WO2020232883A1 - 脚本缺陷扫描方法、装置、计算机设备和存储介质 - Google Patents
脚本缺陷扫描方法、装置、计算机设备和存储介质 Download PDFInfo
- Publication number
- WO2020232883A1 WO2020232883A1 PCT/CN2019/103156 CN2019103156W WO2020232883A1 WO 2020232883 A1 WO2020232883 A1 WO 2020232883A1 CN 2019103156 W CN2019103156 W CN 2019103156W WO 2020232883 A1 WO2020232883 A1 WO 2020232883A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- code
- script
- inspection
- read
- defect
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3604—Software analysis for verifying properties of programs
- G06F11/3608—Software analysis for verifying properties of programs using formal methods, e.g. model checking, abstract interpretation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/30—Creation or generation of source code
- G06F8/33—Intelligent editors
Definitions
- This application relates to a script defect scanning method, device, computer equipment and storage medium.
- the inventor realizes that, when writing according to the software code, it is necessary to check the standardization of the submitted code.
- many checkpoints need to be checked during the inspection process to ensure the standardization of the submitted code. Due to the large number of checkpoints, the inspection takes a long time and the accuracy is low.
- a script defect scanning method is provided.
- a method for scanning script defects executed by the server, including:
- a script defect scanning device comprising:
- the script obtaining module is used to obtain the submitted code script when it is detected that the code script submission button in the code editing page is clicked;
- the checkpoint obtaining module is configured to obtain a preset checkpoint corresponding to the code identifier according to the code identifier in the code script;
- the task flow generation module is used to generate an inspection task flow corresponding to the obtained preset inspection point
- the task reading module is used to read the inspection tasks according to the task sequence in the inspection task flow.
- the code scanning module is used to scan the code script according to the read inspection task to obtain the defect scanning result corresponding to the read inspection task.
- a computer device including a memory and one or more processors, the memory stores computer readable instructions, when the computer readable instructions are executed by the processor, the one or more processors execute The following steps: when it is detected that the code script submission button in the code editing page is clicked, obtain the submitted code script;
- One or more non-volatile computer-readable storage media storing computer-readable instructions.
- the one or more processors perform the following steps: A read storage medium having computer-readable instructions stored thereon, and when the computer-readable instructions are executed by a processor, the following steps are implemented:
- Fig. 1 is an application scenario diagram of a script defect scanning method according to one or more embodiments
- FIG. 2 is a schematic flowchart of a script defect scanning method according to one or more embodiments
- FIG. 3 is a schematic flowchart of steps of extracting code scripts according to one or more embodiments
- FIG. 4 is a schematic flowchart of steps of generating an inspection task flow according to one or more embodiments
- FIG. 5 is a schematic flowchart of steps for obtaining defect scanning results according to one or more embodiments
- Fig. 6 is a schematic flowchart of the steps of sending a code defect notification according to one or more embodiments
- FIG. 7 is a schematic flowchart of steps of modifying a code script according to one or more embodiments.
- FIG. 8 is a structural block diagram of a script defect scanning device according to one or more embodiments.
- Fig. 9 is an internal structure diagram of a computer device according to one or more embodiments.
- the script defect scanning method provided by this application can be applied to the application environment as shown in FIG. 1.
- the terminal 102 communicates with the server 104 through the network through the network.
- the terminal 102 may be, but is not limited to, various personal computers, notebook computers, smart phones, tablet computers, and portable wearable devices.
- the server 104 may be implemented as an independent server or a server cluster composed of multiple servers.
- a script management platform runs on the server 104.
- a script defect scanning method is provided. Taking the method applied to the server in FIG. 1 as an example for description, the method includes the following steps:
- the terminal displays a code script editing page, the code script editing page has code entered, and the code script editing page is provided with a code script submit button.
- the terminal detects the click operation of the code script submission button, it obtains the code in the code script editing page, generates the code script according to the obtained code, and submits the code script to the server.
- the server receives the code script submitted by the terminal, and stores the submitted code script in a database corresponding to the code script management platform.
- the server receives the code submission request sent by the terminal, parses the code submission request, extracts the developer account and code script identifier in the code submission request through the analysis, and generates code pull based on the developer account and code script identifier Request, send the code pull request to the terminal logged in with the developer account.
- the terminal parses the code pull request, extracts the developer account and code script identifier in the code pull request by parsing, and verifies the developer account. After the verification is passed, query and code script Identify the corresponding code script, and send the queried code script to the server.
- the server receives the code script returned by the terminal logged in with the developer account according to the code pull request.
- the preset check point is a preset check position in the code script that needs to be checked.
- the server sets a number of preset checkpoints for checking code scripts.
- the server obtains the code script, it determines the code identifier in the code script, and queries the preset checkpoint corresponding to the code identifier.
- Different code identifiers correspond to different preset check points.
- the code identifier includes the function class name, and different function class names correspond to different preset checkpoints.
- the server periodically obtains the submission records of the submitted code scripts, filters the submission records based on the time of the submission record after the last time the code script was obtained, the corresponding submission records, and extracts the code in the selected code submission records Identification, according to the extracted code identification to obtain the newly added code script.
- the server After the server obtains the preset checkpoints, it queries the corresponding inspection instructions of each preset checkpoint, creates the inspection task corresponding to each preset checkpoint according to each checkpoint, and compares the created checkpoints according to the inspection order of the preset checkpoints.
- the inspection tasks are arranged to obtain the inspection task flow.
- the inspection tasks in the inspection task flow are arranged according to the inspection sequence of the preset inspection points as the task sequence.
- the server reads the inspection tasks from the inspection task flow according to the order of tasks in the inspection task flow.
- S210 Scan the code script according to the read inspection task to obtain a defect scanning result corresponding to the read inspection task.
- the server when the server reads the inspection task, it extracts the inspection instruction from the read inspection task, extracts the defect inspection data according to the inspection instruction, and scans the code script based on the defect inspection data to obtain the defects of each preset inspection point Scan results.
- the server generates a script defect report based on the defect scan result.
- the defect scan result is information indicating whether there is a defect.
- the preset checkpoint corresponding to the code identifier is obtained, and the inspection task flow corresponding to the obtained preset checkpoint is generated, and the inspection task
- the flow includes inspection tasks corresponding to each preset inspection point. There is no need to manually check the submitted code scripts.
- the inspection tasks are directly read from the inspection task flow in the order of tasks, and the code scripts are scanned according to the read inspection tasks to obtain the corresponding scanning results of each preset checkpoint. Generate script defect reports to improve the efficiency of checking code script defects.
- S202 specifically includes a step of extracting a code script, and this step specifically includes the following content:
- the submitted code script is composed of multiple script parts, and each script part It can be submitted separately.
- the script part identifier of the submitted script part and the script submission time are stored correspondingly.
- the server obtains the script submission time corresponding to each script part identifier from the stored script part identifiers and script submission time.
- S304 Determine the script part identifier corresponding to the script submission time within the preset time period.
- the server will determine whether the script submission time corresponding to each script identifier belongs to a preset time period, filter the script part identifiers corresponding to the script submission time within the preset time period, and the selected script part identifier is the preset time
- the identifier of the part of the script submitted to within the segment can be a recent time period or a designated time period.
- the submitted code script is stored in the code script library in the server.
- the server queries the code script library for the script part corresponding to the determined script part identifier. Extract the queried script part, and use the extracted script part as the obtained code script.
- the script parts submitted at the script submission time within the preset time period are filtered according to the script submission time, and the code script can be checked without waiting for the complete code script to be submitted.
- the script part can be checked separately, which improves the checking efficiency of the code script.
- S206 includes a step of generating an inspection task flow, which specifically includes the following content:
- the inspection node tree is constructed according to the inspection application scope level between preset checkpoints, each node of the inspection node tree corresponds to an inspection task, and each inspection task corresponds to a preset checkpoint.
- the inspection scope level is the level of the inspection scope of the preset checkpoint, and the inspection scope level includes at least one of full inspection of code script files, inspection of designated script parts, and inspection of a type of code in designated script parts.
- S404 Create an inspection task corresponding to the inspection node in the traversed inspection node tree.
- the server reads the inspection information in the traversed inspection nodes for the inspection nodes in the inspection node tree in the inspection node tree, and creates an inspection task corresponding to the inspection node according to the read inspection information.
- the inspection information may include inspection instructions.
- S406 Construct an inspection task flow according to the created inspection task according to the traversal sequence.
- the server traverses the inspection nodes in the inspection node tree, it records the traversal order, arranges the created inspection tasks according to the recorded traversal order, and forms an inspection task flow according to the arranged inspection tasks.
- the inspection tasks are created according to the inspection nodes traversed, and the inspection task flow is formed according to the traversal sequence and the created inspection tasks. Improve the generation efficiency of the inspection task flow.
- S210 specifically includes a step of obtaining a defect scan result, and this step specifically includes the following content:
- the server analyzes the read inspection task, and reads the inspection type from the read inspection task through the analysis.
- the check type is a type for checking the submitted code script, and the check type may specifically include at least one of a parameter check type, a name specification check type, and a code specification check type.
- the check type is the name specification check type
- query the name specification check file corresponding to the name check type in the check task identify the function name in the code script, and perform a specification check on the identified function name according to the name specification check file to obtain the name Standard inspection result
- name standard inspection result is the defect scan result corresponding to the inspection task.
- the inspection type is the code specification inspection type
- query the code specification inspection file corresponding to the code specification inspection type in the inspection task and perform the standard inspection on the code in the code script according to the code specification inspection file to obtain the code specification inspection result and code specification inspection
- the result is the defect scan result corresponding to the inspection task.
- the server parses and obtains that the inspection type is the parameter inspection type, it extracts the inspection file identifier in the inspection task, and queries the specification inspection file corresponding to the extracted inspection file identifier.
- the specification check file includes the specification information about the parameters.
- S506 Generate a parameter call instruction according to the specification check file.
- the server encapsulates the parameter type in the specification check file, and generates a parameter call instruction through the encapsulation.
- the parameter call instruction is used to obtain the instruction of the configuration parameter of the code script.
- the server extracts the parameter type in the parameter call instruction, queries the configuration parameter matching the parameter type in the code script, and obtains the queried configuration parameter.
- the server obtains the parameter configuration file corresponding to the code script, queries the configuration parameter matching the parameter type in the parameter call instruction from the parameter configuration file, and obtains the queried configuration parameter.
- S510 Scan and inspect the acquired configuration parameters according to the specification inspection file, and obtain a defect scan result corresponding to the read inspection task.
- the server scans and checks the acquired configuration parameters according to the specification inspection file, extracts the specification configuration parameters in the specification inspection, compares the specification configuration parameters with the acquired configuration parameters, determines the defect scan results of the configuration parameters, and scans according to the determined defects As a result, a script defect report is generated.
- the configuration parameters of the code script are scanned and inspected according to the specification inspection file corresponding to the inspection task to obtain the defect scan result corresponding to the read inspection task, According to the designated inspection type, the code script is scanned for defects, which improves the accuracy of defect scanning.
- the server analyzes the defect scan result, determines the code defect in the defect scan result through the analysis, and extracts the code position corresponding to the determined code defect from the defect scan result.
- the code position is the position of the code defect in the code script.
- the developer account corresponding to each script part identifier is stored in the server. After extracting the code location, the server determines the script part identifier corresponding to the extracted code location, and queries the developer account corresponding to the determined script part identifier.
- S606 Generate a code defect notification corresponding to the developer account.
- the server encapsulates the code defect and the code location, and generates a code defect notification corresponding to the developer account through the encapsulation.
- the code defect notification may also include the script part identifier of the script part to which the code location belongs.
- S608 Send the code defect notification to the terminal logged in with the developer account.
- the server After the server generates the code defect notification, it obtains the terminal identifier corresponding to the terminal logged in with the developer account, and sends the code defect notification to the terminal logged in with the developer account according to the identifier.
- the developer account can be determined according to the code position corresponding to the code defect in the defect scan result, the code defect notification corresponding to the developer account is generated, and the code defect notification is sent to the terminal logged in with the developer account to confirm the development The person understands the code defects in the development.
- a step of modifying the code script is further included, and this step specifically includes the following content:
- S702 Receive the terminal logged in with the developer account, and according to the code modification instruction returned by the code defect notification.
- the terminal logged in with the developer account extracts the script part identifier in the code defect notification, enters modification information for the code defect in the script part identifier, and generates code modification instructions based on the modification information and code modification location To send the code modification instruction to the server.
- the server receives the code modification instruction sent by the terminal logged in with the developer account.
- the server parses the code modification instruction, and obtains the modification information and the code modification location through the analysis.
- S706 Determine a part of the code script corresponding to the code modification position.
- the server determines the code script to which the code modification location belongs, determines a part of the code script corresponding to the code modification location in the code script, and extracts the determined part of the code script.
- S708 Modify part of the code script according to the modification information.
- the server extracts the modified code in the modification information, determines the code to be modified in the part of the code script, replaces the code to be modified with the modified code, and resubmits the modified part of the code script.
- part of the code script after receiving the code modification instruction sent by the terminal logged in with the developer account, part of the code script can be modified according to the code modification location and modification information in the code modification instruction, which improves the convenience of modifying the code script To ensure the correctness of the submitted code script.
- the script defect scanning method further includes: receiving a checkpoint adding instruction; extracting permission verification information in the checkpoint adding instruction; verifying the permission verification information by adding the permission information of the checkpoint in the permission configuration table; After the authorization verification information is verified, the script specification information in the checkpoint addition instruction is extracted; the checkpoint is created according to the script specification information.
- the server receives the checkpoint addition instruction, parses the checkpoint addition instruction, and obtains authority verification information and script specification information through the analysis.
- the server extracts the permission configuration table, adds permission information according to the checkpoints stored in the permission configuration table to verify the permission verification information. After the permission verification information is verified, it creates a checkpoint based on the script specification information and adds the created checkpoint to the check Click in the library.
- the checkpoint is created according to the script specification information in the checkpoint addition instruction, and the checkpoint can be added to ensure that the checkpoint is compatible with the submitted code script Accuracy.
- a script defect scanning device 800 which includes: a script acquisition module 802, a checkpoint acquisition module 804, a task flow generation module 806, a task reading module 808, and code scanning Module 810, where:
- the script obtaining module 802 is used to obtain the submitted code script when it is detected that the code script submission button in the code editing page is clicked.
- the checkpoint obtaining module 804 is configured to obtain a preset checkpoint corresponding to the code identifier according to the code identifier in the code script.
- the task flow generating module 806 is configured to generate an inspection task flow corresponding to the obtained preset inspection point.
- the task reading module 808 is configured to read the inspection tasks according to the task sequence in the inspection task flow.
- the code scanning module 810 is configured to scan the code script according to the read inspection task to obtain the defect scanning result corresponding to the read inspection task.
- the script obtaining module 802 is further configured to read the script submission time corresponding to each script part identifier when it is detected that the code script submission button in the code editing page is clicked; The script submission time corresponds one-to-one; the script part identifier corresponding to the script submission time within the preset time period is determined; the script part corresponding to the determined script part identifier is extracted from the code script library.
- the task flow generation module 806 is also used to traverse the check nodes in the check node tree; the check node tree is constructed in order according to the size of the preset check point's inspection scope level; The inspection tasks corresponding to the inspection nodes in the traversed inspection node tree; according to the traversal sequence, the inspection task flow is formed according to the created inspection tasks.
- the code scanning module 810 is also used to parse the inspection type of the inspection task that is read; when the inspection type is a parameter inspection type, query the specification inspection file corresponding to the inspection task; generate parameters based on the specification inspection file Invoking instructions; obtaining configuration parameters of the code script according to the parameter invoking instructions; scanning and checking the obtained configuration parameters according to the specification inspection file, and obtaining when the code script submit button in the code editing page is detected when the code script submit button is clicked.
- the script defect scanning device 800 further includes a notification sending module and a code modification module.
- the notification sending module is also used to extract the code location corresponding to the code defect in the defect scan result; query the developer account corresponding to the extracted code location; generate the code defect notification corresponding to the developer account; send the code defect notification to the developer The terminal where the user account is logged in.
- the code modification module is also used to receive the terminal logged in with the developer's account, according to the code modification instruction returned by the code defect notification; extract the modification information and code modification location in the code modification instruction; determine the part of the code script corresponding to the code modification location; follow the modification information Modify some code scripts.
- the script defect scanning device 800 further includes a checkpoint creation module.
- the checkpoint creation module is also used to receive the checkpoint addition instruction; extract the permission verification information in the checkpoint addition instruction; add permission information through the checkpoint in the permission configuration table to verify the permission verification information; when the permission verification information is verified , Extract the script specification information in the checkpoint addition instruction; create a checkpoint based on the script specification information.
- a preset checkpoint is obtained, and an inspection task flow corresponding to the obtained preset checkpoint is generated, and the inspection task flow includes an inspection task corresponding to each preset checkpoint.
- the inspection tasks are directly read from the inspection task flow in the order of tasks, and the code scripts are scanned according to the read inspection tasks to obtain the corresponding defect scanning results for each preset inspection point. Improve the efficiency of checking code script defects.
- Each module in the above-mentioned script defect scanning device can be implemented in whole or in part by software, hardware, and a combination thereof.
- the foregoing modules may be embedded in the form of hardware or independent of the processor in the computer device, or may be stored in the memory of the computer device in the form of software, so that the processor can call and execute the operations corresponding to the foregoing modules.
- a computer device is provided.
- the computer device may be a server, and its internal structure diagram may be as shown in FIG. 9.
- the computer equipment includes a processor, a memory, a network interface and a database connected through a system bus. Among them, the processor of the computer device is used to provide calculation and control capabilities.
- the memory of the computer device includes a non-volatile storage medium and an internal memory.
- the non-volatile storage medium stores an operating system, computer readable instructions, and a database.
- the internal memory provides an environment for the operation of the operating system and computer-readable instructions in the non-volatile storage medium.
- the computer equipment database is used to store code scripts.
- the network interface of the computer device is used to communicate with an external terminal through a network connection.
- the computer-readable instruction is executed by the processor to realize a script defect scanning method.
- FIG. 9 is only a block diagram of part of the structure related to the solution of the present application, and does not constitute a limitation on the computer equipment to which the solution of the present application is applied.
- the specific computer equipment may Including more or fewer parts than shown in the figure, or combining some parts, or having a different arrangement of parts.
- a computer device includes a memory and one or more processors.
- the memory stores computer readable instructions.
- the one or more processors execute the following steps:
- the submitted code script is obtained; according to the code identifier in the code script, the preset checkpoint corresponding to the code identifier is obtained; the preset checkpoint is generated and obtained Corresponding inspection task flow; read inspection tasks according to the order of tasks in the inspection task flow; and scan the code script according to the read inspection tasks to obtain defect scanning results corresponding to the read inspection tasks.
- obtaining the submitted code script includes: reading the script submission time corresponding to each script part identifier; The script submission time corresponds one-to-one; the script part identifier corresponding to the script submission time within the preset time period is determined; and the script part corresponding to the determined script part identifier is extracted from the code script library.
- generating the inspection task flow corresponding to the obtained preset checkpoint includes: traversing the check nodes in the check node tree; the check node tree is based on the inspection scope level of the preset checkpoint It is constructed in the order of size; creating inspection tasks corresponding to the inspection nodes in the traversed inspection node tree; and constructing an inspection task flow according to the created inspection tasks according to the traversal order.
- scanning the code script according to the read inspection task, and obtaining the defect scan result corresponding to the read inspection task includes: parsing the inspection type of the read inspection task; when the inspection type is In the parameter check type, query the specification check file corresponding to the check task; generate parameter call instructions according to the specification check file; obtain the configuration parameters of the code script according to the parameter call instructions; and scan and check the obtained configuration parameters according to the specification check file, Obtain the defect scan result corresponding to the read inspection task.
- the code script is scanned according to the read inspection task, and after the defect scanning result corresponding to the read inspection task is obtained, the processor further implements the following steps when executing the computer-readable instruction: extracting defects The code location corresponding to the code defect in the scan result; query the developer account corresponding to the extracted code location; generate a code defect notification corresponding to the developer account; and send the code defect notification to the terminal logged in with the developer account.
- the processor after the code defect notification is sent to the terminal logged in with the developer account, the processor also implements the following steps when executing the computer-readable instructions: receiving the terminal logged in with the developer account, according to the code defect notification returned Code modification instructions; extract modification information and code modification positions in the code modification instructions; determine part of the code script corresponding to the code modification position; and modify part of the code script according to the modification information.
- the processor further implements the following steps when executing the computer-readable instruction: receiving the checkpoint adding instruction; extracting the authority verification information in the checkpoint adding instruction; adding authority information to the authority through the checkpoint in the authority configuration table The verification information is verified; after the authorization verification information is verified, the script specification information in the checkpoint addition instruction is extracted; and the checkpoint is created according to the script specification information.
- a preset checkpoint is obtained, and an inspection task flow corresponding to the obtained preset checkpoint is generated, and the inspection task flow includes an inspection task corresponding to each preset checkpoint.
- the inspection tasks are directly read from the inspection task flow in the order of tasks, and the code scripts are scanned according to the read inspection tasks to obtain the scanning results corresponding to each preset checkpoint. Improve the efficiency of checking code script defects.
- One or more non-volatile computer-readable storage media storing computer-readable instructions.
- the one or more processors execute the following steps:
- the submitted code script is obtained; according to the code identifier in the code script, the preset checkpoint corresponding to the code identifier is obtained; the preset checkpoint is generated and obtained Corresponding inspection task flow; read inspection tasks according to the order of tasks in the inspection task flow; and scan the code script according to the read inspection tasks to obtain defect scanning results corresponding to the read inspection tasks.
- obtaining the submitted code script includes: when it is detected that the code script submit button on the code editing page is clicked, reading each script The script submission time corresponding to the part identifiers respectively; the script part identifier corresponds to the script submission time one-to-one; the script part identifier corresponding to the script submission time within the preset time period is determined; and the script part identifier is extracted from the code script library The determined script part identifies the corresponding script part.
- generating the inspection task flow corresponding to the obtained preset checkpoint includes: traversing the check nodes in the check node tree; the check node tree is based on the inspection scope level of the preset checkpoint It is constructed in the order of size; creating inspection tasks corresponding to the inspection nodes in the traversed inspection node tree; and constructing an inspection task flow according to the created inspection tasks according to the traversal order.
- scanning the code script according to the read inspection task, and obtaining the defect scan result corresponding to the read inspection task includes: parsing the inspection type of the read inspection task; when the inspection type is In the parameter check type, query the specification check file corresponding to the check task; generate parameter call instructions according to the specification check file; obtain the configuration parameters of the code script according to the parameter call instructions; and scan and check the obtained configuration parameters according to the specification check file, Obtain the defect scan result corresponding to the read inspection task.
- the code script is scanned according to the read inspection task, and after the defect scanning result corresponding to the read inspection task is obtained, the computer-readable instruction is executed by the processor and further implements the following steps: extract The code location corresponding to the code defect in the defect scan result; query the developer account corresponding to the extracted code location; generate a code defect notification corresponding to the developer account; and send the code defect notification to the terminal logged in with the developer account.
- the computer readable instructions are executed by the processor to implement the following steps: receive the terminal logged in with the developer account, and return according to the code defect notification Code modification instructions; extract modification information and code modification locations in the code modification instructions; determine part of the code script corresponding to the code modification location; and modify part of the code script according to the modification information.
- the following steps are also implemented: receiving the checkpoint adding instruction; extracting the permission verification information in the checkpoint adding instruction; adding the permission information pair through the checkpoint in the permission configuration table The authorization verification information is verified; when the authorization verification information is verified, the script specification information in the checkpoint addition instruction is extracted; and the checkpoint is created according to the script specification information.
- a preset checkpoint is obtained, and an inspection task flow corresponding to the obtained preset checkpoint is generated, and the inspection task flow includes an inspection task corresponding to each preset checkpoint.
- the inspection tasks are directly read from the inspection task flow in the order of tasks, and the code scripts are scanned according to the read inspection tasks to obtain the scanning results corresponding to each preset checkpoint. Improve the efficiency of checking code script defects.
- Non-volatile memory may include read only memory (ROM), programmable ROM (PROM), electrically programmable ROM (EPROM), electrically erasable programmable ROM (EEPROM), or flash memory.
- ROM read only memory
- PROM programmable ROM
- EPROM electrically programmable ROM
- EEPROM electrically erasable programmable ROM
- Volatile memory may include random access memory (RAM) or external cache memory.
- RAM is available in many forms, such as static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous chain Channel (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), etc.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Quality & Reliability (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Stored Programmes (AREA)
Abstract
一种脚本缺陷扫描方法,方法包括:当检测到代码编辑页面中的代码脚本提交按钮被点击时,获取提交的代码脚本;根据代码脚本中的代码标识,获取与代码标识对应的预设检查点;生成与获取到的预设检查点对应的检查任务流;按照所述检查任务流中的任务顺序读取检查任务;根据读取到的检查任务对所述代码脚本进行扫描,得到读取到的检查任务所对应的缺陷扫描结果。
Description
相关申请的交叉引用
本申请要求于2019年5月20日提交中国专利局,申请号为2019104192658,申请名称为“脚本缺陷扫描方法、装置、计算机设备和存储介质”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
本申请涉及一种脚本缺陷扫描方法、装置、计算机设备和存储介质。
随着计算机技术的发展,出现了信息处理技术,信息处理技术中若要使信息通过计算机进行处理,需要通过软件代码来实现,通过运行编写好的软件代码实现通过计算机对信息的处理功能。
然而,发明人意识到,在根据软件代码编写完成时,都需要对提交的代码的规范性进行检查。在传统的方案中,在检查过程中需要对众多检查点进行检查以保证提交的代码的规范性,由于检查点的数量众多,检查耗时长且准确性较低。
发明内容
根据本申请公开的各种实施例,提供一种脚本缺陷扫描方法、装置、计算机设备和存储介质。
一种脚本缺陷扫描方法,由服务器执行,包括:
当检测到代码编辑页面中的代码脚本提交按钮被点击时,获取提交的代码脚本;
根据所述代码脚本中的代码标识,获取与所述代码标识对应的预设检查点;
生成与获取到的预设检查点对应的检查任务流;
按照所述检查任务流中的任务顺序读取检查任务;及
根据读取到的检查任务对所述代码脚本进行扫描,得到读取到的检查任务所对应的缺陷扫描结果。
一种脚本缺陷扫描装置,所述装置包括:
脚本获取模块,用于当检测到代码编辑页面中的代码脚本提交按钮被点击时,获取提交的代码脚本;
检查点获取模块,用于根据所述代码脚本中的代码标识,获取与所述代码标识对应的预设检查点;
任务流生成模块,用于生成与获取到的预设检查点对应的检查任务流;
任务读取模块,用于按照所述检查任务流中的任务顺序读取检查任务;及
代码扫描模块,用于根据读取到的检查任务对所述代码脚本进行扫描,得到读取到的检查任务所对应的缺陷扫描结果。
一种计算机设备,包括存储器和一个或多个处理器,所述存储器中储存有计算机可读指令,所述计算机可读指令被所述处理器执行时,使得所述一个或多个处理器执行以下步骤:当检测到代码编辑页面中的代码脚本提交按钮被点击时,获取提交的代码脚本;
根据所述代码脚本中的代码标识,获取与所述代码标识对应的预设检查点;
生成与获取到的预设检查点对应的检查任务流;
按照所述检查任务流中的任务顺序读取检查任务;及
根据读取到的检查任务对所述代码脚本进行扫描,得到读取到的检查任务所对应的缺陷扫描结果。
一个或多个存储有计算机可读指令的非易失性计算机可读存储介质,计算机可读指令被一个或多个处理器执行时,使得一个或多个处理器执行以下步骤:一种计算机可读存储介质,其上存储有计算机可读指令,所述计算机可读指令被处理器执行时实现以下步骤:
当检测到代码编辑页面中的代码脚本提交按钮被点击时,获取提交的代码脚本;
根据所述代码脚本中的代码标识,获取与所述代码标识对应的预设检查点;
生成与获取到的预设检查点对应的检查任务流;
按照所述检查任务流中的任务顺序读取检查任务;及
根据读取到的检查任务对所述代码脚本进行扫描,得到读取到的检查任务所对应的缺陷扫描结果。
本申请的一个或多个实施例的细节在下面的附图和描述中提出。本申请的其它特征和优点将从说明书、附图以及权利要求书变得明显。
为了更清楚地说明本申请实施例中的技术方案,下面将对实施例中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其它的附图。
图1为根据一个或多个实施例中脚本缺陷扫描方法的应用场景图;
图2为根据一个或多个实施例中脚本缺陷扫描方法的流程示意图;
图3为根据一个或多个实施例中提取代码脚本的步骤的流程示意图;
图4为根据一个或多个实施例中生成检查任务流的步骤的流程示意图;
图5为根据一个或多个实施例中得到缺陷扫描结果的步骤的流程示意图;
图6为根据一个或多个实施例中发送代码缺陷通知的步骤的流程示意图;
图7为根据一个或多个实施例中修改代码脚本的步骤的流程示意图;
图8为根据一个或多个实施例中脚本缺陷扫描装置的结构框图;
图9为根据一个或多个实施例中计算机设备的内部结构图。
为了使本申请的目的、技术方案及优点更加清楚明白,以下结合附图及实施例,对本申请进行进一步详细说明。应当理解,此处描述的具体实施例仅仅用以解释本申请,并不用于限定本申请。
本申请提供的脚本缺陷扫描方法,可以应用于如图1所示的应用环境中。其中,终端102通过网络与服务器104通过网络进行通信。其中,终端102可以但不限于是各种个人计算机、笔记本电脑、智能手机、平板电脑和便携式可穿戴设备,服务器104可以用独立的服务器或者是多个服务器组成的服务器集群来实现。服务器104上运行有脚本管理平台。
在其中一个实施例中,如图2所示,提供了一种脚本缺陷扫描方法,以该方法应用于图1中的服务器为例进行说明,包括以下步骤:
S202,当检测到代码编辑页面中的代码脚本提交按钮被点击时,获取提交的代码脚本。
具体的,终端显示有代码脚本编辑页面,代码脚本编辑页面中录入有代码,代码脚本编辑页面中设置有代码脚本提交按钮。终端检测到代码脚本提交按钮的点击操作时,获取代码脚本编辑页面中的代码,根据获取到的代码生成代码脚本,将代码脚本提交至服务器。服务器接收终端提交的代码脚本,将提交的代码脚本存储至代码脚本管理平台对应的数据库中。
在其中一个实施例中,服务器接收终端发送的代码提交请求,对代码提交请求进行解析,通过解析提取代码提交请求中开发人员账号和代码脚本标识,根据开发人员账号和代码脚本标识生成代码拉取请求,将代码拉取请求发送至以开发人员账号登录的终端。终端在接收到代码拉取请求后,对代码拉取请求进行解析,通过解析提取代码拉取请求中的开发人员账号和代码脚本标识,对开发人员账号进行验证,验证通过后,查询与代码脚本标识对应的代码脚本,将查询到的代码脚本发送至服务器。服务器接收以开发人员账号登录的终端根据代码拉取请求,返回的代码脚本。
S204,根据代码脚本中的代码标识,获取与代码标识对应的预设检查点。
其中,预设检查点为预设的对代码脚本中需要检查的检查位置。
具体地,服务器设置了多个对代码脚本进行检查的预设检查点。服务器在获取到代码脚本时,确定代码脚本中的代码标识,查询与代码标识对应的预设检查点。不同的代码标识对应的预设检查点不同。例如,代码标识包括函数类名称,不同的函数类名称对应的预设检查点不同。
在其中一个实施例中,服务器定期获取提交的代码脚本的提交记录,根据提交记录的时间筛选晚于上次获取代码脚本的时间,所对应的提交记录,提取筛选到的代码提交记录中的代码标识,根据提取到的代码标识获取新增的代码脚本。
S206,生成与获取到的预设检查点对应的检查任务流。
具体地,服务器获取到预设检查点后,查询各预设检查点各自对应的检查指令,根据各检查指令创建各预设检查点对应的检查任务,按照预设检查点的检查顺序对创建的检查任务 进行排列,得到检查任务流。检查任务流中的检查任务以预设检查点的检查顺序作为任务顺序进行排列。
S208,按照检查任务流中的任务顺序读取检查任务。
具体地,服务器在创建检查任务流后,按照检查任务流中的任务顺序从检查任务流中读取检查任务。
在其中一个实施例中,当有多个检查任务流时,调用多个进程并行读取各检查任务流中的检查任务。
S210,根据读取到的检查任务对代码脚本进行扫描,得到读取到的检查任务所对应的缺陷扫描结果。
具体地,服务器在读取到检查任务时,从读取到的检查任务中提取检查指令,根据检查指令提取缺陷检查数据,根据缺陷检查数据对代码脚本进行扫描,得到各预设检查点的缺陷扫描结果。服务器根据缺陷扫描结果生成脚本缺陷报告。缺陷扫描结果为表示是否存在缺陷的信息。
本实施例中,在获取到提交的代码脚本后,根据代码脚本中的代码标识,获取与代码标识对应的预设检查点,生成与获取到的预设检查点对应的检查任务流,检查任务流中包括各预设检查点分别对应的检查任务。无需人工对提交的代码脚本进行检查,直接按照任务顺序从检查任务流中读取检查任务,根据读取到的检查任务对代码脚本进行扫描,得到各预设检查点分别对应的扫描结果,从而生成脚本缺陷报告,提高了对代码脚本缺陷的检查效率。
如图3所示,在其中一个实施例中,S202具体包括提取代码脚本的步骤,该步骤具体包括以下内容:
S302,当检测到代码编辑页面中的代码脚本提交按钮被点击时,读取各脚本部分标识分别对应的脚本提交时间;脚本部分标识与所述脚本提交时间一一对应。
具体地,当检测到代码编辑页面中的代码脚本提交按钮被点击时,服务器的数据库中存储着所有提交的代码脚本和脚本提交时间,提交的代码脚本由多个脚本部分组成,每个脚本部分可以单独提交,每个脚本部分提交时,将提交的脚本部分的脚本部分标识与脚本提交时间对应存储。服务器从存储的脚本部分标识和脚本提交时间中,获取各脚本部分标识分别对应的脚本提交时间。
S304,确定属于预设时间段内的脚本提交时间所对应的脚本部分标识。
具体地,服务器将判断各脚本标识分别对应的脚本提交时间是否属于预设时间段,筛选属于预设时间段内的脚本提交时间所对应的脚本部分标识,筛选到的脚本部分标识为预设时间段内提交到的脚本部分的标识。预设时间段可以为最近一段时间段,还可以为指定时间段。
S306,从代码脚本库中提取与确定的脚本部分标识对应的脚本部分。
具体地,服务器中的代码脚本库中存储着提交的代码脚本。服务器确定脚本部分标识后,从代码脚本库中查询与确定的脚本部分标识对应的脚本部分。提取查询到的脚本部分,以提取到的脚本部分作为获取到的代码脚本。
本实施例中,通过记录各脚本部分的脚本提交时间,按照脚本提交时间筛选属于预设时 间段内的脚本提交时间提交的脚本部分,无需等待完整的代码脚本被提交,才能对代码脚本进行检查,可以对脚本部分进行单独检查,提高了代码脚本的检查效率。
如图4所示,在其中一个实施例中,S206包括生成检查任务流的步骤,该步骤具体包括以下内容:
S402,遍历检查节点树中的检查节点;检查节点树为根据所述预设检查点的检查适用范围级别的大小顺序构建的。
其中,检查节点树为根据预设检查点之间的检查适用范围级别构建,检查节点树的每个节点对应一个检查任务,每个检查任务对应一个预设检查点。检查适用范围级别为预设检查点的检查范围的级别,检查适用范围级别包括代码脚本文件的全篇检查、指定脚本部分的检查和指定脚本部分中的一类代码进行检查中的至少一种。
S404,创建与遍历到的检查节点树中的检查节点对应的检查任务。
具体地,服务器对检查节点树中的检查节点树中的检查节点,读取遍历到的检查节点中检查信息,根据读取到的检查信息创建与检查节点对应的检查任务。检查信息中可以包括检查指令。
S406,按照遍历顺序根据创建的检查任务构成检查任务流。
具体地,服务器在对检查节点树中的检查节点遍历时,记录遍历顺序,按照记录的遍历顺序对创建的检查任务进行排列,根据排列的检查任务构成检查任务流。
本实施例中,通过对根据预设检查点之间的检查适用范围级别构建的检查节点树进行遍历,根据遍历到的检查节点创建检查任务,按照遍历顺序和创建的检查任务构成检查任务流,提高了检查任务流的生成效率。
如图5所示,在其中一个实施例中,S210具体包括得到缺陷扫描结果的步骤,该步骤具体包括以下内容:
S502,解析读取到的检查任务的检查类型。
具体地,服务器对读取到的检查任务解析,通过解析从读取到的检查任务中读取检查类型。检查类型为对提交的代码脚本进行检查的类型,检查类型具体可以包括参数检查类型、名称规范检查类型和代码规范检查类型中的至少一种。当检查类型为名称规范检查类型时,查询与检查任务中名称检查类型对应的名称规范检查文件,识别代码脚本中的函数名称,根据名称规范检查文件对识别到的函数名称进行规范检查,得到名称规范检查结果,名称规范检查结果为检查任务所对应的缺陷扫描结果。当检查类型为代码规范检查类型时,查询与检查任务中代码规范检查类型对应的代码规范检查文件,按照代码规范检查文件对代码脚本中代码进行规范性检查,得到代码规范检查结果,代码规范检查结果为检查任务所对应的缺陷扫描结果。
S504,当检查类型为参数检查类型时,查询与检查任务对应的规范检查文件。
具体地,服务器在解析得到检查类型为参数检查类型时,提取检查任务中的检查文件标识,查询与提取到的检查文件标识对应的规范检查文件。规范检查文件中包括对参数的规范性的信息。
S506,根据规范检查文件生成参数调用指令。
具体地,服务器在规范检查文件中的参数类型,对参数类型进行封装,通过封装生成参数调用指令。参数调用指令用于获取代码脚本的配置参数的指令。
S508,根据参数调用指令获取代码脚本的配置参数。
具体地,服务器提取参数调用指令中的参数类型,在代码脚本中查询与参数类型匹配的配置参数,获取查询到的配置参数。
在其中一个实施例中,服务器获取代码脚本对应的参数配置文件,从参数配置文件中查询与参数调用指令中的参数类型匹配的配置参数,获取查询到的配置参数。
S510,按照规范检查文件对获取到的配置参数进行扫描检查,得到读取到的检查任务所对应的缺陷扫描结果。
具体地,服务器按照规范检查文件对获取到配置参数进行扫描检查,提取规范检查中规范配置参数,将规范配置参数与获取到的配置参数比较,确定配置参数的缺陷扫描结果,根据确定的缺陷扫描结果生成脚本缺陷报告。
本实施例中,当检查任务中的检查类型为参数类型时,根据检查任务对应的规范检查文件对代码脚本的配置参数进行扫描检查,得到读取到的检查任务所对应的缺陷扫描结果,可以根据指定的检查类型对代码脚本进行缺陷扫描,提高了缺陷扫描的准确性。
如图6所示,S210之后具体还包括发送代码缺陷通知的步骤,该步骤具体包括以下内容:
S602,提取缺陷扫描结果中代码缺陷对应的代码位置。
具体地,服务器对缺陷扫描结果进行解析,通过解析确定缺陷扫描结果中的代码缺陷,从缺陷扫描结果中提取与确定的代码缺陷对应的代码位置。代码位置为代码缺陷在代码脚本中的位置。
S604,查询与提取到的代码位置对应的开发者账号。
具体地,服务器中存储着各脚本部分标识分别对应的开发者账号。服务器在提取到代码位置后,确定提取到的代码位置对应的脚本部分标识,查询确定的脚本部分标识对应的开发者账号。
S606,生成与开发者账号对应的代码缺陷通知。
具体地,服务器对代码缺陷和代码位置进行封装,通过封装生成与开发者账号对应的代码缺陷通知。代码缺陷通知中还可以包括代码位置所属脚本部分的脚本部分标识。
S608,将代码缺陷通知发送至以开发者账号登录的终端。
具体地,服务器在生成代码缺陷通知后,获取以开发者账号登录的终端所对应的终端标识,根据标识将代码缺陷通知发送至以开发者账号登录的终端。
本实施例中,可以根据缺陷扫描结果中代码缺陷对应代码位置,确定开发者账号,生成与开发者账号对应的代码缺陷通知,将代码缺陷通知发送至以开发者账号登录的终端,以确定开发者了解到开发中出现的代码缺陷。
如图7所示,在其中一个实施例中,S608之后还包括修改代码脚本的步骤,该步骤具体包括以下内容:
S702,接收以开发者账号登录的终端,根据代码缺陷通知返回的代码修改指令。
具体地,以开发者账号登录的终端接收到代码缺陷通知后,提取代码缺陷通知中的脚本部分标识,针对脚本部分标识中的代码缺陷录入修改信息,根据修改信息和代码修改位置生成代码修改指令,将代码修改指令发送至服务器。服务器接收以开发者账号登录的终端发送的代码修改指令。
S704,提取代码修改指令中修改信息和代码修改位置。
具体地,服务器在接收到代码修改指令后,对代码修改指令进行解析,通过解析得到修改信息和代码修改位置。
S706,确定代码修改位置对应的部分代码脚本。
具体地,服务器确定代码修改位置所属的代码脚本,在代码脚本中确定代码修改位置对应的部分代码脚本,提取确定的部分代码脚本。
S708,按照修改信息对部分代码脚本进行修改。
具体地,服务器提取修改信息中修改后的代码,在部分代码脚本中确定待修改代码,将待修改代码替换为修改后的代码,将修改后的部分代码脚本重新提交。
本实施例中,在接收到以开发者账号登录的终端发送的代码修改指令后,可以根据代码修改指令中的代码修改位置和修改信息对部分代码脚本进行修改,提高了对代码脚本修改的便利性,从而保证提交的代码脚本的正确性。
在其中一个实施例中,脚本缺陷扫描方法还包括:接收检查点添加指令;提取检查点添加指令中的权限验证信息;通过权限配置表中的检查点添加权限信息对权限验证信息进行验证;当对权限验证信息验证通过后,则提取检查点添加指令中的脚本规范信息;根据脚本规范信息创建检查点。
具体地,服务器接收检查点添加指令,对检查点添加指令进行解析,通过解析得到权限验证信息和脚本规范信息。服务器提取权限配置表,根据权限配置表中存储的检查点添加权限信息对权限验证信息进行验证,当对权限验证信息验证通过后,根据脚本规范信息创建检查点,将创建的检查点添加到检查点库中。
本实施例中,在对检查点添加指令中的权限验证信息验证通过后,根据建检查点添加指令中脚本规范信息创建检查点,可以对检查点进行添加,保证了检查点对提交的代码脚本的准确性。
应该理解的是,虽然图2-7的流程图中的各个步骤按照箭头的指示依次显示,但是这些步骤并不是必然按照箭头指示的顺序依次执行。除非本文中有明确的说明,这些步骤的执行并没有严格的顺序限制,这些步骤可以以其它的顺序执行。而且,图2-7中的至少一部分步骤可以包括多个子步骤或者多个阶段,这些子步骤或者阶段并不必然是在同一时刻执行完成,而是可以在不同的时刻执行,这些子步骤或者阶段的执行顺序也不必然是依次进行,而是可以与其它步骤或者其它步骤的子步骤或者阶段的至少一部分轮流或者交替地执行。
在其中一个实施例中,如图8所示,提供了一种脚本缺陷扫描装置800,包括:脚本获 取模块802、检查点获取模块804、任务流生成模块806、任务读取模块808和代码扫描模块810,其中:
脚本获取模块802,用于当检测到代码编辑页面中的代码脚本提交按钮被点击时,获取提交的代码脚本。
检查点获取模块804,用于根据代码脚本中的代码标识,获取与代码标识对应的预设检查点。
任务流生成模块806,用于生成与获取到的预设检查点对应的检查任务流。
任务读取模块808,用于按照检查任务流中的任务顺序读取检查任务。
代码扫描模块810,用于根据读取到的检查任务对代码脚本进行扫描,得到读取到的检查任务所对应的缺陷扫描结果。
在其中一个实施例中,脚本获取模块802还用于当检测到代码编辑页面中的代码脚本提交按钮被点击时,读取各脚本部分标识分别对应的脚本提交时间;所述脚本部分标识与所述脚本提交时间一一对应;确定属于预设时间段内的脚本提交时间所对应的脚本部分标识;从代码脚本库中提取与确定的脚本部分标识对应的脚本部分。
在其中一个实施例中,任务流生成模块806还用于遍历检查节点树中的检查节点;所述检查节点树为根据所述预设检查点的检查适用范围级别的大小顺序构建的;创建与遍历到的检查节点树中的检查节点对应的检查任务;按照遍历顺序根据创建的检查任务构成检查任务流。
在其中一个实施例中,代码扫描模块810还用于解析读取到的检查任务的检查类型;当检查类型为参数检查类型时,查询与检查任务对应的规范检查文件;根据规范检查文件生成参数调用指令;根据参数调用指令获取代码脚本的配置参数;按照规范检查文件对获取到的配置参数进行扫描检查,得到当检测到代码编辑页面中的代码脚本提交按钮被点击时。
在其中一个实施例中,脚本缺陷扫描装置800还包括通知发送模块和代码修改模块。
通知发送模块还用于提取缺陷扫描结果中代码缺陷对应的代码位置;查询与提取到的代码位置对应的开发者账号;生成与开发者账号对应的代码缺陷通知;将代码缺陷通知发送至以开发者账号登录的终端。
代码修改模块还用于接收以开发者账号登录的终端,根据代码缺陷通知返回的代码修改指令;提取代码修改指令中修改信息和代码修改位置;确定代码修改位置对应的部分代码脚本;按照修改信息对部分代码脚本进行修改。
在其中一个实施例中,脚本缺陷扫描装置800还包括检查点创建模块。
检查点创建模块还用于接收检查点添加指令;提取检查点添加指令中的权限验证信息;通过权限配置表中的检查点添加权限信息对权限验证信息进行验证;当对权限验证信息验证通过后,则提取检查点添加指令中的脚本规范信息;根据脚本规范信息创建检查点。
本实施例中,在获取到提交的代码脚本后,获取预设检查点,生成与获取到的预设检查点对应的检查任务流,检查任务流中包括各预设检查点分别对应的检查任务。无需人工对提交的代码脚本进行检查,直接按照任务顺序从检查任务流中读取检查任务,根据读取到的检 查任务对代码脚本进行扫描,得到各预设检查点分别对应的缺陷扫描结果,提高了对代码脚本缺陷的检查效率。
关于脚本缺陷扫描装置的具体限定可以参见上文中对于脚本缺陷扫描方法的限定,在此不再赘述。上述脚本缺陷扫描装置中的各个模块可全部或部分通过软件、硬件及其组合来实现。上述各模块可以硬件形式内嵌于或独立于计算机设备中的处理器中,也可以以软件形式存储于计算机设备中的存储器中,以便于处理器调用执行以上各个模块对应的操作。
在其中一个实施例中,提供了一种计算机设备,该计算机设备可以是服务器,其内部结构图可以如图9所示。该计算机设备包括通过系统总线连接的处理器、存储器、网络接口和数据库。其中,该计算机设备的处理器用于提供计算和控制能力。该计算机设备的存储器包括非易失性存储介质、内存储器。该非易失性存储介质存储有操作系统、计算机可读指令和数据库。该内存储器为非易失性存储介质中的操作系统和计算机可读指令的运行提供环境。该计算机设备的数据库用于存储代码脚本。该计算机设备的网络接口用于与外部的终端通过网络连接通信。该计算机可读指令被处理器执行时以实现一种脚本缺陷扫描方法。
本领域技术人员可以理解,图9中示出的结构,仅仅是与本申请方案相关的部分结构的框图,并不构成对本申请方案所应用于其上的计算机设备的限定,具体的计算机设备可以包括比图中所示更多或更少的部件,或者组合某些部件,或者具有不同的部件布置。
一种计算机设备,包括存储器和一个或多个处理器,存储器中储存有计算机可读指令,计算机可读指令被处理器执行时,使得一个或多个处理器执行以下步骤:
当检测到代码编辑页面中的代码脚本提交按钮被点击时,获取提交的代码脚本;根据代码脚本中的代码标识,获取与代码标识对应的预设检查点;生成与获取到的预设检查点对应的检查任务流;按照检查任务流中的任务顺序读取检查任务;及根据读取到的检查任务对代码脚本进行扫描,得到读取到的检查任务所对应的缺陷扫描结果。
在其中一个实施例中,当检测到代码编辑页面中的代码脚本提交按钮被点击时,获取提交的代码脚本包括:读取各脚本部分标识分别对应的脚本提交时间;所述脚本部分标识与所述脚本提交时间一一对应;确定属于预设时间段内的脚本提交时间所对应的脚本部分标识;及从代码脚本库中提取与确定的脚本部分标识对应的脚本部分。
在其中一个实施例中,生成与获取到的预设检查点对应的检查任务流包括:遍历检查节点树中的检查节点;所述检查节点树为根据所述预设检查点的检查适用范围级别的大小顺序构建的;创建与遍历到的检查节点树中的检查节点对应的检查任务;及按照遍历顺序根据创建的检查任务构成检查任务流。
在其中一个实施例中,根据读取到的检查任务对代码脚本进行扫描,得到读取到的检查任务所对应的缺陷扫描结果包括:解析读取到的检查任务的检查类型;当检查类型为参数检查类型时,查询与检查任务对应的规范检查文件;根据规范检查文件生成参数调用指令;根据参数调用指令获取代码脚本的配置参数;及按照规范检查文件对获取到的配置参数进行扫描检查,得到读取到的检查任务所对应的缺陷扫描结果。
在其中一个实施例中,根据读取到的检查任务对代码脚本进行扫描,得到读取到的检查 任务所对应的缺陷扫描结果之后,处理器执行计算机可读指令时还实现以下步骤:提取缺陷扫描结果中代码缺陷对应的代码位置;查询与提取到的代码位置对应的开发者账号;生成与开发者账号对应的代码缺陷通知;及将代码缺陷通知发送至以开发者账号登录的终端。
在其中一个实施例中,将代码缺陷通知发送至以开发者账号登录的终端之后,处理器执行计算机可读指令时还实现以下步骤:接收以开发者账号登录的终端,根据代码缺陷通知返回的代码修改指令;提取代码修改指令中修改信息和代码修改位置;确定代码修改位置对应的部分代码脚本;及按照修改信息对部分代码脚本进行修改。
在其中一个实施例中,处理器执行计算机可读指令时还实现以下步骤:接收检查点添加指令;提取检查点添加指令中的权限验证信息;通过权限配置表中的检查点添加权限信息对权限验证信息进行验证;当对权限验证信息验证通过后,则提取检查点添加指令中的脚本规范信息;及根据脚本规范信息创建检查点。
本实施例中,在获取到提交的代码脚本后,获取预设检查点,生成与获取到的预设检查点对应的检查任务流,检查任务流中包括各预设检查点分别对应的检查任务。无需人工对提交的代码脚本进行检查,直接按照任务顺序从检查任务流中读取检查任务,根据读取到的检查任务对代码脚本进行扫描,得到各预设检查点分别对应的扫描结果,提高了对代码脚本缺陷的检查效率。
一个或多个存储有计算机可读指令的非易失性计算机可读存储介质,计算机可读指令被一个或多个处理器执行时,使得一个或多个处理器执行以下步骤:
当检测到代码编辑页面中的代码脚本提交按钮被点击时,获取提交的代码脚本;根据代码脚本中的代码标识,获取与代码标识对应的预设检查点;生成与获取到的预设检查点对应的检查任务流;按照检查任务流中的任务顺序读取检查任务;及根据读取到的检查任务对代码脚本进行扫描,得到读取到的检查任务所对应的缺陷扫描结果。
在其中一个实施例中,当检测到代码编辑页面中的代码脚本提交按钮被点击时,获取提交的代码脚本包括:当检测到代码编辑页面中的代码脚本提交按钮被点击时,读取各脚本部分标识分别对应的脚本提交时间;所述脚本部分标识与所述脚本提交时间一一对应;确定属于预设时间段内的脚本提交时间所对应的脚本部分标识;及从代码脚本库中提取与确定的脚本部分标识对应的脚本部分。
在其中一个实施例中,生成与获取到的预设检查点对应的检查任务流包括:遍历检查节点树中的检查节点;所述检查节点树为根据所述预设检查点的检查适用范围级别的大小顺序构建的;创建与遍历到的检查节点树中的检查节点对应的检查任务;及按照遍历顺序根据创建的检查任务构成检查任务流。
在其中一个实施例中,根据读取到的检查任务对代码脚本进行扫描,得到读取到的检查任务所对应的缺陷扫描结果包括:解析读取到的检查任务的检查类型;当检查类型为参数检查类型时,查询与检查任务对应的规范检查文件;根据规范检查文件生成参数调用指令;根据参数调用指令获取代码脚本的配置参数;及按照规范检查文件对获取到的配置参数进行扫描检查,得到读取到的检查任务所对应的缺陷扫描结果。
在其中一个实施例中,根据读取到的检查任务对代码脚本进行扫描,得到读取到的检查任务所对应的缺陷扫描结果之后,计算机可读指令被处理器执行时还实现以下步骤:提取缺陷扫描结果中代码缺陷对应的代码位置;查询与提取到的代码位置对应的开发者账号;生成与开发者账号对应的代码缺陷通知;及将代码缺陷通知发送至以开发者账号登录的终端。
在其中一个实施例中,将代码缺陷通知发送至以开发者账号登录的终端之后,计算机可读指令被处理器执行时还实现以下步骤:接收以开发者账号登录的终端,根据代码缺陷通知返回的代码修改指令;提取代码修改指令中修改信息和代码修改位置;确定代码修改位置对应的部分代码脚本;及按照修改信息对部分代码脚本进行修改。
在其中一个实施例中,计算机可读指令被处理器执行时还实现以下步骤:接收检查点添加指令;提取检查点添加指令中的权限验证信息;通过权限配置表中的检查点添加权限信息对权限验证信息进行验证;当对权限验证信息验证通过后,则提取检查点添加指令中的脚本规范信息;及根据脚本规范信息创建检查点。
本实施例中,在获取到提交的代码脚本后,获取预设检查点,生成与获取到的预设检查点对应的检查任务流,检查任务流中包括各预设检查点分别对应的检查任务。无需人工对提交的代码脚本进行检查,直接按照任务顺序从检查任务流中读取检查任务,根据读取到的检查任务对代码脚本进行扫描,得到各预设检查点分别对应的扫描结果,提高了对代码脚本缺陷的检查效率。
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,是可以通过计算机可读指令来指令相关的硬件来完成,所述的计算机可读指令可存储于一非易失性计算机可读取存储介质中,该计算机可读指令在执行时,可包括如上述各方法的实施例的流程。其中,本申请所提供的各实施例中所使用的对存储器、存储、数据库或其它介质的任何引用,均可包括非易失性和/或易失性存储器。非易失性存储器可包括只读存储器(ROM)、可编程ROM(PROM)、电可编程ROM(EPROM)、电可擦除可编程ROM(EEPROM)或闪存。易失性存储器可包括随机存取存储器(RAM)或者外部高速缓冲存储器。作为说明而非局限,RAM以多种形式可得,诸如静态RAM(SRAM)、动态RAM(DRAM)、同步DRAM(SDRAM)、双数据率SDRAM(DDRSDRAM)、增强型SDRAM(ESDRAM)、同步链路(Synchlink)DRAM(SLDRAM)、存储器总线(Rambus)直接RAM(RDRAM)、直接存储器总线动态RAM(DRDRAM)、以及存储器总线动态RAM(RDRAM)等。
以上实施例的各技术特征可以进行任意的组合,为使描述简洁,未对上述实施例中的各个技术特征所有可能的组合都进行描述,然而,只要这些技术特征的组合不存在矛盾,都应当认为是本说明书记载的范围。
以上所述实施例仅表达了本申请的几种实施方式,其描述较为具体和详细,但并不能因此而理解为对发明专利范围的限制。应当指出的是,对于本领域的普通技术人员来说,在不脱离本申请构思的前提下,还可以做出若干变形和改进,这些都属于本申请的保护范围。因此,本申请专利的保护范围应以所附权利要求为准。
Claims (20)
- 一种脚本缺陷扫描方法,由服务器执行,包括:当检测到代码编辑页面中的代码脚本提交按钮被点击时,获取提交的代码脚本;根据所述代码脚本中的代码标识,获取与所述代码标识对应的预设检查点;生成与获取到的预设检查点对应的检查任务流;按照所述检查任务流中的任务顺序读取检查任务;及根据读取到的检查任务对所述代码脚本进行扫描,得到读取到的检查任务所对应的缺陷扫描结果。
- 根据权利要求1所述的方法,其特征在于,所述当检测到代码编辑页面中的代码脚本提交按钮被点击时,获取提交的代码脚本包括:当检测到代码编辑页面中的代码脚本提交按钮被点击时,读取各脚本部分标识分别对应的脚本提交时间;所述脚本部分标识与所述脚本提交时间一一对应;确定属于预设时间段内的脚本提交时间所对应的脚本部分标识;及从代码脚本库中提取与确定的脚本部分标识对应的脚本部分。
- 根据权利要求1所述的方法,其特征在于,所述生成与获取到的预设检查点对应的检查任务流包括:遍历检查节点树中的检查节点;所述检查节点树为根据所述预设检查点的检查适用范围级别的大小顺序构建的;创建与遍历到的检查节点树中的检查节点对应的检查任务;及按照遍历顺序根据创建的检查任务构成检查任务流。
- 根据权利要求1所述的方法,其特征在于,所述根据读取到的检查任务对所述代码脚本进行扫描,得到读取到的检查任务所对应的缺陷扫描结果包括:解析读取到的检查任务的检查类型;当检查类型为参数检查类型时,查询与检查任务对应的规范检查文件;根据所述规范检查文件生成参数调用指令;根据所述参数调用指令获取所述代码脚本的配置参数;及按照所述规范检查文件对获取到的配置参数进行扫描检查,得到读取到的检查任务所对应的缺陷扫描结果。
- 根据权利要求1所述的方法,其特征在于,所述根据读取到的检查任务对所述代码脚本进行扫描,得到读取到的检查任务所对应的缺陷扫描结果之后,还包括:提取所述缺陷扫描结果中代码缺陷对应的代码位置;查询与提取到的代码位置对应的开发者账号;生成与所述开发者账号对应的代码缺陷通知;及将所述代码缺陷通知发送至以所述开发者账号登录的终端。
- 根据权利要求5所述的方法,其特征在于,所述将所述代码缺陷通知发送至以所述开发者账号登录的终端之后,还包括:接收以所述开发者账号登录的终端,根据所述代码缺陷通知返回的代码修改指令;提取所述代码修改指令中修改信息和代码修改位置;确定所述代码修改位置对应的部分代码脚本;及按照所述修改信息对所述部分代码脚本进行修改。
- 根据权利要求1-6中任一项所述的方法,其特征在于,所述方法还包括:接收检查点添加指令;提取所述检查点添加指令中的权限验证信息;通过权限配置表中的检查点添加权限信息对权限验证信息进行验证;当对权限验证信息验证通过后,则提取检查点添加指令中的脚本规范信息;及根据所述脚本规范信息创建检查点。
- 根据权利要求4所述的方法,其特征在于,所述根据所述参数调用指令获取所述代码脚本的配置参数包括:获取所述代码脚本对应的参数配置文件;及从所述参数配置文件中查询与所述参数调用指令中的参数类型匹配的配置参数。
- 根据权利要求4所述的方法,其特征在于,所述按照所述规范检查文件对获取到的配置参数进行扫描检查,得到读取到的检查任务所对应的缺陷扫描结果包括:按照所述规范检查文件对获取到的配置参数进行扫描检查;提取所述规范检查文件中的规范配置参数;及将所述规范配置参数与获取到的配置参数比较,以确定所述配置参数的缺陷扫描结果;所述方法还包括:根据确定的缺陷扫描结果生成脚本缺陷报告。
- 根据权利要求5所述的方法,其特征在于,所述生成与所述开发者账号对应的代码缺陷通知包括:确定所述代码位置所属脚本部分的脚本部分标识;及对所述代码缺陷、所述代码位置和所确定的脚本部分标识进行封装,得到与所述开发者账号对应的代码缺陷通知。
- 一种脚本缺陷扫描装置,其特征在于,所述装置包括:脚本获取模块,用于当检测到代码编辑页面中的代码脚本提交按钮被点击时,获取提交的代码脚本;检查点获取模块,用于根据所述代码脚本中的代码标识,获取与所述代码标识对应的预设检查点;任务流生成模块,用于生成与获取到的预设检查点对应的检查任务流;任务读取模块,用于按照所述检查任务流中的任务顺序读取检查任务;及代码扫描模块,用于根据读取到的检查任务对所述代码脚本进行扫描,得到读取到的检查任务所对应的缺陷扫描结果。
- 一种计算机设备,包括存储器及一个或多个处理器,所述存储器中储存有计算机可 读指令,所述计算机可读指令被所述一个或多个处理器执行时,使得所述一个或多个处理器执行以下步骤:当检测到代码编辑页面中的代码脚本提交按钮被点击时,获取提交的代码脚本;根据所述代码脚本中的代码标识,获取与所述代码标识对应的预设检查点;生成与获取到的预设检查点对应的检查任务流;按照所述检查任务流中的任务顺序读取检查任务;及根据读取到的检查任务对所述代码脚本进行扫描,得到读取到的检查任务所对应的缺陷扫描结果。
- 根据权利要求12所述的计算机设备,其特征在于,所述当检测到代码编辑页面中的代码脚本提交按钮被点击时,获取提交的代码脚本;所述处理器执行所述计算机可读指令时还执行以下步骤:当检测到代码编辑页面中的代码脚本提交按钮被点击时,读取各脚本部分标识分别对应的脚本提交时间;所述脚本部分标识与所述脚本提交时间一一对应;确定属于预设时间段内的脚本提交时间所对应的脚本部分标识;及从代码脚本库中提取与确定的脚本部分标识对应的脚本部分。
- 根据权利要求12所述计算机设备,其特征在于,所述生成与获取到的预设检查点对应的检查任务流;所述处理器执行所述计算机可读指令时还执行以下步骤:遍历检查节点树中的检查节点;所述检查节点树为根据所述预设检查点的检查适用范围级别的大小顺序构建的;创建与遍历到的检查节点树中的检查节点对应的检查任务;及按照遍历顺序根据创建的检查任务构成检查任务流。
- 根据权利要求12所述的计算机设备,其特征在于,所述根据读取到的检查任务对所述代码脚本进行扫描,得到读取到的检查任务所对应的缺陷扫描结果;所述处理器执行所述计算机可读指令时还执行以下步骤:解析读取到的检查任务的检查类型;当检查类型为参数检查类型时,查询与检查任务对应的规范检查文件;根据所述规范检查文件生成参数调用指令;根据所述参数调用指令获取所述代码脚本的配置参数;及按照所述规范检查文件对获取到的配置参数进行扫描检查,得到读取到的检查任务所对应的缺陷扫描结果。
- 根据权利要求12所述的计算机设备,其特征在于,所述根据读取到的检查任务对所述代码脚本进行扫描,得到读取到的检查任务所对应的缺陷扫描结果之后,所述处理器执行所述计算机可读指令时还执行以下步骤:提取所述缺陷扫描结果中代码缺陷对应的代码位置;查询与提取到的代码位置对应的开发者账号;生成与所述开发者账号对应的代码缺陷通知;及将所述代码缺陷通知发送至以所述开发者账号登录的终端。
- 一个或多个存储有计算机可读指令的非易失性计算机可读存储介质,所述计算机可读指令被一个或多个处理器执行时,使得所述一个或多个处理器执行以下步骤:当检测到代码编辑页面中的代码脚本提交按钮被点击时,获取提交的代码脚本;根据所述代码脚本中的代码标识,获取与所述代码标识对应的预设检查点;生成与获取到的预设检查点对应的检查任务流;按照所述检查任务流中的任务顺序读取检查任务;及根据读取到的检查任务对所述代码脚本进行扫描,得到读取到的检查任务所对应的缺陷扫描结果。
- 根据权利要求17所述的存储介质,其特征在于,所述当检测到代码编辑页面中的代码脚本提交按钮被点击时,获取提交的代码脚本;所述处理器执行所述计算机可读指令时还执行以下步骤:当检测到代码编辑页面中的代码脚本提交按钮被点击时,读取各脚本部分标识分别对应的脚本提交时间;所述脚本部分标识与所述脚本提交时间一一对应;确定属于预设时间段内的脚本提交时间所对应的脚本部分标识;及从代码脚本库中提取与确定的脚本部分标识对应的脚本部分。
- 根据权利要求17所述的存储介质,其特征在于,所述生成与获取到的预设检查点对应的检查任务流;所述处理器执行所述计算机可读指令时还执行以下步骤:遍历检查节点树中的检查节点;所述检查节点树为根据所述预设检查点的检查适用范围级别的大小顺序构建的;创建与遍历到的检查节点树中的检查节点对应的检查任务;及按照遍历顺序根据创建的检查任务构成检查任务流。
- 根据权利要求17所述的存储介质,其特征在于,所述根据读取到的检查任务对所述代码脚本进行扫描,得到读取到的检查任务所对应的缺陷扫描结果;所述处理器执行所述计算机可读指令时还执行以下步骤:解析读取到的检查任务的检查类型;当检查类型为参数检查类型时,查询与检查任务对应的规范检查文件;根据所述规范检查文件生成参数调用指令;根据所述参数调用指令获取所述代码脚本的配置参数;及按照所述规范检查文件对获取到的配置参数进行扫描检查,得到读取到的检查任务所对应的缺陷扫描结果。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910419265.8A CN110231937B (zh) | 2019-05-20 | 2019-05-20 | 脚本缺陷扫描方法、装置、计算机设备和存储介质 |
CN201910419265.8 | 2019-05-20 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2020232883A1 true WO2020232883A1 (zh) | 2020-11-26 |
Family
ID=67860844
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2019/103156 WO2020232883A1 (zh) | 2019-05-20 | 2019-08-29 | 脚本缺陷扫描方法、装置、计算机设备和存储介质 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN110231937B (zh) |
WO (1) | WO2020232883A1 (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113535704A (zh) * | 2021-07-30 | 2021-10-22 | 数网金融有限公司 | 一种扫描方法、装置、设备及存储介质 |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112650663A (zh) * | 2019-10-11 | 2021-04-13 | 上海哔哩哔哩科技有限公司 | 一种代码处理方法、装置、设备及介质 |
CN110879883B (zh) * | 2019-11-29 | 2021-05-28 | 杭州迪普科技股份有限公司 | 软件缺陷的修复授权方法、装置、计算机设备及存储介质 |
CN111078568B (zh) * | 2019-12-20 | 2023-10-31 | 广州华多网络科技有限公司 | 代码规范方法、装置、计算机设备和存储介质 |
CN111309631B (zh) * | 2020-03-16 | 2024-04-09 | 深信服科技股份有限公司 | 一种代码审计方法、装置、设备及计算机可读存储介质 |
CN113568681A (zh) * | 2021-07-29 | 2021-10-29 | 北京搜房科技发展有限公司 | 代码执行方法及装置 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104133768A (zh) * | 2014-07-28 | 2014-11-05 | 中国银行股份有限公司 | 一种程序代码复查方法和装置 |
CN108304327A (zh) * | 2018-02-02 | 2018-07-20 | 平安证券股份有限公司 | 静态代码扫描结果处理方法和装置 |
US10169202B2 (en) * | 2016-10-28 | 2019-01-01 | International Business Machines Corporation | Code component debugging in an application program |
CN109359028A (zh) * | 2018-08-22 | 2019-02-19 | 平安科技(深圳)有限公司 | 代码质量监控方法、装置、计算机设备及存储介质 |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103092761B (zh) * | 2013-02-05 | 2015-05-27 | 烽火通信科技股份有限公司 | 基于差异信息文件识别和检查修改代码块的方法及装置 |
CN105159831A (zh) * | 2015-08-31 | 2015-12-16 | 浪潮集团有限公司 | 一种软件代码质量自动监控方法 |
CN106445804B (zh) * | 2016-08-24 | 2019-04-05 | 北京奇虎测腾安全技术有限公司 | 一种基于序列化中间表示的源代码云检测系统及方法 |
CN109117633B (zh) * | 2018-08-13 | 2022-11-04 | 百度在线网络技术(北京)有限公司 | 静态源码扫描方法、装置、计算机设备及存储介质 |
CN109343890A (zh) * | 2018-08-17 | 2019-02-15 | 武汉精立电子技术有限公司 | 一种代码集成方法及系统 |
CN109711802A (zh) * | 2018-12-14 | 2019-05-03 | 深圳壹账通智能科技有限公司 | 项目信息处理方法、装置、计算机设备和存储介质 |
-
2019
- 2019-05-20 CN CN201910419265.8A patent/CN110231937B/zh active Active
- 2019-08-29 WO PCT/CN2019/103156 patent/WO2020232883A1/zh active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104133768A (zh) * | 2014-07-28 | 2014-11-05 | 中国银行股份有限公司 | 一种程序代码复查方法和装置 |
US10169202B2 (en) * | 2016-10-28 | 2019-01-01 | International Business Machines Corporation | Code component debugging in an application program |
CN108304327A (zh) * | 2018-02-02 | 2018-07-20 | 平安证券股份有限公司 | 静态代码扫描结果处理方法和装置 |
CN109359028A (zh) * | 2018-08-22 | 2019-02-19 | 平安科技(深圳)有限公司 | 代码质量监控方法、装置、计算机设备及存储介质 |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113535704A (zh) * | 2021-07-30 | 2021-10-22 | 数网金融有限公司 | 一种扫描方法、装置、设备及存储介质 |
Also Published As
Publication number | Publication date |
---|---|
CN110231937A (zh) | 2019-09-13 |
CN110231937B (zh) | 2024-10-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2020232883A1 (zh) | 脚本缺陷扫描方法、装置、计算机设备和存储介质 | |
CN111563368B (zh) | 报表生成方法、装置、计算机设备和存储介质 | |
CN110209652B (zh) | 数据表迁移方法、装置、计算机设备和存储介质 | |
WO2020181839A1 (zh) | 页面数据测试方法、装置、计算机设备和存储介质 | |
CN109446068B (zh) | 接口测试方法、装置、计算机设备和存储介质 | |
CN109474578B (zh) | 报文消息校验方法、装置、计算机设备和存储介质 | |
CN108197200B (zh) | 日志追踪方法、装置、计算机设备和存储介质 | |
CN110941546A (zh) | Web页面用例的自动化测试方法、装置、设备及存储介质 | |
CN112148509A (zh) | 数据处理方法、装置、服务器及计算机可读存储介质 | |
CN110569035B (zh) | 软件开发项目的代码编译方法、装置、设备和存储介质 | |
CN109614469A (zh) | 一种日志分析方法和装置 | |
CN110109656B (zh) | 接口模拟方法、装置、计算机设备和存储介质 | |
US20160283357A1 (en) | Call stack relationship acquiring method and apparatus | |
CN111680008B (zh) | 日志处理方法、系统、可读存储介质及智能设备 | |
CN107092535B (zh) | 用于测试接口的数据存储的方法及设备 | |
CN104794048A (zh) | 一种ui自动化测试方法和系统 | |
WO2021120628A1 (zh) | 基于区块链的敏感词检测方法、装置、计算机设备和计算机可读存储介质 | |
WO2019104891A1 (zh) | 报表导入导出的方法、装置、存储介质及终端 | |
CN111242317A (zh) | 管理应用的方法、装置、计算机设备和存储介质 | |
CN114610635A (zh) | 接口测试用例生成方法、装置、计算机设备及存储介质 | |
CN111538754A (zh) | 一种数据归集管理系统、方法、装置、设备和存储介质 | |
CN110874216B (zh) | 一种完备代码生成方法、装置、设备和存储介质 | |
CN112215015B (zh) | 翻译文本修订方法、装置、计算机设备和存储介质 | |
CN113886221B (zh) | 测试脚本生成方法、装置、存储介质及电子设备 | |
CN112416781B (zh) | 跨系统接口确定方法、装置、计算机设备和存储介质 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 19929213 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 19929213 Country of ref document: EP Kind code of ref document: A1 |