CN110879883B - Software defect repair authorization method and device, computer equipment and storage medium - Google Patents

Software defect repair authorization method and device, computer equipment and storage medium Download PDF

Info

Publication number
CN110879883B
CN110879883B CN201911205212.2A CN201911205212A CN110879883B CN 110879883 B CN110879883 B CN 110879883B CN 201911205212 A CN201911205212 A CN 201911205212A CN 110879883 B CN110879883 B CN 110879883B
Authority
CN
China
Prior art keywords
repair
defect
branch
software
application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911205212.2A
Other languages
Chinese (zh)
Other versions
CN110879883A (en
Inventor
李琳
宋玉珍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou DPTech Technologies Co Ltd
Original Assignee
Hangzhou DPTech Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou DPTech Technologies Co Ltd filed Critical Hangzhou DPTech Technologies Co Ltd
Priority to CN201911205212.2A priority Critical patent/CN110879883B/en
Publication of CN110879883A publication Critical patent/CN110879883A/en
Application granted granted Critical
Publication of CN110879883B publication Critical patent/CN110879883B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/0703Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
    • G06F11/0793Remedial or corrective actions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/955Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
    • G06F16/9566URL specific, e.g. using aliases, detecting broken or misspelled links
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/958Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Quality & Reliability (AREA)
  • Stored Programmes (AREA)

Abstract

The application provides a method and a device for repairing and authorizing software defects, computer equipment and a storage medium, wherein the method comprises the following steps: acquiring a defect repair application to be authorized in a defect management tool by using a webpage downloading tool; reading repair personnel information and repair branch information corresponding to the software defect in the defect repair application; accessing a code base where the repair branch is located in the version control system based on the repair branch information; and adding the repair personnel information to a repair branch in the code base to finish the repair authorization of the software defect. The whole authorization process is automatic operation, can authorize repair personnel of software defects in time, effectively improves repair efficiency, can reduce operation error rate, does not need to carry out secondary development on a version control system and a defect management tool, can avoid influencing the original system and tool, is also suitable for version control systems and defect management tools of different developers, and has universality.

Description

Software defect repair authorization method and device, computer equipment and storage medium
Technical Field
The present application relates to the field of software development technologies, and in particular, to a method and an apparatus for repairing and authorizing a software defect, a computer device, and a storage medium.
Background
Software defects refer to defects in software, also known as BUGs. Generally, a software developer uses a version control system for managing changes of software codes and a defect management tool for tracking and recording defects found in software tests in combination during software development.
Generally, after recording the BUG by a defect management tool, a tester submits the BUG to audit, and after determining that the BUG needs to be repaired by the related personnel through the audit, the related personnel assign a repair personnel to repair the BUG, and the repair personnel initiate a defect repair application to apply for authorization to the repair personnel in the version control system from a configuration manager, so that the repair personnel can modify the branch codes related to the BUG in a code library of the version control system to complete the repair of the BUG.
However, authorizing repair personnel requires manual operation of a configuration administrator, and when the number of BUGs is large, the manual operation affects defect repair efficiency and has the disadvantage of operation errors; or when the configuration manager is not on duty, the configuration manager cannot authorize repair personnel in time, and the defect repair efficiency is also influenced.
Disclosure of Invention
In order to overcome the problems in the related art, the application provides a method and a device for repairing and authorizing software defects, a computer device and a storage medium.
According to a first aspect of embodiments of the present application, there is provided a method for authorizing repair of a software bug, the method including:
acquiring a defect repair application to be authorized in a defect management tool by using a webpage downloading tool;
reading repair personnel information and repair branch information corresponding to the software defect in the defect repair application;
accessing a code base where a repair branch in a version control system is located based on the repair branch information;
and adding the repair personnel information to the repair branch in the code base to finish the repair authorization of the software defect.
In an exemplary embodiment, after adding the repair person information to the repair branch in the code base, the method further comprises:
and changing the state of the defect repair application into an authorized account of a configuration administrator by using an automatic testing tool, and returning the authorized account to the account of the repair personnel.
In an exemplary embodiment, before changing the state of the defect repair application, the method further includes:
writing additional information describing whether the repair branch has opened the authority into the defect repair application.
In an exemplary embodiment, before the acquiring, by using the web page downloading tool, a defect repair application to be authorized in the defect management tool, the method further includes:
requesting a URL of a defect repair application list to be authorized in a defect management tool by using a web browser;
and acquiring the defect repair application list to be authorized.
In an exemplary embodiment, the method is performed according to a set period.
In an exemplary embodiment, the method is implemented based on a Linux scripting language.
In an exemplary embodiment, the Linux scripting language includes any one of: shell, Python.
According to a second aspect of the embodiments of the present application, there is provided a device for authorizing repair of a software bug, the device including:
the system comprises an acquisition module, a fault detection module and a fault detection module, wherein the acquisition module is used for acquiring a fault repairing application to be authorized in a fault management tool;
the reading module is used for reading the repair personnel information and the repair branch information corresponding to the software defect in the defect repair application;
the access module is used for accessing the code base where the repair branch is located based on the repair branch information;
and the adding module is used for adding the repair personnel information to the repair branch in the code base so as to finish the repair authorization of the software defect.
According to a third aspect of the embodiments of the present application, there is provided a computer device, including a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein the processor implements the steps of the method for authorizing repair of a software bug described in any of the above embodiments when executing the program.
According to a fourth aspect of embodiments of the present application, there is provided a computer-readable storage medium, on which a computer program is stored, which when executed by a processor, implements the steps of the method for authorizing a repair of a software bug described in any of the embodiments above.
The technical scheme provided by the embodiment of the application can have the following beneficial effects:
in the technical scheme, a network downloading tool is used for automatically acquiring a defect repair application to be authorized in a configuration administrator account of a defect management tool, information of a repair person corresponding to a software defect and a branch of the software defect in a source code, which are related to the defect repair application, is read, a branch path can be acquired according to the branch information, a code library to which the branch of the software defect belongs can be accessed according to the branch path, and information of the repair person repairing the branch is added in the code library, so that the repair person is given a repair right to the branch. The whole authorization process is automatic operation, can authorize repair personnel of software defects in time, effectively improves repair efficiency, can reduce operation error rate, does not need to carry out secondary development on a version control system and a defect management tool, can avoid influencing the original system and tool, is also suitable for version control systems and defect management tools of different developers, and has universality.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the application.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this application, illustrate embodiments consistent with the present application and together with the description, serve to explain the principles of the application.
Fig. 1 is a flowchart illustrating a method for authorizing a software bug to be repaired according to an exemplary embodiment of the present application.
Fig. 2 is a block diagram illustrating a configuration of a device for repairing a software bug according to an exemplary embodiment of the present application.
Fig. 3 is a block diagram illustrating a computer device according to an exemplary embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present application, as detailed in the appended claims.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in this application and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items.
It is to be understood that although the terms first, second, third, etc. may be used herein to describe various information, such information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope of the present application. The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination", depending on the context.
The following describes a software bug repair authorization method, apparatus, computer device, and storage medium in detail with reference to the accompanying drawings. The features of the following examples and embodiments may be combined with each other without conflict.
The method can be applied to computer equipment provided with a version control system, wherein the version control system comprises at least one code library, the code library is used for storing source codes of various kinds of software, and can access another or a plurality of computer equipment provided with a defect management tool through the computer equipment, the computer equipment provided with the version control system can be a Linux operating system server, and the computer equipment provided with the defect management tool can be a Windows operating system server or a Linux operating system server. The method may also be applied to a computer device having a version control system and a defect management tool installed therein. The method can be executed by a script language. Fig. 1 is a flowchart illustrating a method for authorizing a software bug to be repaired according to an exemplary embodiment of the present application. As shown in fig. 1, the method for authorizing the repair of a software bug includes the following steps 101 to 104:
step 101, acquiring a defect repair application to be authorized in a defect management tool by using a webpage downloading tool.
In step 101, a web page downloading tool is used to download a defect repair application to be authorized in a web page of a defect management tool. When a repairer needs to repair the defect, a defect repair application is initiated in the defect management tool and submitted to a configuration manager for approval, the configuration manager authorizes the repairer to repair the software defect, and the repairer can acquire the write permission of the code branch where the software defect is located, so that the code branch is modified. The defect repair application to be authorized obtained in this step may indicate that the current processing state of the defect repair application to be authorized is to wait for the configuration administrator to approve the authorization, or to obtain the defect repair application to be authorized in an account page of a defect management tool of the configuration administrator.
In one possible embodiment of the present application, before acquiring a defect repair application to be authorized in a defect management tool by using a web page downloading tool, the method further includes: requesting a URL (Uniform Resource Locator) of a defect repair application list to be authorized in a defect management tool by using a web browser; and acquiring the defect repair application list to be authorized. The web browser can request to access the defect repair application list to be authorized, and then one defect repair application to be authorized is obtained from the defect repair application list to be processed.
In a possible implementation manner of the present application, the URL of the defect repair application list to be authorized may be an address used for querying the defect repair application list to be authorized in the defect management tool, and the defect repair application to be authorized, which is recorded in the current defect management tool, may also be queried without logging in an account of a related person. Therefore, the defect repairing application to be authorized can be obtained more conveniently, and the operation convenience is improved.
In another possible embodiment of the present application, the URL of the defect repair application list to be authorized may also be a page address in the configuration administrator account of the defect management tool, where the defect repair application list to be authorized is displayed. When requesting a URL of a defect repair application list to be authorized in a defect management tool, an account of a configuration administrator may be already in a login state; or the method can be that firstly, a web browser is used for requesting a URL of a fault management tool login page, a configuration administrator account is logged in according to a locally stored account number and an authentication password of the configuration administrator, and then the URL of a fault repair application list to be authorized in the configuration administrator account is requested.
In a possible embodiment of the present application, the web page downloading tool may be a tool supporting web page downloading, such as curl (command line Uniform Resource locator) or Python, and the present application is not limited in particular.
And 102, reading repair personnel information and repair branch information corresponding to the software defect in the defect repair application.
In step 102, the repair person information refers to information related to a person who repairs the software defect involved in the defect repair application, and includes an account number of the repair person in the version control system, and may also include other information such as a name, a contact way, a post, a department in which the repair person is located, a group, and the like of the repair person. The repair branch refers to a code branch where the software defect is located in the source code, the repair of the software defect is usually to modify the located code branch, and the modification operation may be to delete the code or to merge the code. The repair branch information refers to information of a code branch where the software defect is located in the source code, and the repair branch information may include a code branch path, and the code base to which the code branch belongs and the position of the code branch in the code base may be known according to the code branch path.
And 103, accessing a code base in which the repair branch in the version control system is located based on the repair branch information.
In step 103, according to the obtained information of the repair branch, a code library where the repair branch is located in the version control system may be obtained, and the code library may be accessed according to the information of the repair branch.
And step 104, adding the repair personnel information to the repair branch in the code base to finish the repair authorization of the software defect.
In step 104, the code library includes an authority configuration file, and authority configuration information of each code branch of the code library may be stored, where the authority configuration information may include information of the code branch, information of persons having authority, authority type, and the like. The configuration administrator can add the authority of the personnel to each code branch by modifying the authority configuration information so as to complete the authorization of the personnel. The specific authority types can comprise read authority and write authority, wherein the read authority indicates that relevant personnel can read the code branch, and the write authority indicates that relevant personnel can modify the code branch. The method comprises the steps that information of a repairing person is filled in a repairing branch in an authority configuration file of a code base, and the repairing person is given writing authority to the repairing branch, so that the repairing person can modify the repairing branch, and software defects are overcome.
In a possible embodiment of the present application, the repair branch is registered in an authority configuration file of the code library. In this way, the code branches registered in the authority configuration file of the code base and registered according to the specified syntax requirement can perform authority configuration through the authority configuration file. Therefore, whether the authority can be configured for related personnel through the authority configuration file can be determined by judging whether the repair branch is registered, and the management of codes is facilitated.
In one possible embodiment of the present application, the method is implemented based on a Linux script language. Therefore, the automatic operation of the software defect repairing authorization method can be realized through the script language, the secondary development of a version control system and a defect management tool is not needed, the influence on the original system and the original tool can be avoided, the method is also suitable for the version control system and the defect management tool of different developers, and the method has universality. In one possible embodiment of the present application, the Linux script Language may include, but is not limited to, Shell, Python, Perl (Practical Extraction and Report Language).
In one possible implementation manner of the present application, after the authorization of one defect repair application is completed, other defect repair applications to be authorized may be continuously processed according to the defect repair application list to be authorized.
In one possible embodiment of the present application, a set period may be set to periodically execute the method, or the method is executed according to the set period, and a defect repair application to be authorized in an account of a configuration administrator is timely processed, so that repair efficiency is improved. In one possible implementation manner of the present application, the method may be executed according to a set period based on a Linux Cron planning task.
In one possible embodiment of the present application, after adding the repair person information to the repair branch in the code library, the method further includes: and changing the state of the defect repair application into an authorized account of a configuration administrator by using an automatic testing tool, and returning the authorized account to the account of the repair personnel. The defect repair application comprises configuration administrator information, an account number of the configuration administrator can be obtained through the script, the locally stored matched configuration administrator account number and the authentication password are found through inquiry, the account of the configuration administrator is logged in, the corresponding defect repair application is obtained, the state of the defect repair application is changed, and the defect repair application is returned to the account of the corresponding repair personnel. Therefore, the authorized defect repairing application can be returned to the account of the repairing personnel in time, so that the repairing personnel can know the authority granted to the repairing personnel to repair the software defect, the modification operation can be automatically and timely carried out on the version control system, and the software defect can be timely solved. In one possible implementation manner of the present application, the automated testing tool may be a Selenium automated testing tool, which may be directly run on a web browser and support compatibility with multiple web browsers, and may also be another automated testing tool such as WebDriver, Phoenix Framework, and the like.
In one possible embodiment of the present application, before changing the state of the defect repair application, the method further includes: writing additional information describing whether the repair branch has opened the authority into the defect repair application. In this way, the repair person can quickly know whether the write authority of the repair branch is granted through the additional information of the returned defect repair application.
In a possible embodiment of the present application, writing additional information describing whether the repair branch has opened the right in the defect repair application, and changing the state of the defect repair application is implemented based on Python, Selenium, and WebDriver, thereby implementing automation. The method comprises the steps of positioning Elements of a defect repair application webpage By using a WebDriver module, positioning the Elements By using a Find Element command of a Selenium or a Find Elements command and By positioning, logging in a configuration manager account of a defect management tool according to a locally stored account number and an authentication password of a configuration manager through a Python script, and writing additional information and changing the state of the defect repair application in the defect repair application displayed By the configuration manager account. In another possible embodiment of the present application, if the account of the configuration administrator of the defect management tool is already in the login state, the login operation does not need to be performed through the Python script.
In the method provided by this embodiment, a network downloading tool is used to automatically obtain a to-be-authorized defect repair application in a configuration administrator account of a defect management tool, read information of a repair person corresponding to a software defect and a branch of the software defect in a source code, which are related to the defect repair application, obtain a branch path according to the branch information, access a code library to which the branch of the software defect belongs according to the branch path, and add information of the repair person repairing the branch in the code library, so that the repair person is given a repair right to the branch. The whole authorization process is automatic operation, can authorize repair personnel of software defects in time, effectively improves repair efficiency, can reduce operation error rate, does not need to carry out secondary development on a version control system and a defect management tool, can avoid influencing the original system and tool, is also suitable for version control systems and defect management tools of different developers, and has universality.
Fig. 2 is a block diagram illustrating a structure of an apparatus for authorizing repair of a software bug according to an exemplary embodiment of the present application. As shown in fig. 2, the apparatus 20 for authorizing repair of a software bug includes:
an obtaining module 210, configured to obtain a defect repair application to be authorized in a defect management tool;
a reading module 220, configured to read repair staff information and repair branch information corresponding to the software defect in the defect repair application;
an accessing module 230, configured to access, based on the information of the repair branch, a code library where the repair branch is located;
an adding module 240, configured to add the repair person information to the repair branch in the code base, so as to complete repair authorization of the software defect.
In an exemplary embodiment of the present application, the apparatus further comprises
And the changing module is used for changing the state of the defect repair application into an authorized state in an account of a configuration administrator by using an automatic testing tool after the repair personnel information is added to the repair branch in the code base, and returning the authorized state to the account of the repair personnel.
In an exemplary embodiment of the present application, the apparatus further includes:
and the additional module is used for writing additional information describing whether the repair branch has opened the authority into the defect repair application before the state of the defect repair application is changed.
In an exemplary embodiment of the present application, the apparatus further includes:
the request module is used for requesting the URL of a defect repair application list to be authorized in the defect management tool by using a web browser before acquiring the defect repair application to be authorized in the defect management tool by using a web downloading tool;
the obtaining module is further configured to obtain the defect repair application list to be authorized.
In an exemplary embodiment of the present application, the method is performed according to a set period.
In an exemplary embodiment of the present application, the operation execution of the apparatus is implemented based on a Linux script language.
In an exemplary embodiment of the present application, the Linux script language includes any one of: shell, Python.
The implementation process of the functions and actions of each module in the above device is specifically described in the implementation process of the corresponding step in the above method, and is not described herein again.
For the device embodiments, since they substantially correspond to the method embodiments, reference may be made to the partial description of the method embodiments for relevant points. The above-described embodiments of the apparatus are merely illustrative, wherein the modules described as separate parts may or may not be physically separate, and the parts displayed as modules may or may not be physical modules, may be located in one place, or may be distributed on a plurality of network modules. Some or all of the modules can be selected according to actual needs to achieve the purpose of the scheme of the application. One of ordinary skill in the art can understand and implement it without inventive effort.
Fig. 3 is a block diagram illustrating a structure of a computer device according to an exemplary embodiment of the present application. As shown in fig. 3, the computer device includes a memory, a processor and a computer program stored in the memory and executable on the processor, wherein the processor executes the program to implement the following steps: acquiring a defect repair application to be authorized in a defect management tool by using a webpage downloading tool;
reading repair personnel information and repair branch information corresponding to the software defect in the defect repair application;
accessing a code base where a repair branch in a version control system is located based on the repair branch information;
and adding the repair personnel information to the repair branch in the code base to finish the repair authorization of the software defect.
The present application further provides a computer readable storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of:
acquiring a defect repair application to be authorized in a defect management tool by using a webpage downloading tool;
reading repair personnel information and repair branch information corresponding to the software defect in the defect repair application;
accessing a code base where a repair branch in a version control system is located based on the repair branch information;
and adding the repair personnel information to the repair branch in the code base to finish the repair authorization of the software defect.
Embodiments of the present application may take the form of a computer program product embodied on one or more readable media having program code embodied therein, including but not limited to disk storage, CD-ROM, optical storage, and the like. Computer-usable readable media, which include both non-transitory and non-transitory, removable and non-removable media, may implement the information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer readable media include, but are not limited to: phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), erasable programmable read only memory (EEPROM), flash memory or other memory technologies, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic tape storage or other magnetic storage devices, or any other non-transmission medium, may be used to store information that may be accessed by a computing device.
The foregoing description of specific embodiments of the present application has been presented. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.
Other embodiments of the present application will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This application is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the application and including such departures from the present disclosure as come within known or customary practice within the art to which the invention pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the application being indicated by the following claims.
It will be understood that the present application is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the application is limited only by the appended claims.
The technical features of the embodiments described above may be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the embodiments described above are not described, but should be considered as within the scope of the present disclosure as long as there is no contradiction between the combinations of the technical features.
The above description is only exemplary of the present application and should not be taken as limiting the present application, as any modification, equivalent replacement, or improvement made within the spirit and principle of the present application should be included in the scope of protection of the present application.

Claims (10)

1. A method for authorizing the repair of a software bug, the method comprising:
automatically acquiring a defect repair application to be authorized in a defect management tool by using a webpage downloading tool;
reading repair personnel information and repair branch information corresponding to the software defect in the defect repair application;
accessing a code base where a repair branch in a version control system is located based on the repair branch information;
and adding the repair personnel information to the repair branch in the code base to finish automatic repair authorization of the software defect.
2. The method for authorizing repair of a software bug according to claim 1, wherein after adding the repair person information to the repair branch in the code base, the method further comprises:
and changing the state of the defect repair application into an authorized account of a configuration administrator by using an automatic testing tool, and returning the authorized account to the account of the repair personnel.
3. The method of claim 2, further comprising, before changing the status of the bug repair application:
writing additional information describing whether the repair branch has opened the authority into the defect repair application.
4. The method for authorizing repair of software bug as claimed in claim 1, further comprising, before automatically acquiring the bug repair application to be authorized in the bug management tool by using the web page downloading tool:
requesting a URL of a defect repair application list to be authorized in a defect management tool by using a web browser;
and acquiring the defect repair application list to be authorized.
5. A method for authorizing the repair of software bugs according to claim 1, wherein the method is performed on a set periodic basis.
6. The method for authorizing the repair of software bugs according to any one of claims 1 to 5, wherein the method is implemented based on the Linux scripting language.
7. The method for authorizing repairing software bugs according to claim 6, wherein the Linux scripting language includes any one of the following: shell, Python, Perl.
8. An apparatus for authorizing the repair of a software bug, the apparatus comprising:
the acquisition module is used for automatically acquiring a defect repair application to be authorized in a defect management tool;
the reading module is used for reading the repair personnel information and the repair branch information corresponding to the software defect in the defect repair application;
the access module is used for accessing the code base where the repair branch is located based on the repair branch information;
and the adding module is used for adding the repair personnel information to the repair branch in the code base so as to finish automatic repair authorization of the software defect.
9. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the steps of the method for authorizing the repair of a software bug as claimed in any one of claims 1 to 7 when executing the program.
10. A computer-readable storage medium, on which a computer program is stored, which program, when being executed by a processor, is adapted to carry out the steps of the method for authorizing the repair of a software bug of any one of claims 1 to 7.
CN201911205212.2A 2019-11-29 2019-11-29 Software defect repair authorization method and device, computer equipment and storage medium Active CN110879883B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911205212.2A CN110879883B (en) 2019-11-29 2019-11-29 Software defect repair authorization method and device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911205212.2A CN110879883B (en) 2019-11-29 2019-11-29 Software defect repair authorization method and device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN110879883A CN110879883A (en) 2020-03-13
CN110879883B true CN110879883B (en) 2021-05-28

Family

ID=69729776

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911205212.2A Active CN110879883B (en) 2019-11-29 2019-11-29 Software defect repair authorization method and device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN110879883B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113448830B (en) * 2020-03-27 2024-06-18 北京沃东天骏信息技术有限公司 Method and device for managing software information

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100347682C (en) * 2004-12-08 2007-11-07 上海科泰世纪科技有限公司 Automatic detection building method
CN103166911B (en) * 2011-12-09 2017-06-13 阿里巴巴集团控股有限公司 A kind of version management server right management method and equipment
CN105320512B (en) * 2014-07-30 2019-08-06 腾讯科技(深圳)有限公司 Distribute the method and device of trunk permission
US10664601B2 (en) * 2016-10-25 2020-05-26 Nanjing University Method and system automatic buffer overflow warning inspection and bug repair
CN107483523A (en) * 2016-11-02 2017-12-15 深圳市波普安创技术有限公司 Legal the firmware debugging system and its method of information safety devices
CN107292590A (en) * 2017-07-11 2017-10-24 郑州云海信息技术有限公司 A kind of method and device based on cloud management platform construction business approval flow
CN107463501A (en) * 2017-08-11 2017-12-12 四川长虹电器股份有限公司 A kind of defect management system for prompting and based reminding method
CN107622343A (en) * 2017-08-31 2018-01-23 郑州云海信息技术有限公司 A kind of smart office system and office procedure based on Internet of Things
CN107579865A (en) * 2017-10-18 2018-01-12 北京奇虎科技有限公司 Right management method, the apparatus and system of distributed code server
WO2019094933A1 (en) * 2017-11-13 2019-05-16 The Charles Stark Draper Laboratory, Inc. Automated repair of bugs and security vulnerabilities in software
CN109460252B (en) * 2018-09-25 2023-10-20 中国平安人寿保险股份有限公司 Configuration file processing method and device based on git and computer equipment
CN110231937A (en) * 2019-05-20 2019-09-13 平安科技(深圳)有限公司 Script defects scanning method, device, computer equipment and storage medium

Also Published As

Publication number Publication date
CN110879883A (en) 2020-03-13

Similar Documents

Publication Publication Date Title
US9411710B2 (en) Automated regression test case selector and black box test coverage tool for product testing
US20080086660A1 (en) Test data management
US9110948B2 (en) Relative performance prediction of a replacement database management system (DBMS)
US20120233598A1 (en) Completing functional testing
US9513997B2 (en) Test data management
US11544050B1 (en) Software patch automation
CN113051155A (en) Control system and control method of automatic test platform
CN111124871A (en) Interface test method and device
CN112260885B (en) Industrial control protocol automatic test method, system, device and readable storage medium
CN110879883B (en) Software defect repair authorization method and device, computer equipment and storage medium
US11704114B2 (en) Data structures for managing configuration versions of cloud-based applications
US11966732B2 (en) Data structures for managing configuration versions of cloud-based applications
US10680901B2 (en) Configuration management in a multisystem environment
CN116842298A (en) Data read-write management method and device, storage medium and electronic equipment
CN112486536A (en) Container-based application program upgrading method, device and medium
CN116991713A (en) Method, device, computer equipment and storage medium for executing use cases across environments
CN110674038A (en) Method and device for classifying error information in software test
CN115525545A (en) Docker-based automatic testing method, system, equipment and medium
CN114238143A (en) ES data number making method, system and storage medium for interface test
US10437710B2 (en) Code coverage testing utilizing test-to-file maps
CN106407109A (en) Automatic test method and device for realizing popularization information control
CN111143327A (en) Data processing method and device
CN116643980A (en) Automatic testing method, system and storage medium based on priority execution
CN114116483A (en) Software version testing method and device, storage medium and processor
CN115858343A (en) Service scene testing method and device, storage medium and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant