Movatterモバイル変換


[0]ホーム

URL:


CN115437923B - A static checking method based on XML test script code - Google Patents

A static checking method based on XML test script code

Info

Publication number
CN115437923B
CN115437923BCN202210978519.1ACN202210978519ACN115437923BCN 115437923 BCN115437923 BCN 115437923BCN 202210978519 ACN202210978519 ACN 202210978519ACN 115437923 BCN115437923 BCN 115437923B
Authority
CN
China
Prior art keywords
test
script code
script
fault
file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210978519.1A
Other languages
Chinese (zh)
Other versions
CN115437923A (en
Inventor
潘崇斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Unittec Co Ltd
Original Assignee
Unittec Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Unittec Co LtdfiledCriticalUnittec Co Ltd
Priority to CN202210978519.1ApriorityCriticalpatent/CN115437923B/en
Publication of CN115437923ApublicationCriticalpatent/CN115437923A/en
Application grantedgrantedCritical
Publication of CN115437923BpublicationCriticalpatent/CN115437923B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Classifications

Landscapes

Abstract

Translated fromChinese

本发明公开了一种基于xml测试脚本代码的静态检查方法,包括如下步骤:S1、构建检查规则库;S2、加载待检测脚本代码文件并进行预处理得到若干脚本代码子文件;S3、依次匹配脚本代码子文件的检查规范列表;S4、根据检测规范表的检测逻辑依次对脚本代码子文件进行测试;S5、若测试发生故障,执行S6;若测试未发生故障,执行S9;S6、对故障区段信息进行故障分析和修正后,执行回归静态检查;S7、根据设定执行次数阈值重复执行S5‑S6,若重复次数超过阈值,则执行S8;S8、将出现测试故障的脚本代码子文件的标号关联至故障共享容器;S9、对若干脚本代码子文件进行编织得到目标脚本代码文件。方案显著提高了测试脚本代码检测效率,避免了漏查的问题。

The present invention discloses a static inspection method based on XML test script code, comprising the following steps: S1, building an inspection rule base; S2, loading a script code file to be inspected and performing preprocessing to obtain a plurality of script code subfiles; S3, sequentially matching an inspection specification list of the script code subfiles; S4, sequentially testing the script code subfiles according to the detection logic of the inspection specification table; S5, if a test failure occurs, executing S6; if the test does not fail, executing S9; S6, performing a fault analysis and correction on the fault section information, and then performing a regression static inspection; S7, repeatedly executing S5-S6 according to a set execution number threshold, and if the number of repetitions exceeds the threshold, executing S8; S8, associating the label of the script code subfile with the test failure to a fault shared container; S9, weaving the plurality of script code subfiles to obtain a target script code file. The scheme significantly improves the efficiency of test script code detection and avoids the problem of missed detection.

Description

Static inspection method based on xml test script code
Technical Field
The invention relates to the technical field of data processing, in particular to a static inspection method based on xml test script codes.
Background
The software testing method mainly comprises two methods of manual testing and automatic testing, and with the continuous increase of testing workload and the rising of labor cost, the automatic testing becomes more and more important. Along with the continuous increase and modification of the code amount of the test script, the auditing work of the test script can be continuously increased to ensure the automatic test quality, and when the code amount of the test script reaches hundreds of thousands or even millions, the whole relying on manual inspection is no longer practical.
Disclosure of Invention
The invention aims to solve the problems of low detection efficiency and easy missed detection of test script codes in the prior art, and provides an xml-based automatic test script written by a test script language, which uses the same script language as the script codes to be detected, has good expansibility, can be reused, can replace a large amount of manual detection workload, remarkably improves the detection efficiency of the test script codes, can record the detection rule that the static detection fails, supports the regression detection after the repair of the test script problems, and avoids the missed detection.
The technical scheme provided by the embodiment of the invention is that the static inspection method based on the xml test script code comprises the following steps:
S1, constructing an inspection rule base, and establishing mapping between the inspection rule base and a script analysis executor;
S2, loading a script code file to be detected by a script analysis executor, and preprocessing the script code file to obtain a plurality of script code subfiles;
S3, sequentially matching the checking specification list of the script code sub-files by a script analysis executor, and sequentially associating detection item instructions in a detection rule base in the detection specification list;
S4, testing the script code subfiles in sequence according to detection logic of the detection specification table, and providing a fault detection table;
S5, if the test fails, executing S6, and obtaining the label of the corresponding script code subfile from the fault column in the fault detection table;
s6, performing regression static inspection after performing fault analysis and correction on fault section information corresponding to the label;
s7, repeatedly executing S5-S6 according to the set execution times threshold, and executing S8 if the repetition times exceed the threshold;
s8, relating the labels of the script code subfiles with the test faults to a fault sharing container, wherein the fault sharing container is associated with an expert database;
And S9, when all the script code sub-files pass the test, weaving a plurality of script code sub-files to obtain a target script code file.
Preferably, the construction of the detection rule base in S1 includes the following steps:
determining a checking rule according to the language specification and the use requirement of the xml test script language;
Static check rule codes based on xml test script language are written in a regular expression mode.
Preferably, in S2, preprocessing the script code file to obtain a plurality of script code subfiles, wherein the script code file is divided into a plurality of script code subfiles according to the test item attribute of the script code file;
Recording a start code row, an end code row and a code row difference value of each script code subfile;
And (3) distributing the separation slots in the test container according to the code line difference values, storing a plurality of script code subfiles into the separation slots of the test container to be tested, marking, extracting the marks as test sequences, and establishing mapping between the sequence bits of the test sequences and the separation slots.
Preferably, S3 includes the steps of:
And the script analysis executor sequentially acquires script code subfiles in the container to be tested according to the detection logic of the test sequence, and invokes corresponding detection item instructions to test the script code subfiles.
Preferably, S5 includes the steps of:
If the test fails, the fault column in the fault detection table automatically acquires the label information of the corresponding script code subfile;
and mapping the fault column and the corresponding test sequence bit.
Preferably, in S8, the labels of the script code subfiles in which the test faults occur are associated to a fault sharing container, and the fault sharing container is associated with an expert database, including the steps of:
The fault sharing container establishes mapping with test sequence bits for testing faults, and script code subfiles corresponding to the test sequence bits are obtained;
Acquiring fault section information of the corresponding script code subfile according to the script analysis executor;
associating an expert database according to the attribute characteristics of the fault section information, wherein a daily task popup window is arranged in the expert database;
And converting the fault section information into an Excel format file, filling the Excel format file into a task popup window of an expert library, and processing the corresponding fault section information by the expert according to the task popup window.
Preferably, in S9, when all the script code subfiles pass the test, a plurality of script code subfiles are woven to obtain a target script code file, including:
Sequentially calling script code subfiles corresponding to the test sequence bits, and copying the script code subfiles into a compiling environment according to sequential logic of the test sequence;
Comparing the difference value of the start code row, the end code row and the code row of each script code subfile with the recorded value, generating a target script code file if the difference value of the start code row, the end code row and the code row is matched with the historical recorded value, and checking if the difference value is not matched with the historical recorded value.
The invention has the advantages that an automatic test script is compiled based on an xml test script language, manual inspection is replaced by compiling static inspection rules, the workload of manual inspection of codes is greatly reduced, meanwhile, the compiled inspection rules can be repeatedly used, a large amount of labor cost is saved, the static inspection rules are compiled by using the same script language as the inspected test script codes, test developers can quickly compile or modify the inspection rules, meanwhile, because the inspection rules are keyword-driven, different parameters can be freely expanded, different inspection rules can be freely expanded by using different parameters, the language specifications and the use requirements of the inspected test script codes are various, the static rules are compiled by using a regular expression mode, the flexibility of compiling the inspection rules is greatly improved, the workload and difficulty of compiling the inspection rules are reduced, after static inspection is executed, the failed inspection rules of the test script codes can be recorded and reported wrong, after the test scripts are modified according to an inspected problem list, the failed inspection rules of the last inspection can be independently executed for regression inspection, the overall inspection efficiency is greatly improved, and the fault handling efficiency is further improved to a fault expert is further notified according to the high-level fault handling efficiency.
The foregoing summary is merely an overview of the present invention, and is intended to be implemented in accordance with the teachings of the present invention in order that the same may be more fully understood, and in order that the same or additional objects, features and advantages of the present invention may be more fully understood.
Drawings
Other features, objects and advantages of the present invention will become more apparent upon reading of the detailed description of non-limiting embodiments made with reference to the following drawings. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the invention. Also, like reference numerals are used to designate like parts throughout the figures.
FIG. 1 is a flow chart of a static inspection method based on xml test script code according to the present invention.
FIG. 2 is a diagram of an exemplary static inspection code for a test script according to the present invention.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the present invention more apparent, the present invention will be described in further detail with reference to the accompanying drawings and examples, it being understood that the detailed description herein is merely a preferred embodiment of the present invention, which is intended to illustrate the present invention, and not to limit the scope of the invention, as all other embodiments obtained by those skilled in the art without making any inventive effort fall within the scope of the present invention.
Before discussing the exemplary embodiments in more detail, it should be mentioned that some exemplary embodiments are described as processes or methods depicted as flowcharts. Although a flowchart depicts operations (or steps) as a sequential process, many of the operations (or steps) can be performed in parallel, concurrently, or at the same time. Furthermore, the order of the operations may be rearranged. The process may be terminated when its operations are completed, but may have additional steps not included in the figures, the process may correspond to a method, a function, a procedure, a subroutine, etc.
Embodiment As shown in FIG. 1, a static inspection method based on xml test script code comprises the following steps:
S1, constructing an inspection rule base, and establishing mapping between the inspection rule base and a script analysis executor;
S2, loading a script code file to be detected by a script analysis executor, and preprocessing the script code file to obtain a plurality of script code subfiles;
S3, sequentially matching the checking specification list of the script code sub-files by a script analysis executor, and sequentially associating detection item instructions in a detection rule base in the detection specification list;
S4, testing the script code subfiles in sequence according to detection logic of the detection specification table, and providing a fault detection table;
S5, if the test fails, executing S6, and obtaining the label of the corresponding script code subfile from the fault column in the fault detection table;
s6, performing regression static inspection after performing fault analysis and correction on fault section information corresponding to the label;
s7, repeatedly executing S5-S6 according to the set execution times threshold, and executing S8 if the repetition times exceed the threshold;
s8, relating the labels of the script code subfiles with the test faults to a fault sharing container, wherein the fault sharing container is associated with an expert database;
And S9, when all the script code sub-files pass the test, weaving a plurality of script code sub-files to obtain a target script code file.
In this embodiment, the inspection rule library is provided with an inspection rule matching the script code subfile, the inspection rule is written using the same scripting language as the inspected script code subfile, the test developer can quickly write or modify the inspection rule, the expansibility is good, the test developer can replace a large amount of manual inspection workload, the test script code detection efficiency is remarkably improved, meanwhile, the inspection rule which is failed in static inspection can be recorded, the regression inspection after the test script problem is repaired is supported, the problem of missed inspection is avoided, and the method is synchronous.
The step S1 of constructing a detection rule base comprises the following steps:
determining a checking rule according to the language specification and the use requirement of the xml test script language;
Static check rule codes based on xml test script language are written in a regular expression mode.
In the scheme, the inspection rules are driven by keywords, and different inspection rules can be freely expanded by using different keywords, and specifically, as shown in fig. 2, each group of inspection specifications comprises one or more inspection items, wherein the inspection items can be driven by CheckXMLNodeName (for checking whether the node names of the test case scripts are correct), checkXMLNodePropName (for checking whether the attribute names of the test case scripts are correct), regexCheckExecStepMatch (for checking the matching property of the execution steps of the test case scripts by a regular expression mode), regexCheckExecStepPostConditionMatch (for checking the matching property of the execution steps and the post conditions of the test case scripts by the regular expression mode) and CheckExecStepRuleExist (for checking whether the keywords used by the test case scripts exist).
Further, a c++ development language is used to add a function of checking rule keywords in the test script parsing executor, wherein different keywords can freely expand different checking rules, and typical keywords can be:
CheckXMLNodeName (check whether the test case script node name is correct)
CheckXMLNodePropName (check whether the test case script node attribute name is correct)
CheckXMLNodePropValueExist (check whether test case script node attribute value exists)
RegexCheckXMLNodePropValueOrMatch (regular expression mode checking whether the test case script node attribute value is correct)
RegexCheckExecStepMatch (regular expression mode checking test case script execution step matching)
RegexCheckExecStepPostConditionMatch (regular expression mode checking test case script execution step and post condition matching)
RegexCheckExecPostConditionMatch (regular expression type checking test case script post condition matching)
RegexCheckRevExecStepMatch (regular expression reverse check test case script execution step match)
RegexCheckRevExecStepPostConditionMatch (regular expression reverse check test case script execution step and post condition matching)
RegexCheckRevExecPostConditionMatch (regular expression reverse check test case script post condition matching)
RegexCheckExecStepTitleMatch (regular expression method checking test script test case title and execution step matching)
RegexCheckSameExecStepMatch (regular expression type checking test case script content match with complex execution step)
RegexCheckSameExecPostConditionMatch (regular expression type checking test case script same compound post condition content matching)
CheckExecStepRuleExist (check whether the keywords used by the test case script exist)
CheckExecStepExist (check whether the test case script execution step exists)
CheckExcelTestCase2ScriptXMLNode (checking whether the automatable test case has a corresponding test script)
CheckScriptXMLNode2ExcelTestCase (check whether the test script has a corresponding test case present)
CheckScriptXMLNodeTitle (check whether the test case header property in the test script is correct)
RegexCheckScriptXMLNodeMatchExcelExecStepExist (check if the corresponding execution step of the test script exists based on the test case key).
S2, preprocessing the script code file to obtain a plurality of script code subfiles, wherein the method comprises the following steps:
Dividing the script code file into a plurality of script code subfiles according to the test item attribute of the script code file;
Recording a start code row, an end code row and a code row difference value of each script code subfile;
And (3) distributing the separation slots in the test container according to the code line difference values, storing a plurality of script code subfiles into the separation slots of the test container to be tested, marking, extracting the marks as test sequences, and establishing mapping between the sequence bits of the test sequences and the separation slots.
S3, comprising the following steps:
And the script analysis executor sequentially acquires script code subfiles in the container to be tested according to the detection logic of the test sequence, and invokes corresponding detection item instructions to test the script code subfiles.
S5, the method comprises the following steps:
If the test fails, the fault column in the fault detection table automatically acquires the label information of the corresponding script code subfile;
and mapping the fault column and the corresponding test sequence bit.
In S8, the labels of the script code subfiles with test faults are associated to a fault sharing container, and the fault sharing container is associated with an expert database, and the method comprises the following steps of:
The fault sharing container establishes mapping with test sequence bits for testing faults, and script code subfiles corresponding to the test sequence bits are obtained;
Acquiring fault section information of the corresponding script code subfile according to the script analysis executor;
associating an expert database according to the attribute characteristics of the fault section information, wherein a daily task popup window is arranged in the expert database;
And converting the fault section information into an Excel format file, filling the Excel format file into a task popup window of an expert library, and processing the corresponding fault section information by the expert according to the task popup window.
S9, when all script code sub-files pass the test, weaving a plurality of script code sub-files to obtain a target script code file, wherein the method comprises the following steps:
Sequentially calling script code subfiles corresponding to the test sequence bits, and copying the script code subfiles into a compiling environment according to sequential logic of the test sequence;
Comparing the difference value of the start code row, the end code row and the code row of each script code subfile with the recorded value, generating a target script code file if the difference value of the start code row, the end code row and the code row is matched with the historical recorded value, and checking if the difference value is not matched with the historical recorded value.
The above embodiments are preferred embodiments of the static inspection method based on xml test script code according to the present invention, and the scope of the present invention is not limited to the preferred embodiments, but all equivalent changes in shape and structure according to the present invention are within the scope of the present invention.

Claims (7)

Translated fromChinese
1.一种基于xml测试脚本代码的静态检查方法,其特征在于:包括如下步骤:1. A static inspection method based on XML test script code, characterized by comprising the following steps:S1、构建检测规则库,所述检测规则库与脚本解析执行器建立映射;S1. Build a detection rule library, and establish a mapping between the detection rule library and the script parsing executor;S2、脚本解析执行器加载待检测脚本代码文件,并对脚本代码文件进行预处理得到若干脚本代码子文件;S2. The script parsing executor loads the script code file to be detected and preprocesses the script code file to obtain several script code sub-files;S3、脚本解析执行器依次匹配所述脚本代码子文件的检测规范表,所述检测规范表中依次关联检测规则库中的检测条目指令;S3. The script parsing executor sequentially matches the detection specification table of the script code sub-file, wherein the detection specification table sequentially associates the detection entry instructions in the detection rule library;S4、根据检测规范表的检测逻辑依次对脚本代码子文件进行测试,配备故障检测表;S4. Testing the script code sub-files in sequence according to the detection logic of the detection specification table, and equipping a fault detection table;S5、若测试发生故障,执行S6,故障检测表中的故障栏目获取对应脚本代码子文件的标号;若测试未发生故障,执行S9;S5. If a failure occurs during the test, execute S6 and obtain the label of the corresponding script code sub-file from the fault column in the fault detection table; if no failure occurs during the test, execute S9;S6、对标号处对应的故障区段信息进行故障分析和修正后,执行回归静态检查;S6. After analyzing and correcting the fault section information corresponding to the number, perform a regression static check;S7、根据设定执行次数阈值重复执行S5-S6,若重复次数超过阈值,则执行S8;S7, repeat S5-S6 according to the set execution number threshold. If the number of repetitions exceeds the threshold, execute S8;S8、将出现测试故障的脚本代码子文件的标号关联至故障共享容器,故障共享容器关联有专家库;S8. Associating the label of the script code sub-file where the test failure occurs with a fault sharing container, wherein the fault sharing container is associated with an expert library;S9、当所有脚本代码子文件均测试通过,对若干脚本代码子文件进行编织得到目标脚本代码文件。S9. When all script code sub-files have passed the test, several script code sub-files are knitted to obtain a target script code file.2.根据权利要求1所述的一种基于xml测试脚本代码的静态检查方法,其特征在于:2. A static inspection method based on XML test script code according to claim 1, characterized in that:S1中构建检测规则库包括如下步骤:Building a detection rule base in S1 includes the following steps:根据xml测试脚本语言的语言规范和使用要求,确定检查规则;Determine the inspection rules according to the language specifications and usage requirements of the XML test script language;采用正则表示式的方式编写基于xml测试脚本语言的静态检查规则代码。Use regular expressions to write static checking rule codes based on XML test script language.3.根据权利要求1所述的一种基于xml测试脚本代码的静态检查方法,其特征在于:3. The static inspection method based on XML test script code according to claim 1, characterized in that:S2中,对脚本代码文件进行预处理得到若干脚本代码子文件,包括:In S2, the script code file is preprocessed to obtain several script code sub-files, including:根据脚本代码文件的测试项属性将其分为若干脚本代码子文件;Divide the script code file into several script code sub-files according to the test item attributes;记录每一个脚本代码子文件的起始代码行、终止代码行以及代码行差值;Record the starting code line, ending code line and code line difference of each script code sub-file;根据代码行差值分配测试容器中的分隔槽位,将若干脚本代码子文件存储至待测试容器的分隔槽中并进行标号;提取标号作为测试序列,所述测试序列的序列位与分隔槽位建立映射。The separation slots in the test container are allocated according to the code line difference, and several script code sub-files are stored in the separation slots of the container to be tested and labeled; the labels are extracted as test sequences, and the sequence bits of the test sequences are mapped to the separation slots.4.根据权利要求3所述的一种基于xml测试脚本代码的静态检查方法,其特征在于:4. The static inspection method based on XML test script code according to claim 3, characterized in that:S3中,包括如下步骤:In S3, the following steps are included:所述测试序列与检测规范表建立映射,所述脚本解析执行器根据测试序列的检测逻辑依次获取待测试容器中的脚本代码子文件,并调用对应的检测条目指令对脚本代码子文件进行测试。The test sequence is mapped to the test specification table, and the script parsing executor sequentially obtains the script code sub-files in the container to be tested according to the test logic of the test sequence, and calls the corresponding test entry instructions to test the script code sub-files.5.根据权利要求3或4所述的一种基于xml测试脚本代码的静态检查方法,其特征在于:5. A static inspection method based on XML test script code according to claim 3 or 4, characterized in that:S5中,包括如下步骤:S5 includes the following steps:若测试出现故障,故障检测表中的故障栏目自动获取对应脚本代码子文件的标号信息;If a fault occurs during testing, the fault column in the fault detection table automatically obtains the label information of the corresponding script code sub-file;所述故障栏目与对应的测试序列位建立映射。The fault column is mapped to the corresponding test sequence bit.6.根据权利要求3所述的一种基于xml测试脚本代码的静态检查方法,其特征在于:6. The static checking method based on XML test script code according to claim 3, characterized in that:S8中,将出现测试故障的脚本代码子文件的标号关联至故障共享容器,故障共享容器关联有专家库包括如下步骤:In S8, the label of the script code sub-file having the test fault is associated with the fault sharing container, and the fault sharing container is associated with the expert library, including the following steps:故障共享容器与测试故障的测试序列位建立映射,获取测试序列位对应的脚本代码子文件;Establish a mapping between the fault sharing container and the test sequence bit of the test fault, and obtain the script code sub-file corresponding to the test sequence bit;根据脚本解析执行器获取对应脚本代码子文件的故障区段信息;Obtain the fault section information of the corresponding script code sub-file according to the script parsing executor;根据故障区段信息的属性特征关联专家库,所述专家库中设置有日常任务弹窗;According to the attribute characteristics of the fault section information, an expert database is associated, wherein a daily task pop-up window is set in the expert database;将故障区段信息转换成Excel格式文件填充至专家库的任务弹窗,专家根据任务弹窗对相应故障区段信息进行处理。The fault section information is converted into an Excel format file and filled into the task pop-up window of the expert library. The experts process the corresponding fault section information according to the task pop-up window.7.根据权利要求3所述的一种基于xml测试脚本代码的静态检查方法,其特征在于:7. The static inspection method based on XML test script code according to claim 3, characterized in that:S9中,当所有脚本代码子文件均测试通过,对若干脚本代码子文件进行编织得到目标脚本代码文件,包括:In S9, when all script code sub-files have passed the test, several script code sub-files are knitted to obtain a target script code file, including:依次调取与测试序列位对应的脚本代码子文件,根据测试序列的顺序逻辑将脚本代码子文件复制到编译环境中;Retrieve the script code sub-files corresponding to the test sequence bits in sequence, and copy the script code sub-files to the compilation environment according to the sequential logic of the test sequence;将每一个脚本代码子文件的起始代码行、终止代码行以及代码行差值与记录值进行比较;若起始代码行、终止代码行以及代码行差值与历史记录值均匹配,则生成目标脚本代码文件;若不匹配,则进行校对。Compare the starting code line, ending code line and code line difference of each script code sub-file with the recorded value; if the starting code line, ending code line and code line difference match the historical record value, generate the target script code file; if not, perform proofreading.
CN202210978519.1A2022-08-162022-08-16 A static checking method based on XML test script codeActiveCN115437923B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN202210978519.1ACN115437923B (en)2022-08-162022-08-16 A static checking method based on XML test script code

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN202210978519.1ACN115437923B (en)2022-08-162022-08-16 A static checking method based on XML test script code

Publications (2)

Publication NumberPublication Date
CN115437923A CN115437923A (en)2022-12-06
CN115437923Btrue CN115437923B (en)2025-08-08

Family

ID=84241895

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN202210978519.1AActiveCN115437923B (en)2022-08-162022-08-16 A static checking method based on XML test script code

Country Status (1)

CountryLink
CN (1)CN115437923B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN111837109A (en)*2019-11-222020-10-27深圳海付移通科技有限公司Code quality and defect analysis method, server and storage medium
CN112988594A (en)*2021-04-252021-06-18郑州信大捷安信息技术股份有限公司Integrated detection method and system for code quality evaluation

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US8527955B2 (en)*2009-09-112013-09-03International Business Machines CorporationSystem and method to classify automated code inspection services defect output for defect analysis
CN112464237B (en)*2020-11-262023-10-31中国工商银行股份有限公司Static code security diagnosis method and device
CN113760729B (en)*2021-01-262025-03-21北京沃东天骏信息技术有限公司 A code detection method and device

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN111837109A (en)*2019-11-222020-10-27深圳海付移通科技有限公司Code quality and defect analysis method, server and storage medium
CN112988594A (en)*2021-04-252021-06-18郑州信大捷安信息技术股份有限公司Integrated detection method and system for code quality evaluation

Also Published As

Publication numberPublication date
CN115437923A (en)2022-12-06

Similar Documents

PublicationPublication DateTitle
US12130732B2 (en)System and method for performing automated API tests
US6961873B2 (en)Environment based data driven automated test engine for GUI applications
US6948152B2 (en)Data structures for use with environment based data driven automated test engine for GUI applications
US7526498B2 (en)Method for generating data structures for automatically testing GUI applications
US20090265693A1 (en)Method and system for test run prioritization for software code testing in automated test execution
US20090265694A1 (en)Method and system for test failure analysis prioritization for software code testing in automated test execution
US20130091492A1 (en)Method to automate running relevant automatic tests to quickly assess code stability
US9384117B2 (en)Machine and methods for evaluating failing software programs
CN104484269A (en)Method for automatically generating testing script
US10761962B1 (en)Automated software program repair
AU2017202743A1 (en)Method for automatically validating data against a predefined data specification
US20070245327A1 (en)Method and System for Producing Process Flow Models from Source Code
CN107622017B (en)Analysis method for universal automation software test
CN115437923B (en) A static checking method based on XML test script code
US20160004625A1 (en)Method of executing test scripts based on runtime test selection
US10642716B1 (en)Automated software program repair
CN110795142B (en)Configuration file generation method and device
CN118210730A (en)Product code detection method, device and medium
CN109101355B (en)Processor debugging method for extracting error site characteristic test excitation
CN110765020B (en)Test case generation method based on domain knowledge
WO2017201853A1 (en)Method for locating program regression fault using slicing model
CN113568827B (en) User interface testing method, device, electronic device and storage medium for component
CN112181809B (en) A graphical user interface automated testing method based on multiple positioning methods
US11119889B1 (en)Automated software program repair
CN115705297A (en)Code call detection method, device, computer equipment and storage medium

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
GR01Patent grant
GR01Patent grant

[8]ページ先頭

©2009-2025 Movatter.jp