Detailed Description
Example embodiments will now be described more fully with reference to the accompanying drawings. However, the exemplary embodiments may be embodied in many forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of the example embodiments to those skilled in the art.
Furthermore, the described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided to give a thorough understanding of embodiments of the application. One skilled in the relevant art will recognize, however, that the application may be practiced without one or more of the specific details, or with other methods, components, devices, steps, etc. In other instances, well-known methods, devices, implementations, or operations are not shown or described in detail to avoid obscuring aspects of the application.
The block diagrams depicted in the figures are merely functional entities and do not necessarily correspond to physically separate entities. That is, the functional entities may be implemented in software, or in one or more hardware modules or integrated circuits, or in different networks and/or processor devices and/or microcontroller devices.
The flow diagrams depicted in the figures are exemplary only, and do not necessarily include all of the elements and operations/steps, nor must they be performed in the order described. For example, some operations/steps may be decomposed, and some operations/steps may be combined or partially combined, so that the order of actual execution may be changed according to actual situations.
It should be noted that: references herein to "a plurality" means two or more. "and/or" describes an association relationship of an association object, meaning that there may be three relationships, e.g., a and/or B may represent: a exists alone, A and B exist together, and B exists alone. The character "/" generally indicates that the context-dependent object is an "or" relationship.
It should be noted that the terms "first," "second," and the like in the description and claims of the present application and in the above-described figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the objects so used may be interchanged where appropriate such that the embodiments of the application described herein may be implemented in other sequences than those illustrated or otherwise described.
Fig. 1 shows a schematic diagram of an exemplary system architecture to which the technical solution of an embodiment of the present application may be applied.
As shown in fig. 1, the system architecture may include a terminal device (one or more of a smartphone 101, a tablet 102, and a portable computer 103 as shown in fig. 1), a network 104, and a server 105. The network 104 is the medium used to provide communication links between the terminal devices and the server 105. The network 104 may include various connection types, such as wired communication links, wireless communication links, and the like.
In one embodiment of the present application, the code editing scheme may be implemented by a system formed by a terminal device and a server 105, specifically, the terminal device may send an authentication request to the server 105, after the authentication of the server 105 to the terminal device is passed, the server 105 establishes an information transmission channel with the terminal device, after the information transmission channel between the server 105 and the terminal device is established, the code in the server 105 may be remotely displayed on the terminal device, and the code may be edited on the terminal device, and the server 105 obtains the code editing content in the terminal device through the information transmission channel, and synchronously edits the code editing content to a position corresponding to the code editing content in the code of the server 105.
In the system formed by the terminal devices and the server 105 in this embodiment, the number of the terminal devices may be plural, that is, the editing of the code in the server 105 may be implemented by plural terminal devices, which has the advantage that the code development efficiency can be greatly improved by the collaborative development of the code by plural terminal devices.
In this embodiment, the code editing content may also be written into the blockchain, and by using the non-tamperability of the blockchain, the record of the code editing content may be well ensured to be preserved.
It should also be noted that the number of terminal devices, networks and servers in fig. 1 is merely illustrative. According to the implementation requirement, the server can be an independent physical server, a server cluster or a distributed system formed by a plurality of physical servers, and can also be a cloud server for providing cloud services, cloud databases, cloud computing, cloud functions, cloud storage, network services, cloud communication, middleware services, domain name services, security services, CDNs, basic cloud computing services such as big data and artificial intelligent platforms and the like. The terminal may be a smart phone, a tablet computer, a notebook computer, a desktop computer, a smart speaker, a smart watch, etc., but is not limited thereto, and the present application is not limited thereto.
It should be explained that cloud computing (closed computing) as described above is a computing mode that distributes computing tasks over a resource pool formed by a large number of computers, enabling various application systems to acquire computing power, storage space, and information services as needed. The network that provides the resources is referred to as the "cloud". Resources in the cloud can be infinitely expanded in the sense of users, can be acquired at any time, can be used as required and can be expanded at any time. By establishing a cloud computing resource pool (cloud platform for short, generally called IaaS (Infrastructure AS A SERVICE) platform), multiple types of virtual resources are deployed in the resource pool for external clients to select for use.
When the server is a cloud server, the cloud server has large storage space and strong computing capability, so that computing resources and storage resources required in the code development process can be provided and met, and further the code development efficiency can be improved.
The implementation details of the technical solution of the embodiment of the present application will be described in detail from the perspective of different execution bodies:
from the perspective of the service side (e.g., cloud server), the following is set forth:
The present embodiment provides a code editing method, wherein the method may be executed in a service side.
Referring to fig. 2, a flowchart of a code editing method according to an embodiment of the present application is shown, the code editing method at least includes steps 210 to 270, and the following is described in detail:
In step 210, the identity of the code development terminal is verified based on the identity verification request sent by the code development terminal.
In one embodiment of step 210, verifying the identity of the code development terminal may be performed as shown in fig. 3.
Referring to fig. 3, a detailed flow diagram of verifying the identity of the code development terminal is shown, according to one embodiment of the application. Specifically, the method comprises the steps 211 to 213:
in step 211, a first public key generated by a service side is transmitted to the code development terminal, the first public key being used for encrypting self authentication information by the code development terminal.
In step 212, the authentication information encrypted data sent by the code development terminal is obtained, and the authentication information encrypted data is decrypted by the first private key of the service side, so as to obtain the authentication information of the code development terminal.
In step 213, the identity of the code development terminal is verified by the identity verification information.
In order for those skilled in the art to better understand the present embodiment, the present embodiment will be described with reference to fig. 4, such as fig. 4, which shows an interaction diagram between a code development terminal and a service side according to an embodiment of the present application.
As shown in fig. 4, first, a first key pair is generated by the service side 120, the first key pair including a first public key and a first private key; the code development terminal 110 requests connection to the service side 120; the service side 120 transmits the first public key to the code development terminal 110; after receiving the first public key of the service side, the code development terminal 110 encrypts the authentication information through the first public key to obtain authentication information encrypted data, and sends the authentication information encrypted data to the service side 120; the service side 120 decrypts the encrypted data of the authentication information through its own first private key to obtain authentication information (such as an account number and an authentication password), and authenticates the code development terminal through the authentication information.
If the authentication information is correct, the service side 120 passes the authentication of the code development terminal 110, and if the authentication information fails, the service side 120 does not pass the authentication of the code development terminal 110.
The code development terminal is verified in the interaction mode, and the identity verification information of the code development terminal is encrypted by the first public key of the service side, so that the security of the identity verification information can be ensured in the process of transmitting the identity verification information to the service side.
In another embodiment of step 210, verifying the identity of the code development terminal may be performed as shown in fig. 5.
Referring to fig. 5, a detailed flow diagram of verifying the identity of the code development terminal is shown, according to one embodiment of the application. Specifically, steps 214 to 217 are included:
In step 214, an original string is generated, and the original string is encrypted by the second public key generated by the code development terminal, so as to obtain the encrypted data of the original string.
In step 215, the encrypted data of the original string is transmitted to the code development terminal.
In step 216, a verification string sent by the code development terminal is obtained, where the verification string is obtained by decrypting the original string encrypted data by the code development terminal through its second private key.
In step 217, the identity of the code development terminal is verified by the verification string.
In order for those skilled in the art to better understand the present embodiment, the present embodiment will be described with reference to fig. 6, which shows an interaction diagram between a code development terminal and a service side according to an embodiment of the present application.
As shown in fig. 6, first, a second key pair including a second public key and a second private key is generated by the code development terminal 110, and the second public key is transmitted to the service side 120;
The code development terminal 110 requests connection to the service side 120; after receiving the connection request sent by the code development terminal 110, the service side 120 generates an original character string, encrypts the original character string by using a second public key to obtain original character string encrypted data, and sends the original character string encrypted data to the code development terminal 110; after receiving the original string encrypted data, the code development terminal 110 decrypts the original string encrypted data by using the second private key to obtain an original string, and sends the original string to the service side 120; the service side 120 authenticates the code development terminal 110 through the original character string acquired from the code development terminal 110.
If the original string obtained from the code development terminal 110 matches the original string generated by the service side 120 itself, the service side 120 passes the verification of the code development terminal 110, and if the original string obtained from the code development terminal 110 does not match the original string generated by the service side 120 itself, the service side 120 does not pass the verification of the code development terminal 110.
The code development terminal is verified in the interactive mode, and the identity verification information of the code development terminal is not involved in the process of verifying the code development terminal, so that the identity verification information of the code development terminal is not required to be safely managed, computer resources are saved, and meanwhile, the accuracy of the identity verification of the code development terminal can be realized in view of the uniqueness of the second private key in the code development terminal.
In other embodiments of step 210, the identity of the code development terminal may be verified, and the verification schemes of steps shown in fig. 3 and fig. 5 may be performed simultaneously, which is advantageous in that the accuracy and reliability of the identity verification of the code development terminal may be improved through multiple verification schemes.
In other embodiments of step 210 of the present application, the identity verification of the code development terminal may also be implemented by constructing a Secure Shell (SSH) framework.
In particular, the secure shell protocol may be composed of software on the code development terminal and service side. The service side is a daemon running in the background and responding to the connection request from the code development terminal, and specifically provides processing of remote connection, which can include public key authentication, key exchange, symmetric key encryption and unsecure connection.
The code development terminal may include secure shell protocol programs, remote copy, remote login, secure file transfer, and other applications.
The working mechanism of the secure shell protocol is that a local code development terminal sends a connection request to a remote service side, the service side checks a request data packet and an IP address of the application and sends a key to the code development terminal, and the key is sent back to the service side locally, thereby completing verification and connection establishment. With continued reference to fig. 2, in step 230, after the authentication of the code development terminal is passed, an information transmission channel with the code development terminal is established.
In one embodiment of the present application, after an information transmission channel with the code development terminal is established, a service side may transmit a local service side code to the code development terminal through the information transmission channel to display the local service side code in a code editor of the code development terminal.
In the application, the local service side code is displayed in the code editor of the code development terminal, so that the code developer can edit the code data through the code editor.
When the code developer performs code editing in the code editor, the code development terminal enters a code editing state.
With continued reference to fig. 2, in step 250, code editing content in the code development terminal is acquired through the information transmission channel while the code development terminal is in a code editing state.
In the application, the service side can detect whether the code development terminal is in a code editing state through the information transmission channel, and when the service side detects that the code development terminal is in the code editing state, the service side can acquire code editing content in the code development terminal through the information transmission channel.
In the application, the service side can realize detection by sending the heartbeat packet to the code development terminal in the process of detecting whether the code development terminal is in the code editing state through the information transmission channel, wherein the heartbeat packet is used for triggering the code development terminal to generate a response.
Specifically, the service side may send the heartbeat packet to the code development terminal at regular intervals, for example, may send a fixed message to the code development terminal at intervals of several minutes or several seconds, and the code development terminal replies a response message after receiving the heartbeat packet, and the service side may determine the code development state of the code development terminal through the response message.
It should be noted that the heartbeat packet is essentially a probe message, and may be an empty data packet. Generally, heartbeat packets are sent at a logic layer, and a heartbeat packet is sent to a code development terminal at a certain time interval through a timer. In step 270, the code editing content is synchronously edited to a position corresponding to the code editing content in the service side code.
In the present application, since the codes in the code editor of the code development terminal and the service side code belong to the same code, the contents of both at the respective positions of the codes are corresponding, for example, the contents of the codes on the same code module are corresponding, and for example, the contents of the codes on the same code line are corresponding.
Therefore, in the process of synchronizing the codes, the service side can synchronously edit the code editing content in the code development terminal to the position corresponding to the code editing content in the code of the service side, for example, the code developer modifies the code of the 280 th row in the code editor of the code development terminal, and then the service side can synchronously modify the code content of the 280 th row in the code of the service side according to the modified content.
Further, in the present application, the code editing content may be synchronously edited to a position corresponding to the code editing content in the service side code in real time, or the code editing content may be synchronously edited to a position corresponding to the code editing content in the service side code at regular time.
In one embodiment of the present application, when the code editing content is synchronously edited to a position corresponding to the code editing content in a service side code, a code synchronization record of a local service side may be obtained, and the code synchronization record is written into a distributed version control system, so that a code developer for other code development terminals browses the code synchronization record.
In the present application, the number of the code development terminals may be plural.
When the code editing content is synchronously edited to a position corresponding to the code editing content in a service side code, the code editing content of any code development terminal in a plurality of code development terminals can be locked to the editing authority of the position corresponding to the code editing content in the service side code, wherein the editing authority is used for uniquely authorizing the synchronous editing of the code editing content to the position corresponding to the code editing content in the service side code.
For example, when the code developer is modifying the 280 th line code in the code editor of the code development terminal a, the service side also synchronously modifies the 280 th line code content in the service side code, and at this time, the service side can lock the editing authority of the 280 th line code in the service side code, under which the code development terminal B, C, D, E is prohibited from editing the 280 th line code except for the code development terminal a.
The application locks the editing authority of the position corresponding to the code editing content in the service side code, and has the advantages that when a plurality of code development terminals edit the codes at the same position at the same time, the condition of disordered code editing is avoided, thus ensuring the code editing order and improving the code development efficiency.
In the application, after the code editing content is synchronously edited to the position corresponding to the code editing content in the service side code, the synchronously edited service side code can be reversely synchronized to the editors of other code development terminals connected with the service side, so that code developers of the other code development terminals can grasp code variation information in time, coordinate code development and improve code development efficiency.
After step 270, that is, after the code editing content is synchronously edited to a position corresponding to the code editing content in the service side code, the service side code needs to be tested.
In the application, the test of the service side code, for example, the test of the website code, can be performed from four aspects of performance test, security test and website optimization test.
Specifically, the performance test includes: a connection speed test, which is the speed of a user connecting to a website system; load test, which is to detect the actual performance of a website system under a certain load level; stress testing, which is the limitation and fault recovery capability of a test system, i.e., a test web site system will not crash.
Specifically, the security test refers to security of a server of a website, and script security test can include vulnerability test, aggression test and error test. The client server application, data, server, network, firewall, etc. of the website system are tested.
Specifically, the website optimization test refers to testing whether a website system is optimized by a search engine, optimizing a website architecture, and listing and static conditions of a webpage.
In one embodiment of the application, the steps shown in FIG. 7 may be performed to effect testing of the service side code.
Referring to fig. 7, a flowchart of a method after synchronously editing the code editing content to a location in a service-side code corresponding to the code editing content is shown, according to one embodiment of the present application. Specifically, steps 281 to 283 are included:
In step 281, the synchronously edited service-side code is run to provide a local access service.
In step 282, an access request is received and serviced by the local access service.
In step 283, the access request is forwarded to a third party service via a reverse proxy server when the service to which the access request relates is not within the service range of the local access service.
In order for those skilled in the art to better understand the present embodiment, the present embodiment will be described with reference to fig. 8, in which a structure diagram of test codes according to one embodiment of the present application is shown as fig. 8.
As shown in fig. 8, the service side includes an intermediate code cloud server 802, and after each code development terminal 801 edits the service side code in the intermediate code cloud server 802, the intermediate code cloud server 802 may be directly used as a test environment for testing the service side code.
In the testing process, the intermediate code cloud server 802 runs the service side code subjected to synchronous editing to provide a local access service, the user access browser 803 accesses the local access service provided by the intermediate code cloud server 802 through the intelligent proxy server 804, the intermediate code cloud server 802 receives an access request and provides a service for the access request of the user access browser 803 by the local access service, and when the service related to the access request does not belong to the service range of the local access service, the intermediate code cloud server 802 forwards the access request to a third party service through the Nginx reverse proxy server arranged locally.
In the application, in order to realize the test of the service side code, the service side is directly used for constructing the test environment, and the service side code test method has the advantages that the simulation degree of the test environment can be enhanced and the test efficiency of the service side code can be improved due to the large storage space and strong calculation capability of the service side. The cloud server is set as the service side, so that the code development environment and the test environment are smoother, more convenient, more intelligent and more convenient, and memory overflow is not easy to occur.
In the application, the code development on the service side is realized remotely through a plurality of code development terminals, so that multiparty code development resources can be coordinated, and the code development efficiency is improved, especially in large code development projects.
The following is an explanation from the point of view of the code development terminal:
the present embodiment provides a code editing method, wherein the method may be executed in a code development terminal.
Referring to fig. 9, a flowchart of a code editing method according to an embodiment of the present application is shown, and the code editing method at least includes steps 910 to 950, which are described in detail as follows:
in step 910, a request for local authentication is sent to the service side.
In step 930, after authentication for local is passed, an information transmission channel with the service side is established.
In step 950, when the local is in the code editing state, the local code editing content is sent to the service side through the information transmission channel, so that the service side synchronously edits the code editing content to a position corresponding to the code editing content in the service side code.
In one embodiment of the present application, when the code development terminal (locally) is in a code editing state, a local code editing record may also be obtained, and the code editing record may be written into the distributed version control system.
The method has the advantages that the code editing record is written into the distributed version control system, so that a code developer can conveniently browse the editing history of the code and quickly jump to a certain historical code state, and the code editing efficiency is improved.
In one embodiment of the present application, when the code development terminal (locally) is in a code editing state, the edited code may also be acquired and cached in the cache cluster.
The advantage of caching the edited code into the cache cluster is that the edited code can be prevented from being lost when the information transmission channel is interrupted, and the edited code cached into the cache cluster can be resent to the service side when the information transmission channel is connected.
In the technical scheme of the embodiment of the application, the remote code development is realized on the service side through the code development terminal, so that the service side can provide and meet the calculation resources and storage resources required in the code development process, and further the code development efficiency can be improved.
The following describes an embodiment of the apparatus of the present application, which can be used to perform the code editing method in the above-described embodiment of the present application. For details not disclosed in the embodiments of the apparatus of the present application, please refer to the above-mentioned embodiments of the code editing method of the present application.
Fig. 10 shows a block diagram of a code editing apparatus according to an embodiment of the present application.
Referring to fig. 10, a code editing apparatus 1000 according to an embodiment of the present application is provided at a service side, the apparatus including: an authentication unit 1001, a first creation unit 1002, a first acquisition unit 1003, and an editing unit 1004.
Wherein, the verification unit 1001 is configured to verify an identity of a code development terminal based on an identity verification request sent by the code development terminal; a first establishing unit 1002, configured to establish an information transmission channel with the code development terminal after passing the authentication of the code development terminal; a first acquisition unit 1003 configured to acquire code editing contents in the code development terminal through the information transmission channel when the code development terminal is in a code editing state; and an editing unit 1004 for synchronously editing the code editing content to a position corresponding to the code editing content in the service side code.
In some embodiments of the present application, based on the foregoing scheme, the verification unit 1001 is configured to: the method comprises the steps that a first public key generated by a service side is sent to a code development terminal, and the first public key is used for encrypting self identity verification information by the code development terminal; acquiring authentication information encryption data sent by a code development terminal, and decrypting the authentication information encryption data through a first private key of a service side to obtain authentication information of the code development terminal; and verifying the identity of the code development terminal through the identity verification information.
In some embodiments of the present application, based on the foregoing scheme, the verification unit 1001 is configured to: generating an original character string, and encrypting the original character string through a second public key generated by the code development terminal to obtain original character string encryption data; transmitting the encrypted data of the original character string to the code development terminal; acquiring a verification character string sent by the code development terminal, wherein the verification character string is obtained by decrypting the original character string encrypted data through a second private key of the code development terminal; and verifying the identity of the code development terminal through the verification character string.
In some embodiments of the application, based on the foregoing, the apparatus further comprises: and a third transmitting unit configured to transmit a local service side code to the code development terminal through the information transmission channel after establishing the information transmission channel with the code development terminal, so as to display the local service side code in a code editor of the code development terminal.
In some embodiments of the present application, based on the foregoing solution, the number of the code development terminals is plural, and the apparatus further includes: and a locking unit configured to lock, when the code editing content is synchronously edited to a position corresponding to the code editing content in a service-side code, an editing right for uniquely authorizing synchronous editing of the code editing content to a position corresponding to the code editing content in the service-side code, with respect to the code editing content of any one of the plurality of code development terminals.
In some embodiments of the application, based on the foregoing, the apparatus further comprises: an operation unit for operating the synchronously edited service side code after synchronously editing the code editing content to a position corresponding to the code editing content in the service side code to provide a local access service; a receiving unit, configured to receive an access request and provide a service for the access request by the local access service; and the forwarding unit is used for forwarding the access request to a third-party service through a reverse proxy server when the service related to the access request does not belong to the service range of the local access service.
Fig. 11 shows a block diagram of a code editing apparatus according to an embodiment of the present application.
Referring to fig. 11, a code editing apparatus 1100 according to an embodiment of the present application is provided to a code development terminal, the apparatus including: a first transmitting unit 1101, a second establishing unit 1102, and a second transmitting unit 1103.
Wherein, the first sending unit 1101 is configured to send an authentication request for local to a service side; a second establishing unit 1102, configured to establish an information transmission channel with the service side after passing authentication for local; the second sending unit 1103 is configured to send, when the local code editing state is in the code editing state, the local code editing content to the service side through the information transmission channel, so that the service side synchronously edits the code editing content to a position corresponding to the code editing content in a code of the service side.
In some embodiments of the application, based on the foregoing, the apparatus further comprises: the second acquisition unit is used for acquiring a local code editing record when the local code editing record is in a code editing state; and a writing unit for writing the code editing record to a distributed version control system.
Fig. 12 shows a schematic diagram of a computer system suitable for use in implementing an embodiment of the application.
It should be noted that, the computer system 1200 of the electronic device shown in fig. 12 is only an example, and should not impose any limitation on the functions and the application scope of the embodiments of the present application.
As shown in fig. 12, the computer system 1200 includes a central processing unit (Central Processing Unit, CPU) 1201 that can perform various appropriate actions and processes, such as performing the methods described in the above embodiments, according to a program stored in a Read-Only Memory (ROM) 1202 or a program loaded from a storage section 1208 into a random access Memory (Random Access Memory, RAM) 1203. In the RAM 1203, various programs and data required for the system operation are also stored. The CPU 1201, ROM 1202, and RAM 1203 are connected to each other through a bus 1204. An Input/Output (I/O) interface 1205 is also connected to bus 1204.
The following components are connected to the I/O interface 1205: an input section 1206 including a keyboard, a mouse, and the like; an output portion 1207 including a Cathode Ray Tube (CRT), a Liquid crystal display (Liquid CRYSTAL DISPLAY, LCD), and a speaker, etc.; a storage section 1208 including a hard disk or the like; and a communication section 1209 including a network interface card such as a LAN (Local Area Network ) card, a modem, or the like. The communication section 1209 performs communication processing via a network such as the internet. The drive 1210 is also connected to the I/O interface 1205 as needed. A removable medium 1211 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is installed as needed on the drive 1210 so that a computer program read out therefrom is installed into the storage section 1208 as needed.
In particular, according to embodiments of the present application, the processes described above with reference to flowcharts may be implemented as computer software programs. For example, embodiments of the present application include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method shown in the flowcharts. In such an embodiment, the computer program can be downloaded and installed from a network via the communication portion 1209, and/or installed from the removable media 1211. When executed by a Central Processing Unit (CPU) 1201, performs the various functions defined in the system of the present application.
It should be noted that, the computer readable medium shown in the embodiments of the present application may be a computer readable signal medium or a computer readable storage medium, or any combination of the two. The computer readable storage medium can be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples of the computer-readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-Only Memory (ROM), an erasable programmable read-Only Memory (Erasable Programmable Read Only Memory, EPROM), a flash Memory, an optical fiber, a portable compact disc read-Only Memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In the present application, however, the computer-readable signal medium may include a data signal propagated in baseband or as part of a carrier wave, with the computer-readable program code embodied therein. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wired, etc., or any suitable combination of the foregoing.
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present application. Where each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units involved in the embodiments of the present application may be implemented by software, or may be implemented by hardware, and the described units may also be provided in a processor. Wherein the names of the units do not constitute a limitation of the units themselves in some cases.
As another aspect, the present application also provides a computer program product or computer program comprising computer instructions stored in a computer readable storage medium. The processor of the computer device reads the computer instructions from the computer-readable storage medium, and the processor executes the computer instructions, so that the computer device performs the code editing method described in the above embodiment.
As another aspect, the present application also provides a computer-readable medium that may be contained in the electronic device described in the above embodiment; or may exist alone without being incorporated into the electronic device. The computer readable medium carries one or more programs which, when executed by one of the electronic devices, cause the electronic device to implement the code editing method described in the above embodiments.
It should be noted that although in the above detailed description several modules or units of a device for action execution are mentioned, such a division is not mandatory. Indeed, the features and functions of two or more modules or units described above may be embodied in one module or unit in accordance with embodiments of the application. Conversely, the features and functions of one module or unit described above may be further divided into a plurality of modules or units to be embodied.
From the above description of embodiments, those skilled in the art will readily appreciate that the example embodiments described herein may be implemented in software, or may be implemented in software in combination with the necessary hardware. Thus, the technical solution according to the embodiments of the present application may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (may be a CD-ROM, a U-disk, a mobile hard disk, etc.) or on a network, and includes several instructions to cause a computing device (may be a personal computer, a server, a touch terminal, or a network device, etc.) to perform the method according to the embodiments of the present application.
Other embodiments of the application will be apparent to those skilled in the art from consideration of the specification and practice of the embodiments disclosed herein. This application is intended to cover any variations, uses, or adaptations of the application following, in general, the principles of the application and including such departures from the present disclosure as come within known or customary practice within the art to which the application pertains.
It is to be understood that the application is not limited to the precise arrangements and instrumentalities shown in the drawings, which have been described above, and that various modifications and changes may be effected without departing from the scope thereof. The scope of the application is limited only by the appended claims.