Research Article
A Real-Time Detection Method of Software Configuration Errors Based on Fine-Grained Configuration Item Types
Table 8
Test results of profile update operation.
| No | Is the configuration update captured | Is the exception detected | Error analysis |
| 1 | Yes | Yes | The syntax constraint rule is broken | 2∗ | Yes | Yes | The IP address is inaccessible | 3 | Yes | No | The parameter value is too large | 4 | Yes | Yes | The port is occupied | 5 | Yes | Yes | The parameter type should be the file type | 6 | Yes | Yes | The parameter value is abnormal | 7 | Yes | Yes | The file path does not exist | 8 | Yes | Yes | An unsupported MIME type | 9∗ | No | No | The parameter type should be the directory type | 10∗ | Yes | Yes | The parameter type should be the directory type | 11∗ | Yes | No | The parameter value is too small | 12 | Yes | Yes | The syntax constraint rule is broken | 13∗ | Yes | Yes | No write permission | 14∗ | Yes | Yes | The parameter type should be the file type | 15∗ | Yes | Yes | The path does not exist | 16 | Yes | Yes | The port is occupied | 17∗ | Yes | Yes | An unsupported file type |
|
|