device
CN107688464A (en) * 2017-06-28 2018-02-13 上海壹账通金融科技有限公司 Software customized server, method and computer-readable recording medium
CN108628626A (en) * 2018-05-04 2018-10-09 北京小度信息科技有限公司 development environment building method, code update method and device

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
A. BARMAN ETC.: "LDAP application development using J2EE and .NET", PROCEEDINGS OF THE IEEE INDICON 2004. FIRST INDIA ANNUAL CONFERENCE, 2004., 22 August 2005 (2005-08-22) *
陈育谦 等: "基于规则引擎的项目开发环境访问控制架构", 指挥信息系统与技术, vol. 5, no. 2, 28 April 2014 (2014-04-28) *
骆海玉;: "Dreamweaver CS5.5配置PhoneGap移动开发环境", 数字技术与应用, no. 05, 15 May 2016 (2016-05-15) *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111145897A (en) * 2019-12-26 2020-05-12 深圳开立生物医疗科技股份有限公司 Ultrasonic system configuration and maintenance method and device
CN111145897B (en) * 2019-12-26 2024-01-12 深圳开立生物医疗科技股份有限公司 Ultrasonic system configuration and maintenance method and device
CN112363708A (en) * 2020-12-04 2021-02-12 中信银行股份有限公司 Context protection method and system under Eclipse supporting tool

Similar Documents

Publication Publication Date Title
Singh et al. Accountability in the IoT: Systems, law, and ways forward
US10462128B2 (en) Verification of both identification and presence of objects over a network
CN105224869B (en) Assembly test method and device
CN106339633B (en) Method and apparatus for user's control
US10250721B2 (en) System and method for testing applications with a load tester and testing translator
CN107992771B (en) A kind of data desensitization method and device
CN101902756A (en) M2M (Machine To Machine) business platform and working method thereof
CN104579830B (en) service monitoring method and device
KR20170015968A (en) High-speed application for installation on mobile devices for permitting remote configuration of such mobile devices
CN112149109B (en) Modularized authority control management method and system
CN103646198A (en) Method, system and device for locking working region of mobile terminal
CN109328339A (en) Inter-application communication and integration proxy
CN110515827A (en) Automated testing method, device, computer equipment and storage medium
CN109582291A (en) Develop environment control method, device, computer equipment and storage medium
CN102946415A (en) Implementation method and device for local application of mobile terminal
US11373004B2 (en) Report comprising a masked value
CN107704499A (en) A kind of page jump control method and device of application program
Cimatti et al. Combining MILS with contract-based design for safety and security requirements
CN105389241A (en) Method and system for testing performance of anti-harassment tool of mobile terminal
CN106162538A (en) Long distance control system and method for mobile terminal
CN111552900A (en) Access control method and device, readable storage medium and electronic equipment
CN111177632A (en) Data acquisition method and related equipment, system and storage device thereof
CN113434217B (en) Vulnerability scanning method, vulnerability scanning device, computer equipment and medium
CN105681291A (en) Method and system for realizing unified authentication of multiple clients
CN111131152B (en) Automatic verification method and system for cross-platform remote login protection system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination