CN112148606A - Embedded point testing method, device, equipment and computer readable medium - Google Patents

Embedded point testing method, device, equipment and computer readable medium Download PDF

Info

Publication number
CN112148606A
CN112148606A CN202011003776.0A CN202011003776A CN112148606A CN 112148606 A CN112148606 A CN 112148606A CN 202011003776 A CN202011003776 A CN 202011003776A CN 112148606 A CN112148606 A CN 112148606A
Authority
CN
China
Prior art keywords
data
buried point
preset
point
buried
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011003776.0A
Other languages
Chinese (zh)
Other versions
CN112148606B (en
Inventor
陈念
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
JD Digital Technology Holdings Co Ltd
Original Assignee
JD Digital Technology Holdings Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by JD Digital Technology Holdings Co Ltd filed Critical JD Digital Technology Holdings Co Ltd
Priority to CN202011003776.0A priority Critical patent/CN112148606B/en
Publication of CN112148606A publication Critical patent/CN112148606A/en
Application granted granted Critical
Publication of CN112148606B publication Critical patent/CN112148606B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The application relates to a buried point testing method, a buried point testing device, a buried point testing equipment and a computer readable medium. The method comprises the following steps: under the condition that a first operation event is detected, capturing a first embedded point triggered by the first operation event by using a preset tool package, wherein the preset tool package is an embedded point test tool package integrated in target software; and displaying the data of the buried points under the condition that the data of the buried points generated by the first buried points is intercepted by using a preset tool kit. According to the embedded software development kit for the embedded point test, the embedded point is captured, the embedded point data is collected and displayed based on the embedded software development kit, the data capture package is avoided, the step of the embedded point test is greatly simplified, and the efficiency of the embedded point test is improved.

Description

Embedded point testing method, device, equipment and computer readable medium
Technical Field
The present application relates to the field of data acquisition technologies, and in particular, to a buried point testing method, apparatus, device, and computer readable medium.
Background
The buried point, which is a term used in the field of data collection (especially in the field of user behavior data collection), refers to a related technology and an implementation process thereof for capturing, processing and sending specific user behaviors or events, and is mainly used for collecting user behavior data, such as a page access path, a click element, and the like, and performing data analysis. The embedded points need to be tested in the development process, and the problem that the embedded points are unavailable after the project is operated online is avoided.
At present, in the related art, in order to test the buried point of a product, a terminal may be connected to an agent of a packet capturing tool such as charles or fiddler, a tester manually clicks the buried point position, then checks the buried point request data through the packet capturing tool, performs json analysis on the buried point request data, manually checks whether the buried point is correct, and manually fills a test report after the check is completed. The whole test flow is complex to operate and low in efficiency.
In view of the above problems, no effective solution has been proposed.
Disclosure of Invention
The application provides a buried point testing method, a buried point testing device, a buried point testing equipment and a computer readable medium, and aims to solve the technical problem that buried point testing steps are complicated and low in efficiency.
According to an aspect of an embodiment of the present application, there is provided a buried point testing method, including: under the condition that a first operation event is detected, capturing a first embedded point triggered by the first operation event by using a preset tool package, wherein the preset tool package is an embedded point test tool package integrated in target software; and displaying the data of the buried points under the condition that the data of the buried points generated by the first buried points is intercepted by using a preset tool kit.
Optionally, before capturing the first buried point triggered by the first operation event by using the preset toolkit, the method further includes calling the preset toolkit as follows: generating a callback function under the condition of receiving a test starting instruction; and calling the preset tool package by using the callback function so that the preset tool package monitors the first process of the target software.
Optionally, capturing the first buried point triggered by the first operation event using a preset toolkit comprises: acquiring a generation position of a first operation event; determining a target control at a generation position in the target software; and extracting a first buried point preset in the target control.
Optionally, before displaying the buried point data, the method further includes intercepting the buried point data as follows: and intercepting the data transmission request and extracting buried point data carried in the data transmission request under the condition that the first process is detected to send the data transmission request to the target network address.
Optionally, the displaying the buried point data comprises: acquiring a current display window; determining a target view layer where a display interface of target software is located in a current display window; generating a prompt box in the target view layer; and displaying the buried point data in a prompt box.
Optionally, displaying the buried point data comprises at least one of the following ways: displaying a page identifier in the prompt box, wherein the page identifier is used for indicating a page where the first embedded point is located; displaying first input data in a prompt box, wherein the first input data is data input by a target object at a target control; displaying a buried point identifier in a prompt box, wherein the buried point identifier is an identity identifier of a first buried point; and displaying a first event identification in the prompt box, wherein the first event identification is used for representing a next event triggered by the first operation event.
Optionally, the displaying the landfill data further comprises: comparing the buried point data with preset reference data; and displaying the data fields in the buried point data, which are inconsistent with the preset reference data, in a target color.
According to another aspect of the embodiments of the present application, there is provided a buried point testing apparatus, including: the embedded point capturing module is used for capturing a first embedded point triggered by a first operation event by using a preset tool package under the condition that the first operation event is detected, wherein the preset tool package is an embedded point test tool package integrated in target software; and the data display module is used for displaying the data of the buried point under the condition that the data of the buried point generated by the first buried point is intercepted by using a preset tool kit.
According to another aspect of the embodiments of the present application, there is provided an electronic device, including a memory, a processor, a communication interface, and a communication bus, where the memory stores a computer program executable on the processor, and the memory and the processor communicate with each other through the communication bus and the communication interface, and the processor implements the steps of the method when executing the computer program.
According to another aspect of embodiments of the present application, there is also provided a computer readable medium having non-volatile program code executable by a processor, the program code causing the processor to perform the above-mentioned method.
Compared with the related art, the technical scheme provided by the embodiment of the application has the following advantages:
the method comprises the steps that under the condition that a first operation event is detected, a preset tool package is used for capturing a first embedded point triggered by the first operation event, wherein the preset tool package is an embedded point test tool package integrated in target software; and displaying the data of the buried points under the condition that the data of the buried points generated by the first buried points is intercepted by using a preset tool kit. According to the embedded software development kit for the embedded point test, the embedded point is captured, the embedded point data is collected and displayed based on the embedded software development kit, the data capture package is avoided, the step of the embedded point test is greatly simplified, and the efficiency of the embedded point test is improved.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present application and together with the description, serve to explain the principles of the application.
In order to more clearly illustrate the technical solutions in the embodiments or related technologies of the present application, the drawings needed to be used in the description of the embodiments or related technologies will be briefly described below, and it is obvious for those skilled in the art to obtain other drawings without any creative effort.
Fig. 1 is a schematic diagram of a hardware environment of an alternative embedded point testing method according to an embodiment of the present application;
FIG. 2 is a flow chart of an alternative embedded point testing method provided in accordance with an embodiment of the present application;
FIG. 3 is a flow chart of an alternative kit invocation provided in accordance with an embodiment of the present application;
FIG. 4 is a flow chart of an alternative buried point acquisition process provided in accordance with an embodiment of the present application;
FIG. 5 is a flow chart illustrating an alternative display of buried point data provided in accordance with an embodiment of the present application;
FIG. 6 is a block diagram of an alternative buried point testing apparatus according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of an alternative electronic device according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
In the following description, suffixes such as "module", "component", or "unit" used to denote elements are used only for the convenience of description of the present application, and have no specific meaning in themselves. Thus, "module" and "component" may be used in a mixture.
In the related technology, in order to test the buried point of a product, a terminal can be connected with an agent of a packet capturing tool such as charles or fiddler, a tester manually clicks the buried point position, then checks the buried point request data through the packet capturing tool, performs json analysis on the buried point request data, manually checks whether the buried point is correct, and manually fills a test report after checking is finished. The whole test flow is complex to operate and low in efficiency.
To address the problems noted in the background, according to an aspect of an embodiment of the present application, an embodiment of a buried point testing method is provided.
Alternatively, in the embodiment of the present application, the above-described buried point testing method may be applied to a hardware environment formed by the terminal 101 and the server 102 as shown in fig. 1. As shown in fig. 1, a server 102 is connected to a terminal 101 through a network, which may be used to provide services for the terminal or a client installed on the terminal, and a database 103 may be provided on the server or separately from the server, and is used to provide data storage services for the server 102, and the network includes but is not limited to: wide area network, metropolitan area network, or local area network, and the terminal 101 includes but is not limited to a PC, a cell phone, a tablet computer, and the like.
In the embodiment of the present application, a method for testing a buried point may be performed by the server 102, or may be performed by both the server 102 and the terminal 101, as shown in fig. 2, where the method may include the following steps:
step S201, capturing a first buried point triggered by a first operation event by using a preset toolkit under the condition that the first operation event is detected, where the preset toolkit is a buried point test toolkit integrated in target software.
In the embodiment of the application, when a developer develops, a buried point can be set at a required position in advance for collecting user operation data after products are operated online, and when the buried point is tested, whether the function of the buried point is required to be tested can be realized as expected.
The method for testing the embedded point is explained by taking an Android terminal as an example. The preset toolkit can be an Android software development toolkit (SDK) developed through an Android language, and can be integrated into software to be tested in the form of an arr package, and the target software is the software to be tested. The aar package, namely Android Archive, is a binary Archive file of an Android library item, and the aar file contains all resource files, including class and res resource files. The arr package is applied to the Android mobile terminal, and the H5 interface and the Native interface can be better compatible, so that the embedded point test can be performed on the H5 interface and the Native interface.
In the embodiment of the application, when a user clicks a control and a page of software to be tested, a click event can be generated on a display screen, and in addition, a corresponding sliding event, a long-time press event and the like can be generated according to sliding operation, long-time press operation and the like of the user. The preset toolkit can detect the display screen in real time, and when the operation event is detected to be generated, a buried point can be captured according to the operation event.
Step S202, displaying the data of the buried point under the condition that the data of the buried point generated by the first buried point is intercepted by using a preset tool kit.
In the embodiment of the application, after the embedded point is captured, the preset tool kit can collect the embedded point data generated at the embedded point, and the embedded point data can be directly displayed on the display screen in a prompting frame mode, a popup window mode and the like. The data of the buried point can be the identity of the buried point, the data interaction information of the control where the buried point is located, and the like.
By adopting the technical scheme, the software development kit for the embedded point test is embedded in the application program, the embedded point is captured, the embedded point data is collected and displayed based on the software development kit, the data packet capturing is avoided, the step of the embedded point test is greatly simplified, and the efficiency of the embedded point test is improved.
Optionally, as shown in fig. 3, before capturing the first buried point triggered by the first operation event by using the preset toolkit, the method further includes invoking the preset toolkit as follows:
step S301, generating a callback function under the condition of receiving the test starting instruction.
In the embodiment of the application, a user can switch between a test mode and a normal mode through a switch, wherein the test mode is used for testing the embedded points which are preset at each position of the software to be tested. When the normal mode needs to be switched to the test mode, a user turns on the switch so as to send a starting test instruction, and the device generates a callback function after receiving the starting test instruction. The callback function may be a plurality of functions including a control preset toolkit lifecycle.
Step S302, calling a preset tool package by using the callback function so that the preset tool package monitors a first process of the target software.
In the embodiment of the present application, the invoking of the preset toolkit by using the callback function is actually creating a lifecycle for the preset toolkit, for example, creating a lifecycle for the preset toolkit by using a function onactive created, controlling the preset toolkit to start running by using a function onactive started, and detecting a process of the software to be detected. The preset tool kit can be controlled to pause through an onactive Paused function, the preset tool kit is controlled to continue to run through an onactive Resummed function, temporary data is temporarily stored through an onactive SaveInstanceState function, the progress of the preset tool kit is destroyed through an onactive destroyed function, and the life cycle of the preset tool kit is closed.
Optionally, as shown in fig. 4, capturing the first buried point triggered by the first operation event using the preset toolkit includes:
in step S401, the generation position of the first operation event is acquired.
In the embodiment of the application, the generation position of the operation event can be acquired on the display screen through clicking, sliding, long pressing and other operations of the user.
Step S402, determining a target control at the generation position in the target software.
In the embodiment of the application, the position is generated according to the determined operation event on the display screen, and the control at the position in the software to be tested is determined, for example, when a user clicks a search box and clicks a button, the corresponding search box control, button control and the like are determined.
In step S403, a first buried point preset in the target control is extracted.
In the embodiment of the application, when a developer develops, a buried point can be set at a required position in advance for collecting user operation data after products are operated online, and when the buried point is tested, whether the function of the buried point is required to be tested can be realized as expected. Therefore, during testing, after the preset tool kit determines the user click position, the buried point preset at the position can be found.
Optionally, before displaying the buried point data, the method further includes intercepting the buried point data as follows: and intercepting the data transmission request and extracting buried point data carried in the data transmission request under the condition that the first process is detected to send the data transmission request to the target network address.
In the embodiment of the application, after a product is put into operation, the buried point reports collected user operation data and data generated by functions of software to the server so as to collect a large amount of data to a data center for analysis by operation and maintenance personnel. When the embedded point test is carried out, the data transmission request for sending the embedded point data to the data center server can be intercepted, so that the data can be directly displayed on the display screen of the terminal. Intercepting the data transmission request can detect whether a data packet sent to a target link address exists or not, and when the data packet sent to the target link address exists, intercepting and extracting data in the data packet.
Optionally, as shown in fig. 5, the displaying of the buried point data may include the following steps:
step S501, acquiring a current display window;
step S502, determining a target view layer where a display interface of target software is located in a current display window;
step S503, generating a prompt box in the target view layer;
step S504, displaying the buried point data in a prompt box.
In the embodiment of the application, the view layer where the current display interface is located can be located through the buried point identifier, the page identifier and the like, and then a pop-up window and a prompt box can be generated in the view layer to display the buried point data.
Optionally, displaying the buried point data comprises at least one of the following ways:
displaying a page identifier in the prompt box, wherein the page identifier is used for indicating a page where the first embedded point is located;
displaying first input data in a prompt box, wherein the first input data is data input by a target object at a target control;
displaying a buried point identifier in a prompt box, wherein the buried point identifier is an identity identifier of a first buried point;
and displaying a first event identification in the prompt box, wherein the first event identification is used for representing a next event triggered by the first operation event.
In the embodiment of the application, the page identifier collected by the buried point, namely the page where the buried point is located, can be displayed to distinguish each page of the software. Data input by the user can be displayed, for example, the user inputs content to be searched in the search box, and the buried point can acquire the content and display the content through the prompt box. The identification information of the buried points can be displayed for distinguishing different buried points, and statistics can be carried out based on the buried point identifications when data are collected. And displaying the identifier of the next event caused by the user operation, wherein the identifier can reflect whether the function of the control in which the embedded point is located is realized.
Optionally, the displaying the landfill data further comprises: comparing the buried point data with preset reference data; and displaying the data fields in the buried point data, which are inconsistent with the preset reference data, in a target color.
In the embodiment of the application, the fixed data can be compared, for example, whether the page is jumped after the button is clicked, whether the jumped page is correct and the like are displayed, the abnormal data field is highlighted, the target color such as red, blue, yellow and the like can be displayed to prompt the worker that the data is abnormal, the worker can be helped to quickly find the abnormal data, and the efficiency of the embedded point test is improved.
The method comprises the steps that under the condition that a first operation event is detected, a preset tool package is used for capturing a first embedded point triggered by the first operation event, wherein the preset tool package is an embedded point test tool package integrated in target software; and displaying the data of the buried points under the condition that the data of the buried points generated by the first buried points is intercepted by using a preset tool kit. According to the embedded software development kit for the embedded point test, the embedded point is captured, the embedded point data is collected and displayed based on the embedded software development kit, the data capture package is avoided, the step of the embedded point test is greatly simplified, and the efficiency of the embedded point test is improved.
According to another aspect of the embodiments of the present application, as shown in fig. 6, there is provided a buried point testing apparatus including: a buried point capturing module 601, configured to capture a first buried point triggered by a first operation event by using a preset toolkit when the first operation event is detected, where the preset toolkit is a buried point test toolkit integrated in target software; the data display module 602 is configured to display the data of the buried point when the data of the buried point generated by the first buried point is intercepted by using a preset toolkit.
It should be noted that the buried point capturing module 601 in this embodiment may be configured to execute step S201 in this embodiment, and the data presentation module 602 in this embodiment may be configured to execute step S202 in this embodiment.
It should be noted here that the modules described above are the same as the examples and application scenarios implemented by the corresponding steps, but are not limited to the disclosure of the above embodiments. It should be noted that the modules described above as a part of the apparatus may operate in a hardware environment as shown in fig. 1, and may be implemented by software or hardware.
Optionally, the buried point testing apparatus further includes a kit retrieving module, configured to: generating a callback function under the condition of receiving a test starting instruction; and calling the preset tool package by using the callback function so that the preset tool package monitors the first process of the target software.
Optionally, the buried point capturing module is specifically configured to: acquiring a generation position of a first operation event; determining a target control at a generation position in the target software; and extracting a first buried point preset in the target control.
Optionally, the buried point testing apparatus further includes a data interception module, configured to: and intercepting the data transmission request and extracting buried point data carried in the data transmission request under the condition that the first process is detected to send the data transmission request to the target network address.
Optionally, the data display module is specifically configured to: acquiring a current display window; determining a target view layer where a display interface of target software is located in a current display window; generating a prompt box in the target view layer; and displaying the buried point data in a prompt box.
Optionally, the data presentation module is further configured to: displaying a page identifier in the prompt box, wherein the page identifier is used for indicating a page where the first embedded point is located; displaying first input data in a prompt box, wherein the first input data is data input by a target object at a target control; displaying a buried point identifier in a prompt box, wherein the buried point identifier is an identity identifier of a first buried point; and displaying a first event identification in the prompt box, wherein the first event identification is used for representing a next event triggered by the first operation event.
Optionally, the data presentation module is further configured to: comparing the buried point data with preset reference data; and displaying the data fields in the buried point data, which are inconsistent with the preset reference data, in a target color.
According to another aspect of the embodiments of the present application, there is provided an electronic device, as shown in fig. 7, including a memory 701, a processor 702, a communication interface 703 and a communication bus 704, where the memory 701 stores a computer program that is executable on the processor 702, the memory 701 and the processor 702 communicate with each other through the communication interface 703 and the communication bus 704, and the processor 702 implements the steps of the method when executing the computer program.
The memory and the processor in the electronic equipment are communicated with the communication interface through a communication bus. The communication bus may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The communication bus may be divided into an address bus, a data bus, a control bus, etc.
The Memory may include a Random Access Memory (RAM) or a non-volatile Memory (non-volatile Memory), such as at least one disk Memory. Optionally, the memory may also be at least one memory device located remotely from the processor.
The Processor may be a general-purpose Processor, and includes a Central Processing Unit (CPU), a Network Processor (NP), and the like; the Integrated Circuit may also be a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, a discrete Gate or transistor logic device, or a discrete hardware component.
There is also provided, in accordance with yet another aspect of an embodiment of the present application, a computer-readable medium having non-volatile program code executable by a processor.
Optionally, in an embodiment of the present application, a computer readable medium is configured to store program code for the processor to perform the following steps:
under the condition that a first operation event is detected, capturing a first embedded point triggered by the first operation event by using a preset tool package, wherein the preset tool package is an embedded point test tool package integrated in target software;
and displaying the data of the buried points under the condition that the data of the buried points generated by the first buried points is intercepted by using a preset tool kit.
Optionally, the specific examples in this embodiment may refer to the examples described in the above embodiments, and this embodiment is not described herein again.
When the embodiments of the present application are specifically implemented, reference may be made to the above embodiments, and corresponding technical effects are achieved.
It is to be understood that the embodiments described herein may be implemented in hardware, software, firmware, middleware, microcode, or any combination thereof. For a hardware implementation, the Processing units may be implemented within one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), general purpose processors, controllers, micro-controllers, microprocessors, other electronic units configured to perform the functions described herein, or a combination thereof.
For a software implementation, the techniques described herein may be implemented by means of units performing the functions described herein. The software codes may be stored in a memory and executed by a processor. The memory may be implemented within the processor or external to the processor.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the modules is merely a logical division, and in actual implementation, there may be other divisions, for example, multiple modules or components may be combined or integrated into another system, or some features may be omitted, or not implemented. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solutions of the embodiments of the present application may be essentially implemented or make a contribution to the prior art, or may be implemented in the form of a software product stored in a storage medium and including several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a U disk, a removable hard disk, a ROM, a RAM, a magnetic disk, or an optical disk. It is noted that, in this document, relational terms such as "first" and "second," and the like, may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The above description is merely exemplary of the present application and is presented to enable those skilled in the art to understand and practice the present application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (10)

1. A method of buried point testing, comprising:
under the condition that a first operation event is detected, capturing a first embedded point triggered by the first operation event by using a preset tool package, wherein the preset tool package is an embedded point test tool package integrated in target software;
and displaying the data of the buried point under the condition that the data of the buried point generated by the first buried point is intercepted by utilizing the preset tool kit.
2. The method of claim 1, wherein prior to capturing the first buried point triggered by the first operational event with a preset toolkit, the method further comprises invoking the preset toolkit as follows:
generating a callback function under the condition of receiving a test starting instruction;
calling the preset tool package by using the callback function so that the preset tool package monitors the first process of the target software.
3. The method of claim 1, wherein capturing the first buried point triggered by the first operational event using a preset toolkit comprises:
acquiring a generation position of the first operation event;
determining a target control in the target software at the generation location;
and extracting the first buried point preset in the target control.
4. The method of claim 2, wherein prior to presenting the buried point data, the method further comprises intercepting the buried point data as follows:
and intercepting the data transmission request and extracting the buried point data carried in the data transmission request under the condition that the first process is detected to send the data transmission request to a target network address.
5. The method of claim 3, wherein presenting the buried point data comprises:
acquiring a current display window;
determining a target view layer where a display interface of the target software is located in the current display window;
generating a prompt box in the target view layer;
and displaying the buried point data in the prompt box.
6. The method of claim 5, wherein presenting the buried point data comprises at least one of:
displaying a page identifier in the prompt box, wherein the page identifier is used for indicating a page where the first buried point is located;
displaying first input data in the prompt box, wherein the first input data is data input by a target object at the target control;
displaying a buried point identifier in the prompt box, wherein the buried point identifier is an identity identifier of the first buried point;
and displaying a first event identification in the prompt box, wherein the first event identification is used for representing a next event triggered by the first operation event.
7. The method of any one of claims 1 to 6, wherein presenting the landfill data further comprises:
comparing the buried point data with preset reference data;
and displaying the data fields in the buried point data, which are inconsistent with the preset reference data, in a target color.
8. A buried point testing device, comprising:
the embedded point capturing module is used for capturing a first embedded point triggered by a first operation event by using a preset tool package under the condition that the first operation event is detected, wherein the preset tool package is an embedded point testing tool package integrated in target software;
and the data display module is used for displaying the data of the buried point under the condition that the data of the buried point generated by the first buried point is intercepted by the preset toolkit.
9. An electronic device comprising a memory, a processor, a communication interface and a communication bus, wherein the memory stores a computer program operable on the processor, and the memory and the processor communicate via the communication bus and the communication interface, wherein the processor implements the steps of the method according to any of the claims 1 to 7 when executing the computer program.
10. A computer-readable medium having non-volatile program code executable by a processor, wherein the program code causes the processor to perform the method of any of claims 1 to 7.
CN202011003776.0A 2020-09-22 2020-09-22 Buried point test method, buried point test device, buried point test equipment and computer readable medium Active CN112148606B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011003776.0A CN112148606B (en) 2020-09-22 2020-09-22 Buried point test method, buried point test device, buried point test equipment and computer readable medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011003776.0A CN112148606B (en) 2020-09-22 2020-09-22 Buried point test method, buried point test device, buried point test equipment and computer readable medium

Publications (2)

Publication Number Publication Date
CN112148606A true CN112148606A (en) 2020-12-29
CN112148606B CN112148606B (en) 2024-05-17

Family

ID=73896868

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011003776.0A Active CN112148606B (en) 2020-09-22 2020-09-22 Buried point test method, buried point test device, buried point test equipment and computer readable medium

Country Status (1)

Country Link
CN (1) CN112148606B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112817817A (en) * 2021-01-25 2021-05-18 微民保险代理有限公司 Buried point information query method and device, computer equipment and storage medium
CN113836045A (en) * 2021-11-29 2021-12-24 深圳市明源云链互联网科技有限公司 Logic generation method and device for interface automation assertion and storage medium
CN115022388A (en) * 2022-05-31 2022-09-06 济南浪潮数据技术有限公司 Data acquisition method, device, equipment and medium

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170010951A1 (en) * 2015-07-10 2017-01-12 CA, Inc Application screen mapping for mobile analytics
WO2018113385A1 (en) * 2016-12-24 2018-06-28 上海壹账通金融科技有限公司 Method and system for dynamically tracking application of client, client, and server
CN108280022A (en) * 2018-02-08 2018-07-13 无线生活(杭州)信息科技有限公司 Performance monitoring method and device
CN108282446A (en) * 2017-01-06 2018-07-13 阿里巴巴集团控股有限公司 Identify the method and apparatus of scanner
CN108920354A (en) * 2018-05-07 2018-11-30 上海陆家嘴国际金融资产交易市场股份有限公司 Bury a management method, device, computer equipment and storage medium
WO2019100614A1 (en) * 2017-11-22 2019-05-31 平安科技(深圳)有限公司 Buried point data processing method, device, computer device and storage medium
WO2019196224A1 (en) * 2018-04-09 2019-10-17 平安科技(深圳)有限公司 Regulation information processing method and apparatus, computer device and storage medium
CN110442511A (en) * 2019-06-25 2019-11-12 苏宁云计算有限公司 A test method and device are buried in visualization
CN110990255A (en) * 2019-10-28 2020-04-10 贝壳技术有限公司 Buried point testing method and server
CN111090592A (en) * 2019-12-20 2020-05-01 上海品顺信息科技有限公司 Automatic testing method of buried point, terminal and readable storage medium
CN111190807A (en) * 2018-11-14 2020-05-22 杭州萤石软件有限公司 Buried point testing method and device
CN111274143A (en) * 2020-01-20 2020-06-12 北京字节跳动网络技术有限公司 Buried point testing method, device, equipment and storage medium
CN111324409A (en) * 2020-02-14 2020-06-23 腾讯科技(深圳)有限公司 Artificial intelligence-based interaction method and related device
CN111367814A (en) * 2020-03-17 2020-07-03 深圳市前海随手数据服务有限公司 Embedded point testing method and device, terminal equipment and storage medium

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170010951A1 (en) * 2015-07-10 2017-01-12 CA, Inc Application screen mapping for mobile analytics
WO2018113385A1 (en) * 2016-12-24 2018-06-28 上海壹账通金融科技有限公司 Method and system for dynamically tracking application of client, client, and server
CN108282446A (en) * 2017-01-06 2018-07-13 阿里巴巴集团控股有限公司 Identify the method and apparatus of scanner
WO2019100614A1 (en) * 2017-11-22 2019-05-31 平安科技(深圳)有限公司 Buried point data processing method, device, computer device and storage medium
CN108280022A (en) * 2018-02-08 2018-07-13 无线生活(杭州)信息科技有限公司 Performance monitoring method and device
WO2019196224A1 (en) * 2018-04-09 2019-10-17 平安科技(深圳)有限公司 Regulation information processing method and apparatus, computer device and storage medium
CN108920354A (en) * 2018-05-07 2018-11-30 上海陆家嘴国际金融资产交易市场股份有限公司 Bury a management method, device, computer equipment and storage medium
CN111190807A (en) * 2018-11-14 2020-05-22 杭州萤石软件有限公司 Buried point testing method and device
CN110442511A (en) * 2019-06-25 2019-11-12 苏宁云计算有限公司 A test method and device are buried in visualization
CN110990255A (en) * 2019-10-28 2020-04-10 贝壳技术有限公司 Buried point testing method and server
CN111090592A (en) * 2019-12-20 2020-05-01 上海品顺信息科技有限公司 Automatic testing method of buried point, terminal and readable storage medium
CN111274143A (en) * 2020-01-20 2020-06-12 北京字节跳动网络技术有限公司 Buried point testing method, device, equipment and storage medium
CN111324409A (en) * 2020-02-14 2020-06-23 腾讯科技(深圳)有限公司 Artificial intelligence-based interaction method and related device
CN111367814A (en) * 2020-03-17 2020-07-03 深圳市前海随手数据服务有限公司 Embedded point testing method and device, terminal equipment and storage medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
曾杨;: "高校大数据平台的构建与应用探索", 中小企业管理与科技(下旬刊), no. 10 *
李中萍;岳海;薛静;: "LDRA TESTBED在航天软件测试中的应用", 航天控制, no. 02 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112817817A (en) * 2021-01-25 2021-05-18 微民保险代理有限公司 Buried point information query method and device, computer equipment and storage medium
CN113836045A (en) * 2021-11-29 2021-12-24 深圳市明源云链互联网科技有限公司 Logic generation method and device for interface automation assertion and storage medium
CN115022388A (en) * 2022-05-31 2022-09-06 济南浪潮数据技术有限公司 Data acquisition method, device, equipment and medium

Also Published As

Publication number Publication date
CN112148606B (en) 2024-05-17

Similar Documents

Publication Publication Date Title
CN106649063B (en) Method and system for monitoring time-consuming data during program operation
CN112148606B (en) Buried point test method, buried point test device, buried point test equipment and computer readable medium
CN108804299B (en) Application program exception handling method and device
CN106557424B (en) Memory test method, tested terminal, test client and system
CN107957941B (en) Method and device for processing memory leakage of mobile terminal
CN108874268B (en) User behavior data acquisition method and device
WO2015027816A1 (en) Devices and methods for acquiring abnormal information
CN110515679B (en) Data acquisition method, device, equipment and storage medium
CN103685251A (en) Android malicious software detecting platform oriented to mobile internet
US9372776B2 (en) Monitoring user activity and performance of computerized devices
CN103186740A (en) Automatic detection method for Android malicious software
CN110851326A (en) Point burying method, data acquisition method and device
CN110806965A (en) Automatic test method, device, equipment and medium
CN115543827A (en) Buried point data display method and device
CN114661551A (en) Method and device for monitoring software running state and computer readable storage medium
CN114371974A (en) Buried point data checking method and electronic equipment
KR101527745B1 (en) Method and apparatus for verifying application by using object extracting
CN110674045A (en) Information tracking detection method and device, electronic equipment and storage medium
CN114385457A (en) Application program data acquisition method, device, equipment and storage medium
CN115098116A (en) Simulation operation method and device of application program, terminal and storage medium
CN105262829B (en) Geographical position monitoring method and system
CN112364267B (en) Front-end data acquisition method and device
CN111797016B (en) Application program testing method, device, storage medium and device
CN110601879B (en) Method and device for forming Zabbix alarm process information and storage medium
CN113190458A (en) Method and device for automatically analyzing buried point data, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: Room 221, 2 / F, block C, 18 Kechuang 11th Street, Daxing District, Beijing, 100176

Applicant after: Jingdong Technology Holding Co.,Ltd.

Address before: Room 221, 2 / F, block C, 18 Kechuang 11th Street, Daxing District, Beijing, 100176

Applicant before: Jingdong Digital Technology Holding Co.,Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant