Svn permission setting method, device and system and electronic device
A technology of permissions and permission files, applied in the direction of digital data protection, etc., can solve problems such as easy to write mistakes, inaccessible svn configuration library, etc., and achieve the effect of improving accuracy and convenience
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0047] In order to avoid the defect in the prior art that managers need to manually input the complete file path to set permissions when modifying permissions, this application proposes a svn permission setting method to realize rapid permission setting. This method solves the problem proposed in the background technology The main idea of the problem is:
[0048] First, according to the received permission setting requirements, analyze and obtain the configuration library information in the database, then obtain the files and folders at all levels under the corresponding path according to the configuration library information, and obtain the corresponding display page through real-time display, the display page It includes all levels of files and folders displayed in a tree structure, and the permission identification of the user who sends the request in each file and folder; finally, set the corresponding permissions according to the display page and record them in the datab...
Embodiment 2
[0072] Based on the same idea as Embodiment 1, this embodiment proposes an svn permission setting device 4, such as Figure 4 As shown, the device includes:
[0073] Requirement receiving module 41: used to receive permission setting requirements, the permission setting requirements include the name of the user who sends the requirement and the name of the configuration library of the target object whose permission needs to be set.
[0074] In the implementation, a text input box is provided to receive the user name and configuration library name in the permission setting requirements, or a text input box is provided to receive the user name and configuration library path in the permission setting requirements, and then the configuration is obtained by parsing the configuration library path Library name, such as configuring the library path as https: / / 192.168.0.1 / svn / hstest / trunk / , it can be obtained through analysis: access protocol "https: / / ", server address "192.168.0.1", a...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


